0% found this document useful (0 votes)
22 views

It6201 Data Communications Amp Network 1docx 5 PDF Free

Uploaded by

justinpadolina12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

It6201 Data Communications Amp Network 1docx 5 PDF Free

Uploaded by

justinpadolina12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 96

Question 1

Correct
Mark 1.00 out of 1.00

Flag question

Question text

An administrator has just changed the IP address of an interface on an IOS device.


What else must be done in order to apply those changes to the device?

Select one:
a. Copy the running configuration to the startup configuration file.
b. Nothing must be done. Changes to the configuration on an IOS device take effect
as soon as the command is typed correctly and the Enter key has been pressed.
c. Reload the device and type yes when prompted to save the configuration

d. Copy the information in the startup configuration file to the running


configuration
Feedback

Your answer is correct.


The correct answer is: Nothing must be done. Changes to the configuration on an
IOS device take effect as soon as the command is typed correctly and the Enter key
has been pressed.

Question 2
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What is a fault-tolerant network?

Select one:
a. A network that is incapable of failing
b. A network that can reroute traffic in case of device failure
c. A network that can provide priority treatment of voice and video traffic

d. A network that offers secure transactions


Feedback

Your answer is incorrect.


The correct answer is: A network that can reroute traffic in case of device failure

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is encrypted with the enable secret command?

Select one:
a. all configured passwords
b. the privileged executive mode password
c. the consoled line password

d. the VTY line password


Feedback

Your answer is correct.


The correct answer is: the privileged executive mode password

Question 4
Correct
Mark 1.00 out of 1.00

Flag question
Question text

A network administer has forgotten the argument of an IOS command. How would
the administrator get help from the IOS CLI to complete the command correctly?

Select one:
a. Type help and press the Enter key at the prompt
b. Type the command and then press the Tab key
c. Type the command and then press the? key
d. Type the command and then press CTRL-C

e. Type the command, type help, and press the Enter key.
Feedback

Your answer is correct.


The correct answer is: Type the command and then press the? key

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following are business-class Internet connection technologies normally


supplied by a service provider? (Choose two.)

Select one or more:


a. Cellular
b. Broadband cable
c. Mobile services
d. Metro Ethernet

e. Leased lines
Feedback

Your answer is correct.


The correct answers are: Leased lines, Metro Ethernet

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

How is the Cisco IOS generally accessed and navigated?

Select one:
a. Using a web browser
b. By the use of a custom GUI
c. Through the CLI using a terminal emulator

d. With a Cisco-proprietary application


Feedback

Your answer is correct.


The correct answer is: Through the CLI using a terminal emulator

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Scalable
AAnswer network is able to expand to accept new devices and applications
without affecting performance.

Feedback

The correct answer is: Scalable


Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Where is the configuration used during startup on Cisco IOS devices located?

Select one:
a. Terminal emulator
b. NVRAM
c. Startup config

d. Running config
Feedback

Your answer is correct.


The correct answer is: Startup config

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Why would a network administrator use the CLI of the Cisco IOS?

Select one:
a. to add a password to a Cisco network device
b. to provide automatic (unmanned) management of Cisco network devices
c. to monitor the number of times a device has been powered on and of

d. to test the performance on a particular LAN


Feedback

Your answer is correct.


The correct answer is: to add a password to a Cisco network device

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which technology would be best to provide a home user with a highspeed, always-
on Internet connection?

Select one:
a. Cellular
b. Dial-up
c. Satellite

d. DSL
Feedback

Your answer is correct.


The correct answer is: DSL

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
During a routine inspection, a technician discovered that software that was installed
on a computer was secretly collecting data about websites that were visited by users
of the computer. Which type of threat is affecting this computer?

Select one:
a. identity theft
b. DoS attack
c. zero – day attack

d. spyware
Feedback

Your answer is correct.


The correct answer is: spyware

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

To save time, IOS commands may be partially entered and then completed by
typing which key or key combination?

Select one:
a. Right Arrow
b. Up Arrow
c. Tab
d. Ctrl-N
e. Ctrl-P

f. Down Arrow
Feedback

Your answer is correct.


The correct answer is: Tab

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a wiki?

Select one:
a. a web page that groups of people can edit and review
b. an online meeting
c. a personal journal that is posted on the internet

d. an audio-based medium that is used to deliver information to a wide audience


Feedback

Your answer is correct.


The correct answer is: a web page that groups of people can edit and review

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which type of traffic must receive the highest priority from QoS?

Select one:
a. VoIP
b. Web traffic
c. Email
d. Order processing
Feedback

Your answer is correct.


The correct answer is: VoIP

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a converged network?

Select one:
a. A network that makes use of both wired and wireless technology
b. A network that makes use of both wired and wireless technology
c. A network that makes use of both fiber-optic and copper connections

d. A network where voice, video, and data move over the same infrastructure
Feedback

Your answer is correct.


The correct answer is: A network where voice, video, and data move over the same
infrastructure

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Why would a technician enter the command copy startup-config running config?

Select one:
a. to save an active configuration to NVRAM
b. to make a changed configuration the new startup configuration
c. to remove all configuration from the switch

d. to copy an existing configuration into RAM


Feedback

Your answer is correct.


The correct answer is: to copy an existing configuration into RAM

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which devices would be considered end devices on a network? (Choose four.)

Select one or more:


a. Tablet computer
b. IP phone
c. Switch
d. Wireless access point
e. Server

f. Printer
Feedback

Your answer is correct.


The correct answers are: Printer, IP phone, Server, Tablet computer

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A technician configures a switch with these commands:


SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:
a. SVI
b. password encryption
c. Telnet access

d. physical switchport access


Feedback

Your answer is correct.


