click below
click below
Normal Size Small Size show me how
NETWORKING SA1
| Question | Answer |
|---|---|
| During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? | spyware |
| Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? | extranet |
| A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe? | bring your own device |
| What is an ISP? | It is an organization that enables individuals and businesses to connect to the Internet. |
| Provide redundant links and devices. | fault tolerance |
| Expand the network without degrading the service for existing users. | scalability |
| Protect the network from unauthorized access. | security |
| An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? | an intranet |
| Which statement describes the use of powerline networking technology? | A device connects to an existing home LAN using an adapter and an existing electrical outlet. |
| A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. | security |
| uses coaxial cable as a medium | cable |
| not suited for heavily wooded areas | satellite |
| typically has very low bandwidth | dialup telephone |
| high bandwidth connection that runs over telephone line | DSL |
| What two criteria are used to help select a network medium from various network media? (Choose two.) | 1. the distance the selected medium can successfully carry a signal 2. the environment where the selected medium is to be installed |
| What type of network traffic requires QoS? | video conferencing |
| A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.) | 1. implementing a firewall 2. installing antivirus software |
| Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) | 1. VTY interface 2. console interface 3. privileged EXEC mode |
| Which interface allows remote management of a Layer 2 switch? | the switch virtual interface |
| 15. What function does pressing the Tab key have when entering a command in IOS? | It completes the remainder of a partially typed word in a command. |
| While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. | Issue the reload command without saving the running configuration. |
| An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? | to interrupt the ping process |
| Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode? | lineconin |
| A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown | SVI |
| Which command or key combination allows a user to return to the previous level in the command hierarchy? | exit |
| What are two characteristics of RAM on a Cisco device? (Choose two.) | 1. The configuration that is actively running on the device is stored in RAM. 2. The contents of RAM are lost during a power cycle. |
| Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.) | 1. RM-3-Switch-2A4 2. SwBranch799 |
| How is SSH different from Telnet? | SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. |
| first mode | user EXEC mode |
| second mode | privileged EXEC mode |
| third mode | global configuration mode |
| final mode | line configuration mode |
| What are three characteristics of an SVI? (Choose three.) | 1. It is not associated with any physical interface on a switch. 2. It provides a means to remotely manage a switch. 3. It is associated with VLAN1 by default. |
| What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address? | show ip interface brief |
| provides context-sensitive help | ? |
| displays the next screen | Space bar |
| completes abbreviated commands and parameters | Tab |
| scrolls backwards through previously entered commands | Up Arrow |
| aborts commands such as trace and ping | Ctrl-Shift-6 |
| In the show running-config command, which part of the syntax is represented by running-config ? | a keyword |
| After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command? | The new configuration will be loaded if the switch is restarted. |
| What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? | (config)# service password-encryption |
| A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? | This command prevents someone from viewing the running configuration passwords. |
| What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? | flow control |
| Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network? | Segments are sent from the transport layer to the internet layer. |
| What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) | DHCP DNS FTP |
| Which name is assigned to the transport layer PDU? | segment |
| When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address? | subnet mask |
| What process involves placing one PDU inside of another PDU? | encapsulation |
| What layer is responsible for routing messages through an internetwork in the TCP/IP model? | internet |
| The Telnet-formatted data is provided to the next layer. | First |
| The TCP header is added. | Second |
| The IP header is added. | Third |
| The Ethernet header is added. | Fourth |
| Which PDU format is used when bits are received from the network medium by the NIC of a host? | frame |
| Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.) | ServerB will generate a frame with the destination MAC address of RouterB. ServerB will generate a packet with the destination IP address of HostA. |
| Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond? | response timeout |
| A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? | Ethernet, IP, TCP, HTTP |
| Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.) | data link physical |
| At which layer of the OSI model would a logical address be added during encapsulation? | network layer |
| What is a characteristic of multicast messages? | They are sent to a select group of hosts. |
| Which statement is correct about network protocols? | They define how messages are exchanged between the source and the destination. |
| What is an advantage of network devices using open standard protocols? | A client host and a server running different operating systems can successfully exchange data. |
| Which device performs the function of determining the path that messages should take through internetworks? | a router |
| What is the IP address of the switch virtual interface (SVI) on Switch0? | 192.168.5.10 |
| Why would a Layer 2 switch need an IP address? | to enable the switch to be managed remotely |
| An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? | The administrator must first enter privileged EXEC mode before issuing the command |
| What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization? | extranet |
| What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device? | cloud |
| What term describes a network where one computer can be both client and server? | peer-to-peer |
| What term describes a type of network used by people who work from home or from a small remote office? | SOHO network |
| What term describes a computing model where server software runs on dedicated computers? | client/server |
| What term describes a technology that allows devices to connect to the LAN using an electrical outlet? | powerline networking |
| What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video? | quality of service |
| What term describes a private collection of LANs and WANs that belongs to an organization? | intranet |
| What term describes the ability to use personal devices across a business or campus network? | BYOD |
| At which OSI layer is a source IP address added to a PDU during the encapsulation process? | network layer |
| At which OSI layer is a destination port number added to a PDU during the encapsulation process? | transport layer |
| At which OSI layer is data added to a PDU during the encapsulation process? | application layer |
| At which OSI layer is a source IP address added to a PDU during the encapsulation process? | network layer |
| Which of the following is the name for all computers connected to a network that participate directly in network communication? | Host |
| At which OSI layer is a destination IP address added to a PDU during the encapsulation process? | network layer |
| At which OSI layer is a source MAC address added to a PDU during the encapsulation process? | data link layer |
| At which OSI layer is a source port number added to a PDU during the encapsulation process? | transport layer |
| At which OSI layer is a destination MAC address added to a PDU during the encapsulation process? | data link layer |
| When data is encoded as pulses of light, which media is being used to transmit the data? | Fire optic cable |
| Which two devices are intermediary devices? (Choose two) | Router Switch |
| A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center | fault tolerance |