exam 1-3
peer-to-peer
What term describes a network where one computer can be both client and server?
security
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?
SVI (Switch Virtual Interface)
A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?
to interrupt the ping process
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?
an intranet
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
data link layer
At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?
frame
Which PDU format is used when bits are received from the network medium by the NIC of a host?
exit
Which command or key combination allows a user to return to the previous level in the command hierarchy?
a router
Which device performs the function of determining the path that messages should take through internetworks?
the switch virtual interface
Which interface allows remote management of a Layer 2 switch?
response timeout
Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?
segment
Which name is assigned to the transport layer PDU?
Segments are sent from the transport layer to the internet layer.
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
A device connects to an existing home LAN using an adapter and an existing electrical outlet
Which statement describes the use of power line networking technology?
They define how messages are exchanged between the source and the destination.
Which statement is correct about network protocols?
RM-3-Switch-2A4, SwBranch799
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)
Issue the reload command without saving the running configuration.
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
to enable the switch to be managed remotely
Why would a Layer 2 switch need an IP address?
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext
How is SSH different from Telnet?
console interface, VTY interface, privileged EXEC Mode
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
The administrator must first enter privilege EXEC mode before issuing the command.
Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
subnet mask
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
(config)# service password-encryption
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
They are sent to a select group of hosts
What is a characteristic of multicast messages?
A client host and a server running different operating systems can successfully exchange data.
What is an advantage of network devices using open standard protocols?
internet
What layer is responsible for routing messages through an internetwork in the TCP/IP model?