The correct answer is: SVI

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What are
AnAnswer is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees
of the organization, or others with authorization.
Feedback

The correct answer is: Intranet

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text

In which scenario would the use of a WISP be recommended

Select one:
a. an apartment in a building with cable access to the Internet

b. an Internet cafe in a city


c. any home with multiple wireless devices

d. a farm in rural area without wired broadband access


Feedback

Your answer is correct.


The correct answer is: a farm in rural area without wired broadband access

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is initially entered at the CLI of the Cisco IOS when typing a command
sequence?
Select one:
a. Command
b. Argument
c. A space

d. Keyword
Feedback

Your answer is correct.


The correct answer is: Command

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text

A data center has recently updated a physical server to host multiple operating
systems on a single CPU. The data center can now provide each customer with a
separate web server without having to allocate an actual discrete server for each
customer. What is the network trend that is being implemented by the data center
in this situation?

Select one:
a. maintaining communication integrity
b. virtualization
c. BYOD

d. online collaboration
Feedback

Your answer is correct.


The correct answer is: virtualization

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What are two benefits of collaboration and video-on-demand applications? (Choose


two.)

Select one or more:


a. providing faster, more secure business communications
b. providing better social media opportunities
c. ensuring a more reliable network
d. providing a richer e-learning environment
e. providing data storage and retrieval to a business

f. providing a richer e-learning environment


Feedback

Your answer is correct.


The correct answers are: providing a richer e-learning environment, providing better
social media opportunities

Question 24
Partially correct
Mark 0.50 out of 1.00

Flag question

Question text

Which of the following are disadvantages of peer-to-peer networking? (Choose


two.)

Select one or more:


a. Scalability
b. Expensive to set up and maintain
c. No centralized administration

d. Complex configuration
Feedback

Your answer is partially correct.


You have correctly selected 1.
The correct answers are: No centralized administration, Scalability

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What type of information would be found on a logical topology diagram?

Select one:
a. Location of departmental printer
b. Length and type of all cable runs
c. IP addressing scheme

d. Location of departmental switch


Feedback

Your answer is correct.


The correct answer is: IP addressing scheme

Question 26
Correct
Mark 1.00 out of 1.00

Flag question
Question text

What command will display a list of keywords available for viewing the status of an
IOS switch?

Select one:
a. Switch# help
b. Switch# show?
c. Switch# status?

d. Switch# sh?
Feedback

Your answer is correct.


The correct answer is: Switch# show?

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text

In which scenario would the use of a WISP be recommended?

Select one:
a. an Internet cafe in a city
b. a farm in a rural area without wired broadband access
c. any home with multiple wireless devices

d. an apartment in a building with cable access to the Internet


Feedback

Your answer is correct.


The correct answer is: a farm in a rural area without wired broadband access

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text

When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS


device using the CLI, what will be returned in the CLI?

Select one:
a. % Invalid input detected
b. EaSt-2+56(config)#
c. EaSt-58(config)#
d. Switch(config)#
e. Switch EaSt-2+56(config)#

f. East-2+56(config)#
Feedback

Your answer is correct.


The correct answer is: EaSt-2+56(config)#

Question 29
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What is a network infrastructure that provides access to other networks over a wide
geographic area?

Select one:
a. LAN
b. MAN
c. SAN
d. WLAN

e. WAN
Feedback

Your answer is incorrect.


The correct answer is: SAN

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the primary defense against unauthorized remote access to network


devices?

Select one:
a. Configuring an IP address
b. Configuring a console password
c. Configuring a VTY password

d. Configuring a default gateway


Feedback

Your answer is correct.


The correct answer is: Configuring a VTY password

Question 31
Correct
Mark 1.00 out of 1.00

Flag question
Question text

What is the Cisco IOS?

Select one:
a. The operating system for the Cisco network device
b. The memory for the Cisco network device
c. The configuration for the Cisco network device

d. The CPU for the Cisco network device


Feedback

Your answer is correct.


The correct answer is: The operating system for the Cisco network device

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which device acts as gateway to allow hosts to send traffic to remote IP networks? 1

Select one:
a. DHCP server
b. local router
c. DNS server

d. local switch
Feedback

Your answer is correct.


The correct answer is: local router

Question 33
Correct
1
Mark 1.00 out of 1.00

Flag question

Question text

What are the primary requirements of information security? (Choose three.)

Select one or more:


a. Integrity
b. Scalability
c. Availability
d. Confidentiality

e. QoS
Feedback

Your answer is correct.


The correct answers are: Confidentiality, Integrity, Availability

Question 34
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which statement describes a network that supports QoS?

Select one:
a. The network provides predictable levels of service to different types of traffic
b. The fewest possible devices are affected by a failure
c. The network should be able to expand to keep up with user demand

d. Data sent over the network is not altered in transmission


Feedback

Your answer is correct.


The correct answer is: The network provides predictable levels of service to different
types of traffic

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What type of connection to a Cisco IOS switch is used to make the initial
configuration?

Select one:
a. Web interface
b. AUX port
c. SSH
d. Console port

e. Telnet
Feedback

Your answer is correct.


The correct answer is: Console port

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which type of network design combines voice, video, and data on the same
communication channel?

Select one:
a. an extranet
b. a converged network
c. a traditional network

d. a storage area network


Feedback

Your answer is correct.


The correct answer is: a converged network

Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is a group of web pages that groups of individuals can edit and view together
called?

Select one:
a. Access point
b. Wiki
c. Weblog (blog)
d. Podcasting
e. TelePresence endpoint

f. Instant messaging
Feedback

Your answer is correct.


The correct answer is: Wiki
Question 38
Correct
Mark 1.00 out of 1.00

Flag question

Question text

For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)

Select one or more:


a. it can rapidly adapt to the failure of network devices and communication links
b. Data packets can travel through the network using multiple different paths
c. it allows for billing of network use by the amount of time a connection is
established
d. It requires that a data circuit between the source and destination be established
before data can be transferred.

e. Network devices dynamically decide on the best available path to forward each
packet.
Feedback

Your answer is correct.


