You are on page 1of 3

Final Exam Study Guide CCNA 4 Rev 4

1. DHCP
a. What does the command ip dhcp excluded-address do? (7.1.4)

b. Given a set of dhcp commands, be able to answer questions about the setup i. What requests will be answered? (7.1.4) ii. What is the gateways address? (7.1.4) iii. Is the pool of addresses correct for the given setup (is the pool and the Ethernet interface on the same subnet)? (7.1.8) iv. Check interface addresses to make sure they are in the same subnet as the LAN they are attached to. (7.1.4) 2. RIPng a. If using IPv4 and IPv6 dual stack routers, what do you have to do to make sure RIPng works? (7.3.6) 3. NAT a. Be able to identify source/destination addresses of a ping given inside local, inside global, outside local, and outside global addresses when using NAT overload. (7.2.2) 4. WAN general information a. Define demarcation point (2.1.3) b. Know the roles of CSU/DSU, modem, what is at DCE device, DTE device, and where they are located. (1.2.2) c. What technologies use frame switch devices? (1.2.2) d. Which device encodes data for transmitting across the ISP transmission link? (2.1.4) e. What advantages do dedicated leased lines have over frame-relay? (1.3.2) f. If 2 customers of an ISP have identical plans using DSL, why would one of them have higher download speeds than the other? (6.2.3) g. What are the characteristics of DSL technology? (6.2.3) 5. PPP
a. Be able to troubleshoot a ppp configuration (check usernames, passwords,

and encapsulation types, authentication (pap & chap). (2.4.5) b. Which type of authentication is more secure (pap or chap) (2.4.1, 2.4.3) 6. Troubleshooting a. What encapsulation type must be using when connecting Cisco and nonCisco routers? (2.1.7)
b. Be able to do general troubleshooting checking that IP addresses are in

the same subnet, subnet masks are OK, gateway is in same subnet as LAN,

which interfaces are passive (which means they are getting updates), etc. (8.4.4) (8.5.2) c. Pay attention to physical layer troubleshooting if cable is plugged in, line is up, protocol is up, but you cant ping the interface, what layer is giving you problems? (8.4.4) (8.4.6) d. What are the types of interface and status of the links if your router ISNT the one providing clocking, and your serial line is UP, but the remote router is NOT activated? (2.1.7) e. What layer of OSI mode does remote-procedure call failure occur? (8.4.6) f. If a line is showing up, down what layer should you troubleshoot first? (8.5.3)
g. Given an EIGRP set up using key-strings be able to look at commands and

find why 2 routers cant communicate (passwords MUST match, IP addresses must be in same subnet, eigrp process ids must match, etc.) (4.3.2) 7. Frame-Relay a. You will be given various results of SHOW INTERFACE serial0/0 commands, be able to troubleshoot problems (encapsulation types, IP addresses, cable types, encapsulation failures, etc.) (8.4.3) b. What DLCI gets put in the header of a frame as it travels (sending or receiving)? (3.1.3) c. When should you use a static map in frame-relay? (3.1.5) d. Make sure you know how to successfully set up frame-relay..especially look at the frame-relay map command (and what to do between cisco and noncisco routers) (3.1.5)
e. Be able to interpret the output of show frame-relay pvc command. Pay

close attention to FECN, BECN, and DE bits to determine if there is congestion on the link. (3.3.3) f. Know how to set up frame-relay point-to-point sub-interfaces. It gives you a partial set-up and asks you to choose the commands to complete it. You should make sure you set the correct IP address on the sub-interface, and set up the correct DLCI on the sub-interface. (3.4.1) g. How does a router know how to identify the correct VC to forward a message. (Inverse ARP and static mappings!) (3.1.5) h. What are the functions of LMI in frame relay networks? (3.1.5) 8. VPN a. When traffic is going thru the VPN tunnel, know, at various spots in the topology, what the source and destination IP addresses would be. (6.3.5) 9. Security a. What are the major characteristics of a worm? (4.1.3) b. What does it mean to run the Cisco SDM one-step lockdown on a router? (4.4.6)

c. Make sure you know the basic commands to set up the ability to run SDM

on a router. Make sure the VTY lines are set up correctly, password is correct, privilege level is set at 15, ip http server, ip http secure-server are used, etc. (4.4.2)
d. Security policies should create a basis for legal action, if necessary; define

a process for managing security violations; defines acceptable/unacceptable uses of company resources. There are others as well. Look up this information. (4.1.6)
e. If you issue the command no password on a vty line, what effectively

have you done? (4.2.4) 10. ACLs


a. Know how to interpret ACL statements. What is being permitted or denied!

(5.3.4) (5.1.4) b. What is the effect of 0 (zero) and 1(one) in a wildcard mask? (5.2.3) c. What happens in NAMED ACLs if you think you are creating a new ACL and give it a name of one that already exists? What will happen with the statements? (5.2.8) d. Know WHERE to apply ACLs. You will be given scenarios and asked where to apply and in what direction. You can figure it out. Just remember standard close to the destination, extended close to the source. But you have to consider other traffic. Make sure you dont put it somewhere that will block something that shouldnt be blocked! (5.1.8) e. Pay attention to the ORDER of ACL statements. Make sure they go from specific to general. (5.4.5) f. Which is the IMPLIED statement at the end of ALL ACLs? (5.1.4) g. What type of ACL can be used to force a user to authenticate to the ROUTER BEFORE accessing a network? (5.4.2) 11. Misc information a. When setting up a TFTP session for backing up config and IOS files, make sure that the Router/switch can ping the TFTP server. Make sure there is a route that the network it is on in the routing table. (4.5.3) b. If you can ping your email server, and DNS successfully can attach a DNS name to the IP address, but you ARE NOT getting email, what OSI layer is the problem most likely found? (8.4.6)
c. When analyzing baseline data, what kind of things can you compare and

not compare? (8.1.3)

You might also like