Datacom Net1
Datacom Net1
Networking 1
1. Dashboard
2. My courses
3. UGRD-IT6201-2023T
4. Week 2: Configuring a Network Operating System
5. Prelim Quiz 1
Flag question
Question text
What is the Cisco IOS?
Select one:
a.
The configuration for the Cisco network device
b.
The CPU for the Cisco network device
c.
The memory for the Cisco network device
d.
The operating system for the Cisco network device
Feedback
Your answer is correct.
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:
a.
Type help and press the Enter key at the prompt
b.
Type the command and then press the? key
c.
Type the command and then press CTRL-C
d.
Type the command and then press the Tab key
e.
Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a technician enter the command copy startup-config running
config?
Select one:
a.
to save an active configuration to NVRAM
b.
to make a changed configuration the new startup configuration
c.
to remove all configuration from the switch
d.
to copy an existing configuration into RAM
Feedback
Your answer is correct.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a.
a traditional network
b.
an extranet
c.
a storage area network
d.
a converged network
Feedback
Your answer is correct.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
Select one:
a.
virtualization
b.
maintaining communication integrity
c.
BYOD
d.
online collaboration
Feedback
Your answer is correct.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An Answer is a private connection of LANs and WANs that belongs
INTRANET
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a wiki?
Select one:
a.
a web page that groups of people can edit and review
b.
an audio-based medium that is used to deliver information to a wide
audience
c.
an online meeting
d.
a personal journal that is posted on the internet
Feedback
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a.
VoIP
b.
Web traffic
c.
Order processing
d.
Email
Feedback
Your answer is correct.
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:
a.
Configuring a VTY password
b.
Configuring a default gateway
c.
Configuring a console password
d.
Configuring an IP address
Feedback
Your answer is correct.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
It does not allow spaces
b.
It cannot start with a number
c.
Its maximum length is 255 characters.
d.
It must be registered with a DNS server
Feedback
Your answer is correct.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:
a.
DSL
b.
Satellite
c.
Cellular
d.
Dial-up
Feedback
Your answer is correct.
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:
a.
Instant messaging
b.
TelePresence endpoint
c.
Wiki
d.
Access point
e.
Podcasting
f.
Weblog (blog)
Feedback
Your answer is correct.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A Answer network is able to expand to accept new devices and
Scalable
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:
a.
WLAN
b.
LAN
c.
MAN
d.
SAN
e.
WAN
Feedback
Your answer is correct.
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:
a.
Switch# sh?
b.
Switch# status?
c.
Switch# show?
d.
Switch# help
Feedback
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a.
Command
b.
A space
c.
Argument
d.
Keyword
Feedback
Your answer is correct.
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
Telnet access
b.
password encryption
c.
physical switchport access
d.
SVI
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In which scenario would the use of a WISP be recommended
Select one:
a.
an Internet cafe in a city
b.
a farm in rural area without wired broadband access
c.
any home with multiple wireless devices
d.
an apartment in a building with cable access to the Internet
Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:
a.
identity theft
b.
zero – day attack
c.
spyware
d.
DoS attack
Feedback
Your answer is correct.
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:
a.
Through the CLI using a terminal emulator
b.
With a Cisco-proprietary application
c.
By the use of a custom GUI
d.
Using a web browser
Feedback
Your answer is correct.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which devices would be considered end devices on a network? (Choose
four.)
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a.
IP addressing scheme
b.
Length and type of all cable runs
c.
Location of departmental switch
d.
Location of departmental printer
Feedback
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a.
AUX port
b.
Web interface
c.
SSH
d.
Console port
e.
Telnet
Feedback
Your answer is correct.
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
an Internet cafe in a city
b.
a farm in a rural area without wired broadband access
c.
an apartment in a building with cable access to the Internet
d.
any home with multiple wireless devices
Feedback
Your answer is correct.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
to add a password to a Cisco network device
b.
to provide automatic (unmanned) management of Cisco network devices
c.
to monitor the number of times a device has been powered on and of
d.
to test the performance on a particular LAN
Feedback
Your answer is correct.
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a converged network?
Select one:
a.
A network that makes use of both fiber-optic and copper connections
b.
A network where voice, video, and data move over the same infrastructure
c.
A network that makes use of both wired and wireless technology
d.
A network that makes use of both wired and wireless technology
Feedback
Your answer is correct.
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:
a.
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has
been pressed.
b.
Copy the running configuration to the startup configuration file.
c.
Copy the information in the startup configuration file to the running
configuration
d.
Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
the consoled line password
b.
the VTY line password
c.
all configured passwords
d.
the privileged executive mode password
Feedback
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:
a.
NVRAM
b.
Startup config
c.
Terminal emulator
d.
Running config
Feedback
Your answer is correct.
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:
a.
local router
b.
local switch
c.
DNS server
d.
DHCP server
Feedback
Your answer is correct.
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:
a.
Ctrl-N
b.
Ctrl-P
c.
Right Arrow
d.
Tab
e.
Up Arrow
f.
Down Arrow
Feedback
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a fault-tolerant network?
Select one:
a.
A network that offers secure transactions
b.
A network that can provide priority treatment of voice and video traffic
c.
A network that is incapable of failing
d.
A network that can reroute traffic in case of device failure
Feedback
Your answer is correct.
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:
a.
EaSt-2+56(config)#
b.
EaSt-58(config)#
c.
East-2+56(config)#
d.
% Invalid input detected
e.
Switch EaSt-2+56(config)#
f.
Switch(config)#
Feedback
Your answer is correct.
Question 37
Partially correct
Mark 0.67 out of 1.00
Flag question
Question text
What are the primary requirements of information security? (Choose three.)
Question 38
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a network that supports QoS?
Select one:
a.
Data sent over the network is not altered in transmission
b.
The network should be able to expand to keep up with user demand
c.
The network provides predictable levels of service to different types of
traffic
d.
The fewest possible devices are affected by a failure
Feedback
Your answer is correct.
Question 39
Correct
Mark 1.00 out of 1.00
Flag question
Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Question 40
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er
Flag question
Question text
What is the Cisco IOS?
Select one:
a.
The configuration for the Cisco network device
b.
The CPU for the Cisco network device
c.
The memory for the Cisco network device
d.
The operating system for the Cisco network device
Feedback
Your answer is correct.
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:
a.
Type help and press the Enter key at the prompt
b.
Type the command and then press the? key
c.
Type the command and then press CTRL-C
d.
Type the command and then press the Tab key
e.
Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a technician enter the command copy startup-config running
config?
Select one:
a.
to save an active configuration to NVRAM
b.
to make a changed configuration the new startup configuration
c.
to remove all configuration from the switch
d.
to copy an existing configuration into RAM
Feedback
Your answer is correct.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a.
a traditional network
b.
an extranet
c.
a storage area network
d.
a converged network
Feedback
Your answer is correct.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
Select one:
a.
virtualization
b.
maintaining communication integrity
c.
BYOD
d.
online collaboration
Feedback
Your answer is correct.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An Answer is a private connection of LANs and WANs that belongs
INTRANET
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Flag question
Question text
What is a wiki?
Select one:
a.
a web page that groups of people can edit and review
b.
an audio-based medium that is used to deliver information to a wide
audience
c.
an online meeting
d.
a personal journal that is posted on the internet
Feedback
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a.
VoIP
b.
Web traffic
c.
Order processing
d.
Email
Feedback
Your answer is correct.
