Leona W.
Test por , creado hace más de 1 año

CISCO Quiz

193
1
0
Leona W.
Creado por Leona W. hace más de 4 años
Cerrar

CISCO

Pregunta 1 de 75

1

Which device performs the function of determining the path that messages should take through internetworks?

Selecciona una o más de las siguientes respuestas posibles:

  • a web server

  • a DSL modem

  • a firewall

  • a router

Explicación

Pregunta 2 de 75

1

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

Selecciona una o más de las siguientes respuestas posibles:

  • scalable

  • less cost to implement

  • lacks centralized administration

  • better device performance when acting as both client and server

  • easy to create

  • better security

Explicación

Pregunta 3 de 75

1

What two criteria are used to help select a network medium from various network media? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • the environment where the selected medium is to be installed

  • the number of intermediary devices installed in the network

  • the distance the selected medium can successfully carry a signal

  • the cost of the end devices utilized in the network

  • the types of data that need to be prioritized

Explicación

Pregunta 4 de 75

1

Which two statements describe intermediary devices? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • Intermediary devices initiate the encapsulation process.

  • Intermediary devices connect individual hosts to the network.

  • Intermediary devices direct the path of the data.

  • Intermediary devices alter data content.

  • Intermediary devices generate data content.

Explicación

Pregunta 5 de 75

1

What are two functions of end devices on a network? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • They provide the channel over which the network message travels.

  • They are the interface between humans and the communication network.

  • They filter the flow of data to enhance security.

  • They direct data over alternate paths in the event of link failures.

  • They originate the data that flows through the network.

Explicación

Pregunta 6 de 75

1

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

Selecciona una o más de las siguientes respuestas posibles:

  • wireless WAN

  • wireless LAN

  • wired LAN

  • intranet

  • extranet

Explicación

Pregunta 7 de 75

1

What type of network must a home user access in order to do online shopping?

Selecciona una o más de las siguientes respuestas posibles:

  • a local area network

  • an extranet

  • the Internet

  • an intranet

Explicación

Pregunta 8 de 75

1

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

Selecciona una o más de las siguientes respuestas posibles:

  • an extranet

  • an intranet

  • the Internet

  • a local area network

Explicación

Pregunta 9 de 75

1

Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • dial-up telephone

  • cable

  • satellite

  • DSL

  • cellular

Explicación

Pregunta 10 de 75

1

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • dedicated leased line

  • dialup

  • satellite

  • cellular

  • DSL

Explicación

Pregunta 11 de 75

1

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

Selecciona una o más de las siguientes respuestas posibles:

  • synchronization

  • optimization

  • convergence

  • congestion

Explicación

Pregunta 12 de 75

1

What type of network traffic requires QoS?

Selecciona una o más de las siguientes respuestas posibles:

  • wiki

  • email

  • on-line purchasing

  • video conferencing

Explicación

Pregunta 13 de 75

1

Which expression accurately defines the term bandwidth?

Selecciona una o más de las siguientes respuestas posibles:

  • a set of techniques to manage the utilization of network resources

  • a state where the demand on the network resources exceeds the available capacity

  • a method of limiting the impact of a hardware or software failure on the network

  • a measure of the data carrying capacity of the media

Explicación

Pregunta 14 de 75

1

A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?

Selecciona una o más de las siguientes respuestas posibles:

  • data redundancy

  • data quality

  • data integrity

  • data confidentiality

Explicación

Pregunta 15 de 75

1

Which statement describes a characteristic of cloud computing?

Selecciona una o más de las siguientes respuestas posibles:

  • Investment in new infrastructure is required in order to access the cloud.

  • Devices can connect to the Internet through existing electrical wiring.

  • A business can connect directly to the Internet without the use of an ISP.

  • Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

Explicación

Pregunta 16 de 75

1

What is the Internet?

Selecciona una o más de las siguientes respuestas posibles:

  • It is a private network for an organization with LAN and WAN connections.

  • It provides network access for mobile devices.

  • It provides connections through interconnected global networks.

  • It is a network based on Ethernet technology.

Explicación

Pregunta 17 de 75

1

Which statement describes the use of powerline networking technology?

