Pt. 7
During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a _______________ message.
Multicast
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored? flash ROM NVRAM RAM the configuration register a TFTP server
NVRAM
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts? stateful packet inspection URL filtering application filtering packet filtering
stateful packet inspection
Which type of UTP cable is used to connect a PC to a switch port? console rollover crossover straight-through
straight-through
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address? DNS server address subnet mask default gateway DHCP server address
subnet mask
What are three characteristics of an SVI? (Choose three.) It is designed as a security protocol to protect switch ports. It is not associated with any physical interface on a switch. It is a special interface that allows connectivity by different types of media. It is required to allow connectivity by any device at any location. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.
It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.
A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdownWhat is the technician configuring? Telnet access SVI password encryption physical switchport access
SVI
Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem? The banner message is too long. The delimiting character appears in the banner message. The symbol "!" signals the end of a banner message. Message-of-the-day banners will only appear when a user logs in through the console port.
The delimiting character appears in the banner message.
A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue? a change in the bandwidth according to the show interfaces output a next-hop timeout from a traceroute an increase in host-to-host ping response times a change in the amount of RAM according to the show version output
an increase in host-to-host ping response times
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose? DSL dialup satellite leased line cable modem
leased line
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users? reliability scalability quality of service accessibility
scalability
What is the process of dividing a data stream into smaller pieces before transmission? segmentation encapsulation encoding flow control
segmentation
A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.) the amount of traffic that is currently crossing the network the sophistication of the encapsulation method applied to the data the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing the bandwidth of the WAN connection to the Internet the reliability of the gigabit Ethernet infrastructure of the backbone
the amount of traffic that is currently crossing the network the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing
In computer communication, what is the purpose of message encoding? to convert information to the appropriate form for transmission to interpret information to break large messages into smaller frames to negotiate correct timing for successful communication
to convert information to the appropriate form for transmission
What is the purpose of having a converged network? to provide high speed connectivity to all end devices to make sure that all types of data packets will be treated equally to achieve fault tolerance and high availability of data network infrastructure devices to reduce the cost of deploying and maintaining the communication infrastructure
to reduce the cost of deploying and maintaining the communication infrastructure