The correct answers are: it can rapidly adapt to the failure of network devices and
communication links, Data packets can travel through the network using multiple
different paths, Network devices dynamically decide on the best available path to
forward each packet.

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which statement describes a feature of an IOS host name configuration?

Select one:
a. Its maximum length is 255 characters.
b. It does not allow spaces
c. It must be registered with a DNS server

d. It cannot start with a number


Feedback

Your answer is correct.


The correct answer is: It does not allow spaces

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text

The farther you are from the central office when utilizing a DSL connection,
slow er
theAnswer
the connection speed

Feedback

The correct answer is: slower

Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which of the following elements do both human and computer communication
systems have in common? (Choose three.)

Select one or more:


a. Keyboard
b. Channel
c. Default gateway
d. Receiver

e. Source
Feedback

Your answer is correct.


The correct answers are: Source, Channel, Receiver

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP
reference model? (Choose two.)

Select one or more:


a. UDP
b. TCP
c. DNS
d. HTTP

e. FTP
Feedback

Your answer is correct.


The correct answers are: TCP, UDP
Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of protocols in data communications?

Select one:
a. specifying the bandwidth of the channel or medium for each type of
communication
b. determining the electronic specifications to enable the communication
c. specifying the device operating systems that will support the communication

d. providing the rules required for a specific type of communication to occur


Feedback

Your answer is correct.


The correct answer is: providing the rules required for a specific type of
communication to occur

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following OSI model layers have the same functionality as the network
access layer in the TCP/IP model? (Choose two.)

Select one or more:


a. Data link
b. Physical
c. Session
d. Presentation
e. Transport
f. Network

g. Application
Feedback

Your answer is correct.


The correct answers are: Physical, Data link

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text

loopback
AAnswer address is defined as a reserved address that routes packets back
to the host

Feedback

The correct answer is: loopback

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is and advantage of using standards to develop and implement protocols?

Select one:
a. Products from different manufacturers can interoperate successfully
b. Standards provide flexibility for manufacturers to create devices that comply with
unique requirements
c. Different manufacturers are free to apply different requirements when
implementing a protocol

d. A particular protocol can be implemented by one manufacturer


Feedback

Your answer is correct.


The correct answer is: Products from different manufacturers can interoperate
successfully

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What three functions are defined by network protocols to allow communication


between known source and destination IP addresses? (Choose three.)

Select one or more:


a. data encoding
b. connector specifications
c. media selection
d. delivery options
e. end-device installation

f. message size
Feedback

Your answer is correct.


The correct answers are: data encoding, message size, delivery options
Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the name given to a one-to-many message delivery option?

Select one:
a. Broadcast
b. Manycast
c. Multicast

d. Unicast
Feedback

Your answer is correct.


The correct answer is: Multicast

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text

light
In fiber optic meda, the signals are represented as patterns ofAnswer .

Feedback

The correct answer is: light

Question 10
Correct
Mark 1.00 out of 1.00
Flag question

Question text

What happens when two devices on the same subnet are communicating?

Select one:
a. The data link layer addresses are added to the IP header
b. The frame will be sent to the default gateway for delivery to the receiving device
c. The host portion of the IP addresses will be different

d. The sending device will use ARP to determine the IP address of the receiver
Feedback

Your answer is correct.


The correct answer is: The host portion of the IP addresses will be different

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which application layer protocol allows users on one network to reliably transfer
files to and from a host on another network?

Select one:
a. FTP
b. HTTP
c. TFTP
d. IMAP

e. DHCP
Feedback

Your answer is correct.


The correct answer is: FTP

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What organization is responsible for the overall management and development of


Internet standards?

Select one:
a. IRTF
b. IAB
c. IETF
d. ISO

e. IEEE
Feedback

Your answer is correct.


The correct answer is: IAB

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What happens to frames that are too long or too short for the channel used?
Select one:
a. They are dropped.
b. They are delivered but much slower than proper-size frames.
c. They clog the network and block the delivery of other frames.
d. They are broken up into smaller pieces.

e. They are returned to the sender.


Feedback

Your answer is correct.


The correct answer is: They are dropped.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which two statements are true of the deterministic access method?(Choose two.)

Select one or more:


a. Each device has to transmit before passing the token to the next device
b. It is a very efficient method because there are no collisions

c. The order of transmission is dictated by the node that asks first for the token
d. Devices take turns transmitting

e. The throughput is predictable


Feedback

Your answer is correct.


The correct answers are: The throughput is predictable, Devices take turns
transmitting
Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which two statements are true regarding the user EXEC mode? (Choose two.)

Select one or more:


a. Only some aspects of the router configuration can be viewed
b. All router commands are available
c. Interfaces and routing protocols can be configured
d. Global configuration mode can be accessed by entering the enable command

e. This is the default mode on an unconfigured router when first powered up.
Feedback

Your answer is correct.


The correct answers are: This is the default mode on an unconfigured router when
first powered up., Only some aspects of the router configuration can be viewed

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which OSI reference model layer is responsible for common representation of the
data transferred between application layer services?

Select one:
a. Network
b. Transport
c. Data link
d. Presentation
e. Physical
f. Session

g. Application
Feedback

Your answer is correct.


The correct answer is: Presentation

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which is a function of the Logical Link Control (LLC) sublayer?

Select one:
a. to identify which network layer protocol is being used
b. to accept segments and package them into data units that are called packets
c. to define the media access processes that are performed by the hardware

d. to provide data link layer addressing


Feedback

Your answer is correct.


The correct answer is: to identify which network layer protocol is being used

Question 18
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which organization is responsible for developing communications standards for


Voice over IP (VoIP) devices?

