ENSA 64-120 MC & SC

ENSA 64-120 MC & SC

57 Qs

quiz-placeholder

Similar activities

Retrieval

Retrieval

KG - University

59 Qs

សំណួរប្រលងសម្រាប់វគ្គបណ្តុះបណ្តាលរម្លឹកឡើងវិញ

សំណួរប្រលងសម្រាប់វគ្គបណ្តុះបណ្តាលរម្លឹកឡើងវិញ

KG - University

53 Qs

PROG REVIEW 3

PROG REVIEW 3

KG - University

53 Qs

Penilaian Akhir Tahun (PAT) TP. 2023-2024

Penilaian Akhir Tahun (PAT) TP. 2023-2024

KG - University

58 Qs

Quiz ASJ

Quiz ASJ

KG - University

52 Qs

Ulangan Harian

Ulangan Harian

KG - University

53 Qs

TES KEAHLIAN TEKNIK KOMPUTER JARINGAN

TES KEAHLIAN TEKNIK KOMPUTER JARINGAN

KG - University

53 Qs

EOUT 8.2 Binary Representation

EOUT 8.2 Binary Representation

KG - University

53 Qs

ENSA 64-120 MC & SC

ENSA 64-120 MC & SC

Assessment

Quiz

others

Easy

Created by

sugus viur

Used 4+ times

FREE Resource

57 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

64. Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)
interface identifier
connection type
device type
cable specification
OS/IOS version

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
65. Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?
The NAT pool has been exhausted.
The wrong netmask was used on the NAT pool.
Access-list 1 has not been configured properly.
The inside and outside interfaces have been configured backwards.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

66. What are two benefits of using SNMP traps? (Choose two.)
They eliminate the need for some periodic polling requests.
They reduce the load on network and agent resources.
They limit access for management systems only.
They can provide statistics on TCP/IP packets that flow through Cisco devices.
They can passively listen for exported NetFlow datagrams.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

67. Which statement accurately describes a characteristic of IPsec?
IPsec works at the application layer and protects all application data.
IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
IPsec works at the transport layer and protects data at the network layer.
IPsec is a framework of open standards that relies on existing algorithms.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

68. In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)
connect users to the network
provide a high-speed network backbone
connect remote networks
provide Power over Ethernet to devices
provide data traffic security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
70. Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?
Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

71. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)
reduced costs
decreased number of critical points of failure
increased flexibility
increased bandwidth availability
increased network management options

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?