CCNA

CCNA

CCNA


Set of flashcards Details

Flashcards 77
Students 25
Language Deutsch
Category Computer Science
Level University
Created / Updated 04.09.2015 / 21.06.2025
Weblink
https://card2brain.ch/box/ccna2
Embed
<iframe src="https://card2brain.ch/box/ccna2/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

41. Which subnet would include the address 192.168.1.96 as a usable host address?

42. A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?

44. Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)

83. A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

90. Match each characteristic to the appropriate email protocol. (Not all options are used.)

    does not require a centralized backup solution

90. Match each characteristic to the appropriate email protocol. (Not all options are used.)

    mail is deleted as it is downloaded

90. Match each characteristic to the appropriate email protocol. (Not all options are used.)

    desirable for an ISP or large business

90. Match each characteristic to the appropriate email protocol. (Not all options are used.)


    downloads copies of email messages to the client

 

90. Match each characteristic to the appropriate email protocol. (Not all options are used.)


    original messages must be manually deleted

 

90. Match each characteristic to the appropriate email protocol. (Not all options are used.)

    requires a larger amnt of disk space

91. A host is accessing a Telnet server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

91. A host is accessing a Telnet server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

93. What is the purpose of having a converged network?

98. What is a characteristic of the LLC sublayer?

43. A particular telnet site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

79. What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?

104. What are the two main components of Cisco Express Forwarding (CEF)? (Choose two.)

63. Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued??

Switch(config)# hostname HR Switch

67. Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

66. What is the metric value that is used to reach the 10.1.1.0 network in the following routing table entry?

D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0

65. What are three important considerations when planning the structure of an IP addressing scheme? (Choose three.)

64. How could a faulty network device create a source of hazard for a user? (Choose two.)

59. What type of communication rule would best describe CSMA/CD?

58. There was also a question about if you activated service password encryption in the past and you prompt “no service password encryption” what password are modified ?

 56. A client is establishing a TCP session with a server. How is the acknowledgment number in the response segment to the client determined?

55. Which statement best describes the operation of the File Transfer Protocol?

52. How many bits would need to be borrowed if a network admin were given the IP addressing scheme of 172.16.0.0/16 and needed no more than 16 subnet with equal number of hosts?

51. What is a characteristic of UTP cabling?

95. During normal operation, from which location do most Cisco switches and routers run the IOS?

105. Which statement describes the sequence of processes executed by a router when it receives a packet from a host to be delivered to a host on another network?

107. Refer to the exhibit. Router R1 has two interfaces that were configured with correct IP addresses and subnet masks. Why does the show ip route command output not display any information about the directly connected networks??

"Gateway of last resort is not set"

109. Which three statements characterize the transport layer protocols? (Choose three.)

113. What are three characteristics of multicast transmission? (Choose three.)

60. During normal operation, from which location do most Cisco routers run the IOS?

Data troughput

It is the measure of the bits transferred across the media over a given period of time.

117. What is the purpose of the network security authentication function?

120. Match the description with the associated IOS mode. (Not all options are used.)

limited number of basic monitoring commands

 

120. Match the description with the associated IOS mode. (Not all options are used.)

the first entrance into the CLI of an IOS device

120. Match the description with the associated IOS mode. (Not all options are used.)

accessed by entering the enable command

120. Match the description with the associated IOS mode. (Not all options are used.)

identified by a prompt ending with the # character