100% found this document useful (1 vote)
805 views

Datacom Net1

The document appears to be a summary of a student's performance on a quiz for their UGRD-IT6201 Data Communications and Networking 1 course. It shows that the student answered 23 questions correctly out of 23 questions for a score of 99%. It provides feedback for each question confirming the student's answers were correct.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
805 views

Datacom Net1

The document appears to be a summary of a student's performance on a quiz for their UGRD-IT6201 Data Communications and Networking 1 course. It shows that the student answered 23 questions correctly out of 23 questions for a score of 99%. It provides feedback for each question confirming the student's answers were correct.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 292

UGRD-IT6201 Data Communications and

Networking 1
1. Dashboard
2. My courses
3. UGRD-IT6201-2023T
4. Week 2: Configuring a Network Operating System
5. Prelim Quiz 1

Started on Sunday, 29 November 2020, 3:21 PM


State Finished
Completed on Sunday, 29 November 2020, 3:32 PM
Time taken 11 mins 21 secs
Grade 39.67 out of 40.00 (99%)
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the Cisco IOS?

Select one:
a.
The configuration for the Cisco network device
b.
The CPU for the Cisco network device

c.
The memory for the Cisco network device
d.
The operating system for the Cisco network device
Feedback
Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?

Select one:
a.
Type help and press the Enter key at the prompt
b.
Type the command and then press the? key
c.
Type the command and then press CTRL-C
d.
Type the command and then press the Tab key
e.
Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.

Question 3
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Why would a technician enter the command copy startup-config running
config?

Select one:
a.
to save an active configuration to NVRAM
b.
to make a changed configuration the new startup configuration
c.
to remove all configuration from the switch
d.
to copy an existing configuration into RAM
Feedback
Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?

Select one:
a.
a traditional network
b.
an extranet
c.
a storage area network
d.
a converged network
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?

Select one:
a.
virtualization
b.
maintaining communication integrity
c.
BYOD
d.
online collaboration
Feedback
Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An Answer  is a private connection of LANs and WANs that belongs
INTRANET

to an organization, and is designed to be accessible only by the members


and employees of the organization, or others with authorization.

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)

Select one or more:


a.
Scalability
b.
Expensive to set up and maintain
c.
No centralized administration
d.
Complex configuration
Feedback
Your answer is correct.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a wiki?

Select one:
a.
a web page that groups of people can edit and review
b.
an audio-based medium that is used to deliver information to a wide
audience
c.
an online meeting
d.
a personal journal that is posted on the internet
Feedback
Your answer is correct.

Question 9
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which type of traffic must receive the highest priority from QoS?

Select one:
a.
VoIP
b.
Web traffic
c.
Order processing
d.
Email
Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the primary defense against unauthorized remote access to
network devices?

Select one:
a.
Configuring a VTY password
b.
Configuring a default gateway
c.
Configuring a console password
d.
Configuring an IP address
Feedback
Your answer is correct.

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?

Select one:
a.
It does not allow spaces
b.
It cannot start with a number
c.
Its maximum length is 255 characters.
d.
It must be registered with a DNS server
Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?

Select one:
a.
DSL
b.
Satellite
c.
Cellular
d.
Dial-up
Feedback
Your answer is correct.

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a group of web pages that groups of individuals can edit and view
together called?

Select one:
a.
Instant messaging
b.
TelePresence endpoint
c.
Wiki
d.
Access point
e.
Podcasting
f.
Weblog (blog)
Feedback
Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A Answer  network is able to expand to accept new devices and
Scalable

applications without affecting performance.

Question 15
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)

Select one or more:


a.
Mobile services
b.
Metro Ethernet
c.
Broadband cable
d.
Leased lines
e.
Cellular
Feedback
Your answer is correct.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?

Select one:
a.
WLAN
b.
LAN
c.
MAN
d.
SAN     
e.
WAN
Feedback
Your answer is correct.

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?

Select one:
a.
Switch# sh?
b.
Switch# status?
c.
Switch# show?
d.
Switch# help
Feedback
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Select one:
a.
Command
b.
A space
c.
Argument
d.
Keyword  
Feedback
Your answer is correct.

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:
a.
Telnet access
b.
password encryption
c.
physical switchport access
d.
SVI
Feedback
Your answer is correct.

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended

Select one:
a.
an Internet cafe in a city
b.
a farm in rural area without wired broadband access
c.
any home with multiple wireless devices
d.
an apartment in a building with cable access to the Internet

Feedback
Your answer is correct.

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?

Select one:
a.
identity theft
b.
zero – day attack
c.
spyware
d.
DoS attack
Feedback
Your answer is correct.
Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
How is the Cisco IOS generally accessed and navigated?

Select one:
a.
Through the CLI using a terminal emulator
b.
With a Cisco-proprietary application
c.
By the use of a custom GUI
d.
Using a web browser
Feedback
Your answer is correct.

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which devices would be considered end devices on a network? (Choose
four.)

Select one or more:


a.
Wireless access point
b.
IP phone
c.
Server
d.
Tablet computer
e.
Switch
f.
Printer
Feedback
Your answer is correct.

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)

Select one or more:


a.
ensuring a more reliable network
b.
providing faster, more secure business communications
c.
providing data storage and retrieval to a business
d.
providing better social media opportunities
e.
providing a richer e-learning environment
f.
providing a richer e-learning environment
Feedback
Your answer is correct.

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Select one:
a.
IP addressing scheme
b.
Length and type of all cable runs
c.
Location of departmental switch
d.
Location of departmental printer
Feedback
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?

Select one:
a.
AUX port
b.
Web interface
c.
SSH
d.
Console port
e.
Telnet
Feedback
Your answer is correct.

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended?

Select one:
a.
an Internet cafe in a city
b.
a farm in a rural area without wired broadband access
c.
an apartment in a building with cable access to the Internet
d.
any home with multiple wireless devices
Feedback
Your answer is correct.

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Why would a network administrator use the CLI of the Cisco IOS?

Select one:
a.
to add a password to a Cisco network device
b.
to provide automatic (unmanned) management of Cisco network devices
c.
to monitor the number of times a device has been powered on and of
d.
to test the performance on a particular LAN
Feedback
Your answer is correct.

Question 29
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a converged network?

Select one:
a.
A network that makes use of both fiber-optic and copper connections
b.
A network where voice, video, and data move over the same infrastructure
c.
A network that makes use of both wired and wireless technology
d.
A network that makes use of both wired and wireless technology
Feedback
Your answer is correct.

Question 30
Correct
Mark 1.00 out of 1.00

Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?

Select one:
a.
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has
been pressed.
b.
Copy the running configuration to the startup configuration file.
c.
Copy the information in the startup configuration file to the running
configuration
d.
Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is encrypted with the enable secret command?

Select one:
a.
the consoled line password
b.
the VTY line password
c.
all configured passwords
d.
the privileged executive mode password
Feedback
Your answer is correct.

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Where is the configuration used during startup on Cisco IOS devices
located?

Select one:
a.
NVRAM
b.
Startup config
c.
Terminal emulator
d.
Running config
Feedback
Your answer is correct.
Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?

Select one:
a.
local router
b.
local switch
c.
DNS server
d.
DHCP server
Feedback
Your answer is correct.

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:
a.
Ctrl-N
b.
Ctrl-P
c.
Right Arrow
d.
Tab
e.
Up Arrow
f.
Down Arrow
Feedback
Your answer is correct.

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a fault-tolerant network?

Select one:
a.
A network that offers secure transactions
b.
A network that can provide priority treatment of voice and video traffic
c.
A network that is incapable of failing
d.
A network that can reroute traffic in case of device failure
Feedback
Your answer is correct.

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?

Select one:
a.
EaSt-2+56(config)#
b.
EaSt-58(config)#
c.
East-2+56(config)#
d.
% Invalid input detected
e.
Switch EaSt-2+56(config)#
f.
Switch(config)#
Feedback
Your answer is correct.

Question 37
Partially correct
Mark 0.67 out of 1.00

Flag question

Question text
What are the primary requirements of information security? (Choose three.)

Select one or more:


a.
Scalability
b.
Confidentiality
c.
Integrity
d.
Availability
e.
QoS
Feedback
Your answer is partially correct.
You have correctly selected 2.

Question 38
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which statement describes a network that supports QoS?

Select one:
a.
Data sent over the network is not altered in transmission
b.
The network should be able to expand to keep up with user demand
c.
The network provides predictable levels of service to different types of
traffic
d.
The fewest possible devices are affected by a failure
Feedback
Your answer is correct.

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)

Select one or more:


a.
It requires that a data circuit between the source and destination be
established before data can be transferred.
b.
it allows for billing of network use by the amount of time a connection is
established
c.
Network devices dynamically decide on the best available path to forward
each packet.
d.
Data packets can travel through the network using multiple different paths
e.
it can rapidly adapt to the failure of network devices and communication
links
Feedback
Your answer is correct.

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er

 the connection speed

UGRD-IT6201 Data Communications and


Networking 1
1. Dashboard
2. My courses
3. UGRD-IT6201-2023T
4. Week 2: Configuring a Network Operating System
5. Prelim Quiz 1

Started on Sunday, 29 November 2020, 3:21 PM


State Finished
Completed on Sunday, 29 November 2020, 3:32 PM
Time taken 11 mins 21 secs
Grade 39.67 out of 40.00 (99%)
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the Cisco IOS?

Select one:
a.
The configuration for the Cisco network device
b.
The CPU for the Cisco network device

c.
The memory for the Cisco network device
d.
The operating system for the Cisco network device
Feedback
Your answer is correct.
Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?

Select one:
a.
Type help and press the Enter key at the prompt
b.
Type the command and then press the? key
c.
Type the command and then press CTRL-C
d.
Type the command and then press the Tab key
e.
Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.

Question 3
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Why would a technician enter the command copy startup-config running
config?

Select one:
a.
to save an active configuration to NVRAM
b.
to make a changed configuration the new startup configuration
c.
to remove all configuration from the switch
d.
to copy an existing configuration into RAM
Feedback
Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?

Select one:
a.
a traditional network
b.
an extranet
c.
a storage area network
d.
a converged network
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?

Select one:
a.
virtualization
b.
maintaining communication integrity
c.
BYOD
d.
online collaboration
Feedback
Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An Answer  is a private connection of LANs and WANs that belongs
INTRANET

to an organization, and is designed to be accessible only by the members


and employees of the organization, or others with authorization.