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:
a.
Configuring a VTY password
b.
Configuring a default gateway
c.
Configuring a console password
d.
Configuring an IP address
Feedback
Your answer is correct.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
It does not allow spaces
b.
It cannot start with a number
c.
Its maximum length is 255 characters.
d.
It must be registered with a DNS server
Feedback
Your answer is correct.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:
a.
DSL
b.
Satellite
c.
Cellular
d.
Dial-up
Feedback
Your answer is correct.
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:
a.
Instant messaging
b.
TelePresence endpoint
c.
Wiki
d.
Access point
e.
Podcasting
f.
Weblog (blog)
Feedback
Your answer is correct.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A Answer network is able to expand to accept new devices and
Scalable
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:
a.
WLAN
b.
LAN
c.
MAN
d.
SAN
e.
WAN
Feedback
Your answer is correct.
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:
a.
Switch# sh?
b.
Switch# status?
c.
Switch# show?
d.
Switch# help
Feedback
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a.
Command
b.
A space
c.
Argument
d.
Keyword
Feedback
Your answer is correct.
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
Telnet access
b.
password encryption
c.
physical switchport access
d.
SVI
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In which scenario would the use of a WISP be recommended
Select one:
a.
an Internet cafe in a city
b.
a farm in rural area without wired broadband access
c.
any home with multiple wireless devices
d.
an apartment in a building with cable access to the Internet
Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:
a.
identity theft
b.
zero – day attack
c.
spyware
d.
DoS attack
Feedback
Your answer is correct.
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:
a.
Through the CLI using a terminal emulator
b.
With a Cisco-proprietary application
c.
By the use of a custom GUI
d.
Using a web browser
Feedback
Your answer is correct.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which devices would be considered end devices on a network? (Choose
four.)
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of information would be found on a logical topology diagram?
Select one:
a.
IP addressing scheme
b.
Length and type of all cable runs
c.
Location of departmental switch
d.
Location of departmental printer
Feedback
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a.
AUX port
b.
Web interface
c.
SSH
d.
Console port
e.
Telnet
Feedback
Your answer is correct.
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
an Internet cafe in a city
b.
a farm in a rural area without wired broadband access
c.
an apartment in a building with cable access to the Internet
d.
any home with multiple wireless devices
Feedback
Your answer is correct.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
to add a password to a Cisco network device
b.
to provide automatic (unmanned) management of Cisco network devices
c.
to monitor the number of times a device has been powered on and of
d.
to test the performance on a particular LAN
Feedback
Your answer is correct.
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a converged network?
Select one:
a.
A network that makes use of both fiber-optic and copper connections
b.
A network where voice, video, and data move over the same infrastructure
c.
A network that makes use of both wired and wireless technology
d.
A network that makes use of both wired and wireless technology
Feedback
Your answer is correct.
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:
a.
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has
been pressed.
b.
Copy the running configuration to the startup configuration file.
c.
Copy the information in the startup configuration file to the running
configuration
d.
Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
the consoled line password
b.
the VTY line password
c.
all configured passwords
d.
the privileged executive mode password
Feedback
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:
a.
NVRAM
b.
Startup config
c.
Terminal emulator
d.
Running config
Feedback
Your answer is correct.
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:
a.
local router
b.
local switch
c.
DNS server
d.
DHCP server
Feedback
Your answer is correct.
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:
a.
Ctrl-N
b.
Ctrl-P
c.
Right Arrow
d.
Tab
e.
Up Arrow
f.
Down Arrow
Feedback
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a fault-tolerant network?
Select one:
a.
A network that offers secure transactions
b.
A network that can provide priority treatment of voice and video traffic
c.
A network that is incapable of failing
d.
A network that can reroute traffic in case of device failure
Feedback
Your answer is correct.
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:
a.
EaSt-2+56(config)#
b.
EaSt-58(config)#
c.
East-2+56(config)#
d.
% Invalid input detected
e.
Switch EaSt-2+56(config)#
f.
Switch(config)#
Feedback
Your answer is correct.
Question 37
Partially correct
Mark 0.67 out of 1.00
Flag question
Question text
What are the primary requirements of information security? (Choose three.)
Question 38
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a network that supports QoS?
Select one:
a.
Data sent over the network is not altered in transmission
b.
The network should be able to expand to keep up with user demand
c.
The network provides predictable levels of service to different types of
traffic
d.
The fewest possible devices are affected by a failure
Feedback
Your answer is correct.
Question 39
Correct
Mark 1.00 out of 1.00
Flag question
Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Question 40
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er
Question text
What organization is responsible for the overall management and
development of Internet standards?
Select one:
a.
IETF
b.
IAB
c.
IRTF
d.
IEEE
e.
ISO
Feedback
Your answer is incorrect.
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following elements do both human and computer
communication systems have in common? (Choose three.)
Select one or more:
a.
Source
b.
Keyboard
c.
Default gateway
d.
Channel
e.
Receiver
Feedback
Your answer is correct.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is and advantage of using standards to develop and
implement protocols?
Select one:
a.
A particular protocol can be implemented by one manufacturer
b.
Products from different manufacturers can interoperate successfully
c.
Standards provide flexibility for manufacturers to create devices that
comply with unique requirements
d.
Different manufacturers are free to apply different requirements when
implementing a protocol
Feedback
Your answer is correct.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which application layer protocol allows users on one network to reliably
transfer files to and from a host on another network?
Select one:
a.
HTTP
b.
FTP
c.
IMAP
d.
TFTP
e.
DHCP
Feedback
Your answer is correct.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which message delivery option is used when all devices need to receive the
same message simultaneously?
Select one:
a.
multicast
b.
duplex
c.
unicast
d.
broadcast
Feedback
Your answer is correct.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following TCP/IP protocols exist at the transport layer of the
TCP/IP reference model? (Choose two.)
Select one or more:
a.
TCP
b.
FTP
c.
HTTP
d.
UDP
e.
DNS
Feedback
Your answer is correct.
Question 7
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Which message timing factor impacts how much information can be sent
and the speed at which it can be delivered?
Select one:
a.
Response timeout
b.
Access method
c.
Delay speed
d.
Flow control
Feedback
Your answer is incorrect.
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two statements are true of the deterministic access method?(Choose
two.)
Feedback
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is an advantage of using standards to develop and
implement protocols?
Select one:
a.
Products from different manufacturers can interoperate successfully
b.
Different manufacturers are free to apply different requirements when
implementing a protocol
c.
Standard provide flexibility for manufacturers to create devices that comply
with unique requirements
d.
A particular protocol can only be implemented by one manufacturer
Feedback
Your answer is correct.
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What command will prevent all unencrypted passwords from displaying in
plain text in a configuration file?
Select one:
a.
(config) # enable secret Encrypted_Password
b.
(config-line) # password secret
c.
(config) # enable secret Secret_Password
d.
(config) # service password-encryption
e.
(config)# enable password secret
Feedback
Your answer is correct.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization develops the 802 family of standard for wired and
wireless LANs and MANs?
Select one:
a.
IEEE
b.
ISO
c.
ISOC
d.
IANA
e.
ITU-T
Feedback
Your answer is correct.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which OSI reference model layer is responsible for common representation
of the data transferred between application layer services?
Select one:
a.
Session
b.
Network
c.
Physical
d.
Data link
e.
Transport
f.
Application
g.
Presentation
Feedback
Your answer is correct.