Selecciona una o más de las siguientes respuestas posibles:

  • A device connects to an existing home LAN using an adapter and an existing electrical outlet.

  • Wireless access points use powerline adapters to distribute data through the home LAN.

  • A home LAN is installed without the use of physical cabling.

  • New “smart” electrical cabling is used to extend an existing home LAN.

Explicación

Pregunta 18 de 75

1

What security violation would cause the most amount of damage to the life of a home user?

Selecciona una o más de las siguientes respuestas posibles:

  • capturing of personal data that leads to identity theft

  • spyware that leads to spam emails

  • replication of worms and viruses in your computer

  • denial of service to your email server

Explicación

Pregunta 19 de 75

1

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • implementing an intrusion detection system

  • adding a dedicated intrusion prevention device

  • installing antivirus software

  • installing a wireless network

  • implementing a firewall

Explicación

Pregunta 20 de 75

1

A __converged__ network is capable of delivering voice, video, text, and graphics over the same communication channels.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 21 de 75

1

The acronym __byod__ refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 22 de 75

1

Web pages that groups of people can edit and view together

Selecciona una o más de las siguientes respuestas posibles:

  • wiki

  • Social Media

  • instant messaging

  • podcast

Explicación

Pregunta 23 de 75

1

Interactive websites where people created and share user-generated content with friends and family

Selecciona una o más de las siguientes respuestas posibles:

  • Wiki

  • Social Media

  • Podcast

  • instant messaging

Explicación

Pregunta 24 de 75

1

real-time communication of between two or more people

Selecciona una o más de las siguientes respuestas posibles:

  • Wiki

  • Social Media

  • Instant Messaging

  • Podcast

Explicación

Pregunta 25 de 75

1

an audio-based medium that allows people to deliver their recordings to a wide audience

Selecciona una o más de las siguientes respuestas posibles:

  • Wiki

  • instant messaging

  • Social Media

  • Podcast

Explicación

Pregunta 26 de 75

1

Not suited for heavily wooded areas

Selecciona una o más de las siguientes respuestas posibles:

  • satellite

  • DSL

  • cable

  • dialup telephone

Explicación

Pregunta 27 de 75

1

typically has very low bandwidth

Selecciona una o más de las siguientes respuestas posibles:

  • satellite

  • DSL

  • cable

  • dialup telephone

Explicación

Pregunta 28 de 75

1

high bandwidth connection that runs over telephone line

Selecciona una o más de las siguientes respuestas posibles:

  • satellite

  • DSL

  • cable

  • dialup telephone

Explicación

Pregunta 29 de 75

1

uses coaxial cable as a medium

Selecciona una o más de las siguientes respuestas posibles:

  • cable

  • satellite

  • DSL

  • dialup telephone

Explicación

Pregunta 30 de 75

1

the assurance that the information has not been altered during transmission

Selecciona una o más de las siguientes respuestas posibles:

  • maintaining integrity

  • ensuring confidentiality

  • ensuring availability

Explicación

Pregunta 31 de 75

1

only the intended recipients can access and read the data

Selecciona una o más de las siguientes respuestas posibles:

  • maintaining integrity

  • ensuring availability

  • ensuring confidentiality

Explicación

Pregunta 32 de 75

1

the assurance of timely and reliable access to data

Selecciona una o más de las siguientes respuestas posibles:

  • ensuring confidentiality

  • ensuring availability

  • maintaining integrity

Explicación

Pregunta 33 de 75

1

Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?

Selecciona una o más de las siguientes respuestas posibles:

  • video conferencing

  • cloud computing

  • powerline networking

  • BYOD

Explicación

Pregunta 34 de 75

1

What is a characteristic of a converged network?

Selecciona una o más de las siguientes respuestas posibles:

  • it delivers data, voice, and video over the same network infrastructure

  • A converged network requires a separate network infrastructure for each type of communication technology

  • it limits the impact of a failure by minimizing the number of devices affected

  • it provides only one path between the source and destination of a message

Explicación

Pregunta 35 de 75

1

What are two functions of intermediary devices on a network? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • They filter the flow of data, based on security settings.

