It6201 Data Communications Amp Network 1docx 5 PDF Free
It6201 Data Communications Amp Network 1docx 5 PDF Free
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Copy the running configuration to the startup configuration file.
b. Nothing must be done. Changes to the configuration on an IOS device take effect
as soon as the command is typed correctly and the Enter key has been pressed.
c. Reload the device and type yes when prompted to save the configuration
Question 2
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. A network that is incapable of failing
b. A network that can reroute traffic in case of device failure
c. A network that can provide priority treatment of voice and video traffic
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. all configured passwords
b. the privileged executive mode password
c. the consoled line password
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A network administer has forgotten the argument of an IOS command. How would
the administrator get help from the IOS CLI to complete the command correctly?
Select one:
a. Type help and press the Enter key at the prompt
b. Type the command and then press the Tab key
c. Type the command and then press the? key
d. Type the command and then press CTRL-C
e. Type the command, type help, and press the Enter key.
Feedback
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
e. Leased lines
Feedback
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Using a web browser
b. By the use of a custom GUI
c. Through the CLI using a terminal emulator
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Scalable
AAnswer network is able to expand to accept new devices and applications
without affecting performance.
Feedback
Flag question
Question text
Where is the configuration used during startup on Cisco IOS devices located?
Select one:
a. Terminal emulator
b. NVRAM
c. Startup config
d. Running config
Feedback
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
a. to add a password to a Cisco network device
b. to provide automatic (unmanned) management of Cisco network devices
c. to monitor the number of times a device has been powered on and of
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which technology would be best to provide a home user with a highspeed, always-
on Internet connection?
Select one:
a. Cellular
b. Dial-up
c. Satellite
d. DSL
Feedback
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
During a routine inspection, a technician discovered that software that was installed
on a computer was secretly collecting data about websites that were visited by users
of the computer. Which type of threat is affecting this computer?
Select one:
a. identity theft
b. DoS attack
c. zero – day attack
d. spyware
Feedback
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
To save time, IOS commands may be partially entered and then completed by
typing which key or key combination?
Select one:
a. Right Arrow
b. Up Arrow
c. Tab
d. Ctrl-N
e. Ctrl-P
f. Down Arrow
Feedback
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a wiki?
Select one:
a. a web page that groups of people can edit and review
b. an online meeting
c. a personal journal that is posted on the internet
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of traffic must receive the highest priority from QoS?
Select one:
a. VoIP
b. Web traffic
c. Email
d. Order processing
Feedback
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. A network that makes use of both wired and wireless technology
b. A network that makes use of both wired and wireless technology
c. A network that makes use of both fiber-optic and copper connections
d. A network where voice, video, and data move over the same infrastructure
Feedback
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a technician enter the command copy startup-config running config?
Select one:
a. to save an active configuration to NVRAM
b. to make a changed configuration the new startup configuration
c. to remove all configuration from the switch
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
f. Printer
Feedback
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. SVI
b. password encryption
c. Telnet access
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What are
AnAnswer is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees
of the organization, or others with authorization.
Feedback
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. an apartment in a building with cable access to the Internet
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a. Command
b. Argument
c. A space
d. Keyword
Feedback
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A data center has recently updated a physical server to host multiple operating
systems on a single CPU. The data center can now provide each customer with a
separate web server without having to allocate an actual discrete server for each
customer. What is the network trend that is being implemented by the data center
in this situation?
Select one:
a. maintaining communication integrity
b. virtualization
c. BYOD
d. online collaboration
Feedback
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Question 24
Partially correct
Mark 0.50 out of 1.00
Flag question
Question text
d. Complex configuration
Feedback
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Location of departmental printer
b. Length and type of all cable runs
c. IP addressing scheme
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What command will display a list of keywords available for viewing the status of an
IOS switch?
Select one:
a. Switch# help
b. Switch# show?
c. Switch# status?
d. Switch# sh?
Feedback
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. an Internet cafe in a city
b. a farm in a rural area without wired broadband access
c. any home with multiple wireless devices
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. % Invalid input detected
b. EaSt-2+56(config)#
c. EaSt-58(config)#
d. Switch(config)#
e. Switch EaSt-2+56(config)#
f. East-2+56(config)#
Feedback
Question 29
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
What is a network infrastructure that provides access to other networks over a wide
geographic area?
