You are on page 1of 96

Question 1

Correct
Mark 1.00 out of 1.00

Flag question

Question text

An administrator has just changed the IP address of an interface on an IOS device.


What else must be done in order to apply those changes to the device?
Select one:
a. Copy the running configuration to the startup configuration file.
b. Nothing must be done. Changes to the configuration on an IOS device take effect
as soon as the command is typed correctly and the Enter key has been pressed.
c. Reload the device and type yes when prompted to save the configuration
d. Copy the information in the startup configuration file to the running
configuration
Feedback

Your answer is correct.


The correct answer is: Nothing must be done. Changes to the configuration on an
IOS device take effect as soon as the command is typed correctly and the Enter key
has been pressed.

Question 2
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What is a fault-tolerant

network? Select one:


a. A network that is incapable of failing
b. A network that can reroute traffic in case of device failure
c. A network that can provide priority treatment of voice and video traffic
d. A network that offers secure transactions

Feedback

Your answer is incorrect.


The correct answer is: A network that can reroute traffic in case of device failure

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is encrypted with the enable secret command?

Select one:
a. all configured passwords
b. the privileged executive mode password
c. the consoled line password
d. the VTY line password

Feedback

Your answer is correct.


The correct answer is: the privileged executive mode password

Question 4
Correct
Mark 1.00 out of 1.00

Flag question
Question text

A network administer has forgotten the argument of an IOS command. How would
the administrator get help from the IOS CLI to complete the command correctly?
Select one:
a. Type help and press the Enter key at the prompt
b. Type the command and then press the Tab key
c. Type the command and then press the? key
d. Type the command and then press CTRL-C
e. Type the command, type help, and press the Enter key.

Feedback

Your answer is correct.


The correct answer is: Type the command and then press the? key

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following are business-class Internet connection technologies normally


supplied by a service provider? (Choose two.)
Select one or more:
a. Cellular
b. Broadband cable
c. Mobile services
d. Metro Ethernet
e. Leased lines

Feedback

Your answer is correct.


The correct answers are: Leased lines, Metro Ethernet
Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

How is the Cisco IOS generally accessed and navigated?


Select one:
a. Using a web browser
b. By the use of a custom GUI
c. Through the CLI using a terminal emulator

d. With a Cisco-proprietary application


Feedback

Your answer is correct.


The correct answer is: Through the CLI using a terminal emulator

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text

AAnswer Scalable network is able to expand to accept new devices and applications
without affecting performance.

Feedback

The correct answer is: Scalable


Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Where is the configuration used during startup on Cisco IOS devices located?

Select one:
a. Terminal emulator
b. NVRAM
c. Startup config
d. Running config

Feedback

Your answer is correct.


The correct answer is: Startup config

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Why would a network administrator use the CLI of the Cisco IOS?

Select one:
a. to add a password to a Cisco network device
b. to provide automatic (unmanned) management of Cisco network devices
c. to monitor the number of times a device has been powered on and of

d. to test the performance on a particular LAN


Feedback

Your answer is correct.


The correct answer is: to add a password to a Cisco network device
Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which technology would be best to provide a home user with a highspeed, always-
on Internet connection?
Select one:
a. Cellular
b. Dial-up
c. Satellite
d. DSL

Feedback

Your answer is correct.


The correct answer is: DSL

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was installed
on a computer was secretly collecting data about websites that were visited by users
of the computer. Which type of threat is affecting this computer?
Select one:
a. identity theft
b. DoS attack
c. zero – day attack
d. spyware

Feedback

Your answer is correct.


The correct answer is: spyware

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

To save time, IOS commands may be partially entered and then completed by
typing which key or key combination?
Select one:
a. Right Arrow
b. Up Arrow
c. Tab
d. Ctrl-N
e. Ctrl-P
f. Down Arrow

Feedback

Your answer is correct.


The correct answer is: Tab
Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a wiki?
Select one:
a. a web page that groups of people can edit and review
b. an online meeting
c. a personal journal that is posted on the internet
d. an audio-based medium that is used to deliver information to a wide audience

Feedback

Your answer is correct.


The correct answer is: a web page that groups of people can edit and review

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of traffic must receive the highest priority from QoS? Select one:
VoIP
Web traffic
Email
d. Order processing

Feedback
Question text
Your answer is correct.
What is a converged network?
The correct answer is:
Select one:
Question 15
a. A network that
Correct makes use of both wired and wireless technology
Mark 1.00 out of 1.00
b. A network that makes use of both wired and wireless technology
c. A network that makes use of both fiber-optic and copper connections
d. A network where voice, video, and data move over the same infrastructure

Feedback Flag question

Your answer is correct.


The correct answer is: A network where voice, video, and data move over the same
infrastructure

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Why would a technician enter the command copy startup-config running config?
Select one:
a. to save an active configuration to NVRAM
b. to make a changed configuration the new startup configuration
c. to remove all configuration from the switch
d. to copy an existing configuration into RAM

Feedback

Your answer is correct.


The correct answer is: to copy an existing configuration into RAM

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which devices would be considered end devices on a network? (Choose four.)

Select one or more:


a. Tablet computer
b. IP phone
c. Switch
d. Wireless access point
e. Server
f. Printer

Feedback

Your answer is correct.


