Podcast
Questions and Answers
Which type of threat is affecting the computer that secretly collects data about visited websites?
Which type of threat is affecting the computer that secretly collects data about visited websites?
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Which networking trend is described when a large corporation allows users to access network resources from personal devices?
Which networking trend is described when a large corporation allows users to access network resources from personal devices?
What does ISP stand for?
What does ISP stand for?
Signup and view all the answers
Which network would an employee access if they need to retrieve confidential pricing information from internal servers at the Head Office?
Which network would an employee access if they need to retrieve confidential pricing information from internal servers at the Head Office?
Signup and view all the answers
What does powerline networking technology refer to?
What does powerline networking technology refer to?
Signup and view all the answers
What is the technician working on at the medical clinic?
What is the technician working on at the medical clinic?
Signup and view all the answers
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Signup and view all the answers
Which two criteria are used to help select a network medium from various network media?
Which two criteria are used to help select a network medium from various network media?
Signup and view all the answers
What type of network traffic requires QoS?
What type of network traffic requires QoS?
Signup and view all the answers
Which two actions would provide the minimum security requirements for a small office network?
Which two actions would provide the minimum security requirements for a small office network?
Signup and view all the answers
Which modes and interfaces can be protected with passwords to restrict access to the Cisco IOS?
Which modes and interfaces can be protected with passwords to restrict access to the Cisco IOS?
Signup and view all the answers
Which interface allows remote management of a Layer 2 switch?
Which interface allows remote management of a Layer 2 switch?
Signup and view all the answers
What function does pressing the Tab key have when entering a command in IOS?
What function does pressing the Tab key have when entering a command in IOS?
Signup and view all the answers
Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
Signup and view all the answers
What does the 'service password-encryption' command accomplish?
What does the 'service password-encryption' command accomplish?
Signup and view all the answers
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
Signup and view all the answers
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
Signup and view all the answers
What three application layer protocols are part of the TCP/IP protocol suite?
What three application layer protocols are part of the TCP/IP protocol suite?
Signup and view all the answers
Which name is assigned to the transport layer PDU?
Which name is assigned to the transport layer PDU?
Signup and view all the answers
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
Signup and view all the answers
Which term describes a network where one computer can be both client and server?
Which term describes a network where one computer can be both client and server?
Signup and view all the answers
Which term describes a type of network used by people who work from home or from a small remote office?
Which term describes a type of network used by people who work from home or from a small remote office?
Signup and view all the answers
Which term describes a computing model where server software runs on dedicated computers?
Which term describes a computing model where server software runs on dedicated computers?
Signup and view all the answers
Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?
Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?
Signup and view all the answers
Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Signup and view all the answers
Which term describes a private collection of LANs and WANs that belongs to an organization?
Which term describes a private collection of LANs and WANs that belongs to an organization?
Signup and view all the answers
Which term describes the ability to use personal devices across a business or campus network?
Which term describes the ability to use personal devices across a business or campus network?
Signup and view all the answers
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
Signup and view all the answers
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
Signup and view all the answers
Which command can be used to encrypt passwords in a configuration file?
Which command can be used to encrypt passwords in a configuration file?
Signup and view all the answers
What is the purpose of the 'service password-encryption' command?
What is the purpose of the 'service password-encryption' command?
Signup and view all the answers
Which layer of the TCP/IP model is responsible for routing messages through an internetwork?
Which layer of the TCP/IP model is responsible for routing messages through an internetwork?
Signup and view all the answers
Which three application layer protocols are part of the TCP/IP protocol suite?
Which three application layer protocols are part of the TCP/IP protocol suite?
Signup and view all the answers
Which layer of the OSI model adds a logical address during encapsulation?
Which layer of the OSI model adds a logical address during encapsulation?
Signup and view all the answers
What is the advantage of network devices using open standard protocols?
What is the advantage of network devices using open standard protocols?
Signup and view all the answers
Which device determines the path that messages should take through internetworks?
Which device determines the path that messages should take through internetworks?
Signup and view all the answers
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Signup and view all the answers
What two criteria are used to help select a network medium from various network media?
What two criteria are used to help select a network medium from various network media?
Signup and view all the answers
What type of network traffic requires QoS?
What type of network traffic requires QoS?
Signup and view all the answers
Which two actions would provide the minimum security requirements for a small office network?
Which two actions would provide the minimum security requirements for a small office network?
Signup and view all the answers
Which interface allows remote management of a Layer 2 switch?
Which interface allows remote management of a Layer 2 switch?
Signup and view all the answers
What function does pressing the Tab key have when entering a command in IOS?
What function does pressing the Tab key have when entering a command in IOS?
Signup and view all the answers
What action can a technician take to discard the changes made to a router configuration file in NVRAM?
What action can a technician take to discard the changes made to a router configuration file in NVRAM?
Signup and view all the answers
Which type of threat is affecting the computer that secretly collects data about visited websites?
Which type of threat is affecting the computer that secretly collects data about visited websites?
Signup and view all the answers
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Signup and view all the answers
Which networking trend does the modification of the network to allow users to access network resources from personal laptops and smart phones describe?
Which networking trend does the modification of the network to allow users to access network resources from personal laptops and smart phones describe?
Signup and view all the answers
What does ISP stand for?
What does ISP stand for?
Signup and view all the answers
Which type of network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?
Which type of network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?
Signup and view all the answers
Which statement describes the use of powerline networking technology?
Which statement describes the use of powerline networking technology?
Signup and view all the answers
What is the networking technician working on at the medical clinic?
What is the networking technician working on at the medical clinic?
Signup and view all the answers
Which term describes a network where one computer can be both client and server?
Which term describes a network where one computer can be both client and server?
Signup and view all the answers
What term describes a type of network used by people who work from home or from a small remote office?
What term describes a type of network used by people who work from home or from a small remote office?
Signup and view all the answers
What term describes a computing model where server software runs on dedicated computers?
What term describes a computing model where server software runs on dedicated computers?
Signup and view all the answers
What term describes a technology that allows devices to connect to the LAN using an electrical outlet?
What term describes a technology that allows devices to connect to the LAN using an electrical outlet?
Signup and view all the answers
What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Signup and view all the answers
What term describes a private collection of LANs and WANs that belongs to an organization?
What term describes a private collection of LANs and WANs that belongs to an organization?
Signup and view all the answers
What term describes the ability to use personal devices across a business or campus network?
What term describes the ability to use personal devices across a business or campus network?
Signup and view all the answers
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
Signup and view all the answers
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
Signup and view all the answers