Midterm Exam CET2600
Which type of access is secured on a Cisco router or switch with the enable secret command? console line privileged EXEC virtual terminal AUX port
privileged EXEC
Which two devices are intermediary devices? (Choose two) routers servers switches hosts
routers switches
Which feature is being used when connecting a device to the network using an electrical outlet? Smart home technology Powerline Wireless broadband
Powerline
Which IOS mode allows access to all commands and features? Interface subconfiguration mode Privileged EXEC mode User EXEC mode Global configuration mode Line console subconfiguration mode
Privileged EXEC mode
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Console
Console
What is the process of converting information into the proper form for transmission? Formatting Encapsulation Encoding
Encoding
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? Extranet Intranet WAN LAN
LAN
When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? Scalability Security QoS fault tolerance
Scalability
What are two functions of end devices on a network? (Choose two.) They filter the flow of data to enhance security. They direct data over alternate paths in the event of link failures. They originate the data that flows through the network. They provide the channel over which the network message travels. They are the interface between humans and the coummincations network.
They originate the data that flows through the network. They are the interface between humans and the coummincations network.
Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Virus, worm, or Trojan horse Denial of Service (DoS) zero-day or Zero-hour Firewall Virtual Private Network (VPN)
Zero-day or Zero-hour
Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? Pysical topology Logical topology
logical topology
Which command encrypts all plaintext passwords access on a switch? service password-encryption enable secret secret login
service password-encryption
What type of interface has no physical port associated with it? switch virtual interface (SVI) console serial Ethernet
switch virtual interface (SVI)