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)

Select one or more:


a.
Scalability
b.
Expensive to set up and maintain
c.
No centralized administration
d.
Complex configuration
Feedback
Your answer is correct.
Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a wiki?

Select one:
a.
a web page that groups of people can edit and review
b.
an audio-based medium that is used to deliver information to a wide
audience
c.
an online meeting
d.
a personal journal that is posted on the internet
Feedback
Your answer is correct.

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of traffic must receive the highest priority from QoS?

Select one:
a.
VoIP
b.
Web traffic
c.
Order processing
d.
Email
Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the primary defense against unauthorized remote access to
network devices?

Select one:
a.
Configuring a VTY password
b.
Configuring a default gateway
c.
Configuring a console password
d.
Configuring an IP address
Feedback
Your answer is correct.

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?

Select one:
a.
It does not allow spaces
b.
It cannot start with a number
c.
Its maximum length is 255 characters.
d.
It must be registered with a DNS server
Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:
a.
DSL
b.
Satellite
c.
Cellular
d.
Dial-up
Feedback
Your answer is correct.

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a group of web pages that groups of individuals can edit and view
together called?

Select one:
a.
Instant messaging
b.
TelePresence endpoint
c.
Wiki
d.
Access point
e.
Podcasting
f.
Weblog (blog)
Feedback
Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A Answer  network is able to expand to accept new devices and
Scalable

applications without affecting performance.

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)

Select one or more:


a.
Mobile services
b.
Metro Ethernet
c.
Broadband cable
d.
Leased lines
e.
Cellular
Feedback
Your answer is correct.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?

Select one:
a.
WLAN
b.
LAN
c.
MAN
d.
SAN     
e.
WAN
Feedback
Your answer is correct.

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?

Select one:
a.
Switch# sh?
b.
Switch# status?
c.
Switch# show?
d.
Switch# help
Feedback
Your answer is correct.

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?

Select one:
a.
Command
b.
A space
c.
Argument
d.
Keyword  
Feedback
Your answer is correct.

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:
a.
Telnet access
b.
password encryption
c.
physical switchport access
d.
SVI
Feedback
Your answer is correct.

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended

Select one:
a.
an Internet cafe in a city
b.
a farm in rural area without wired broadband access
c.
any home with multiple wireless devices
d.
an apartment in a building with cable access to the Internet

Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?

Select one:
a.
identity theft
b.
zero – day attack
c.
spyware
d.
DoS attack
Feedback
Your answer is correct.

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
How is the Cisco IOS generally accessed and navigated?

Select one:
a.
Through the CLI using a terminal emulator
b.
With a Cisco-proprietary application
c.
By the use of a custom GUI
d.
Using a web browser
Feedback
Your answer is correct.

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which devices would be considered end devices on a network? (Choose
four.)

Select one or more:


a.
Wireless access point
b.
IP phone
c.
Server
d.
Tablet computer
e.
Switch
f.
Printer
Feedback
Your answer is correct.

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)

Select one or more:


a.
ensuring a more reliable network
b.
providing faster, more secure business communications
c.
providing data storage and retrieval to a business
d.
providing better social media opportunities
e.
providing a richer e-learning environment
f.
providing a richer e-learning environment
Feedback
Your answer is correct.

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What type of information would be found on a logical topology diagram?

Select one:
a.
IP addressing scheme
b.
Length and type of all cable runs
c.
Location of departmental switch
d.
Location of departmental printer
Feedback
Your answer is correct.

Question 26
Correct
Mark 1.00 out of 1.00

Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?

Select one:
a.
AUX port
b.
Web interface
c.
SSH
d.
Console port
e.
Telnet
Feedback
Your answer is correct.

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended?

Select one:
a.
an Internet cafe in a city
b.
a farm in a rural area without wired broadband access
c.
an apartment in a building with cable access to the Internet
d.
any home with multiple wireless devices
Feedback
Your answer is correct.

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Why would a network administrator use the CLI of the Cisco IOS?

Select one:
a.
to add a password to a Cisco network device
b.
to provide automatic (unmanned) management of Cisco network devices
c.
to monitor the number of times a device has been powered on and of
d.
to test the performance on a particular LAN
Feedback
Your answer is correct.

Question 29
Correct
Mark 1.00 out of 1.00
Flag question

Question text
What is a converged network?

Select one:
a.
A network that makes use of both fiber-optic and copper connections
b.
A network where voice, video, and data move over the same infrastructure
c.
A network that makes use of both wired and wireless technology
d.
A network that makes use of both wired and wireless technology
Feedback
Your answer is correct.

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?

Select one:
a.
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has
been pressed.
b.
Copy the running configuration to the startup configuration file.
c.
Copy the information in the startup configuration file to the running
configuration
d.
Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is encrypted with the enable secret command?

Select one:
a.
the consoled line password
b.
the VTY line password
c.
all configured passwords
d.
the privileged executive mode password
Feedback
Your answer is correct.

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Where is the configuration used during startup on Cisco IOS devices
located?

Select one:
a.
NVRAM
b.
Startup config
c.
Terminal emulator
d.
Running config
Feedback
Your answer is correct.

Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?

Select one:
a.
local router
b.
local switch
c.
DNS server
d.
DHCP server
Feedback
Your answer is correct.

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?

Select one:
a.
Ctrl-N
b.
Ctrl-P
c.
Right Arrow
d.
Tab
e.
Up Arrow
f.
Down Arrow
Feedback
Your answer is correct.

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a fault-tolerant network?

Select one:
a.
A network that offers secure transactions
b.
A network that can provide priority treatment of voice and video traffic
c.
A network that is incapable of failing
d.
A network that can reroute traffic in case of device failure
Feedback
Your answer is correct.

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?

Select one:
a.
EaSt-2+56(config)#
b.
EaSt-58(config)#
c.
East-2+56(config)#
d.
% Invalid input detected
e.
Switch EaSt-2+56(config)#
f.
Switch(config)#
Feedback
Your answer is correct.

Question 37
Partially correct
Mark 0.67 out of 1.00

Flag question
Question text
What are the primary requirements of information security? (Choose three.)

Select one or more:


a.
Scalability
b.
Confidentiality
c.
Integrity
d.
Availability
e.
QoS
Feedback
Your answer is partially correct.
You have correctly selected 2.

Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a network that supports QoS?

Select one:
a.
Data sent over the network is not altered in transmission
b.
The network should be able to expand to keep up with user demand
c.
The network provides predictable levels of service to different types of
traffic
d.
The fewest possible devices are affected by a failure
Feedback
Your answer is correct.

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)

Select one or more:


a.
It requires that a data circuit between the source and destination be
established before data can be transferred.
b.
it allows for billing of network use by the amount of time a connection is
established
c.
Network devices dynamically decide on the best available path to forward
each packet.
d.
Data packets can travel through the network using multiple different paths
e.
it can rapidly adapt to the failure of network devices and communication
links
Feedback
Your answer is correct.

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er

 the connection speed

UGRD-IT6201 Data Communications and


Networking 1
1. Dashboard
2. My courses
3. UGRD-IT6201-2023T
4. Week 3 & 4: Network Protocols and Communications and Network Access
5. Prelim Quiz 2

Started on Sunday, 29 November 2020, 3:46 PM


State Finished
Completed on Sunday, 29 November 2020, 4:15 PM
Time taken 29 mins 27 secs
Grade 32.00 out of 35.00 (91%)
Question 1
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
What organization is responsible for the overall management and
development of Internet standards?

Select one:
a.
IETF
b.
IAB
c.
IRTF
d.
IEEE
e.
ISO
Feedback
Your answer is incorrect.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following elements do both human and computer
communication systems have in common? (Choose three.)
Select one or more:
a.
Source
b.
Keyboard
c.
Default gateway
d.
Channel
e.
Receiver
Feedback
Your answer is correct.

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is and advantage of using standards to develop and
implement protocols?

Select one:
a.
A particular protocol can be implemented by one manufacturer
b.
Products from different manufacturers can interoperate successfully
c.
Standards provide flexibility for manufacturers to create devices that
comply with unique requirements
d.
Different manufacturers are free to apply different requirements when
implementing a protocol
Feedback
Your answer is correct.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which application layer protocol allows users on one network to reliably
transfer files to and from a host on another network?

Select one:
a.
HTTP
b.
FTP
c.
IMAP
d.
TFTP
e.
DHCP
Feedback
Your answer is correct.
Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which message delivery option is used when all devices need to receive the
same message simultaneously?

Select one:
a.
multicast
b.
duplex
c.
unicast
d.
broadcast
Feedback
Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following TCP/IP protocols exist at the transport layer of the
TCP/IP reference model? (Choose two.)
Select one or more:
a.
TCP
b.
FTP
c.
HTTP
d.
UDP
e.
DNS
Feedback
Your answer is correct.

Question 7
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which message timing factor impacts how much information can be sent
and the speed at which it can be delivered?

Select one:
a.
Response timeout  
b.
Access method
c.
Delay speed
d.
Flow control
Feedback
Your answer is incorrect.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two statements are true of the deterministic access method?(Choose
two.)

Select one or more:


a.
Devices take turns transmitting
b.
Each device has to transmit before passing the token to the next device
c.
The order of transmission is dictated by the node that asks first for the
token
d.
The throughput is predictable
e.
It is a very efficient method because there are no collisions

Feedback
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is an advantage of using standards to develop and
implement protocols?

Select one:
a.
Products from different manufacturers can interoperate successfully
b.
Different manufacturers are free to apply different requirements when
implementing a protocol
c.
Standard provide flexibility for manufacturers to create devices that comply
with unique requirements
d.
A particular protocol can only be implemented by one manufacturer
Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What command will prevent all unencrypted passwords from displaying in
plain text in a configuration file?

Select one:
a.
(config) # enable secret Encrypted_Password
b.
(config-line) # password secret
c.
(config) # enable secret Secret_Password
d.
(config) # service password-encryption
e.
(config)# enable password secret
Feedback
Your answer is correct.

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which organization develops the 802 family of standard for wired and
wireless LANs and MANs?

Select one:
a.
IEEE
b.
ISO
c.
ISOC
d.
IANA
e.
ITU-T
Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which OSI reference model layer is responsible for common representation
of the data transferred between application layer services?

Select one:
a.
Session
b.
Network
c.
Physical
d.
Data link
e.
Transport
f.
Application
g.
Presentation
Feedback
Your answer is correct.

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two factors influence the method that is used for media access
control? (Choose two.)

