Podcast Beta
Questions and Answers
Which type of threat is affecting the computer that secretly collects data about visited websites?
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Which networking trend is described when a large corporation allows users to access network resources from personal devices?
What does ISP stand for?
Signup and view all the answers
Which network would an employee access if they need to retrieve confidential pricing information from internal servers at the Head Office?
Signup and view all the answers
What does powerline networking technology refer to?
Signup and view all the answers
What is the technician working on at the medical clinic?
Signup and view all the answers
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Signup and view all the answers
Which two criteria are used to help select a network medium from various network media?
Signup and view all the answers
What type of network traffic requires QoS?
Signup and view all the answers
Which two actions would provide the minimum security requirements for a small office network?
Signup and view all the answers
Which modes and interfaces can be protected with passwords to restrict access to the Cisco IOS?
Signup and view all the answers
Which interface allows remote management of a Layer 2 switch?
Signup and view all the answers
What function does pressing the Tab key have when entering a command in IOS?
Signup and view all the answers
Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
Signup and view all the answers
What does the 'service password-encryption' command accomplish?
Signup and view all the answers
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
Signup and view all the answers
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
Signup and view all the answers
What three application layer protocols are part of the TCP/IP protocol suite?
Signup and view all the answers
Which name is assigned to the transport layer PDU?
Signup and view all the answers
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
Signup and view all the answers
Which term describes a network where one computer can be both client and server?
Signup and view all the answers
Which term describes a type of network used by people who work from home or from a small remote office?
Signup and view all the answers
Which term describes a computing model where server software runs on dedicated computers?
Signup and view all the answers
Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?
Signup and view all the answers
Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Signup and view all the answers
Which term describes a private collection of LANs and WANs that belongs to an organization?
Signup and view all the answers
Which term describes the ability to use personal devices across a business or campus network?
Signup and view all the answers
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
Signup and view all the answers
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
Signup and view all the answers
Which command can be used to encrypt passwords in a configuration file?
Signup and view all the answers
What is the purpose of the 'service password-encryption' command?
Signup and view all the answers
Which layer of the TCP/IP model is responsible for routing messages through an internetwork?
Signup and view all the answers
Which three application layer protocols are part of the TCP/IP protocol suite?
Signup and view all the answers
Which layer of the OSI model adds a logical address during encapsulation?
Signup and view all the answers
What is the advantage of network devices using open standard protocols?
Signup and view all the answers
Which device determines the path that messages should take through internetworks?
Signup and view all the answers
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Signup and view all the answers
What two criteria are used to help select a network medium from various network media?
Signup and view all the answers
What type of network traffic requires QoS?
Signup and view all the answers
Which two actions would provide the minimum security requirements for a small office network?
Signup and view all the answers
Which interface allows remote management of a Layer 2 switch?
Signup and view all the answers
What function does pressing the Tab key have when entering a command in IOS?
Signup and view all the answers
What action can a technician take to discard the changes made to a router configuration file in NVRAM?
Signup and view all the answers
Which type of threat is affecting the computer that secretly collects data about visited websites?
Signup and view all the answers
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Signup and view all the answers
Which networking trend does the modification of the network to allow users to access network resources from personal laptops and smart phones describe?
Signup and view all the answers
What does ISP stand for?
Signup and view all the answers
Which type of network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?
Signup and view all the answers
Which statement describes the use of powerline networking technology?
Signup and view all the answers
What is the networking technician working on at the medical clinic?
Signup and view all the answers
Which term describes a network where one computer can be both client and server?
Signup and view all the answers
What term describes a type of network used by people who work from home or from a small remote office?
Signup and view all the answers
What term describes a computing model where server software runs on dedicated computers?
Signup and view all the answers
What term describes a technology that allows devices to connect to the LAN using an electrical outlet?
Signup and view all the answers
What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Signup and view all the answers
What term describes a private collection of LANs and WANs that belongs to an organization?
Signup and view all the answers
What term describes the ability to use personal devices across a business or campus network?
Signup and view all the answers
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
Signup and view all the answers
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
Signup and view all the answers