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two factors influence the method that is used for media access
control? (Choose two.)
Flag question
Question text
Which of the following OSI model layers have the same functionality as the
network access layer in the TCP/IP model? (Choose two.)
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What name is given to a group of interrelated protocols necessary to
perform a communication function?
Select one:
a.
Functional collection
b.
Protocol suite
c.
Protocol stack
d.
Functional protocol
Feedback
Your answer is correct.
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In fiber optic meda, the signals are represented as patterns of Answer
.
Light
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of protocol describes communication over a data link and the
physical transmission of data on the network media?
Select one:
a.
Application protocol
b.
Internet protocol
c.
Transport protocol
d.
Network access protocol
Feedback
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which TCP/IP model layer is responsible for providing the best path
through the network?
Select one:
a.
Application
b.
Internet
c.
Network Access
d.
Transport
Feedback
Your answer is correct.
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization is responsible for developing communications
standards for Voice over IP (VoIP) devices?
Select one:
a.
The Internet Corporation for Assigned Names and Numbers (ICANN)
b.
The Electronics Industry Alliance (EIA)
c.
The Telecommunications Industry Association (TIA)
d.
The International Telecommunications Union-Telecommunications
Standardization Sector (ITU-T)
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What happens to frames that are too long or too short for the channel
used?
Select one:
a.
They are delivered but much slower than proper-size frames.
b.
They are dropped.
c.
They clog the network and block the delivery of other frames.
d.
They are returned to the sender.
e.
They are broken up into smaller pieces.
Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What three functions are defined by network protocols to allow
communication between known source and destination IP addresses?
(Choose three.)
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the name given to a one-to-many message delivery option?
Select one:
a.
Unicast
b.
Broadcast
c.
Manycast
d.
Multicast
Feedback
Your answer is correct.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two statements are true regarding the user EXEC mode? (Choose
two.)
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What will a network administrator use to modify a configuration on a Cisco
router?
Select one:
a.
a control panel
b.
Windows Explorer
c.
a DHCP server
d.
the Windows command prompt
e.
IOS
Feedback
Your answer is correct.
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the transport layer PDU?
Select one:
a.
Segment
b.
Data
c.
Packet
d.
Bit
e.
Frame
Feedback
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of protocols in data communications?
Select one:
a.
specifying the device operating systems that will support the
communication
b.
determining the electronic specifications to enable the communication
c.
providing the rules required for a specific type of communication to occur
d.
specifying the bandwidth of the channel or medium for each type of
communication
Feedback
Your answer is correct.
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are examples of proprietary protocols? (Choose
two.)
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization is responsible for the standard that defines Media
Access Control for wired Ethernet?
Select one:
a.
ISO
b.
IAB
c.
IETF
d.
IEEE
e.
ISOC
Feedback
Your answer is correct.
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two message timing mechanisms are used in data communication?
(Choose two.)
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which is a function of the Logical Link Control (LLC) sublayer?
Select one:
a.
to define the media access processes that are performed by the hardware
b.
to identify which network layer protocol is being used
c.
to accept segments and package them into data units that are called
packets
d.
to provide data link layer addressing
Feedback
Your answer is correct.
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement is correct about network protocols?
Select one:
a.
They are only required for exchange of message between devices on
remote network
b.
They define how messages are exchanged between the sources and the
destination
c.
They all function in the network access layer of TCP/IP
d.
Network protocols define the type of hardware that is used and how it is
mounted in racks
Feedback
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What happens when two devices on the same subnet are communicating?
Select one:
a.
The frame will be sent to the default gateway for delivery to the receiving
device
b.
The sending device will use ARP to determine the IP address of the receiver
c.
The host portion of the IP addresses will be different
d.
The data link layer addresses are added to the IP header
Feedback
Your answer is correct.
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which logical address is used for delivery of data to a remote network?
Select one:
a.
destination IP address
b.
source IP address
c.
source MAC address
d.
destination MAC address
e.
destination port number
Feedback
Your answer is correct.
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A Answer address is defined as a reserved address that routes
Loopback
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two components are added to the PDU at the network access layer?
(Choose two.)
State Finished
Flag question
Question text
What is the Cisco IOS?
Select one:
a.
c.
Question 2
Correct
Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:
a.
Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.
Question 3
Correct
Question text
Why would a technician enter the command copy startup-config running
config?
Select one:
a.
Question 4
Correct
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a.
a traditional network
b.
an extranet
c.
a converged network
Feedback
Your answer is correct.
Question 5
Correct
Flag question
Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
Select one:
a.
virtualization
b.
BYOD
d.
online collaboration
Feedback
Your answer is correct.
Question 6
Correct
Flag question
Question text
An Answer is a private connection of LANs and WANs that belongs
INTRANET
Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:
a.
Scalability
b.
No centralized administration
d.
Complex configuration
Feedback
Your answer is correct.
Question 8
Correct
Flag question
Question text
What is a wiki?
Select one:
a.
an online meeting
d.
Question 9
Correct
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a.
VoIP
b.
Web traffic
c.
Order processing
d.
Email
Feedback
Your answer is correct.
Question 10
Correct
Flag question
Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:
a.
Configuring an IP address
Feedback
Your answer is correct.
Question 11
Correct
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
Question 12
Correct
Flag question
Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:
a.
DSL
b.
Satellite
c.
Cellular
d.
Dial-up
Feedback
Your answer is correct.
Question 13
Correct
Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:
a.
Instant messaging
b.
TelePresence endpoint
c.
Wiki
d.
Access point
e.
Podcasting
f.
Weblog (blog)
Feedback
Your answer is correct.
Question 14
Correct
Question text
A Answer network is able to expand to accept new devices and
Scalable
Flag question
Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:
a.
Mobile services
b.
Metro Ethernet
c.
Broadband cable
d.
Leased lines
e.
Cellular
Feedback
Your answer is correct.
Question 16
Correct
Flag question
Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:
a.
WLAN
b.
LAN
c.
MAN
d.
SAN
e.
WAN
Feedback
Your answer is correct.
Question 17
Correct
Flag question
Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:
a.
Switch# sh?
b.
Switch# status?
c.
Switch# show?
d.
Switch# help
Feedback
Your answer is correct.
Question 18
Correct
Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a.
Command
b.
A space
c.
Argument
d.
Keyword
Feedback
Your answer is correct.
Question 19
Correct
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
Telnet access
b.
password encryption
c.
SVI
Feedback
Your answer is correct.
Question 20
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended
Select one:
a.
Feedback
Your answer is correct.
Question 21
Correct
Flag question
Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:
a.
identity theft
b.
spyware
d.
DoS attack
Feedback
Your answer is correct.
Question 22
Correct
Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:
a.
Question 23
Correct
Flag question
Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:
a.
IP phone
c.
Server
d.
Tablet computer
e.
Switch
f.
Printer
Feedback
Your answer is correct.
Question 24
Correct
Flag question
Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:
a.
Question 25
Correct
Flag question
Question text
What type of information would be found on a logical topology diagram?
Select one:
a.
IP addressing scheme
b.
Question 26
Correct
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a.
AUX port
b.
Web interface
c.
SSH
d.
Console port
e.
Telnet
Feedback
Your answer is correct.
Question 27
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
Question 28
Correct
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
Question 29
Correct
Flag question
Question text
What is a converged network?
Select one:
a.
A network where voice, video, and data move over the same infrastructure
c.
Question 30
Correct
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:
a.
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has
been pressed.
b.
Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.
Question 31
Correct
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
Question 32
Correct
Flag question
Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:
a.
NVRAM
b.
Startup config
c.
Terminal emulator
d.
Running config
Feedback
Your answer is correct.
Question 33
Correct
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:
a.
local router
b.
local switch
c.
DNS server
d.
DHCP server
Feedback
Your answer is correct.
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:
a.
Ctrl-N
b.
Ctrl-P
c.
Right Arrow
d.
Tab
e.
Up Arrow
f.
Down Arrow
Feedback
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a fault-tolerant network?
Select one:
a.
A network that can provide priority treatment of voice and video traffic
c.
Question 36
Correct
Flag question
Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:
a.
EaSt-2+56(config)#
b.
EaSt-58(config)#
c.
East-2+56(config)#
d.
Switch EaSt-2+56(config)#
f.
Switch(config)#
Feedback
Your answer is correct.
Question 37
Partially correct
Flag question
Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:
a.
Scalability
b.
Confidentiality
c.
Integrity
d.
Availability
e.
QoS
Feedback
Your answer is partially correct.
Question 38
Correct
Flag question
Question text
Which statement describes a network that supports QoS?
Select one:
a.
Question 39
Correct
Flag question
Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:
a.
It requires that a data circuit between the source and destination be
established before data can be transferred.
b.
Data packets can travel through the network using multiple different paths
e.
Question 40
Correct
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er
Question 1
Correct
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a.
SSH
b.
Telnet
c.
Console port
d.
AUX port
e.
Web interface
Feedback
Your answer is correct.
Question 2
Correct
Flag question
Question text
Which statement describes a network that supports QoS?
Select one:
a.
Flag question
Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:
a.
No centralized administration
c.
Complex configuration
d.
Scalability
Feedback
Your answer is correct.
Question 4
Correct
Question text
Why would a technician enter the command copy startup-config running
config?
Select one:
a.
Question 5
Correct
Flag question
Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:
a.
Dial-up
b.
Satellite
c.
Cellular
d.
DSL
Feedback
Your answer is correct.
Question 6
Correct
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
Question 7
Correct
Flag question
Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:
a.
Data packets can travel through the network using multiple different paths
b.
Question 8
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
Question 9
Correct
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a.
Order processing
b.
Email
c.
VoIP
d.
Web traffic
Feedback
Your answer is correct.
Question 10
Correct
Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:
a.
Question 11
Correct
Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:
a.
Configuring an IP address
Feedback
Your answer is correct.
Question 12
Partially correct
Flag question
Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:
a.
Question 13
Correct
Question text
An Answer is a private connection of LANs and WANs that belongs
INTRANET
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:
a.
Reload the device and type yes when prompted to save the configuration
c.
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has
been pressed.
d.
Question 15
Correct
Flag question
Question text
What is the Cisco IOS?
Select one:
a.
b.
Question 16
Correct
Flag question
Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:
a.
identity theft
b.
spyware
c.
DoS attack
Feedback
Your answer is correct.
Question 17
Correct
Flag question
Question text
What is a wiki?
Select one:
a.
an online meeting
d.
Question 18
Correct
Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:
a.
Terminal emulator
b.
NVRAM
c.
Running config
d.
Startup config
Feedback
Your answer is correct.
Question 19
Correct
Flag question
Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a.
A space
b.
Argument
c.
Keyword
d.
Command
Feedback
Your answer is correct.
Question 20
Correct
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
Question 21
Correct
Flag question
Question text
A Answer network is able to expand to accept new devices and
Scalable
Flag question
Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:
a.
Availability
b.
Scalability
c.
Integrity
d.
Confidentiality
e.
QoS
Feedback
Your answer is partially correct.
Question 23
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended
Select one:
a.
d.
Question 24
Correct
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
Question 25
Correct
Flag question
Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:
a.
Type the command, type help, and press the Enter key.
c.
Question 26
Correct
Flag question
Question text
What is a converged network?
Select one:
a.
A network where voice, video, and data move over the same infrastructure
b.
Question 27
Correct
Flag question
Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:
a.
Instant messaging
b.
Wiki
c.
Access point
d.
Podcasting
e.
TelePresence endpoint
f.
Weblog (blog)
Feedback
Your answer is correct.
Question 28
Correct
Flag question
Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:
a.
SAN
b.
WLAN
c.
MAN
d.
WAN
e.
LAN
Feedback
Your answer is correct.
Question 29
Correct
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:
a.
local switch
b.
local router
c.
DHCP server
d.
DNS server
Feedback
Your answer is correct.
Question 30
Correct
Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
Select one:
a.
virtualization
b.
online collaboration
c.
BYOD
Feedback
Your answer is correct.
Question 31
Correct
Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:
a.
Broadband cable
b.
Leased lines
c.
Cellular
d.
Metro Ethernet
e.
Mobile services
Feedback
Your answer is correct.
Question 32
Correct
Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:
a.
Tab
b.
Ctrl-P
c.
Up Arrow
d.
Down Arrow
e.
Ctrl-N
f.
Right Arrow
Feedback
Your answer is correct.
Question 33
Correct
Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er
Flag question
Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:
a.
East-2+56(config)#
c.
Switch EaSt-2+56(config)#
d.
Switch(config)#
e.
EaSt-2+56(config)#
f.
EaSt-58(config)#
Feedback
Your answer is correct.
Question 35
Correct
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
SVI
b.
password encryption
d.
Telnet access
Feedback
Your answer is correct.
Question 36
Correct
Flag question
Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:
a.
Switch
b.
Server
d.
Printer
e.
IP phone
f.
Tablet computer
Feedback
Your answer is correct.
Question 37
Correct
Flag question
Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:
a.
Switch# show?
b.
Switch# status?
c.
Switch# help
d.
Switch# sh?
Feedback
Your answer is correct.
Question 38
Correct
Flag question
Question text
What is a fault-tolerant network?
Select one:
a.
A network that can provide priority treatment of voice and video traffic
c.
Question 39
Correct
Question text
What type of information would be found on a logical topology diagram?
Select one:
a.
IP addressing scheme
b.
Question 40
Correct
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a.
a converged network
b.
an extranet
d.
a traditional network
Feedback
Your answer is correct.
Flag question
Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:
a.
Configuring an IP address
d.
Question 3
Correct
Flag question
Question text
What is the Cisco IOS?
Select one:
a.
Feedback
Your answer is correct.
Question 4
Correct
Flag question
Question text
Which statement describes a network that supports QoS?
Select one:
a.
Question 5
Correct
Flag question
Question text
A Answer network is able to expand to accept new devices and
scalable
Flag question
Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:
a.
Down Arrow
b.
Up Arrow
c.
Ctrl-P
d.
Tab
e.
Ctrl-N
f.
Right Arrow
Feedback
Your answer is correct.
Question 7
Correct
Flag question
Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:
a.
Switch# status?
b.
Switch# sh?
c.
Switch# show?
d.
Switch# help
Feedback
Your answer is correct.
Question 8
Correct
Flag question
Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:
a.
Availability
b.
Confidentiality
c.
Scalability
d.
Integrity
e.
QoS
Feedback
Your answer is correct.
Question 9
Correct
Flag question
Question text
Why would a technician enter the command copy startup-config running
config?
Select one:
a.
Question 10
Correct
Flag question
Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
Select one:
a.
online collaboration
b.
virtualization
d.
BYOD
Feedback
Your answer is correct.
Question 11
Correct
Flag question
Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:
a.
identity theft
c.
