CCNA

CCNA

CCNA


Set of flashcards Details

Flashcards 77
Students 25
Language Deutsch
Category Computer Science
Level University
Created / Updated 04.09.2015 / 21.06.2025
Weblink
https://card2brain.ch/box/ccna2
Embed
<iframe src="https://card2brain.ch/box/ccna2/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

120. Match the description with the associated IOS mode. (Not all options are used.)

changes made affect the operation of the device as a whole

120. Match the description with the associated IOS mode. (Not all options are used.)

accessed by entering the configure terminal command

3. What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

3. What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

14. Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?

14. Which statement is true about variable-length subnet masking?

15. Which firewall technique blocks incoming packets unless they are responses to internal requests?

15. What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

16. A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command issued on the PC will return to the technician the complete path to the remote host?

16. Which two protocols function at the internet layer? (Choose two.)

116. Which two tasks are functions of the presentation layer? (Choose two.)

17. Fill in the blank.

To prevent faulty network devices from carrying dangerous voltage levels, equipment must be      ______ correctly

grounded

17. Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?

26. A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task?

31. Refer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22?

31. Which of the following are primary functions of a router? (Choose two.)

32. Which two statements correctly describe a router memory type and its contents? (Choose two.)

32. A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts?

33. In which default order will a router search for startup configuration information?

33. How many additional bits should be borrowed from a /26 subnet mask in order to create subnets for WAN links that need only 2 useable addresses?

34. A  _____ topology influences the type of network framing and media access control that will be used.

logical

35. Refer to the exhibit. The administrator configured the access to the console and the vty lines of a router. Which conclusion can be drawn from this configuration?

Router(config)#line vty 0 15
Router(config-line)#password cisco
Router(config-line)#exit
Router(config)#line console 0
Router(config-line)#password cisco
Router(config-line)#login
Router(config-line)#exit
Router(config)#

35. Which three IP addresses are private ? (Choose three.)

36. How many bits make up the single IPv6 hextet :10CD:?

36. An administrator issued the service password-encryption command to apply encryption to the passwords configured for enable password, vty, and console lines. What will be the consequences if the administrator later issues the no service password-encryption command?

47. Which type of wireless security is easily compromised?

47. When applied to a router, which command would help mitigate brute-force password attacks against the router?

2. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator has already logged into a Telnet session on the switch, which password is needed to access privileged EXEC mode?

SW1(config)# enable password letmein
SW1(config)# enable secret secretin
SW1(config)# line console 0
SW1(config-line)# password lineconin
SW1(config-line)# login
SW1(config-line)# exit
SW1(config)#  line vty 0 15
SW1(config-line)# password linevtyin
SW1(config-line)# login
SW1(config-line)# end
SW1#

83. A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

117. What is the purpose of the network security authentication function?

43. A particular telnet site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

Länge IPV6 Adresse

128 Bits

Anzahl Blöcke IPv6 Adresse

8

Blockgrösse IPV6 Adresse

16 Bit

Länge IPV4 Adresse

32 bits

Blockgrösse IPV4 Adresse

8 bit

Anzahl Blöcke IPV4 Adresse

4