Tech Learn Nr. 5

My Cards for Tech Learn Nr. 5

My Cards for Tech Learn Nr. 5


Set of flashcards Details

Flashcards 72
Language English
Category Computer Science
Level University
Created / Updated 28.12.2014 / 28.12.2014
Weblink
https://card2brain.ch/box/tech_learn_nr_5
Embed
<iframe src="https://card2brain.ch/box/tech_learn_nr_5/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Refer to the exhibit.
The network administrator enters these commands into the R1 router:
R1# copy running-config tftp

Address or name of remote host [ ]?
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?

Which three statements characterize the transport layer protocols? (Choose three.)

What is the purpose of ICMP messages?

A technician uses the ping 127.0.0.1 command. What is the technician testing?

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

What is a characteristic of the LLC sublayer?

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

 

NOT: the bandwidth of the WAN connection to the Internet

When applied to a router, which command would help mitigate brute-force password attacks against the router?

Which two statements correctly describe a router memory type and its contents? (Choose two.)

Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)

Open the PT activity. Perform the tasks in the activity instructions and then fill in the blank.
The Server0 message is __________

winner

A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

lerne Bild

welches?

Which address on a PC does not change, even if the PC is moved to a different network?
 

What will happen if the default gateway address is incorrectly configured on a host?
A ping from the host to 127.0.0.1 would not be successful.

A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network? (Choose two.)

Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued?

After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command?

Refer to the exhibit.A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received?

Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

What is the purpose of the routing process?
 

Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

Which connection provides a secure CLI session with encryption to a Cisco switch?
 

27 What is the purpose of the network security accounting function?
 

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?

A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

Which subnet would include the address 192.168.1.96 as a usable host address?
 

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?

A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?

Refer to the exhibit. Which IP addressing scheme should be changed?
 

What is the effect of configuring the ipv6 unicast-routing command on a router?
 

Which three IP addresses are private ? (Choose three.)
 

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?

During normal operation, from which location do most Cisco switches and routers run the IOS?

What is an important function of the physical layer of the OSI model?