  • They direct data along alternate pathways when there is a link failure.

  • They form the interface between the human network and the underlying communication network.

  • They run applications that support collaboration for business.

  • They are the primary source and providers of information and services to end devices.

Explicación

Pregunta 36 de 75

1

What is the function of the kernel of an operating software?

Selecciona una o más de las siguientes respuestas posibles:

  • The kernel provisions hardware resources to meet software requirements.

  • It is an application that allows the initial configuration of a Cisco device.

  • The kernel links the hardware drivers with the underlying electronics of a computer.

  • It provides a user interface that allows users to request a specific task.

Explicación

Pregunta 37 de 75

1

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

Selecciona una o más de las siguientes respuestas posibles:

  • Console

  • AUX

  • SSH

  • Telnet

Explicación

Pregunta 38 de 75

1

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Selecciona una o más de las siguientes respuestas posibles:

  • Use Secure Shell to remotely access the switch through the network.

  • Use the AUX port to locally access the switch from a serial or USB interface of the PC.

  • Use Telnet to remotely access the switch through the network.

  • Use the console port to locally access the switch from a serial or USB interface of the PC.

Explicación

Pregunta 39 de 75

1

Which command or key combination allows a user to return to the previous level in the command hierarchy?

Selecciona una o más de las siguientes respuestas posibles:

  • Ctrl-Z

  • exit

  • Ctrl-C

  • end

Explicación

Pregunta 40 de 75

1

A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?

Selecciona una o más de las siguientes respuestas posibles:

  • user EXEC mode

  • privileged EXEC mode

  • setup mode

  • global configuration mode

Explicación

Pregunta 41 de 75

1

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • determining which option, keyword, or argument is available for the entered command

  • selecting the best command to accomplish a task

  • allowing the user to complete the remainder of an abbreviated command with the TAB key

  • displaying a list of all available commands within the current mode

  • providing an error message when a wrong command is submitted

Explicación

Pregunta 42 de 75

1

Which information does the show startup-config command display?

Selecciona una o más de las siguientes respuestas posibles:

  • the contents of the saved configuration file in the NVRAM

  • the contents of the current running configuration file in the RAM

  • the bootstrap program in the ROM

  • the IOS image copied into RAM

Explicación

Pregunta 43 de 75

1

Why is it important to configure a hostname on a device?

Selecciona una o más de las siguientes respuestas posibles:

  • to allow local access to the device through the console port

  • a hostname must be configured before any other parameters

  • a Cisco router or switch only begins to operate when its hostname is set

  • to identify the device during remote access (SSH or telnet)

Explicación

Pregunta 44 de 75

1

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • SwBranch799

  • HO Floor 17

  • Floor(15)

  • RM-3-Switch-2A4

  • Branch2!

Explicación

Pregunta 45 de 75

1

How does the service password-encryption command enhance password security on Cisco routers and switches?

Selecciona una o más de las siguientes respuestas posibles:

  • It requires that a user type encrypted passwords to gain console access to a router or switch.

  • It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet.

  • It encrypts passwords that are stored in router or switch configuration files.

  • It encrypts passwords as they are sent across the network.

Explicación

Pregunta 46 de 75

1

Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?

Selecciona una o más de las siguientes respuestas posibles:

  • to configure switch SW1 so that the message will display when a user enters the enable command

  • to force users of the Admin group to enter a password for authentication

  • to configure switch SW1 so that only the users in the Admin group can telnet into SW1

  • to display a message when a user accesses the switch

Explicación

Pregunta 47 de 75

1

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Selecciona una o más de las siguientes respuestas posibles:

  • Issue the reload command without saving the running configuration.

  • Delete the vlan.dat file and reboot the device.

  • Close and reopen the terminal emulation software.

  • Issue the copy startup-config running-config command.

Explicación

Pregunta 48 de 75

1

Which statement is true about the running configuration file in a Cisco IOS device?

Selecciona una o más de las siguientes respuestas posibles:

  • It should be deleted using the erase running-config command.

  • It is automatically saved when the router reboots.

  • It is stored in NVRAM.

