CCNA 1 Chapter 11 Exam study guide

Ace your homework & exams now with Quizwiz!

redundancy

Which network design consideration would be more important to a large corporation than to a small business?

RTP

Which protocol supports rapid delivery of streaming media?

CDP can be disabled globally or on a specific interface?.

Which statement is true about CDP on a Cisco device??

The network administrator wants to verify Layer 2 connectivity.

A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?

3 minutes

How long will a user be blocked if the user exceeds the maximum allowed number of unsuccessful login attempts?

during peak utilization times

How should traffic flow be captured in order to best understand traffic patterns in a network?

Edit the configuration file with a text editor.

If a configuration file is saved to a USB flash drive attached to a router, what must be done by the network administrator before the file can be used on the router?

R1

Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?

Something is causing a time delay between the networks.

Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?

denial of service attacks

Which type of network attack involves the disabling or corruption of networks, systems, or services?

VoIP

____________ defines the protocols and technologies that implement the transmission of voice data over an IP network.

information theft

A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario?

show version

The __________ command that is issued on a router is used to verify the value of the software configuration register.?

file systems

The show __________ command provides information about the amount of free nvram and flash memory with the permissions for reading or writing data.

connect wireless hosts to hosts or services on a wired Ethernet network

What do WLANs that conform to IEEE 802.11 standards allow wireless users to do?

containment, inoculation, quarantine, and treatment

What is a security feature of using NAT on a network?

to list the content of the NVRAM

What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?

at regular intervals over a period of time

When should an administrator establish a network baseline?

WPA

Which WLAN security protocol generates a new dynamic key each time a client establishes a connection with the AP?

copy startup-config tftp

Which command will backup the configuration that is stored in NVRAM to a TFTP server?

Never send the password through the network in a clear text. Limit the number of unsuccessful attempts to log in to the server

Which two actions can be taken to prevent a successful attack on an email server account?

tells a wireless device to which WLAN it belongs,all wireless devices on the same WLAN must have the same SSID

Which two statements about a service set identifier (SSID) are true?

With SSID broadcast disabled, an attacker must know the SSID to connect. Using the default IP address on an access point makes hacking easier.

Which two statements characterize wireless network security?


Related study sets

Chapter 13: The Intangible Product

View Set

CH 7. Life insurance Underwriting and policy issue

View Set

AP Psychology Unit 5 Test Review

View Set

AP Gov. Semester 1 Exam - Chapter 2: Terms, Reading Guides, Section Reviews, and AofC Quiz

View Set

AP European History Second Semester Final Practice Test 3

View Set