CCNA 4 And 5 Chapters Love IT

23 Questions | Total Attempts: 45

SettingsSettingsSettings
CCNA Quizzes & Trivia

Ccna is sexy i love u


Questions and Answers
  • 1. 
    What is the best defense for protecting a network from phishing exploits?
    • A. 

      Schedule antivirus scans.

    • B. 

      Schedule antispyware scans

    • C. 

      Schedule training for all users.

    • D. 

      Schedule operating systems updates.

  • 2. 
    An IT director has begun a campaign to remind users to avoid opening e-mail messages from suspicious sources. Which type of attack is the IT director trying to protect users from?
    • A. 

      DoS

    • B. 

      DDoS

    • C. 

      virus

    • D. 

      Access

    • E. 

      Reconnaissance

  • 3. 
    Excessive broadcasts are generally a symptom of a problem at which layer?
    • A. 

      Physical

    • B. 

      Data link

    • C. 

      Network

    • D. 

      Transport

  • 4. 
    A technician has been asked to make several changes to the configuration and topology of a network and then determine the outcome of the changes. What tool can be used to determine the overall effect caused by the changes?
    • A. 

      Baselining tool

    • B. 

      Knowledge base

    • C. 

      Protocol analyze

    • D. 

      Cable tester

  • 5. 
    Refer to the exhibit. Users on the Internal LAN are unable to connect to the www server. The network administrator pings the server and verifies that NAT is functioning correctly. Which OSI layer should the administrator begin to troubleshoot next?
    • A. 

      Physical

    • B. 

      Data link

    • C. 

      Network

    • D. 

      application

  • 6. 
    Intrusion detection occurs at which stage of the Security Wheel?
    • A. 

      Securing

    • B. 

      Monitoring

    • C. 

      Testing

    • D. 

      Improvement

    • E. 

      Reconnaissance

  • 7. 
    Encapsulation errors from mismatched WAN protocols on a serial link between two routers indicate a problem at which OSI layer?
    • A. 

      Physical

    • B. 

      Data link

    • C. 

      Network

    • D. 

      Transport

  • 8. 
    Information about which OSI layers of connected Cisco devices can be verified with the show cdp neighbors command?
    • A. 

      All layers

    • B. 

      Layer 1, Layer 2, and Layer 3

    • C. 

      Layer 1, Layer 2, Layer 3, and Layer 4

    • D. 

      Layer 6 and Layer 7

  • 9. 
    Refer to the exhibit. A network administrator is trying to configure a router to use SDM, but it is not functioning correctly. What could be the problem?
    • A. 

      The privilege level of the user is not configured correctly.

    • B. 

      The authentication method is not configured correctly.

    • C. 

      The HTTP server is not configured correctly.

    • D. 

      The HTTP timeout policy is not configured correctly.

  • 10. 
    Which statement is true about Cisco Security Device Manager (SDM)?
    • A. 

      SDM can run only on Cisco 7000 series routers.

    • B. 

      SDM can be run from router memory or from a PC.

    • C. 

      SDM should be used for complex router configurations.

    • D. 

      SDM is supported by every version of the Cisco IOS software.

  • 11. 
    A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the troubleshooting process(Choose two.)
    • A. 

      Physical layer

    • B. 

      Data link layer

    • C. 

      Network layer

    • D. 

      transport layer

    • E. 

      application layer

  • 12. 
    Which step is required to recover a lost enable password for a router?
    • A. 

      Set the configuration register to by pass the startup configuration.

    • B. 

      Copy the running configuration to the startup configuration.

    • C. 

      Reload the IOS from a TFTP server from ROMMON.

    • D. 

      Reconfigure the router using setup mode.

  • 13. 
    Refer to the exhibit. What is the purpose of the “ip ospf message-digest-key 1 md5 cisco” statement in the configuration?
    • A. 

      To specify a key that is used to authenticate routing updates

    • B. 

      To save bandwidth by compressing the traffic

    • C. 

      To enable SSH encryption of traffic

    • D. 

      To create an IPsec tunnel

  • 14. 
    Which troubleshooting approach is suggested for dealing with a complex problem that is suspected of being caused by faulty network cabling?
    • A. 

      bottom up

    • B. 

      Top down

    • C. 

      Divide and conquer

    • D. 

      Middle out

  • 15. 
    Which two pieces of information are typically found on a logical network diagram? (Choose two.)
    • A. 

      Cable types

    • B. 

      Connector types

    • C. 

      interface identifiers

    • D. 

      DLCI for virtual circuits

    • E. 

      Operating system versions

  • 16. 
    What is one example of a physical layer problem?
    • A. 

      Incorrect encapsulation

    • B. 

      Incorrect STP configuration

    • C. 

      Incorrect ARP mapping

    • D. 

      incorrect clock rate

  • 17. 
    Which two components should be taken into consideration when establishing a network baseline? (Choose two.)
    • A. 

      Information about the network design

    • B. 

      IP addressing allocation on the network

    • C. 

      Requirements about the service provider setup

    • D. 

      Requirements for access control lists to regulate traffic

    • E. 

      expected performance under normal operating conditions

  • 18. 
    A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshooting tool allows the technician to map and discover VLAN and port assignments?
    • A. 

      Cable analyzer

    • B. 

      Network analyzer

    • C. 

      Protocol analyzer

    • D. 

      Knowledge base

  • 19. 
    . Refer to the exhibit. What is accomplished when both commands are configured on the router?
    • A. 

      The commands filter UDP and TCP traffic coming to the router.

    • B. 

      The commands disable any TCP or UDP request sent by the routing protocols.

    • C. 

      The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities.

    • D. 

      The commands disable the BOOTP and TFTP server services to prevent security vulnerabilities.

  • 20. 
    Refer to the exhibit. Security Device Manager (SDM) is installed on router R1. What is the result of opening a web browser on PC1 and entering the URL 192.168.10.1?
    • A. 

      The password is sent in plain text.

    • B. 

      A Telnet session is established with R1.

    • C. 

      The SDM page of R1 appears with a dialog box that requests a username and password.

    • D. 

      The R1 home page is displayed and allows the user to download Cisco IOS images and configuration files.

  • 21. 
    Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)
    • A. 

      Verify the name of the TFTP server using the show hosts command.

    • B. 

      Verify that the TFTP server is running using the tftpdnld command.

    • C. 

      Verify that the checksum for the image is valid using the show version command.

    • D. 

      Verify connectivity between the router and TFTP server using the ping command.

    • E. 

      Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.

  • 22. 
    Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring?
    • A. 

      Reconnaissance

    • B. 

      Access

    • C. 

      DoS

    • D. 

      Worm

    • E. 

      Virus

  • 23. 
    Which two objectives must a security policy accomplish? (Choose two.)
    • A. 

      Provide a checklist for the installation of secure servers

    • B. 

      Describe how the firewall must be configured

    • C. 

      document the resources to be protected

    • D. 

      identify the security objectives of the organization

    • E. 

      Identify the specific tasks involved in hardening a route

Related Topics
Back to Top Back to top