Software and Computer Tips for Everyone

Apr 28, 2009

CCNA4 FINAL 100/100

By on 4:15 AM
1. Refer to the exhibit. A network administrator is trying to configure a router to use SDM. After this configuration shown in the exhibit is applied, the SDM interface...

Cisco ccna v4.0 practice

By on 3:59 AM
var skin = {}; skin['FACE_SIZE'] = '32'; skin['HEIGHT'] = "260"; skin['BORDER_COLOR'] = "FFFFFF"; skin['ENDCAP_BG_COLOR'] = "transparent"; skin['ENDCAP_TEXT_COLOR'] = "333333"; skin['ENDCAP_LINK_COLOR'] = "000000"; skin['ALTERNATE_BG_COLOR'] = "transparent"; skin['CONTENT_BG_COLOR'] = "transparent";...

Apr 26, 2009

CCNA v4 - E4 - Module 8 (100%)

By on 10:42 AM
http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. Excessive broadcasts are generally a symptom of a problem at which layer?  data link2. Refer to the exhibit. Users at Branch B are reporting trouble accessing a...

Apr 18, 2009

CCNA v4 - E4 - Module 7 (100%) -> latest

By on 10:17 AM
http://p4s-ccna.blogspot.comhttp://testccna-4u.blogspot.com1. Refer to the exhibit. IPv6 address 2006:1::1/64 eui-64 has been configured on the router FastEthernet0/0 interface. Which statement accurately describes the EUI-64 identifier configuration? The configuration will derive...

CCNA v4 - E4 - Module 6 (100%)

By on 12:21 AM
http://p4s-ccna.blogspot.comhttp://testccna-4u.blogspot.com1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.) channel widths modulation techniques2. Which is an example of symmetric-key encryption? pre-shared...

Apr 15, 2009

CCNA v4 - E4 - Module 5 (100%)

By on 1:14 PM
http://p4s-ccna.blogspot.comhttp://testccna-4u.blogspot.com1. Refer to the exhibit. What will be the effect of the configuration that is shown?  Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet...

Apr 14, 2009

CCNA v4 - E4 - Module 4 (100%)

By on 7:34 PM
http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. What is the best defense for protecting a network from phishing exploits?  Schedule training for all users.2. What are three characteristics of a good security policy? (Choose...

Apr 12, 2009

NEW CCNA3 FINAL

By on 7:57 PM
http://p4s-ccna.blogspot.comhttp://testccna-4u.blogspot.com 1. Refer to the exhibit. An administrator documented the output of a CAM table from an Ethernet switch as shown. What action will the switch take when it...

Apr 10, 2009

CCNA4 Chapter 7 100%

By on 12:14 AM
CCNA4 Chapter 7 100%.rarDownload here!...

Apr 9, 2009

CCNA v4 - E4 - Module 1 (100%)

By on 11:30 PM
 http://p4s-ccna.blogspot.com    http://testccna-4u.blogspot.com1. Which statement about WAN protocols is correct?  Most WAN protocols use HDLC or a variant of HDLC as a framing mechanism.2. Which statement is true of the functionality of...