Select one:
a. LAN
b. MAN
c. SAN
d. WLAN
e. WAN
Feedback
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Configuring an IP address
b. Configuring a console password
c. Configuring a VTY password
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. The operating system for the Cisco network device
b. The memory for the Cisco network device
c. The configuration for the Cisco network device
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP networks? 1
Select one:
a. DHCP server
b. local router
c. DNS server
d. local switch
Feedback
Question 33
Correct
1
Mark 1.00 out of 1.00
Flag question
Question text
e. QoS
Feedback
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. The network provides predictable levels of service to different types of traffic
b. The fewest possible devices are affected by a failure
c. The network should be able to expand to keep up with user demand
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of connection to a Cisco IOS switch is used to make the initial
configuration?
Select one:
a. Web interface
b. AUX port
c. SSH
d. Console port
e. Telnet
Feedback
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
a. an extranet
b. a converged network
c. a traditional network
Question 37
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is a group of web pages that groups of individuals can edit and view together
called?
Select one:
a. Access point
b. Wiki
c. Weblog (blog)
d. Podcasting
e. TelePresence endpoint
f. Instant messaging
Feedback
Flag question
Question text
For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)
e. Network devices dynamically decide on the best available path to forward each
packet.
Feedback
Question 39
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which statement describes a feature of an IOS host name configuration?
Select one:
a. Its maximum length is 255 characters.
b. It does not allow spaces
c. It must be registered with a DNS server
Question 40
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection,
slow er
theAnswer
the connection speed
Feedback
Question 1
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following elements do both human and computer communication
systems have in common? (Choose three.)
e. Source
Feedback
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP
reference model? (Choose two.)
e. FTP
Feedback
Flag question
Question text
Select one:
a. specifying the bandwidth of the channel or medium for each type of
communication
b. determining the electronic specifications to enable the communication
c. specifying the device operating systems that will support the communication
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following OSI model layers have the same functionality as the network
access layer in the TCP/IP model? (Choose two.)
g. Application
Feedback
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
loopback
AAnswer address is defined as a reserved address that routes packets back
to the host
Feedback
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Products from different manufacturers can interoperate successfully
b. Standards provide flexibility for manufacturers to create devices that comply with
unique requirements
c. Different manufacturers are free to apply different requirements when
implementing a protocol
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
f. message size
Feedback
Flag question
Question text
Select one:
a. Broadcast
b. Manycast
c. Multicast
d. Unicast
Feedback
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
light
In fiber optic meda, the signals are represented as patterns ofAnswer .
Feedback
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What happens when two devices on the same subnet are communicating?
Select one:
a. The data link layer addresses are added to the IP header
b. The frame will be sent to the default gateway for delivery to the receiving device
c. The host portion of the IP addresses will be different
d. The sending device will use ARP to determine the IP address of the receiver
Feedback
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which application layer protocol allows users on one network to reliably transfer
files to and from a host on another network?
Select one:
a. FTP
b. HTTP
c. TFTP
d. IMAP
e. DHCP
Feedback
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. IRTF
b. IAB
c. IETF
d. ISO
e. IEEE
Feedback
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What happens to frames that are too long or too short for the channel used?
Select one:
a. They are dropped.
b. They are delivered but much slower than proper-size frames.
c. They clog the network and block the delivery of other frames.
d. They are broken up into smaller pieces.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two statements are true of the deterministic access method?(Choose two.)
c. The order of transmission is dictated by the node that asks first for the token
d. Devices take turns transmitting
Flag question
Question text
Which two statements are true regarding the user EXEC mode? (Choose two.)
e. This is the default mode on an unconfigured router when first powered up.
Feedback
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which OSI reference model layer is responsible for common representation of the
data transferred between application layer services?
Select one:
a. Network
b. Transport
c. Data link
d. Presentation
e. Physical
f. Session
g. Application
Feedback
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. to identify which network layer protocol is being used
b. to accept segments and package them into data units that are called packets
c. to define the media access processes that are performed by the hardware
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. The Internet Corporation for Assigned Names and Numbers (ICANN)
b. The International Telecommunications Union-Telecommunications
Standardization Sector (ITU-T)
c. The Telecommunications Industry Association (TIA)
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which message timing factor impacts how much information can be sent and the
speed at which it can be delivered?
