midterm (network fundamentals)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

19. What security violation would cause the most amount of damage to the life of a home user? denial of service to your email server replication of worms and viruses in your computer capturing of personal data that leads to identity theft spyware that leads to spam emails

capturing of personal data that leads to identity theft

14. Which term describes the state of a network when the demand on the network resources exceeds the available capacity? convergence congestion optimization synchronization

congestion

16. A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support? data integrity data quality data confidentiality data redundancy

data confidentiality

28. What process is used to place one message inside another message for transfer from the source to the destination? access control decoding encapsulation flow control

encapsulation

4. Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? Internet intranet extranet extendednet

extranet

17. Which statement describes a characteristic of cloud computing? A business can connect directly to the Internet without the use of an ISP Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world Devices can connect to the Internet through existing electrical wiring Investment in new infrastructure is required in order to access the cloud.

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world

20. Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network? BYOD cloud computing video conferencing powerline networking

BYOD

6. Which keys act as a hot key combination that is used to interrupt an IOS process? Ctrl-Shift-X Ctrl-Shift-6 Ctrl-Z Ctrl-C

Ctrl-Shift-6

5. A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? DSL dial-up satellite cell modem

DSL

3. Which protocol functions at the internet layer? (Choose 1) POP BOOTP IP PPP

IP

25. While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM? Issue the reload command without saving the running configuration Delete the vlan.dat file and reboot the device. Close and reopen the terminal emulation software Issue the copy startup-config running-config command

Issue the reload command without saving the running configuration

24. How does the service password-encryption command enhance password security on Cisco routers and switches? It encrypts passwords as they are sent across the network. It encrypts passwords that are stored in router or switch configuration files. It requires that a user type encrypted passwords to gain console access to a router or switch. It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet.

It encrypts passwords that are stored in router or switch configuration files.

10. What is done to an IP packet before it is transmitted over the physical medium? It is tagged with information guaranteeing reliable delivery It is segmented into smaller individual pieces It is encapsulated into a TCP segment It is encapsulated in a Layer 2 frame

It is encapsulated in a Layer 2 frame

18. What is the Internet? It is a network based on Ethernet technology It provides network access for mobile devices It provides connections through interconnected global networks. It is a private network for an organization with LAN and WAN connections

It provides connections through interconnected global networks.

21. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? Telnet Console AUX SSH

SSH

2. What is the purpose of the SVI on a Cisco switch? The SVI provides a physical interface for remote access to the switch. The SVI provides a faster method for switching traffic between ports on the switch. The SVI adds Layer 4 connectivity between VLANs. The SVI provides a virtual interface for remote access to the switch.

The SVI provides a virtual interface for remote access to the switch.

30. Which statement is true about the TCP/IP and OSI models? The TCP/IP transport layer and OSI Layer 4 provide similar services and functions. The TCP/IP network access layer has similar functions to the OSI network layer. The OSI Layer 7 and the TCP/IP application layer provide identical functions. The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

29. Which statement is correct about network protocols? Network protocols define the type of hardware that is used and how it is mounted in racks. They define how messages are exchanged between the source and the destination. They all function in the network access layer of TCP/IP. They are only required for exchange of messages between devices on remote networks.

They define how messages are exchanged between the source and the destination.

7. A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? This command encrypts passwords as they are transmitted across serial WAN links. This command prevents someone from viewing the running configuration passwords. This command enables a strong encryption algorithm for the enable secret password command. This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

This command prevents someone from viewing the running configuration passwords.

22. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? Use Telnet to remotely access the switch through the network. Use the console port to locally access the switch from a serial or USB interface of the PC. Use Secure Shell to remotely access the switch through the network. Use the AUX port to locally access the switch from a serial or USB interface of the PC

Use the console port to locally access the switch from a serial or USB interface of the PC.

12. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? Extranet the Internet an extranet a local area network

a local area network

15. Which expression accurately defines the term bandwidth? a method of limiting the impact of a hardware or software failure on the network a measure of the data carrying capacity of the media a state where the demand on the network resources exceeds the available capacity a set of techniques to manage the utilization of network resources

a measure of the data carrying capacity of the media

11. Which device performs the function of determining the path that messages should take through internetworks? a router a web server a DSL modem a firewall

a router

13. An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? an intranet the Internet an extranet a local area network

an intranet

8. Which message delivery option is used when all devices need to receive the same message simultaneously? duplex unicast multicast broadcast

broadcast

27. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? if the TCP/IP stack is functioning on the PC without putting traffic on the wire if there is connectivity with the destination device the path that traffic will take to reach the destination what type of device is at the destination

if there is connectivity with the destination device

1. What command can be used on a Windows PC to see the IP configuration of that computer? Ping Ipconfig Show interfaces Show ip interface brief

ipconfig

26. What command can be used on a Windows PC to see the IP configuration of that computer? ping ipconfig show interfaces show ip interface brief

ipconfig

9. What PDU is associated with the transport layer? segment packet frame bits

segment

23. Which information does the show startup-config command display? the IOS image copied into RAM the bootstrap program in the ROM the contents of the current running configuration file in the RAM the contents of the saved configuration file in the NVRAM

the contents of the saved configuration file in the NVRAM


Set pelajaran terkait

Finance 318 Chapter 8, Chapter 8

View Set

Unit 3, Day 2: Nucleic acid structure

View Set

Anthropology 1003 Midterm: Auburn University

View Set

Bio 208 All Quizzes and Mini Exams

View Set