Select one:
a. The Internet Corporation for Assigned Names and Numbers (ICANN)
b. The International Telecommunications Union-Telecommunications
Standardization Sector (ITU-T)
c. The Telecommunications Industry Association (TIA)

d. The Electronics Industry Alliance (EIA)


Feedback

Your answer is correct.


The correct answer is: The Telecommunications Industry Association (TIA)

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which message timing factor impacts how much information can be sent and the
speed at which it can be delivered?

Select one:
a. Flow control
b. Access method
c. Response timeout
d. Delay speed
Feedback

Your answer is correct.


The correct answer is: Flow control

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which organization develops the 802 family of standard for wired and wireless LANs
and MANs?

Select one:
a. ISO
b. ISOC
c. IEEE
d. ITU-T

e. IANA
Feedback

Your answer is correct.


The correct answer is: IEEE

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
What name is given to a group of interrelated protocols necessary to perform a
communication function?

Select one:
a. Protocol stack
b. Protocol suite
c. Functional protocol

d. Functional collection
Feedback

Your answer is correct.


The correct answer is: Protocol suite

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What will a network administrator use to modify a configuration on a Cisco router?

Select one:
a. the Windows command prompt
b. a DHCP server
c. a control panel

d. Windows Explorer

e. IOS
Feedback

Your answer is correct.


The correct answer is: IOS
Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following are examples of proprietary protocols? (Choose two.)

Select one or more:


a. ISO
b. TCP/IP
c. AppleTalk

d. Novell NetWare
Feedback

Your answer is correct.


The correct answers are: AppleTalk, Novell NetWare

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which two message timing mechanisms are used in data communication? (Choose
two.)

Select one or more:


a. flow control
b. encapsulation
c. formatting
d. encoding

e. response timeout
Feedback

Your answer is correct.


The correct answers are: response timeout, flow control

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which two factors influence the method that is used for media access control?
(Choose two.)

Select one or more:


a. how nodes share the media
b. how connection between nodes appears to the data link layer
c. how signals are encoded by the NICs on end devices
d. how data is generated by end devices applications

e. how the IP protocol forwards the packet to the destination


Feedback

Your answer is correct.


The correct answers are: how connection between nodes appears to the data link
layer, how nodes share the media

Question 26
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which statement is correct about network protocols?

Select one:
a. They all function in the network access layer of TCP/IP
b. Network protocols define the type of hardware that is used and how it is
mounted in racks
c. They are only required for exchange of message between devices on remote
network

d. They define how messages are exchanged between the sources and the
destination
Feedback

Your answer is correct.


The correct answer is: They define how messages are exchanged between the
sources and the destination

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which TCP/IP model layer is responsible for providing the best path through the
network?

Select one:
a. Application
b. Network Access
c. Internet

d. Transport
Feedback

Your answer is correct.


The correct answer is: Internet

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which two components are added to the PDU at the network access layer? (Choose
two.)

Select one or more:


a. IP header
b. Trailer
c. frame header
d. HTTP header

e. TCP header
Feedback

Your answer is correct.


The correct answers are: Trailer, frame header

Question 29
Correct
Mark 1.00 out of 1.00

Flag question
Question text

What is an advantage of using standards to develop and implement protocols?

Select one:
a. A particular protocol can only be implemented by one manufacturer
b. Products from different manufacturers can interoperate successfully
c. Standard provide flexibility for manufacturers to create devices that comply with
unique requirements

d. Different manufacturers are free to apply different requirements when


implementing a protocol
Feedback

Your answer is correct.


The correct answer is: Products from different manufacturers can interoperate
successfully

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What command will prevent all unencrypted passwords from displaying in plain text
in a configuration file?

Select one:
a. (config) # enable secret Secret_Password
b. (config)# enable password secret
c. (config-line) # password secret
d. (config) # enable secret Encrypted_Password

e. (config) # service password-encryption


Feedback
Your answer is correct.
The correct answer is: (config) # service password-encryption

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What type of protocol describes communication over a data link and the physical
transmission of data on the network media?

Select one:
a. Internet protocol
b. Application protocol
c. Network access protocol

d. Transport protocol
Feedback

Your answer is correct.


The correct answer is: Network access protocol

Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which organization is responsible for the standard that defines Media Access
Control for wired Ethernet?

Select one:
a. IAB
b. IETF
c. ISO
d. ISOC

e. IEEE
Feedback

Your answer is correct.


The correct answer is: IEEE

Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which logical address is used for delivery of data to a remote network?

Select one:
a. destination MAC address
b. source MAC address
c. destination port number
d. source IP address

e. destination IP address
Feedback

Your answer is correct.


The correct answer is: destination IP address

Question 34
Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the transport layer PDU?

Select one:
a. Bit
b. Data
c. Packet
d. Frame

e. Segment
Feedback

Your answer is correct.


The correct answer is: Segment

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which message delivery option is used when all devices need to receive the same
message simultaneously?

Select one:
a. unicast
b. broadcast
c. multicast

d. duplex
Feedback

Your answer is correct.


The correct answer is: broadcast

Question 1
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which logical address is used for delivery of data to a remote network?


Select one:

a. destination MAC address

b. destination IP address

c. source IP address

d. source MAC address

e. destination IP address

Feedback

Your answer is incorrect.

The correct answer is: destination IP address

Question 2
Correct

Mark 1.00 out of 1.00


Flag question

Question text

A data center has recently updated a physical server to host multiple operating
systems on a single CPU. The data center can now provide each customer with a
separate web server without having to allocate an actual discrete server for each
customer. What is the network trend that is being implemented by the data center
in this situation?

Select one:

a. maintaining communication integrity

b. online collaboration

c. BYOD

d. virtualization

Feedback

Your answer is correct.

The correct answer is: virtualization

Question 3
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What are two functions of end devices on a network? (Choose two.)