Select one:
a. Flow control
b. Access method
c. Response timeout
d. Delay speed
Feedback
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization develops the 802 family of standard for wired and wireless LANs
and MANs?
Select one:
a. ISO
b. ISOC
c. IEEE
d. ITU-T
e. IANA
Feedback
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What name is given to a group of interrelated protocols necessary to perform a
communication function?
Select one:
a. Protocol stack
b. Protocol suite
c. Functional protocol
d. Functional collection
Feedback
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. the Windows command prompt
b. a DHCP server
c. a control panel
d. Windows Explorer
e. IOS
Feedback
Flag question
Question text
d. Novell NetWare
Feedback
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two message timing mechanisms are used in data communication? (Choose
two.)
e. response timeout
Feedback
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two factors influence the method that is used for media access control?
(Choose two.)
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. They all function in the network access layer of TCP/IP
b. Network protocols define the type of hardware that is used and how it is
mounted in racks
c. They are only required for exchange of message between devices on remote
network
d. They define how messages are exchanged between the sources and the
destination
Feedback
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which TCP/IP model layer is responsible for providing the best path through the
network?
Select one:
a. Application
b. Network Access
c. Internet
d. Transport
Feedback
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which two components are added to the PDU at the network access layer? (Choose
two.)
e. TCP header
Feedback
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. A particular protocol can only be implemented by one manufacturer
b. Products from different manufacturers can interoperate successfully
c. Standard provide flexibility for manufacturers to create devices that comply with
unique requirements
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What command will prevent all unencrypted passwords from displaying in plain text
in a configuration file?
Select one:
a. (config) # enable secret Secret_Password
b. (config)# enable password secret
c. (config-line) # password secret
d. (config) # enable secret Encrypted_Password
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What type of protocol describes communication over a data link and the physical
transmission of data on the network media?
Select one:
a. Internet protocol
b. Application protocol
c. Network access protocol
d. Transport protocol
Feedback
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which organization is responsible for the standard that defines Media Access
Control for wired Ethernet?
Select one:
a. IAB
b. IETF
c. ISO
d. ISOC
e. IEEE
Feedback
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. destination MAC address
b. source MAC address
c. destination port number
d. source IP address
e. destination IP address
Feedback
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Bit
b. Data
c. Packet
d. Frame
e. Segment
Feedback
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which message delivery option is used when all devices need to receive the same
message simultaneously?
Select one:
a. unicast
b. broadcast
c. multicast
d. duplex
Feedback
Question 1
Incorrect
Flag question
Question text
b. destination IP address
c. source IP address
e. destination IP address
Feedback
Question 2
Correct
Question text
A data center has recently updated a physical server to host multiple operating
systems on a single CPU. The data center can now provide each customer with a
separate web server without having to allocate an actual discrete server for each
customer. What is the network trend that is being implemented by the data center
in this situation?
Select one:
b. online collaboration
c. BYOD
d. virtualization
Feedback
Question 3
Correct
Flag question
Question text
c. They direct data over alternate paths in the event of link failures.
d. They provide the channel over which the network message travels.
e. They are the interface between humans and the communication network.
Feedback
The correct answers are: They originate the data that flows through the network.,
They are the interface between humans and the communication network.
Question 4
Correct
Flag question
Question text
b. Reload the device and type yes when prompted to save the configuration
c. Nothing must be done. Changes to the configuration on an IOS device take effect
as soon as the command is typed correctly and the Enter key has been pressed.
The correct answer is: Nothing must be done. Changes to the configuration on an
IOS device take effect as soon as the command is typed correctly and the Enter key
has been pressed.
Question 5
Correct
Flag question
Question text
A web client is sending a request for a webpage to a web server. From the
perspective of the client, what is the correct order of the protocol stack that is used
to prepare the request for transmission?
Select one:
Feedback
Question 6
Correct
Question text
Which device acts as gateway to allow hosts to send traffic to remote IP networks?
Select one:
a. local switch
b. DHCP server
c. local router
d. DNS server
Feedback
Question 7
Correct
Flag question
Question text
Which area of the network would a college IT staff most likely have to redesign as a
direct result of many students bringing their own tablets and smartphones to school
to access school resources?
