Cisco Quiz # 5

Cisco Quiz # 5

12th Grade

25 Qs

quiz-placeholder

Similar activities

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

Week 11 Quiz 2

Week 11 Quiz 2

10th Grade - University

20 Qs

REDES I-medios no guiados

REDES I-medios no guiados

1st - 12th Grade

20 Qs

JAVA method

JAVA method

12th Grade

21 Qs

Personal Finance 3.01-3.07 Review Quiz

Personal Finance 3.01-3.07 Review Quiz

9th - 12th Grade

20 Qs

Aplikom

Aplikom

1st Grade - University

20 Qs

2561-1-ระบบสื่อสารสำหรับเครือข่ายคอมพิวเตอร์

2561-1-ระบบสื่อสารสำหรับเครือข่ายคอมพิวเตอร์

12th Grade

20 Qs

Cisco Quiz # 5

Cisco Quiz # 5

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Tom Dawson

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 5 pts

Which of the following header fields identify which TCP/IP application gets data received by the computer? (Choose two answers)

Ethernet Type

UDP Port Number

IP Protocol Number

TCP Port Number

2.

MULTIPLE SELECT QUESTION

1 min • 5 pts

Barney is a host with IP address 10.1.1.1 in subnet 10.1.1.0/24. Which of the following are things that a standard IP ACL could be configured to do? (Choose two answers)

Match the exact source IP address

Match IP addresses 10.1.1.1 through 10.1.1.4 with one access-list command without matching other IP addresses

Match all IP addresses in Barney's subnet with one access-list command without matching other IP addresses

Match only the packet's destination IP address

3.

MULTIPLE SELECT QUESTION

1 min • 5 pts

Which of the following fields cannot be compared based on an extended IP ACL? (Choose two answers)

Protocol

Source IP address

URL

Filename for FTP transfers

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which one of the following terms means anything that can be considered to be a weakness that can compromise security?

Exploit

Vulnerability

Attack

Threat

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode?

Enable password

Enable secret

Neither

The password command, if it's configured

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of the following is required when configuring port security with sticky learning?

Setting the maximum number of allowed MAC addresses on the interface with the switchport port-security maximum interface subcommand

Enable port security with the switchport port-security interface subcommand

Defining the specific allowed MAC addresses using the switchport port-security mac-address interface subcommand

All the other answers list required commands

7.

MULTIPLE SELECT QUESTION

1 min • 5 pts

A PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual four DHCP messages that flow between the PC and the DHCP server, which one do the client send? (Choose two answers)

Acknowledgment

Discover

Offer

Request

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?