Search Header Logo

CCNA CH6

Authored by KEN ROLLOQUE

Arts

University

Used 2+ times

CCNA CH6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?

exposure factor
hardware
quantitative
qualitative

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A user is evaluating the network infrastructure of a company. The user noted many redundant systems and devices in place, but no overall evaluation of the network. In a report, the user emphasized the methods and configurations needed as a whole to make the network fault tolerant. What is the type of design the user is stressing?

resilient
comprehensive
spanning tree
availability

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

A user has completed a six month project to identify all data locations and catalog the location. The next step is to classify the data and produce some criteria on data sensitivity. Which two steps can the user take to classify the data? (Choose two.)

Treat all the data the same.
Determine how often data is backed up.
Establish the owner of the data.
Identify sensitivity of the data.
Determine permissions for the data.

4.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

A user needs to add redundancy to the routers in a company. What are the three options the user can use? (Choose three.)

VRRP
IPFIX
STP
HSRP
GLBP

5.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

A user is asked to evaluate the data center to improve availability for customers. The user notices that there is only one ISP connection, some of the equipment is out of warranty, there are no spare parts, and no one was monitoring the UPS which was tripped twice in one month. Which three deficiencies in high availability has the user identified? (Choose three.)

single points of failure
failure to detect errors as they occur
failure to prevent security incidents
ailure to protect against poor maintenance
failure to design for reliability

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network?

NAC
IPS
IDS
firewall

7.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

 A user is a consultant who is hired to prepare a report to Congress as to which industries should be required to maintain five nine availability. Which three industries should the user include in a report? (Choose three.)

finance
food service
healthcare
education
public safety

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?