NWC204 FE SUM24

NWC204 FE SUM24

University

48 Qs

quiz-placeholder

Similar activities

PROTOCOLOS-1-ESPAÑOL

PROTOCOLOS-1-ESPAÑOL

University - Professional Development

52 Qs

Data Comms Reviewer for UT2 Part 2

Data Comms Reviewer for UT2 Part 2

University

50 Qs

Second Semester

Second Semester

University

50 Qs

CompTIA ITFundamentals CRAM

CompTIA ITFundamentals CRAM

6th Grade - University

46 Qs

OSI Layer

OSI Layer

12th Grade - University

48 Qs

PF: NetEx24-IT2102

PF: NetEx24-IT2102

University

50 Qs

CCNA1 Final Review

CCNA1 Final Review

10th Grade - University

50 Qs

smkn1

smkn1

University

50 Qs

NWC204 FE SUM24

NWC204 FE SUM24

Assessment

Quiz

Computers

University

Hard

Created by

Tony Nguyễn

Used 19+ times

FREE Resource

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of a switch virtual interface (SVI)?

A. Although it is a virtual interface, it needs to have physical hardware on the device associated with it

B. An SVI is created in software and requires a configured IP address and a subnet mask in order to provide remote access to the switch.

C. SVIs come preconfigured on Cisco switches.

D. SVIs do not require the no shutdown command to become enabled

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the default gateway is configured incorrectly on the host, what is the impact on communications?

A. The host is unable to communicate on the local network.

B. The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

C. The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.

D. There is no impact on communications.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false? With VLSM, the subnet mask will vary depending on how many bits have been borrowed for a particular subnet, thus the "variable" part of the VLSM

A. True

B. False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes network security?

A. It ensures sensitive corporate data is available for authorized users,

B. It prioritizes data flows in order to give priority to delay sensitive traffic

C. It supports growth over time in accordance with approved network design procedures

D. It synchronizes traffic flows using timestamps.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What statement is correct about the description command to enable a router interface?

A. The command is required to enable an interface

B. It can be helpful in troubleshooting on production networks.

C. It provides information about the type of devices.

D. It has to type with the no shutdown command

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false? The variable-length subnet mask (VLSM) was developed to avoid wasting addresses by enabling us to subnet a subnet.

A True

B. False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two issues can cause both runts and giants in Ethernet networks? (Choose two.)

A. a malfunctioning NIC

B. CRC errors

C. electrical interference on serial interfaces

D. half-duplex operations

E. using the incorrect cable type

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?