Chapter 1
Chapter 2
Chapter 6
Chapter 7&8
Chapter 11
100
Which communication tool allows real-time collaboration?
What is Instant Messaging
100
Which connection provides a secure CLI session with encryption to a Cisco network device?
What is an SSH Connection
100
What is the purpose of the routing process?
What is to select the paths that are used to direct traffic to destination networks
100
What happens when part of an Internet VoIP transmission is not delivered to the destination?
What is the transmission continues without the missing portion.
100
What is the purpose of the network security accounting function?
What is to keep track of the actions of a user
200
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
What is DSL
200
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?
What is to interrupt the ping process.
200
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?
What is NAT.
200
Which three IP addresses are private ? (Choose three.) 1. 10.172.168.1, 2. 172.32.5.2, 3. 192.167.10.10, 4. 172.20.4.4, 5. 192.168.5.254, 6. 224.6.6.6
What is 1,4,5
200
When applied to a router, which command would help mitigate brute-force password attacks against the router? 1. exec-timeout 30, 2. service password-encryption, 3. banner motd $Max failed logins = 5$, 4. login block-for 60 attempts 5 within 60
4
300
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
What is WAN
300
What function does pressing the Tab key have when entering a command in IOS?
What is it completes the remainder of a partially typed word in a command.
300
What are the 2 primary functions of a router?
What is packet switching and path selection.
300
How many bits make up the single IPv6 hextet :10CD:?
What is 16
300
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? 1. ipconfig /all, 2. arp -a, 3. ipconfig /displaydns, 4. nslookup
What is 3
400
When is a dial-up connection used to connect to an ISP?
What is when a regular telephone line is used
400
After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command?
What is the new configuration will be loaded if the switch is restarted.
400
In which default order will a router search for startup configuration information?
What is NVRAM, TFTP, setup mode
400
What is the effect of configuring the ipv6 unicast-routing command on a router?
What is to enable the router as an IPv6 router.
400
What two preconfigured settings that affect security are found on most new wireless routers? (Choose two.) 1. broadcast SSID, 2. MAC filtering enabled, 3. WEP encryption enabled, 4. PSK authentication required, 5. default administrator password
What is 1&5
500
A host is accessing an FTP server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) 1. regenerating data signals, 2. acting as a client or a server, 3. providing a channel over which messages travel, 4. applying security settings to control the flow of data, 5. notifying other devices when errors occur serving as the source or destination of the messages
What is 1,4,5
500
Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?
What is 127.0.0.1
500
What is the purpose of the routing process?
What is to select the paths that are used to direct traffic to destination networks
500
Which group of IPv6 addresses cannot be allocated as a host source address?​ 1. FEC0::/10​, 2. FDFF::/7​, 3. FEBF::/10​, 4. FF00::/8
What is 4
500
Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?
What is WPA
M
e
n
u