Searching for "If"

Q:

What protocol is required by Internet Information Services(IIS), the indexing Service, and Certificate Services?

A) TCP/IP B) NWLink IPX/SPX/NetBIOS Compatible Transport protocol
C) NetBEUI D) RIP Version 2 for Internet Protocol
 
Answer & Explanation Answer: A) TCP/IP

Explanation:

When you think Internet (or anything Internet - related), think TCP/IP

Report Error

View Answer Report Error Discuss

Q:

You are planning to install and configure network services for ineroperability on your Windows 2000 Server computer. You specifically want this server to maintain and advertise a list of services that use the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol. What service should you install?

A) Indexing Service B) NNTP Service
C) RIP Listener D) SAP Agent
 
Answer & Explanation Answer: D) SAP Agent

Explanation:

The SAP Agent enables a Windows 2000 computer to maintain and advertise a list of servers (such as NetWare servers) that use the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.

Report Error

View Answer Report Error Discuss

Q:

How can you redirect print jobs to a different print device?

A) Copy the print jobs from one printer to another printer B) Assign the printer to a port that is connected to a different type of print device.
C) Cancel all of the print jobs, then delete the printer. Create a new printer with the same name, and assign it to a different port. D) Assign the printer to a port that is connected to another identical print device.
 
Answer & Explanation Answer: D) Assign the printer to a port that is connected to another identical print device.

Explanation:

You need to assign the printer to a different port that is connected to the same type of print device.

Report Error

View Answer Report Error Discuss

Q:

You want to create a Group Policy Object (GPO) that will be associated with a specific domain. Which tool should you use?

A) Domain Security Policy B) Domain Controller Security Policy
C) Active Directory Users and Computers D) Active Directory Sites and Services
 
Answer & Explanation Answer: C) Active Directory Users and Computers

Explanation:

You can use Active Directory Users and Computers to create a GPO that will be associated with a specific domain or OU. If you are creating a GPO that will be associated with a site, you should use Active Directory Sites and Services.

Report Error

View Answer Report Error Discuss

Q:

You want to search for a specific shared folder object in Active Directory. Which tool should you use?

A) Search B) Windows Explorer
C) Active Directory Sites and Services D) Active Directory Users and Computers
 
Answer & Explanation Answer: D) Active Directory Users and Computers

Explanation:

To search for a specific shared folder in Active Directory, use Active Directory Users and computers. You can use Windows Explorer to browse Active Directory, but you can't use it to search for a specific  shared folder.

Report Error

View Answer Report Error Discuss

Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :


PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.


Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based. 


Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.


L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.


IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.


SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. 


MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows. 


Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

Q:

What protocol would you use if you were running xDSL and needed authentication?

Answer

PPPoE  or  PPPoA

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

Q:

Your inside locals are not being translated to the inside global addresses. Which of the following commands will show you if your inside globals are allowed to use the NAT pool?

ip nat pool Corp 198.18.41.129 198.18.41.134 netmask 255.255.255.248

ip nat inside source list 100 int pool Corp overload

A) debug ip nat B) show access - list
C) show ip nat translation D) show ip nat statistics
 
Answer & Explanation Answer: B) show access - list

Explanation:

Once you create your pool, the command ip nat inside source must be used to say which inside locals are allowed to use the pool. In this question we need to see if access - list 100 is configured correctly, if at all , so show access - list is the best answer.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA