You are on page 1of 1

 Home  NE   Linux   Programming   Languages  About US 

 ITE 7  CCNA1 CCNA2  CyberOps  CCNA Security

ITN Chapter 11 Quiz Answers Cisco 2019 100% Categories

Posted on December 28, 2018 by Admin CCNA CyberOps 1.1 (35)


CCNA CyberOps 1.1 – Assignments
Last Updated on December 30, 2018 by Admin
Answers (35)
CCNA Routing and Switching Essentials
ITN Chapter 11 Quiz Answers Cisco 2019 100%
v6.0 (53)
This quiz covers the content in CCNA R&S Introduction to Networks Chapter 11. It is designed to provide an additional opportunity to practice RSE Assignments Answers (33)
the skills and knowledge presented in the chapter and to prepare for the Chapter Exam. RSE Quizzes Answers (20)
CCNA Security 2.01 (31)
1. Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed
CCNA Security – Assignments – Answers
login attempts within 10 seconds?
(31)
RouterA(config)# login block-for 10 attempts 2 within 30 CLA – Programming Essentials in C (20)
RouterA(config)# login block-for 30 attempts 2 within 10 CLA – Assignment Quizzes – Answers
RouterA(config)# login block-for 2 attempts 30 within 10 (20)
RouterA(config)# login block-for 30 attempts 10 within 2 CPA Programming Essentials in C++ (21)
Explanation: CPA Assignment Quizzes (20)
Cybersecurity Essentials 1.1 Exam-
The correct syntax is RouterA(config)# login block-for (number of seconds) attempts (number of attempts) within (number of
Answers-Quizzes (44)
seconds).
CyberEss v1 Packet Tracer Activity
Source Files Answers (11)
2. A particular
website does not appear to be responding on a Windows 7 computer. What command CyberEss v1 Student Lab Source Files
could the technician use to show any cached DNS entries for this web page?
Answers (12)
ipconfig /all Introduction to Cybersecurity 2.1 (7)
arp -a Cybersecurity Student Lab Source
ipconfig /displaydns Answers (6)
nslookup Introduction to Networks v6.0 (148)
3. Match the type of threat with the cause. (Not all options are used.) Introduction to Networks v6.0-Pilot-Exam
Beta (25)
hardware threats ——-> physical damage to servers, routers, switches, cabling plant, and workstations
ITN Assignments Answers (6)
environmental threats ——-> temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)
ITN Practice Quizzes (24)
electrical threats ——-> voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total
ITN v6 Student Lab Source Files Answers
power loss
(66)
maintenance threats ——-> poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor
IT Essentials v6.0 (175)
cabling, and poor labeling
ITE v6 – Assignments Answers (1)
Explanation:
ITE v6 Student Lab Source Files Answers
Physical threats can be classified into four categories: (99)
ITE v6 Student Packet Tracer Source
Environmental threats -Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)
Files Answers (5)
Hardware threats – Physical damage to servers, routers, switches, cabling plant, and workstations
ITE v7.0 – IT Essentials 7.0 (84)
Electrical threats – Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss
ITE v7 Student Lab Source Files Answers
Maintenance threats – Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor
(30)
cabling, and poor labeling
ITE v7.0 – Assignment Answers (54)
Linux Essentials (19)
4. Which statement is true about Cisco IOS ping indicators? Linux Essentials – Assignment Answers
‘!’ indicates that the ping was unsuccessful and that the device may have issues finding a DNS server. (19)
‘U’ may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful. Linux Essentials 2.0 (40)
‘.’ indicates that the ping was successful but the response time was longer than normal. Assignments Exam Answers – Online (40)
A combination of ‘.’ and ‘!’ indicates that a router along the path did not have a route to the destination address and responded with NDG Linux Unhatched (3)
an ICMP unreachable message. Networking Essentials 1.0 (47)
Explanation: NE Assignments Answers (9)
NetEss v1 Packet Tracer Activity Source
The most common indicators of a ping issued from the Cisco IOS are “!”, “.”, and “U”. The “!” indicates that the ping completed
Files Answers (17)
successfully, verifying connectivity at Layer 3. The “.” may indicate that a connectivity problem, routing problem, or device security
NetEss v1 Student Lab Source Files
issue exists along the path and that an ICMP destination unreachable message was not provided. The “U” indicates that a router
Answers (21)
along the path may not have had a route to the destination address, and that it responded with an ICMP unreachable message.
PCAP – Programming Essentials in Python
(16)
5. A networktechnician is investigating network connectivity from a PC to a remote host with the Assignment Quizzes Answers (16)
address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote Uncategorized (666)
host?
trace 10.1.1.5
traceroute 10.1.1.5
tracert 10.1.1.5
ping 10.1.1.5
Explanation:

The tracert command is used to initiate a trace from the command prompt on a Windows PC. The traceroute command is used to
initiate a trace from a Cisco router or switch. Some other PC operating systems, such as Linux and Mac OS also use the traceroute
command. The ping command does not display the network path to the remote host.

6. What is considered the most effective way to mitigate a worm attack?


Change system passwords every 30 days.
Ensure that all systems have the most current virus definitions.
Ensure that AAA is configured in the network.
Download security updates from the operating system vendor and patch all vulnerable systems.
Explanation:

Because worms take advantage of vulnerabilities in the system itself, the most effective way to mitigate worm attacks is to download
security updates from the operating system vendor and patch all vulnerable systems.

