Midterm Exam CET2600

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of access is secured on a Cisco router or switch with the enable secret command? console line privileged EXEC virtual terminal AUX port

privileged EXEC

Which two devices are intermediary devices? (Choose two) routers servers switches hosts

routers switches

Which feature is being used when connecting a device to the network using an electrical outlet? Smart home technology Powerline Wireless broadband

Powerline

Which IOS mode allows access to all commands and features? Interface subconfiguration mode Privileged EXEC mode User EXEC mode Global configuration mode Line console subconfiguration mode

Privileged EXEC mode

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Console

Console

What is the process of converting information into the proper form for transmission? Formatting Encapsulation Encoding

Encoding

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? Extranet Intranet WAN LAN

LAN

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? Scalability Security QoS fault tolerance

Scalability

What are two functions of end devices on a network? (Choose two.) They filter the flow of data to enhance security. They direct data over alternate paths in the event of link failures. They originate the data that flows through the network. They provide the channel over which the network message travels. They are the interface between humans and the coummincations network.

They originate the data that flows through the network. They are the interface between humans and the coummincations network.

Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Virus, worm, or Trojan horse Denial of Service (DoS) zero-day or Zero-hour Firewall Virtual Private Network (VPN)

Zero-day or Zero-hour

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? Pysical topology Logical topology

logical topology

Which command encrypts all plaintext passwords access on a switch? service password-encryption enable secret secret login

service password-encryption

What type of interface has no physical port associated with it? switch virtual interface (SVI) console serial Ethernet

switch virtual interface (SVI)


Ensembles d'études connexes

Chapter 31: Concepts of Care for Patients With Dysrhythmias

View Set

Chapter 4 - Behavior Therapy and Integrated Psychopharmacology

View Set

Economics- Chapter 21- Protectionism

View Set

CSET S1 (World History Constructed Response)

View Set