Select one or more:


a.
how connection between nodes appears to the data link layer
b.
how signals are encoded by the NICs on end devices
c.
how nodes share the media
d.
how data is generated by end devices applications
e.
how the IP protocol forwards the packet to the destination
Feedback
Your answer is correct.
Question 14
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which of the following OSI model layers have the same functionality as the
network access layer in the TCP/IP model? (Choose two.)

Select one or more:


a.
Network
b.
Data link
c.
Application
d.
Physical
e.
Presentation
f.
Session
g.
Transport
Feedback
Your answer is incorrect.

Question 15
Correct
Mark 1.00 out of 1.00
Flag question

Question text
What name is given to a group of interrelated protocols necessary to
perform a communication function?

Select one:
a.
Functional collection
b.
Protocol suite
c.
Protocol stack
d.
Functional protocol
Feedback
Your answer is correct.

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In fiber optic meda, the signals are represented as patterns of Answer
.
Light

Question 17
Correct
Mark 1.00 out of 1.00
Flag question

Question text
What type of protocol describes communication over a data link and the
physical transmission of data on the network media?

Select one:
a.
Application protocol
b.
Internet protocol
c.
Transport protocol
d.
Network access protocol
Feedback
Your answer is correct.

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which TCP/IP model layer is responsible for providing the best path
through the network?

Select one:
a.
Application
b.
Internet
c.
Network Access
d.
Transport
Feedback
Your answer is correct.

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which organization is responsible for developing communications
standards for Voice over IP (VoIP) devices?

Select one:
a.
The Internet Corporation for Assigned Names and Numbers (ICANN)
b.
The Electronics Industry Alliance (EIA)
c.
The Telecommunications Industry Association (TIA)
d.
The International Telecommunications Union-Telecommunications
Standardization Sector (ITU-T)
Feedback
Your answer is correct.

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What happens to frames that are too long or too short for the channel
used?

Select one:
a.
They are delivered but much slower than proper-size frames.
b.
They are dropped.
c.
They clog the network and block the delivery of other frames.
d.
They are returned to the sender.
e.
They are broken up into smaller pieces.
Feedback
Your answer is correct.

Question 21
Correct
Mark 1.00 out of 1.00

Flag question
Question text
What three functions are defined by network protocols to allow
communication between known source and destination IP addresses?
(Choose three.)

Select one or more:


a.
message size
b.
delivery options
c.
end-device installation
d.
media selection
e.
data encoding
f.
connector specifications
Feedback
Your answer is correct.

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the name given to a one-to-many message delivery option?

Select one:
a.
Unicast
b.
Broadcast
c.
Manycast
d.
Multicast
Feedback
Your answer is correct.

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two statements are true regarding the user EXEC mode? (Choose
two.)

Select one or more:


a.
All router commands are available
b.
This is the default mode on an unconfigured router when first powered up.
c.
Only some aspects of the router configuration can be viewed
d.
Global configuration mode can be accessed by entering the enable
command
e.
Interfaces and routing protocols can be configured
Feedback
Your answer is correct.

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What will a network administrator use to modify a configuration on a Cisco
router?

Select one:
a.
a control panel

b.
Windows Explorer
c.
a DHCP server
d.
the Windows command prompt
e.
IOS
Feedback
Your answer is correct.

Question 25
Correct
Mark 1.00 out of 1.00
Flag question

Question text
What is the transport layer PDU?

Select one:
a.
Segment
b.
Data
c.
Packet
d.
Bit
e.
Frame
Feedback
Your answer is correct.

Question 26
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the purpose of protocols in data communications?

Select one:
a.
specifying the device operating systems that will support the
communication
b.
determining the electronic specifications to enable the communication
c.
providing the rules required for a specific type of communication to occur
d.
specifying the bandwidth of the channel or medium for each type of
communication
Feedback
Your answer is correct.

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are examples of proprietary protocols? (Choose
two.)

Select one or more:


a.
ISO
b.
TCP/IP
c.
AppleTalk
d.
Novell NetWare
Feedback
Your answer is correct.

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which organization is responsible for the standard that defines Media
Access Control for wired Ethernet?

Select one:
a.
ISO
b.
IAB
c.
IETF
d.
IEEE
e.
ISOC
Feedback
Your answer is correct.

Question 29
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which two message timing mechanisms are used in data communication?
(Choose two.)

Select one or more:


a.
formatting
b.
encapsulation
c.
encoding
d.
flow control
e.
response timeout
Feedback
Your answer is correct.

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which is a function of the Logical Link Control (LLC) sublayer?

Select one:
a.
to define the media access processes that are performed by the hardware
b.
to identify which network layer protocol is being used
c.
to accept segments and package them into data units that are called
packets
d.
to provide data link layer addressing
Feedback
Your answer is correct.

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement is correct about network protocols?

Select one:
a.
They are only required for exchange of message between devices on
remote network
b.
They define how messages are exchanged between the sources and the
destination
c.
They all function in the network access layer of TCP/IP
d.
Network protocols define the type of hardware that is used and how it is
mounted in racks
Feedback
Your answer is correct.

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What happens when two devices on the same subnet are communicating?

Select one:
a.
The frame will be sent to the default gateway for delivery to the receiving
device
b.
The sending device will use ARP to determine the IP address of the receiver
c.
The host portion of the IP addresses will be different
d.
The data link layer addresses are added to the IP header
Feedback
Your answer is correct.

Question 33
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which logical address is used for delivery of data to a remote network?

Select one:
a.
destination IP address
b.
source IP address
c.
source MAC address
d.
destination MAC address
e.
destination port number
Feedback
Your answer is correct.

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A Answer  address is defined as a reserved address that routes
Loopback

packets back to the host

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two components are added to the PDU at the network access layer?
(Choose two.)

Select one or more:


a.
HTTP header
b.
IP header
c.
frame header
d.
Trailer
e.
TCP header
Feedback
Your answer is correct.

Started on Sunday, 29 November 2020, 3:21 PM

State Finished

Completed on Sunday, 29 November 2020, 3:32 PM

Time taken 11 mins 21 secs

Grade 39.67 out of 40.00 (99%)


Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the Cisco IOS?
Select one:

a.

The configuration for the Cisco network device


b.

The CPU for the Cisco network device

c.

The memory for the Cisco network device


d.

The operating system for the Cisco network device


Feedback
Your answer is correct.

Question 2
Correct

Mark 1.00 out of 1.00


Flag question

Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:

a.

Type help and press the Enter key at the prompt


b.

Type the command and then press the? key


c.

Type the command and then press CTRL-C


d.

Type the command and then press the Tab key


e.

Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Why would a technician enter the command copy startup-config running
config?
Select one:

a.

to save an active configuration to NVRAM


b.

to make a changed configuration the new startup configuration


c.

to remove all configuration from the switch


d.

to copy an existing configuration into RAM


Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:

a.

a traditional network
b.

an extranet
c.

a storage area network


d.

a converged network
Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
Select one:

a.

virtualization
b.

maintaining communication integrity


c.

BYOD
d.

online collaboration
Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
An Answer  is a private connection of LANs and WANs that belongs
INTRANET

to an organization, and is designed to be accessible only by the members


and employees of the organization, or others with authorization.
Question 7
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:

a.

Scalability
b.

Expensive to set up and maintain


c.

No centralized administration
d.

Complex configuration
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a wiki?
Select one:

a.

a web page that groups of people can edit and review


b.

an audio-based medium that is used to deliver information to a wide


audience
c.

an online meeting
d.

a personal journal that is posted on the internet


Feedback
Your answer is correct.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which type of traffic must receive the highest priority from QoS?
Select one:

a.

VoIP
b.

Web traffic
c.

Order processing
d.

Email
Feedback
Your answer is correct.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:

a.

Configuring a VTY password


b.

Configuring a default gateway


c.

Configuring a console password


d.

Configuring an IP address
Feedback
Your answer is correct.

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?
Select one:

a.

It does not allow spaces


b.

It cannot start with a number


c.

Its maximum length is 255 characters.


d.

It must be registered with a DNS server


Feedback
Your answer is correct.

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:

a.

DSL
b.

Satellite
c.

Cellular
d.

Dial-up
Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:

a.

Instant messaging
b.

TelePresence endpoint
c.

Wiki
d.

Access point
e.

Podcasting

f.

Weblog (blog)
Feedback
Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00


Flag question

Question text
A Answer  network is able to expand to accept new devices and
Scalable

applications without affecting performance.


Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:

a.

Mobile services
b.

Metro Ethernet
c.

Broadband cable
d.

Leased lines
e.

Cellular
Feedback
Your answer is correct.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:

a.

WLAN
b.

LAN
c.

MAN
d.

SAN     
e.

WAN
Feedback
Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:

a.

Switch# sh?
b.

Switch# status?
c.

Switch# show?
d.

Switch# help
Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:

a.

Command
b.

A space
c.

Argument
d.

Keyword  
Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:

a.

Telnet access
b.

password encryption
c.

physical switchport access


d.

SVI
Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended
Select one:

a.

an Internet cafe in a city


b.

a farm in rural area without wired broadband access


c.

any home with multiple wireless devices


d.

an apartment in a building with cable access to the Internet

Feedback
Your answer is correct.

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:
a.

identity theft
b.

zero – day attack


c.

spyware
d.

DoS attack
Feedback
Your answer is correct.

Question 22
Correct

Mark 1.00 out of 1.00

Flag question

Question text
How is the Cisco IOS generally accessed and navigated?
Select one:

a.

Through the CLI using a terminal emulator


b.

With a Cisco-proprietary application


c.

By the use of a custom GUI


d.

Using a web browser


Feedback
Your answer is correct.

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:

a.

Wireless access point


b.

IP phone
c.

Server
d.

Tablet computer
e.

Switch
f.

Printer
Feedback
Your answer is correct.

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:

a.

ensuring a more reliable network


b.

providing faster, more secure business communications


c.

providing data storage and retrieval to a business


d.

providing better social media opportunities


e.

providing a richer e-learning environment


f.

providing a richer e-learning environment


Feedback
Your answer is correct.

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of information would be found on a logical topology diagram?
Select one:

a.

IP addressing scheme
b.

Length and type of all cable runs


c.

Location of departmental switch


d.

Location of departmental printer


Feedback
Your answer is correct.

Question 26
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:

a.

AUX port
b.

Web interface
c.

SSH
d.

Console port
e.

