Quiz-summary
0 of 50 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
Information
Good luck!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 50 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Answered
- Review
-
Question 1 of 50
1. Question
1 pointsWhich term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
Correct
Incorrect
-
Question 2 of 50
2. Question
1 pointsA small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
Correct
Incorrect
-
Question 3 of 50
3. Question
1 pointsRefer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
Correct
Incorrect
-
Question 4 of 50
4. Question
1 pointsWhich keys act as a hot key combination that is used to interrupt an IOS process?
Correct
Incorrect
-
Question 5 of 50
5. Question
1 pointsRefer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?
Correct
Incorrect
-
Question 6 of 50
6. Question
1 pointsA network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
Correct
Incorrect
-
Question 7 of 50
7. Question
1 pointsWhat is the purpose of the SVI on a Cisco switch?
Correct
Incorrect
-
Question 8 of 50
8. Question
1 pointsWhich message delivery option is used when all devices need to receive the same message simultaneously?
Correct
Incorrect
-
Question 9 of 50
9. Question
1 pointsWhich two protocols function at the internet layer? (Choose two.)
Correct
Incorrect
-
Question 10 of 50
10. Question
1 pointsWhat PDU is associated with the transport layer?
Correct
Incorrect
-
Question 11 of 50
11. Question
1 pointsWhat is done to an IP packet before it is transmitted over the physical medium?
Correct
Incorrect
-
Question 12 of 50
12. Question
1 pointsWhat type of communication medium is used with a wireless LAN connection?
Correct
Incorrect
-
Question 13 of 50
13. Question
1 pointsIn addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)
Correct
Incorrect
-
Question 14 of 50
14. Question
1 pointsWhat are the two sublayers of the OSI model data link layer? (Choose two.)
Correct
Incorrect
-
Question 15 of 50
15. Question
1 pointsA technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
Correct
Incorrect
-
Question 16 of 50
16. Question
1 pointsIf data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?
Correct
Incorrect
-
Question 17 of 50
17. Question
1 pointsWhat best describes the destination IPv4 address that is used by multicasting?
Correct
Incorrect
-
Question 18 of 50
18. Question
1 pointsIn an Ethernet network, when a device receives a frame of 1200 bytes, what will it do?
Correct
Incorrect
-
Question 19 of 50
19. Question
1 pointsWhat important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?
Correct
Incorrect
-
Question 20 of 50
20. Question
1 pointsWhat will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
Correct
Incorrect
-
Question 21 of 50
21. Question
1 pointsWhat are two features of ARP? (Choose two.)
Correct
Incorrect
-
Question 22 of 50
22. Question
1 pointsWhich two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names? (Choose two.)
Correct
Incorrect
-
Question 23 of 50
23. Question
1 pointsWhat is a basic characteristic of the IP protocol?
Correct
Incorrect
-
Question 24 of 50
24. Question
1 pointsRefer to the exhibit. A user issues the command netstat –r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?
Correct
Incorrect
-
Question 25 of 50
25. Question
1 pointsWhich two statements correctly describe a router memory type and its contents? (Choose two.)
Correct
Incorrect
-
Question 26 of 50
26. Question
1 pointsWhat three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)
Correct
Incorrect
-
Question 27 of 50
27. Question
1 pointsWhat is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?
Correct
Incorrect
-
Question 28 of 50
28. Question
1 pointsAt a minimum, which address is required on IPv6-enabled interfaces?
Correct
Incorrect
-
Question 29 of 50
29. Question
1 pointsAn IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?
Correct
Incorrect
-
Question 30 of 50
30. Question
1 pointsWhat is the purpose of ICMP messages?
Correct
Incorrect
-
Question 31 of 50
31. Question
1 pointsWhich statement describes a characteristic of the traceroute utility?
Correct
Incorrect
-
Question 32 of 50
32. Question
1 pointsWhat is the usable number of host IP addresses on a network that has a /26 mask?
Correct
Incorrect
-
Question 33 of 50
33. Question
1 pointsRefer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22?
Correct
Incorrect
-
Question 34 of 50
34. Question
1 pointsA network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts?
Correct
Incorrect
-
Question 35 of 50
35. Question
1 pointsGiven IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?
Correct
Incorrect
-
Question 36 of 50
36. Question
1 pointsA technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?
Correct
Incorrect
-
Question 37 of 50
37. Question
1 pointsWhat three services are provided by the transport layer? (Choose three.)
Correct
Incorrect
-
Question 38 of 50
38. Question
1 pointsAn Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination?
Correct
Incorrect
-
Question 39 of 50
39. Question
1 pointsWhich two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two.)
Correct
Incorrect
-
Question 40 of 50
40. Question
1 pointsAn author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
Correct
Incorrect
-
Question 41 of 50
41. Question
1 pointsWhich two automatic addressing assignments are supported by DHCP? (Choose two.)
Correct
Incorrect
-
Question 42 of 50
42. Question
1 pointsWhen a network administrator is trying to manage network traffic on a growing network, when should traffic flow patterns be analyzed?
Correct
Incorrect
-
Question 43 of 50
43. Question
1 pointsWhat is the objective of a network reconnaissance attack?
Correct
Incorrect
-
Question 44 of 50
44. Question
1 pointsWhat will be the result of failed login attempts if the following command is entered into a router?
Correct
Incorrect
-
Question 45 of 50
45. Question
1 pointsA user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?
Correct
Incorrect
-
Question 46 of 50
46. Question
1 pointsFor Cisco IOS, which escape sequence allows terminating a traceroute operation?
Correct
Incorrect
-
Question 47 of 50
47. Question
1 pointsMatch the requirements of a reliable network with the supporting network architecture. (Not all options are used.)
Sort elements
- Protect the network from unauthorized access.
- Provide redundant links and devices
- Expand the network without degrading the service for existing users.
- Match the type of communication with a specific priority
- Ensure that streaming data is provided over high speed links
-
security
-
fault tolerance
-
scalability
Correct
Incorrect
-
Question 48 of 50
48. Question
1 pointsMatch the descriptions to the terms. (Not all options are used.)
Sort elements
- CLI
- GUI
- kernel
- shell
- Telnet
-
users interact with the operating system by typing commands
-
enables the user to interact with the operating system by pointing and clicking
-
the part of the OS that interacts directly with the device hardware
-
the part of the operating system that interfaces with applications and the user
Correct
Incorrect
-
Question 49 of 50
49. Question
1 pointsMatch the functions with the corresponding OSI layer. (Not all options are used.)
Sort elements
- HTTP and FTP
- end user program functionality
- compression
- common format
- dialog maintenance
- windowing
- routing
-
Application layer
-
Application layer
-
Presentation layer
-
Presentation layer
-
Session layer
Correct
Incorrect
-
Question 50 of 50
50. Question
1 pointsMatch the phases to the functions during the boot up process of a Cisco router. (Not all options are used.)
Sort elements
- locale and load the Cisco IOS software
- locate and load the startup configuration file
- perform the POST and load the bootstrap program
- enter setup mode
-
phase 2
-
phase 3
-
phase 1
Correct
Incorrect