This task requires you to access the cisco Unified Communication 500 Series GUI to configure it per the given requirements as stated in the scenario. From the choices on the left you…
Category: CCNA
Routing and Switching,Security,Voice,Wireless
CCNA 640-802 5-Minute Quiz – Day1
Recently, i have released the CCNA 640-802 Bible Series. All the actual questions with explanation, it’s easy to master the knowledge. Now, i will release the 5 Minute Quiz series, you can…
CCNA 640-802 Bible – Configure and Verify a Basic WAN Serial Connection
1. Refer to the exhibit. The network administrator must complete the connection between the RTA of the XYZ Company and the service provider. To accomplish this task, which two devices could be…
CCNA 640-802 Bible – Configure and Troubleshoot NAT
1. What is the function of the Cisco IOS command ip nat inside source static 10.1.1.5 172.35.16.5? A: It creates a global address pool for all outside NAT transactions. B: It establishes…
Bible – CCNA Study Material
1. CiscoPress Material AND Cisco Network Academy It could be argued that everything you need is available right here. These are the books that I used. I have not had the opportunity…
CCNA 640-802 Bible – Configure and Apply an ACLs to Limit Telnet and SSH
1. Unauthorized users have used Telnet to gain access to a company router. The network administrator wants to configure and apply an access list to allow Telnet access to the router, but…
Many Resources for CCNA study
Cisco Certified Network Associate (CCNA®) validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA…
CCNA Security (IINS) Online Practice
Use the following resources to help you prepare for your exam. These tools are meant to supplement your learning experience and exam preparation. Login to access these items. The following review questions…
CCNA 640-802 Bible – Configure and Apply ACLs Based on Network Filtering
1. Refer to the graphic. It has been decided that Workstation 1 should be denied access to Server1. Which of the following commands are required to prevent only Workstation 1 from accessing…