CISCO CCNA 1 v6 - Chapter 11

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which statement is true about Cisco IOS ping indicators?​

'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.

Which process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5?

DHCP

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

ICMP

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

NOT SURE ! - RouterA(config)# login block-for 30 attempts 2 within 10

Fill in the blank. Network services use __________________ to define a set of rules that govern how devices communicate and the data formats used in a network.

Protocols

Refer to the exhibit. The exhibited configuration is entered by a network administrator into a new router. Sometime later a network technician proceeds to log in to the router via a console connection. The technician enters techadmin as the user name and tries a password of 63t0ut0fh3r3!. What will be the result of this action?

The router will display the DT_ATC_RS3> prompt.

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

console ports; vty ports

How should traffic flow be captured in order to best understand traffic patterns in a network?

during peak utilization times

What is one of the most effective security tools available for protecting users from external threats?

firewalls

Match the type of threat with the cause. (Not all options are used.)

hardware threats -> physical damage to servers, routers, switches, cabling plant, and workstations environmental threats -> temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry) electrical threats -> voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss maintenance threats -> poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /displaydns

Which element of scaling a network involves identifying the physical and logical topologies?

network documentation

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

show file systems

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5

What type of traffic would most likely have the highest priority through the network?

voice


Kaugnay na mga set ng pag-aaral

Conceptual Physics study guide modules 5,6,7,1

View Set

Lektion 13 - wann, wenn oder als? (Grammatik)

View Set

Conceptual Physical Science Final Exam: Chapter 28: The Structure of Space and Time

View Set

GENERAL MATHEMATICS LESSON, SS1 ,WEEK ONE:ALGEBRAIC PROCESSES AND EXPRESSIONS.

View Set

Chapter 9 Muscles of the Trunk and Extremities

View Set