Final 5

Create an image of a modern networking environment with routers, switches, and network diagrams in a computer lab setting, with a bright and inviting atmosphere.

Network Knowledge Quiz

Test your understanding of networking concepts and protocols with our comprehensive quiz designed for networking enthusiasts and professionals alike.

Whether you are preparing for a certification, brushing up on your skills, or looking to challenge yourself, this quiz includes various topics such as:

  • Access Control Lists (ACLs)
  • Network Topologies
  • SNMP and Security Levels
  • API Requests and JSON Structures
10 Questions2 MinutesCreated by TestingTree42
An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp . If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?
Permitted
Denied
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​
The spine and leaf switches are always linked through core switches.
The spine switches attach to the leaf switches and attach to each other for redundancy.
The leaf switches always attach to the spines and they are interlinked through a trunk line.
The leaf switches always attach to the spines, but they never attach to each other.
Which two scenarios would result in a duplex mismatch? (Choose two.)
Connecting a device with autonegotiation to another that is manually set to full-duplex
Starting and stopping a router interface during a normal operation
Connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps
Configuring dynamic routing incorrectly
Manually setting the two connected devices to different duplex modes
A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?
Authenticates a packet by a string match of the username or community string
Authenticates a packet by using either the HMAC with MD5 method or the SHA method
Authenticates a packet by using either the HMAC MD5 or 3.HMAC SHA algorithms and encrypts the packet with either the DES, 3DES or AES algorithms
Authenticates a packet by using the SHA algorithm only
What are two types of attacks used on DNS open resolvers? (Choose two.)
Amplification and reflection
Resource utilization
Fast flux
ARP poisoning
Cushioning
An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet . If a packet with a source address of 192.168.101.45, a destination address of 64.100.40.4, and a protocol of 23 is received on the interface, is the packet permitted or denied?
Denied
Permitted
Which type of resources are required for a Type 1 hypervisor?
A dedicated VLAN
A management console
A host operating system
In JSON, what is held within square brackets [ ]?
Nested values
Key/value pairs
An object
An array
What are three components used in the query portion of a typical RESTful API request? (Choose three.)
Resources
Protocol
API server
Format
Key
Parameters
A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?
Top-down
Bottom-up
Divide-and-conquer
Substitution
{"name":"Final 5", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your understanding of networking concepts and protocols with our comprehensive quiz designed for networking enthusiasts and professionals alike.Whether you are preparing for a certification, brushing up on your skills, or looking to challenge yourself, this quiz includes various topics such as:Access Control Lists (ACLs)Network TopologiesSNMP and Security LevelsAPI Requests and JSON Structures","img":"https:/images/course7.png"}
Powered by: Quiz Maker