The correct answers are: Printer, IP phone, Server, Tablet computer

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A technician configures a switch with these commands:


SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1
255.255.255.0 SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:
a. SVI

b. password encryption
c. Telnet access

d. physical switchport access


Feedback

Your answer is correct.


The correct answer is: SVI

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text

AnAnswer What are is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees of the organization
Feedback

The correct answer is: Intranet


Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text

In which scenario would the use of a WISP be recommended

Select one:
a. an apartment in a building with cable access to the Internet

b. an Internet cafe in a city


c. any home with multiple wireless devices
d. a farm in rural area without wired broadband access

Feedback

Your answer is correct.


The correct answer is: a farm in rural area without wired broadband access

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a. Command
b. Argument
c. A space
d. Keyword

Feedback

Your answer is correct.


The correct answer is: Command

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A data center has recently updated a physical server to host multiple operating
systems on a single CPU. The data center can now provide each customer with a
separate web server without having to allocate an actual discrete server for each
customer. What is the network trend that is being implemented by the data center
in this situation?
Select one:
a. maintaining communication integrity
b. virtualization
c. BYOD
d. online collaboration

Feedback

Your answer is correct.


The correct answer is: virtualization

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What are two benefits of collaboration and video-on-demand applications? (Choose


two.)
Select one or more:
a. providing faster, more secure business communications
b. providing better social media opportunities
c. ensuring a more reliable network
d. providing a richer e-learning environment
e. providing data storage and retrieval to a business
f. providing a richer e-learning environment

Feedback

Your answer is correct.


The correct answers are: providing a richer e-learning environment, providing better
social media opportunities

Question 24
Partially correct
Mark 0.50 out of 1.00

Flag question

Question text
Which of the following are disadvantages of peer-to-peer networking? (Choose two.)
Select one or more:
a. Scalability
b. Expensive to set up and maintain
c. No centralized administration
d. Complex configuration

Feedback

Your answer is partially correct.


You have correctly selected 1.
The correct answers are: No centralized administration, Scalability

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What type of information would be found on a logical topology diagram?

Select one:
a. Location of departmental printer
b. Length and type of all cable runs
c. IP addressing scheme
d. Location of departmental switch

Feedback

Your answer is correct.


The correct answer is: IP addressing scheme

Question 26
Correct
Mark 1.00 out of 1.00

Flag question
Question text

What command will display a list of keywords available for viewing the status of an
IOS switch?
Select one:
a. Switch# help
b. Switch# show?
c. Switch# status?
d. Switch# sh?

Feedback

Your answer is correct.


The correct answer is: Switch# show?

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text

In which scenario would the use of a WISP be recommended?

Select one:
a. an Internet cafe in a city
b. a farm in a rural area without wired broadband access
c. any home with multiple wireless devices
d. an apartment in a building with cable access to the Internet

Feedback

Your answer is correct.


The correct answer is: a farm in a rural area without wired broadband access

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text

When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS


device using the CLI, what will be returned in the CLI?
Select one:
a. % Invalid input detected
b. EaSt-2+56(config)#
c. EaSt-58(config)#
d. Switch(config)#
e. Switch EaSt-2+56(config)#
f. East-2+56(config)#

Feedback

Your answer is correct.


The correct answer is: EaSt-2+56(config)#

Question 29
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
What is a network infrastructure that provides access to other networks over a wide geographic area?
Select one:
LAN
MAN
c. SAN
d. WLAN
e. WAN

Feedback

Your answer is incorrect.


The correct answer is: SAN

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the primary defense against unauthorized remote access to network


devices?
Select one:
a. Configuring an IP address
b. Configuring a console password
c. Configuring a VTY password
d. Configuring a default gateway

Feedback

Your answer is correct.


The correct answer is: Configuring a VTY password

Question 31
Correct
Mark 1.00 out of 1.00

Flag question
Question text

What is the Cisco IOS?

Select one:
a. The operating system for the Cisco network device
b. The memory for the Cisco network device
c. The configuration for the Cisco network device
d. The CPU for the Cisco network device

Feedback

Your answer is correct.


The correct answer is: The operating system for the Cisco network device

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which device acts as gateway to allow hosts to send traffic to remote IP networks?1

Select one:
a. DHCP server
b. local router
c. DNS server
d. local switch

Feedback

Your answer is correct.


The correct answer is: local router
1
Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What are the primary requirements of information security? (Choose three.)

Select one or more:


a. Integrity
b. Scalability
c. Availability
d. Confidentiality
e. QoS

Feedback

Your answer is correct.


The correct answers are: Confidentiality, Integrity, Availability

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which statement describes a network that supports QoS?

Select one:
a. The network provides predictable levels of service to different types of traffic
b. The fewest possible devices are affected by a failure
c. The network should be able to expand to keep up with user demand

d. Data sent over the network is not altered in transmission


Feedback

Your answer is correct.


The correct answer is: The network provides predictable levels of service to
different types of traffic
Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a. Web interface
b. AUX port
c. SSH
d. Console port
e. Telnet

Feedback

Your answer is correct.


The correct answer is: Console port

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a. an extranet
b. a converged network
c. a traditional network
d. a storage area network

Feedback

Your answer is correct.


The correct answer is: a converged network

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a group of web pages that groups of individuals can edit and view together
called?
Select one:
a. Access point
b. Wiki
c. Weblog (blog)
d. Podcasting
e. TelePresence endpoint
f. Instant messaging

Feedback

Your answer is correct.