DoS attack
d.
spyware
Feedback
Your answer is correct.
Question 12
Correct
Flag question
Question text
What is a wiki?
Select one:
a.
an online meeting
Feedback
Your answer is correct.
Question 13
Correct
Question text
What is a converged network?
Select one:
a.
A network where voice, video, and data move over the same infrastructure
d.
Question 14
Correct
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a.
an extranet
c.
a converged network
d.
a traditional network
Feedback
Your answer is correct.
Question 15
Correct
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
Question 16
Incorrect
Flag question
Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:
a.
LAN
b.
SAN
c.
WLAN
d.
MAN
e.
WAN
Feedback
Your answer is incorrect.
Question 17
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended
Select one:
a.
Feedback
Your answer is correct.
Question 18
Correct
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
SLOWER
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
Question 20
Correct
Flag question
Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:
a.
Type the command, type help, and press the Enter key.
b.
Question 21
Correct
Flag question
Question text
What is a fault-tolerant network?
Select one:
a.
A network that can provide priority treatment of voice and video traffic
c.
Question 22
Correct
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a.
Order processing
b.
Email
c.
Web traffic
d.
VoIP
Feedback
Your answer is correct.
Question 24
Correct
Flag question
Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:
a.
Question 25
Correct
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:
a.
local router
b.
DHCP server
c.
local switch
d.
DNS server
Feedback
Your answer is correct.
Question 26
Correct
Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:
a.
By the use of a custom GUI
b.
Question 27
Correct
Flag question
Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a.
Command
b.
A space
c.
Argument
d.
Keyword
Feedback
Your answer is correct.
Question 28
Correct
Flag question
Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:
a.
Switch(config)#
b.
Switch EaSt-2+56(config)#
c.
EaSt-2+56(config)#
e.
East-2+56(config)#
f.
EaSt-58(config)#
Feedback
Your answer is correct.
Question 29
Correct
Flag question
Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:
a.
Metro Ethernet
b.
Cellular
c.
Leased lines
d.
Broadband cable
e.
Mobile services
Feedback
Your answer is correct.
Question 30
Correct
Flag question
Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:
a.
NVRAM
b.
Running config
c.
Startup config
d.
Terminal emulator
Feedback
Your answer is correct.
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:
a.
No centralized administration
b.
Complex configuration
c.
Scalability
Feedback
Your answer is correct.
Question 32
Correct
Flag question
Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:
a.
Printer
b.
Server
c.
Tablet computer
d.
IP phone
e.
Switch
Feedback
Your answer is correct.
Question 33
Correct
Flag question
Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:
a.
Cellular
b.
Satellite
c.
DSL
d.
Dial-up
Feedback
Your answer is correct.
Question 34
Correct
Flag question
Question text
What type of information would be found on a logical topology diagram?
Select one:
a.
Location of departmental printer
b.
IP addressing scheme
d.
Question 35
Correct
Flag question
Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:
a.
Data packets can travel through the network using multiple different paths
e.
Question 36
Correct
Flag question
Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:
a.
Weblog (blog)
b.
Instant messaging
c.
Access point
d.
Podcasting
e.
Wiki
f.
TelePresence endpoint
Feedback
Your answer is correct.
Question 37
Correct
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a.
Web interface
b.
Telnet
c.
Console port
d.
SSH
e.
AUX port
Feedback
Your answer is correct.
Question 38
Correct
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
password encryption
b.
Telnet access
c.
SVI
Feedback
Your answer is correct.
Question 39
Correct
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:
a.
Reload the device and type yes when prompted to save the configuration
d.
Question 40
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
State Finished
Question 1
Correct
Flag question
Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:
a.
Availability
b.
Integrity
c.
Scalability
d.
QoS
e.
Confidentiality
Feedback
Your answer is correct.
Question 2
Correct
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
Question 3
Correct
Flag question
Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:
a.
Running config
b.
Terminal emulator
c.
NVRAM
d.
Startup config
Feedback
Your answer is correct.
Question 4
Correct
Question text
What type of information would be found on a logical topology diagram?
Select one:
a.
IP addressing scheme
Feedback
Your answer is correct.
Question 5
Incorrect
Flag question
Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:
a.
WLAN
b.
LAN
c.
SAN
d.
WAN
e.
MAN
Feedback
Your answer is incorrect.
Question 6
Correct
Flag question
Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:
a.
Mobile services
b.
Leased lines
c.
Metro Ethernet
d.
Broadband cable
e.
Cellular
Feedback
Your answer is correct.
Question 7
Correct
Flag question
Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a.
Keyword
b.
Argument
c.
Command
d.
A space
Feedback
Your answer is correct.
Question 8
Correct
Flag question
Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:
a.
Switch# status?
b.
Switch# show?
c.
Switch# sh?
d.
Switch# help
Feedback
Your answer is correct.
Question 9
Correct
Flag question
Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:
a.
DoS attack
b.
identity theft
c.
spyware
d.
zero – day attack
Feedback
Your answer is correct.
Question 10
Correct
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er
Flag question
Question text
What is a fault-tolerant network?
Select one:
a.
A network that can provide priority treatment of voice and video traffic
Feedback
Your answer is correct.
Question 12
Correct
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
Question 13
Correct
Flag question
Question text
What is a wiki?
Select one:
a.
an online meeting
b.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a network that supports QoS?
Select one:
a.
Question 15
Correct
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a.
Web traffic
b.
Order processing
c.
VoIP
d.
Email
Feedback
Your answer is correct.
Question 16
Correct
Flag question
Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:
a.
Expensive to set up and maintain
b.
Scalability
c.
Complex configuration
d.
No centralized administration
Feedback
Your answer is correct.
Question 17
Correct
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
Question 18
Correct
Flag question
Question text
Why would a technician enter the command copy startup-config running
config?
Select one:
a.
Question 19
Correct
Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:
a.
Question 20
Correct
Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:
a.
Question 21
Correct
Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:
a.
Data packets can travel through the network using multiple different paths
d.
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:
a.
Switch
b.
IP phone
d.
Tablet computer
e.
Server
f.
Printer
Feedback
Your answer is correct.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a converged network?
Select one:
a.
A network where voice, video, and data move over the same infrastructure
c.
Question 24
Correct
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a.
a traditional network
b.
an extranet
c.
a converged network
d.
Question 25
Correct
Flag question
Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:
a.
Dial-up
b.
Cellular
c.
DSL
d.
Satellite
Feedback
Your answer is correct.
Question 26
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
Question 27
Correct
Flag question
Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:
a.
Type the command, type help, and press the Enter key.
b.
Question 28
Correct
Flag question
Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
Select one:
a.
online collaboration
b.
virtualization
d.
BYOD
Feedback
Your answer is correct.
Question 29
Correct
Flag question
Question text
What is the Cisco IOS?
Select one:
a.
d.
Flag question
Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:
a.
Podcasting
b.
Wiki
c.
TelePresence endpoint
d.
Weblog (blog)
e.
Access point
f.
Instant messaging
Feedback
Your answer is correct.
Question 31
Correct
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a.
Web interface
b.
AUX port
c.
SSH
d.
Console port
e.
Telnet
Feedback
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An Answer is a private connection of LANs and WANs that belongs
INTRANET
Flag question
Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:
a.
East-2+56(config)#
b.
Switch(config)#
c.
Switch EaSt-2+56(config)#
d.
EaSt-2+56(config)#
e.
EaSt-58(config)#
f.
