Cisco 161-160 V2 final exam Set 5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? (config)# enable password secret (config)# enable secret Encrypted_Password (config-line)# password secret (config)# enable secret Secret_Password (config)# service password-encryption

(config)# service password-encryption

Which scenario describes a peer-to-peer network? Users access shared files from a file server. A user visits a webpage on the company web site. A user has shared a printer attached to the workstation. Users print documents from a network printer that has a built-in NIC.

A user has shared a printer attached to the workstation.

Which logical binary operation is used by a network device to determine the network portion of an IPv4 address with a specified subnet mask? AND OR EQUAL NOT

AND

Which memory location on a Cisco router or switch stores the startup configuration file? ROM RAM flash NVRAM

NVRAM

What is the first step that a switch performs during the bootup sequence? Low-level CPU initialization begins. POST is initiated. The default IOS image is loaded. The boot loader is loaded.

POST is initiated.

Which memory location on a Cisco router or switch will lose all content when the device is restarted? ROM NVRAM RAM flash

RAM

A network engineer working at a community building that provides free WiFi is holding an IT conference tomorrow evening. A previous conference with over 100 attendees just ended less than 24 hours ago and the network engineer is concerned about the availability of dynamic addressing. How will the network engineer ensure that there are enough IP addresses for the attendees arriving at the IT conference tomorrow? The network engineer will create a new pool of IP addresses and provide a new network subnet and router configuration for the conference. The network engineer will manually release each lease created by the conference attendees yesterday and statically assign the incoming devices at the conference. The network engineer will disconnect all devices using an IP address from the DHCP server in preparation for the conference. The network engineer will verify that the DHCP leasing time is set for a couple of hours.

The network engineer will verify that the DHCP leasing time is set for a couple of hours.

Which statement describes the relationship of a physical network and logical IPv4 addressed networks? All devices connected to a physical network need to belong to the same IPv4 logical network. A physical network can connect multiple devices of different IPv4 logical networks. End devices on different IPv4 logical networks can communicate with each other if they all connect to the same switch. A local physical network supports one IPv4 logical network.

All devices connected to a physical network need to belong to the same IPv4 logical network.

What is the difference between the terms bandwidth and throughput? Bandwidth represents the data transfer rate in a local network and throughput represents the data transfer rate over the Internet. Bandwidth is the capacity of data transfer in a network and throughput is the actual data transfer rate. Bandwidth measures data transfer of web applications and throughput measures data transfer of video applications. Bandwidth is measured with Mb/s and throughput is measured in Kbps.

Bandwidth is the capacity of data transfer in a network and throughput is the actual data transfer rate.

A DHCP configured PC boots up. What is the order of the messages that are sent and received by this PC in order to obtain an appropriate IP address? DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK​ DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK​ DHCPOFFER, DHCPDISCOVER, DHCPREQUEST, DHCPACK​ DHCPREQUEST, DHCPOFFER, DHCPDISCOVER, DHCPACK​

DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK​

When a wireless router is being configured for the first time, what type of wired connection is used? Ethernet patch cable telephone cable console cable modem cable

Ethernet patch cable

How are port numbers used in the TCP/IP encapsulation process? Source port numbers and destination port numbers are not necessary when UDP is the transport layer protocol being used for the communication. Destination port numbers are assigned automatically and cannot be changed. If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations. Source port and destination port numbers are randomly generated.

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

A medium-sized company uses APs, WLCs, and laptops for employee workstations. An employee reports the inability to connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are two possible reasons for the problem? (Choose two.) A default gateway is improperly configured on the AP. A bad cable exists between the client and the WLC. The workstation is out of range. The AP does not have power. The wireless client is not configured for DHCP.

The workstation is out of range. The wireless client is not configured for DHCP.

Which statement is correct about network protocols? They define how messages are exchanged between the source and the destination. Network protocols define the type of hardware that is used and how it is mounted in racks. They all function in the network access layer of TCP/IP. They are only required for exchange of messages between devices on remote networks.

They define how messages are exchanged between the source and the destination.

What are two ways to protect a computer from malware? (Choose two.) Empty the browser cache. Defragment the hard disk. Delete unused software. Use antivirus software. Keep software up to date.

Use antivirus software. Keep software up to date.

What data representation is used when a computer or network device is processing data? binary readable text inferred

binary

A router receives an incoming packet and cannot determine where to forward it. What will the router do? save it until a usable path is installed send it back to the source host drop it broadcast it to directly attached networks

drop it

Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network? MAC address filtering encryption authentication traffic filtering

encryption

A network technician is extending the network from the main office building over several hundred meters to a new security station. The security station needs a high speed connection to support video surveillance of the main building. What type of cable is best suited to connect the security station to the rest of the main office network? unshielded twisted pair fiber optic shielded twisted pair coax

fiber optic

A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices? addresses from different subnets for redundancy random static addresses to improve security predictable static IP addresses for easier identification dynamic addresses to reduce the probability of duplicate addresses

predictable static IP addresses for easier identification

A student is sending files from a phone to a computer across a network. Which layer of the TCP/IP model is responsible for reassembling these messages as they are received on the computer? application transport Internet network access

transport


Kaugnay na mga set ng pag-aaral

MIS304 Exam 2, all available practice questions (book, in-class review, quizzes)

View Set

OB: Chapter 14 Nursing Management During Labor and Birth

View Set

Musculoskeletal Injuries (Fractures)

View Set

Reading and Quiz: Fluid and Electrolytes

View Set

R4 Professional Responsibilities and Federal Tax Procedures

View Set