Telnet
Feedback
Your answer is correct.
Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended?
Select one:

a.

an Internet cafe in a city


b.

a farm in a rural area without wired broadband access


c.

an apartment in a building with cable access to the Internet


d.

any home with multiple wireless devices


Feedback
Your answer is correct.

Question 28
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:

a.

to add a password to a Cisco network device


b.

to provide automatic (unmanned) management of Cisco network devices


c.

to monitor the number of times a device has been powered on and of


d.

to test the performance on a particular LAN


Feedback
Your answer is correct.

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a converged network?
Select one:

a.

A network that makes use of both fiber-optic and copper connections


b.

A network where voice, video, and data move over the same infrastructure
c.

A network that makes use of both wired and wireless technology


d.

A network that makes use of both wired and wireless technology


Feedback
Your answer is correct.

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:

a.
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has
been pressed.
b.

Copy the running configuration to the startup configuration file.


c.

Copy the information in the startup configuration file to the running


configuration
d.

Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.

Question 31
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is encrypted with the enable secret command?
Select one:

a.

the consoled line password


b.
the VTY line password
c.

all configured passwords


d.

the privileged executive mode password


Feedback
Your answer is correct.

Question 32
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:

a.

NVRAM
b.

Startup config
c.

Terminal emulator
d.
Running config
Feedback
Your answer is correct.

Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:

a.

local router
b.

local switch
c.

DNS server
d.

DHCP server
Feedback
Your answer is correct.

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:

a.

Ctrl-N
b.

Ctrl-P
c.

Right Arrow
d.

Tab
e.

Up Arrow
f.

Down Arrow
Feedback
Your answer is correct.

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a fault-tolerant network?
Select one:

a.

A network that offers secure transactions


b.

A network that can provide priority treatment of voice and video traffic
c.

A network that is incapable of failing


d.

A network that can reroute traffic in case of device failure


Feedback
Your answer is correct.

Question 36
Correct

Mark 1.00 out of 1.00

Flag question

Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:

a.

EaSt-2+56(config)#
b.

EaSt-58(config)#
c.

East-2+56(config)#
d.

% Invalid input detected


e.

Switch EaSt-2+56(config)#
f.

Switch(config)#
Feedback
Your answer is correct.

Question 37
Partially correct

Mark 0.67 out of 1.00

Flag question
Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:

a.

Scalability
b.

Confidentiality
c.

Integrity
d.

Availability
e.

QoS
Feedback
Your answer is partially correct.

You have correctly selected 2.

Question 38
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a network that supports QoS?
Select one:

a.

Data sent over the network is not altered in transmission


b.

The network should be able to expand to keep up with user demand


c.

The network provides predictable levels of service to different types of


traffic
d.

The fewest possible devices are affected by a failure


Feedback
Your answer is correct.

Question 39
Correct

Mark 1.00 out of 1.00

Flag question

Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:

a.
It requires that a data circuit between the source and destination be
established before data can be transferred.
b.

it allows for billing of network use by the amount of time a connection is


established
c.

Network devices dynamically decide on the best available path to forward


each packet.
d.

Data packets can travel through the network using multiple different paths
e.

it can rapidly adapt to the failure of network devices and communication


links
Feedback
Your answer is correct.

Question 40
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er

 the connection speed


Started on Sunday, 29 November 2020, 3:34 PM
State Finished

Completed on Sunday, 29 November 2020, 3:42 PM

Time taken 8 mins 40 secs

Grade 39.17 out of 40.00 (98%)

Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:

a.

SSH
b.

Telnet
c.

Console port
d.

AUX port
e.

Web interface
Feedback
Your answer is correct.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a network that supports QoS?
Select one:

a.

The network provides predictable levels of service to different types of


traffic
b.

Data sent over the network is not altered in transmission


c.

The fewest possible devices are affected by a failure


d.

The network should be able to expand to keep up with user demand


Feedback
Your answer is correct.
Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:

a.

Expensive to set up and maintain


b.

No centralized administration
c.

Complex configuration
d.

Scalability
Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Why would a technician enter the command copy startup-config running
config?
Select one:

a.

to remove all configuration from the switch


b.

to make a changed configuration the new startup configuration


c.

to copy an existing configuration into RAM


d.

to save an active configuration to NVRAM


Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:

a.

Dial-up
b.

Satellite
c.

Cellular
d.

DSL
Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is encrypted with the enable secret command?
Select one:

a.

the consoled line password


b.

the privileged executive mode password


c.

the VTY line password


d.

all configured passwords


Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:

a.

Data packets can travel through the network using multiple different paths
b.

it can rapidly adapt to the failure of network devices and communication


links
c.

Network devices dynamically decide on the best available path to forward


each packet.
d.

It requires that a data circuit between the source and destination be


established before data can be transferred.
e.

it allows for billing of network use by the amount of time a connection is


established
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended?
Select one:

a.

any home with multiple wireless devices


b.

a farm in a rural area without wired broadband access


c.

an Internet cafe in a city


d.

an apartment in a building with cable access to the Internet


Feedback
Your answer is correct.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which type of traffic must receive the highest priority from QoS?
Select one:

a.

Order processing
b.

Email
c.

VoIP
d.

Web traffic
Feedback
Your answer is correct.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
How is the Cisco IOS generally accessed and navigated?
Select one:

a.

With a Cisco-proprietary application


b.

Using a web browser


c.

By the use of a custom GUI


d.

Through the CLI using a terminal emulator


Feedback
Your answer is correct.

Question 11
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:

a.

Configuring a VTY password


b.

Configuring a default gateway


c.

Configuring a console password


d.

Configuring an IP address
Feedback
Your answer is correct.

Question 12
Partially correct

Mark 0.50 out of 1.00

Flag question

Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:

a.

providing data storage and retrieval to a business


b.

providing faster, more secure business communications


c.

ensuring a more reliable network


d.

providing better social media opportunities


e.

providing a richer e-learning environment


f.

providing a richer e-learning environment


Feedback
Your answer is partially correct.

You have correctly selected 1.

Question 13
Correct

Mark 1.00 out of 1.00


Flag question

Question text
An Answer  is a private connection of LANs and WANs that belongs
INTRANET

to an organization, and is designed to be accessible only by the members


and employees of the organization, or others with authorization.
Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:

a.

Copy the information in the startup configuration file to the running


configuration
b.

Reload the device and type yes when prompted to save the configuration
c.
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has
been pressed.
d.

Copy the running configuration to the startup configuration file.


Feedback
Your answer is correct.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the Cisco IOS?
Select one:

a.

The CPU for the Cisco network device

b.

The operating system for the Cisco network device


c.

The memory for the Cisco network device


d.
The configuration for the Cisco network device
Feedback
Your answer is correct.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:

a.

identity theft
b.

spyware
c.

zero – day attack


d.

DoS attack
Feedback
Your answer is correct.
Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a wiki?
Select one:

a.

an audio-based medium that is used to deliver information to a wide


audience
b.

a web page that groups of people can edit and review


c.

an online meeting
d.

a personal journal that is posted on the internet


Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:

a.

Terminal emulator
b.

NVRAM
c.

Running config
d.

Startup config
Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:

a.

A space
b.

Argument
c.

Keyword  
d.

Command
Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?
Select one:

a.

Its maximum length is 255 characters.


b.

It must be registered with a DNS server


c.

It does not allow spaces


d.

It cannot start with a number


Feedback
Your answer is correct.

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A Answer  network is able to expand to accept new devices and
Scalable

applications without affecting performance.


Question 22
Partially correct

Mark 0.67 out of 1.00

Flag question

Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:

a.

Availability
b.

Scalability
c.

Integrity
d.

Confidentiality
e.

QoS
Feedback
Your answer is partially correct.

You have correctly selected 2.

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended
Select one:
a.

any home with multiple wireless devices


b.

an Internet cafe in a city


c.

an apartment in a building with cable access to the Internet

d.

a farm in rural area without wired broadband access


Feedback
Your answer is correct.

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:

a.

to test the performance on a particular LAN


b.
to add a password to a Cisco network device
c.

to monitor the number of times a device has been powered on and of


d.

to provide automatic (unmanned) management of Cisco network devices


Feedback
Your answer is correct.

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:

a.

Type help and press the Enter key at the prompt


b.

Type the command, type help, and press the Enter key.
c.

Type the command and then press the? key


d.

Type the command and then press the Tab key


e.

Type the command and then press CTRL-C


Feedback
Your answer is correct.

Question 26
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a converged network?
Select one:

a.

A network where voice, video, and data move over the same infrastructure
b.

A network that makes use of both wired and wireless technology


c.

A network that makes use of both wired and wireless technology


d.

A network that makes use of both fiber-optic and copper connections


Feedback
Your answer is correct.

Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:

a.

Instant messaging
b.

Wiki
c.

Access point
d.

Podcasting

e.

TelePresence endpoint
f.
Weblog (blog)
Feedback
Your answer is correct.

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:

a.

SAN     
b.

WLAN
c.

MAN
d.

WAN
e.

LAN
Feedback
Your answer is correct.

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:

a.

local switch
b.

local router
c.

DHCP server
d.

DNS server
Feedback
Your answer is correct.

Question 30
Correct

Mark 1.00 out of 1.00


Flag question

Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?

Select one:

a.

virtualization
b.

online collaboration
c.

maintaining communication integrity


d.

BYOD
Feedback
Your answer is correct.

Question 31
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:

a.

Broadband cable
b.

Leased lines
c.

Cellular
d.

Metro Ethernet
e.

Mobile services
Feedback
Your answer is correct.

Question 32
Correct

Mark 1.00 out of 1.00


Flag question

Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:

a.

Tab
b.

Ctrl-P
c.

Up Arrow
d.

Down Arrow
e.

Ctrl-N
f.

Right Arrow
Feedback
Your answer is correct.

Question 33
Correct

Mark 1.00 out of 1.00


Flag question

Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er

 the connection speed


Question 34
Correct

Mark 1.00 out of 1.00

Flag question

Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:

a.

% Invalid input detected


b.

East-2+56(config)#
c.

Switch EaSt-2+56(config)#
d.
Switch(config)#
e.

EaSt-2+56(config)#
f.

EaSt-58(config)#
Feedback
Your answer is correct.

Question 35
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:

a.

SVI
b.

physical switchport access


c.

password encryption
d.

Telnet access
Feedback
Your answer is correct.

Question 36
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:

a.

Switch
b.

Wireless access point


c.

Server
d.

Printer
e.