Question 34
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended
Select one:
a.
c.
Question 35
Correct
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
SVI
c.
password encryption
d.
Telnet access
Feedback
Your answer is correct.
Question 36
Correct
Flag question
Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:
a.
Configuring an IP address
d.
Question 37
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A Answer network is able to expand to accept new devices and
Scalable
Flag question
Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:
a.
Up Arrow
b.
Right Arrow
c.
Ctrl-P
d.
Down Arrow
e.
Ctrl-N
f.
Tab
Feedback
Your answer is correct.
Question 39
Correct
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:
a.
Reload the device and type yes when prompted to save the configuration
d.
Question 40
Correct
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:
a.
local router
b.
local switch
c.
DHCP server
d.
DNS server
Feedback
Your answer is correct.
State Finished
Question 1
Correct
Flag question
Question text
What is the Cisco IOS?
Select one:
a.
c.
The memory for the Cisco network device
d.
Question 2
Correct
Flag question
Question text
A network administer has forgotten the argument of an IOS command.
How would the administrator get help from the IOS CLI to complete the
command correctly?
Select one:
a.
Type the command, type help, and press the Enter key.
Feedback
Your answer is correct.
Question 3
Correct
Flag question
Question text
Why would a technician enter the command copy startup-config running
config?
Select one:
a.
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a.
a traditional network
b.
an extranet
c.
a converged network
Feedback
Your answer is correct.
Question 5
Correct
Question text
A data center has recently updated a physical server to host multiple
operating systems on a single CPU. The data center can now provide each
customer with a separate web server without having to allocate an actual
discrete server for each customer. What is the network trend that is being
implemented by the data center in this situation?
Select one:
a.
virtualization
b.
BYOD
d.
online collaboration
Feedback
Your answer is correct.
Question 6
Correct
Question text
An Answer is a private connection of LANs and WANs that belongs
INTRANET
Flag question
Question text
Which of the following are disadvantages of peer-to-peer networking?
(Choose two.)
Select one or more:
a.
Scalability
b.
No centralized administration
d.
Complex configuration
Feedback
Your answer is correct.
Question 8
Correct
Flag question
Question text
What is a wiki?
Select one:
a.
an online meeting
d.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a.
VoIP
b.
Web traffic
c.
Order processing
d.
Email
Feedback
Your answer is correct.
Question 10
Correct
Flag question
Question text
What is the primary defense against unauthorized remote access to
network devices?
Select one:
a.
Configuring an IP address
Feedback
Your answer is correct.
Question 11
Correct
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a.
Question 12
Correct
Flag question
Question text
Which technology would be best to provide a home user with a highspeed,
always-on Internet connection?
Select one:
a.
DSL
b.
Satellite
c.
Cellular
d.
Dial-up
Feedback
Your answer is correct.
Question 13
Correct
Flag question
Question text
What is a group of web pages that groups of individuals can edit and view
together called?
Select one:
a.
Instant messaging
b.
TelePresence endpoint
c.
Wiki
d.
Access point
e.
Podcasting
f.
Weblog (blog)
Feedback
Your answer is correct.
Question 14
Correct
Flag question
Question text
A Answer network is able to expand to accept new devices and
Scalable
Flag question
Question text
Which of the following are business-class Internet connection technologies
normally supplied by a service provider? (Choose two.)
Select one or more:
a.
Mobile services
b.
Metro Ethernet
c.
Broadband cable
d.
Leased lines
e.
Cellular
Feedback
Your answer is correct.
Question 16
Correct
Flag question
Question text
What is a network infrastructure that provides access to other networks
over a wide geographic area?
Select one:
a.
WLAN
b.
LAN
c.
MAN
d.
SAN
e.
WAN
Feedback
Your answer is correct.
Question 17
Correct
Flag question
Question text
What command will display a list of keywords available for viewing the
status of an IOS switch?
Select one:
a.
Switch# sh?
b.
Switch# status?
c.
Switch# show?
d.
Switch# help
Feedback
Your answer is correct.
Question 18
Correct
Flag question
Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a.
Command
b.
A space
c.
Argument
d.
Keyword
Feedback
Your answer is correct.
Question 19
Correct
Flag question
Question text
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Select one:
a.
Telnet access
b.
password encryption
c.
SVI
Feedback
Your answer is correct.
Question 20
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended
Select one:
a.
Feedback
Your answer is correct.
Question 21
Correct
Question text
During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that
were visited by users of the computer. Which type of threat is affecting this
computer?
Select one:
a.
identity theft
b.
spyware
d.
DoS attack
Feedback
Your answer is correct.
Question 22
Correct
Flag question
Question text
How is the Cisco IOS generally accessed and navigated?
Select one:
a.
Question 23
Correct
Flag question
Question text
Which devices would be considered end devices on a network? (Choose
four.)
Select one or more:
a.
Wireless access point
b.
IP phone
c.
Server
d.
Tablet computer
e.
Switch
f.
Printer
Feedback
Your answer is correct.
Question 24
Correct
Flag question
Question text
What are two benefits of collaboration and video-on-demand applications?
(Choose two.)
Select one or more:
a.
ensuring a more reliable network
b.
Question 25
Correct
Flag question
Question text
What type of information would be found on a logical topology diagram?
Select one:
a.
IP addressing scheme
b.
Question 26
Correct
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a.
AUX port
b.
Web interface
c.
SSH
d.
Console port
e.
Telnet
Feedback
Your answer is correct.
Question 27
Correct
Flag question
Question text
In which scenario would the use of a WISP be recommended?
Select one:
a.
Question 28
Correct
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a.
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a converged network?
Select one:
a.
A network where voice, video, and data move over the same infrastructure
c.
Question 30
Correct
Flag question
Question text
An administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the
device?
Select one:
a.
Reload the device and type yes when prompted to save the configuration
Feedback
Your answer is correct.
Question 31
Correct
Flag question
Question text
What is encrypted with the enable secret command?
Select one:
a.
Question 32
Correct
Flag question
Question text
Where is the configuration used during startup on Cisco IOS devices
located?
Select one:
a.
NVRAM
b.
Startup config
c.
Terminal emulator
d.
Running config
Feedback
Your answer is correct.
Question 33
Correct
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP
networks?
Select one:
a.
local router
b.
local switch
c.
DNS server
d.
DHCP server
Feedback
Your answer is correct.
Question 34
Correct
Flag question
Question text
To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?
Select one:
a.
Ctrl-N
b.
Ctrl-P
c.
Right Arrow
d.
Tab
e.
Up Arrow
f.
Down Arrow
Feedback
Your answer is correct.
Question 35
Correct
Flag question
Question text
What is a fault-tolerant network?
Select one:
a.
A network that can provide priority treatment of voice and video traffic
c.
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
When the command “Switch(config)# hostname EaSt2+56” is entered in a
Cisco IOS device using the CLI, what will be returned in the CLI?
Select one:
a.
EaSt-2+56(config)#
b.
EaSt-58(config)#
c.
East-2+56(config)#
d.
Switch EaSt-2+56(config)#
f.
Switch(config)#
Feedback
Your answer is correct.
Question 37
Partially correct
Mark 0.67 out of 1.00
Flag question
Question text
What are the primary requirements of information security? (Choose three.)
Select one or more:
a.
Scalability
b.
Confidentiality
c.
Integrity
d.
Availability
e.
QoS
Feedback
Your answer is partially correct.
