CCNAEXAM.NET

Menu
  • Home
  • CCNA v7.0
    • CCNA 1 v7.0
    • CCNA 2 v7.0
    • CCNA 3 v7.0
  • CCNA v6.0 – v5.0
    • CCNA v6.0
      • CCNA 1 v6.0
      • CCNA 2 v6.0
      • CCNA 3 v6.0
      • CCNA 4 v6.0
    • CCNA v5.0
      • CCNA 1 v5
      • CCNA 2 v5
      • CCNA 3 v5
      • CCNA 4 v5
  • IT Essentials v5.0
  • Video Tutorials
Home
CCNA 4 v5.0 Chapter 7 test online

CCNA 4 v5.0 Chapter 7 test online

CCNA 4 v5.0 Connecting Networks Chapter 7 Exam

Time limit: 0

Quiz-summary

0 of 24 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24

Information

CCNA 4 v5.0 Connecting Networks Chapter 7 Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 24 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  1. Answered
  2. Review
  1. Question 1 of 24
    1. Question

    How is “tunneling” accomplished in a VPN?

    Correct

    Incorrect

  2. Question 2 of 24
    2. Question

    Which two scenarios are examples of remote access VPNs? (Choose two.)

    Correct

    Incorrect

  3. Question 3 of 24
    3. Question

    Refer to the exhibit. Which IP address would be configured on the tunnel interface of the destination router?

    Correct

    Incorrect

  4. Question 4 of 24
    4. Question

    Which statement correctly describes IPsec?

    Correct

    Incorrect

  5. Question 5 of 24
    5. Question

    What is an IPsec protocol that provides data confidentiality and authentication for IP packets?

    Correct

    Incorrect

  6. Question 6 of 24
    6. Question

    Which three statements describe the building blocks that make up the IPsec protocol framework? (Choose three.)

    Correct

    Incorrect

  7. Question 7 of 24
    7. Question

    What key question would help determine whether an organization should use an SSL VPN or an IPsec VPN for the remote access solution of the organization?

    Correct

    Incorrect

  8. Question 8 of 24
    8. Question

    What is the purpose of a message hash in a VPN connection?

    Correct

    Incorrect

  9. Question 9 of 24
    9. Question

    A network design engineer is planning the implementation of a cost-effective method to interconnect multiple networks securely over the Internet. Which type of technology is required?

    Correct

    Incorrect

  10. Question 10 of 24
    10. Question

    What is one benefit of using VPNs for remote access?

    Correct

    Incorrect

  11. Question 11 of 24
    11. Question

    Which statement describes a characteristic of IPsec VPNs?

    Correct

    Incorrect

  12. Question 12 of 24
    12. Question

    What is the purpose of the generic routing encapsulation tunneling protocol?

    Correct

    Incorrect

  13. Question 13 of 24
    13. Question

    Which algorithm is an asymmetrical key cryptosystem?

    Correct

    Incorrect

  14. Question 14 of 24
    14. Question

    A network design engineer is planning the implementation of an IPsec VPN. Which hashing algorithm would provide the strongest level of message integrity?

    Correct

    Incorrect

  15. Question 15 of 24
    15. Question

    What two encryption algorithms are used in IPsec VPNs? (Choose two.)

    Correct

    Incorrect

  16. Question 16 of 24
    16. Question

    Which statement describes a feature of site-to-site VPNs?

    Correct

    Incorrect

  17. Question 17 of 24
    17. Question

    Which Cisco VPN solution provides limited access to internal network resources by utilizing a Cisco ASA and provides browser-based access only?

    Correct

    Incorrect

  18. Question 18 of 24
    18. Question

    Which two algorithms use Hash-based Message Authentication Code for message authentication? (Choose two.)

    Correct

    Incorrect

  19. Question 19 of 24
    19. Question

    Which function of IPsec security services allows the receiver to verify that the data was transmitted without being changed or altered in any way?

    Correct

    Incorrect

  20. Question 20 of 24
    20. Question

    Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What problem is preventing the hosts from communicating across the VPN tunnel?

    Correct

    Incorrect

  21. Question 21 of 24
    21. Question

    What is the purpose of utilizing Diffie-Hellman (DH) algorithms as part of the IPsec standard?

    Correct

    Incorrect

  22. Question 22 of 24
    22. Question

    Refer to the exhibit. A tunnel was implemented between routers R1 and R2. Which two conclusions can be drawn from the R1 command output? (Choose two.)

    Correct

    Incorrect

  23. Question 23 of 24
    23. Question

    Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?

    Correct

    Incorrect

  24. Question 24 of 24
    24. Question

    Which remote access implementation scenario will support the use of generic routing encapsulation tunneling?

    Correct

    Incorrect

Leave a Reply

Cancel reply

CCNA v7 Free Exam Answers

  • CCNA 1 v7
  • CCNA 2 v7
  • CCNA 2 v7

Modules 1 – 3: Basic Network Connectivity and Communications Exam Answers
Modules 4 – 7: Ethernet Concepts Exam Answers
Modules 8 – 10: Communicating Between Networks Exam Answers
Modules 11 – 13: IP Addressing Exam Answers
Modules 14 – 15: Network Application Communications Exam Answers
Modules 16 – 17: Building and Securing a Small Network Exam Answers
Practice Final PT Skills Assessment (PTSA)
CCNA 1 v7 Practice Final Exam
CCNA 1 v7 FINAL Exam Answers

Modules 1 – 4: Switching Concepts, VLANs, and InterVLAN Routing Exam Answers
Modules 5 – 6: Redundant Networks Exam Answers
Modules 7 – 9: Available and Reliable Networks Exam Answers
Modules 10 – 13: L2 Security and WLANs Exam Answers
Modules 14 – 16: Routing Concepts and Configuration Exam Answers
[Skills Exams] SRWE Practice PT Skills Assessment (PTSA) – Part 1
[Skills Exams] SRWE Practice PT Skills Assessment (PTSA) – Part 2
CCNA 2 v7 Practice Final Exam
CCNA 2 v7 FINAL Exam Answers

Modules 1 – 2: OSPF Concepts and Configuration Exam Answers
Modules 3 – 5: Network Security Exam Answers
Modules 6 – 8: WAN Concepts Exam Answers
Modules 9 – 12: Optimize, Monitor, and Troubleshoot Networks Exam Answers
Modules 13 – 14: Emerging Network Technologies Exam Answers
[Skills Exams] ENSA Practice PT Skills Assessment (PTSA)
ENSAv7 Practice Final Exam
CCNA 3 v7 FINAL Exam Answers

Categories

  • CCNA 1 v5
  • CCNA 1 v6.0
  • CCNA 1 v7.0
  • CCNA 2 v5
  • CCNA 2 v6.0
  • CCNA 2 v7.0
  • CCNA 3 v5
  • CCNA 3 v7.0
  • CCNA 4 v5
  • CCNA v5 Exams – Packet Tracer
  • Final Exam Answers
  • IT Essentials v5.0
  • Packet Tracer Exam
  • Uncategorized

CCNAEXAM.NET

CCNA v7.0 Full Exam Answers 2021
Copyright © 2022 CCNAEXAM.NET
By ccnaexam.net

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh