Oed Net1234

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

1.

 
Which two statements are true regarding the user EXEC mode? This is the default mode on an
unconfigured router when first powered up.
2. Only some aspects of the router configuration can be viewed.
2. What will a network administrator use to modify a configuration on a Cisco router? IOS
3. What is encrypted with the enable secret command? the privileged executive mode password
4. Which device acts as a gateway to allow hosts to send traffic to remote IP networks? local router
5. Why would a network administrator use the CLI of the Cisco IOS? to add a password to a Cisco
network device
6. To save time, IOS commands may be partially entered and then completed by typing which key
or key combination? Tab
7. What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file? (config)# service password-encryption
8. Why would a technician enter the command copy startup-config running-config? to copy an
existing configuration into RAM
9. technician configures a switch with these commands:

SwitchA(config)# interface vlan 1


SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown

What is the technician configuring? SVI


10. An administrator has just changed the IP address of an interface on an IOS device. What else
must be done in order to apply those changes to Nothing must be done. Changes to the
configuration on an IOS device take effect as soon as the command is typed correctly and the

Enter key has been pressed .


11.  network administrator has forgotten the argument of an IOS command. How would the
administrator get help from the IOS CLI to complete the command correctly? Type the

command and then press the ? key .


12. What command does a technician issue on a switch to display the exhibited output?
(fastEthernet0/1 unassigned YES manual down) show ip interface brief
13. Which statement describes a feature of an IOS hostname configuration? It does not allow
spaces
14. A _________ address is defined as a reserved address that routes packets back to the host
loopback
15. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued,
but the ping was not successful. Other switches in the same network can ping this gateway. What
is a possible reason for this? The no shutdown command was not issued for VLAN 1
16. While trying to solve a network issue, a technician made multiple changes to the current router
configuration file. The changes did not solve the problem and were not saved. What action can
the technician take to discard the changes and work with the file in NVRAM? Issue the reload
command without saving the running configuration.
17. Why is it important to configure a hostname on a device? to identify the device during remote
access (SSH or telnet)
18. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration
in a secure environment? Use the console port to locally access the switch from a serial or USB
interface of the PC.
19. What criterion must be followed in the design of an IPv4 addressing scheme for end
devices? Each IP address must be unique within the local network.
20. A network administrator needs to keep the user ID, password, and session contents private when
establishing remote CLI connectivity with a switch to manage it. Which access method should be
chosen? Ssh
21. Which interface allows remote management of a Layer 2 switch? the switch virtual interface
22. What is a result of using the service password-encryption command on a Cisco network device?
All passwords in the configuration are not shown in clear text when viewing the configuration.
23. Completes abbreviated commands and parameters tab
24. Ctrl-R returns directly to the privileged EXEC mode
25. Up Arrow scrolls backwards through previously entered commands
26. Ctrl-Z cancels any command currently being entered and returns directly to privileged EXEC
mode
27. Ctrl-C Redisplays, on a new line, the command currently being typed
28. A network administrator is planning an IOS upgrade on several of the head office routers and
switches. Which three questions must be answered before continuing with the IOS selection
and upgrade? (Choose three.)
1. What models of routers and switches require upgrades?
2. Do the routers and switches have enough RAM and flash memory for the proposed IOS
versions?
3. What features are required for the devices?
29. What benefit does DHCP provide to a network? Hosts can connect to the network and get an
IP address without manual configuration.
30. Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS

.
CLI? (Choose two 1. displaying a list of all available commands within the current mode
2. determining which option, keyword, or argument is available
31. A router has a valid operating system and a configuration stored in NVRAM. When the router
boots up, which mode will display? user EXEC mode
32. Which two features are characteristics of flash memory? 1. Flash provides nonvolatile storage.
2. The contents of flash may be overwritten
33. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and
interfaces that can be protected with passwords. (Choose three.) 1. privileged EXEC mode
2. VTY interface
3. console interface
34. Why would a Layer 2 switch need an IP address? to enable the switch to be managed remotely
35. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? if there
is connectivity with the destination device
36. What command can be used on a Windows PC to see the IP configuration of that computer?
Ipconfig
37. Which statement is true about the running configuration file in a Cisco IOS device? It affects the
operation of the device immediately when modified.
38. Which two characters are allowed as part of the hostname of a Cisco device? 1. numbers
2. Underline
39. A new network administrator has been asked to enter a banner message on a Cisco device.
What is the fastest way a network administrator could test whether the banner is properly
configured? Exit privileged EXEC mode and press Enter.
40. What is the function of the kernel of an operating software? The kernel provisions hardware
resources to meet software requirements.
41. Which command or key combination allows a user to return to the previous level in the
command hierarchy? Exit
42. What are two characteristics of RAM on a Cisco device? 1. The configuration that is actively
running on the device is stored in RAM.
2. The contents of RAM are lost during a power cycle.
43. Which interface is the default SVI on a Cisco switch? VLAN 1
44. A technician is adding a new PC to a LAN. After unpacking the components and making all the
connections, the technician starts the PC. After the OS loads, the technician opens a browser,
and verifies that the PC can reach the Internet. Why was the PC able to connect to the network
with no additional configuration? The PC was preconfigured to use DHCP.
45. Which two message timing mechanisms are used in data communication? (Choose
two.) response timeout, flow control
46. What is the name given to a one-to-many message delivery option? MULTICAST

What is a group of web pages that groups of individuals can edit and view together
called?
A. Podcasting
B. Wiki
C. Weblog (blog)
D. Instant messaging
B.
Podcasting and blogs allow the one-way dissemination of information. Instant
messaging allows the synchronous communication between individuals. A wiki allows
groups of individuals to view and edit web pages collaboratively.
Which of the following are disadvantages of peer-to-peer networking? (Choose 2)
A. Expensive to set up and maintain
B. No centralized administration
C. Complex configuration
D. Scalability
B, D.
Peer-to-peer networks are inexpensive and easy to configure but lack any centralized
management and do not scale well.
Which devices would be considered end devices on a network? (Choose 4)
A. Switch
B. Printer
C. IP phone
D. Server
E. Tablet computer
F. Wireless access point
B, C, D, E.
End devices form the interface between users and the underlying communication
network.
What type of information would be found on a logical topology diagram?
A. Location of department printer
B. Length and type of all cable runs
C. IP addressing scheme
D. Location of departmental switch
C.
Logical topology diagrams identify devices, ports, and IP addressing schemes. Physical
topology diagrams identify the physical location of intermediate devices, configured
ports, and cable installations.
What is a network infrastructure that provides access to other networks over a wide
geographic area?
A. LAN
B. WLAN
C. MAN
D. WAN
E. SAN
D.
A wide-area network (WAN) provides access to other networks over a wide geographic
area. A metropolitan-area network (MAN) spans an area larger than a local-area
network (LAN) and is typically operated by a single entity. A wireless LAN (WLAN) is
similar to a LAN, and a storage-area network (SAN) is designed to provide data storage,
retrieval, and replication.
Which of the following are business-class Internet connection technologies normally
supplied by a service provider? (Choose 2)
A. Leased lines
B. Broadband cable
C. Metro Ethernet
D. Mobile services
E. Cellular
A, C.
Leased line and Metro Ethernet are considered business-class Internet connection
technologies. Mobile services and broadband cable are considered technologies to
connect remote users.
Which technology would be best to provide a home user with a high-speed, always-on
Internet connection?
A. Dialup
B. DSL
C. Satellite
D. Cellular
B.
DSL is an always-on technology that offers good bandwidth at reasonable cost. Dialup
and cellular connections are not always-on technology and do not offer the same
bandwidth capabilities as DSL. Satellite and cellular connections are also relatively
expensive.
What is a converged network?
A. A network that makes use of both fiber-optic and copper connections.
B. A network where voice, video, and data move over the same infrastructure.
C. A network that makes use of both wired and wireless technology.
D. A network that makes use of both satellite and terrestrial connections to move data.
B.
A converged network is where voice, video, and data move over the same
infrastructure. The underlying infrastructure can be wired or wireless.
What is a fault-tolerant network?
A. A network that can provide priority treatment of voice and video traffic
B. A network that offers secure transactions
C. A network that can reroute traffic in case of device failure
D. A network that is incapable of failing
C.
A fault-tolerant network is one that can continue to function if an intermediate device or
path fails. A fault-tolerant network can fail if a sufficient number of intermediate deices
and/or paths fail.
What is true of Tier 3 ISPs?
A. They act as local providers of service directly to end users.
B. They Connect directly to Tier 1 ISPs.
C. They interconnect with other Tier 1 ISPs.
D. They provide high-speed redundant services to other ISPs.
A.
Tier 3 ISP are the local providers of service to end users. They normally connect to Tier
2 providers for Internet access.
Which type of traffic must receive the highest priority from QoS?
A. Web traffic
B. Email
C. VoIP
D. Order processing
C.
Quality of Service (QoS) prioritizes data based on many factors including the traffic's
sensitivity to network delay. Voice over IP (VoIP) is very sensitive to network delay and
must be given priority treatment.
What are the primary requirements of information security? (Choose 3)
A. Confidentiality
B. Integrity
C. Availability
D. QoS
E. Scalability
A, B, C.
Information security includes ensuring that only the intended recipient can access the
data (confidentiality), ensuring that the data has not been altered in transmission
(integrity), and that the information is available in a timely manner (availability). Quality
of service is not a primary requirement of information security.
List four current network trends.
The ready availability of network resources continues to change the way we work, play,
and learn. Some of the current trends include the increased use of video, the use of
client end-user-supplied devices on corporate networks (BYOD), the increased use of
collaborative technologies, and a migration to cloud computing.
Describe some common everyday uses of a modern-day network.
Networks have changed the way we live our everyday lives. Some examples of ways
that networks are used include:
-Checking the weather forecast
-Watching movies
-Sharing photographs and movies
-Playing games
-Checking our bank balance
-Taking an online class
In what ways has the network transformed the way we learn?
Networks extend the learning environment into the virtual world by providing tools for
collaboration and mobility, thus creating a global classroom. Some of the ways that the
learning environment has been transformed by networks include:
-Creates virtual classrooms
-Enables mobile learning
-Creates collaborative learning spaces
-Provides enhanced tracking of student performance
-Provides a global learning environment