IP phone
f.

Tablet computer
Feedback
Your answer is correct.

Question 37
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:

a.

Switch# show?
b.

Switch# status?
c.

Switch# help
d.

Switch# sh?
Feedback
Your answer is correct.

Question 38
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a fault-tolerant network?
Select one:

a.

A network that offers secure transactions


b.

A network that can provide priority treatment of voice and video traffic
c.

A network that is incapable of failing


d.

A network that can reroute traffic in case of device failure


Feedback
Your answer is correct.

Question 39
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What type of information would be found on a logical topology diagram?
Select one:

a.

IP addressing scheme
b.

Location of departmental switch


c.

Location of departmental printer


d.

Length and type of all cable runs


Feedback
Your answer is correct.

Question 40
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:

a.

a converged network
b.

a storage area network


c.

an extranet
d.

a traditional network
Feedback
Your answer is correct.

An Answer  is a private connection of LANs and WANs that belongs


INTRANET

to an organization, and is designed to be accessible only by the members


and employees of the organization, or others with authorization.
Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:

a.

Configuring a console password


b.

Configuring a default gateway


c.

Configuring an IP address
d.

Configuring a VTY password


Feedback
Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the Cisco IOS?
Select one:

a.

The configuration for the Cisco network device


b.
The operating system for the Cisco network device
c.

The memory for the Cisco network device


d.

The CPU for the Cisco network device

Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a network that supports QoS?
Select one:

a.

The network provides predictable levels of service to different types of


traffic
b.

The network should be able to expand to keep up with user demand


c.
Data sent over the network is not altered in transmission
d.

The fewest possible devices are affected by a failure


Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A Answer  network is able to expand to accept new devices and
scalable

applications without affecting performance.


Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:

a.
Down Arrow
b.

Up Arrow
c.

Ctrl-P
d.

Tab
e.

Ctrl-N
f.

Right Arrow
Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:

a.
Switch# status?
b.

Switch# sh?
c.

Switch# show?
d.

Switch# help
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:

a.

Availability
b.

Confidentiality
c.
Scalability
d.

Integrity
e.

QoS
Feedback
Your answer is correct.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Why would a technician enter the command copy startup-config running
config?
Select one:

a.

to save an active configuration to NVRAM


b.

to make a changed configuration the new startup configuration


c.

to copy an existing configuration into RAM


d.
to remove all configuration from the switch
Feedback
Your answer is correct.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?

Select one:

a.

online collaboration
b.

maintaining communication integrity


c.

virtualization
d.

BYOD
Feedback
Your answer is correct.

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:

a.

zero – day attack


b.

identity theft
c.

DoS attack
d.

spyware
Feedback
Your answer is correct.

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a wiki?
Select one:

a.

a web page that groups of people can edit and review


b.

an audio-based medium that is used to deliver information to a wide


audience
c.

a personal journal that is posted on the internet


d.

an online meeting
Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What is a converged network?
Select one:

a.

A network that makes use of both wired and wireless technology


b.

A network that makes use of both fiber-optic and copper connections


c.

A network where voice, video, and data move over the same infrastructure
d.

A network that makes use of both wired and wireless technology


Feedback
Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:

a.

a storage area network


b.

an extranet
c.

a converged network
d.

a traditional network
Feedback
Your answer is correct.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:

a.

to add a password to a Cisco network device


b.

to provide automatic (unmanned) management of Cisco network devices


c.

to monitor the number of times a device has been powered on and of


d.

to test the performance on a particular LAN


Feedback
Your answer is correct.

Question 16
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:

a.

LAN
b.

SAN     
c.

WLAN
d.

MAN
e.

WAN
Feedback
Your answer is incorrect.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended
Select one:

a.

an Internet cafe in a city


b.

a farm in rural area without wired broadband access


c.

any home with multiple wireless devices


d.
an apartment in a building with cable access to the Internet

Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
SLOWER

 the connection speed


Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?
Select one:

a.

It must be registered with a DNS server


b.

It does not allow spaces


c.

Its maximum length is 255 characters.


d.

It cannot start with a number


Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:

a.

Type the command, type help, and press the Enter key.
b.

Type help and press the Enter key at the prompt


c.
Type the command and then press the? key
d.

Type the command and then press the Tab key


e.

Type the command and then press CTRL-C


Feedback
Your answer is correct.

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a fault-tolerant network?
Select one:

a.

A network that can reroute traffic in case of device failure


b.

A network that can provide priority treatment of voice and video traffic
c.

A network that offers secure transactions


d.
A network that is incapable of failing
Feedback
Your answer is correct.

Question 22
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is encrypted with the enable secret command?
Select one:

a.

all configured passwords


b.

the consoled line password


c.

the VTY line password


d.

the privileged executive mode password


Feedback
Your answer is correct.

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of traffic must receive the highest priority from QoS?
Select one:

a.

Order processing
b.

Email
c.

Web traffic
d.

VoIP
Feedback
Your answer is correct.

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:

a.

providing better social media opportunities


b.

providing a richer e-learning environment


c.

providing a richer e-learning environment


d.

providing faster, more secure business communications


e.

providing data storage and retrieval to a business


f.

ensuring a more reliable network


Feedback
Your answer is correct.

Question 25
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:

a.

local router
b.

DHCP server
c.

local switch
d.

DNS server
Feedback
Your answer is correct.

Question 26
Correct

Mark 1.00 out of 1.00

Flag question

Question text
How is the Cisco IOS generally accessed and navigated?
Select one:

a.
By the use of a custom GUI
b.

Through the CLI using a terminal emulator


c.

With a Cisco-proprietary application


d.

Using a web browser


Feedback
Your answer is correct.

Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:

a.

Command
b.

A space
c.
Argument
d.

Keyword  
Feedback
Your answer is correct.

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:

a.

Switch(config)#
b.

Switch EaSt-2+56(config)#
c.

% Invalid input detected


d.

EaSt-2+56(config)#
e.
East-2+56(config)#
f.

EaSt-58(config)#
Feedback
Your answer is correct.

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:

a.

Metro Ethernet
b.

Cellular
c.

Leased lines
d.

Broadband cable
e.
Mobile services
Feedback
Your answer is correct.

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:

a.

NVRAM
b.

Running config
c.

Startup config
d.

Terminal emulator
Feedback
Your answer is correct.

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:

a.

No centralized administration
b.

Complex configuration
c.

Expensive to set up and maintain


d.

Scalability
Feedback
Your answer is correct.

Question 32
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:

a.

Printer
b.

Server
c.

Tablet computer
d.

IP phone
e.

Wireless access point


f.

Switch
Feedback
Your answer is correct.

Question 33
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:

a.

Cellular
b.

Satellite
c.

DSL
d.

Dial-up
Feedback
Your answer is correct.

Question 34
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of information would be found on a logical topology diagram?
Select one:

a.
Location of departmental printer
b.

Length and type of all cable runs


c.

IP addressing scheme
d.

Location of departmental switch


Feedback
Your answer is correct.

Question 35
Correct

Mark 1.00 out of 1.00

Flag question

Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:

a.

Network devices dynamically decide on the best available path to forward


each packet.
b.
It requires that a data circuit between the source and destination be
established before data can be transferred.
c.

it allows for billing of network use by the amount of time a connection is


established
d.

Data packets can travel through the network using multiple different paths
e.

it can rapidly adapt to the failure of network devices and communication


links
Feedback
Your answer is correct.

Question 36
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:

a.

Weblog (blog)
b.
Instant messaging
c.

Access point
d.

Podcasting

e.

Wiki
f.

TelePresence endpoint
Feedback
Your answer is correct.

Question 37
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:

a.

Web interface
b.
Telnet
c.

Console port
d.

SSH
e.

AUX port
Feedback
Your answer is correct.

Question 38
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:

a.

password encryption
b.

Telnet access
c.

physical switchport access


d.

SVI
Feedback
Your answer is correct.

Question 39
Correct

Mark 1.00 out of 1.00

Flag question

Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:

a.

Copy the information in the startup configuration file to the running


configuration
b.

Copy the running configuration to the startup configuration file.


c.

Reload the device and type yes when prompted to save the configuration
d.

Nothing must be done. Changes to the configuration on an IOS device take


effect as soon as the command is typed correctly and the Enter key has
been pressed.
Feedback
Your answer is correct.

Question 40
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended?
Select one:

a.

a farm in a rural area without wired broadband access


b.

any home with multiple wireless devices


c.

an Internet cafe in a city


d.
an apartment in a building with cable access to the Internet
Feedback
Your answer is correct.

Started on Sunday, 29 November 2020, 11:45 AM

State Finished

Completed on Sunday, 29 November 2020, 12:07 PM

Time taken 22 mins 10 secs

Grade 39.00 out of 40.00 (98%)

Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:

a.

Availability
b.

Integrity
c.

Scalability
d.

QoS
e.

Confidentiality
Feedback
Your answer is correct.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:

a.

to monitor the number of times a device has been powered on and of


b.

to add a password to a Cisco network device


c.

to provide automatic (unmanned) management of Cisco network devices


d.

to test the performance on a particular LAN


Feedback
Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:

a.

Running config
b.

Terminal emulator
c.

NVRAM
d.

Startup config
Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What type of information would be found on a logical topology diagram?
Select one:

a.

Location of departmental switch


b.

Length and type of all cable runs


c.

Location of departmental printer


d.

IP addressing scheme
Feedback
Your answer is correct.

Question 5
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:

a.

WLAN
b.

LAN
c.

SAN     
d.

WAN
e.

MAN
Feedback
Your answer is incorrect.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:

a.

Mobile services
b.

Leased lines
c.

Metro Ethernet
d.

Broadband cable
e.

Cellular
Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:

a.
Keyword  
b.

Argument
c.

Command
d.

A space
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:

a.

Switch# status?
b.

Switch# show?
c.
Switch# sh?
d.

Switch# help
Feedback
Your answer is correct.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:

a.

DoS attack
b.

identity theft
c.

spyware
d.
zero – day attack
Feedback
Your answer is correct.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er

 the connection speed


Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a fault-tolerant network?
Select one:

a.

A network that is incapable of failing


b.
A network that offers secure transactions
c.

A network that can reroute traffic in case of device failure


d.

A network that can provide priority treatment of voice and video traffic
Feedback
Your answer is correct.