  • It affects the operation of the device immediately when modified.

Explicación

Pregunta 49 de 75

1

What are two characteristics of RAM on a Cisco device? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • RAM is able to store multiple versions of IOS and configuration files.

  • RAM is a component in Cisco switches but not in Cisco routers.

  • The contents of RAM are lost during a power cycle.

  • RAM provides nonvolatile storage.

  • The configuration that is actively running on the device is stored in RAM.

Explicación

Pregunta 50 de 75

1

Which interface allows remote management of a Layer 2 switch?

Selecciona una o más de las siguientes respuestas posibles:

  • the switch virtual interface

  • the first Ethernet port interface

  • the console port interface

  • the AUX interface

Explicación

Pregunta 51 de 75

1

Which interface is the default SVI on a Cisco switch?

Selecciona una o más de las siguientes respuestas posibles:

  • VLAN 1

  • VLAN 99

  • GigabitEthernet 0/1

  • FastEthernet 0/1

Explicación

Pregunta 52 de 75

1

Why would a Layer 2 switch need an IP address?

Selecciona una o más de las siguientes respuestas posibles:

  • to enable the switch to receive frames from attached PCs

  • to enable the switch to function as a default gateway

  • to enable the switch to send broadcast frames to attached PCs

  • to enable the switch to be managed remotely

Explicación

Pregunta 53 de 75

1

What command can be used on a Windows PC to see the IP configuration of that computer?

Selecciona una o más de las siguientes respuestas posibles:

  • ipconfig

  • show ip interface brief

  • show interfaces

  • ping

Explicación

Pregunta 54 de 75

1

A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?

Selecciona una o más de las siguientes respuestas posibles:

  • The PC virtual interface is compatible with any network.

  • The PC used DNS to automatically receive IP addressing information from a server.

  • The PC came preconfigured with IP addressing information from the factory.

  • The PC does not require any additional information to function on the network.

  • The PC was preconfigured to use DHCP.

Explicación

Pregunta 55 de 75

1

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

Selecciona una o más de las siguientes respuestas posibles:

  • what type of device is at the destination

  • if there is connectivity with the destination device

  • the path that traffic will take to reach the destination

  • if the TCP/IP stack is functioning on the PC without putting traffic on the wire

Explicación

Pregunta 56 de 75

1

Refer to the exhibit. A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with? (Choose two.)

Selecciona una o más de las siguientes respuestas posibles:

  • no connectivity: switch 2

  • no connectivity: switch 1

  • connectivity: PC-B

  • connectivity: PC-D

  • connectivity: switch 2

  • no connectivity: PC-C

Explicación

Pregunta 57 de 75

1

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

Selecciona una o más de las siguientes respuestas posibles:

  • The default SVI has been configured.

  • One device is attached to a physical interface.

  • The switch can be remotely managed.

  • Two physical interfaces have been configured.

  • Two devices are attached to the switch.

  • Passwords have been configured on the switch.

Explicación

Pregunta 58 de 75

1

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

Selecciona una o más de las siguientes respuestas posibles:

  • access method

  • response timeout

  • encapsulation

  • flow control

Explicación

Pregunta 59 de 75

1

What type of communication will send a message to all devices on a local area network?

Selecciona una o más de las siguientes respuestas posibles:

  • broadcast

  • allcast

  • unicast

  • multicast

Explicación

Pregunta 60 de 75

1

What process is used to place one message inside another message for transfer from the source to the destination?

Selecciona una o más de las siguientes respuestas posibles:

  • encapsulation

  • decoding

  • access control

  • flow control

Explicación

Pregunta 61 de 75

1

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

Selecciona una o más de las siguientes respuestas posibles:

  • HTTP, IP, TCP, Ethernet

  • HTTP, TCP, IP, Etherne

  • Ethernet, TCP, IP, HTTP

  • Ethernet, IP, TCP, HTTP

Explicación

Pregunta 62 de 75

1

Which statement is correct about network protocols?

Selecciona una o más de las siguientes respuestas posibles:

  • Network protocols define the type of hardware that is used and how it is mounted in racks.

