password-encryption displaying in plain text in a configuration file? Which type of network design combines voice, video, and data a converged network on the same communication channel? a farm in a rural area In which scenario would the use without wired of a WISP be recommended? broadband access a web page that groups of people can What is a wiki? edit and review an address that What type of address is 01-00-5E- reaches a specific 0A-00-02? group of hosts an intranet An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? What type of communication will broadcast send a message to all devices on a local area network? Which message delivery option is used when all devices need to broadcast receive the same message simultaneously? Which two Internet connection options do not require that cellular, Satellite physical cables be run to the building? (Choose two.) Which term describes the state of a network when the demand on congestion the network resources exceeds the available capacity? What three functions are defined data encoding, by network protocols to allow message size, communication between known delivery options source and destination IP addresses? (Choose three.) Which logical address is used for destination IP delivery of data to a remote address network? Which two connection options provide an always-on, high- DSL, cable bandwidth Internet connection to computers in a home office? (Choose two.) A company is contemplating easy to create, lacks whether to use a client/server or a centralized peer-to-peer network. What are administration, less three characteristics of a peer-to- cost to implement peer network? (Choose three.) What process is used to place one message inside another message encapsulation for transfer from the source to the destination? Which command or key combination allows a user to exit return to the previous level in the command hierarchy? What method can be used by two computers to ensure that packets flow control are not dropped because too much data is being sent too quickly? how connection Which two factors influence the between nodes appears to the data method that is used for media link layer, how nodes access control? (Choose two.) share the media A web client is sending a request for a webpage to a web server. From the perspective of the client, HTTP, TCP, what is the correct order of the IP, Ethernet protocol stack that is used to prepare the request for transmission? Which organization develops the IEEE 802 family of standard for wired and wireless LANs and MANs? Intermediary devices direct the path of the Which two statements describe data., Intermediary intermediary devices? (Choose devices connect two.) individual hosts to the network. Which two engineering International organizations define open Telecommunication standards and protocols that Union (ITU) apply to the data link layer? is a private connection of LANs and WANs that belongs to an organization, and is designed to Intranet be accessible only by the members and employees of the organization, or others with authorization. What will a network administrator IOS use to modify a configuration on a Cisco router? it can rapidly adapt to the failure of network devices and communication links, Data packets can For which three reasons was a travel through the packet switched connectionless network using data communications technology multiple different used when developing the paths, Network Internet (Choose three.) devices dynamically decide on the best available path to forward each packet. It does not allow Which statement describes a spaces feature of an IOS host name configuration? It is as What is a characteristic of a nondeterministic contention-based access method? method An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a latency given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain In fiber optic meda, the signals are light represented as patterns of What type of delivery uses data local delivery link layer addresses? Which device acts as gateway to local router allow hosts to send traffic to remote IP networks? address is defined as a reserved loopback address that routes packets back to the host mac sublayer is responsible for communicating directly with the physical layer. Which interface command must be entered in a Layer 3 switch no switchport before IPv4 address can be assigned to the interface? Nothing must be done. Changes to the configuration on an An administrator has just changed IOS device take effect the IP address of an interface on as soon as the an IOS device. What else must be command is typed done in order to apply those correctly and the changes to the device? Enter key has been pressed. Products from different What is an advantage of using manufacturers can standards to develop and interoperate implement protocols? successfully providing a richer e- learning What are two benefits of environment, collaboration and video-on- providing better demand applications? (Choose social media two.) opportunities providing the rules required for a specific What is the purpose type of of protocols in data communication to communications? occur Which two message timing response timeout, mechanisms are used in data flow control communication? (Choose two.) Which device performs the function of determining the path router that messages should take through internet works? network is able to expand to accept new devices and Scalable applications without affecting performance. Which PDU is processed when a host computer is de-encapsulating segment a message at the transport layer of the TCP/IP model? The farther you are from the slower central office when utilizing a DSL connection, the spyware During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer A network administrator needs to keep the user ID, password, and session contents private when SSH establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? A technician configures a switch SVI with these commands: To save time, IOS commands may be partially entered and then Tab completed by typing which key or key combination? The branch sites are connected to a What is a characteristic of a WAN central site through hub-and-spoke topology? point-point links the distance the selected medium can What two criteria are used to help successfully carry a select a network medium from signal, the various network media? (Choose environment where two.) the selected medium is to be installed The host portion of What happens when two devices the IP addresses will on the same subnet are be different communicating? The kernel provisions hardware resources What is the function of the kernel to meet software of an operating software? requirements. The network provides predictable levels of Which statement describes a service to different network that supports QoS? types of traffic the privileged What is encrypted with the enable executive mode secret command? password The throughput is Which two statements are true of predictable, Devices the deterministic access method? take turns (Choose two.) transmitting They define how messages are Which statement is correct about exchanged between network protocols? the source and the destination. They define how messages are Which statement is correct about exchanged between network protocols? the sources and the destination They originate the data that flows through the What are two functions of end network., They are devices on a network? (Choose the interface two.) between humans and the communication network. Which statement describes a They vary depending characteristic of the frame header on protocols fields of the data link layer? This is the default Which two statements are true mode on an regarding the user EXEC mode? unconfigured router when first powered up., Only some (Choose two.) aspects of the router configuration can be viewed to add a password to Why would a network a Cisco network administrator use the CLI of the device Cisco IOS? to copy an existing Why would a technician enter the configuration into command copy startup-config RAM running config? What is the purpose of the to establish the physical link control field in a data media link link layer header? to identify which network Which is a function of the Logical layer protocol is Link Control (LLC) sublayer? being used Which two components are added Trailer, frame header to the PDU at the network access layer? (Choose two.) Type the command A network administer has and then press the? forgotten the argument of an IOS command. How would the administrator get help from the key IOS CLI to complete the command correctly? Use the console port Which procedure is used to access to locally access the a Cisco 2960 switch when switch from a serial performing an initial configuration or USB interface of in a secure environment? the PC. A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an user EXEC mode enable secret password but no console password. When the router boots up, which mode will display? virtualization A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation? when the end-user device will run an When is a wired connection application that preffered to a wireless connection requires a dedicated by an end-user device? connection to the network Which area of the network would a college IT staff most likely have to redesign as a direct result of wireless LAN many students bringing their own tablets and smartphones to school to access school resources?