CTS 1560 Midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

What security violation would cause the most amount of damage to the life of a home user? A. denial of service to your email server B. replication of worms and viruses in your computer C. capturing of personal data that leads to identity theft D. spyware that leads to spam emails

capturing of personal data that leads to identity theft

Which term describes the state of a network when the demand on the network resources exceeds the availability capacity? A. convergence B. congestion C. optimization D. synchronization

congestion

A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support? A. data integrity B. data quality C. data confidentiality D. data redundancy

data confidentiality

What process is used to place on message inside another message for transport from the source to the destination? A. access control B. decoding C. encapsulation D. flow control

encapsulation

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? A. if the TCP/IP stack is functioning on the PC without putting traffic on the wire B. if there is a connectivity with the destination device C. the path that traffic will take to reach the destination D. what type of device is at the destination

if there is a connectivity with the destination device

Which statement describes a characteristic of cloud computing? A. A business can connect directly to the Internet without the use of an ISP B. Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world C. Devices can connect to the Internet through existing electrical wiring D. Investment in new infrastructure is required in order to access the cloud.

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world

Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network? A. BYOD B. cloud computing C. video conferencing D. powerline networking

BYOD

Which keys act as a hot key combination that is used to interrupt an IOS process? A. Ctrl-Shift-X B. Ctrl-Shift-6 C. Ctrl-Z D Ctrl-C

Ctrl-Shift-6

A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? A. DSL B. dial-up C. satellite D. cell modem

DSL

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators? A. Internet B. Intranet C. Extranet D. Extendednet

Extranet

Which protocol functions at the internet layer? (Choose 1) A. POP B. BOOTP C. IP D. PPP

IP

What command can be used on a Windows PC to see the IP configuration of that computer? A. Ping B. IPconfig C. Show interfaces D. Show ip interface brief

IPconfig

What command can be used ona Windows PC to see the IP configuration of that computer? A. ping B. IPconfig C. show interfaces D. show ip interface brief

IPconfig

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM? A. Issue the reload command without saving the running configuration B. Delete the vlan.dat file and reboot the device C. Close and reopen the terminal emulation software D. Issue the copy startup-config running-config command

Issue the reload command without saving the running configuration

How does the service password-encryption command enhance password security on Cisco routers and switches? A. It encrypts passwords as the are sent across the network B. It encrypts passwords that are stored in router or switch configuration files. C. It requires that a user type encrypted passwords to gain console access to a router or switch It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet

It encrypts passwords that are stored in router or switch configuration files.

What is done to an IP packet before it is transmitted over the physical medium? A. It is tagged with information guaranteeing reliable delivery B. It is segmented into smaller individual pieces C. It is encapsulated into a TCP segment D. It is encapsulated in a Layer 2 frame

It is encapsulated in a Layer 2 frame

What is the Internet? A. It is a network based on Ethernet technology B. It provides network access for mobile devices C. It provides connections through interconnected global networks D. It is a private network for an organization with LAN and WAN connections

It provides connections through interconnected global networks

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? A. Telnet B. Console C. AUX D. SSH

SSH

What is the purpose of the SVI on a Cisco switch? A. The SVI provides a physical interface for remote access to the switch. B. The SCI orivides a faster method for switching traffic between ports on the switch. C. The SVI adds Layer 4 connectivity between VLANs. D. The SVI provides a virtual interface for remote access to the switch.

The SVI provides a virtual interface for remote access to the switch.

Which statement is tru about the TCP/IP and OSI models? A. The TCP/IP transport later and the OSI Layer 4 provide similar services and functions B. the TCP/IP network access layer has similar functions to the OSI network layer C. The OSI Layer 7 and the TCP/IP application layer provide identical functions D. The first three OSI layers describe general services that are also provided by the TCP/IP internet layer

The TCP/IP transport later and the OSI Layer 4 provide similar services and functions

Which statement is correct about network protocols? A. Network protocols define the type of hardware that is used and how it is mounted in racks B. They define how messages are exchanged between the source and the destination C. They function in the network access later of TCP/IP D. They are only required for exchange of messages between devices on remote networks

They define how messages are exchanged between the source and the destination

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? A. This command encrypts passwords as they are transmitted across serial WAN links. B. This command prevents someone from viewing the running configuration passwords. C. This command enables a strong encryption algorithm for the enable secret password command. D. This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

This command prevents someone from viewing the running configuration passwords.

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? A. Use Telnet to remotely access the switch through the network B. Use the console port to locally access the switch from a serial or USB interface of the PC C. Use Secure Shell to remotely access the switch through the network D. Use the AUX port to locally access the switch from a serial or USB interface of the PC

Use the console port to locally access the switch from a serial or USB interface of the PC

Which message delivery option is used when all devices need to receive the same message simultaneously? A. duplex B. unicast C. multicast D. broadcast

broadcast

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? A. Extranet B. the Internet C. an extranet D. a local area network

a local area network

Which expression accurately defines the term bandwidth? A. a method of limiting the impact of a hardware or software failure on the network. B. a measure of the data carrying capacity of the media C. a state where the demand on the network resources exceeds the available capacity D. a set of techniques to manage the utilization of network resources.

a measure of the data carrying capacity of the media

Which device performs the function of determining the path that messages should take through internetworks? A. a router B. a web server C. a DSL modem D. a firewall

a router

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? A. an intranet B. the Internet C. an extranet D. a local area network

an intranet

What PDU is associated with the transport layer? A. segment B. packet C. frame D. bits

segment

Which information does the show startup-config command display? A. the IOS image copied into RAM B. the bootstrap program in the ROM C. the contents of the current running configuration file int he RAM D. the contents of the saved configuration file in the NVRAM

the contents of the saved configuration file in the NVRAM


Conjuntos de estudio relacionados

U.S. History Chapter 14 Section 2 The Movement Gains Ground

View Set

Pharmacology Made Easy 4.0 Infection

View Set

CH 7 - Business-Government Relations

View Set

English Questions for Test 12/20/18

View Set

Chapter 27 The Reproductive System Test (Quiz 9)

View Set

You are a newly trained first aid provider responding at work to a report of someone who has collapsed. Which of the following best describes your role in a medical emergency?

View Set

Задачі для практики

View Set

Chapter 13 Environmental Science Test

View Set