The correct answer is:
Wiki
Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text

For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)
Select one or more:
a. it can rapidly adapt to the failure of network devices and communication links
b. Data packets can travel through the network using multiple different paths
c. it allows for billing of network use by the amount of time a connection is
established
d. It requires that a data circuit between the source and destination be established
before data can be transferred.
e. Network devices dynamically decide on the best available path to forward each
packet.
Feedback

Your answer is correct.


The correct answers are: it can rapidly adapt to the failure of network devices
and communication links, Data packets can travel through the network using
multiple different paths, Network devices dynamically decide on the best
available path to forward each packet.

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a. Its maximum length is 255 characters.
b. It does not allow spaces
c. It must be registered with a DNS server
d. It cannot start with a number

Feedback

Your answer is correct.


The correct answer is: It does not allow spaces

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The farther you are from the central office when utilizing a DSL connection, theAnswer
the connection speed
slow er

Feedback
Question text
The correct answer is: slower
Question 1
Correct
Mark 1.00 out of 1.00

Flag question
Which of the following elements do both human and computer communication
systems have in common? (Choose three.)
Select one or more:
a. Keyboard
b. Channel
c. Default gateway
d. Receiver
e. Source

Feedback

Your answer is correct.


The correct answers are: Source, Channel, Receiver

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP
reference model? (Choose two.)
Select one or more:
a. UDP
b. TCP
c. DNS
d. HTTP
e. FTP

Feedback

Your answer is correct.


The correct answers are: TCP, UDP
Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of protocols in data communications?

Select one:
a. specifying the bandwidth of the channel or medium for each type of
communication
b. determining the electronic specifications to enable the communication
c. specifying the device operating systems that will support the communication
d. providing the rules required for a specific type of communication to occur

Feedback

Your answer is correct.


The correct answer is: providing the rules required for a specific type of
communication to occur

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following OSI model layers have the same functionality as the network access layer in the TCP
Select one or more:
Data link
Physical
c. Session
d. Presentation
e. Transport
f. Network
g. Application

Feedback

Your answer is correct.


The correct answers are: Physical, Data link

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text

AAnswer loopback
to the hostaddress is defined as a reserved address that routes packets back

Feedback

The correct answer is: loopback


Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is and advantage of using standards to develop and implement protocols?

Select one:
Products from different manufacturers can interoperate successfully
Standards provide flexibility for manufacturers to create devices that comply with
unique requirements

c. Different manufacturers are free to apply different requirements when


implementing a protocol

d. A particular protocol can be implemented by one manufacturer

Feedback
Question text
Your answer is correct.
What three functions are defined by network protocols to allow communication
The correct
between knownanswer is: Products
source from different
and destination manufacturers
IP addresses? (Choosecan interoperate
three.)
successfully
Select one or more:
Question 7
a. data encoding
Correct
Mark 1.00 out of 1.00
b. connector specifications
c. media selection
d. delivery options
e. end-device installation
Flag question
f. message size

Feedback

Your answer is correct.


The correct answers are: data encoding, message size, delivery options
Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the name given to a one-to-many message delivery option?

Select one:
a. Broadcast
b. Manycast
c. Multicast

d. Unicast
Feedback

Your answer is correct.


The correct answer is: Multicast

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text

In fiber optic meda, the signals are represented as patterns ofAnswer light .

Feedback

The correct answer is: light

Question 10
Correct
Mark 1.00 out of 1.00
Flag question

Question text

What happens when two devices on the same subnet are communicating?

Select one:
a. The data link layer addresses are added to the IP header
b. The frame will be sent to the default gateway for delivery to the receiving device
c. The host portion of the IP addresses will be different
d. The sending device will use ARP to determine the IP address of the receiver

Feedback

Your answer is correct.


The correct answer is: The host portion of the IP addresses will be different

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which application layer protocol allows users on one network to reliably transfer
files to and from a host on another network?
Select one:
a. FTP
b. HTTP
c. TFTP
d. IMAP

e. DHCP
Feedback

Your answer is correct.


The correct answer is:
Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What organization is responsible for the overall management and development of


Internet standards?
Select one:
a. IRTF
b. IAB
c. IETF
d. ISO
e. IEEE

Feedback

Your answer is correct.


The correct answer is: IAB

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What happens to frames that are too long or too short for the channel used?
Select one:
a. They are dropped.
b. They are delivered but much slower than proper-size frames.
c. They clog the network and block the delivery of other frames.
d. They are broken up into smaller pieces.
e. They are returned to the sender.

Feedback

Your answer is correct.


The correct answer is: They are dropped.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which two statements are true of the deterministic access method?(Choose two.)

Select one or more:


a. Each device has to transmit before passing the token to the next device
b. It is a very efficient method because there are no collisions

c. The order of transmission is dictated by the node that asks first for the token
d. Devices take turns transmitting
e. The throughput is predictable

Feedback

Your answer is correct.


The correct answers are: The throughput is predictable, Devices take turns
transmitting
Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which two statements are true regarding the user EXEC mode? (Choose two.)

Select one or more:


a. Only some aspects of the router configuration can be viewed
b. All router commands are available
c. Interfaces and routing protocols can be configured
d. Global configuration mode can be accessed by entering the enable command
e. This is the default mode on an unconfigured router when first powered up.

