• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Which of the following standards of IEEE defines security of Wireless LAN (WLAN)?
A)802.11g
B)802.11b
C)802.11i
D)802.11a
C)802.11i
Which of the following Ethernet standards supports a cable length longer than 1000 meters?
A) 100BASE-TX
B) 1000BASE-T
C) 10BASE-T
D) 1000BASE-SX
E) 1000BASE-LX
E) 1000BASE-LX
You work as a network administrator for McRoberts Inc. The company has a TCP/IP based network. the company is located at los angeles. The company acquires another company based in atlanta. The management wants both the networks to be connected to each other and specifies the following requirements to be met:
-Connections must be reliable.
-Services must be cost effective.
Which of the following services will fulfill the company's requirements?
A)Cell-switched service
B)ISDN circuit-switched service
C)packet-switched service
D)analog circuit-switched service
C)packet-switched service
You test connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? (Choose 2)
-Layer 1
-Layer 3
-Layer 4
-Layer 2
-Layer 2
-Layer 3
Mark recently installed a network interface card on his computer. The Nic's MAC address is E1-D4-2B-E7-6B-16. Which of the following is the binary form of the organizationally unique identifier (OUI) of the MAC address?
A) 00100111-01101011-00010110
B) 11100111-01101011-00010110
C) 00100111-01001011-00010110
D) 11100001-11010100-00101011
D) 11100001-11010100-00101011
TCP/IP based network. You want to secure the switch by enabling the password-protect access. You want to implement this protection on the console and on all sessions of terminal and SSH. Which of the following sets of commands will you enter?(Choose 2)
A) Line vty 0 15
login
password xxxx
B) Line console 0 15
login
password xxxx
C) Line console 0
login
password xxxx
D) Line console 1
login
password xxxx
E) Line vty 1 16
login
password xxxx
A) Line vty 0 15
login
password xxxx
C) Line console 0
login
password xxxx
Which of the following statements is true about ICMP packets?
A)They are encapsulated within IP datagrams
B)They use UDP datagrams
C)They guarantee the delivery of datagrams
D)The PING utility uses them to verify connectivity between two hosts.
E)They are used to report errors if a problem in IP processing occurs
A)They are encapsulated within IP datagrams
D)The PING utility uses them to verify connectivity between two hosts.
E)They are used to report errors if a problem in IP processing occurs
Which of the following is the process through which a wireless client learns about each access point (AP) and its SSID?
A)WPA
B)Beacon
C)SSID Cloaking
D)WEP
B)Beacon
The company has a TCP/IP based network. A cisco 2960 switch is configured on the network. You are required to access the switch's IOS CLI. Which of the following methods can be used for this?(Choose 3)
A)Telnet
B)Secure Shell (SSH)
C)The Console
D)A Web Browser
A)Telnet
B)Secure Shell (SSH)
C)The Console
Which of the following protocols work on the transport layer of TCP/IP and OSI reference Model?
A)UDP
B)HTTP
C)TCP
D)SMTP
E)FTP
A)UDP
C)TCP