CCNA Chapter 11 (quiz)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which statement is true about Cisco IOS ping indicators?​ a.) '!' indicates that the ping was unsuccessful and that the device may have issues finding a DNS server. b.) 'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful. c.) '.' indicates that the ping was successful but the response time was longer than normal. d.) A combination of '.' and '!' indicates that a router along the path did not have a route to the destination address and responded with an ICMP unreachable message.​

'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.

What is considered the most effective way to mitigate a worm attack? a.) Change system passwords every 30 days b.) Ensure that all systems have the most current virus definitions c.) Ensure that AAA is configured in the network d.) Download security updates from the operating system vendor and patch all vulnerable systems

Download security updates from the operating system vendor and patch all vulnerable systems.

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies? a.) SNMP b.) ICMP c.) Telnet d.) TCP

ICMP

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds? a.) RouterA(config)# login block-for 10 attempts 2 within 30 b.) RouterA(config)# login block-for 30 attempts 2 within 10 c.) RouterA(config)# login block-for 2 attempts 30 within 10 d.) RouterA(config)# login block-for 30 attempts 10 within 2

RouterA(config)# login block-for 30 attempts 2 within 10

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.) a.) Fast Ethernet interfaces b.) console ports c.) serial interfaces d.) vty ports e.) loopback interfaces

console ports vty ports

How should traffic flow be captured in order to best understand traffic patterns in a network? a.) during low utilization times b.) during peak utilization times c.) when it is on the main network segments only d.) when it is from a subset users

during peak utilization times

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router? a.) pwd b) cd USB c.) dir flash0: d.) show file systems

show file systems

Which process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5? a.) IP b.) DNS c.) DHCP d.) HTTP

DHCP

Refer to the exhibit. The exhibited configuration is entered by a network administrator into a new router. Sometime later a network technician proceeds to log in to the router via a console connection. The technician enters techadmin as the user name and tries a password of 63t0ut0fh3r3!. What will be the result of this action? a.) The router will deny access and display an error message. b.) The router will deny access and display a banner message. c.) The router will display the DT_ATC_RS3> prompt. d.)The router will be locked for 2 minutes and 30 seconds.

The router will display the DT_ATC_RS3> prompt

What is one of the most effective security tools available for protecting users from external threats? a.) firewalls b.) routers that run AAA services c.) patch servers d.) password encryption techniques

firewalls

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails? a.) Activate another router interface that is connected to the ISP, so the traffic can flow through it b.) Have a second router that is connected to another ISP c.) Purchase a second least-cost link from another ISP to connect to this router d.) Add more interfaces to the router that is connected to the internal network

Have a second router that is connected to another ISP

Match the type of threat with the cause. (Not all options are used.) a.) hardware threats b.) environmental threats c.) electrical threats d.) maintenance threats i. poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling ii. voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss iii. temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry) iv. physical damage to servers, routers, switches, cabling plant, and workstations

hardware threats ——-> physical damage to servers, routers, switches, cabling plant, and workstations environmental threats ——-> temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry) electrical threats ——-> voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss maintenance threats ——-> poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? a.) ipconfig /all b.) arp -a c.) ipconfig /displaydns d.) nslookup

ipconfig /displaydns

Which element of scaling a network involves identifying the physical and logical topologies? a.) traffic analysis b.) network documentation c.) device inverntory d.) cost analysis

network documentation

Fill in the blank. Network services use "___________" to define a set of rules that govern how devices communicate and the data formats used in a network. Explanation:

protocols

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host? a.) trace 10.1.1.5 b.) traceroute 10.1.1.5 c.) tracert 10.1.1.5 d.) ping 10.1.1.5

tracert 10.1.1.5

What type of traffic would most likely have the highest priority through the network? a.) FTP b.) instant messaging c.) voice d.) SNMP

voice


Set pelajaran terkait

IV Calculations, Solutions, and Equipment

View Set

Chapter 34 study guide History alive

View Set

Supreme Court Justices/Court Cases

View Set

Chapter 10. Campaigns and Elections

View Set

Guarantee exam life insurance exams

View Set

.Chapter7: E-commerce and E-business

View Set

Chapter 15 Leader-Member Exchange Theory

View Set