CISCO CCNA ITN1
CISCO CCNA ITN1 Kurs
CISCO CCNA ITN1 Kurs
Set of flashcards Details
Flashcards | 133 |
---|---|
Language | English |
Category | Computer Science |
Level | Other |
Created / Updated | 10.01.2022 / 21.12.2022 |
Weblink |
https://card2brain.ch/box/20220110_cisco_ccna_itn1
|
Embed |
<iframe src="https://card2brain.ch/box/20220110_cisco_ccna_itn1/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
What happens when the transport input ssh command is entered on the switch vty lines?
What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?
A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?
Which range of link-local addresses can be assigned to an IPv6-enabled interface?
What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)
A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)
What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)
A network administrator is adding a new LAN to a branch office. The new LAN must support 25 connected devices. What is the smallest network mask that the network administrator can use for the new network?
Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?
What is a function of the data link layer?
What are three characteristics of the CSMA/CD process? (Choose three.)
What characteristic describes a Trojan horse?
What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)
What are two features of ARP? (Choose two.)
What are two characteristics of IP? (Choose two.)
What will happen if the default gateway address is incorrectly configured on a host?
Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?
What are two common causes of signal degradation when using UTP cabling? (Choose two.)
Which scenario describes a function provided by the transport layer?
What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?
Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)
An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees.
What three network characteristics are described in this scenario? (Choose three.)
Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)
Explanation:
Link-Local addresses are assigned automatically by the OS environment and are located in the block 169.254.0.0/16. The private addresses ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. TEST-NET addresses belong to the range 192.0.2.0/24. The addresses in the block 240.0.0.0 to 255.255.255.254 are reserved as experimental addresses. Loopback addresses belong to the block 127.0.0.0/8.
What does the term “attenuation” mean in data communication?
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)
Which subnet would include the address 192.168.1.96 as a usable host address?
What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)
Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)