• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Which of the following statements is NOT true regarding Domain Name System (DNS)?
It converts the media Access Control (MAC)
Which layer in the Open Systems Interconnection (OSI) model defines an Internet Protocol (IP) address that helps in selection the route to the destination?
Network
What is the purpose of using the show arp command?
To view the Address Reolution Protocol (ARP) cache
Which metric is used by the Routing Information Protocol (RIP) Version 2 protocol to determine the network path?
Hop Count
Which device in the given network diagram has as its primary repsonsibility the regulation of network traffic flow based on dif trust levels for different networks?
Firewall
Whcih of the following statements is NOT true reguarding flow control?
It uses a cyclic redundancy check (CRC) to identify and remove corruped data.
On a CISCO 2950 switch, which status LED and color combination indicates a POwer On Self Test (POST) failure?
system LED: solid amber
What is the valid host address range for the subnet 172.25.4.0 /23?
172.25.4.1 to 172.25.5.254
you wanted to define a static route to a network as a static default route. Which command should you issue on the router to accomplish the task?
ip default-network
Assuming that the network address is 192.16.100.0 for configuring an appropriate IP addressing scheme in the network.
14
Which option lists the given applications in the correct sequence of increasing bandwidth consumption?
An interactive Telnet session on a server running an SAP application > A voice conversation between two IP phones > A voice conversation between two IP phones with real-time video exchange
Which of the following security practices will NOT help to protect the configuration files on an access point or wireless router?
☻Change the default SSID.
☻Create a MAC filter list.
Which type of NAT enables a translation table to be populated as the required traffic flows through NAT-enabled devices?
Dynamic
Which Cisco IOS command is used to provide a description to an interface?
description
A new trainee is setting up a router in a test lab, and he asks you to describe the use of the connector marked BRI on the router. Which is a correct use for this connecter?
A WAN interface for an ISDN connection
Which of the following splits the network into separate broadcast domains?
VLAN
Which two modes are Cisco Internetwork Operating System (IOS) operating modes? (Choose two.)
•User EXEC mode

•Global configuration mode
What is the default sequence in which a router searches for the Internetwork Operating System (IOS) image upon power on?
Flash, TFTP, ROM
Which command is based on Internet Control Messaging Protocol (ICMP)?
Ping
Which prompt indicates the configuration mode at which Cisco IOS debug commands can be issued?
router#
Which of the following features is used with the IP NAT INSIDE command to translate multiple devices in the internal network to the single address in the IP address pool?
Overload
Which method does the WiFi Protected Access (WPA) use to encrypt data?
MIC/TKIP (Message Integrity Code/Temporal Key Integrity Protocol)