A) extendednet B) extranet C) Internet D) intranet
A) dial-up B) DSL C) satellite D) cable modem E) cell modem
A) The administrator is already in global configuration mode. B) The entire command, configure terminal, must be used. C) The administrator must connect via the console port to access global configuration mode D) The administrator must first enter privileged EXEC mode before issuing the command.
A) Ctrl-Shift-X B) Ctrl-Shift-6 C) Ctrl-C D) Ctrl-Z
A) secretin B) linevtyin C) lineconin D) letmein
A) This command automatically encrypts passwords in configuration files that are currently stored in NVRAM. B) This command prevents someone from viewing the running configuration passwords. C) This command enables a strong encryption algorithm for the enable secret password command. D) This command encrypts passwords as they are transmitted across serial WAN links. E) This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.
A) The SVI provides a physical interface for remote access to the switch. B) The SVI adds Layer 4 connectivity between VLANs. C) The SVI provides a faster method for switching traffic between ports on the switch. D) The SVI provides a virtual interface for remote access to the switch
A) broadcast B) duplex C) unicast D) multicast
A) BOOTP B) ICMP, IP C) POP D) PPP
A) frame B) segment C) packet D) bits
A) It is tagged with information guaranteeing reliable delivery. B) It is encapsulated in a Layer 2 frame C) It is segmented into smaller individual pieces. D) It is encapsulated into a TCP segment.
A) microwave B) radio waves C) UTP D) fiber
A) crosstalk, electromagnetic interference B) signal modulation technique C) bandwidth D) size of the network
A) transport B) network access C) internet D) physical E) LLC,MAC
A) star B) hierarchical C) bus D) mesh E) ring
A) message encapsulation B) flow control C) access method D) message encoding
A) Layer 3 B) physical C) Layer 4 D) data link
A) a group address that shares the last 23 bits with the source IPv4 address B) a single IP multicast address that is used by all destinations in a group C) an IP address that is unique for each destination in the group D) a 48 bit address that is determined by the number of members in the multicast group
A) process the frame as it is B) drop the frame C) send an error message to the sending device D) add random data bytes to make the frame 1518 bytes long and then forward it
A) destination MAC address B) Ethernet type C) source MAC address D) destination IP address E) source IP address
A) It notifies the sending host that the frame cannot be delivered. B) It forwards the frame out of all ports except for the port at which the frame was received. C) It initiates an ARP request. D) It broadcasts the frame out of all ports on the switch.
A) If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. B) If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply C) If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment. D) When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses. E) An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and its multicast MAC address.
A) WINS B) DHCP C) DNS D) SMTP E) HTTP
A) user data segmentation B) connectionless C) reliable end-to-end delivery D) media dependent ![]()
A) 2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128 B) fe80::30d0:115:3f57:fe4c/128 C) ::1/128 D) fe80::/64
A) FLASH is nonvolatile and contains a limited portion of the IOS. B) ROM is nonvolatile and stores the running IOS. C) RAM is volatile and stores the IP routing table. D) NVRAM is nonvolatile and stores a full version of the IOS. E) ROM is nonvolatile and contains basic diagnostic software.
A) 169.254.0.0/16 B) 192.168.0.0/16 C) 172.16.0.0/12 D) 100.64.0.0/14 E) 10.0.0.0/8
A) 2001:DB8:0:AB:0:1234 B) 2001:DB8:0:AB::1234 C) 2001:DB8::AB00::1234 D) 2001:DB8:0:AB00::1234
A) unique local B) site local C) link-local D) global unicast
A) all IPv6 enabled devices on the local link B) all IPv6 enabled devices across the network C) all IPv6 configured routers on the local link D) all IPv6 DHCP servers
A) to ensure the delivery of an IP packet B) to provide feedback of IP packet transmissions C) to monitor the process of a domain name to IP address resolution D) to inform routers about network topology changes
A) It is primarily used to test connectivity between two hosts. B) It utilizes the ICMP Source Quench messages. C) It sends four Echo Request messages. D) It identifies the routers in the path from a source host to a destination host
A) 256 B) 32 C) 62 D) 64 E) 254 ![]()
A) 172.16.23.255 B) 172.16.20.255 C) 172.16.19.255 D) 172.16.255.255 E) 172.16.16.255
A) 10.1.1.128/28 10.1.1.144/28 10.1.1.160/28 B) 0.1.1.128/26 10.1.1.144/26 10.1.1.160/26 C) 10.1.1.128/28 10.1.1.140/28 10.1.1.158/26 D) 10.1.1.128/26 10.1.1.140/26 10.1.1.158/28 E) 10.1.1.128/28 10.1.1.144/28 10.1.1.160/29
A) 2001:db8:0:8000::/52 B) 2001:db8:0:f000::/52 C) 2001:db8:0:f00::/52 D) 2001:db8:0:f::/52
A) The data flow is being tracked based on the source IP address used by the PC of the technician. B) The data flow is being tracked based on the destination port number utilized by each application. C) The data flow is being tracked based on the destination IP address used by the PC of the technician D) The data flow is being tracked based on the source port number utilized by each application
A) flow control B) encryption of data C) error recovery D) connection establishment E) data representation
A) The part of the television transmission that was lost is re-sent. B) A delivery failure message is sent to the source host. C) The transmission continues without the missing portion. D) The entire transmission is re-sent.
A) transport B) internet C) presentation D) session E) network
A) transient B) master C) client D) slave E) server
A) local server address B) physical address of the recipient C) subnet mask D) default gateway address E) physical address of the sender
A) during off-peak hours B) during randomly selected times C) during employee holidays and weekends D) during times of peak utilization
A) discovery and mapping of systems B) unauthorized manipulation of data C) denying access to resources by legitimate users D) disabling network systems or services
A) All login attempts will be blocked for 90 seconds if there are 4 failed attempts within 150 seconds. B) All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds. C) All login attempts will be blocked for 1.5 hours if there are 4 failed attempts within 150 seconds. D) All login attempts will be blocked for 4 hours if there are 90 failed attempts within 150 seconds
A) The NIC in the PC is bad. B) The TCP/IP protocol is not enabled C) Nothing can be determined for sure at this point D) The router that is attached to the same network as the workstation is down.
A) Ctrl+Shift+6 B) Ctrl+x C) Ctrl+Esc D) Ctrl+c
A) The configuration files can be stored to a flash drive that uses any file system format. B) The transfer of the files does not rely on network connectivity. C) The files can be saved without using terminal emulation software. D) The USB flash drive is more secure. |