Networking is a complex yet understandable concept of Computer Science and Networking Hardware Review 3 queries on the different protocols within the study not to mention the critical thinking comprehensions. All the best and enjoy.
Terminal editing
?
Terminal history
Show history
Rate this question:
Shutdown
Secure
Protect
Restrict
Rate this question:
Cat5 twitsted pair cable
Cat5e twisted pair cable
SC connectors
RJ-45 connectors
Multi-mode fiber optic cable
Cat4 twisted pair cable
Single-mode fiber optic cable
Rate this question:
Keep the router in a locket room.
Set a password and use the login command for line con 0.
Use the service password-encryption command.
Configure the enable secret password.
Configure SSH.
It prevents message loops from developing when a switch or bridge is connected to the same location more than once.
It doesn't prevent any problem. Instead, it creates and overall routing table (a span tree) for the entire network.
It prevents buffer overflows by defining source quench messages that a receiving device sends to the transmitting device.
It prevents route tables from becoming outdated by decreasing the convergence time on a network.
Rate this question:
Enter setup mode
Stop with a configuration file load error
Prompt you for the location of a valid configuration file
Enter ROM monitor mode
Rate this question:
It includes a solid plastic core.
It supports 10 Mbps Ethernet connections.
It is uses twisted 18- or 16- gauge copper wiring.
It is completely immune to EMI.
It supports multi-mode transmission.
Rate this question:
192.0.0.0
192.168.1.0
192.168.1.255
192.168.0.0
Rate this question:
It holds a limited version of the IOS software to be used if the full IOS image can't be found.
It provides a long-term storage location for saving alternate configuration files and IOS images.
It holds the startup-config file that is copied into memory when the device boots.
It holds the current configuration used by the device as it runs.
Rate this question:
::1
FE80::1
::
FF02::1
Rate this question:
Link-local
Global unicast
Unique local
Site-local
Multicast
Rate this question:
Define S0/1/0 as an inside NAT interface.
Define Fa0/0 and Fa0/1 as inside NAT interfaces.
Configure a static NAT mapping for Srv1 and Srv2
Define Fa0/0 as an inside NAT interface.
Configure a static NAT mapping for Srv1.
Rate this question:
Apply access list 7 on S0/1/0 as an outbound access list instead of an inbout list.
Use an extended access list instead of a standard access list.
Change the mask used in the access list statements to 255.255.255.255.
Apply access list 7 to the Fa0/0 and Fa0/1 interfaces instead of the S0/1/0 inteface. Use the out parameter.
Enter terminal no history at the command prompt.
Press the Ins key.
Press the Up-arrow key.
Enter terminal editing at the command prompt.
Enter show history at the command prompt.
Rate this question:
Forward the packet addressed to 172.16.0.19 to router 172.16.0.33
Forward the packet addressed to 172.16.0.109 to router 172.16.0.1
Drop the packet addressed to 172.16.0.109
Forward the packet addressed to 172.16.0.19 to router 172.16.0.1
Drop the packet addressed to 172.16.0.19
Forward the packet addressed to 172.16.0.109 to router 172.16.0.33
Rate this question:
Router
Bridge
Switch
Gateway
Hub
Repeater
Rate this question:
TCP does not sequence the data; it simply passes numbered segments created at a higher layer in the sequence defined.
TCP breaks user data into segments, numbers each segment, places them into the correct segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the next segment.
TCP breaks user data into segments, numbers each segment, and sends each segment in order, without waiting for an acknowledgement.
TCP breaks the data into segments, numbers each segment, and passes them to UDP, which sequences the segments into the correct oder.
Rate this question:
11000000.10101000.00000010.00000001
00001010.10101000.00000001.00000001
10101100.00010001.00000001.00000001
11000000.10101000.00000001.00000001
Rate this question:
RouterA, RouterB, and RouterC
RouterA and RouterC
RouterB
RouterA
RouterC
Aaa new-model
Username
Hostname
Transport input ssh
Ip domain-name
Rate this question:
Network
Data Link
Transport
Physical
Rate this question:
Bridge
Switch
Hub
Router
Gateway
Rate this question:
FE80::0055::000A:AB
FE80:0000:0000:0055:000A:AB00
FE80::55:0000:A:AB00
FE80::55::A:AB
FE80::55::A:AB00
Rate this question:
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252
Rate this question:
Inbound access lists are applied before the routing process.
Use a standard access list to filter on source or destination IP address.
An access list without a permit traffic will not allow any traffic.
You can have a maximum of two standard and two extended access lists applied to each interface.
Rate this question:
Quiz Review Timeline (Updated): Apr 16, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.