EWAN is a free telnet product that you can use with Windows 95 or Windows 3.1. It is a Winsock application. If you are using dial-up, you must first establish Windows 95 PPP or Windows 3.1 Trumpet Winsock. If the computer links through Ethernet set up Windows 95 TCP/IP, and then download the software. This quiz is all about EWAN. Don’t neglect to claim your certificate when you have finished.
Cracking
Phishing
Phreaking
Spamming
Rate this question:
QoS
Latency
Reliability
Confidentiality
Rate this question:
Extended
Reflexive
Standard
Time-based
Rate this question:
DMZ
Local loop
CSU/DSU
Demarcation point
Rate this question:
Conduct a performance test and compare with the baseline that was established previously.
Interview departmental secretaries and determine if they think load time for web pages has improved.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.
Rate this question:
The default gateway is in the wrong subnet.
STP has blocked the port that PC1 is connected to.
Port Fa0/2 on S2 is assigned to the wrong VLAN.
S2 has the wrong IP address assigned to the VLAN30 interface.
Rate this question:
Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.
The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.
The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.
Rate this question:
10.1.1.2:80
10.1.1.2:1234
172.30.20.1:1234
172.30.20.1:3333
Rate this question:
The PVC to R1 must be point-to-point.
LMI types must match on each end of a PVC.
The frame relay PVCs cannot be established between Cisco and non-Cisco routers.
The IETF parameter is missing from the frame-relay map ip 10.10.10.1 201 command.
Rate this question:
Rate this question:
Only results from the software package should be tested as the network is designed to accommodate the proposed software platform.
Scheduling will be easy if the network and software teams work independently.
It will be difficult to isolate the problem if two teams are implementing changes independently.
Results from changes will be easier to reconcile and document if each team works in isolation.
Rate this question:
The crossover cable is faulty.
The IP addressing is incorrect.
There is a Layer 2 problem with the router connection.
The upper layers are experiencing an unspecified problem.
One or both of the Ethernet interfaces are not working correctly.
Rate this question:
Wi-Fi
WiMAX
Satellite
Metro Ethernet
Rate this question:
Replace the serial cable .
Replace the WIC on RA.
Configure RA with a clock rate command.
Issue a no shutdown interface command on RB.
Rate this question:
Named ACLs are less efficient than numbered ACLs.
Standard ACLs should be applied closest to the core layer.
ACLs applied to outbound interfaces are the most efficient.
Extended ACLs should be applied closest to the source that is specified by the ACL.
Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.
The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.
The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.
Rate this question:
Conduct a performance test and compare with the baseline that was established previously.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Interview departmental administrative assistants and determine if they think load time for web pages has improved.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.
Rate this question:
The West side has a high volume of POTS traffic.
The West side of town is downloading larger packets.
The service provider is closer to the location on the East side.
More clients share a connection to the DSLAM on the West side.
Rate this question:
Local loop
DTE cable on router
Demarcation point
Demilitarized zone
Rate this question:
Static NAT
Dynamic NAT
Static NAT with overload
Dynamic NAT with overload
Rate this question:
Only results from the software package should be tested as the network is designed to accommodate the proposed software platform.
Scheduling will be easy if the network and software teams work independently.
It will be difficult to isolate the problem if two teams are implementing changes independently.
Results from changes will be easier to reconcile and document if each team works in isolation.
Rate this question:
The implementation of a tunneling protocol
The use of only baseband connections
A requirement of active authentication via a RADIUS server
The use of a call-back procedure to verify user credentials
Rate this question:
PPP with PAP
PPP with CHAP
HDLC with PAP
HDLC with CHAP
Rate this question:
The default gateway is in the wrong subnet.
STP has blocked the port that PC1 is connected to.
Port Fa0/2 on S2 is assigned to the wrong VLAN.
S2 has the wrong IP address assigned to the VLAN30 interface.
Rate this question:
ATM
Frame Relay
HDLC
PPP
SDLC
Rate this question:
Protocol type
Source IP address
Source MAC address
Destination IP address
Destination MAC address
Rate this question:
Company 1 only uses microfilters at branch locations.
Company 1 has a lower volume of POTS traffic than company 2 has.
