Module 1- 101-125 Flashcards
Match the firewall function to the type of threat protection it provides to the network.
-packet filtering – prevents access based on IP or MAC address
-URL filtering – prevents access to websites
network address translator – (none)
stateful packet inspection – prevents unsolicited incoming sessions
application filtering – prevents access by port number
How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords that are stored in router or switch configuration files.
Explain: The service password-encryption command encrypts plaintext passwords in the configuration file so that they cannot be viewed by unauthorized users.
Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?
the network performance baseline
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
-Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
-The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed
The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?
255.255.255.224
What characteristic describes identity theft?
the use of stolen credentials to access private data
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.0
What are three commonly followed standards for constructing and installing cabling? (Choose three.)
cost per meter (foot)
cable lengths
connector color
pinouts
connector types
tensile strength of plastic insulator
cable lengths
pinouts
connector types
Refer to the exhibit. What is wrong with the displayed termination?
The untwisted length of each wire is too long.
110 Look online
look online 110
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?
IMAP
What are two characteristics shared by TCP and UDP? (Choose two.)
default window size
connectionless communication
port numbering
3-way handshake
ability to to carry digitized voice
use of checksum
port numbering
use of checksum
113 review online
review online 113
A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?
FTP
What attribute of a NIC would place it at the data link layer of the OSI model?
MAC address