I have taken CCNA (Cisco Certified Networking Academy) 4 Exploration Final Exam on 15 February 2012. So i would like to share some of the questions and answers. CCNA 4 Final Exam formally known as EWAN Final Exam CCNA 4 Exploration Accessing the WAN.
I try searching on Google for the answers for CCNA 4 Final Exam and some of the questions has been answered by other website. However, please note that the the answers given is not 100% correct. So in this post, i just want share answers that i change to improve the percentage mark and also new and rare questions which appear in my EWAN Final Exam.
Firstly, please refer to these 2 pages:
CCNA 4 Final Exam 2011 (percentage: 90%)
Both of the pages have collection most of the EWAN Final Exam questions. If you can’t find your questions in the sources above or you think some of the answers are incorrect, please refer below.
Below are the new questions which appear in my EWAN Final Exam questions and my answers .
Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?
A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remote office. How can the system administrator configure the router to provide Internet access to all ten users at the same time?
Configure dynamic NAT with overload
What does an access control list determine when used with NAT on a Cisco router?
Addresses that are to be translated
An administrator issues the command show interfaces s0/1/0 on a router that is configured for Frame Relay. Which console output may indicate an LMI mismatch?
Serial0/1/0 is up, line protocol is down
Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?
On checking the configuration, the administrator notices that the password is displayed as plain text. What configuration method can be used to encrypt the password with the MD5 hash algorithm?
The service password-encryption command
While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows “up, line protocol up”. The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?
Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices?
What are three important reasons to establish a network baseline? (Choose three.)
To determine the time it takes for the network to self recover from a failure (mark wrong by Greg)
To determine which areas in the network are underutilized or overutilized
To determine the performance of the network during the normal hours of operation
To determine what thresholds should be set for the devices that need to be monitored
A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology?
frame-relay interface-dlci 301 on Serial 0/0/0.1
frame-relay interface-dlci 302 on Serial 0/0/0.2
Frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1 (mark wrong by Greg)
Frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2 (mark wrong by Greg)
Two functions are provided by the NCP during a PPP connection?
Providing multilink capabilities over the PPP link
Bringing the network layer protocol or protocols up and down
Refer to the exhibit. Which VLAN will carry untagged traffic on FastEthernet 0/1?
A network administrator is instructing a technician on best practices for applying ACLs. Which two suggestions should the administrator provide? (Choose two.)
Place standard ACLs as close to the destination as possible.
Extended ACLs should be applied closest to the source that is specified by the ACL.
What is an accurate description of CHAP when used with PPP on a serial connection between two routers?
A challenge message is sent to the peer router, which responds with its username and a calculated value based on a shared secret. This value is then compared by the challenger to its own calculations.
Which three statements accurately describe a security policy? (Choose three.)
It creates a basis for legal action if necessary.
It defines a process for managing security violations.
It defines acceptable and unacceptable use of network resources.
Which wireless solution can provide mobile users with non line-of-sight broadband Internet access at speeds comparable to DSL or cable?
A company is deciding which WAN connection type it should implement between its main office and branch offices. The company wants to use a cost-effective service that provides virtual circuits between each office. The company also wants to be able to transmit variable-length packets on these circuits. Which solution best meets these requirements?
That’s all. After answering according to the two sources i provided above and the new questions, my percentage increase to 95.1%.
I believe the Cisco has more collection of questions. If you have any other new questions which appear in your EWAN Final Exam, please share with us. If u think some of the answers above are wrong and you have better answer, please comment below.
Wish you good luck in your CCNA 4 Final Exam and hopefully you will get 100%.