Company 2 is located farther from the service provider than company 1 is.
Company 2 shares the connection to the DSLAM with more clients than company 1 shares with.
Rate this question:
The networks are not correctly summarized.
The FastEthernet interfaces on R1 are configured as passive.
The network statements on R2 are incorrectly configured.
EIGRP on R1 does not recognize the 192.168.10.0 network.
Rate this question:
IP
TCP
UDP
HTTP
Rate this question:
The PVC to R3 must be point-to-point.
LMI types cannot be different on each end of a PVC.
A single port can only support one encapsulation type.
The IETF parameter is missing from the frame-relay map ip 192.168.1.3 203 command.
Rate this question:
10.1.1.2:80
10.1.1.2:1234
172.30.20.1:1234
172.30.20.1:3333
Rate this question:
The address 192.168.3.17 address is already in use by Fa0/0.
The pool of addresses for the 192Network pool is configured incorrectly.
The ip helper-address command should be used on the Fa0/0 interface.
The 192.168.3.17 address has not been excluded from the 192Network pool.
Rate this question:
TDMA
FDMA
CDMA
S-CDMA
Rate this question:
PAP uses a two-way handshake.
The password is unique and random.
PAP conducts periodic password challenges.
PAP uses MD5 hashing to keep the password secure.
Rate this question:
BE
DE
CIR
CBIR
Rate this question:
All TCP traffic is permitted, and all other traffic is denied.
The command is rejected by the router because it is incomplete.
All traffic from 172.16.4.0/24 is permitted anywhere on any port.
Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations.
Rate this question:
Router A is advertising the wrong network.
The authentication key strings do not match.
The serial interfaces of routers A and B are not on the same network.
The authentication key numbers do not match the EIGRP process number for both routers.
Rate this question:
Contents in RAM will be erased.
Contents in RAM will be ignored.
Contents in NVRAM will be erased.
Contents in NVRAM will be ignored.
Rate this question:
Reduced jitter
Reduced costs
Reduced latency
The ability to burst above guaranteed bandwidth
The ability to borrow unused bandwidth from the leased lines of other customers
Rate this question:
Apply the ACL in the inbound direction.
Apply the ACL on the FastEthernet 0/0 interface.
Reverse the order of the TCP protocol statements in the ACL.
Modify the second entry in the list to permit tcp host 192.168.10.10 any eq telnet.
Rate this question:
The new ACL overwrites the existing ACL.
The network administrator will receive an error message.
The existing ACL is modified to include the new commands.
A second ACL that is numbered 101 is created and contains only the new commands.
Rate this question:
A loopback is not set.
The interface has been shut down.
The wrong encapsulation is being used.
Queuing cannot be used when connecting to non-Cisco devices.
Rate this question:
The clock rate must be 56000.
The usernames are misconfigured.
The IP addresses are on different subnets.
The clock rate is configured on the wrong end of the link.
The CHAP passwords must be different on the two routers.
Interface serial 0/0/0 on CTRL must connect to interface serial 0/0/1 on BR_1.
Rate this question:
When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.
Incorrect IPv4 addresses are entered on the router interfaces.
RIPng is incompatible with dual-stack technology.
IPv4 is incompatible with RIPng.
ATM
VPN
ISDN
Frame Relay
Broadband DSL
Rate this question:
Link termination is the responsibility of NCP.
Each network protocol has a corresponding NCP.
NCP establishes the initial link between PPP devices.
NCP tests the link to ensure that the link quality is sufficient.
Rate this question:
It matches the incoming packet to the access-list 201 permit any any statement and allows the packet into the router.
It reaches the end of ACL 101 without matching a condition and drops the packet because there is no access-list 101 permit any any statement.
It matches the incoming packet to the access-list 101 permit ip any 192.168.1.0 0.0.0.255 statement, ignores the remaining statements in ACL 101, and allows the packet into the router.
It matches the incoming packet to the access-list 201 deny icmp 192.168.1.0 0.0.0.255 any statement, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then drops the packet.
Rate this question:
Malicious software that copies itself into other executable programs
Tricks users into running the infected software
A set of computer instructions that lies dormant until triggered by a specific event
Exploits vulnerabilities with the intent of propagating itself across a network
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.