Select one:
a. wireless WAN
b. extranet
c. wireless LAN
d. intranet
e. wired LAN
Feedback
Question 8
Correct
Flag question
Question text
Feedback
Question 9
Correct
Flag question
Question text
What command will prevent all unencrypted passwords from displaying in plain text
in a configuration file?
Select one:
Feedback
Question 10
Correct
Question text
a. frame
b. segment
c. bits
d. packet
Feedback
Question 11
Partially correct
Flag question
Question text
Which two Internet connection options do not require that physical cables be run to
the building? (Choose two.)
Select one or more:
b. satellite
c. cellular
d. DSL
e. dialup
Feedback
, satellite
Question 12
Correct
Flag question
Question text
d. specifying the device operating systems that will support the communication
Feedback
The correct answer is: providing the rules required for a specific type of
communication to occur
Question 13
Correct
Flag question
Question text
c. It is as nondeterministic method
d. It has has mechanisms to the turns devices take to access the media
Feedback
Question 14
Correct
Flag question
Question text
b. The branch sites are connected to a central site through point-point links
c. it requires that every site be interconnected to each other through point to-point
links
Feedback
The correct answer is: The branch sites are connected to a central site through
point-point links
Question 15
Correct
Flag question
Question text
Which two statements are true regarding the user EXEC mode? (Choose two.)
Select one or more:
c. This is the default mode on an unconfigured router when first powered up.
Feedback
The correct answers are: This is the default mode on an unconfigured router when
first powered up., Only some aspects of the router configuration can be viewed
Question 16
Correct
Flag question
Question text
What two criteria are used to help select a network medium from various network
media? (Choose two.)
Select one or more:
Feedback
The correct answers are: the distance the selected medium can successfully carry a
signal, the environment where the selected medium is to be installed
Question 17
Correct
Flag question
Question text
Feedback
Question 18
Correct
Question text
Feedback
The correct answer is: The network provides predictable levels of service to different
types of traffic
Question 19
Correct
Flag question
Question text
What is a wiki?
Select one:
c. an online meeting
Feedback
The correct answer is: a web page that groups of people can edit and review
Question 20
Correct
Flag question
Question text
What process is used to place one message inside another message for transfer
from the source to the destination?
Select one:
a. encapsulation
b. access control
c. decoding
d. flow control
Feedback
Your answer is correct.
Question 21
Correct
Flag question
Question text
a. Network protocols define the type of hardware that is used and how it is
mounted in racks.
b. They are only required for exchange of messages between devices on remote
networks.
d. They define how messages are exchanged between the source and the
destination.
Feedback
The correct answer is: They define how messages are exchanged between the source
and the destination.
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why would a technician enter the command copy startup-config running config?
Select one:
Feedback
Question 23
Correct
Flag question
Question text
c. Standard provide flexibility for manufacturers to create devices that comply with
unique requirements
Feedback
The correct answer is: Products from different manufacturers can interoperate
successfully
Question 24
Correct
Flag question
Question text
Why would a network administrator use the CLI of the Cisco IOS?
Select one:
d. to monitor the number of times a device has been powered on and off
Feedback
Question 25
Correct
Flag question
Question text
A network administer has forgotten the argument of an IOS command. How would
the administrator get help from the IOS CLI to complete the command correctly?
Select one:
d. Type the command, type help, and press the Enter key.
Feedback
The correct answer is: Type the command and then press the? key
Question 26
Correct
Flag question
Question text
loopback
AAnswer address is defined as a reserved address that routes packets back
to the host
Feedback
Question 27
Correct
Flag question
Question text
Select one:
b. SVI
c. password encryption
d. Telnet access
Feedback
Flag question
Question text
What is the purpose of the physical link control field in a data link layer header?
Select one:
Feedback
Question 29
Correct
Flag question
Question text
a. an intranet
b. the Internet
d. an extranet
Feedback
Question 30
Correct
Flag question
Question text
Which device performs the function of determining the path that messages should
take through internet works?
Select one:
a. a web server
b. a firewall
c. a DSL modem
d. a router
Feedback
Question 31
Correct
Flag question
Question text
Which two engineering organizations define open standards and protocols that
apply to the data link layer?