Feedback

Your answer is correct.


The correct answers are: This is the default mode on an unconfigured router when
first powered up., Only some aspects of the router configuration can be viewed

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which OSI reference model layer is responsible for common representation of the data transferred betwee
Select one:
a. Network
b. Transport
c. Data link
d. Presentation
e. Physical
f. Session
g. Application

Feedback

Your answer is correct.


The correct answer is: Presentation

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which is a function of the Logical Link Control (LLC) sublayer?

Select one:
a. to identify which network layer protocol is being used
b. to accept segments and package them into data units that are called packets
c. to define the media access processes that are performed by the hardware
d. to provide data link layer addressing

Feedback

Your answer is correct.


The correct answer is: to identify which network layer protocol is being used

Question 18
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which organization is responsible for developing communications standards for


Voice over IP (VoIP) devices?
Select one:
a. The Internet Corporation for Assigned Names and Numbers (ICANN)
b. The International Telecommunications Union-Telecommunications
Standardization Sector (ITU-T)
c. The Telecommunications Industry Association (TIA)
d. The Electronics Industry Alliance (EIA)

Feedback

Your answer is correct.


The correct answer is: The Telecommunications Industry Association (TIA)

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which message timing factor impacts how much information can be sent and the speed at which it can be
Select one:
Flow control
Access method
Response timeout
d. Delay speed

Feedback
Question text
Your answer is correct.
Which organization develops the 802 family of standard for wired and wireless LANs
TheMANs?
and correct answer is: Flow control
20
Select one:
Question
Correct
a. ISO
Mark 1.00 out of 1.00

b. ISOC
c. IEEE
d. ITU-T
Flag question
e. IANA

Feedback

Your answer is correct.


The correct answer is:
IEEE

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What name is given to a group of interrelated protocols necessary to perform a
communication function?
Select one:
a. Protocol stack
b. Protocol suite
c. Functional protocol
d. Functional collection

Feedback

Your answer is correct.


The correct answer is: Protocol suite

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What will a network administrator use to modify a configuration on a Cisco router?

Select one:
a. the Windows command prompt
b. a DHCP server
c. a control panel

d. Windows Explorer
e. IOS

Feedback

Your answer is correct.


The correct answer is: IOS
Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following are examples of proprietary protocols? (Choose two.)

Select one or more:


a. ISO
b. TCP/IP
c. AppleTalk
d. Novell NetWare

Feedback

Your answer is correct.


The correct answers are: AppleTalk, Novell NetWare

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two message timing mechanisms are used in data communication? (Choose two.)
Select one or more:
flow control
encapsulation
formatting
d. encoding
e. response timeout

Feedback
Question text
Your answer is correct.
Which two factors influence the method that is used for media access control?
The correct
(Choose two.)answers are: response timeout, flow control
25 or more:
Select one
Question
Correct
a. how
Mark 1.00nodes share
out of 1.00 the media
b. how connection between nodes appears to the data link layer
c. how signals are encoded by the NICs on end devices
d. how data is generated by end devices applications
Flag question
e. how the IP protocol forwards the packet to the destination

Feedback

Your answer is correct.


The correct answers are: how connection between nodes appears to the data link
layer, how nodes share the media

Question 26
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which statement is correct about network ? Select one:
They all function in the layer of TCP/IP
Network define the type of hardware that is used and how it is

mounted in racks

c. They are only required for exchange of message between devices on remote
network

d. They define how messages are exchanged between the sources and the destination

Feedback

Your answer is correct.


The correct answer is: They define how messages are exchanged between
the sources and the destination
Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which TCP/IP model layer is responsible for providing the best path through the network?
Select one:
Application
Network Access
c. Internet
d. Transport

Feedback
Question text
Your answer is correct.
Which two components are added to the PDU at the network access layer? (Choose
The correct answer is: Internet
two.)
28 or more:
Select one
Question
Correct
a. IP1.00
Mark header
out of 1.00

b. Trailer
c. frame header
d. HTTP header
Flag question
e. TCP header

Feedback

Your answer is correct.


The correct answers are: Trailer, frame header

Question 29
Correct
Mark 1.00 out of 1.00

Flag question
Question text

What is an advantage of using standards to develop and implement protocols?

Select one:
a. A particular protocol can only be implemented by one manufacturer
b. Products from different manufacturers can interoperate successfully
c. Standard provide flexibility for manufacturers to create devices that comply with
unique requirements
d. Different manufacturers are free to apply different requirements when
implementing a protocol
Feedback

Your answer is correct.


The correct answer is: Products from different manufacturers can interoperate
successfully

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What command will prevent all unencrypted passwords from displaying in plain text
in a configuration file?
Select one:
a. (config) # enable secret Secret_Password
b. (config)# enable password secret
c. (config-line) # password secret
d. (config) # enable secret Encrypted_Password
e. (config) # service password-encryption

Feedback
Your answer is correct.
The correct answer is: (config) # service password-encryption
Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What type of protocol describes communication over a data link and the physical
transmission of data on the network media?
Select one:
a. Internet protocol
b. Application protocol
c. Network access protocol
d. Transport protocol

Feedback

Your answer is correct.


The correct answer is: Network access protocol

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which organization is responsible for the standard that defines Media


Access Control for wired Ethernet?

