Search Header Logo

ENSA 64-103 MC & SC

Authored by sugus viur

others

1st Grade

Used 2+ times

ENSA 64-103 MC & SC
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

39 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

64. Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)

interface identifier
connection type
device type
cable specification
OS/IOS version

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

65. Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?

The NAT pool has been exhausted.
The wrong netmask was used on the NAT pool.
Access-list 1 has not been configured properly.
The inside and outside interfaces have been configured backwards.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

66. What are two benefits of using SNMP traps? (Choose two.)

They eliminate the need for some periodic polling requests.
They reduce the load on network and agent resources.
They limit access for management systems only.
They can provide statistics on TCP/IP packets that flow through Cisco devices.
They can passively listen for exported NetFlow datagrams.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

67. Which statement accurately describes a characteristic of IPsec?

IPsec works at the application layer and protects all application data.
IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
IPsec works at the transport layer and protects data at the network layer.
IPsec is a framework of open standards that relies on existing algorithms.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

68. In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)

connect users to the network
provide a high-speed network backbone
connect remote networks
provide Power over Ethernet to devices
provide data traffic security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

70. Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?

Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

71. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)

reduced costs
decreased number of critical points of failure
increased flexibility
increased bandwidth availability
increased network management options

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?