Select one or more:
a. They filter the flow of data to enhance security

b. They originate the data that flows through the network.

c. They direct data over alternate paths in the event of link failures.

d. They provide the channel over which the network message travels.

e. They are the interface between humans and the communication network.

Feedback

Your answer is correct.

The correct answers are: They originate the data that flows through the network.,
They are the interface between humans and the communication network.

Question 4
Correct

Mark 1.00 out of 1.00

Flag question

Question text

An administrator has just changed the IP address of an interface on an IOS device.


What else must be done in order to apply those changes to the device?
Select one:

a. Copy the information in the startup configuration file to the running


configuration

b. Reload the device and type yes when prompted to save the configuration

c. Nothing must be done. Changes to the configuration on an IOS device take effect
as soon as the command is typed correctly and the Enter key has been pressed.

d. Copy the running configuration to the startup configuration file.


Feedback

Your answer is correct.

The correct answer is: Nothing must be done. Changes to the configuration on an
IOS device take effect as soon as the command is typed correctly and the Enter key
has been pressed.

Question 5
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A web client is sending a request for a webpage to a web server. From the
perspective of the client, what is the correct order of the protocol stack that is used
to prepare the request for transmission?
Select one:

a. Ethernet, TCP, IP, HTTP

b. HTTP, IP, TCP, Ethernet

c. Ethernet, IP, TCP, HTTP

d. HTTP, TCP, IP, Ethernet

Feedback

Your answer is correct.

The correct answer is: HTTP, TCP, IP, Ethernet

Question 6
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which device acts as gateway to allow hosts to send traffic to remote IP networks?
Select one:

a. local switch

b. DHCP server

c. local router

d. DNS server

Feedback

Your answer is correct.

The correct answer is: local router

Question 7
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which area of the network would a college IT staff most likely have to redesign as a
direct result of many students bringing their own tablets and smartphones to school
to access school resources?
Select one:

a. wireless WAN
b. extranet

c. wireless LAN

d. intranet

e. wired LAN

Feedback

Your answer is correct.

The correct answer is: wireless LAN

Question 8
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What are two benefits of collaboration and video-on-demand applications? (Choose


two.)
Select one or more:

a. providing faster, more secure business communications

b. providing a richer e-learning environment

c. providing better social media opportunities

d. ensuring a more reliable network

e. providing data storage and retrieval to a business

Feedback

Your answer is correct.


The correct answers are: providing a richer e-learning environment, providing better
social media opportunities

Question 9
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What command will prevent all unencrypted passwords from displaying in plain text
in a configuration file?
Select one:

a. (config) # service password-encryption

b. (config-line) # password secret

c. (config)# enable password secret

d. (config) # enable secret Encrypted_Password

e. (config) # enable secret Secret_Password

Feedback

Your answer is correct.

The correct answer is: (config) # service password-encryption

Question 10
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which PDU is processed when a host computer is de-encapsulating a message at


the transport layer of the TCP/IP model?
Select one:

a. frame

b. segment

c. bits

d. packet

Feedback

Your answer is correct.

The correct answer is: segment

Question 11
Partially correct

Mark 0.50 out of 1.00

Flag question

Question text
Which two Internet connection options do not require that physical cables be run to
the building? (Choose two.)
Select one or more:

a. dedicated leased line

b. satellite

c. cellular

d. DSL

e. dialup

Feedback

Your answer is partially correct.

You have correctly selected 1.

The correct answers are: cellular

, satellite

Question 12
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of protocols in data communications?


Select one:
a. specifying the bandwidth of the channel or medium for each type of
communication

b. providing the rules required for a specific type of communication to occur

c. determining the electronic specifications to enable the communication

d. specifying the device operating systems that will support the communication

Feedback

Your answer is correct.

The correct answer is: providing the rules required for a specific type of
communication to occur

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is a characteristic of a contention-based access method?


Select one:

a. It scales very well under heavy media use

b. It processes more overhead than the controlled access methods do

c. It is as nondeterministic method

d. It has has mechanisms to the turns devices take to access the media

Feedback

Your answer is correct.


The correct answer is: It is as nondeterministic method

Question 14
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is a characteristic of a WAN hub-and-spoke topology?


Select one:

a. It requires that some of the branch sites be interconnected through point-to-


point links

b. The branch sites are connected to a central site through point-point links

c. it requires that every site be interconnected to each other through point to-point
links

d. All sites require a hub device that connects to a router

Feedback

Your answer is correct.

The correct answer is: The branch sites are connected to a central site through
point-point links

Question 15
Correct

Mark 1.00 out of 1.00

Flag question
Question text

Which two statements are true regarding the user EXEC mode? (Choose two.)
Select one or more:

a. Interfaces and routing protocols can be configured

b. Global configuration mode can be accessed by entering the enable command

c. This is the default mode on an unconfigured router when first powered up.

d. Only some aspects of the router configuration can be viewed

e. All router commands are available

Feedback

Your answer is correct.

The correct answers are: This is the default mode on an unconfigured router when
first powered up., Only some aspects of the router configuration can be viewed

Question 16
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What two criteria are used to help select a network medium from various network
media? (Choose two.)
Select one or more:

a. the cost of the end devices utilized in the network

b. the environment where the selected medium is to be installed

c. the distance the selected medium can successfully carry a signal


d. the types of data that need to be prioritized

e. the number of intermediary devices installed in the network

Feedback

Your answer is correct.

The correct answers are: the distance the selected medium can successfully carry a
signal, the environment where the selected medium is to be installed

Question 17
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement describes a feature of an IOS host name configuration?


Select one:

a. It must be registered with a DNS server

b. It cannot start with a number

c. Its maximum length is 255 characters.

d. It does not allow spaces

Feedback

Your answer is correct.