Select one:
Feedback
Question 32
Correct
Flag question
Question text
What type of communication will send a message to all devices on a local area
network?
Select one:
a. broadcast
b. multicast
c. unicast
d. allcast
Feedback
Question 33
Correct
Flag question
Question text
Which two message timing mechanisms are used in data communication? (Choose
two.)
Select one or more:
a. formatting
b. encoding
c. response timeout
d. encapsulation
e. flow control
Feedback
Question 34
Correct
Flag question
Question text
Scalable
AAnswer network is able to expand to accept new devices and applications
without affecting performance.
Feedback
Question 35
Correct
Flag question
Question text
a. Network protocols define the type of hardware that is used and how it is
mounted in racks
b. They define how messages are exchanged between the sources and the
destination
d. They are only required for exchange of message between devices on remote
network
Feedback
The correct answer is: They define how messages are exchanged between the
sources and the destination
Question 36
Correct
Flag question
Question text
b. The kernel links the hardware drivers with the underlying electronics of a
computer.
c. It provides a user interface that allows users to request a specific task.
Feedback
The correct answer is: The kernel provisions hardware resources to meet software
requirements.
Question 37
Correct
Flag question
Question text
Which term describes the state of a network when the demand on the network
resources exceeds the available capacity?
Select one:
a. congestion
b. synchronization
c. convergence
d. optimization
Feedback
Flag question
Question text
a. to define the media access processes that are performed by the hardware
d. to accept segments and package them into data units that are called packets
Feedback
The correct answer is: to identify which network layer protocol is being used
Question 39
Correct
Flag question
Question text
a. media selection
b. data encoding
c. end-device installation
d. connector specifications
e. delivery options
f. message size
Feedback
The correct answers are: data encoding, message size, delivery options
Question 40
Correct
Flag question
Question text
a. cellular
b. cable
c. dial-up telephone
d.
satellite
e. DSL
Feedback
Question 41
Correct
Flag question
Question text
Which type of network design combines voice, video, and data on the same
communication channel?
Select one:
b. a traditional network
c. a converged network
d. an extranet
Feedback
Question 42
Correct
Flag question
Question text
A network administrator needs to keep the user ID, password, and session contents
private when establishing remote CLI connectivity with a switch to manage it. Which
access method should be chosen?
Select one:
a. Console
b. Telnet
c. AUX
d. SSH
Feedback
Question 43
Correct
Flag question
Question text
Feedback
The correct answers are: Intermediary devices direct the path of the data.,
Intermediary devices connect individual hosts to the network.
Question 44
Correct
Flag question
Question text
Which organization develops the 802 family of standard for wired and wireless LANs
and MANs?
Select one:
a. ITU-T
b. IEEE
c. ISO
d. ISOC
e. IANA
Feedback
Question 45
Correct
Flag question
Question text
Intranet
AnAnswer is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees
of the organization, or others with authorization.
Feedback
Question 46
Correct
Flag question
Question text
For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)
Select one or more:
a. It requires that a data circuit between the source and destination be established
before data can be transferred.
b. Network devices dynamically decide on the best available path to forward each
packet.
d. Data packets can travel through the network using multiple different paths
e. it can rapidly adapt to the failure of network devices and communication links
Feedback
The correct answers are: it can rapidly adapt to the failure of network devices and
communication links, Data packets can travel through the network using multiple
different paths, Network devices dynamically decide on the best available path to
forward each packet.
Question 47
Correct
Flag question
Question text
To save time, IOS commands may be partially entered and then completed by
typing which key or key combination?
Select one:
a. Up Arrow
b. Right Arrow
c. Ctrl-P
d. Tab
e. Down Arrow
f. Ctrl-N
Feedback
Question 48
Correct
Flag question
Question text
Which two components are added to the PDU at the network access layer? (Choose
two.)
Select one or more:
a. HTTP header
b. Trailer
c. IP header
d. frame header
e. TCP header
Feedback
Question 49
Correct
Flag question
Question text
Which command or key combination allows a user to return to the previous level in
the command hierarchy?
Select one:
a. exit
b. Ctrl-Z
c. end
d. Ctrl-C
Feedback
Question 50
Correct
Question text
c. scalable
e.
easy to create
f.
better security
Feedback
Question 51
Correct
Question text
Which interface command must be entered in a Layer 3 switch before IPv4 address
can be assigned to the interface?
