Oed Net1234
Oed Net1234
Oed Net1234
Which two statements are true regarding the user EXEC mode? This is the default mode on an
unconfigured router when first powered up.
2. Only some aspects of the router configuration can be viewed.
2. What will a network administrator use to modify a configuration on a Cisco router? IOS
3. What is encrypted with the enable secret command? the privileged executive mode password
4. Which device acts as a gateway to allow hosts to send traffic to remote IP networks? local router
5. Why would a network administrator use the CLI of the Cisco IOS? to add a password to a Cisco
network device
6. To save time, IOS commands may be partially entered and then completed by typing which key
or key combination? Tab
7. What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file? (config)# service password-encryption
8. Why would a technician enter the command copy startup-config running-config? to copy an
existing configuration into RAM
9. technician configures a switch with these commands:
.
CLI? (Choose two 1. displaying a list of all available commands within the current mode
2. determining which option, keyword, or argument is available
31. A router has a valid operating system and a configuration stored in NVRAM. When the router
boots up, which mode will display? user EXEC mode
32. Which two features are characteristics of flash memory? 1. Flash provides nonvolatile storage.
2. The contents of flash may be overwritten
33. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and
interfaces that can be protected with passwords. (Choose three.) 1. privileged EXEC mode
2. VTY interface
3. console interface
34. Why would a Layer 2 switch need an IP address? to enable the switch to be managed remotely
35. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? if there
is connectivity with the destination device
36. What command can be used on a Windows PC to see the IP configuration of that computer?
Ipconfig
37. Which statement is true about the running configuration file in a Cisco IOS device? It affects the
operation of the device immediately when modified.
38. Which two characters are allowed as part of the hostname of a Cisco device? 1. numbers
2. Underline
39. A new network administrator has been asked to enter a banner message on a Cisco device.
What is the fastest way a network administrator could test whether the banner is properly
configured? Exit privileged EXEC mode and press Enter.
40. What is the function of the kernel of an operating software? The kernel provisions hardware
resources to meet software requirements.
41. Which command or key combination allows a user to return to the previous level in the
command hierarchy? Exit
42. What are two characteristics of RAM on a Cisco device? 1. The configuration that is actively
running on the device is stored in RAM.
2. The contents of RAM are lost during a power cycle.
43. Which interface is the default SVI on a Cisco switch? VLAN 1
44. A technician is adding a new PC to a LAN. After unpacking the components and making all the
connections, the technician starts the PC. After the OS loads, the technician opens a browser,
and verifies that the PC can reach the Internet. Why was the PC able to connect to the network
with no additional configuration? The PC was preconfigured to use DHCP.
45. Which two message timing mechanisms are used in data communication? (Choose
two.) response timeout, flow control
46. What is the name given to a one-to-many message delivery option? MULTICAST
What is a group of web pages that groups of individuals can edit and view together
called?
A. Podcasting
B. Wiki
C. Weblog (blog)
D. Instant messaging
B.
Podcasting and blogs allow the one-way dissemination of information. Instant
messaging allows the synchronous communication between individuals. A wiki allows
groups of individuals to view and edit web pages collaboratively.
Which of the following are disadvantages of peer-to-peer networking? (Choose 2)
A. Expensive to set up and maintain
B. No centralized administration
C. Complex configuration
D. Scalability
B, D.
Peer-to-peer networks are inexpensive and easy to configure but lack any centralized
management and do not scale well.
Which devices would be considered end devices on a network? (Choose 4)
A. Switch
B. Printer
C. IP phone
D. Server
E. Tablet computer
F. Wireless access point
B, C, D, E.
End devices form the interface between users and the underlying communication
network.
What type of information would be found on a logical topology diagram?
A. Location of department printer
B. Length and type of all cable runs
C. IP addressing scheme
D. Location of departmental switch
C.
Logical topology diagrams identify devices, ports, and IP addressing schemes. Physical
topology diagrams identify the physical location of intermediate devices, configured
ports, and cable installations.
What is a network infrastructure that provides access to other networks over a wide
geographic area?
A. LAN
B. WLAN
C. MAN
D. WAN
E. SAN
D.
A wide-area network (WAN) provides access to other networks over a wide geographic
area. A metropolitan-area network (MAN) spans an area larger than a local-area
network (LAN) and is typically operated by a single entity. A wireless LAN (WLAN) is
similar to a LAN, and a storage-area network (SAN) is designed to provide data storage,
retrieval, and replication.
Which of the following are business-class Internet connection technologies normally
supplied by a service provider? (Choose 2)
A. Leased lines
B. Broadband cable
C. Metro Ethernet
D. Mobile services
E. Cellular
A, C.
Leased line and Metro Ethernet are considered business-class Internet connection
technologies. Mobile services and broadband cable are considered technologies to
connect remote users.
Which technology would be best to provide a home user with a high-speed, always-on
Internet connection?
A. Dialup
B. DSL
C. Satellite
D. Cellular
B.
DSL is an always-on technology that offers good bandwidth at reasonable cost. Dialup
and cellular connections are not always-on technology and do not offer the same
bandwidth capabilities as DSL. Satellite and cellular connections are also relatively
expensive.
