Details of this Paper





1. Question: (TCO 2) _____ is the layer in hierarchical network design that is concerned with switching packets as fast as possible.;Select Access Layer;Core Layer;Access Link;Core Link;Instructor Explanation: Chapter 1;2. Question: (TCO 2) The point at which the customer turns over control to the WAN service provider refers to the _____.;Select data circuit-terminating equipment;data terminal equipment;last mile;demarcation point;Instructor Explanation: Chapter 1;3. Question: (TCO 2) _____ is an industry-standard, switched data-link-layer protocol that handles multiple virtual circuits using HDLC encapsulation between connected devices.;Select Basic Rate Interface;Primary Rate Interface;Frame Relay;Cell;Instructor Explanation: Chapter 1;4. Question: (TCO 6) Asymmetric encryption is utilized in VPNs to;Select encrypt and decrypt using different keys.;encrypt and decrypt using a shared secret key.;create a number generated from a string of text, sometimes calledmessage digest.;utilize only numbers to secure information.;Instructor Explanation: Chapter 6;5. Question: (TCO 6) What contributes to data integrity and authentication by ensuring that unauthorized persons do not tamper with transmitted messages?;Select Encryption;Descryption;Hash;Tunneling;Instructor Explanation: Chapter 6;6. Question: (TCO 6) IEEE 802.16 is defined as;Select the IEEE WLAN standard for 11 Mbps at 2.4 GHz.;the IEEE WiMAX standard for 70 Mbps at ranges up to 30 miles in the 2?6 GHZ spectrum.;the IEEE WLAN standard for 54 Mbps at 2.4 GHz.;the IEEE WLAN standard for 248 Mbps at 2.4 or 5 GHZ.;Instructor Explanation: Chapter 6;7. Question: (TCO 3) _____ is used to establish and configure different network layer protocols.;Select Frame Relay;X.25;LCP;NCP;Instructor Explanation: Chapter 2 page 95;8. Question: (TCO 3) _____ is one of the PPP LCP options that peer routers use to identify fault conditions.;Select Compression;Error detection;Multilink;Authentication;Instructor Explanation: Chapter 2 page 89;9. Question: (TCO 3) The third phase of PPP establishment is;Select to test link quality.;to send link-establishment frames to negotiate options such as MTU size, compression, and authentication.;to negotiate Layer 3 protocol options.;to send confirmation-acknowledgement frames.;Instructor Explanation: Chapter 2 page 88;10. Question: (TCO 3) Which of the following is a characteristic of PAP?;Select Uses a one-way hash function;Periodic verification;Three-way handshake;Two-way handshake;Instructor Explanation: Chapter 2 page 110;1. Question: (TCO 4) What is the command that verifies that Frame Relay is running correctly?;Select show interfaces;encapsulation frame-relay;show frame-relay map;debug frame-relay;Instructor Explanation: Chapter 3;2. Question: (TCO 4) Frame Relay can partition a physical interface into multiple virtual interfaces called _____.;Select subinterfaces;multilinks;split horizons;broadcasts;Instructor Explanation: Chapter 3;3. Question: (TCO 4) The difference between a star topology and a frame relay star topology is that the latter has _____.;Select more routers;servers;VCs;more hubs;Instructor Explanation: Chapter 3;4. Question: (TCO 4) Which one of these answers is not an advantage of Frame Relay?;Select Greater bandwidth;Reliability;Less equipment;More complex;Instructor Explanation: Chapter 3;5. Question: (TCO 7) This person uses e-mail or another means to lure others into providing sensitive information, such as credit card numbers or passwords.;Select White hat;Phisher;Cracker;Spammer;Instructor Explanation: Chapter 4;6. Question: (TCO 7) Applying a specific algorithm to data to alter their appearance, making them incomprehensible to those who are not authorized to see the information, is known as;Select decryption.;a virus.;a worm.;encryption.;Instructor Explanation: Chapter 4;7. Question: (TCO 7) Over the years the types and methods of security attacks have evolved. What kind of network attack became prevalent starting around 