
Cisco baza 1-40
Authored by Daniyar Dzhumabaev
Fun
University
Used 34+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?
designated, alternate, root, root
designated, root, alternate, root
alternate, root, designated, root
alternate, designated, root, root
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?
MAC address of the virtual router
MAC addresses of both the forwarding and standby routers
MAC address of the standby router
MAC address of the forwarding router
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What is a secure configuration option for remote access to a network device?
Configure SSH.
Configure 802.1x.
Configure an ACL and apply it to the VTY lines.
Configure Telnet.
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?
The host checks the local neighbor cache for the learned address and if the address is not cached, it it considered unique.
The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.
The host sends an ICMPv6 echo request message to the DHCPv6 or SLAAC-learned address and if no reply is returned, the address is considered unique.
The host sends an ARP broadcast to the local link and if no hosts send a reply, the address is considered unique.
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?
Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.10
Source MAC: 00E0.FE91.7799 Source IP: 10.1.1.1
Source MAC: 00E0.FE10.17A3 Source IP: 10.1.1.10
Source MAC: 00E0.FE91.7799 Source IP: 192.168.1.1
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
standalone wireless access point
firewall appliance
switch
wireless router
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which wireless encryption method is the most secure?
WEP
WPA2 with TKIP
WPA2 with AES
WPA
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?