What is a characteristic of a fault tolerant network?
2
.
Three bank employees are using the corporate network.
The first employee uses a web browser to view a company
web page in order to read some announcements. The
second employee accesses the corporate database to
perform some financial transactions. The third employee
participates in an important live audio conference with
other corporate managers in branch offices. If QoS is
implemented on this network, what will be the priorities
from highest to lowest of the different data types?
3
.
What is a benefit of using cloud computing in
networking?
4
.
What is the function of the shell in an OS?
5
.
Which connection provides a secure CLI session with
encryption to a Cisco switch?
6
.
A network technician is attempting to configure an
interface by entering the following command:
SanJose(config)# ip address 192.168.2.1 255.255.255.0. The
command is rejected by the device. What is the reason for
this?
7
.
An administrator uses the Ctrl-Shift-6 key combination
on a switch after issuing the ping command. What is the
purpose of using these keystrokes?
8
.
Refer to the exhibit. A network administrator is
configuring access control to switch SW1. If the
administrator uses a console connection to connect to the
switch, which password is needed to access user EXEC
mode?
8
.
Refer to the exhibit. A network administrator is
configuring access control to switch SW1. If the
administrator uses a console connection to connect to the
switch, which password is needed to access user EXEC
mode?
10
.
What protocol is responsible for controlling the size of
segments and the rate at which segments are exchanged
between a web client and a web server?
11
.
What is an advantage to using a protocol that is defined
by an open standard?
12
.
What are two benefits of using a layered network
model? (Choose two.)
13
.
Which two OSI model layers have the same
functionality as two layers of the TCP/IP model? (Choose
two.)
14
.
Which name is assigned to the transport layer PDU?
15
.
A network engineer is measuring the transfer of bits
across the company backbone for a mission critical
database application. The engineer notices that the
network throughput appears lower than the bandwidth
expected. Which three factors could influence the
differences in throughput? (Choose three.)
16
.
A network administrator is troubleshooting
connectivity issues on a server
. Using a tester
, the
administrator notices that the signals generated by the
server NIC are distorted and not usable. In which layer of
the OSI model is the error categorized?
17
.
Which type of UTP cable is used to connect a PC to a
switch port?
18
.
A network administrator is measuring the transfer of
bits across the company backbone for a mission critical
financial application. The administrator notices that the
network throughput appears lower than the bandwidth
expected. Which three factors could influence the
differences in throughput? (Choose three.)
19
.
What is a characteristic of UTP cabling?
20
.
What are two characteristics of fiber-optic cable?
(Choose two.)
21
.
What is a characteristic of the LLC sublayer?
22
.
A network team is comparing physical W
AN topologies
for connecting remote sites to a headquarters building.
Which topology provides high availability and connects
some, but not all, remote sites?
23
.
What method is used to manage contention-based
access on a wireless network?
24
.
What are the three primary functions provided by Layer
2 data encapsulation? (Choose three.)
25
.
What will a host on an Ethernet network do if it receives
a frame with a destination MAC address that does not
match its own MAC address?
26
.
What are two examples of the cut-through switching
method? (Choose two.)
27
.
What are two actions performed by a Cisco switch?
(Choose two.)
28
.
Which frame forwarding method receives the entire
frame and performs a CRC check to detect errors before
forwarding the frame?
29
.
Refer to the exhibit. If host A sends an IP packet to host
B, what will the destination address be in the frame when it
leaves host A?
30
.
What addresses are mapped by ARP?
168
.
In what networking model would eDonkey
, eMule,
BitT
orrent, Bitcoin, and LionShare be used?