25b test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which two ports can I use to configure my cisco router?

- Console - AUX

When troubleshooting network prob where would you find the configuration info such as the computer name and ip address that are being used?

logical topology diagram

A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?

the status of the switch interfaces and the address configured on interface vlan 1

What are the 3 types of IPV6 communications?

Multicast Unicast, Anycast, Multicast

A customer places a smartphone near a terminal to pay, what was used?

NFC

192.168.15.145 255.255.255.240 What is the Net ID?

Net ID: 192.168.15.144

At which layer of the OSI model would logical addresses be added (IP addresses)

Network Layer

A network administrator notices that newly installed ethernet cables are carrying distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factor may interfere with the copper cabling and result in signal distortion and data corruption

- EMI - RFI

WHich two actions improves security on a wireless network?

- Enable WEP - Enable MAC filtering

What are two common physical layer connectivity issues?

- Ethernet cable plugged wrong port - A faulty ethernet cable

A network admin is designing a layout of a new wireless network. Which three should be accounted for when building a wireless network?

- Interface - Coverage area - Security

Which two statements are correct about an IPV4 abd IPV6 addresses?

- Ipv6 are represented by a hexadecimal number - Ipv4 32 bits

What are two features of the TCP and UDP

- TCP reliability sends packets in sections and confirms delivery - UDP best effort and unreliable send packets

While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network?

-POP3 -SMTP -IMAP4

Convert 941 to Hexa

0X3AD

192.168.15.220 /30 What is my broadcast?

192.168.15.223

What is the subnet mask of /17

255.255.128.0

Convert the following hexadecimal into decimal: XBAD

2989

Custom subnet mask 255.255.255.224. How many usable IP addresses are available?

30

255.255.255.192 How many usable IP addresses are available?

62

Convert the following to decimal: 1010101

85

Convert the following ipv6 address into the most compressed form 0000:0000.0000.000D:3440:00BD:CADE:55C0

::D:3440:BD:CADE:55C0

What is the primary means for mitigating virus and trojan horse attacks?

Antivirus Software

What happens when the transport input ssh command is entered on the switch vty lines?

Communication between the switch and remote users is encrypted.

Which two criteria are used to help select a network medium for a network?

Distance the selected medium can successfully carry a signal The environment where the selected medium is to be installed

An IPv6 address can have a prefix length that ranges from 0 to 128

False

Which two files if found are copied into RAM as a router with the default configuration register setting boots up

IOS image file startup configuration

A student is uploading a file from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the device?

Internet

What is the purpose of a DMZ?

It allow external host to access specific company server

What is the effect of setting the security mode to WEP on a small wireless router?

It encrypts data between the wireless client and the access point

What is the delay in the amount of time it takes for data to transfer?

Latency

IPv6 addresses that are used for communicating on the same LAN or between a limited number of sires are known as?

Link-Local addresses

What is a feature that can be used by an admin to prevent unauthorized users from connecting to a wireless access point?

MAC filtering

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

Phishing

Which protocol port allows external users to access an internal FTP server

Port 40

A network admin needs to keep username and password in session private when establishing a remote cli connectivity?

SSH

What type of cable connection is used in package Tracer PC to Switch

Straight through cable

What would happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts in other networks.

Which network migration technique encapsulates ipv6 packets inside ipv4 packets to carry them over ipv4 network infrastructure?

Tunneling

Which interface is the default SVI on a Cisco switch?

VLAN 1

Which type of device must the user have to provide wireless access to multiple devices

Wireless router

What will happen if the default gateway address is incorrectly configured on a host?

You can connect internally with local devices but not with remote devices

What is required for a network administrator to perform out of band management tasks on a Cisco device?

a computer directly connected to the console port of the device

What would a technician require in order to install a hypervisor on a client machine?

virtualization software

Which type of wireless communication is based on 802.11

wifi


Kaugnay na mga set ng pag-aaral

Marketing - McManus Exam 3 - Test Questions

View Set

Article 1 Lexile A Article and Quiz

View Set

Life Elementary 4B Free Time at Work p.48-49

View Set

8 Steps of Policy Making Intro to Public Policy

View Set

MUSICOL 121: Chapter 17 - Chopin's Piano

View Set