pt2v

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which network service automatically assigns IP addresses to devices on the network?

DHCP

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

By following a structured troubleshooting approach, a network administrator identified a network issue after a conversation with the user. What is the next step that the administrator should take?

Establish a theory of probable causes.

An administrator decides to use "pR3s!d7n&0" as the password on a newly installed router. Which statement applies to the password choice?

It is strong because it uses a minimum of 10 numbers, letters and special characters.

An administrator decides to use "WhatAreyouwaiting4" as the password on a newly installed router. Which statement applies to the password choice?

It is strong because it uses a passphrase.

A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?

SSH

An employee complains that a Windows PC cannot connect to the Internet. A network technician issues the ipconfig command on the PC and is shown an IP address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.)

The PC cannot contact a DHCP server. The PC is configured to obtain an IP address automatically.

What is a characteristic of UDP?

UDP reassembles the received datagrams in the order they were received.

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

console ports vty ports

A student wants to save a router configuration to NVRAM. What is the best command to use to accomplish the task?

copy running-config startup-config

A teacher is having difficulties connecting his PC to the classroom network. He needs to verify that a default gateway is configured correctly. What is the best command to use to accomplish the task?

ipconfig

A user wants to know the IP address of the PC. What is the best command to use to accomplish the task?

ipconfig

A support technician needs to know the IP address of the wireless interface on a MAC. What is the best command to use to accomplish the task?

ipconfig getifaddr en0

An administrator is troubleshooting connectivity issues and needs to determine the IP address of a website. What is the best command to use to accomplish the task?

nslookup

Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is?

nslookup

Students who are connected to the same switch are having slower than normal response times. The administrator suspects a duplex setting issue. What is the best command to use to accomplish the task?

show interfaces

A network technician is troubleshooting an issue and needs to verify the IP addresses of all interfaces on a router. What is the best command to use to accomplish the task?

show ip interface brief

Which command can an administrator execute to determine what interface a router will use to reach remote networks?

show ip route

A network technician is troubleshooting an issue and needs to verify all of the IPv6 interface addresses on a router. What is the best command to use to accomplish the task?

show ipv6 interface

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task?

show running-config

PACKET TRACER

transport input ssh

An administrator decides to use "5$7*4#033!" as the password on a newly installed router. Which statement applies to the password choice?

It is strong because it contains 10 numbers and special characters.

Which statement describes the ping and tracert commands?

Tracert shows each hop, while ping shows a destination reply only.

When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)

Generate the asymmetric RSA keys. Configure the correct IP domain name. Create a valid local username and password database.


Conjuntos de estudio relacionados

Disaster Recovery & Incident Response

View Set

Cooper Morality, Black History Month Test

View Set

Chapter 3: Tax Planning Strategies and Related Limitations

View Set

Intro to Nonprofit Organizations

View Set

MN Rules & Regulations Re: Life Insurance

View Set

Unit 2 Review: Logarithmic and Exponential Equations

View Set

CHapter 4 Genetics and Cellular Function

View Set