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is encrypted with the enable secret command?
Select one:

a.

all configured passwords


b.

the VTY line password


c.

the consoled line password


d.
the privileged executive mode password
Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a wiki?
Select one:

a.

an online meeting
b.

an audio-based medium that is used to deliver information to a wide


audience
c.

a web page that groups of people can edit and review


d.

a personal journal that is posted on the internet


Feedback
Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a network that supports QoS?
Select one:

a.

Data sent over the network is not altered in transmission


b.

The network provides predictable levels of service to different types of


traffic
c.

The fewest possible devices are affected by a failure


d.

The network should be able to expand to keep up with user demand


Feedback
Your answer is correct.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:

a.

Web traffic
b.

Order processing
c.

VoIP
d.

Email
Feedback
Your answer is correct.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:

a.
Expensive to set up and maintain
b.

Scalability
c.

Complex configuration
d.

No centralized administration
Feedback
Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?
Select one:

a.

It cannot start with a number


b.

Its maximum length is 255 characters.


c.
It must be registered with a DNS server
d.

It does not allow spaces


Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Why would a technician enter the command copy startup-config running
config?
Select one:

a.

to save an active configuration to NVRAM


b.

to remove all configuration from the switch


c.

to make a changed configuration the new startup configuration


d.

to copy an existing configuration into RAM


Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
How is the Cisco IOS generally accessed and navigated?
Select one:

a.

Through the CLI using a terminal emulator


b.

With a Cisco-proprietary application


c.

By the use of a custom GUI


d.

Using a web browser


Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:

a.

providing a richer e-learning environment


b.

providing better social media opportunities


c.

providing faster, more secure business communications


d.

ensuring a more reliable network


e.

providing data storage and retrieval to a business


f.

providing a richer e-learning environment


Feedback
Your answer is correct.

Question 21
Correct

Mark 1.00 out of 1.00


Flag question

Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:

a.

Network devices dynamically decide on the best available path to forward


each packet.
b.

It requires that a data circuit between the source and destination be


established before data can be transferred.
c.

Data packets can travel through the network using multiple different paths
d.

it allows for billing of network use by the amount of time a connection is


established
e.

it can rapidly adapt to the failure of network devices and communication


links
Feedback
Your answer is correct.

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:

a.

Switch
b.

Wireless access point


c.

IP phone
d.

Tablet computer
e.

Server
f.

Printer
Feedback
Your answer is correct.

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a converged network?
Select one:

a.

A network that makes use of both wired and wireless technology


b.

A network where voice, video, and data move over the same infrastructure
c.

A network that makes use of both fiber-optic and copper connections


d.

A network that makes use of both wired and wireless technology


Feedback
Your answer is correct.

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:

a.

a traditional network
b.

an extranet
c.

a converged network
d.

a storage area network


Feedback
Your answer is correct.

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:

a.
Dial-up
b.

Cellular
c.

DSL
d.

Satellite
Feedback
Your answer is correct.

Question 26
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended?
Select one:

a.

any home with multiple wireless devices


b.

a farm in a rural area without wired broadband access


c.
an Internet cafe in a city
d.

an apartment in a building with cable access to the Internet


Feedback
Your answer is correct.

Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:

a.

Type the command, type help, and press the Enter key.
b.

Type the command and then press the? key


c.

Type the command and then press the Tab key


d.

Type the command and then press CTRL-C


e.

Type help and press the Enter key at the prompt


Feedback
Your answer is correct.

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?

Select one:

a.

online collaboration
b.

maintaining communication integrity


c.

virtualization
d.
BYOD
Feedback
Your answer is correct.

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the Cisco IOS?
Select one:

a.

The memory for the Cisco network device


b.

The operating system for the Cisco network device


c.

The CPU for the Cisco network device

d.

The configuration for the Cisco network device


Feedback
Your answer is correct.
Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:

a.

Podcasting

b.

Wiki
c.

TelePresence endpoint
d.

Weblog (blog)
e.

Access point
f.

Instant messaging
Feedback
Your answer is correct.
Question 31
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:

a.

Web interface
b.

AUX port
c.

SSH
d.

Console port
e.

Telnet
Feedback
Your answer is correct.

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An Answer  is a private connection of LANs and WANs that belongs
INTRANET

to an organization, and is designed to be accessible only by the members


and employees of the organization, or others with authorization.
Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:

a.

East-2+56(config)#
b.

Switch(config)#
c.

Switch EaSt-2+56(config)#
d.
EaSt-2+56(config)#
e.

EaSt-58(config)#
f.

% Invalid input detected


Feedback
Your answer is correct.

Question 34
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended
Select one:

a.

an Internet cafe in a city


b.

an apartment in a building with cable access to the Internet

c.

a farm in rural area without wired broadband access


d.

any home with multiple wireless devices


Feedback
Your answer is correct.

Question 35
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:

a.

physical switchport access


b.

SVI
c.

password encryption
d.
Telnet access
Feedback
Your answer is correct.

Question 36
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:

a.

Configuring a default gateway


b.

Configuring a console password


c.

Configuring an IP address
d.

Configuring a VTY password


Feedback
Your answer is correct.

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A Answer  network is able to expand to accept new devices and
Scalable

applications without affecting performance.


Question 38
Correct

Mark 1.00 out of 1.00

Flag question

Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:

a.

Up Arrow
b.

Right Arrow
c.

Ctrl-P
d.
Down Arrow
e.

Ctrl-N
f.

Tab
Feedback
Your answer is correct.

Question 39
Correct

Mark 1.00 out of 1.00

Flag question

Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:

a.

Copy the information in the startup configuration file to the running


configuration
b.

Nothing must be done. Changes to the configuration on an IOS device take


effect as soon as the command is typed correctly and the Enter key has
been pressed.
c.

Reload the device and type yes when prompted to save the configuration
d.

Copy the running configuration to the startup configuration file.


Feedback
Your answer is correct.

Question 40
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:

a.

local router
b.

local switch
c.

DHCP server
d.

DNS server
Feedback
Your answer is correct.

Started on Sunday, 29 November 2020, 3:21 PM

State Finished

Completed on Sunday, 29 November 2020, 3:32 PM

Time taken 11 mins 21 secs

Grade 39.67 out of 40.00 (99%)

Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the Cisco IOS?
Select one:

a.

The configuration for the Cisco network device


b.

The CPU for the Cisco network device

c.
The memory for the Cisco network device
d.

The operating system for the Cisco network device


Feedback
Your answer is correct.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:

a.

Type help and press the Enter key at the prompt


b.

Type the command and then press the? key


c.

Type the command and then press CTRL-C


d.

Type the command and then press the Tab key


e.

Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Why would a technician enter the command copy startup-config running
config?
Select one:

a.

to save an active configuration to NVRAM


b.

to make a changed configuration the new startup configuration


c.

to remove all configuration from the switch


d.

to copy an existing configuration into RAM


Feedback
Your answer is correct.
Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:

a.

a traditional network
b.

an extranet
c.

a storage area network


d.

a converged network
Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00


Flag question

Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?

Select one:

a.

virtualization
b.

maintaining communication integrity


c.

BYOD
d.

online collaboration
Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00


Flag question

Question text
An Answer  is a private connection of LANs and WANs that belongs
INTRANET

to an organization, and is designed to be accessible only by the members


and employees of the organization, or others with authorization.
Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:

a.

Scalability
b.

Expensive to set up and maintain


c.

No centralized administration
d.
Complex configuration
Feedback
Your answer is correct.

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a wiki?
Select one:

a.

a web page that groups of people can edit and review


b.

an audio-based medium that is used to deliver information to a wide


audience
c.

an online meeting
d.

a personal journal that is posted on the internet


Feedback
Your answer is correct.

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of traffic must receive the highest priority from QoS?
Select one:

a.

VoIP
b.

Web traffic
c.

Order processing
d.

Email
Feedback
Your answer is correct.

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:

a.

Configuring a VTY password


b.

Configuring a default gateway


c.

Configuring a console password


d.

Configuring an IP address
Feedback
Your answer is correct.

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?
Select one:

a.

It does not allow spaces


b.

It cannot start with a number


c.

Its maximum length is 255 characters.


d.

It must be registered with a DNS server


Feedback
Your answer is correct.

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:

a.

DSL
b.

Satellite
c.

Cellular
d.

Dial-up
Feedback
Your answer is correct.

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:

a.

Instant messaging
b.

TelePresence endpoint
c.

Wiki
d.

Access point
e.

Podcasting
f.

Weblog (blog)
Feedback
Your answer is correct.

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A Answer  network is able to expand to accept new devices and
Scalable

applications without affecting performance.


Question 15
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:

a.

Mobile services
b.

Metro Ethernet
c.

Broadband cable
d.

Leased lines
e.

Cellular
Feedback
Your answer is correct.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:

a.

WLAN
b.

LAN
c.

MAN
d.

SAN     
e.

WAN
Feedback
Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:

a.

Switch# sh?
b.

Switch# status?
c.

Switch# show?
d.

Switch# help
Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:

a.

Command
b.

A space
c.

Argument
d.

Keyword  
Feedback
Your answer is correct.
Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:

a.

Telnet access
b.

password encryption
c.

physical switchport access


d.

SVI
Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended
Select one:

a.

an Internet cafe in a city


b.

a farm in rural area without wired broadband access


c.

any home with multiple wireless devices


d.

an apartment in a building with cable access to the Internet

Feedback
Your answer is correct.

Question 21
Correct

Mark 1.00 out of 1.00


Flag question

Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:

a.

identity theft
b.

zero – day attack


c.

spyware
d.

DoS attack
Feedback
Your answer is correct.

Question 22
Correct

Mark 1.00 out of 1.00

Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:

a.

Through the CLI using a terminal emulator


b.

With a Cisco-proprietary application


c.

By the use of a custom GUI


d.

Using a web browser


Feedback
Your answer is correct.

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:

a.
Wireless access point
b.

IP phone
c.

Server
d.

Tablet computer
e.

Switch
f.

Printer
Feedback
Your answer is correct.

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:

a.
ensuring a more reliable network
b.

providing faster, more secure business communications


c.

providing data storage and retrieval to a business


d.

providing better social media opportunities


e.

providing a richer e-learning environment


f.

providing a richer e-learning environment


Feedback
Your answer is correct.

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of information would be found on a logical topology diagram?
Select one:

a.
IP addressing scheme
b.

Length and type of all cable runs


c.

Location of departmental switch


d.

Location of departmental printer


Feedback
Your answer is correct.

Question 26
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:

a.

AUX port
b.

Web interface
c.
SSH
d.

Console port
e.

