Mismatched TKIP encryption
Null SSID
Cordless phones
Mismatched SSID
Metal file cabinets
Denial of service
Brute force
Reconnaissance
Trojan horse
Man in the middle
Allow unrestricted access to the console or VTY ports.
Use a firewall to restrict access from the outside to the network devices.
Always use Telnet to access the device command line because its data is automatically encrypted.
Use SSH or another encrypted and authenticated transport to access device configurations.
Prevent the loss of passwords by disabling password encryption.
IR
DSSS
FHSS
This is a 10 Mb/s switch port.
This is a 100 Mb/s switch port.
This is an Ethernet port operating at half duplex.
This is an Ethernet port operating at full duplex.
This is a port on a network interface card in a PC.
RIP
BGP
OSPF
IGRP
EIGRP
MAC address
Bridge priority
IOS version
IP address
Speed of the links
The session layer
The data link layer
The access layer
The network layer
The application layer
127.0.0.1
172.16.0.1
192.168.0.5
224.0.0.5
223.0.0.1
It is locally significant.
It is globally significant.
It is needed to identify a unique instance of an OSPF database.
It is an optional parameter required only if multiple OSPF processes are running on the router.
All routers in the same OSPF area must have the same process ID if they are to exchange routing information.
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK.
Filtering can occur based on Layer 3 information.
Broadcasts are eliminated.
Routers generally cost less than switches.
Broadcasts are not forwarded across the router.
Adding a router to the network decreases latency.
TFTP server, Flash, NVRAM
ROM, NVRAM, TFTP server
NVRAM, TFTP server, ROM
Flash, TFTP server, ROM
Flash, NVRAM, ROM
During high traffic periods
After broken links are re-established
When upper-layer protocols require high reliability
In an improperly implemented redundant topology
When a dual ring topology is in use
Addresses chosen by a company to communicate with the Internet
Addresses that cannot be routed through the public Internet
Addresses that can be routed through the public Internet
A scheme to conserve public addresses
Addresses licensed to enterprises or ISPs by an Internet registry organization
A CSU/DSU terminates a digital local loop.
A modem terminates a digital local loop.
A CSU/DSU terminates an analog local loop.
A modem terminates an analog local loop.
A router is commonly considered a DTE device.
A directly connected interface with an address of 192.168.10.254/24
A static route to network 192.168.10.0/24
A RIP update for network 192.168.10.0/24
A default route with a next hop address of 192.168.10.1
A static route to network 192.168.10.0/24 with a local serial interface configured as the next hop
HDLC
FDDI
PPP
ATM
Frame Relay
Broadcasts only use network layer addressing.
A broadcast frame is never forwarded by a switch.
A broadcast address will never be the source address of a frame.
Broadcast addresses use an incorrect format for the switching table.
Broadcast frames are never sent to switches.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.