Select one:
a. IAB
b. IETF
c. ISO
d. ISOC
e. IEEE

Feedback

Your answer is correct.


The correct answer is:
IEEE

Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which logical address is used for delivery of data to a remote network?

Select one:
a. destination MAC address
b. source MAC address
c. destination port number
d. source IP address
e. destination IP address

Feedback

Your answer is correct.


The correct answer is: destination IP address

Question 34
Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the transport layer PDU?

Select one:
a. Bit
b. Data
c. Packet
d. Frame
e. Segment

Feedback

Your answer is correct.


The correct answer is: Segment

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which message delivery option is used when all devices need to receive the same
message simultaneously?
Select one:
a. unicast
b. broadcast
c. multicast

d. duplex
Feedback

Your answer is correct.


The correct answer is: broadcast
Question 1
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Which logical address is used for delivery of data to a remote network? Select one:

destination MAC address

destination IP address

source IP address

source MAC address

destination IP address

Feedback

Your answer is incorrect.

The correct answer is: destination IP address

Question 2
Correct

Mark 1.00 out of 1.00


Flag question

Question text
A data center has recently updated a physical server to host multiple operating systems on a single CPU. Th
Select one:

maintaining communication integrity

online collaboration

BYOD

virtualization

Feedback

Your answer is correct.

The correct answer is: virtualization


Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What are two functions of end devices on a network? (Choose two.)


Select one or more:
They filter the flow of data to enhance security

They originate the data that flows through the network.

They direct data over alternate paths in the event of link failures.

They provide the channel over which the network message travels.

They are the interface between humans and the communication network.

Feedback

Your answer is correct.

The correct answers are: They originate the data that flows through the network.,
They are the interface between humans and the communication network.
Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An administrator has just changed the IP address of an interface on an IOS device. What else must be done
Select one:

a. Copy the information in the startup configuration file to the running


configuration

b. Reload the device and type yes when prompted to save the configuration

c. Nothing must be done. Changes to the configuration on an IOS device take effect
as soon as the command is typed correctly and the Enter key has been pressed.

d. Copy the running configuration to the startup configuration file.


Feedback

Your answer is correct.

The correct answer is: Nothing must be done. Changes to the configuration on an
IOS device take effect as soon as the command is typed correctly and the Enter
key has been pressed.
Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is
Select one:

, TCP, IP, HTTP

HTTP, IP, TCP,

, IP, TCP, HTTP

HTTP, TCP, IP,

Feedback

Your answer is correct.

The correct answer is: HTTP, TCP, IP, Ethernet

Question 6
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which device acts as gateway to allow hosts to send traffic to remote IP networks? Select one:

local switch

DHCP server

local router

DNS server

Feedback

Your answer is correct.

The correct answer is: local router


Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which area of the network would a college IT staff most likely have to redesign as a direct result of many s
Select one:

a. wireless WAN
extranet

wireless LAN

intranet

wired LAN

Feedback

Your answer is correct.

The correct answer is: wireless LAN


Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
Select one or more:

providing faster, more secure business communications

providing a richer e-learning environment

providing better social media opportunities

ensuring a more reliable network

providing data storage and retrieval to a business

Feedback

Your answer is correct.


The correct answers are: providing a richer e-learning environment, providing
better social media opportunities
Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
Select one:

(config) # service password-encryption

(config-line) # password secret

(config)# enable password secret

(config) # enable secret Encrypted_Password

(config) # enable secret Secret_Password

Feedback

Your answer is correct.

The correct answer is: (config) # service password-encryption

Question 10
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which PDU is processed when a host computer is de-encapsulating a message at the of the TCP/IP model
Select one:

a. frame

b. segment

c. bits

d. packet

Feedback

Your answer is correct.

The correct answer is: segment

Question 11
Partially correct
Mark 0.50 out of 1.00

Flag question

Question text
Which two Internet connection options do not require that physical cables be run to the building? (Choo
Select one or more:

a. dedicated leased line

b. satellite

c. cellular

d. DSL

e. dialup

Feedback

Your answer is partially correct.

You have correctly selected 1.

The correct answers are:

cellular

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of protocols in data communications?


Select one:
a. specifying the bandwidth of the channel or medium for each type of
communication

providing the rules required for a specific type of communication to occur

determining the electronic specifications to enable the communication

specifying the device operating systems that will support the communication

Feedback

Your answer is correct.

The correct answer is: providing the rules required for a specific type of
communication to occur
Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a characteristic of a contention-based access method? Select one:

It scales very well under heavy media use

It processes more overhead than the controlled access methods do

It is as nondeterministic method

It has has mechanisms to the turns devices take to access the media

Feedback

Your answer is correct.


The correct answer is: It is as nondeterministic method

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a characteristic of a WAN hub-and-spoke topology? Select one:

a. It requires that some of the branch sites be interconnected through point-to-


point links

b. The branch sites are connected to a central site through point-point links

c. it requires that every site be interconnected to each other through point to-point
links

d. All sites require a hub device that connects to a router

Feedback

Your answer is correct.

The correct answer is: The branch sites are connected to a central site
through point-point links
Question 15
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which two statements are true regarding the user EXEC mode? (Choose two.) Select one or more:

Interfaces and routing can be configured

Global configuration mode can be accessed by entering the enable command

This is the default mode on an unconfigured router when first powered up.