7. Which element of scaling a network involves identifying the physical and logical topologies?
traffic analysis
network documentation
device inventory
cost analysis
Explanation:

To scale a network, several elements are required:

Network documentation – physical and logical topology


Device Inventory – list of devices that use or make up the network
Budget – Itemized IT budget, including fiscal year equipment purchasing budget
Traffic analysis – protocols, applications, and services and their respective traffic requirements should be documented

8. Which protocol is used by the traceroute command to send and receive echo-requests and echo-
replies?
SNMP
ICMP
Telnet
TCP
Explanation:

Traceroute uses the ICMP (Internet Control Message Protocol) to send and receive echo-request and echo-reply messages.

9. A small
company has only one router as the exit point to its ISP. Which solution could be adopted to
maintain connectivity if the router itself, or its connection to the ISP, fails?
Activate another router interface that is connected to the ISP, so the traffic can flow through it.
Have a second router that is connected to another ISP.
Purchase a second least-cost link from another ISP to connect to this router.
Add more interfaces to the router that is connected to the internal network.
Explanation:

Small networks generally have only one link to an ISP to establish a connection to the Internet. Problems can occur in the network,
which can cause the disruption of this service. In order to keep connectivity, redundancy has to be provided. If the problem is in the
router interface that is connected to the ISP, another interface can be activated on the router, so if one interface fails, traffic may be
redirected toward the other interface. However, if the router itself fails, a second router that is connected to another ISP can be used
as a backup.

10. Onwhich two interfaces or ports can security be improved by configuring executive timeouts?
(Choose two.)
Fast Ethernet interfaces
console ports
serial interfaces
vty ports
loopback interfaces
Explanation:

Executive timeouts allow the Cisco device to automatically disconnect users after they have been idle for the specified time.
Console, vty, and aux ports can be configured with executive timeouts.

11. What is one of the most effective security tools available for protecting users from external threats?
firewalls
router that run AAA services
patch servers
password encryption techniques
Explanation:

A firewall is one of the most effective security tools for protecting internal network users from external threats. A firewall resides
between two or more networks, controls the traffic between them, and helps prevent unauthorized access. A host intrusion
prevention system can help prevent outside intruders and should be used on all systems.

12. Referto the exhibit. The exhibited configuration is entered by a network administrator into a new
router. Sometime later a network technician proceeds to log in to the router via a console connection.
The technician enters techadmin as the user name and tries a password of 63t0ut0fh3r3!. What will
be the result of this action?
ITN Chapter 11 Quiz Answers 01
ITN Chapter 11 Quiz Answers 01

The router will deny access and display an error message.


The router will deny access and display a banner message.
The router will display the DT_ATC_RS3> prompt.
The router will be locked for 2 minutes and 30 seconds.
Explanation:

Whenever an administrator connects to the console port, the configuration applied under the line con 0 interface determines how
the user is authenticated. The console port configuration has the login command with local as the keyword. That means the
username and password are required before the administrator is even allowed to see the enable mode prompt. Because the
correct username and password was typed, the administrator will be presented with the enable mode prompt.

13. How should traffic flow be captured in order to best understand traffic patterns in a network?
during low utilization times
during peak utilization times
when it is on the main network segment only
when it is from a subset of users
Explanation:

Capturing traffic during low utilization time will not give a good representation of the different traffic types. Because some traffic
could be local to a particular segment, the capture must be done on different network segments.

14. Whichprocess failed if a computer cannot access the Internet and received an IP address of
169.254.142.5?
IP
DNS
DHCP
HTTP
Explanation:

When a Windows computer cannot communicate with an IPv4 DHCP server, the computer automatically assigns itself an IP
address in the169.254.0.0/16 range. Linux and Apple computers do not automatically assign an IP address.

15. An administrator wants to back up a router configuration file to a USB drive that is connected to the
router. Which command should the administrator use to verify that the USB drive is being recognized
by the router?
pwd
cd USB
dir flash0:
show file systems
Explanation:

The show file systems command displays all of the available file systems on the device. If usbflash0: appears then the router
recognizes the USB drive as a valid storage device. The pwd command shows the current directory being navigated, and the cd
command is used to change the current directory. The dir flash0: command will show the contents of flash memory, not the USB
drive.

16. Fill in the blank.


Network services use Protocols to define a set of rules that govern how devices
communicate and the data formats used in a network.
Noted: There are 4 possible answers. You can fill in one of the following in netacad: Protocols, protocol, protocols, or Protocol. But
you can fill only Protocols in our system.
Explanation:

Each application or network service uses protocols, which define the standards and data formats to be used. Without protocols, the
data network would not have a common way to format and direct data.

17. What type of traffic would most likely have the highest priority through the network?
FTP
instant messaging
voice
SNMP
Explanation:

Not all traffic should receive the same treatment or priority through a network. Some types of traffic, such as voice and video,
require the highest priority because they are very sensitive to network latency and delay. Other types of traffic, such as FTP, which is
not sensitive to latency and delay, should be given the lowest level of priority so that the higher priority traffic can get through.

Home NE Linux Programming Languages About US


Copyright PREMIUMEXAM © 2019

You might also like