ClubEnsayos.com - Ensayos de Calidad, Tareas y Monografias
Buscar

Test CCNA 1 Charter 11 Version 5


Enviado por   •  4 de Julio de 2014  •  1.072 Palabras (5 Páginas)  •  253 Visitas

Página 1 de 5

1 Which two statements about a service set identifier (SSID) are true? (Choose two.)

responsible for determining the signal strength

used to encrypt data sent across the wireless network

all wireless devices on the same WLAN must have the same SSID

consists of a 32-character string and is not case sensitive

tells a wireless device to which WLAN it belongs

2 Which type of network attack involves the disabling or corruption of networks, systems, or services?

access attacks

denial of service attacks

reconnaissance attacks

malicious code attacks

3 Which command will backup the configuration that is stored in NVRAM to a TFTP server?

copy tftp running-config

copy startup-config tftp

copy running-config tftp

copy tftp startup-config

4 Open the PT Activity.

How long will a user be blocked if the user exceeds the maximum allowed number of unsuccessful login attempts?

3 minutes

1 minute

4 minutes

2 minutes

5 Fill in the blank. Do not use abbreviations.

The ” show version ” command that is issued on a router is used to verify the value of the software configuration register.

6 What is a security feature of using NAT on a network?

denies all packets that originate from private IP addresses

allows internal IP addresses to be concealed from external users

denies all internal hosts from communicating outside their own network

allows external IP addresses to be concealed from internal users

7 A network administrator has determined that various computers on the network are infected with a worm. Which sequence of steps should be followed to mitigate the worm attack?

containment, quarantine, treatment, and inoculation

treatment, quarantine, inoculation, and containment

inoculation, containment, quarantine, and treatment

containment, inoculation, quarantine, and treatment

8 Which WLAN security protocol generates a new dynamic key each time a client establishes a connection with the AP?

PSK

WPA

EAP

WEP

9 Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?

Something is causing interference between H1 and R1.

H3 is not connected properly to the network.

Performance between the networks is within expected parameters.

Connectivity between H1 and H3 is fine.

Something is causing a time delay between the networks.

10 When should an administrator establish a network baseline?

when the traffic is at peak in the network

when there is a sudden drop in traffic

at the lowest point of traffic in the network

at regular intervals over a period of time

11 A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?

The network administrator wants to verify the IP address configured on router R2.

The network administrator suspects a virus because the ping command did not work.

The network administrator wants to determine if connectivity can be established from a non-directly connected network.

The network administrator wants to verify Layer 2 connectivity.

12 Which statement is true about CDP on a Cisco device?

To disable CDP globally, the no cdp enable command in interface configuration mode must be used.

The show cdp neighbor detail command will reveal the IP

...

Descargar como (para miembros actualizados)  txt (7.3 Kb)  
Leer 4 páginas más »
Disponible sólo en Clubensayos.com