Вы находитесь на странице: 1из 14

What command will prevent all

(config) # service unencrypted passwords from


password-encryption displaying in plain text in a
configuration file?
Which type of network design
combines voice, video, and data
a converged network
on the same communication
channel?
a farm in a rural area
In which scenario would the use
without wired
of a WISP be recommended?
broadband access
a web page that
groups of people can What is a wiki?
edit and review
an address that
What type of address is 01-00-5E-
reaches a specific 
0A-00-02?
group of hosts
an intranet An employee at a branch office is
creating a quote for a customer. In
order to do this, the employee
needs to access confidential
pricing information from internal
servers at the Head Office. What
type of network would the
employee access?
What type of communication will
broadcast send a message to all devices on a
local area network?
Which message delivery option is
used when all devices need to
broadcast
receive the same message
simultaneously?
Which two Internet connection
options do not require that
cellular, Satellite
physical cables be run to the
building? (Choose two.)
Which term describes the state of
a network when the demand on
congestion
the network resources exceeds
the available capacity?
What three functions are defined
data encoding, by network protocols to allow
message size, communication between known
delivery options source and destination IP
addresses? (Choose three.)
Which logical address is used for
destination IP
delivery of data to a remote
address
network?
Which two connection options
provide an always-on, high-
DSL, cable bandwidth Internet connection to
computers in a home office?
(Choose two.)
A company is contemplating
easy to create, lacks
whether to use a client/server or a
centralized
peer-to-peer network. What are
administration, less
three characteristics of a peer-to-
cost to implement
peer network? (Choose three.)
What process is used to place one
message inside another message
encapsulation
for transfer from the source to the
destination?
Which command or key
combination allows a user to
exit
return to the previous level in the
command hierarchy?
What method can be used by two
computers to ensure that packets
flow control are not dropped because too
much data is being sent too
quickly?
how connection Which two factors influence the
between nodes
appears to the data method that is used for media
link layer, how nodes access control? (Choose two.)
share the media
A web client is sending a request
for a webpage to a web server.
From the perspective of the client,
HTTP, TCP,
what is the correct order of the
IP, Ethernet
protocol stack that is used to
prepare the request for
transmission?
Which organization develops the
IEEE 802 family of standard for wired
and wireless LANs and MANs?
Intermediary devices
direct the path of the
Which two statements describe
data., Intermediary
intermediary devices? (Choose
devices connect
two.)
individual hosts to
the network.
Which two engineering
International
organizations define open
Telecommunication
standards and protocols that
Union (ITU)
apply to the data link layer?
is a private connection of LANs
and WANs that belongs to an
organization, and is designed to
Intranet be accessible only by the
members and employees of the
organization, or others with
authorization.
What will a network administrator
IOS use to modify a configuration on a
Cisco router?
it can rapidly adapt
to the failure of
network devices and
communication links,
Data packets can For which three reasons was a
travel through the packet switched connectionless
network using data communications technology
multiple different used when developing the
paths, Network Internet (Choose three.)
devices dynamically
decide on the best
available path to
forward each packet.
It does not allow Which statement describes a
spaces feature of an IOS host name
configuration?
It is as
What is a characteristic of a
nondeterministic
contention-based access method?
method
An administrator measured the
transfer of usable data across a
100 Mb/s physical channel over a
latency given period of time and obtained
60 Mb/s. Which kind of
measurement did the
administrator obtain
In fiber optic meda, the signals are
light
represented as patterns of
What type of delivery uses data
local delivery
link layer addresses?
Which device acts as gateway to
local router allow hosts to send traffic to
remote IP networks?
address is defined as a reserved
loopback address that routes packets back
to the host
mac sublayer is responsible for
communicating directly with the
physical layer.
Which interface command must
be entered in a Layer 3 switch
no switchport
before IPv4 address can be
assigned to the interface?
Nothing must be
done. Changes to the
configuration on an An administrator has just changed
IOS device take effect the IP address of an interface on
as soon as the an IOS device. What else must be
command is typed done in order to apply those
correctly and the changes to the device?
Enter key has been
pressed.
Products from
different What is an advantage of using
manufacturers can standards to develop and
interoperate implement protocols?
successfully