Only some aspects of the router configuration can be viewed

All router commands are available

Feedback

Your answer is correct.

The correct answers are: This is the default mode on an unconfigured router when
first powered up., Only some aspects of the router configuration can be viewed
Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What two criteria are used to help select a network medium from various network media? (Choose two.)
Select one or more:

the cost of the end devices utilized in the network

the environment where the selected medium is to be installed

the distance the selected medium can successfully carry a signal


d. the types of data that need to be prioritized

e. the number of intermediary devices installed in the network

Feedback

Your answer is correct.

The correct answers are: the distance the selected medium can successfully carry a
signal, the environment where the selected medium is to be installed
Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration? Select one:

It must be registered with a DNS server

It cannot start with a number

Its maximum length is 255 characters.

It does not allow spaces

Feedback

Your answer is correct.

The correct answer is: It does not allow spaces

Question 18
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which statement describes a network that supports QoS? Select one:

The network should be able to expand to keep up with user demand

The network provides predictable levels of service to different types of traffic

Data sent over the network is not altered in transmission

The fewest possible devices are affected by a failure

Feedback

Your answer is correct.

The correct answer is: The network provides predictable levels of service to
different types of traffic
Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is a wiki? Select one:

a. an audio-based medium that is used to deliver information to a wide audience


a personal journal that is posted on the internet

an online meeting

a web page that groups of people can edit and review

Feedback
Feedback
Your answer is correct.

The correct answer is: a web page that groups of people can edit and review

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What process is used to place one message inside another message for transfer from the source to the des
Select one:

encapsulation

access control

c. decoding

d. flow control
Your answer is correct.

The correct answer is: encapsulation


Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement is correct about network ? Select one:

a. Network define the type of hardware that is used and how it is


mounted in racks.

b. They are only required for exchange of messages between devices on remote
networks.

c. They all function in the layer of TCP/IP.

d. They define how messages are exchanged between the source and the
destination.

Feedback

Your answer is correct.

The correct answer is: They define how messages are exchanged between the
source and the destination.

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Why would a technician enter the command copy startup-config running config? Select one:

to save an active configuration to NVRAM

to copy an existing configuration into RAM

to make a changed configuration the new startup configuration

to remove all configuration from the switch

Feedback

Your answer is correct.

The correct answer is: to copy an existing configuration into RAM


Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is an advantage of using standards to develop and implement ? Select one:

a. Products from different manufacturers can interoperate successfully


b. Different manufacturers are free to apply different requirements when
implementing a protocol

c. Standard provide flexibility for manufacturers to create devices that comply with
unique requirements

d. A particular protocol can only be implemented by one manufacturer

Feedback

Your answer is correct.

The correct answer is: Products from different manufacturers can interoperate
successfully
Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Why would a network administrator use the CLI of the Cisco IOS? Select one:

to add a password to a Cisco network device

to test the performance on a particular LAN

to provide automatic (unmanned) management of Cisco network devices

to monitor the number of times a device has been powered on and off

Feedback

Your answer is correct.


The correct answer is: to add a password to a Cisco network device

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A network administer has forgotten the argument of an IOS command. How would the administrator get h
Select one:

Type help and press the Enter key at the prompt

Type the command and then press CTRL-C

Type the command and then press the Tab key

Type the command, type help, and press the Enter key.

Type the command and then press the? key

Feedback

Your answer is correct.

The correct answer is: Type the command and then press the? key
Question 26
Correct
Mark 1.00 out of 1.00

Flag question
Question text

loopback
AAnswer to the hostaddress is defined as a reserved address that routes packets back

Feedback

The correct answer is: loopback


Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
A technician configures a switch with these commands: SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown
What is the technician ?

Select one:

physical switchport access

SVI

password encryption

Telnet access

Feedback

Your answer is correct.

The correct answer is:


Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the purpose of the physical link control field in a data link layer header? Select one:

to establish the media link

to indicate congestion in the media

to establish a logical connection between nodes

to start and stop traffic over the media

Feedback

Your answer is correct.

The correct answer is: to establish the media link


Question 29
Correct
Mark 1.00 out of 1.00

Flag question

Question text

An employee at a branch office is creating a quote for a customer. In order to


do this, the employee needs to access confidential pricing information from
internal servers at the Head Office. What type of network would the employee
Select one:
an intranet

the Internet

a local area network

an extranet

Feedback

Your answer is correct.

The correct answer is: an intranet


Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which device performs the function of determining the path that messages should take through internet w
Select one:

a web server

a firewall

a DSL modem

a router

Feedback

Your answer is correct.


The correct answer is: a router

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two engineering organizations define open standards and that apply to the data link layer?
Select one:

International Organization for Standardization (ISO)

International Telecommunication Union (ITU)

Internet Society (ISOC)

Internet Assigned Numbers Authority (IANA)

Electronic Industries Alliance (EIA

Feedback

Your answer is correct.

The correct answer is: International Telecommunication Union (ITU)


Question 32
Correct
Mark 1.00 out of 1.00

Flag question
Question text
What type of communication will send a message to all devices on a local area network?
Select one:

broadcast

multicast

c. unicast

d. allcast

Feedback

Your answer is correct.

The correct answer is: broadcast


Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two message timing mechanisms are used in data communication? (Choose two.)
Select one or more:

formatting

encoding
response timeout

encapsulation

flow control

Feedback

Your answer is correct.

