Manas's quiz 1
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
ϻDoS attack
ϻidentity theft
ϻspyware
ϻzero-day attack
Which term refers to a network that provides secure access to the corporate offices for suppliers, customers, and collaborators?
Internet
Intranet
Extranet
Extended net
A large corporation has modified its network to allow users to access network resources from their personal laptops and smartphones. Which networking trend does this describe?
Cloud computing
Online collaboration
Bring your own device
Video conferencing
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers in a local network communicate.
It is an organization that enables individuals and businesses to connect to the internet.
It is a networking device that combines the functionality of several different networking devices in one.
For which of the following would the use of a WISP be recommended?
An internet café in a city
A farm in a rural area without wired broadband access
Any home with multiple wireless devices
An apartment in a building with cable access to the internet
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
Reliability
Scalability
Quality of service
Accessibility
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber-optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories experience only a very short interruption of network services. What characteristic of the network is described here?
Quality of service
Scalability
Security
Fault tolerance
Integrity
What are two characteristics of a scalable network? (Choose two.)
Easily overloaded with increased traffic
Grows in size without impacting existing users
.is not as reliable as a small network
Suitable for modular devices that allow for expansion
Offers limited number of applications
Which device performs the function of determining the path that messages should take through internetworks?
A router
A firewall
A web server
A DSL modem
Which two internet connection options do not require that physical cables be run to a building? (Choose two.)
ϻDSL
Cellular
Satellite
Dialup
Dedicated leased line
What type of network must a home user access in order to do online shopping?
An intranet
The internet
An extranet
A local area network
How does BYOD change the way businesses implement networks?
BYOD requires organizations to purchase laptops rather than desktops.
BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
BYOD devices are more expensive than devices that are purchased by an organization.
BYOD provides flexibility in where and how users can access network resources.
An employee wants to access the network of an organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
ACL
IPS
VPN
BYOD
What is the internet?
It is a network based on Ethernet technology.
It provides network access for mobile devices.
It provides connections through interconnected global networks.
It is a private network for an organization with LAN and WAN connections.
What are two functions of end devices on a network? (Choose two.)
They originate the data that flows through the network.
They direct data over alternate paths in the event of a link failure.
They filter the flow of data to enhance security.
They are the interface between humans and the communications network.
They provide the channel over which the network message travels.
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified.
It is stored in NVRAM.
.It should be deleted using the erase running-config command.
It is automatically saved when the router reboots.
Which two statements are true regarding user EXEC mode? (Choose two.)
All router commands are available.
Global configuration mode can be accessed by entering the enable command.
The device prompt for this mode ends with the > symbol.
Interfaces and routing protocols can be configured.
Only some aspects of the router configuration can be viewed.
Which type of access is secured on a Cisco router or switch with the enable secret command?
Virtual terminal
Privileged EXEC
AUX port
Console line
What is the default SVI on a Cisco switch?
VLAN 1
VLAN 99
VLAN 100
VLAN 999
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)
The hostname should be fewer than 64 characters in length.
The hostname should be written in all lowercase characters.
The hostname should contain no spaces.
The hostname should end with a special character.
- The hostname chould begin with a letter
What is the function of the shell in an OS?
It interacts with the device hardware.
It interfaces between the users and the kernel.
It provides dedicated firewall services.
It provides intrusion protection services for the device.
A switch with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no line console o password. When the router boots up, which mode will display?
Global configuration mode
Setup mode
Privileged EXEC mode
User EXEC mode
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Copy the running configuration to the startup configuration file.
Copy the information in the startup configuration file to the running configuration.
Reload the device and type yes when prompted to save the configuration.
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
Which memory location on a Cisco router or switch loses all content when the device is restarted?
ROM
Flash
NVRAM
RAM
Why would a technician enter the command copy startup-config running-config?
To remove all configurations from the switch
To save an active configuration to NVRAM
To copy an existing configuration into RAM
To make a changed configuration the new startup configuration
Which functionality is provided by DHCP?
Automatic assignment of an IP address to each host
Remote switch management
Translation of IP addresses to domain names
End-to-end connectivity test
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
Providing an error message when an incorrect command is submitted
Displaying a list of all commands available in the current mode
Allowing the user to complete the remainder of an abbreviated command with the Tab key
Determining which option, keyword, or argument is available for the entered command
Selecting the best command to accomplish a task
Which memory location on a Cisco router stores the startup configuration file?
