cisco quiz 9-11
Which statement is true about Cisco IOS ping indicators
'.' may indicate that the ping was blocked by a firewall.
What are the two WEP key lengths
64 bit and 128 bit
A user reboots a PC which has been configured to dynamically receive an IPv4 address from a DHCP server. In which order do the DHCP message transactions between the client and server occur?
DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK
What is true about a peer-to-peer network
Each device can function as a server and a client.
A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
Ensure the correct cable is used. Ensure the link status LED on the integrated router is lit.
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?
Have a second router that is connected to another ISP
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business
IMAP
What is an advantage of subnetting a network
It contains broadcast traffic within its subnet
Which two definitions accurately describe the associated application layer protocol (choose 2)
Telnet - provides remote access to servers and networking devices DNS - resolves Internet names to IP addresses
Which statement is true about FTP
The client can download data from or upload data to the server
While downloading an IOS image from a TFTP server, an administrator sees long strings of exclamation marks (!) output to the console. What does this mean
The transfer is working
Which statement is true about peer-to-peer applications
They require each end device to provide a user interface and run a background service.
Which type of malware will disguise itself as a legitimate program and execute its malicious code once the program is run
Trojan
Which domain name would be an example of a top-level domain
com
On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)
console ports, vty port
What is an advantage of using a deterministic IP addressing scheme
controlling access to devices by IP address
What is the main reason that a network administrator would use VLSM
efficient use of address space
Which two devices do not require an IP address in order to operate on a network
hubs and switches
Which two tasks are the responsibility of the local DNS server
mapping name-to-IP addresses for internal hosts -forwarding name resolution requests between servers
Which OSI layer is concerned with formatting data such as GIF and JPEG graphic images
presentation layer
An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?
show file systems
What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command
the IP address of the neighbor
Which two types of device are typically assigned with static IP addresses?
web servers, printers