Select one:
a. ip classless
b. noshutdown
c. no switchport
d. switchport
Feedback
Question 52
Correct
Flag question
Question text
A router has a valid operating system and a configuration file stored in NVRAM. The
configuration file contains an enable secret password but no console password.
When the router boots up, which mode will display?
Select one:
a. setup mode
Feedback
Question 53
Correct
Flag question
Question text
light
In fiber optic meda, the signals are represented as patterns ofAnswer .
Feedback
Question 54
Correct
Flag question
Question text
Feedback
Question 55
Correct
Flag question
Question text
What happens when two devices on the same subnet are communicating?
Select one:
b. The sending device will use ARP to determine the IP address of the receiver
d. The frame will be sent to the default gateway for delivery to the receiving device
Feedback
Your answer is correct.
The correct answer is: The host portion of the IP addresses will be different
Question 56
Correct
Flag question
Question text
c. when the end-user device will run an application that is delay tolerant
d. when the end-user device will run an application that requires a dedicated
connection to the network
Feedback
The correct answer is: when the end-user device will run an application that requires
a dedicated connection to the network
Question 57
Correct
Question text
Which procedure is used to access a Cisco 2960 switch when performing an initial
configuration in a secure environment?
Select one:
b. Use the console port to locally access the switch from a serial or USB interface of
the PC.
c. Use the AUX port to locally access the switch from a serial or USB interface of the
PC
d. Use Secure Shell to remotely access the switch through the network.
Feedback
The correct answer is: Use the console port to locally access the switch from a serial
or USB interface of the PC.
Question 58
Partially correct
Flag question
Question text
Which two factors influence the method that is used for media access control?
(Choose two.)
Select one or more:
Feedback
The correct answers are: how connection between nodes appears to the data link
layer, how nodes share the media
Question 59
Correct
Flag question
Question text
Which two statements are true of the deterministic access method?(Choose two.)
Select one or more:
a. The order of transmission is dictated by the node that asks first for the token
b. Each device has to transmit before passing the token to the next device
Feedback
The correct answers are: The throughput is predictable, Devices take turns
transmitting
Question 60
Correct
Flag question
Question text
a. remote delivery
b. local delivery
Feedback
Question 61
Correct
Question text
mac
The EthernetAnswer sublayer is responsible for communicating directly
with the physical layer.
Feedback
Question 62
Correct
Flag question
Question text
An administrator measured the transfer of usable data across a 100 Mb/s physical
channel over a given period of time and obtained 60 Mb/s. Which kind of
measurement did the administrator obtain
Select one:
a. goodput
b. digital bandwidth
c. latency
d. throughput
Feedback
Question 63
Correct
Flag question
Question text
Feedback
The correct answer is: an address that reaches a specific group of hosts
Question 64
Correct
Flag question
Question text
The farther you are from the central office when utilizing a DSL connection,
slow er
theAnswer
the connection speed
Feedback
Question 65
Correct
Flag question
Question text
Feedback
The correct answer is: a farm in a rural area without wired broadband access
Question 66
Correct
Question text
a.
b. a DHCP server
c. a control panel
d. Windows Explorer
e. IOS
Feedback
Question 67
Correct
Flag question
Question text
What method can be used by two computers to ensure that packets are not
dropped because too much data is being sent too quickly?
Select one:
a. flow control
b. encapsulation
c. access method
d. response timeout
Feedback
Question 68
Correct
Flag question
Question text
Which statement describes a characteristic of the frame header fields of the data
link layer?
Select one:
c. Ethernet frame header fields contain Layer 3 source and destination addresses
d. They all include the flow control and logical connection fields
Feedback
Question 69
Correct
Flag question
Question text
During a routine inspection, a technician discovered that software that was installed
on a computer was secretly collecting data about websites that were visited by users
of the computer. Which type of threat is affecting this computer
Select one:
a. identity theft
b. DoS attack
d. spyware
Feedback
Question 70
Correct
Question text
Which message delivery option is used when all devices need to receive the same
message simultaneously?
Select one:
a. duplex
b. broadcast
c. multicast
d. unicast
Feedback