  • They define how messages are exchanged between the source and the destination.

  • They all function in the network access layer of TCP/IP.

  • They are only required for exchange of messages between devices on remote networks.

Explicación

Pregunta 63 de 75

1

Which statement is true about the TCP/IP and OSI models?

Selecciona una o más de las siguientes respuestas posibles:

  • The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.*

  • The TCP/IP network access layer has similar functions to the OSI network layer.

  • The OSI Layer 7 and the TCP/IP application layer provide identical functions.

  • The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.

Explicación

Pregunta 64 de 75

1

What is an advantage of using standards to develop and implement protocols?

Selecciona una o más de las siguientes respuestas posibles:

  • A particular protocol can only be implemented by one manufacturer.

  • Products from different manufacturers can interoperate successfully.

  • Different manufacturers are free to apply different requirements when implementing a protocol.

  • Standards provide flexibility for manufacturers to create devices that comply with unique requirements.

Explicación

Pregunta 65 de 75

1

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

Selecciona una o más de las siguientes respuestas posibles:

  • ARP

  • DHCP

  • DNS

  • FTP

  • PPP

  • NAT

Explicación

Pregunta 66 de 75

1

What are proprietary protocols?

Selecciona una o más de las siguientes respuestas posibles:

  • protocols developed by private organizations to operate on any vendor hardware

  • protocols that can be freely used by any organization or vendor

  • protocols developed by organizations who have control over their definition and operation

  • a collection of protocols known as the TCP/IP protocol suite

Explicación

Pregunta 67 de 75

1

What is an advantage of network devices using open standard protocols?

Selecciona una o más de las siguientes respuestas posibles:

  • Network communications is confined to data transfers between devices from the same vendor.

  • Competition and innovation are limited to specific types of products.

  • Internet access can be controlled by a single ISP in each market.

  • A client host and a server running different operating systems can successfully exchange data.

Explicación

Pregunta 68 de 75

1

Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

Selecciona una o más de las siguientes respuestas posibles:

  • only application and Internet layers

  • application, session, transport, network, data link, and physical layers

  • only application, transport, network, data link, and physical layers

  • application, transport, Internet, and network access layers

  • only application, Internet, and network access layers

  • only Internet and network access layers

Explicación

Pregunta 69 de 75

1

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

Selecciona una o más de las siguientes respuestas posibles:

  • application

  • network

  • physical

  • data link

  • transport

  • session

  • presentation

Explicación

Pregunta 70 de 75

1

At which layer of the OSI model would a logical address be encapsulated?

Selecciona una o más de las siguientes respuestas posibles:

  • physical layer

  • transport layer

  • network layer

  • data link layer

Explicación

Pregunta 71 de 75

1

Which PDU format is used when bits are received from the network medium by the NIC of a host?

Selecciona una o más de las siguientes respuestas posibles:

  • file

  • segment

  • packet

  • frame

Explicación

Pregunta 72 de 75

1

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

Selecciona una o más de las siguientes respuestas posibles:

  • bits

  • segment

  • packet

  • frame

Explicación

Pregunta 73 de 75

1

Which address does a NIC use when deciding whether to accept a frame?

Selecciona una o más de las siguientes respuestas posibles:

  • destination MAC address

  • source Ethernet address

  • destination IP address

  • source MAC address

  • source IP address

Explicación

Pregunta 74 de 75

1

What will happen if the default gateway address is incorrectly configured on a host?

Selecciona una o más de las siguientes respuestas posibles:

  • The host cannot communicate with other hosts in the local network.

  • A ping from the host to 127.0.0.1 would not be successful.

  • The host cannot communicate with hosts in other networks.

  • The host will have to use ARP to determine the correct address of the default gateway.

  • The switch will not forward packets initiated by the host.

Explicación

Pregunta 75 de 75

1

Which characteristic describes the default gateway of a host computer?

Selecciona una o más de las siguientes respuestas posibles:

  • the physical address of the switch interface connected to the host computer

  • the logical address assigned to the switch interface connected to the router

  • the physical address of the router interface on the same network as the host computer

  • the logical address of the router interface on the same network as the host computer

Explicación