Basic Network Connectivity and Communication Flashcards
Which two options are the best reasons to use an IPV4 private IP space? (Choose two.)
A. to enable intra-enterprise communication B. to implement NAT C. to connect applications D. to conserve global address space E. to manage routing overhead
A and D
What is the same for both copper and fiber interfaces when using SFP modules?
A. They support an inline optical attenuator to enhance signal strength B. They accommodate single-mode and multi-mode in a single module C. They provide minimal interruption to services by being hot-swappable D. They offer reliable bandwidth up to 100 Mbps in half duplex mode
Answer: C
What are two functions of a server on a network? (Choose two.)
A. handles requests from multiple workstations at the same time B. achieves redundancy by exclusively using virtual server clustering C. housed solely in a data center that is dedicated to a single client D. runs the same operating system in order to communicate with other servers E. runs applications that send and retrieve data for workstations that make requests
Answer : AE
Which function is performed by the collapsed core layer in a two-tier architecture?
A. enforcing routing policies B. marking interesting traffic for data policies C. applying security policies D. attaching users to the edge of the network
Answer: A
What is the primary function of a Layer 3 device?
A. to transmit wireless traffic between hosts B. to analyze traffic and drop unauthorized traffic from the Internet C. to forward traffic within the same broadcast domain D. to pass traffic between different networks
Answer : D
Which two functions are performed by the core layer in a three-tier architecture? (Choose two.)
A. Provide uninterrupted forwarding service B. Inspect packets for malicious activity C. Ensure timely data transfer between layers D. Provide direct connectivity for end user devices E. Police traffic that is sent to the edge of the network
Answer: AC
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
A. different nonoverlapping channels B. one overlapping channel C. one nonoverlapping channel D. different overlapping channels
Answer: A
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software that is only used occasionally. Which cloud service model does the engineer recommend?
A. infrastructure-as-a-service B. platform-as-a-service C. business process as service to support different types of service D. software-as-a-service
Answer: D
What are two functions of a Layer 2 switch? (Choose two.)
A. acts as a central point for association and authentication servers B. selects the best route between networks on a WAN C. moves packets within a VLAN D. moves packets between different VLANs E. makes forwarding decisions based on the MAC address of a packet
Answer: CE
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use
5GHz access points?
A. Client Band Select B. Re-Anchor Roamed Clients C. OEAP Spilt Tunnel D. 11ac MU-MIMO
Answer: A
Which networking function occurs on the data plane?
A. processing inbound SSH management traffic B. sending and receiving OSPF Hello packets C. facilitates spanning-tree elections D. forwarding remote client/server traffic
Answer: D
Under which condition is TCP preferred over UDP?
A. UDP is used when low latency is optimal, and TCP is used when latency is tolerable. B. TCP is used when dropped data is more acceptable, and UDP is used when data is accepted out-of-order. C. TCP is used when data reliability is critical, and UDP is used when missing packets are acceptable. D. UDP is used when data is highly interactive, and TCP is used when data is time-sensitive.
Answer: C
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
A. an intranet
B. the Internet
C. an extranet
D. a local area network
Answer: A
Which statement describes the use of powerline networking technology?
A. New “smart” electrical cabling is used to extend an existing home LAN.
B. A home LAN is installed without the use of physical cabling.
C. A device connects to an existing home LAN using an adapter and an existing electrical outlet.
D. Wireless access points use powerline adapters to distribute data through the home LAN.
Answer: C
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?
A. fault tolerance B. scalability C. security D. Quality of Service (QoS) E. reliability
Answer: C
What two criteria are used to help select a network medium from various network media? (Choose two.)
A. the types of data that need to be prioritized
B. the cost of the end devices utilized in the network
C. the distance the selected medium can successfully carry a signal
D. the number of intermediate devices installed in the network
E. the environment where the selected medium is to be installed
Answer: CE
What type of network traffic requires QoS?
A. email
B. on-line purchasing
C. video conferencing
D. wiki
Answer: C
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)
A. implementing a firewall
B. installing a wireless network
C. installing antivirus software
D. implementing an intrusion detection system
E. adding a dedicated intrusion prevention device
Answer: AC
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
A. VTY interface B. console interface C. Ethernet interface D. boot IOS mode E. privileged EXEC mode F. router configuration mode
Answer: ABE
Which interface allows remote management of a Layer 2 switch?
A. the AUX interface
B. the console port interface
C. the switch virtual interface
D. the first Ethernet port interface
Answer: C
What function does pressing the Tab key have when entering a command in IOS?
A. It aborts the current command and returns to configuration mode.
B. It exits configuration mode and returns to user EXEC mode.
C. It moves the cursor to the beginning of the next line.
D. It completes the remainder of a partially typed word in a command.
Answer: D
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
A. Issue the reload command without saving the running configuration.
B. Delete the vlan.dat file and reboot the device.
C. Close and reopen the terminal emulation software.
D. Issue the copy startup-config running-config command.
Answer: A
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?
A. to restart the ping process
B. to interrupt the ping process
C. to exit to a different configuration mode
D. to allow the user to complete the command
Answer: B
Which command or key combination allows a user to return to the previous level in the command hierarchy?
A. end
B. exit
C. Ctrl-Z
D. Ctrl-C
Answer: B
What are two characteristics of RAM on a Cisco device? (Choose two.)
A. RAM provides nonvolatile storage.
B. The configuration that is actively running on the device is stored in RAM.
C. The contents of RAM are lost during a power cycle.
D. RAM is a component in Cisco switches but not in Cisco routers.
E. RAM is able to store multiple versions of IOS and configuration files.
Answer: BC
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)
A. Branch2! B. RM-3-Switch-2A4 C. Floor(15) D. HO Floor 17 E. SwBranch799
Answer: BE
How is SSH different from Telnet?
A. SSH makes connections over the network, whereas Telnet is for out-of-band access.
B. SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
C. SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet.
D. SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection.
Answer: B
What are three characteristics of an SVI? (Choose three.)
A. It is designed as a security protocol to protect switch ports.
B. It is not associated with any physical interface on a switch.
C. It is a special interface that allows connectivity by different types of media.
D. It is required to allow connectivity by any device at any location.
E. It provides a means to remotely manage a switch.
F. It is associated with VLAN1 by default.
Answer: BEF