The correct answers are: response timeout, flow control


Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Scalable
AAnswer network is able to expand to accept new devices and applications
without affecting performance.

Feedback

The correct answer is: Scalable


Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which statement is correct about network protocols?


Select one:

a. Network define the type of hardware that is used and how it is


mounted in racks

b. They define how messages are exchanged between the sources and the
destination

c. They all function in the layer of TCP/IP

d. They are only required for exchange of message between devices on remote
network

Feedback

Your answer is correct.

The correct answer is: They define how messages are exchanged between
the sources and the destination
Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the function of the kernel of an operating software? Select one:

a. The kernel provisions hardware resources to meet software requirements.

b. The kernel links the hardware drivers with the underlying electronics of a
computer.
c. It provides a user interface that allows users to request a specific task.

d. It is an application that allows the initial configuration of a Cisco device.

Feedback

Your answer is correct.

The correct answer is: The kernel provisions hardware resources to meet software
requirements.

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which term describes the state of a network when the demand on the network resources exceeds the avail
Select one:

congestion

synchronization

convergence

optimization

Feedback

Your answer is correct.

The correct answer is: congestion


Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which is a function of the Logical Link Control (LLC) sublayer? Select one:

to define the media access processes that are performed by the hardware

to identify which protocol is being used

to provide data link layer addressing

to accept segments and package them into data units that are called packets

Feedback

Your answer is correct.

The correct answer is: to identify which network layer protocol is being used
Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What three functions are defined by network protocols to allow communication


between known source and destination IP addresses? (Choose three.)
Select one or more:
media selection

data encoding

end-device installation

connector specifications

delivery options

message size

Feedback

Your answer is correct.

The correct answers are: data encoding, message size, delivery options
Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two connection options provide an always-on, high-bandwidth Internet connection to computers in
Select one or more:

cellular

cable

dial-up telephone
d.

satellite

e. DSL

Feedback

Question 42
Your answer is correct.

The correct answers are: DSL, cable


Question 41
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same communication channel?
Select one:

a storage area network

a traditional network

a converged network

an extranet

Feedback

Your answer is correct.

The correct answer is: a converged network


Correct
Mark 1.00 out of 1.00

Flag question

Question text
A network administrator needs to keep the user ID, password, and session contents private when establish
Select one:

a. Console

b. Telnet

c. AUX

d. SSH

Feedback

Your answer is correct.

The correct answer is:

SSH
Question 43
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Which two statements describe intermediary devices? (Choose two.) Select one or more:

Intermediary devices initiate the encapsulation process.

Intermediary devices generate data content.

Intermediary devices direct the path of the data.

Intermediary devices connect individual hosts to the network.

Intermediary devices alter data content.

Feedback

Your answer is correct.

The correct answers are: Intermediary devices direct the path of the data.,
Intermediary devices connect individual hosts to the network.
Question 44
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
Select one:

ITU-T

IEEE

ISO
d. ISOC

e. IANA

Feedback

Your answer is correct.

The correct answer is:


Question 45
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Intranet
AnAnswer is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees of the organization

Feedback

The correct answer is: Intranet


Question 46
Correct
Mark 1.00 out of 1.00

Flag question

Question text

For which three reasons was a packet switched connectionless data


communications technology used when developing the Internet (Choose three.)
Select one or more:

a. It requires that a data circuit between the source and destination be established
before data can be transferred.

b. Network devices dynamically decide on the best available path to forward each
packet.

c. it allows for billing of network use by the amount of time a connection is


established

d. Data packets can travel through the network using multiple different paths

e. it can rapidly adapt to the failure of network devices and communication links

Feedback

Your answer is correct.

The correct answers are: it can rapidly adapt to the failure of network devices
and communication links, Data packets can travel through the network using
multiple different paths, Network devices dynamically decide on the best
available path to forward each packet.
Question 47
Correct
Mark 1.00 out of 1.00

Flag question

Question text
To save time, IOS commands may be partially entered and then completed by typing which key or key com
Select one:

Up Arrow

Right Arrow
Ctrl-P

Tab

Down Arrow

Ctrl-N

Feedback

Your answer is correct.

The correct answer is:


Question 48
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two components are added to the PDU at the layer? (Choose two.)
Select one or more:

HTTP header

Trailer

IP header

frame header

TCP header

Feedback

Your answer is correct.


The correct answers are: Trailer, frame header

Question 49
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which command or key combination allows a user to return to the previous level in the command hierarch
Select one:

a. exit

b. Ctrl-Z

c. end

d. Ctrl-C

Feedback

Your answer is correct.

The correct answer is:

exit
Question 50
Correct

Mark 1.00 out of 1.00


Flag question

Question text
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three char
Select one or more:

better device performance when acting as both client and server

lacks centralized administration

scalable
less cost to implement e.

easy to create

f.
better security

Feedback

Your answer is correct.

The correct answers are:

easy to create, lacks centralized administration, less cost to implement

Question 51
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to the
Select one:

a. ip classless

noshutdown

no switchport

switchport

Feedback

Your answer is correct.

The correct answer is: no switchport


Question 52
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A router has a valid operating system and a configuration file stored in NVRAM.
The configuration file contains an enable secret password but no console
password.
Select one:

setup mode

global configuration mode

privileged EXEC mode

d. user EXEC mode

Feedback

Your answer is correct.

