ENSA 64-120 MC & SC

ENSA 64-120 MC & SC

57 Qs

quiz-placeholder

Similar activities

Physical Science 1st Semester Benchmark 23-24

Physical Science 1st Semester Benchmark 23-24

KG - University

55 Qs

Bloom's 2024 Physical Science Semester Exam

Bloom's 2024 Physical Science Semester Exam

9th - 12th Grade

60 Qs

11-сынып: Электромагниттік тербелістер

11-сынып: Электромагниттік тербелістер

KG - University

60 Qs

Dasar Program Keahlian (C2) TKJ

Dasar Program Keahlian (C2) TKJ

KG - University

55 Qs

Cloud Solutions Environment for share

Cloud Solutions Environment for share

KG - University

57 Qs

SOAL PTS DASPRO 2 SEM 1 2025

SOAL PTS DASPRO 2 SEM 1 2025

10th Grade

53 Qs

TES DETEKSI CIRI / SIFAT

TES DETEKSI CIRI / SIFAT

KG - University

60 Qs

ENSA 64-120 MC & SC

ENSA 64-120 MC & SC

Assessment

Quiz

others

Easy

Created by

sugus viur

Used 4+ times

FREE Resource

57 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

64. Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)
interface identifier
connection type
device type
cable specification
OS/IOS version

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
65. Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?
The NAT pool has been exhausted.
The wrong netmask was used on the NAT pool.
Access-list 1 has not been configured properly.
The inside and outside interfaces have been configured backwards.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

66. What are two benefits of using SNMP traps? (Choose two.)
They eliminate the need for some periodic polling requests.
They reduce the load on network and agent resources.
They limit access for management systems only.
They can provide statistics on TCP/IP packets that flow through Cisco devices.
They can passively listen for exported NetFlow datagrams.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

67. Which statement accurately describes a characteristic of IPsec?
IPsec works at the application layer and protects all application data.
IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
IPsec works at the transport layer and protects data at the network layer.
IPsec is a framework of open standards that relies on existing algorithms.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

68. In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)
connect users to the network
provide a high-speed network backbone
connect remote networks
provide Power over Ethernet to devices
provide data traffic security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
70. Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?
Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

71. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)
reduced costs
decreased number of critical points of failure
increased flexibility
increased bandwidth availability
increased network management options

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?