0
Q:

# You have the following binary number :10110111. What are the decimal and hexadecimal equivalents?

 A) 69/0x2102 B) 183/B7 C) 173/A6 D) 83/0xC5

Answer:   B) 183/B7

Explanation:

You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128+32+16+4+2+1=183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By adding up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.

Q:

Mention different memories used in a CISCO router ?

Answer

Different Memories used in a CISCO router are as follows :

• NVRAM stores the startup configuration file.

• DRAM stores the configuration file that is being executed.

• Flash Memory – stores the Cisco IOS.

Report Error

483
Q:

By default , what type of trust are all Windows 2000 trust relationships within a domain tree or forest?

 A) Explicit trust B) One-way trust C) Transitive trust D) Non-transitive trust

Answer & Explanation Answer: C) Transitive trust

Explanation:

By default, all Windows 2000 trusts within a domain tree or forest are transitive trusts.

Report Error

Filed Under: CCNA - CISCO Certification

2 2068
Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :

PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.

Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based.

Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.

L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.

IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.

SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer.

MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows.

Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs.

Report Error

1614
Q:

What protocol would you use if you were running xDSL and needed authentication?

Answer

PPPoE  or  PPPoA

Report Error

2202
Q:

Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?

 A) HDLC B) Cable C) VPN D) IPSec

Answer & Explanation Answer: C) VPN

Explanation:

A VPN allows or describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols. A VPN can be set up across any type of link.

Report Error

Filed Under: CCNA - CISCO Certification

2 2737
Q:

Which of the following is an industry-wide standards suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer3 Network layer of the OSI model?

 A) HDLC B) xDSL C) VPN D) IPSec

Answer & Explanation Answer: D) IPSec

Explanation:

IPSec is an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer3 Network layer of the OSI model.

Report Error

Filed Under: CCNA - CISCO Certification

2 1813
Q:

How should a router that is being used in a Frame Relay  network be configured to keep split horizon issues from preventing routing updates

 A) Configure a seperate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface B) Combine multiple Frame Relay circuits as a point-to-point line to support multicast and broadcast traffic C) Configure many subinterfaces in the same subnet D) Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces.

Answer & Explanation Answer: A) Configure a seperate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface

Explanation:

If you have a serial port configured with multiple DLCIs connected to multiple remote sites, split horizon rules stop route updates received on an interface from being sent out the same interface. By creating subinterfaces for each PVC, you can avoid the split horizon issues when using Frame Relay.

Report Error

Filed Under: CCNA - CISCO Certification

0 1758
Q:

Which of the following uses ATM as the Data Link layer protocol that's terminated at what's known as the DSLAM?

 A) DSL B) PPPoE C) Frame Relay D) Dedicated T1

Answer & Explanation Answer: A) DSL

Explanation:

ATM is the Data-Link layer protocol that's typically used over the DSL layer1 connection from the CPE and terminated at what's known as the DSLAM - an ATM switch that contains DSL interface cards, or ATU-Cs.

Report Error

Filed Under: CCNA - CISCO Certification

0 1438