The correct answer is: It does not allow spaces

Question 18
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which statement describes a network that supports QoS?


Select one:

a. The network should be able to expand to keep up with user demand

b. The network provides predictable levels of service to different types of traffic

c. Data sent over the network is not altered in transmission

d. The fewest possible devices are affected by a failure

Feedback

Your answer is correct.

The correct answer is: The network provides predictable levels of service to different
types of traffic

Question 19
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is a wiki?
Select one:

a. an audio-based medium that is used to deliver information to a wide audience


b. a personal journal that is posted on the internet

c. an online meeting

d. a web page that groups of people can edit and review

Feedback

Your answer is correct.

The correct answer is: a web page that groups of people can edit and review

Question 20
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What process is used to place one message inside another message for transfer
from the source to the destination?
Select one:

a. encapsulation

b. access control

c. decoding

d. flow control

Feedback
Your answer is correct.

The correct answer is: encapsulation

Question 21
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement is correct about network protocols?


Select one:

a. Network protocols define the type of hardware that is used and how it is
mounted in racks.

b. They are only required for exchange of messages between devices on remote
networks.

c. They all function in the network access layer of TCP/IP.

d. They define how messages are exchanged between the source and the
destination.

Feedback

Your answer is correct.

The correct answer is: They define how messages are exchanged between the source
and the destination.

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Why would a technician enter the command copy startup-config running config?
Select one:

a. to save an active configuration to NVRAM

b. to copy an existing configuration into RAM

c. to make a changed configuration the new startup configuration

d. to remove all configuration from the switch

Feedback

Your answer is correct.

The correct answer is: to copy an existing configuration into RAM

Question 23
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is an advantage of using standards to develop and implement protocols?


Select one:

a. Products from different manufacturers can interoperate successfully


b. Different manufacturers are free to apply different requirements when
implementing a protocol

c. Standard provide flexibility for manufacturers to create devices that comply with
unique requirements

d. A particular protocol can only be implemented by one manufacturer

Feedback

Your answer is correct.

The correct answer is: Products from different manufacturers can interoperate
successfully

Question 24
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why would a network administrator use the CLI of the Cisco IOS?
Select one:

a. to add a password to a Cisco network device

b. to test the performance on a particular LAN

c. to provide automatic (unmanned) management of Cisco network devices

d. to monitor the number of times a device has been powered on and off

Feedback

Your answer is correct.


The correct answer is: to add a password to a Cisco network device

Question 25
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A network administer has forgotten the argument of an IOS command. How would
the administrator get help from the IOS CLI to complete the command correctly?
Select one:

a. Type help and press the Enter key at the prompt

b. Type the command and then press CTRL-C

c. Type the command and then press the Tab key

d. Type the command, type help, and press the Enter key.

e. Type the command and then press the? key

Feedback

Your answer is correct.

The correct answer is: Type the command and then press the? key

Question 26
Correct

Mark 1.00 out of 1.00

Flag question
Question text

loopback
AAnswer address is defined as a reserved address that routes packets back
to the host
Feedback

The correct answer is: loopback

Question 27
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A technician configures a switch with these commands:


SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

Select one:

a. physical switchport access

b. SVI

c. password encryption

d. Telnet access

Feedback

Your answer is correct.

The correct answer is: SVI


Question 28
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of the physical link control field in a data link layer header?
Select one:

a. to establish the media link

b. to indicate congestion in the media

c. to establish a logical connection between nodes

d. to start and stop traffic over the media

Feedback

Your answer is correct.

The correct answer is: to establish the media link

Question 29
Correct

Mark 1.00 out of 1.00

Flag question

Question text

An employee at a branch office is creating a quote for a customer. In order to do


this, the employee needs to access confidential pricing information from internal
servers at the Head Office. What type of network would the employee access?
Select one:

a. an intranet

b. the Internet

c. a local area network

d. an extranet

Feedback

Your answer is correct.

The correct answer is: an intranet

Question 30
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which device performs the function of determining the path that messages should
take through internet works?
Select one:

a. a web server

b. a firewall

c. a DSL modem

d. a router

Feedback

Your answer is correct.


The correct answer is: a router

Question 31
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two engineering organizations define open standards and protocols that
apply to the data link layer?
Select one:

a. International Organization for Standardization (ISO)

b. International Telecommunication Union (ITU)

c. Internet Society (ISOC)

d. Internet Assigned Numbers Authority (IANA)

e. Electronic Industries Alliance (EIA

Feedback

Your answer is correct.

The correct answer is: International Telecommunication Union (ITU)

Question 32
Correct

Mark 1.00 out of 1.00

Flag question
Question text

What type of communication will send a message to all devices on a local area
network?
Select one:

a. broadcast

b. multicast

c. unicast

d. allcast

Feedback

Your answer is correct.

The correct answer is: broadcast

Question 33
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two message timing mechanisms are used in data communication? (Choose
two.)
Select one or more:

a. formatting

b. encoding
c. response timeout

d. encapsulation

e. flow control

Feedback

Your answer is correct.

The correct answers are: response timeout, flow control

Question 34
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Scalable
AAnswer network is able to expand to accept new devices and applications
without affecting performance.
Feedback

The correct answer is: Scalable

Question 35
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement is correct about network protocols?


Select one:

a. Network protocols define the type of hardware that is used and how it is
mounted in racks

b. They define how messages are exchanged between the sources and the
destination

c. They all function in the network access layer of TCP/IP

d. They are only required for exchange of message between devices on remote
network

Feedback

Your answer is correct.

The correct answer is: They define how messages are exchanged between the
sources and the destination

Question 36
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the function of the kernel of an operating software?


Select one:

a. The kernel provisions hardware resources to meet software requirements.

b. The kernel links the hardware drivers with the underlying electronics of a
computer.
c. It provides a user interface that allows users to request a specific task.

d. It is an application that allows the initial configuration of a Cisco device.

