Study Ch 10 & 11

Ace your homework & exams now with Quizwiz!

Which statement is true about Cisco IOS ping indicators?​

'.' may indicate that the ping was blocked by a firewall

Which domain name would be an example of a top-level domain?

.com

What is the factory default setting for the configuration register on Cisco routers?

0x2102

What are the two WEP key lengths? (Choose two.)

64 bit 128 bit

A user reboots a PC which has been configured to dynamically receive an IPv4 address from a DHCP server. In which order do the DHCP message transactions between the client and server occur?

DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK

What is true about a peer-to-peer network?

Each device can function as a server and a client.

A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)

Ensure the correct cable is used. Ensure the link status LED on the integrated router is lit.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

IMAP

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

What is an advantage of SMB over FTP?​

SMB clients can establish a long-term connection to the server.

Place the recommended steps for worm attack mitigation in the correct order. (Not all options are used.)

Step 1 -> Containment Step 2 -> Inoculation Step 3 -> Quarantine Step 4 -> Treatment

Which two definitions accurately describe the associated application layer protocol? (Choose two.)

Telnet - provides remote access to servers and networking devices DNS - resolves Internet names to IP addresses

Which statement is true about FTP?

The client can download data from or upload data to the server.

While downloading an IOS image from a TFTP server, an administrator sees long strings of exclamation marks (!) output to the console. What does this mean?

The transfer is working

Which statement is true about peer-to-peer applications?

They require each end device to provide a user interface and run a background service.

Which type of malware will disguise itself as a legitimate program and execute its malicious code once the program is run?

Trojan

Match the function to the appropriate OSI layer. (Not all options are used.)

application layer -> providing an interface with the network presentation layer -> data compression session layer -> resuming an interrupted dialog

What is an advantage of using a deterministic IP addressing scheme?

controlling access to devices by IP address

Match the type of threat with the cause. (Not all options are used.)

hardware threats -> physical damage to servers, routers, switches, cabling plant, and workstations environmental threats -> temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry) electrical threats -> voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss maintenance threats -> poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

Which two tasks are the responsibility of the local DNS server? (Choose two.)

mapping name-to-IP addresses for internal hosts forwarding name resolution requests between servers

Which command is used to manually query a DNS server to resolve a specific host name?

nslookup

Which OSI layer is concerned with formatting data such as GIF and JPEG graphic images?

presentation layer

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

show file systems

What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?

the IP address of the neighbor

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

vty ports, console ports


Related study sets

Honors World II Semester 2 Final

View Set

Microbiology 303 - Chapters 19-20

View Set

3a. Define indicators of compromise and determine the type of malware - Virus/Malware

View Set

Modules 3 - 5: Exhibit Questions

View Set

Chapter 27: The heart and blood vessels

View Set

ATI Nutrition for Nursing Chapter 7: Nutrition Across the Lifespan

View Set