cisco quiz 9-11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which statement is true about Cisco IOS ping indicators

'.' may indicate that the ping was blocked by a firewall.

What are the two WEP key lengths

64 bit and 128 bit

A user reboots a PC which has been configured to dynamically receive an IPv4 address from a DHCP server. In which order do the DHCP message transactions between the client and server occur?

DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK

What is true about a peer-to-peer network

Each device can function as a server and a client.

A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)

Ensure the correct cable is used. Ensure the link status LED on the integrated router is lit.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business

IMAP

What is an advantage of subnetting a network

It contains broadcast traffic within its subnet

Which two definitions accurately describe the associated application layer protocol (choose 2)

Telnet - provides remote access to servers and networking devices DNS - resolves Internet names to IP addresses

Which statement is true about FTP

The client can download data from or upload data to the server

While downloading an IOS image from a TFTP server, an administrator sees long strings of exclamation marks (!) output to the console. What does this mean

The transfer is working

Which statement is true about peer-to-peer applications

They require each end device to provide a user interface and run a background service.

Which type of malware will disguise itself as a legitimate program and execute its malicious code once the program is run

Trojan

Which domain name would be an example of a top-level domain

com

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

console ports, vty port

What is an advantage of using a deterministic IP addressing scheme

controlling access to devices by IP address

What is the main reason that a network administrator would use VLSM

efficient use of address space

Which two devices do not require an IP address in order to operate on a network

hubs and switches

Which two tasks are the responsibility of the local DNS server

mapping name-to-IP addresses for internal hosts -forwarding name resolution requests between servers

Which OSI layer is concerned with formatting data such as GIF and JPEG graphic images

presentation layer

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

show file systems

What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command

the IP address of the neighbor

Which two types of device are typically assigned with static IP addresses?

web servers, printers


Ensembles d'études connexes

Chapter 44: Assessment of the Urinary System

View Set

BUS 260 BUSINESS COMMUNICATION MINE

View Set

Chapter 1 Abnormal Psychology: Past and Present

View Set

Databases - Test 2, Quiz 3 - SQL

View Set