Looks like no one added any tags here yet for you.
Which network technology allows devices to communicate using both ipv4 and ipv6 addressing at the same time?
Dual Stack
A device needs an IP address in order to communicate on the network. A DHCP server has been configured and enabled on the network. How will the device obtain an IP address from the DHCP Server?
DHCPDISCOVER MAC: FF-FF-FF-FF (Broadcast)
You are configuring a wireless device and want to prevent any neighbors from discovering your network. What action does the user need to take?
Disable SSID broadcast
What is the purpose of using SSH?
Remote connection to device
Subnet mask of 255.255.255.240. How many useable IP addresses are available?
14
When a router is powered on, where will the router search for a valid IOS image to load by default?
Flash Memory
What is the difference between a keyword and argument?
Key is a specific parameter
Argument is not a predefined
What radio frequency bands are used in home wireless LANs?
2.5Ghz and 5Ghz
A method of transporting an IPv6 packet over an IPv4 network?
Tunneling
Allows Ipv4 and Ipv6 to coexist on the same network segment?
Dual Stacking
Uses a method like NAT64
Translation
A network administrator issues the switch(config)# interface FastEthernet 0/1 command on a Cisco Switch. Which term is used to describe the ‘0/1’ part of the command?
Argument
What does the service password-encryption command do on Cisco routers and switches?
It encrypts all passwords that are stored in the router or switch running configuration files
What are two benefits of using a layered network model?
It prevents technology in one layer from affecting other layers.
It assists in protocol design
Which three IP addresses are private?
192.168.
10.
172.16.
Which type of wireless communication is based on 802.11 standards?
Wi-Fi
A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?
The broadcast Mac address
What does a switch uses to build the MAC address table?
Source MAC Address
Explain DORA?
DHCP Discover
Offer(Unicast)
Request
Acknowledge(Unicast)
How many bits are there in each hextet of an IPv6 address?
16
What type of attack is the ping of death?
Denial of Service
What is the purpose of a subnet mask?
To determine the subnet to which the host belongs
A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?
255.255.255.255
What port secures http requests to a web browser?
443
What is the purpose of a DMZ?
It allows external hosts to login into the external server
What two criteria are used to help select a network medium from a network?
Distancing the selected medium can successfully carry a signal
The environment where the selected medium is to be installed
What is required for a network administrator to perform out-of-band management tasks on a cisco device?
A computer directly connected to the console port of the device
Ipv6 addresses that are used for communicating on the same LAN or between a limited number of sites are known as?
Link-Local addresses
What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts on other networks
What would a technician require in order to install a hypervisor on a client machine?
Virtualization software
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?
The status of the switch interfaces and the address configured on interface vlan 1
A student is uploading files from a phone to a server on another network. Which layer of the TCP.IP model is responsible for providing an addressing scheme to transmit the data between the devices?
Internet
What happens when the transport input ssh command is entered on the switch vty lines?
The SSH client on the switch is enabled
What two fields. if found, are copied into RAM as a router with the default configuration register setting look up?
IOS image file
Starting Configuration
What is the effect of setting the security mode to WEP on a small wireless router?
It encrypts data between the wireless client and the access point
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures
Tunneling
A network administrator notices that some newly installed Ethernet cabin is carrying corrupt and distorted data signals. The new cabling was stalled in the ceiling close to fluorescent lights and electrical equipment. Which 2 factors may interfere with the copper cabling and result in signal distortion and data corruption(choose two)
EMI
RFI
What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?
MAC Filtering
What two actions improve security on a wireless network?
Enabling MAC filtering
Enable WEP
Which interface is the fault SVI on a Cisco Switch
Vlan 1
What is the primary means for mitigating virus and Trojan horse attacks?
Antivirus software
What is the term used when a malicious part sends a fraudulent email disguised as being from a legitimate trusted source?
Phishing
An IPv6 address can have a prefix length that ranges from 0 to 128?
True
Which two statements are correct about IPv4 and IPv6 addresses
IPv4 addresses are 32 bits in length.
IPv6 addresses are represented by hexadecimal numbers.
While a network security products is being deployed a customizable list of allowable protocols is shown. Which 3 protocols should be allowed to provide for the use of email on a network?(Choose three.)
IMAP4
SMTP
POP3
A network administrator is designing the layout of a new wireless network. Which 3 areas of concern should be accounted for when building a wireless network?(Choose three.)
Security
Coverage area
Interference
What are two common physical layer connectivity issues
Ethernet cable plugged wrong
The cable is faulty
At which layer of the OSI model would logical addresses be added
Network (layer 3)
A customer places smartphone near a terminal to pay, What is being used?
NFC
If the default gateway was not configured correctly what are the consequences?
The device can connect internally with local devices but not with remote devices
Which protocol port allows external users to access an internal FTP server
Port 40
When troubleshooting a network where would you find the configuration information such as the computer name and ip address that are being used?
Logical Topology
What are the 3 types of IPv6 communications?
Unicast
Multicast
Anycast
Which type of device must the user have to provide wireless access to multiple devices?
Wireless router
What type of cable connections is used in package Tracker PC to Switch
Straight-through
What is the delay in the amount of time it takes for data to transfer?
Latency
Which two ports can be used to configure cisco router?
Console
AUX
A network admin needs to keep username and password in session private when establishing a remote client connectivity?
SSH
What are two features of the TCP and UDP?
TCP reliability sends packets in sections and confirms delivery
UDP best effort and unreliable send packets