What is a converged network?
A. A network that makes use of both fiber-optic and copper connections.
B. A network where voice, video, and data move over the same infrastructure.
C. A network that makes use of both wired and wireless technology.
D. A network that makes use of both satellite and terrestrial connections to move data.
B.
A converged network is where voice, video, and data move over the same
infrastructure. The underlying infrastructure can be wired or wireless.
What is a fault-tolerant network?
A. A network that can provide priority treatment of voice and video traffic
B. A network that offers secure transactions
C. A network that can reroute traffic in case of device failure
D. A network that is incapable of failing
C.
A fault-tolerant network is one that can continue to function if an intermediate device or
path fails. A fault-tolerant network can fail if a sufficient number of intermediate deices
and/or paths fail.
What is true of Tier 3 ISPs?
A. They act as local providers of service directly to end users.
B. They Connect directly to Tier 1 ISPs.
C. They interconnect with other Tier 1 ISPs.
D. They provide high-speed redundant services to other ISPs.
A.
Tier 3 ISP are the local providers of service to end users. They normally connect to Tier
2 providers for Internet access.
Which type of traffic must receive the highest priority from QoS?
A. Web traffic
B. Email
C. VoIP
D. Order processing
C.
Quality of Service (QoS) prioritizes data based on many factors including the traffic's
sensitivity to network delay. Voice over IP (VoIP) is very sensitive to network delay and
must be given priority treatment.
What are the primary requirements of information security? (Choose 3)
A. Confidentiality
B. Integrity
C. Availability
D. QoS
E. Scalability
A, B, C.
Information security includes ensuring that only the intended recipient can access the
data (confidentiality), ensuring that the data has not been altered in transmission
(integrity), and that the information is available in a timely manner (availability). Quality
of service is not a primary requirement of information security.
List four current network trends.
The ready availability of network resources continues to change the way we work, play,
and learn. Some of the current trends include the increased use of video, the use of
client end-user-supplied devices on corporate networks (BYOD), the increased use of
collaborative technologies, and a migration to cloud computing.
Describe some common everyday uses of a modern-day network.
Networks have changed the way we live our everyday lives. Some examples of ways
that networks are used include:
-Checking the weather forecast
-Watching movies
-Sharing photographs and movies
-Playing games
-Checking our bank balance
-Taking an online class
In what ways has the network transformed the way we learn?
Networks extend the learning environment into the virtual world by providing tools for
collaboration and mobility, thus creating a global classroom. Some of the ways that the
learning environment has been transformed by networks include:
-Creates virtual classrooms
-Enables mobile learning
-Creates collaborative learning spaces
-Provides enhanced tracking of student performance
-Provides a global learning environment
Which device is usually the first line of defense in a layered defense-in-depth approach?
internal router
edge router
firewall
edge router
A company has a file server that shares a folder named Public. The network security
policy specifies that the Public folder is assigned Read-Only rights to anyone who can
log into the server while the Edit rights are assigned only to the network admin group.
Which component is addressed in the AAA network service framework?
authorization
automation
accounting
authentication
authentication
Which type of access control applies the strictest access control and is commonly used
in military or mission critical applications?
attribute-based access control (ABAC)
confidentiality
availability
scalability
integrity
availability
What service determines which resources a user can access along with the operations
that a user can perform?
token
authentication
accounting
biometric
authorization
authorization
In a defense-in-depth approach, which three options must be identified to effectively
defend a network against attacks? (Choose three.)
threats to assets
total number of devices that attach to the wired and wireless network
past security breaches
statement of scope
statement of authority
identification and authentication policy
What is the principle of least privilege access control model?
password policies
acceptable use policies
Which three services are provided by the AAA framework? (Choose three.)
autoconfiguration
accounting
authorization
authentication
automation
autobalancing
accounting
authorization
authentication
A web server administrator is configuring access settings to require users to
authenticate first before accessing certain web pages. Which requirement of information
security is addressed through the configuration?
scalability
integrity
availability
confidentiality
confidentiality
Which statement describes a difference between RADIUS and TACACS+?
RADIUS is supported by the Cisco Secure ACS software whereas TACACS+ is not.
RADIUS encrypts only the password whereas TACACS+ encrypts all communication.
RADIUS encrypts only the password whereas TACACS+ encrypts all
communication
How does BYOD change the way in which businesses implement networks?
BYOD devices are more expensive than devices that are purchased by an organization.
BYOD users are responsible for their own network security, thus reducing the need for
organizational security policies.
BYOD provides flexibility in where and how users can access network resources.
BYOD provides flexibility in where and how users can access network resources.
What is the purpose of mobile device management (MDM) software?
intervention
availability
scalability
confidentiality
access
integrity
availability,
confidentiality,
integrity
In threat intelligence communications, what set of specifications is for exchanging
cyberthreat information between organizations?
AutoSecure
authentication
accounting
auditing
authorization
authentication
defines system requirements and objectives, rules, and requirements for users when
they attach to or on the network
security
protects the rights of workers and the company interests
Company
identifies salary, pay schedule, benefits, work schedule, vacations,
employee