Networking Quiz

Networking Quiz

University

10 Qs

quiz-placeholder

Similar activities

sieci_początek

sieci_początek

1st Grade - Professional Development

10 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

Basic on Operating System

Basic on Operating System

University

10 Qs

Quiz Webinar GNS3

Quiz Webinar GNS3

10th Grade - University

13 Qs

Evaluasi Pertemuan 12 DRPL TI-3B

Evaluasi Pertemuan 12 DRPL TI-3B

University

15 Qs

Pythonintro

Pythonintro

University

15 Qs

Pop Quiz- Abstraction, Algorithm

Pop Quiz- Abstraction, Algorithm

University

14 Qs

Networking Quiz

Networking Quiz

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Trung Chi

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does using the service password-encryption command on a router provide additional security?

by encrypting all passwords passing through the router

by encrypting passwords in the plain text configuration file

by requiring entry of encrypted passwords for access to the device

by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

by automatically suggesting encrypted passwords for use in configuring the router

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When are packets processed by an inbound access list?

before they are routed to an outbound interface

after they are routed to an outbound interface

before and after they are routed to an outbound interface

after they are routed to an outbound interface but before being placed in the outbound queue

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?

255.255.255.248

255.255.255.224

0.0.0.224

0.0.0.8

0.0.0.7

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three valid reasons to assign ports to VLANs on a switch? (Choose three.)

to logically group hosts according to function

to increase the size of the collision domain

to increase network security

to isolate broadcast traffic

to make VTP easier to implement

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to establish a secure terminal connection to a remote network device?

SNMPv1

SSH

ARP

WEP

Telnet

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)

source IP address and destination IP address

VLAN number

source switch port number

TCP or UDP port numbers

protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?

transport output all

transport preferred all

transport type all

transport input all

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?