A. The purchase of enterprise equipment that is designed for large traffic volumes
B The installation of redundant power supplies
C. The use of a collapsed core design
D. the use of the building switch block approach
D. the use of the building switch block approach
A. the system image file B. the NVRAM file system C. the configuration register value D. the startup configuration file E. System ROM
C. the configuration register value
D. the startup configuration file
A. Borderless
B. Converged
C. Managed
D. Switched
B. Converged
A. hides private LAN addressing from outside devices that are connected to the Internet
B. permits LAN expansion without additional public IP addresses
C. reduces CPU usage on customer routers
D. Creates multiple public IP addresses
E. improves the performance of the router that is connected to the Internet
F. conserves registered public IP addresses
A. hides private LAN addressing from outside devices that are connected to the Internet
B. permits LAN expansion without additional public IP addresses
F. conserves registered public IP addresses
A. All users at a large branch office can access company resources through a single VPN connection.
B. A small branch office with three employees has a Cisco ASA that is used to create a VPN connection to the HQ.
C. A toy manufacturer has a permanent VPN connection to one of its parts suppliers.
D. A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
E. An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.
D. A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
E. An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.
A. It utilizes end-user clients to do a substantial amount of data preprocessing and storage.
B. It uses open-source software for distributed processing of large datasets.
C. It streamlines the IT operations of an organization by subscribing only to needed services.
D. It enables access to organizational data anywhere and at any time.
E. It turns raw data into meaningful information by discovering patterns and relationships.
F. It eliminates or reduces the need for onsite IT equipment, maintenance, and management.
C. It streamlines the IT operations of an organization by subscribing only to needed services.
D. It enables access to organizational data anywhere and at any time.
F. It eliminates or reduces the need for onsite IT equipment, maintenance, and management.
A. All routers share a common forwarding database.
B. All routers have the same neighbor table.
C. All routers are in the backbone area.
D. All routers have the same routing table.
C. All routers are in the backbone area.
A. a network infrastructure that spans a limited physical area such as a city
B. a network infrastructure that provides access to other networks over a large geographic area
C. a network infrastructure that provides access in a small geographic area
D. a network infrastructure designed to provide data storage, retrieval, and replication
B. a network infrastructure that provides access to other networks over a large geographic area
A. data center
B. virtualization
C. dedicated servers
D. software defined networking
A. data center
A. link-state update
B. hello
C. database description
D. ink-state request
B. hello
A. A virus has an enabling vulnerability, a propagation mechanism, and a payload.
B. A virus can be dormant and then activate at a specific time or date.
C. A virus provides the attacker with sensitive data, such as passwords.
D. A virus replicates itself by independently exploiting vulnerabilities in networks.
E. A virus typically requires end-user activation.
B. A virus can be dormant and then activate at a specific time or date.
E. A virus typically requires end-user activation.
A. ISDN
B. DSL
C. cable
D. dialup
B. DSL
A. packet-switched network
B. Ethernet WAN
C. circuit-switched network
D. MPLS
B. Ethernet WAN
A. to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
B. to reverse engineer binary files when writing exploits and when analyzing malware
C. to obtain specially designed operating systems preloaded with tools optimized for hacking
D. to detect any evidence of a hack or malware in a computer or network
B. to reverse engineer binary files when writing exploits and when analyzing malware
A. Two devices connected to the router have IP addresses of 192.168.10. x .
B. Two devices were able to use SSH or Telnet to gain access to the router.
C. Traffic from one device was not allowed to come into one router port and be routed outbound a different router port.
D. Traffic from two devices was allowed to enter one router port and be routed outbound to a different router port.
B. Two devices were able to use SSH or Telnet to gain access to the router.
A. clear ip dhcp
B. clear ip nat translation
C. clear access-list counters
D. clear ip pat statistics
B. clear ip nat translation
A. Video traffic consumes less network resources than voice traffic consumes.
B. Video traffic latency should not exceed 400 ms.
C. Video traffic is more resilient to loss than voice traffic is.
D. Video traffic requires a minimum of 30 kbs of bandwidth.
E. Video traffic is unpredictable and inconsistent.
B. Video traffic latency should not exceed 400 ms.
E. Video traffic is unpredictable and inconsistent.
A. The IP NAT statement is incorrect.
B. Interface Fa0/1 should be identified as the outside NAT interface.
C. Interface S0/0/0 should be identified as the outside NAT interface.
D. The configuration is missing a valid access control list.
C. Interface S0/0/0 should be identified as the outside NAT interface.
A. UPnP
B. MAC filtering
C. NAT
D. QoS
C. NAT
A. online collaboration
B. BYOD
C. virtualization
D. maintaining communication integrity
C. virtualization
192.168.0.100
10.1.1.2
any address in the 10.1.1.0 network
209.165.20.25
209.165.20.25
A. MD5 B. DH C. AES D. SHA E. RSA
A. MD5
D. SHA
A. The Cisco AnyConnect client is installed by default on most major operating systems.
B. The host initiates a clientless VPN connection using a compliant web browser to download the client.
C. The host initiates a clientless connection to a TFTP server to download the client.
D. The host initiates a clientless connection to an FTP server to download the client.
B. The host initiates a clientless VPN connection using a compliant web browser to download the client.