providing a richer e-
learning What are two benefits of
environment, collaboration and video-on-
providing better demand applications? (Choose
social media two.)
opportunities
providing the rules
required for a specific What is the purpose
type of of protocols in data
communication to communications?
occur
Which two message timing
response timeout,
mechanisms are used in data
flow control
communication? (Choose two.)
Which device performs the
function of determining the path
router
that messages should take
through internet works?
network is able to expand to
accept new devices and
Scalable
applications without affecting
performance.
Which PDU is processed when a
host computer is de-encapsulating
segment
a message at the transport
layer of the TCP/IP model?
The farther you are from the
slower central office when utilizing a DSL
connection, the
spyware During a routine inspection, a
technician discovered that
software that was installed on a
computer was secretly collecting
data about websites that were
visited by users of the computer.
Which type of threat is affecting
this computer
A network administrator needs to
keep the user ID, password, and
session contents private when
SSH establishing remote CLI
connectivity with a switch to
manage it. Which access method
should be chosen?
A technician configures a switch
SVI
with these commands:
To save time, IOS commands may
be partially entered and then
Tab
completed by typing which key or
key combination?
The branch sites are
connected to a What is a characteristic of a WAN
central site through hub-and-spoke topology?
point-point links
the distance the
selected medium can
What two criteria are used to help
successfully carry a
select a network medium from
signal, the
various network media? (Choose
environment where
two.)
the selected medium
is to be installed
The host portion of What happens when two devices
the IP addresses will on the same subnet are
be different communicating?
The kernel provisions
hardware resources What is the function of the kernel
to meet software of an operating software?
requirements.
The network provides
predictable levels of Which statement describes a
service to different network that supports QoS?
types of traffic
the privileged
What is encrypted with the enable
executive mode
secret command?
password
The throughput is Which two statements are true of
predictable, Devices the deterministic access method?
take turns (Choose two.)
transmitting
They define how
messages are
Which statement is correct about
exchanged between
network protocols?
the source and the
destination.
They define how
messages are
Which statement is correct about
exchanged between
network protocols?
the sources and the
destination
They originate the
data that flows
through the
What are two functions of end
network., They are
devices on a network? (Choose
the interface
two.)
between humans and
the communication
network.
Which statement describes a
They vary depending
characteristic of the frame header
on protocols
fields of the data link layer?
This is the default Which two statements are true
mode on an regarding the user EXEC mode?
unconfigured router
when first powered
up., Only some
(Choose two.)
aspects of the router
configuration can be
viewed
to add a password to Why would a network
a Cisco network administrator use the CLI of the
device Cisco IOS?
to copy an existing Why would a technician enter the
configuration into command copy startup-config
RAM running config?
What is the purpose of the
to establish the
physical link control field in a data
media link
link layer header?
to identify
which network Which is a function of the Logical
layer protocol is Link Control (LLC) sublayer?
being used
Which two components are added
Trailer, frame header to the PDU at the network
access layer? (Choose two.)
Type the command A network administer has
and then press the? forgotten the argument of an IOS
command. How would the
administrator get help from the
key
IOS CLI to complete the command
correctly?
Use the console port
Which procedure is used to access
to locally access the
a Cisco 2960 switch when
switch from a serial
performing an initial configuration
or USB interface of
in a secure environment?
the PC.
A router has a valid operating
system and a configuration file
stored in NVRAM. The
configuration file contains an
user EXEC mode
enable secret password but no
console password. When the
router boots up, which mode will
display?
virtualization A data center has recently
updated a physical server to host
multiple operating systems on a
single CPU. The data center can
now provide each customer with a
separate web server without
having to allocate an actual
discrete server for each customer.
What is the network trend that is
being implemented by the data
center in this situation?
when the end-user
device will run an
When is a wired connection
application that
preffered to a wireless connection
requires a dedicated
by an end-user device?
connection to the
network
Which area of the network would
a college IT staff most likely have
to redesign as a direct result of
wireless LAN
many students bringing their own
tablets and smartphones to school
to access school resources?

Вам также может понравиться