Module 1- 101-125 Flashcards

1
Q

Match the firewall function to the type of threat protection it provides to the network.

A

-packet filtering – prevents access based on IP or MAC address
-URL filtering – prevents access to websites
network address translator – (none)
stateful packet inspection – prevents unsolicited incoming sessions
application filtering – prevents access by port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the service password-encryption command enhance password security on Cisco routers and switches?

A

It encrypts passwords that are stored in router or switch configuration files.

Explain: The service password-encryption command encrypts plaintext passwords in the configuration file so that they cannot be viewed by unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

A

the network performance baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

A

-Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

-The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed

The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

A

255.255.255.224

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What characteristic describes identity theft?

A

the use of stolen credentials to access private data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are three commonly followed standards for constructing and installing cabling? (Choose three.)

cost per meter (foot)
cable lengths
connector color
pinouts
connector types
tensile strength of plastic insulator

A

cable lengths
pinouts
connector types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. What is wrong with the displayed termination?

A

The untwisted length of each wire is too long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

110 Look online

A

look online 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?

A

IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two characteristics shared by TCP and UDP? (Choose two.)

default window size
connectionless communication
port numbering
3-way handshake
ability to to carry digitized voice
use of checksum

A

port numbering

use of checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

113 review online

A

review online 113

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What attribute of a NIC would place it at the data link layer of the OSI model?

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?

A

255.255.255.240