Feedback

Your answer is correct.

The correct answer is: The kernel provisions hardware resources to meet software
requirements.

Question 37
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which term describes the state of a network when the demand on the network
resources exceeds the available capacity?
Select one:

a. congestion

b. synchronization

c. convergence

d. optimization

Feedback

Your answer is correct.

The correct answer is: congestion


Question 38
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which is a function of the Logical Link Control (LLC) sublayer?


Select one:

a. to define the media access processes that are performed by the hardware

b. to identify which network layer protocol is being used

c. to provide data link layer addressing

d. to accept segments and package them into data units that are called packets

Feedback

Your answer is correct.

The correct answer is: to identify which network layer protocol is being used

Question 39
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What three functions are defined by network protocols to allow communication


between known source and destination IP addresses? (Choose three.)
Select one or more:

a. media selection

b. data encoding

c. end-device installation

d. connector specifications

e. delivery options

f. message size

Feedback

Your answer is correct.

The correct answers are: data encoding, message size, delivery options

Question 40
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two connection options provide an always-on, high-bandwidth Internet


connection to computers in a home office? (Choose two.)
Select one or more:

a. cellular

b. cable

c. dial-up telephone
d.

satellite

e. DSL

Feedback

Your answer is correct.

The correct answers are: DSL, cable

Question 41
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which type of network design combines voice, video, and data on the same
communication channel?
Select one:

a. a storage area network

b. a traditional network

c. a converged network

d. an extranet

Feedback

Your answer is correct.

The correct answer is: a converged network

Question 42
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A network administrator needs to keep the user ID, password, and session contents
private when establishing remote CLI connectivity with a switch to manage it. Which
access method should be chosen?
Select one:

a. Console

b. Telnet

c. AUX

d. SSH

Feedback

Your answer is correct.

The correct answer is: SSH

Question 43
Correct

Mark 1.00 out of 1.00

Flag question
Question text

Which two statements describe intermediary devices? (Choose two.)


Select one or more:

a. Intermediary devices initiate the encapsulation process.

b. Intermediary devices generate data content.

c. Intermediary devices direct the path of the data.

d. Intermediary devices connect individual hosts to the network.

e. Intermediary devices alter data content.

Feedback

Your answer is correct.

The correct answers are: Intermediary devices direct the path of the data.,
Intermediary devices connect individual hosts to the network.

Question 44
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which organization develops the 802 family of standard for wired and wireless LANs
and MANs?
Select one:

a. ITU-T

b. IEEE

c. ISO
d. ISOC

e. IANA

Feedback

Your answer is correct.

The correct answer is: IEEE

Question 45
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Intranet
AnAnswer is a private connection of LANs and WANs that belongs to an
organization, and is designed to be accessible only by the members and employees
of the organization, or others with authorization.
Feedback

The correct answer is: Intranet

Question 46
Correct

Mark 1.00 out of 1.00

Flag question

Question text

For which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.)
Select one or more:

a. It requires that a data circuit between the source and destination be established
before data can be transferred.

b. Network devices dynamically decide on the best available path to forward each
packet.

c. it allows for billing of network use by the amount of time a connection is


established

d. Data packets can travel through the network using multiple different paths

e. it can rapidly adapt to the failure of network devices and communication links

Feedback

Your answer is correct.

The correct answers are: it can rapidly adapt to the failure of network devices and
communication links, Data packets can travel through the network using multiple
different paths, Network devices dynamically decide on the best available path to
forward each packet.

Question 47
Correct

Mark 1.00 out of 1.00

Flag question

Question text

To save time, IOS commands may be partially entered and then completed by
typing which key or key combination?
Select one:

a. Up Arrow

b. Right Arrow
c. Ctrl-P

d. Tab

e. Down Arrow

f. Ctrl-N

Feedback

Your answer is correct.

The correct answer is: Tab

Question 48
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two components are added to the PDU at the network access layer? (Choose
two.)
Select one or more:

a. HTTP header

b. Trailer

c. IP header

d. frame header

e. TCP header

Feedback

Your answer is correct.


The correct answers are: Trailer, frame header

Question 49
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which command or key combination allows a user to return to the previous level in
the command hierarchy?
Select one:

a. exit

b. Ctrl-Z

c. end

d. Ctrl-C

Feedback

Your answer is correct.

The correct answer is: exit

Question 50
Correct

Mark 1.00 out of 1.00


Flag question

Question text

A company is contemplating whether to use a client/server or a peer-to-peer


network. What are three characteristics of a peer-to-peer network? (Choose three.)
Select one or more:

a. better device performance when acting as both client and server

b. lacks centralized administration

c. scalable

d. less cost to implement

e.

easy to create

f.
better security

Feedback

Your answer is correct.

The correct answers are:

easy to create, lacks centralized administration, less cost to implement

Question 51
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which interface command must be entered in a Layer 3 switch before IPv4 address
can be assigned to the interface?
Select one:

a. ip classless

b. noshutdown

c. no switchport

d. switchport

Feedback

Your answer is correct.

The correct answer is: no switchport

Question 52
Correct

Mark 1.00 out of 1.00

Flag question

Question text

A router has a valid operating system and a configuration file stored in NVRAM. The
configuration file contains an enable secret password but no console password.
When the router boots up, which mode will display?
Select one:

a. setup mode

b. global configuration mode

c. privileged EXEC mode

d. user EXEC mode

Feedback

Your answer is correct.

The correct answer is: user EXEC mode

Question 53
Correct

Mark 1.00 out of 1.00

Flag question

Question text

light
In fiber optic meda, the signals are represented as patterns ofAnswer .
Feedback

The correct answer is: light

Question 54
Correct

Mark 1.00 out of 1.00

Flag question
Question text

What is encrypted with the enable secret command?