Question 38
Correct
Question text
Which statement describes a network that supports QoS?
Select one:
a.
Question 39
Correct
Flag question
Question text
For which three reasons was a packet switched connectionless data
communications technology used when developing the Internet (Choose
three.)
Select one or more:
a.
Data packets can travel through the network using multiple different paths
e.
Question 40
Correct
Question text
The farther you are from the central office when utilizing a DSL connection,
the Answer
Slow er
State Finished
Question 1
Correct
Flag question
Question text
Which is a function of the Logical Link Control (LLC) sublayer?
Select one:
a.
to define the media access processes that are performed by the hardware
b.
to accept segments and package them into data units that are called
packets
Feedback
Your answer is correct.
Question 2
Correct
Flag question
Question text
A Answer address is defined as a reserved address that routes
loopback
Flag question
Question text
What three functions are defined by network protocols to allow
communication between known source and destination IP addresses?
(Choose three.)
Select one or more:
a.
end-device installation
b.
media selection
c.
connector specifications
d.
delivery options
e.
message size
f.
data encoding
Feedback
Your answer is correct.
Question 4
Correct
Flag question
Question text
Which two statements are true of the deterministic access method?(Choose
two.)
Select one or more:
a.
Each device has to transmit before passing the token to the next device
c.
The order of transmission is dictated by the node that asks first for the
token
d.
e.
Question 5
Correct
Flag question
Question text
What is the transport layer PDU?
Select one:
a.
Data
b.
Packet
c.
Frame
d.
Bit
e.
Segment
Feedback
Your answer is correct.
Question 6
Correct
Flag question
Question text
Which TCP/IP model layer is responsible for providing the best path
through the network?
Select one:
a.
Internet
b.
Network Access
c.
Application
d.
Transport
Feedback
Your answer is correct.
Question 7
Correct
Flag question
Question text
Which organization develops the 802 family of standard for wired and
wireless LANs and MANs?
Select one:
a.
ISO
b.
ITU-T
c.
IEEE
d.
ISOC
e.
IANA
Feedback
Your answer is correct.
Question 8
Partially correct
Flag question
Question text
Which of the following TCP/IP protocols exist at the transport layer of the
TCP/IP reference model? (Choose two.)
Select one or more:
a.
DNS
b.
FTP
c.
TCP
d.
HTTP
e.
UDP
Feedback
Your answer is partially correct.
Question 9
Correct
Flag question
Question text
What is the name given to a one-to-many message delivery option?
Select one:
a.
Multicast
b.
Unicast
c.
Manycast
d.
Broadcast
Feedback
Your answer is correct.
Question 10
Incorrect
Flag question
Question text
Which OSI reference model layer is responsible for common representation
of the data transferred between application layer services?
Select one:
a.
Physical
b.
Transport
c.
Application
d.
Network
e.
Session
f.
Presentation
g.
Data link
Feedback
Your answer is incorrect.
Question 11
Correct
Flag question
Question text
Which message delivery option is used when all devices need to receive the
same message simultaneously?
Select one:
a.
broadcast
b.
duplex
c.
unicast
d.
multicast
Feedback
Your answer is correct.
Question 12
Correct
Flag question
Question text
Which organization is responsible for developing communications
standards for Voice over IP (VoIP) devices?
Select one:
a.
Question 13
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Which statement is correct about network protocols?
Select one:
a.
They define how messages are exchanged between the sources and the
destination
c.
Question 14
Incorrect
Question text
What is the purpose of protocols in data communications?
Select one:
a.
Question 15
Correct
Flag question
Question text
Which logical address is used for delivery of data to a remote network?
Select one:
a.
source IP address
b.
destination IP address
Feedback
Your answer is correct.
Question 16
Correct
Flag question
Question text
Which of the following are examples of proprietary protocols? (Choose
two.)
Select one or more:
a.
AppleTalk
b.
Novell NetWare
c.
TCP/IP
d.
ISO
Feedback
Your answer is correct.
Question 17
Correct
Flag question
Question text
Which two statements are true regarding the user EXEC mode? (Choose
two.)
Select one or more:
a.
This is the default mode on an unconfigured router when first powered up.
Feedback
Your answer is correct.
Question 18
Correct
Flag question
Question text
What is an advantage of using standards to develop and
implement protocols?
Select one:
a.
Question 19
Correct
Flag question
Question text
What happens to frames that are too long or too short for the channel
used?
Select one:
a.
They clog the network and block the delivery of other frames.
b.
Question 20
Correct
Flag question
Question text
What happens when two devices on the same subnet are communicating?
Select one:
a.
The sending device will use ARP to determine the IP address of the receiver
b.
The frame will be sent to the default gateway for delivery to the receiving
device
Feedback
Your answer is correct.
Question 21
Correct
Flag question
Question text
What will a network administrator use to modify a configuration on a Cisco
router?
Select one:
a.
a control panel
c.
IOS
d.
Windows Explorer
e.
a DHCP server
Feedback
Your answer is correct.
Question 22
Correct
Flag question
Question text
Which of the following elements do both human and computer
communication systems have in common? (Choose three.)
Select one or more:
a.
Receiver
b.
Keyboard
c.
Channel
d.
Source
e.
Default gateway
Feedback
Your answer is correct.
Question 23
Correct
Flag question
Question text
What is and advantage of using standards to develop and
implement protocols?
Select one:
a.
Question 24
Correct
Question text
What command will prevent all unencrypted passwords from displaying in
plain text in a configuration file?
Select one:
a.
Question 25
Correct
Question text
Which application layer protocol allows users on one network to reliably
transfer files to and from a host on another network?
Select one:
a.
FTP
b.
TFTP
c.
HTTP
d.
DHCP
e.
IMAP
Feedback
Your answer is correct.
Question 26
Correct
Question text
Which organization is responsible for the standard that defines Media
Access Control for wired Ethernet?
Select one:
a.
IEEE
b.
ISOC
c.
ISO
d.
IAB
e.
IETF
Feedback
Your answer is correct.
Question 27
Correct
Question text
Which two message timing mechanisms are used in data communication?
(Choose two.)
Select one or more:
a.
encoding
b.
formatting
c.
response timeout
d.
flow control
e.
encapsulation
Feedback
Your answer is correct.
Question 28
Correct
Question text
Which two components are added to the PDU at the network access layer?
(Choose two.)
Select one or more:
a.
HTTP header
b.
IP header
c.
TCP header
d.
Trailer
e.
frame header
Feedback
Your answer is correct.
Question 29
Correct
Question text
What name is given to a group of interrelated protocols necessary to
perform a communication function?
Select one:
a.
Protocol stack
b.
Protocol suite
c.
Functional collection
d.
Functional protocol
Feedback
Your answer is correct.
Question 30
Correct
Flag question
Question text
What organization is responsible for the overall management and
development of Internet standards?
Select one:
a.
IAB
b.
ISO
c.
IRTF
d.
IETF
e.
IEEE
Feedback
Your answer is correct.
Question 31
Correct
Flag question
Question text
Which two factors influence the method that is used for media access
control? (Choose two.)
Select one or more:
a.
Question 32
Correct
Flag question
Question text
Which of the following OSI model layers have the same functionality as the
network access layer in the TCP/IP model? (Choose two.)
Select one or more:
a.
Network
b.
Data link
c.
Physical
d.
Transport
e.
Presentation
f.
Session
g.
Application
Feedback
Your answer is correct.
