147. Fill in the blank. Use a number.
...
11. Match the situation with the appropriate use of network media
98. Launch PT – Hide and Save PT.
...
139. Question: (image)
...
132. Network devices come in two physical configurations. Devices that...
54. Which keys act as a hot key combination that is used to interrupt...
7. ISOC, IANA, EIA, and IEEE represent ............... organizations...
150. What is the metric value that is used to reach the 10.1.1.0...
67. What happens when part of an Internet radio transmission is not...
30. What happens when part of an Internet VoIP transmission is not...
Which one do you like?
6. Port numbers ranging from 0 to 1023 are considered to be...
58. Which device should be used for enabling a host to communicate...
2. Which communication tool allows real-time collaboration?
161.(z pdfa nie ma nr., jest pod 132) Refer to the exhibit. What is...
113. What needs to be checked when testing a UTP network cable?
138. How many bits would need to be borrowed if a network admin were...
9. A company is expanding its business to other countries. All branch...
110. To prevent faulty network devices from carrying dangerous voltage...
69. Refer to the exhibit. What is the maximum TTL value that is used...
48. The prefix-length for the range of addresses is .....
97. Which type of wireless security makes use of dynamic encryption...
116. What does a router use to determine where to send data it...
130. Given the binary address of 11101100 00010001 00001100 00001010,...
131. A particular telnet site does not appear to be responding on a...
10. A network administrator is upgrading a small business network to...
90. What happens when part of an Internet television transmission is...
8. Refer to the exhibit. An administrator is trying to configure the...
61. What are two features of a physical, star network topology?...
154. What type of communication medium is used with a wireless LAN...
159. Which command can an administrator issue on a Cisco router to...
49. Match the phases to their correct stage in the router bootup...
111. What is a possible hazard that can be caused by network cables in...
57. What is the correct order for PDU encapsulation?
72. Which protocol supports rapid delivery of streaming media?
82. A network administrator is making changes to the configuration of...
51. When is a dial-up connection used to connect to an ISP?
56. A technician uses the ping 127.0.0.1 command. What is the...
143. There was also a question about if you activated service password...
114. Refer to the exhibit. A ping to PC2 is issued from PC0, PC1, and...
145. What is the primary reason to subnet IPv6 prefixes?
155. Which method of IPv6 prefix assignment relies on the prefix...
76. Point-to-point communications where both devices can transmit and...
22. Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and...
112. What device is commonly used to verify a UTP cable?
16. Which address on a PC does not change, even if the PC is moved to...
45. Which type of wireless security generates dynamic encryption keys...
137. A network administrator is configuring access control to switch...
115. Which function is provided by TCP?
64. Which parameter does the router use to choose the path to the...
153. To what legacy address class does the address 10.0.0.0 belong?
14. Which two protocols function at the internet layer? (Choose two)
21. What is contained in the trailer of a data-link frame?
79. Refer to the exhibit. Which area would most likely be an extranet...
99. Which field in an IPv4 packet header will typically stay the same...
144. What type of communication rule would best describe CSMA/CD?
152. What action does a DHCPv4 client take if it receives more than...
13. What three application layer protocols are part of the TCP/IP...
85. Which destination address is used in an ARP request frame?
127. After making configuration changes, a network administrator...
55. Refer to the exhibit. An administrator wants to change the name of...
59. A network technician is measuring the transfer of bits across the...
95. What is the subnet address for the address...
12. Which IPv4 address can be pinged to test the internal TCP/IP...
124. How many additional bits should be borrowed from a /26 subnet...
80. Three office workers are using the corporate network. The first...
52. On a school network, students are surfing the web, searching the...
3. A host is accessing a Web server on a remote network. Which three...
46. ........ is a best-effort, connectionless application layer...
