Final 6

A futuristic digital landscape showcasing various networking elements like routers, switches, firewalls, and VPN connections.

Network Fundamentals Quiz

Test your knowledge of networking concepts with our challenging quiz designed for both aspiring and seasoned network professionals.

In this quiz, you will cover topics such as:

  • IPsec and VPN protocols
  • Cisco Catalyst switch features
  • SNMP benefits
  • Asymmetric cryptography
10 Questions2 MinutesCreated by RoutingData99
Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
MD5
AES
IPsec
ESP
Which statement describes a characteristic of Cisco Catalyst 2960 switches?
They are best used as distribution layer switches
New Cisco Catalyst 2960-C switches support PoE pass-through.
They are modular switches.
They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.
Which component of the ACI architecture translates application policies into network programming?
The hypervisor
The Application Policy Infrastructure Controller
The Nexus 9000 switch
The Application Network Profile endpoints
Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)
Device type
Cable specification
Interface identifier
OS/IOS version
Connection type
Cable type and identifier
Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?
The NAT pool has been exhausted.
The wrong netmask was used on the NAT pool.
Access-list 1 has not been configured properly.
The inside and outside interfaces have been configured backwards.
What are two benefits of using SNMP traps? (Choose two.)
They eliminate the need for some periodic polling requests.
They reduce the load on network and agent resources.
They limit access for management systems only.
They can provide statistics on TCP/IP packets that flow through Cisco devices.
They can passively listen for exported NetFlow datagrams.
Which statement accurately describes a characteristic of IPsec?
IPsec works at the application layer and protects all application data.
IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
IPsec works at the transport layer and protects data at the network layer.
IPsec is a framework of open standards that relies on existing algorithms.
In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)
Connect users to the network
Provide a high-speed network backbone
Connect remote networks
Provide Power over Ethernet to devices
Provide data traffic security
Which two statements describe the use of asymmetric algorithms? (Choose two.)
Public and private keys may be used interchangeably.
If a public key is used to encrypt the data, a public key must be used to decrypt the data.
If a private key is used to encrypt the data, a public key must be used to decrypt the data.
If a public key is used to encrypt the data, a private key must be used to decrypt the data.
If a private key is used to encrypt the data, a private key must be used to decrypt the data
Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?
Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2
{"name":"Final 6", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of networking concepts with our challenging quiz designed for both aspiring and seasoned network professionals. In this quiz, you will cover topics such as: IPsec and VPN protocols Cisco Catalyst switch features SNMP benefits Asymmetric cryptography","img":"https:/images/course7.png"}
Powered by: Quiz Maker