Beruflich Dokumente
Kultur Dokumente
1. Which two functions are provided by the upper layers of the OSI model? (Choose two.)
A. placing electrical signals on the medium for transmission
B. initiating the network communication process
C. encrypting and compressing data for transmission
D. segmenting and identifying data for reassembly at the destination
E. choosing the appropriate path for the data to take through the network
2. Which device is responsible for moving packets between multiple network segments?
A. Router
B. Switch
C. CSU/DSU
D. IDS device
3. Which is a function of the transport layer of the OSI model?
A. routes data between networks
B. converts data to bits for transmission
C. delivers data reliably across the network using TCP
D. formats and encodes data for transmission
E. transmits data to the next directly connected device
4. An investment company has multiple servers that hold mission critical datThey are
worried that ifsomething happens to these servers, they will lose this valuable
information. Which type of plan isneeded for this company to help minimize loss in the
event of a server crash?
A. business security
B. business continuity
C. network maintenance
D. service level agreement
5. Which two router parameters can be set from interface configuration mode? (Choose
two.)
A. IP address
B. Telnet password
C. Hostname
D. console password
E. subnet mask
F. enable secret password
6. Which common Layer 1 problem can cause a user to lose connectivity?
A. incorrect subnet mask
B. incorrect default gateway
C. loose network cable
D. NIC improperly installed
7. A DoS attack crippled the daily operations of a large company for 8 hours. Which two
optionscould be implemented by the network administrator to possibly prevent such an
attack in the future? (Choose two.)
A. install security devices with IDS and IPS at the enterprise edge
B. reset all user passwords every 30 days
C. filter packets based on IP address, traffic pattern, and protocol
D. deny external workers VPN access to internal resources
E. ensure critical devices are physically secure and placed behind the demarc
14. A network manager wants to have processes in place to ensure that network upgrades
do not affectbusiness operations. What will the network manager create for this
purpose?
A. business security plan
B. business continuity plan
C. service level agreement
D. network maintenance plan
15. When searching for information about authentication methods and usernames of
companypersonnel, where can a network administrator look?
A. Business Continuity Plan
B. Business Security Plan
C. Network Maintenance Plan
D. Service Level Agreement
16. Refer to the exhibit. Which statement is true about port Fa5/1?
A. When a violation is detected, the port will log the information to a syslog server.
B. When a violation is detected, the port will go into err-disable mod
C. There have been 11 security violations since the last reload
D. The port is currently in the shutdown state.
17. What is the demarcation?
A. physical point where the ISP responsibilty ends and the customer responsibilty begins
B. physical location where all server farm connections meet before being distributed into the
Core
C. point of entry for outside attacks and is often vulnerabl
D. point of entry for all Access Layer connections from the Distribution Layer devices
18. What information can an administrator learn using the show version command?
A. Cisco IOS filename
B. configured routing protocol
C. status of each interface
D. IP addresses of all interfaces
19. It is crucial that network administrators be able to examine and configure network
devices fromtheir homes. Which two approaches allow this connectivity without
increasing vulnerability to externalattacks? (Choose two.)
A. Configure a special link at the POP to allow external entry from the home computer.
B. Set up VPN access between the home computer and the network.
C. Install a cable modem in the home to link to the network.
D. Configure ACLs on the edge routers that allow only authorized users to access
management portson network devices.
E. Configure a server in the DMZ with a special username and password to allow external
access.
20. What type of connection point is a point of presence (POP)?
A. between a client and a host
B. between two local networks
C. between a computer and a switch
D. between an ISP and an Enterprise network
21. Which three command line utilities are most commonly used to troubleshoot issues at
Layer 3? (Choose three.)
A. ping
B. a packet sniffer
C. Telnet
D. ipconfig
E. Traceroute
22. Which address is used by the router to direct a packet between networks?
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37. Which layers of the OSI model are commonly referred to as the upper layers?
A. application, presentation, session application, session, network
B. presentation, transport, network
C. presentation, network, data link
D. session, transport, network