83. What information does the loopback test provide?
38. Refer to the exhibit. Which IP addressing scheme should be...
53. During normal operation, from which location do most Cisco routers...
74. Refer to the exhibit. What is the significance of the asterisk (*)...
47. Which two components are necessary for a wireless client to be...
136. A host PC is attempting to lease an address through DHCP. What...
148. How could a faulty network device create a source of hazard for a...
117. Which router interface should be used for direct remote access to...
75. Which WLAN security protocol generates a new dynamic key each time...
78. A host is accessing a Telnet server on a remote network. Which...
33. What is the effect of configuring the ipv6 unicast-routing command...
120. Refer to the exhibit. A TCP segment from a server has been...
68. What types of addresses make up the majority of addresses within...
93. Which two components are configured via software in order for a PC...
94. Which two reasons generally make DHCP the preferred method of...
19. What is an important function of the physical layer of the OSI...
34. Which group of IPv6 addresses cannot be allocated as a host source...
105. Why does HTTP use TCP as the transport layer protocol?
50. A host is accessing an FTP server on a remote network. Which three...
4. Refer to the exhibit. From which location did this router load the...
134. Which type of wireless security is easily compromised?
60. Which characteristics describe fiber optic cable? (Choose two.)
32. How many bits make up the single IPv6 hextet :10CD:?
39. Which two notations are useable nibble boundaries when subnetting...
5. Refer to the exhibit. Which action will be successful?
157. What is the prefix for the host address...
121. Which statement is true about an interface that is configured...
15. Which publicly available resources describe protocols, processes,...
119. Which three statements characterize the transport layer...
70. A company has a network address of 192.168.1.64 with a subnet mask...
240. Refer to the exhibit. The administrator configured the access to...
73. Why would a network administrator use the tracert utility?
123. A network administrator is variably subnetting a given block of...
44. What two preconfigured settings that affect security are found on...
20. Which two statements describe the characteristics of fiber-optic...
25. Which technology provides a solution to IPv4 address depletion by...
43. Match the IPv6 address to the IPv6 address type. (Not all options...
86. What is the auto-MDIX feature on a switch?
66. Which statement describes a characteristic of the Cisco router...
100. Launch PT – Hide and Save PT
...
81. During normal operation, from which location do most Cisco...
29. In which default order will a router search for startup...
35. What is the purpose of ICMP messages?
107. What field content is used by ICMPv6 to determine that a packet...
88. Which statement describes the sequence of processes executed by a...
108. Which firewall technique blocks incoming packets unless they are...
109. A network technician is investigating network connectivity from a...
27. Which of the following are primary functions of a router? (Choose...
135. A network administrator notices that the throughput on the...
62. A frame is transmitted from one networking device to another. Why...
106. What is the valid most compressed format possible of the IPv6...
40. A host PC has just booted and is attempting to lease an address...
122. Refer to the exhibit. An administrator must send a message to...
17. What is the protocol that is used to discover a physical address...
18. What will happen if the default gateway address is incorrectly...
36. Refer to the exhibit. A technician has configured a user...
37. A network administrator needs to monitor network traffic to and...
140. Which statement best describes the operation of the File Transfer...
87. What are the two main components of Cisco Express Forwarding...
91. Which three statements characterize the transport layer protocols?...
92. Which statement is true regarding the UDP client process during a...
24. What is the purpose of the routing process?
84. What happens when a switch receives a frame and the calculated CRC...
89. Refer to the exhibit. Router R1 has two interfaces that were...
102. What is the purpose of adjacency tables as used in Cisco Express...
42. Refer to the exhibit. The network administrator enters these...
146. Which statement describes data throughput?
28. Which two statements correctly describe a router memory type and...
101. What must be configured to enable Cisco Express Forwarding (CEF)...
126. An administrator issued the service password-encryption command...
65. Which two statements describe the functions or characteristics of...
104. A user gets an IP address of 192.168.0.1 from the company network...
142. Why does layer 3 device perform the ANDing process on a...
63. What will a Layer 2 switch do when the destination MAC address of...
151. Which two services or protocols use the preferred UDP protocol...
71. In a network that uses IPv4, what prefix would best fit a subnet...
141. A client is establishing a TCP session with a server. How is the...
129. A network administrator is enabling services on a newly installed...
118. A technician is configuring a router to allow for all forms of...
26. Refer to the exhibit. Consider the IP address configuration shown...
96. What is the purpose of the network security authentication...
128. What are two features of ARP? (Choose two.)
133. Which statement is true about DHCP operation?
1. What is a function of the data link layer?
41. What is the purpose of the network security accounting function?
31. Which three IP addresses are private ? (Choose three.)
149. What are three important considerations when planning the...
23. How does a Layer 3 switch differ from a Layer 2 switch?
156. What is a characteristic of DNS?
158. What information is maintained in the CEF adjacency table?
103. Which statement describes a characteristic of the network layer...
77. Match the following