CCNA 4 Final 2 V4.0
1. A technician has been asked to run Cisco SDM one-step lockdown on the router of
a customer. What will be the result of this process?
Traffic is only forwarded from SDM-trusted Cisco routers.
Security testing is performed and the results are saved as a text file stored in
**The router is tested for potential security problems and any necessary changes are
All traffic entering the router is quarantined and checked for viruses before being
2. Refer to the exhibit. A network administrator is trying to configure a router to use
SDM but it is not functioning correctly. What could be the problem?
The username and password are not configured correctly.
The authentication method is not configured correctly.
The HTTP timeout policy is not configured correctly.
**The vtys are not configured correctly.
3. Refer to the exhibit. How is the TCP/IP configuration information specified by the
default-router and dns-server commands made available?
The TCP/IP information is forwarded to a 10.0.1.3 to be supplied to DHCP clients.
**The TCP/IP information is used by DHCP clients that are configured to request a
configuration from R1.
The TCP/IP information is supplied to any DHCP client on the network connected to
the FastEthernet 0/0 interface of R1.
The TCP/IP information is applied to each packet that enters R1 through the
FastEthernet 0/0 interface that are hosts on the 10.0.1.0 /24 network except packets
from addresses 10.0.1.2, 10.0.1.16, and 10.0.1.254.
4. What is a major characteristic of a worm?
malicious software that copies itself into other executable programs
tricks users into running the infected software
a set of computer instructions that lies dormant until triggered by a specific event
**exploits vulnerabilities with the intent of propagating itself across a network
5. Refer to the exhibit. What can be concluded from the exhibited outpu