CCNA 3 Chapter 2 Version 4.0

17 Questions | Attempts: 50
Share
Please wait...
Question 1 / 17
0 %
0/100
Score 0/100
1. A network administrator needs to configure Telnet access to a router. Which group of commands
enable Telnet access to the router?
Submit
Please wait...
About This Quiz
CCNA 3 Chapter 2 Version 4.0 - Quiz

Personalize your quiz and earn a certificate with your name on it!
2. Which two devices protect a corporate network against malicious attacks at the enterprise edge ?(Choose two.)
Submit
3. What information can an administrator learn using the show version command?
Submit
4. Which two router parameters can be set from interface configuration mode? (Choose two.)
Submit
5. Which device is responsible for moving packets between multiple network segments?
Submit
6. What is the demarcation?
Submit
7. A network manager wants to have processes in place to ensure that network upgrades do not affect
business operations. What will the network manager create for this purpose?
Submit
8. A network administrator must define specific business processes to implement if a catastrophic
disaster prevents a company from performing daily business routines. Which portion of the network
documentation is the administrator defining?
Submit
9. What type of connection point is a point of presence (POP)?
Submit
10. A DoS attack crippled the daily operations of a large company for 8 hours. Which two options
could be implemented by the network administrator to possibly prevent such an attack in the future?
(Choose two.)
Submit
11. An investment company has multiple servers that hold mission critical data. They are worried that if
something happens to these servers, they will lose this valuable information. Which type of plan is
needed for this company to help minimize loss in the event of a server crash?
Submit
12. It is crucial that network administrators be able to examine and configure network devices from
their homes. Which two approaches allow this connectivity without increasing vulnerability to external
attacks? (Choose two.)
Submit
13. When searching for information about authentication methods and usernames of company
personnel, where can a network administrator look?
Submit
14. Refer to the exhibit. Which statement is true about port Fa5/1?
Submit
15. Which three steps must be performed to remove all VLAN information from a switch but retain the
rest of the configuration? (Choose three.)
Submit
16. Which two situations require a network administrator to use out-of-band management to change a
router configuration? (Choose two.)
Submit
17. Which two types of information should be included in a business continuity plan? (Choose two.)
Submit
View My Results

Quiz Review Timeline (Updated): Mar 17, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 22, 2012
    Quiz Created by
    E2d34christ
Cancel
  • All
    All (17)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A network administrator needs to configure Telnet access to a router....
Which two devices protect a corporate network against malicious...
What information can an administrator learn using the show version...
Which two router parameters can be set from interface configuration...
Which device is responsible for moving packets between multiple...
What is the demarcation?
A network manager wants to have processes in place to ensure that...
A network administrator must define specific business processes to...
What type of connection point is a point of presence (POP)?
A DoS attack crippled the daily operations of a large company for 8...
An investment company has multiple servers that hold mission critical...
It is crucial that network administrators be able to examine and...
When searching for information about authentication methods and...
Refer to the exhibit. Which statement is true about port Fa5/1?
Which three steps must be performed to remove all VLAN information...
Which two situations require a network administrator to use...
Which two types of information should be included in a business...
Alert!

Advertisement