FINALS pt.3
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | 255.255.255.240
🗑
|
||||
What technique is used with UTP cable to help protect against signal interference from crosstalk? | show 🗑
|
||||
show | SSH
🗑
|
||||
What characteristic describes an IPS? | show 🗑
|
||||
An intrusion prevention system (IPS) monitors incoming and outgoing traffic looking for malware, network attack signatures, and more. If it recognizes a threat, it can immediately stop it. | show 🗑
|
||||
What service is provided by DHCP? | show 🗑
|
||||
Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments? | show 🗑
|
||||
is a specification used for low-data rate, low-power communications. It is intended for applications that require short-range, low data-rates and long battery life. | show 🗑
|
||||
show | neighbor solicitations, neighbor advertisements
🗑
|
||||
show | It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.
🗑
|
||||
An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? | show 🗑
|
||||
What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted? | show 🗑
|
||||
show | Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
🗑
|
||||
Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) | show 🗑
|
||||
What is one main characteristic of the data link layer? | show 🗑
|
||||
show | A device listens and waits until the media is not busy before transmitting.
🗑
|
||||
What are three characteristics of the CSMA/CD process? (Choose three.)2. | show 🗑
|
||||
show | All of the devices on a segment see data that passes on the network medium.
🗑
|
||||
show | the contents of the saved configuration file in the NVRAM
🗑
|
||||
Which two commands can be used on a Windows host to display the routing table? (Choose two.) | show 🗑
|
||||
show | directing data packets to destination hosts on other networks & providing end devices with a unique network identifier
🗑
|
||||
Which two statements describe features of an IPv4 routing table on a router? (Choose two.) | show 🗑
|
||||
show | show ip route
🗑
|
||||
show | a tunneling protocol that provides remote users with secure access into the network of an organization
🗑
|
||||
show | to enable the switch to be managed remotely
🗑
|
||||
show | the MAC address of the default gateway
🗑
|
||||
the process of converting information from one format into another acceptable for transformation | show 🗑
|
||||
the process of placing one message format inside another message format | show 🗑
|
||||
show | message encapsulation
🗑
|
||||
show | It encourages competition and promotes choices.
🗑
|
||||
show | The source port field identifies the running application or service that will handle data returning to the PC.
🗑
|
||||
Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) 2. | show 🗑
|
||||
Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)3. | show 🗑
|
||||
show | acknowledgement
🗑
|
||||
show | retransmission
🗑
|
||||
used to identify missing segment of dats | show 🗑
|
||||
show | window size
🗑
|
||||
show | IP addresses, Layer 1 statuses
🗑
|
||||
show | tracert
🗑
|
||||
show | Time-to-Live
🗑
|
||||
A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (1) | show 🗑
|
||||
show | Fiber optic provides higher data capacity but is more expensive than copper cabling.
🗑
|
||||
A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet? | show 🗑
|
||||
show | worm
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
cessy_comscie