Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Which of the following standards of IEEE defines security of Wireless LAN (WLAN)?
A)802.11g B)802.11b C)802.11i D)802.11a |
C)802.11i
|
|
Which of the following Ethernet standards supports a cable length longer than 1000 meters?
A) 100BASE-TX B) 1000BASE-T C) 10BASE-T D) 1000BASE-SX E) 1000BASE-LX |
E) 1000BASE-LX
|
|
You work as a network administrator for McRoberts Inc. The company has a TCP/IP based network. the company is located at los angeles. The company acquires another company based in atlanta. The management wants both the networks to be connected to each other and specifies the following requirements to be met:
-Connections must be reliable. -Services must be cost effective. Which of the following services will fulfill the company's requirements? A)Cell-switched service B)ISDN circuit-switched service C)packet-switched service D)analog circuit-switched service |
C)packet-switched service
|
|
You test connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? (Choose 2)
-Layer 1 -Layer 3 -Layer 4 -Layer 2 |
-Layer 2
-Layer 3 |
|
Mark recently installed a network interface card on his computer. The Nic's MAC address is E1-D4-2B-E7-6B-16. Which of the following is the binary form of the organizationally unique identifier (OUI) of the MAC address?
A) 00100111-01101011-00010110 B) 11100111-01101011-00010110 C) 00100111-01001011-00010110 D) 11100001-11010100-00101011 |
D) 11100001-11010100-00101011
|
|
TCP/IP based network. You want to secure the switch by enabling the password-protect access. You want to implement this protection on the console and on all sessions of terminal and SSH. Which of the following sets of commands will you enter?(Choose 2)
A) Line vty 0 15 login password xxxx B) Line console 0 15 login password xxxx C) Line console 0 login password xxxx D) Line console 1 login password xxxx E) Line vty 1 16 login password xxxx |
A) Line vty 0 15
login password xxxx C) Line console 0 login password xxxx |
|
Which of the following statements is true about ICMP packets?
A)They are encapsulated within IP datagrams B)They use UDP datagrams C)They guarantee the delivery of datagrams D)The PING utility uses them to verify connectivity between two hosts. E)They are used to report errors if a problem in IP processing occurs |
A)They are encapsulated within IP datagrams
D)The PING utility uses them to verify connectivity between two hosts. E)They are used to report errors if a problem in IP processing occurs |
|
Which of the following is the process through which a wireless client learns about each access point (AP) and its SSID?
A)WPA B)Beacon C)SSID Cloaking D)WEP |
B)Beacon
|
|
The company has a TCP/IP based network. A cisco 2960 switch is configured on the network. You are required to access the switch's IOS CLI. Which of the following methods can be used for this?(Choose 3)
A)Telnet B)Secure Shell (SSH) C)The Console D)A Web Browser |
A)Telnet
B)Secure Shell (SSH) C)The Console |
|
Which of the following protocols work on the transport layer of TCP/IP and OSI reference Model?
A)UDP B)HTTP C)TCP D)SMTP E)FTP |
A)UDP
C)TCP |