1985?;Select Password guessing and code replication;Password cracking and war dialing;Viruses, including the ILOVEYOU worm, Nimda, and Code Red;Trojan horses such as Back Orifice;Instructor Explanation: Chapter 4 page 191;8. Question: (TCO 7) Securing router network services most commonly needs to be done at what IOS layer?;Select Network;Application;Physical;Data link;Instructor Explanation: Chapter 3;9. Question: (TCO 7) What type of attack uses a compromised host to pass traffic through a firewall that would otherwise be dropped or blocked?;Select Reconnaissance attack;Password attack;Port redirection;DoS attack;Instructor Explanation: Chapter 4 page 210;10. Question: (TCO 7) Which network policy defines the standards for connecting to the internal network from outside the organization?;Select Account-access-request policy;Remote-access policy;Risk-assessment policy;Audit policy;Instructor Explanation: Chapter 4 page 231;1. Question: (TCO 1) Which of the following choices displays IPv6 neighbor discovery cache information?;Select show ipv6 neighbor;show ipv6 neighbors;show neighbors;ipv6 neighbors;Instructor Explanation: Chapter 7;2. Question: (TCO 1) _____ is an integration method in which a node has implementation and connectivity to both an IPv4 and IPv6 network.;Select Tunneling;Dual stacking;A 6to4 tunnel;A Teredo tunnel;Instructor Explanation: Chapter 7;3. Question: (TCO 1) Dynamic NAT maps private IP addresses to public addresses drawn from a;Select pool.;NAT pool.;interface.;source.;Instructor Explanation: Chapter 7;4. Question: (TCO 1) When IPv6 is implemented, the routing protocol RIPng will have these features, but it;Select uses IPv6 for transport.;sends updates on UPD port 521.;includes the IPv6 prefix and next-hop IPv6 address.;is limited in multicasting.;Instructor Explanation: Chapter 7;5. Question: (TCO 1) The command to display information about the total amount of active NAT translations, NAT configuration parameters, how many addresses are in the poll, and how many have been allocated is;Select show nat statistics.;show ip nat statistic.;show ip nat stats.;show ip nat statistics.;Instructor Explanation: Chapter 7;6. Question: (TCO 5) _____ control(s) access to a network by analyzing the incoming and outgoing packets and passing or halting them based on stated criteria.;Select IDS;Packet filtering;Circuit switching;Packet switching;Instructor Explanation: Chapter 5;7. Question: (TCO 5) Some of the ways that ACLs should be placed in a network include all of the following except;Select using ACLs in firewall routers positioned between two parts of your network and an external network, such as the Internet.;using ACLs on a router positioned between two parts of your network to control traffic entering or exiting a specific part of your internal network.;configuring ACLs for each network protocol configured on the border router interfaces. You can configure ACLs on an interface to filter inbound traffic, outbound traffic, or both.;configuring ACLs on border routers only, or routers situated at the edges of the networks.;Instructor Explanation: Chapter 5;8. Question: (TCO 5) To configure a numbered ACL-designated 5 that would permit network, you would enter _____.;Select R1(config)# access-list 5 permit;R1(config)# access-list 5 permit;R1# access-list 5 permit;R1(config)# access-list permit;Instructor Explanation: Chapter 5;9. Question: (TCO 5) The established parameter in the extended ACL configuration means it;Select indicates an established connection for TCP protocol only.;indicates an established connection for IP protocol only.;indicates an established connection for UDP protocol only.;indicates an established connection for IPX protocol only.;Instructor Explanation: Chapter 5;10. Question: (TCO 5) access-list 100 permit tcp eq 80;Base on the access list above, to what destinations will the source device be allowed to web browse?;Select;;any;;Instructor Explanation: Chapter 5


Paper#68541 | Written in 18-Jul-2015

Price : $22