1) Refer to the exhibit. Which set of devices contains only end devices? a) D, E, F, H, I, J b) A, C, D c) B, E, G, H d) C, D, G, H, I, J e) E, F, H, I, J 2) What is an advantage of the peer-to-peer network model? a) high level of security b) scalability c) ease of setup d) centralized administration 3) Which three devices are considered intermediate devices in a network? (Choose three.) a) wireless access point b) network printer c) server d) switch e) workstation f) router 4) Which two methods are used to directly connect mobile devices such as tablets and smartphones to a data network? (Choose two.) a) Wi-Fi b) Bluetooth c) wired Ethernet d) cellular communications e) WiMax 5) Which two devices are shared peripherals? (Choose two.) a) touch-pad with digital stylus b) printer c) scanner d) tablet e) laptop 6) Which three configuration components are required to allow a host to communicate with other hosts on remote networks? (Choose three.) a) DHCP server address b) subnet mask c) IP address d) default gateway e) DNS server f) domain name 7) A user is looking for a wireless headphone for listening to songs stored on a smartphone. What wireless technology would the headphone use? a) Wi-Fi b) Bluetooth c) infrared d) 3G/4G 8) Which is a characteristic of a Type 2 hypervisor? a) does not require management console software b) has direct access to server hardware resources c) best suited for enterprise environments d) installs directly on hardware 9) A company has a few employees that are designers. The designers do not have the CAD application loaded on their local computer. Instead, the designers use a CAD application hosted by the application developer. Which type of virtualization is the company using? a) SaaS b) DaaS c) IaaS d) PaaS 10) A network administrator attempted to access the company website and received a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude? a) The web server was turned off and was not able to service requests. b) It is normal web surfing activity. c) It is likely that someone attempted a DoS attack. d) The link to the website does not have enough capacity and needs to be increased 11) Which three attacks exploit vulnerabilities in software? (Choose three.) a) pretexting b) worms c) phishing d) Trojan horses e) vishing f) viruses 12) What technique is used in social engineering attacks? a) sending junk email b) man-in-the-middle c) phishing d) buffer overflow 13) A file is downloaded from the Internet. After the user opens the downloaded file, the hard drive crashes and all information on the computer is lost. What type of attack occurred? a) denial of service b) virus c) worm d) Trojan horse 14) What is the decimal equivalent to binary 11110000? a) 192 b) 240 c) 248 d) 224 15) What does the IP address 172.17.4.250/24 represent? a) multicast address b) network address c) host address d) broadcast address 16) Which three IP addresses are considered private addresses? (Choose three.) a) 192.168.5.29 b) 172.17.254.4 c) 128.37.255.6 d) 198.168.6.18 e) 172.68.83.35 f) 10.234.2.1 17) A network security administrator is writing documentation on the firewall requirements for allowing Telnet access to the remote server. Which two pieces of information should be included? (Choose two.) a) port 20 b) port 23 c) port 22 d) UDP e) TCP 18) Which two application layer protocols manage the exchange of messages between a client with a web browser and a remote web server? (Choose two.) a) HTTPS b) HTML c) DHCP d) HTTP e) DNS 19) Match the port number to the email protocol. a) asdf b) x 20) Which protocol is used by a server that needs to send an email message to another server in order to support successful delivery of the message? a) SMTP b) DNS c) POP3 d) IMAP4 21) What are two functions of a router? (Choose two.) a) It controls the flow of data via the use of Layer 2 addresses. b) It provides segmentation at Layer 2. c) A router connects multiple IP networks. d) It determines the best path to send packets. e) It builds a routing table based on ARP requests. 22) Which statement describes a major characteristic of a local area network? a) A LAN is under one administrative control. b) A LAN is implemented in a corporation to connect all of its offices. c) A LAN connects remote users to the main corporate office. d) A LAN can contain up to 100 hosts. 23) A user can access a file share resource on a server located in the same office but cannot access the internet. What is the possible cause? a) The default gateway address is misconfigured on the PC. b) The IPv4 address and subnet mask are misconfigured on the PC. c) The switch is malfunctioning. d) The DHCP server is disconnected. 24) Refer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company web server. However, the web server cannot access the Internet. The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and the web server is able to ping local workstations. Which component is incorrectly configured? a) subnet mask b) DNS address c) host IP address d) default gateway address 25) A law firm uses DHCPv4 to dynamically assign IPv4 addresses for staff workstations. The DHCP policy specifies that the lease period is 7 days. A staff member returns to the office after 2 weeks of vacation. When the employee turns on the workstation, which DHCPv4 message is sent by the workstation to obtain a valid IPv4 address? a) DHCPACK broadcast message b) DHCPDISCOVER broadcast message c) DHCPOFFER unicast message d) DHCPREQUEST unicast message 26) A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain? a) FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server b) both MAC and IPv4 addresses of the DHCP server c) MAC address of the DHCP server and 255.255.255.255 d) FF-FF-FF-FF-FF-FF and 255.255.255.255 27) The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command? a) The switch can communicate with other hosts on the 172.16.100.0 network. b) The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1. c) The switch will have a management interface with the address 172.16.100.1. d) The switch can be remotely managed from a host on another network. 28) Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.) a) Give the router a host name and domain name. b) Create a banner that will be displayed to users when they connect. c) Enable SSH on the physical interfaces where the incoming connection requests will be received. d) Generate a set of secret keys to be used for encryption and decryption. e) Set up an authentication server to handle incoming connection requests. 29) Match the command with the device mode at which the command is entered. (Not all options are used.) a) asdf b) x 30) Which three acronyms/initialisms represent standards organizations? (Choose three.) a) MAC b) IEEE c) IANA d) OSI e) IETF f) TCP/IP
0%
part2
Partajează
Partajează
Partajează
de
Aarolehtinen04
Editează conținutul
Imprimare
Încorporează
Mai multe
Misiuni
Clasament
Arată mai mult
Arată mai puțin
Acest clasament este în prezent privat. Fă clic pe
Distribuie
pentru a-l face public.
Acest clasament a fost dezactivat de proprietarul resursei.
Acest clasament este dezactivat, deoarece opțiunile tale sunt diferite de ale proprietarului resursei.
Opțiuni de revenire
Chestionar
este un șablon deschis. Nu generează scoruri pentru un clasament.
Este necesară conectarea
Stilul vizual
Fonturi
Este necesar un abonament
Opţiuni
Comutare șablon
Arată tot
Mai multe formate vor apărea pe măsură ce folosești activitatea.
Rezultate deschise
Copiați linkul
Cod QR
Şterge
Restaurare activitate salvată automat:
?