Telnet
Feedback
Your answer is correct.

Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended?
Select one:

a.

an Internet cafe in a city


b.

a farm in a rural area without wired broadband access


c.

an apartment in a building with cable access to the Internet


d.
any home with multiple wireless devices
Feedback
Your answer is correct.

Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:

a.

to add a password to a Cisco network device


b.

to provide automatic (unmanned) management of Cisco network devices


c.

to monitor the number of times a device has been powered on and of


d.

to test the performance on a particular LAN


Feedback
Your answer is correct.

Question 29
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a converged network?
Select one:

a.

A network that makes use of both fiber-optic and copper connections


b.

A network where voice, video, and data move over the same infrastructure
c.

A network that makes use of both wired and wireless technology


d.

A network that makes use of both wired and wireless technology


Feedback
Your answer is correct.

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:

a.

Nothing must be done. Changes to the configuration on an IOS device take


effect as soon as the command is typed correctly and the Enter key has
been pressed.
b.

Copy the running configuration to the startup configuration file.


c.

Copy the information in the startup configuration file to the running


configuration
d.

Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.

Question 31
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is encrypted with the enable secret command?
Select one:

a.

the consoled line password


b.

the VTY line password


c.

all configured passwords


d.

the privileged executive mode password


Feedback
Your answer is correct.

Question 32
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:

a.

NVRAM
b.
Startup config
c.

Terminal emulator
d.

Running config
Feedback
Your answer is correct.

Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:

a.

local router
b.

local switch
c.

DNS server
d.
DHCP server
Feedback
Your answer is correct.

Question 34
Correct

Mark 1.00 out of 1.00

Flag question

Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:

a.

Ctrl-N
b.

Ctrl-P
c.

Right Arrow
d.

Tab
e.

Up Arrow
f.
Down Arrow
Feedback
Your answer is correct.

Question 35
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is a fault-tolerant network?
Select one:

a.

A network that offers secure transactions


b.

A network that can provide priority treatment of voice and video traffic
c.

A network that is incapable of failing


d.

A network that can reroute traffic in case of device failure


Feedback
Your answer is correct.

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:

a.

EaSt-2+56(config)#
b.

EaSt-58(config)#
c.

East-2+56(config)#
d.

% Invalid input detected


e.

Switch EaSt-2+56(config)#
f.

Switch(config)#
Feedback
Your answer is correct.

Question 37
Partially correct
Mark 0.67 out of 1.00

Flag question

Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:

a.

Scalability
b.

Confidentiality
c.

Integrity
d.

Availability
e.

QoS
Feedback
Your answer is partially correct.

You have correctly selected 2.

Question 38
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which statement describes a network that supports QoS?
Select one:

a.

Data sent over the network is not altered in transmission


b.

The network should be able to expand to keep up with user demand


c.

The network provides predictable levels of service to different types of


traffic
d.

The fewest possible devices are affected by a failure


Feedback
Your answer is correct.

Question 39
Correct

Mark 1.00 out of 1.00

Flag question

Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:

a.

It requires that a data circuit between the source and destination be


established before data can be transferred.
b.

it allows for billing of network use by the amount of time a connection is


established
c.

Network devices dynamically decide on the best available path to forward


each packet.
d.

Data packets can travel through the network using multiple different paths
e.

it can rapidly adapt to the failure of network devices and communication


links
Feedback
Your answer is correct.

Question 40
Correct

Mark 1.00 out of 1.00


Flag question

Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er

 the connection speed

Started on Saturday, 28 November 2020, 3:03 PM

State Finished

Completed on Saturday, 28 November 2020, 3:32 PM

Time taken 28 mins 51 secs

Grade 31.50 out of 35.00 (90%)

Question 1
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which is a function of the Logical Link Control (LLC) sublayer?
Select one:

a.

to define the media access processes that are performed by the hardware
b.

to identify which network layer protocol is being used


c.

to provide data link layer addressing


d.

to accept segments and package them into data units that are called
packets
Feedback
Your answer is correct.

Question 2
Correct

Mark 1.00 out of 1.00

Flag question

Question text
A Answer  address is defined as a reserved address that routes
loopback

packets back to the host


Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What three functions are defined by network protocols to allow
communication between known source and destination IP addresses?
(Choose three.)
Select one or more:

a.

end-device installation
b.

media selection
c.

connector specifications
d.

delivery options
e.

message size
f.

data encoding
Feedback
Your answer is correct.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Which two statements are true of the deterministic access method?(Choose
two.)
Select one or more:

a.

The throughput is predictable


b.

Each device has to transmit before passing the token to the next device
c.

The order of transmission is dictated by the node that asks first for the
token
d.

It is a very efficient method because there are no collisions

e.

Devices take turns transmitting


Feedback
Your answer is correct.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question
Question text
What is the transport layer PDU?
Select one:

a.

Data
b.

Packet
c.

Frame
d.

Bit
e.

Segment
Feedback
Your answer is correct.

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which TCP/IP model layer is responsible for providing the best path
through the network?
Select one:

a.

Internet
b.

Network Access
c.

Application
d.

Transport
Feedback
Your answer is correct.

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which organization develops the 802 family of standard for wired and
wireless LANs and MANs?
Select one:

a.

ISO
b.
ITU-T
c.

IEEE
d.

ISOC
e.

IANA
Feedback
Your answer is correct.

Question 8
Partially correct

Mark 0.50 out of 1.00

Flag question

Question text
Which of the following TCP/IP protocols exist at the transport layer of the
TCP/IP reference model? (Choose two.)
Select one or more:

a.

DNS
b.

FTP
c.
TCP
d.

HTTP
e.

UDP
Feedback
Your answer is partially correct.

You have correctly selected 1.

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the name given to a one-to-many message delivery option?
Select one:

a.

Multicast
b.

Unicast
c.

Manycast
d.

Broadcast
Feedback
Your answer is correct.

Question 10
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which OSI reference model layer is responsible for common representation
of the data transferred between application layer services?
Select one:

a.

Physical
b.

Transport
c.

Application
d.

Network
e.

Session
f.

Presentation
g.

Data link
Feedback
Your answer is incorrect.

Question 11
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which message delivery option is used when all devices need to receive the
same message simultaneously?
Select one:

a.

broadcast
b.

duplex
c.

unicast
d.

multicast
Feedback
Your answer is correct.

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which organization is responsible for developing communications
standards for Voice over IP (VoIP) devices?
Select one:

a.

The Internet Corporation for Assigned Names and Numbers (ICANN)


b.

The Telecommunications Industry Association (TIA)


c.

The International Telecommunications Union-Telecommunications


Standardization Sector (ITU-T)
d.

The Electronics Industry Alliance (EIA)


Feedback
Your answer is correct.

Question 13
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which statement is correct about network protocols?
Select one:

a.

They are only required for exchange of message between devices on


remote network
b.

They define how messages are exchanged between the sources and the
destination
c.

Network protocols define the type of hardware that is used and how it is


mounted in racks
d.

They all function in the network access layer of TCP/IP


Feedback
Your answer is incorrect.

Question 14
Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
What is the purpose of protocols in data communications?
Select one:

a.

specifying the bandwidth of the channel or medium for each type of


communication
b.

determining the electronic specifications to enable the communication


c.

providing the rules required for a specific type of communication to occur


d.

specifying the device operating systems that will support the


communication
Feedback
Your answer is incorrect.

Question 15
Correct

Mark 1.00 out of 1.00

Flag question
Question text
Which logical address is used for delivery of data to a remote network?
Select one:

a.

source IP address
b.

destination port number


c.

source MAC address


d.

destination MAC address


e.

destination IP address
Feedback
Your answer is correct.

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are examples of proprietary protocols? (Choose
two.)
Select one or more:

a.

AppleTalk
b.

Novell NetWare
c.

TCP/IP
d.

ISO
Feedback
Your answer is correct.

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two statements are true regarding the user EXEC mode? (Choose
two.)
Select one or more:

a.

All router commands are available


b.
Global configuration mode can be accessed by entering the enable
command
c.

Only some aspects of the router configuration can be viewed


d.

Interfaces and routing protocols can be configured


e.

This is the default mode on an unconfigured router when first powered up.
Feedback
Your answer is correct.

Question 18
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is an advantage of using standards to develop and
implement protocols?
Select one:

a.

Products from different manufacturers can interoperate successfully


b.

A particular protocol can only be implemented by one manufacturer


c.

Standard provide flexibility for manufacturers to create devices that comply


with unique requirements
d.

Different manufacturers are free to apply different requirements when


implementing a protocol
Feedback
Your answer is correct.

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What happens to frames that are too long or too short for the channel
used?
Select one:

a.

They clog the network and block the delivery of other frames.
b.

They are dropped.


c.

They are delivered but much slower than proper-size frames.


d.

They are broken up into smaller pieces.


e.

They are returned to the sender.


Feedback
Your answer is correct.

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What happens when two devices on the same subnet are communicating?
Select one:

a.

The sending device will use ARP to determine the IP address of the receiver
b.

The data link layer addresses are added to the IP header


c.

The host portion of the IP addresses will be different


d.

The frame will be sent to the default gateway for delivery to the receiving
device
Feedback
Your answer is correct.

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What will a network administrator use to modify a configuration on a Cisco
router?
Select one:

a.

the Windows command prompt


b.

a control panel

c.

IOS
d.

Windows Explorer
e.

a DHCP server
Feedback
Your answer is correct.

Question 22
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following elements do both human and computer
communication systems have in common? (Choose three.)
Select one or more:

a.

Receiver
b.

Keyboard
c.

Channel
d.

Source
e.

Default gateway
Feedback
Your answer is correct.

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is and advantage of using standards to develop and
implement protocols?
Select one:

a.

Different manufacturers are free to apply different requirements when


implementing a protocol
b.

Standards provide flexibility for manufacturers to create devices that


comply with unique requirements
c.

A particular protocol can be implemented by one manufacturer


d.

Products from different manufacturers can interoperate successfully


Feedback
Your answer is correct.

Question 24
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What command will prevent all unencrypted passwords from displaying in
plain text in a configuration file?
Select one:

a.

(config) # enable secret Secret_Password


b.

(config) # service password-encryption


c.

(config)# enable password secret


d.

(config-line) # password secret


e.

(config) # enable secret Encrypted_Password


Feedback
Your answer is correct.

Question 25
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which application layer protocol allows users on one network to reliably
transfer files to and from a host on another network?
Select one:

a.

