Networking Today
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
DoS attack
Identity theft
Spyware
Zero-day attack
Spyware
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified.
It is stored in NVRAM.
It should be deleted using the erase running-config command.
It is automatically saved when the router reboots.
It affects the operation of the device immediately when modified.
Which three acronyms/initialisms represent standards organizations? (Choose three.)
IANA
TCP/IP
IEEE
IETF
OSI
MAC
IANA
IEEE
IETF
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
Presentation layer
Network layer
Physical layer
Data link layer
Physical layer
What is the binary representation for the decimal number 173?
10100111
10100101
10101101
10110101
10101101
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
Internet
Intranet
Extranet
Extendednet
Extranet
Which two statements are true regarding the user EXEC mode? (Choose two.)
All router commands are available.
Global configuration mode can be accessed by entering the enable command.
The device prompt for this mode ends with the '>' symbol.
Interfaces and routing protocols can be configured.
Only some aspects of the router configuration can be viewed.
The device prompt for this mode ends with the '>' symbol.
Only some aspects of the router configuration can be viewed.
What type of communication will send a message to all devices on a local area network?
done
What type of communication will send a message to all devices on a local area network?
Broadcast
Multicast
Unicast
Allcast
Broadcastsignal_cellular_4_bar
Multicast
Unicast
Allcast
Broadcast
What type of cable is used to connect a workstation serial port to a Cisco router console port?
Crossover
Rollover
Straight-through
Coaxial
Rollover
Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format?
234.17.10.9
234.16.12.10
236.17.12.6
236.17.12.10
236.17.12.10
A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?
Cloud computing
Online collaboration
Bring your own device
Video conferencing
Bring your own device
Which type of access is secured on a Cisco router or switch with the enable secret command?
Virtual terminal
Privileged EXEC
AUX port
Console line
Privileged EXEC
In computer communication, what is the purpose of message encoding?
To convert information to the appropriate form for transmission
To interpret information
To break large messages into smaller frames
To negotiate correct timing for successful communication
To convert information to the appropriate form for transmission
Why are two strands of fiber used for a single fiber optic connection?
The two strands allow the data to travel for longer distances without degrading.
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.
They allow for full-duplex connectivity.
How many binary bits exist within an IPv6 address?
32
48
64
128
256
128
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
It is an organization that enables individuals and businesses to connect to the Internet.
What is the default SVI on a Cisco switch?
VLAN1
VLAN99
VLAN100
VLAN999
VLAN1
Which message delivery option is used when all devices need to receive the same message simultaneously?
Duplex
Unicast
Multicast
Broadcast
Broadcast
Which procedure is used to reduce the effect of crosstalk in copper cables?
Requiring proper grounding connections
Twisting opposing circuit wire pairs together
Wrapping the bundle of wires with metallic shielding
Designing a cable infrastructure to avoid crosstalk interference
Avoiding sharp bends during installation
Twisting opposing circuit wire pairs together
What is the binary equivalent of the decimal number 232?
11101000
11000110
10011000
11110010
11101000
In which scenario would the use of a WISP be recommended?
An Internet cafe in a city
A farm in a rural area without wired broadband access
Any home with multiple wireless devices
An apartment in a building with cable access to the Internet
A farm in a rural area without wired broadband access
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)
doneThe hostname should be fewer than 64 characters in lengthsignal_cellular_4_bar
The hostname should be written in all lower case characters
doneThe hostname should contain no spacessignal_cellular_4_bar
The hostname should end with a special character
doneThe hostname should begin with a letter
The hostname should be fewer than 64 characters in lengths
The hostname should contain no spaces
The hostname should begin with a letter
What are two benefits of using a layered network model? (Choose two.)
It assists in protocol design
It speeds up packet delivery.
It prevents designers from creating their own model.
It prevents technology in one layer from affecting other layers
It ensures a device at one layer can function at the next higher layer.
It assists in protocol design
It prevents technology in one layer from affecting other layers
What is one advantage of using fiber optic cabling rather than copper cabling?
It is usually cheaper than copper cabling.
It is able to be installed around sharp bends.
It is easier to terminate and install than copper cabling.
It is able to carry signals much farther than copper cabling.
It is able to carry signals much farther than copper cabling.
Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)
IPv6 addresses are represented by hexadecimal numbers.
IPv4 addresses are represented by hexadecimal numbers.
IPv6 addresses are 32 bits in length.
IPv4 addresses are 32 bits in length.
IPv4 addresses are 128 bits in length.
IPv6 addresses are 64 bits in length.
IPv6 addresses are represented by hexadecimal numbers.
IPv4 addresses are 32 bits in length.