Question 33
Correct
Flag question
Question text
In fiber optic meda, the signals are represented as patterns of Answer
.
Light
Question 34
Correct
Flag question
Question text
Which message timing factor impacts how much information can be sent
and the speed at which it can be delivered?
Select one:
a.
Response timeout
b.
Delay speed
c.
Access method
d.
Flow control
Feedback
Your answer is correct.
Question 35
Correct
Question text
What type of protocol describes communication over a data link and the
physical transmission of data on the network media?
Select one:
a.
Transport protocol
b.
Internet protocol
c.
Application protocol
Feedback
Your answer is correct.
What type of address is 01-00-5E-0A-00-02? an address that reaches a specific group of hosts
An administrator measured the transfer of usable data across a 100 Mb/s physical channel over
a given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator
obtain goodput
What two criteria are used to help select a network medium from various network media?
(Choose two.) the distance the selected medium can successfully carry a signal the
environment where the selected medium is to be installed
What is the purpose of the physical link control field in a data link layer header? to establish the
media link
What is a characteristic of a WAN hub-and-spoke topology? The branch sites are connected to
a central site through point-point links
A network administrator needs to keep the user ID, password, and session contents private
when establishing remote CLI connectivity with a switch to manage it. Which access method
should be chosen?
The Ethernet ______ sublayer is responsible for communicating directly with the physical layer.
MAC
What process is used to place one message inside another message for transfer from the
source to the destination? Encapsulation
What is the function of the kernel of an operating software? The kernel provisions hardware
resources to meet software requirements.
Which term describes the state of a network when the demand on the network resources
exceeds the available capacity? congestion
Which area of the network would a college IT staff most likely have to redesign as a direct result
of many students bringing their own tablets and smartphones to school to access school
resources? wireless LAN
What are two functions of end devices on a network? (Choose two.) They are the interface
between humans and the communication network. They originate the data that flows through
the network.
Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.) satellite cellular
Which device performs the function of determining the path that messages should take through
internet works? a router
A router has a valid operating system and a configuration file stored in NVRAM. The
configuration file contains an enable secret password but no console password. When the
router boots up, which mode will display? user EXEC mode
What type of delivery uses data link layer addresses? local delivery
Which command or key combination allows a user to return to the previous level in the
command hierarchy? exit
Which two statements describe intermediary devices? (Choose two.) Intermediary devices
connect individual hosts to the network. Intermediary devices direct the path of the data.
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration
in a secure environment? Use the console port to locally access the switch from a serial or USB
interface of the PC.
What method can be used by two computers to ensure that packets are not dropped because
too much data is being sent too quickly? flow control
A web client is sending a request for a webpage to a web server. From the perspective of the
client, what is the correct order of the protocol stack that is used to prepare the request for
transmission? HTTP, TCP, IP, Ethernet
What type of communication will send a message to all devices on a local area network?
broadcast
Which interface command must be entered in a Layer 3 switch before IPv4 address can be
assigned to the interface? no switchport
Which two engineering organizations define open standards and protocols that apply to the data
link layer? International Organization for Standardization (ISO) International Telecommunication
Union (ITU)
Which statement describes a characteristic of the frame header fields of the data link layer?
They vary depending on protocols
When is a wired connection preffered to a wireless connection by an end-user device? when the
end-user device will run an application that requires a dedicated connection to the network
Which PDU is processed when a host computer is de-encapsulating a message at the transport
layer of the TCP/IP model segment
Within a production network, what is the purpose of configuring a switch with a default gateway
address? The default gateway address is used to forward packets originating from the switch to
remote networks.
When a client connects to an HTTP server by the use of a randomly generated source port
number, what destination port number will the HTTP server use when building a response?
the original source port number that was randomly generated by the client
What is an advantage of UDP over TCP? UDP communication requires less overhead
On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the Broadcast
MAC address.
What are two functions that are provided by the network layer? (Choose two.) providing end
devices with a unique network identifier, directing data packets to destination hosts on other
networks
During troubleshooting procedures, from which location will most Cisco routers load a limited
IOS ROM
Which value, that is contained in an IPv4 header field, is decremented by each router that
receives a packet? Time-to-Live
When transporting data from real-time applications, such as streaming audio and video, which
field in the IPv6 header can be used to inform the routers and switches to maintain the same
path for the packets in the same conversation? Flow Label
Which three fields are used in a UDP segment header? (Choose three.) Length, Source Port,
Checksum
What is the command netstat –r used for? to display the host routing table
Which two functions or operations are performed by the MAC sublayer? (Choose two.) it adds a
header and trailer to form an OSI Layer 2 PDU, It is responsible for Media Access Control
Which action is performed by a client when establishing communication with a server via the
use of UDP at the transport layer? The client randomly selects a source port number
During the boot process, in what memory location will the router bootstrap program look for the
IOS image if a TFTP server is not used? flash
Which feature on a Cisco router permits the forwarding of traffic for which there is no specific
route? gateway of last resort
How does the network layer use the MTU value? The MTU is passed to the network layer by the
data link layer
Which two files are loaded into RAM by the router when it boots? (Choose two.) IOS image,
STARTUP CONFIG
Which entities are involve in a temporary communication that is established by the transport
layer? applications
What happens if part of an FTP message is not delivered to the destination? The part of the
FTP message that was lost is re-sent
A collision fragment, also known as a ____ frame, is a frame of fewer than 64 bytes in length.
RUNT
Which term defines the processing capabilities of a switch by rating how much data can be
processed per second? forwarding rate
Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC? IEEE
802.3
What are the primary functions associated with data encapsulation at the Ethernet MAC
sublayer? (Choose three.) Addressing Frame delimiting Error detection
What is true about the Ethernet MAC address? (Choose three.) The first 6 hexadecimal digits of
a MAC address represent the OUI., The MAC address is also known as a burned-in address.,
The vendor is responsible for assigning the last 24 bits of the MAC address.
What happens when a data collision occurs on an Ethernet bus? All devices stop transmitting
and try again later.
Which statement is true about an interface that is configured with the IPv6 address command?
A link-local IPv6 address is automatically
At which layers of the OSI model does Ethernet function? (Choose two.) Physical, Data link
Which field in an Ethernet frame is used for error detection? Frame Check Sequence
A user is unable to access the company server from a computer. On issuing the ipconfig
command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What
type of address is this? experimental
What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3? 64 bytes –
1518 bytes
What is the name given to the Ethernet MAC sublayer PDU? Frame
What is the purpose of using a source port number in a TCP communication? to keep track of
multiple conversations between devices
A network administrator notices that the default gateway devices sends an ICMP Redirect
message to the workstation when the workstation tries to connect to file server on another
network. What is the purpose for this ICMP message? To notify the workstation, that another
router on the same network, is the better default-gateway to reach the remote server
A user who is unable to connect to the file server contacts the help desk. The helpdesk
technician asks the user to ping the IP address of the default gateway that is configured on the
workstation. What is the purpose for this command? to test if the workstation can communicate
on the network
Which type of IPv6 address is not routable and used for communication on a single subnet?
link-local address
Which two statement describe broadcast transmissions on a wired network? (Choose two.)
Directed broadcasts are intended for all hosts on a local or remote network, Limited broadcasts
are only intended for the hosts on a local network
Which entities are involved in a temporary communication that is established by the transport
layer? applications
Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider.
With this prefix, how many bits are available for your organization to create subnetworks? 128