Select one:

a. the privileged executive mode password

b. the consoled line password

c. the VTY line password

d. all configured passwords

Feedback

Your answer is correct.

The correct answer is: the privileged executive mode password

Question 55
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What happens when two devices on the same subnet are communicating?
Select one:

a. The host portion of the IP addresses will be different

b. The sending device will use ARP to determine the IP address of the receiver

c. The data link layer addresses are added to the IP header

d. The frame will be sent to the default gateway for delivery to the receiving device

Feedback
Your answer is correct.

The correct answer is: The host portion of the IP addresses will be different

Question 56
Correct

Mark 1.00 out of 1.00

Flag question

Question text

When is a wired connection preffered to a wireless connection by an end-user


device?
Select one:

a. when the end-user device is within range of a wireless signal

b. when the end-user device only has a WLAN NIC

c. when the end-user device will run an application that is delay tolerant

d. when the end-user device will run an application that requires a dedicated
connection to the network

Feedback

Your answer is correct.

The correct answer is: when the end-user device will run an application that requires
a dedicated connection to the network

Question 57
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which procedure is used to access a Cisco 2960 switch when performing an initial
configuration in a secure environment?
Select one:

a. Use Telnet to remotely access the switch through the network.

b. Use the console port to locally access the switch from a serial or USB interface of
the PC.

c. Use the AUX port to locally access the switch from a serial or USB interface of the
PC

d. Use Secure Shell to remotely access the switch through the network.

Feedback

Your answer is correct.

The correct answer is: Use the console port to locally access the switch from a serial
or USB interface of the PC.

Question 58
Partially correct

Mark 0.50 out of 1.00

Flag question

Question text

Which two factors influence the method that is used for media access control?
(Choose two.)
Select one or more:

a. how signals are encoded by the NICs on end devices

b. how connection between nodes appears to the data link layer

c. how the IP protocol forwards the packet to the destination

d. how nodes share the media

e. how data is generated by end devices applications

Feedback

Your answer is partially correct.

You have correctly selected 1.

The correct answers are: how connection between nodes appears to the data link
layer, how nodes share the media

Question 59
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which two statements are true of the deterministic access method?(Choose two.)
Select one or more:

a. The order of transmission is dictated by the node that asks first for the token

b. Each device has to transmit before passing the token to the next device

c. It is a very efficient method because there are no collisions

d. Devices take turns transmitting


e. The throughput is predictable

Feedback

Your answer is correct.

The correct answers are: The throughput is predictable, Devices take turns
transmitting

Question 60
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What type of delivery uses data link layer addresses?


Select one:

a. remote delivery

b. local delivery

c. remote delivery using routers

d. local and remote delivery

Feedback

Your answer is correct.

The correct answer is: local delivery

Question 61
Correct

Mark 1.00 out of 1.00


Flag question

Question text

mac
The EthernetAnswer sublayer is responsible for communicating directly
with the physical layer.
Feedback

The correct answer is: mac

Question 62
Correct

Mark 1.00 out of 1.00

Flag question

Question text

An administrator measured the transfer of usable data across a 100 Mb/s physical
channel over a given period of time and obtained 60 Mb/s. Which kind of
measurement did the administrator obtain
Select one:

a. goodput

b. digital bandwidth

c. latency

d. throughput

Feedback

Your answer is correct.


The correct answer is: latency

Question 63
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What type of address is 01-00-5E-0A-00-02?


Select one:

a. an address that reaches every host inside a local subnet

b. an address that reaches a specific group of hosts

c. an address that reaches every host in the network

d. an address that reaches one specific host

Feedback

Your answer is correct.

The correct answer is: an address that reaches a specific group of hosts

Question 64
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The farther you are from the central office when utilizing a DSL connection,
slow er
theAnswer
the connection speed
Feedback

The correct answer is: slower

Question 65
Correct

Mark 1.00 out of 1.00

Flag question

Question text

In which scenario would the use of a WISP be recommended?


Select one:

a. an Internet cafe in a city

b. any home with multiple wireless devices

c. an apartment in a building with cable access to the Internet

d. a farm in a rural area without wired broadband access

Feedback

Your answer is correct.

The correct answer is: a farm in a rural area without wired broadband access

Question 66
Correct

Mark 1.00 out of 1.00


Flag question

Question text

What will a network administrator use to modify a configuration on a Cisco router?


Select one:

a.

the Windows command prompt

b. a DHCP server

c. a control panel

d. Windows Explorer

e. IOS

Feedback

Your answer is correct.

The correct answer is: IOS

Question 67
Correct

Mark 1.00 out of 1.00

Flag question

Question text
What method can be used by two computers to ensure that packets are not
dropped because too much data is being sent too quickly?
Select one:

a. flow control

b. encapsulation

c. access method

d. response timeout

Feedback

Your answer is correct.

The correct answer is: flow control

Question 68
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which statement describes a characteristic of the frame header fields of the data
link layer?
Select one:

a. They include information on user applications

b. They vary depending on protocols

c. Ethernet frame header fields contain Layer 3 source and destination addresses

d. They all include the flow control and logical connection fields
Feedback

Your answer is correct.

The correct answer is: They vary depending on protocols

Question 69
Correct

Mark 1.00 out of 1.00

Flag question

Question text

During a routine inspection, a technician discovered that software that was installed
on a computer was secretly collecting data about websites that were visited by users
of the computer. Which type of threat is affecting this computer
Select one:

a. identity theft

b. DoS attack

c. zero – day attack

d. spyware

Feedback

Your answer is correct.

The correct answer is: spyware

Question 70
Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which message delivery option is used when all devices need to receive the same
message simultaneously?
Select one:

a. duplex

b. broadcast

c. multicast

d. unicast

Feedback

Your answer is correct.

The correct answer is: broadcast

You might also like