Prelim Flashcards
(67 cards)
Which of the following is a characteristic of an SVI?
a. It is designed as a security protocol to protect switch ports.
b. it is a special interface that allows connectivity by different types of media
c. It is required to allow connectivity by any device at any location
d. It provides a means to remotely manage a switch
d
A large corporation has modified its network to allow users to access network resources from their personal smartphones. Which networking trend does this describe
BYOD. Bring your own device
Match the requirement of a reliable network with the supporting network architecture: Protect the network from unauthorized access.
Security
Match the requirement of a reliable network with the supporting network architecture: Provide redundant links
Fault Tolerance
Match the requirement of a reliable network with the supporting network architecture: Expand the network desgrading the service for each existing users
Scalability
Which term refers to a network that provides secure access to the corporate offices by suppliers and collaborators?
Extranet
Which statement describes the use of powerline networking technology?
a. New “smart” electrical cabling is used to extend an existing home LAN.
b. A home LAN is installed without the use of physical cabling
c. A device connects to an existing home LAN using an adapter and an existing electrical outlet.
d. Wireless access points use powerline adapters to distribute data through the home LAN
C
Which one uses high bandwidth telephone line?
a. DSL
b. Dial-up Telephone
c. Satellite
d. Cable
a
Which one is typically has low bandwidth?
Dial-up Telephone
Which interface allows remote management of a Layer 2 switch?
a. the AUX interface
b. the console port interface
c. the switch virtual interface
d. the first Ethernet port interface
c
What function does pressing the Tab key have when entering a command in IOS?
a. It aborts the current command and returns to configuration mode
b. It exits configuration mode and returns to user EXEC mode.
c. It moves the cursor to the beginning of the next line
d. It completes the remainder of a partially typed word in a command
d
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. the changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
a. Issue the reload command without saving the running configuration
b. Delete the vlan.dat file and reboot the device
c. Close and reopen the terminal emulation software
d. Issue the copy startup-config running-config command.
a
Which command or key combination allows a user to return to the previous level in the command heirarchy?
a. end
b. exit
c. Ctrl-z
d. Ctrl-c
b
Which of the following is a characteristic of RAM on a Cisco device?
a. RAM provides nonvolatile storage
b. The configuration that is actively running on the device is sttored in RAM
c. RAM is a component in Cisco switches but not in Cisco routers
d. RAM is able to store multiple versions of IOS and configuration files.
b
Which of the following host names follow the guidelines for naming conventions on Cisco IOS devices?
a. Branch21
b. RM-3-Switch-2A4
c. Floor (15)
d. HO Floor 17
B
How is SSH different from Telnet?
a. SSH makes connections over the network, whereas Telnet is for out-of-band access.
b. SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext
c. SSH requires the use of the PutTTY terminal emulation program. Tera Term must be used to connect to devidfs through the use of Telnet
d. SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection
b
A user is implementing security on a small office network. Which action would proide the minimum security requirements for this network
a. Installing wireless network
b. Installing antivirus software
c. Implementing an intrusion detection systems
d. Adding a dedicated intrusion prevention device?
b
In the show running-config command, which part of the syntax is represented by running-config?
a. the command
b. a keyword
c. a variable
d. a prompt
b
After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?
a. The new configuration will be stored in flash memory
b. The new configuration will be loaded if the switch is restarted
c. The current IOS file will be replaced with the newly configured file
d. The configuration changes will be removed and the original configuration will be restored
b
What command will prevent all unencrypted passswords from displaying in plain text in a configuration file?
(config)#service password-encryption
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
a. This command encrypts passwords as they are transmitted across serial WAN links
b. This command prevents someone from viewing the running configuration passwords
c. This commands enables a strong encryption algorithm for the enable secret password command.
d. This command automatically encrypts passwords in configuration files that are currently stored in NVRAM
e. This command provides an exclusive encrypted password for external service personnel who are required to do maintenance
b
What method can be used by two computers to ensure that packets are not dropped because too much data is sent too quickly?
a. encapsulation
b. flow control
c. access method
d. response timeout
b
What is an ISP?
a. It is a standards body that develops cabling and wiring standards for networking
b. It is a protocol that establishes how computesr within a local network communicate
c. It is an organization that enables individuals and business to connect to the internet
d. It is a networking device that combines the functionality of several different networking devices in one
c
Which name is assigned to the transport layer PDU?
a. bits
b. data
c. frame
d. packet
e. segment
e