Search Header Logo

Cisco baza 1-40

Authored by Daniyar Dzhumabaev

Fun

University

Used 34+ times

Cisco baza 1-40
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?

designated, alternate, root, root

designated, root, alternate, root

alternate, root, designated, root

alternate, designated, root, root

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?

MAC address of the virtual router

MAC addresses of both the forwarding and standby routers

MAC address of the standby router

MAC address of the forwarding router

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a secure configuration option for remote access to a network device?

Configure SSH.

Configure 802.1x.

Configure an ACL and apply it to the VTY lines.

Configure Telnet.

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?

The host checks the local neighbor cache for the learned address and if the address is not cached, it it considered unique.

The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.

The host sends an ICMPv6 echo request message to the DHCPv6 or SLAAC-learned address and if no reply is returned, the address is considered unique.

The host sends an ARP broadcast to the local link and if no hosts send a reply, the address is considered unique.

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?

Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.10

Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.1

Source MAC: 00E0.FE10.17A3 Source IP: 10.1.1.10

Source MAC: 00E0.FE91.7799 Source IP: 192.168.1.1

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?

standalone wireless access point

firewall appliance

switch

wireless router

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which wireless encryption method is the most secure?

WEP

WPA2 with TKIP

WPA2 with AES

WPA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?