What are two benefits of collaboration and video-on-demand applications? (Choose


two.)
providing a richer e-learning environment

providing better social media opportunities


Which type of network design combines voice, video, and data on the same
communication channel?
a converged network
Which two statements correctly define types of network infrastructure? (Choose two.)
A WLAN is designed to wirelessly interconnect users and end points in a small
geographical area.
A SAN is designed to support data storage, retrieval, and replication.
The farther you are from the central office when utilizing a DSL connection, the
SLOWER connection speed.
...
Which statement describes a network that supports QoS?
The network provides predictable levels of service to different types of traffic.
A SCALABLE network is able to expand to accept new devices and applications without
affecting performance.
...
An INTRANET is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees of
the organization, or others with authorization.
...
BYOD
allows the end user to use personal tools to communicate across business or campus
networks
During a routine inspection, a technician discovered that software that was installed on
a computer was secretly collecting data about websites that were visited by users of the
computer. Which type of threat is affecting this computer?
spyware
For which three reasons was a packet-switched connectionless data communications
technology used when developing the Internet? (Choose three.)
It can rapidly adapt to the failure of network devices and communication links.
Data packets can travel through the network using multiple different paths.
Network devices dynamically decide on the best available path to forward each packet.
A data center has recently updated a physical server to host multiple operating systems
on a single CPU. The data center can now provide each customer with a separate web
server without having to allocate an actual discrete server for each customer. What is
the networking trend that is being implemented by the data center in this situation?
virtualization
In which scenario would the use of a WISP be recommended?
an apartment in a building with cable access to the Internet

Which device is usually the first line of defense in a layered defense-in-depth approach?

internal router

access layer switch

edge router

firewall
edge router
A company has a file server that shares a folder named Public. The network security
policy specifies that the Public folder is assigned Read-Only rights to anyone who can
log into the server while the Edit rights are assigned only to the network admin group.
Which component is addressed in the AAA network service framework?

authorization

automation

accounting

authentication
authentication
Which type of access control applies the strictest access control and is commonly used
in military or mission critical applications?
attribute-based access control (ABAC)

mandatory access control (MAC)

discretionary access control (DAC)