FTP
b.

TFTP
c.

HTTP
d.

DHCP
e.

IMAP
Feedback
Your answer is correct.

Question 26
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which organization is responsible for the standard that defines Media
Access Control for wired Ethernet?
Select one:

a.

IEEE
b.

ISOC
c.

ISO
d.

IAB
e.

IETF
Feedback
Your answer is correct.

Question 27
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which two message timing mechanisms are used in data communication?
(Choose two.)
Select one or more:

a.

encoding
b.

formatting
c.

response timeout
d.

flow control
e.

encapsulation
Feedback
Your answer is correct.

Question 28
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which two components are added to the PDU at the network access layer?
(Choose two.)
Select one or more:

a.

HTTP header
b.

IP header
c.

TCP header
d.

Trailer
e.

frame header
Feedback
Your answer is correct.

Question 29
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What name is given to a group of interrelated protocols necessary to
perform a communication function?
Select one:

a.

Protocol stack
b.

Protocol suite
c.

Functional collection
d.

Functional protocol
Feedback
Your answer is correct.

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What organization is responsible for the overall management and
development of Internet standards?
Select one:

a.

IAB
b.

ISO
c.

IRTF
d.

IETF
e.

IEEE
Feedback
Your answer is correct.

Question 31
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which two factors influence the method that is used for media access
control? (Choose two.)
Select one or more:

a.

how the IP protocol forwards the packet to the destination


b.

how data is generated by end devices applications


c.

how signals are encoded by the NICs on end devices


d.

how nodes share the media


e.

how connection between nodes appears to the data link layer


Feedback
Your answer is correct.

Question 32
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following OSI model layers have the same functionality as the
network access layer in the TCP/IP model? (Choose two.)
Select one or more:

a.
Network
b.

Data link
c.

Physical
d.

Transport
e.

Presentation
f.

Session
g.

Application
Feedback
Your answer is correct.

Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text
In fiber optic meda, the signals are represented as patterns of Answer
.
Light
Question 34
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which message timing factor impacts how much information can be sent
and the speed at which it can be delivered?
Select one:

a.

Response timeout  
b.

Delay speed
c.

Access method
d.

Flow control
Feedback
Your answer is correct.

Question 35
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What type of protocol describes communication over a data link and the
physical transmission of data on the network media?
Select one:

a.

Transport protocol
b.

Internet protocol
c.

Network access protocol


d.

Application protocol
Feedback
Your answer is correct.

SOURCE BY: MACARILAO, JAY


An employee at a branch office is creating a quote for a customer. In order to do this, the
employee needs to access confidential pricing information from internal servers at the Head
Office. What type of network would the employee access? an intranet

What type of address is 01-00-5E-0A-00-02? an address that reaches a specific group of hosts

An administrator measured the transfer of usable data across a 100 Mb/s physical channel over
a given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator
obtain goodput
What two criteria are used to help select a network medium from various network media?
(Choose two.) the distance the selected medium can successfully carry a signal the
environment where the selected medium is to be installed

What is the purpose of the physical link control field in a data link layer header? to establish the
media link

What is a characteristic of a WAN hub-and-spoke topology? The branch sites are connected to
a central site through point-point links

A network administrator needs to keep the user ID, password, and session contents private
when establishing remote CLI connectivity with a switch to manage it. Which access method
should be chosen?

The Ethernet ______ sublayer is responsible for communicating directly with the physical layer.
MAC

What is a characteristic of a contention-based access method? It is as nondeterministic method

What process is used to place one message inside another message for transfer from the
source to the destination? Encapsulation

What is the function of the kernel of an operating software? The kernel provisions hardware
resources to meet software requirements.

Which term describes the state of a network when the demand on the network resources
exceeds the available capacity? congestion

Which area of the network would a college IT staff most likely have to redesign as a direct result
of many students bringing their own tablets and smartphones to school to access school
resources? wireless LAN
What are two functions of end devices on a network? (Choose two.) They are the interface
between humans and the communication network. They originate the data that flows through
the network.

Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.) satellite cellular

Which device performs the function of determining the path that messages should take through
internet works? a router

A router has a valid operating system and a configuration file stored in NVRAM. The
configuration file contains an enable secret password but no console password. When the
router boots up, which mode will display? user EXEC mode

What type of delivery uses data link layer addresses? local delivery

Which command or key combination allows a user to return to the previous level in the
command hierarchy? exit
Which two statements describe intermediary devices? (Choose two.) Intermediary devices
connect individual hosts to the network. Intermediary devices direct the path of the data.

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration
in a secure environment? Use the console port to locally access the switch from a serial or USB
interface of the PC.

What method can be used by two computers to ensure that packets are not dropped because
too much data is being sent too quickly? flow control

A web client is sending a request for a webpage to a web server. From the perspective of the
client, what is the correct order of the protocol stack that is used to prepare the request for
transmission? HTTP, TCP, IP, Ethernet

What type of communication will send a message to all devices on a local area network?
broadcast

Which interface command must be entered in a Layer 3 switch before IPv4 address can be
assigned to the interface? no switchport

Which two engineering organizations define open standards and protocols that apply to the data
link layer? International Organization for Standardization (ISO) International Telecommunication
Union (ITU)

Which statement describes a characteristic of the frame header fields of the data link layer?
They vary depending on protocols

A company is contemplating whether to use a client/server or a peer-to-peer network. What are


three characteristics of a peer-to-peer network? (Choose three.) easy to create lacks centralized
administration less cost to implement

When is a wired connection preffered to a wireless connection by an end-user device? when the
end-user device will run an application that requires a dedicated connection to the network

Which two connection options provide an always-on, high-bandwidth Internet connection to


computers in a home office? (Choose two.) DSL cable

Which PDU is processed when a host computer is de-encapsulating a message at the transport
layer of the TCP/IP model segment

Within a production network, what is the purpose of configuring a switch with a default gateway
address? The default gateway address is used to forward packets originating from the switch to
remote networks.

When a client connects to an HTTP server by the use of a randomly generated source port
number, what destination port number will the HTTP server use when building a response?
the original source port number that was randomly generated by the client

What is an advantage of UDP over TCP? UDP communication requires less overhead
On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the Broadcast
MAC address.

What are two functions that are provided by the network layer? (Choose two.) providing end
devices with a unique network identifier, directing data packets to destination hosts on other
networks

During troubleshooting procedures, from which location will most Cisco routers load a limited
IOS ROM

Which value, that is contained in an IPv4 header field, is decremented by each router that
receives a packet? Time-to-Live

When transporting data from real-time applications, such as streaming audio and video, which
field in the IPv6 header can be used to inform the routers and switches to maintain the same
path for the packets in the same conversation? Flow Label

Which three fields are used in a UDP segment header? (Choose three.) Length, Source Port,
Checksum

Which destination address is used in an ARP request frame? FFFF.FFFF.FFFF

What is the command netstat –r used for? to display the host routing table

Which two functions or operations are performed by the MAC sublayer? (Choose two.) it adds a
header and trailer to form an OSI Layer 2 PDU, It is responsible for Media Access Control

Which action is performed by a client when establishing communication with a server via the
use of UDP at the transport layer? The client randomly selects a source port number

During the boot process, in what memory location will the router bootstrap program look for the
IOS image if a TFTP server is not used? flash

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific
route? gateway of last resort

How does the network layer use the MTU value? The MTU is passed to the network layer by the
data link layer

Which two files are loaded into RAM by the router when it boots? (Choose two.) IOS image,
STARTUP CONFIG

Which entities are involve in a temporary communication that is established by the transport
layer? applications

What happens if part of an FTP message is not delivered to the destination? The part of the
FTP message that was lost is re-sent

A collision fragment, also known as a ____ frame, is a frame of fewer than 64 bytes in length.
RUNT
Which term defines the processing capabilities of a switch by rating how much data can be
processed per second? forwarding rate

Which address is used as a destination address on a broadcast Ethernet frame? FF-FF-FF-FF-


FF-FF

Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC? IEEE
802.3

What are the primary functions associated with data encapsulation at the Ethernet MAC
sublayer? (Choose three.) Addressing Frame delimiting Error detection

Which address is a multicast MAC address? 01-00-5E-00-00-C8

What is true about the Ethernet MAC address? (Choose three.) The first 6 hexadecimal digits of
a MAC address represent the OUI., The MAC address is also known as a burned-in address.,
The vendor is responsible for assigning the last 24 bits of the MAC address.

What happens when a data collision occurs on an Ethernet bus? All devices stop transmitting
and try again later.

Which statement accurately describes public IP addresses? Public IP addresses must be


unique across the entire Internet

The shortest compressed format of the IPv6 address 2001:


0DB8:0000:1470:0000:0000:0000:0200 is 2001:DB8:0:1470::200

Which application use UDP as the transport layer protocol? SMTP

The last host address on the 10.15.25.0/24 network is 10.15.25.254

Which statement is true about an interface that is configured with the IPv6 address command?
A link-local IPv6 address is automatically

Which number or set of numbers represents a socket? 192.168.1.1:80

The 8-bit binary value for 41 is 00101001

At which layers of the OSI model does Ethernet function? (Choose two.) Physical, Data link

Which field in an Ethernet frame is used for error detection? Frame Check Sequence

A user is unable to access the company server from a computer. On issuing the ipconfig
command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What
type of address is this? experimental

What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3? 64 bytes –
1518 bytes
What is the name given to the Ethernet MAC sublayer PDU? Frame

What is the purpose of using a source port number in a TCP communication? to keep track of
multiple conversations between devices

A network administrator notices that the default gateway devices sends an ICMP Redirect
message to the workstation when the workstation tries to connect to file server on another
network. What is the purpose for this ICMP message? To notify the workstation, that another
router on the same network, is the better default-gateway to reach the remote server

A user who is unable to connect to the file server contacts the help desk. The helpdesk
technician asks the user to ping the IP address of the default gateway that is configured on the
workstation. What is the purpose for this command? to test if the workstation can communicate
on the network

Which type of IPv6 address is not routable and used for communication on a single subnet?
link-local address

Which two statement describe broadcast transmissions on a wired network? (Choose two.)
Directed broadcasts are intended for all hosts on a local or remote network, Limited broadcasts
are only intended for the hosts on a local network

Which entities are involved in a temporary communication that is established by the transport
layer? applications

Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider.
With this prefix, how many bits are available for your organization to create subnetworks? 128

You might also like