new study set
DNS
resolves Internet names to IP addresses
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command
the status of the switch interfaces and the address configured on interface vlan 1
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
phishing
Which solution allows external users to access only an internal FTP server on a private network
port forwarding
Convert the following Decimal into hexadecimal: 941
0x3AD
What is the Subnet ID for the network 192.168.15.145 255.255.255.240
192.168.15.144
What is the broadcast address for the network 192.168.15.220 /30
192.168.15.223
You have a prefix length of /17. What is your custom subnet mask
255.255.128.0
What is the delay in the amount of time for data to travel between two points on a network
latency
When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used
logical topology diagram
You have a network with a custom subnet mask of 255.255.255.224. How many usable IP addresses are available
30
You have a network with a custom subnet mask of 255.255.255.192. How many usable IP addresses are available
62
Convert the following binary into decimal notation: 1010101
85
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption (Choose two.)
EMI & RFI
Which two actions improve security on a wireless network (Choose two.)
Enable MAC filtering, Enable WEP
Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up
IOS image file, startup configuration
Which two statements are correct about IPv4 and IPv6 addresses
IPv4 addresses are 32 bits in length, IPv6 addresses are represented by hexadecimal numbers
What is an inherent security vulnerability of SSID broadcasting
It broadcasts the identity of the network.
SSH
It is a network protocol that provides a secure way for two computers to connect remotely. It is used to establish a secure connection between a client and a server, allowing the client to execute commands on the server as if they were sitting right in front of it
A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used
NFC
What happens when the transport input ssh command is entered on the switch vty lines
Only SSH is allowed on the switch for remote access.
A network administrator needs to keep the user name, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen
SSH
What will happen if the default gateway address is incorrectly configured on a host
The host cannot communicate with hosts in other networks.
If the default gateway is configured incorrectly on a host, what is the impact on communications
The host is unable to communicate with hosts on remote networks.
An IPv6 address can have a prefix length that ranges from 0 to 128
True
What are two features of protocols used within the TCP/IP protocol stack
UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated. TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time.
What are three types of IPv6 communication methods
Unicast, Multicast, Anycast
Which interface is the default SVI on a Cisco switch
VLAN 1
What type of technology converts analog voice signals into digital data
VoIP
What is the effect of setting the security mode to WEP on a small wireless router
Weak security
Which type of wireless communication is based on 802.11 standards
Wi-Fi
What is the primary means for mitigating virus and Trojan horse attacks
antivirus software
DHCP
automatically configures hosts with IP addressess
A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices
wireless router