new study set

Ace your homework & exams now with Quizwiz!

DNS

resolves Internet names to IP addresses

A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command

the status of the switch interfaces and the address configured on interface vlan 1

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source

phishing

Which solution allows external users to access only an internal FTP server on a private network

port forwarding

Convert the following Decimal into hexadecimal: 941

0x3AD

What is the Subnet ID for the network 192.168.15.145 255.255.255.240

192.168.15.144

What is the broadcast address for the network 192.168.15.220 /30

192.168.15.223

You have a prefix length of /17. What is your custom subnet mask

255.255.128.0

What is the delay in the amount of time for data to travel between two points on a network

latency

When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used

logical topology diagram

You have a network with a custom subnet mask of 255.255.255.224. How many usable IP addresses are available

30

You have a network with a custom subnet mask of 255.255.255.192. How many usable IP addresses are available

62

Convert the following binary into decimal notation: 1010101

85

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption (Choose two.)

EMI & RFI​

Which two actions improve security on a wireless network (Choose two.)

Enable MAC filtering, Enable WEP

Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up

IOS image file, startup configuration

Which two statements are correct about IPv4 and IPv6 addresses

IPv4 addresses are 32 bits in length, IPv6 addresses are represented by hexadecimal numbers

What is an inherent security vulnerability of SSID broadcasting

It broadcasts the identity of the network.

SSH

It is a network protocol that provides a secure way for two computers to connect remotely. It is used to establish a secure connection between a client and a server, allowing the client to execute commands on the server as if they were sitting right in front of it

A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used

NFC

What happens when the transport input ssh command is entered on the switch vty lines

Only SSH is allowed on the switch for remote access.

A network administrator needs to keep the user name, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen

SSH

What will happen if the default gateway address is incorrectly configured on a host

The host cannot communicate with hosts in other networks.

If the default gateway is configured incorrectly on a host, what is the impact on communications

The host is unable to communicate with hosts on remote networks.

An IPv6 address can have a prefix length that ranges from 0 to 128

True

What are two features of protocols used within the TCP/IP protocol stack

UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated. TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time.

What are three types of IPv6 communication methods

Unicast, Multicast, Anycast

Which interface is the default SVI on a Cisco switch

VLAN 1

What type of technology converts analog voice signals into digital data

VoIP

What is the effect of setting the security mode to WEP on a small wireless router

Weak security

Which type of wireless communication is based on 802.11 standards

Wi-Fi

What is the primary means for mitigating virus and Trojan horse attacks

antivirus software

DHCP

automatically configures hosts with IP addressess

A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices

wireless router


Related study sets

MGT 340 Final (cumulative, exams 1 - 4 in order)

View Set

ATI Nursing Fundamentals - Chapter 16-25: Nursing Throughout the Lifespan

View Set

Becoming Muhammad Ali by James Patterson and Kwame Alexander

View Set

2023 Dog Show Intermediate A & B Showmanship and Intermediate You and Your Dog Question Bank

View Set

Chapter 13. Leadership: Power and Influence

View Set