Non-discretionary access control


mandatory access control (MAC)
A company is experiencing overwhelming visits to a main web server. The IT
department is developing a plan to add a couple more web servers for load balancing
and redundancy. Which requirement of information security is addressed by
implementing the plan?

confidentiality

availability

scalability

integrity
availability
What service determines which resources a user can access along with the operations
that a user can perform?

token

authentication

accounting

biometric

authorization
authorization
In a defense-in-depth approach, which three options must be identified to effectively
defend a network against attacks? (Choose three.)

assets that need protection

location of attacker or attackers

threats to assets

total number of devices that attach to the wired and wireless network
past security breaches

vulnerabilities in the system


vulnerabilities in the system,
threats to assets,
assets that need protection
Which two areas must an IT security person understand in order to identify
vulnerabilities on a network? (Choose two.)

hardware used by applications

number of systems on each network

network baseline data

data analysis trends

important applications used


hardware used by applications

important applications used


Which method is used to make data unreadable to unauthorized users?

Fragment the data.

Encrypt the data.

Assign it a username and password.

Add a checksum to the end of the data.


Encrypt the data.
Which section of a security policy is used to specify that only authorized individuals
should have access to enterprise data?

identification and authentication policy

campus access policy

Internet access policy

acceptable use policy

statement of scope

statement of authority
identification and authentication policy
What is the principle of least privilege access control model?

Users control access to data they own.

Users are granted the strictest access control possible to data.

Users are granted rights on an as-needed approach.

User access to data is based on object attributes.


Users are granted rights on an as-needed approach.
What component of a security policy explicitly defines the type of traffic allowed on a
network and what users are allowed and not allowed to do?

identification and authentication policies

acceptable use policies

remote access policies

password policies
acceptable use policies
Which three services are provided by the AAA framework? (Choose three.)

autoconfiguration

accounting

authorization

authentication

automation

autobalancing
accounting

authorization

authentication
A web server administrator is configuring access settings to require users to
authenticate first before accessing certain web pages. Which requirement of information
security is addressed through the configuration?

scalability

integrity
availability

confidentiality
confidentiality
Which statement describes a difference between RADIUS and TACACS+?

RADIUS is supported by the Cisco Secure ACS software whereas TACACS+ is not.

RADIUS separates authentication and authorization whereas TACACS+ combines them


as one process.

RADIUS uses TCP whereas TACACS+ uses UDP.

RADIUS encrypts only the password whereas TACACS+ encrypts all communication.
RADIUS encrypts only the password whereas TACACS+ encrypts all
communication
How does BYOD change the way in which businesses implement networks?

BYOD requires organizations to purchase laptops rather than desktops.

BYOD devices are more expensive than devices that are purchased by an organization.

BYOD users are responsible for their own network security, thus reducing the need for
organizational security policies.

BYOD provides flexibility in where and how users can access network resources.
BYOD provides flexibility in where and how users can access network resources.
What is the purpose of mobile device management (MDM) software?

It is used to create a security policy.

It is used to implement security policies, setting, and software configurations on mobile


devices.

It is used by threat actors to penetrate the system.

It is used to identify potential mobile device vulnerabilities.


It is used to implement security policies, setting, and software configurations on mobile
devices.
What three items are components of the CIA triad? (Choose three.)

intervention

availability
scalability

confidentiality

access

integrity
availability,
confidentiality,
integrity
In threat intelligence communications, what set of specifications is for exchanging
cyberthreat information between organizations?

Automated indicator sharing (AIS)

Structured threat information expression (STIX)

Trusted automated exchange of indicator information (TAXII)

Common vulnerabilities and exposures (CVE)


Structured threat information expression (STIX)
Which technology provides the framework to enable scalable access security?

role-based CLI access

authentication, authorization, and accounting

AutoSecure

Simple Network Management Protocol

Cisco Configuration Professional communities


authentication, authorization, and accounting
Which AAA component can be established using token cards?

authentication

accounting

auditing

authorization
authentication
defines system requirements and objectives, rules, and requirements for users when
they attach to or on the network
security
protects the rights of workers and the company interests
Company
identifies salary, pay schedule, benefits, work schedule, vacations,
employee

You might also like