Podcast
Questions and Answers
Which type of threat is affecting the computer that secretly collects data about visited websites?
Which type of threat is affecting the computer that secretly collects data about visited websites?
- Malware
- Phishing
- Spyware (correct)
- Adware
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
- MAN
- VPN (correct)
- WAN
- LAN
Which networking trend is described when a large corporation allows users to access network resources from personal devices?
Which networking trend is described when a large corporation allows users to access network resources from personal devices?
- Cloud Computing
- BYOD (correct)
- IoT
- Virtualization
What does ISP stand for?
What does ISP stand for?
Which network would an employee access if they need to retrieve confidential pricing information from internal servers at the Head Office?
Which network would an employee access if they need to retrieve confidential pricing information from internal servers at the Head Office?
What does powerline networking technology refer to?
What does powerline networking technology refer to?
What is the technician working on at the medical clinic?
What is the technician working on at the medical clinic?
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Which two criteria are used to help select a network medium from various network media?
Which two criteria are used to help select a network medium from various network media?
What type of network traffic requires QoS?
What type of network traffic requires QoS?
Which two actions would provide the minimum security requirements for a small office network?
Which two actions would provide the minimum security requirements for a small office network?
Which modes and interfaces can be protected with passwords to restrict access to the Cisco IOS?
Which modes and interfaces can be protected with passwords to restrict access to the Cisco IOS?
Which interface allows remote management of a Layer 2 switch?
Which interface allows remote management of a Layer 2 switch?
What function does pressing the Tab key have when entering a command in IOS?
What function does pressing the Tab key have when entering a command in IOS?
Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
What does the 'service password-encryption' command accomplish?
What does the 'service password-encryption' command accomplish?
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
What three application layer protocols are part of the TCP/IP protocol suite?
What three application layer protocols are part of the TCP/IP protocol suite?
Which name is assigned to the transport layer PDU?
Which name is assigned to the transport layer PDU?
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
Which term describes a network where one computer can be both client and server?
Which term describes a network where one computer can be both client and server?
Which term describes a type of network used by people who work from home or from a small remote office?
Which term describes a type of network used by people who work from home or from a small remote office?
Which term describes a computing model where server software runs on dedicated computers?
Which term describes a computing model where server software runs on dedicated computers?
Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?
Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?
Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Which term describes a private collection of LANs and WANs that belongs to an organization?
Which term describes a private collection of LANs and WANs that belongs to an organization?
Which term describes the ability to use personal devices across a business or campus network?
Which term describes the ability to use personal devices across a business or campus network?
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
Which command can be used to encrypt passwords in a configuration file?
Which command can be used to encrypt passwords in a configuration file?
What is the purpose of the 'service password-encryption' command?
What is the purpose of the 'service password-encryption' command?
Which layer of the TCP/IP model is responsible for routing messages through an internetwork?
Which layer of the TCP/IP model is responsible for routing messages through an internetwork?
Which three application layer protocols are part of the TCP/IP protocol suite?
Which three application layer protocols are part of the TCP/IP protocol suite?
Which layer of the OSI model adds a logical address during encapsulation?
Which layer of the OSI model adds a logical address during encapsulation?
What is the advantage of network devices using open standard protocols?
What is the advantage of network devices using open standard protocols?
Which device determines the path that messages should take through internetworks?
Which device determines the path that messages should take through internetworks?
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?
What two criteria are used to help select a network medium from various network media?
What two criteria are used to help select a network medium from various network media?
What type of network traffic requires QoS?
What type of network traffic requires QoS?
Which two actions would provide the minimum security requirements for a small office network?
Which two actions would provide the minimum security requirements for a small office network?
Which interface allows remote management of a Layer 2 switch?
Which interface allows remote management of a Layer 2 switch?
What function does pressing the Tab key have when entering a command in IOS?
What function does pressing the Tab key have when entering a command in IOS?
What action can a technician take to discard the changes made to a router configuration file in NVRAM?
What action can a technician take to discard the changes made to a router configuration file in NVRAM?
Which type of threat is affecting the computer that secretly collects data about visited websites?
Which type of threat is affecting the computer that secretly collects data about visited websites?
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Which networking trend does the modification of the network to allow users to access network resources from personal laptops and smart phones describe?
Which networking trend does the modification of the network to allow users to access network resources from personal laptops and smart phones describe?
What does ISP stand for?
What does ISP stand for?
Which type of network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?
Which type of network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?
Which statement describes the use of powerline networking technology?
Which statement describes the use of powerline networking technology?
What is the networking technician working on at the medical clinic?
What is the networking technician working on at the medical clinic?
Which term describes a network where one computer can be both client and server?
Which term describes a network where one computer can be both client and server?
What term describes a type of network used by people who work from home or from a small remote office?
What term describes a type of network used by people who work from home or from a small remote office?
What term describes a computing model where server software runs on dedicated computers?
What term describes a computing model where server software runs on dedicated computers?
What term describes a technology that allows devices to connect to the LAN using an electrical outlet?
What term describes a technology that allows devices to connect to the LAN using an electrical outlet?
What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
What term describes a private collection of LANs and WANs that belongs to an organization?
What term describes a private collection of LANs and WANs that belongs to an organization?
What term describes the ability to use personal devices across a business or campus network?
What term describes the ability to use personal devices across a business or campus network?
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
Flashcards are hidden until you start studying