RAM
ROM
NVRAM
Flash
What type of communication sends a message to all devices on a local area network?
Broadcast
Multicast
Unicast
Allcast
In computer communication, what is the purpose of message encoding?
To convert information to the appropriate form for transmission
To interpret information
To break large messages into smaller frames
To negotiate correct timing for successful communication
Which message delivery option is used when all devices need to receive the same message simultaneously?
Duplex
Unicast
Multicast
Broadcast
ϻWhat are two benefits of using a layered network model? (Choose two.)
It assists in protocol design.
It speeds up packet delivery.
It prevents designers from creating their own model.
It prevents technology in one layer from affecting other layers.
It ensures that a device at one layer can function at the next higher laver.
What is the purpose of protocols in data communications?
ϻ1.specifying the bandwidth of the channel or medium for each type of communication
Specifying the device operating systems that will support the communication
Providing the rules required for a specific type of communication to OCCur
Dictating the content of a message sent during communication
Which logical address is used for delivery of data to a remote network?
Destination MAC address
Destination IP address
Destination port number
Source MAC address
Source IP address
What is the general term that is used to describe a piece of data at any layer of a networking model?
Frame
Packet
Protocol data unit
Segment
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?
Application
Presentation
Session
Transport
Network
Which type of communication sends a message to a group of host destinations simultaneously?
Broadcast
Multicast
Unicast
Any cast
What process is used to receive transmitted data and convert it into a readable message?
Access control
Decoding
Encapsulation
Flow control
What process is used to place one message inside another message for transfer from a source to a destination?
Access control
Decoding
Encapsulation
Flow control
A web client is sending a request for a web page to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, IP, TCP, Ethernet
HTTP, TCP, IP, Ethernet
Ethernet, TCP, IP, HTTP
Ethernet, IP, TCP, HTTP
What is done to an IP packet before it is transmitted over the physical medium?
It is tagged with information, guaranteeing reliable delivery.
It is segmented into smaller individual pieces.
It is encapsulated into a TCP segment.
It is encapsulated in a Layer 2 frame.
Which protocol can be used to transfer messages from an email server to an email client?
SMTP
POP3
SNMP
SMB
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
IMAP
POP
SMTP
HTTPS
Which application layer protocol is used to provide file sharing and print services to Microsoft applications?
HTTP
SMTP
DHCP
SMB
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
Client
Fa aster
Server
Slave
Transient
Which statement is true about FTP?
A client can choose whether FTP should establish one or two connections.
A chent can download data from or upload to a server.
FIP is a peer-to-peer application.
FTP does not provide reliability during data transmission.
A wireless host needs to request an IPv4 address. What protocol would be used to process the request?
FTP
HTTP
DHCP
ICMP
SNMP
Which TCP/IP model layer is closest to the end user?
Application
Internet
Network access
Transport
Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
TCP
HTTP
MPEG
GIF
IP
UDP
Which protocol uses encryption?
DHCP
DNS
FTP
HTTPS
Why is DHCP for IPv4 preferred for use on large networks?
Large networks send more requests for domain-to-IP address resolution than do smaller networks.
DHCP uses a reliable transport protocol.
It prevents sharing of files that are copyrighted.
It is a more efficient way to manage IPv4 addresses than static address assignment.
Hosts on large networks require more IPv4 addressing contiguration settings than do hosts on small networks.
Which two tasks can be performed by a local DNS server? (Choose two.)
Providing IP addresses to local hosts
Allowing data transfer between two network devices
Mapping names to IP addresses for internal hosts
Forwarding name resolution requests between servers
Which device is most likely to provide dynamic IPv4 addressing to clients on a home network?
A dedicated file server
A home router
An ISP DHCP server
A DNS server
What part of the URL http://www.cisco.com/index.html represents the top-level DNS domain?
ϻcom
WWW
Http
Index
What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
Responsible for logical addressing
Responsible for physical addressing
Responsible for the creation and maintenance of dialogues between source and destination applications
Closest to the end user
Responsible for establishing window size
What message type does an HTTP client use to request data from a web server?
GET
POST
PUT
ACK
{"name":"Manas's quiz 1", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?, Which term refers to a network that provides secure access to the corporate offices for suppliers, customers, and collaborators?, A large corporation has modified its network to allow users to access network resources from their personal laptops and smartphones. Which networking trend does this describe?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}