Module 1-3 exam review
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
(config)#service password-encryption
Statement that describes the use of powerline networking technologies
A device connects to an existing home LAN using an adapter and an existing electrical outlet
What is te problem that is displayed in this exhibit "Invalid input detected at 'up arrow' marker.
The administrator must first enter privileged exec mode before issuing the command
?
provides context sensitive help
Up arrow
scrolls backwards through previously entered commands
What type of traffic requires QOS
video conferencing
What is the ip address of the switch virtual interface on switch0
192.168.5.10
What is an advantage of network devices using open standard protocols
A client host and a server running different operating systems cab successfully exchange data
in the show running-config command which part of the syntax is represented by running-config
A keyword
Tab
Completes the remainder of a partially typed command or keyword
Three application layers protocols are part of the TCP IP protocol suite
DNS,DTP,DHCP
A web client is receiving a response for a web page web server from the perspective of the client what is the correct order of the protocol stack that is used to decode the recieved transmission
Ethernet,IP,TCP,HTP
For the TCP/IP protocol suite, what is the correct order of events when a Telnet message is being prepared to be sent over the network?
First Telnet formated data is provided to the next layer second The TCP header is added third the ip header is added fourth the ethernet header is added
The PDU format that is used when bits are received from the network medium by the NIC of a host
Frame
A user is implementing security on a small office network which two actions would provide the minimum security requirement for this network
Installing antivirus software implementing a firewall.
At which layer of the OSI model would a logical adress be added during encapsulation
Network layer
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords.
Privileged EXEC mode console interface VTY interface
Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?
Response timeout
This device performs the function of determining the path that ,messages should take through interworks
Router
How is SSH different from Telnet?
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
what is the technician configuring
SVI
Statement that accurately describes a TCP/IP encapsulation process when a PC is sending data to the network
Segments are sent from the transport layer to the internet layer
What are the two characteristics of Ram on a cisco device
The contents of RAM are lost during a power cycle The configuration that is actively running on the device is stored on ram
Order of the IOS configuration modes
User exec mode first privileged exec mode second global configuration mode third line configuration mode finale mode
Ctrl-shift-6
aborts commands such as trace and ping
Privileged EXEC Mode
accessed by entering the enable command identified by a prompt ending with the # character
Global Configuration Mode
changes made affect the operation of the device as a whole accessed by entering the configure terminal command
spacebar
displays the next screen
Which command or key combination allows a user to return to the previous level in the command hierarchy?
exit
What layer is responsible for routing messages through an internetwork in the TCP/IP model?
internet
User EXEC mode
limited number of basic monitoring commands the first entrance into the CLI of an IOS device
If the administrator uses a console connection to connect the switch which password is needed to access user exec mode
lineconen
What term describes a network where one computer can be both client and server
peer to peer
The two OSI model layers have the same functionality layers as a single layer of the tcp/ip model
physical and data link
Why would a layer 2 switch need an ip address
to enable the switch to be managed remotely
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?
to interrupt the ping process
Which OSI layer is a source port number added to a PDU during the encapsulation process
transportation layer