The correct answer is: user EXEC mode


Question 53
Correct
Mark 1.00 out of 1.00

Flag question

Question text

light
In fiber optic meda, the signals are represented as patterns ofAnswer .

Feedback

The correct answer is: light


Question 54
Correct
Mark 1.00 out of 1.00

Flag question
Question text
What is encrypted with the enable secret command? Select one:

the privileged executive mode password

the consoled line password

the VTY line password

all configured passwords

Feedback
Feedback
Your answer is correct.

The correct answer is: the privileged executive mode password


Question 55
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What happens when two devices on the same subnet are communicating? Select one:

The host portion of the IP addresses will be different

The sending device will use ARP to determine the IP address of the receiver

The data link layer addresses are added to the IP header

The frame will be sent to the default gateway for delivery to the receiving device
Your answer is correct.

The correct answer is: The host portion of the IP addresses will be different
Question 56
Correct
Mark 1.00 out of 1.00

Flag question

Question text
When is a wired connection preffered to a wireless connection by an end-user device?
Select one:

when the end-user device is within range of a wireless signal

when the end-user device only has a WLAN NIC

when the end-user device will run an application that is delay tolerant

when the end-user device will run an application that requires a dedicated

connection to the network

Feedback

Your answer is correct.

The correct answer is: when the end-user device will run an application that
requires a dedicated connection to the network

Question 57
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure
Select one:

Use Telnet to remotely access the switch through the network.

Use the console port to locally access the switch from a serial or USB interface of
the PC.

c. Use the AUX port to locally access the switch from a serial or USB interface of the
PC

d. Use Secure Shell to remotely access the switch through the network.

Feedback

Your answer is correct.

The correct answer is: Use the console port to locally access the switch from a
serial or USB interface of the PC.
Question 58
Partially correct
Mark 0.50 out of 1.00

Flag question

Question text

Which two factors influence the method that is used for media access control?
(Choose two.)
Select one or more:
how signals are encoded by the NICs on end devices

how connection between nodes appears to the data link layer

how the IP protocol forwards the packet to the destination

how nodes share the media

how data is generated by end devices applications

Feedback

Your answer is partially correct.

You have correctly selected 1.

The correct answers are: how connection between nodes appears to the data link
layer, how nodes share the media
Question 59
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which two statements are true of the deterministic access method?(Choose two.) Select one or more:

The order of transmission is dictated by the node that asks first for the token

Each device has to transmit before passing the token to the next device

It is a very efficient method because there are no collisions

Devices take turns transmitting


e. The throughput is predictable

Feedback

Your answer is correct.

The correct answers are: The throughput is predictable, Devices take turns
transmitting
Question 60
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What type of delivery uses data link layer addresses? Select one:

remote delivery

local delivery

remote delivery using routers

local and remote delivery

Feedback

Your answer is correct.

The correct answer is: local delivery

Question 61
Correct

Mark 1.00 out of 1.00


Flag question

Question text

mac
The Answer with the physical layer.
sublayer is responsible for communicating directly

Feedback

The correct answer is: mac


Question 62
Correct
Mark 1.00 out of 1.00

Flag question

Question text
An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given per
Select one:

goodput

digital bandwidth

latency

throughput

Feedback

Your answer is correct.


The correct answer is: latency

Question 63
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What type of address is 01-00-5E-0A-00-02? Select one:

an address that reaches every host inside a local subnet

an address that reaches a specific group of hosts

an address that reaches every host in the network

an address that reaches one specific host

Feedback
Question text
Your answer is correct.

The correct answer is: an address that reaches a specific group of hosts
Question 64
Correct
Mark 1.00 out of 1.00

Flag question
The farther you are from the central office when utilizing a DSL connection,
theAnswer slow er
the connection speed

Feedback

The correct answer is: slower


Question 65
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In which scenario would the use of a WISP be recommended? Select one:

a. an Internet cafe in a city

any home with multiple wireless devices

an apartment in a building with cable access to the Internet

a farm in a rural area without wired broadband access

Feedback

Your answer is correct.

The correct answer is: a farm in a rural area without wired broadband access

Question 66
Correct

Mark 1.00 out of 1.00


Flag question

Question text
What will a network administrator use to modify a configuration on a Cisco router? Select one:

a.

the Windows command prompt

a DHCP server

a control panel

Windows Explorer

IOS

Feedback

Your answer is correct.

The correct answer is:


Question 67
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What method can be used by two computers to ensure that packets are not dropped because too much
Select one:

flow control

encapsulation

access method

d. response timeout

Feedback

Your answer is correct.

The correct answer is: flow control


Question 68
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a characteristic of the frame header fields of the data link layer?
Select one:

They include information on user applications

They vary depending on

frame header fields contain Layer 3 source and destination addresses

They all include the flow control and logical connection fields
Feedback

Your answer is correct.

The correct answer is: They vary depending on protocols


Question 69
Correct
Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was installed on a computer was se
Select one:

identity theft

DoS attack

zero – day attack

spyware

Feedback

Your answer is correct.

The correct answer is: spyware

Question 70
Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which message delivery option is used when all devices need to receive the same message simultaneously
Select one:

duplex

broadcast

multicast

unicast

Feedback

Your answer is correct.

The correct answer is: broadcast

You might also like