циско 64-111

циско 64-111

1st Grade

55 Qs

quiz-placeholder

Similar activities

циско 21-63

циско 21-63

1st Grade

53 Qs

циско конец

циско конец

1st Grade

53 Qs

Informatika

Informatika

1st Grade

50 Qs

Computer Basics Quiz

Computer Basics Quiz

1st - 5th Grade

50 Qs

акт  100-150

акт 100-150

1st - 5th Grade

50 Qs

икт 2 (100-150)

икт 2 (100-150)

1st Grade

50 Qs

айзат 1-58

айзат 1-58

1st - 5th Grade

58 Qs

Holy macaroni

Holy macaroni

1st Grade

56 Qs

циско 64-111

циско 64-111

Assessment

Quiz

Others

1st Grade

Medium

Created by

6frnrdv4vj apple_user

Used 5+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

analyze the destination IP address

switch the packet to the directly connected interface

look up the next-hop address for the packet

discard the traffic after consulting the route table

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes antispyware?

applications that protect end devices from becoming infected with malicious software

a network device that filters access and traffic coming into a network

software on a router that filters traffic based on IP addresses or applications

a tunneling protocol that provides remote users with secure access into the network of an organization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

Telnet

AUX

SSH

Console

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the two most effective ways to defend against malware? (Choose two.)

Implement network firewalls

Update the operating system and other application software

Install and update antivirus software

Implement a VPN

Implement RAID

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?

brute-force attack

Trojan horse

DoS

buffer overflow

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?

User Datagram Protocol field

transport layer error check field

flow control field

frame check sequence field

error correction process field

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.248

255.255.255.0

255.255.255.128

255.255.255.192

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?