Final Exam Answers Full - ENSA (71-140)

Final Exam Answers Full - ENSA (71-140)

12th Grade

71 Qs

quiz-placeholder

Similar activities

Midterm Exam - Modules 1-6

Midterm Exam - Modules 1-6

12th Grade

72 Qs

UTS GANJIL Informatika KELAS X

UTS GANJIL Informatika KELAS X

10th Grade - University

70 Qs

KARMA QUIZ (IC DONANIM BIRIMLERI)

KARMA QUIZ (IC DONANIM BIRIMLERI)

9th - 12th Grade

66 Qs

Review Computer Question

Review Computer Question

9th - 12th Grade

75 Qs

LONG QUIZ 1

LONG QUIZ 1

12th Grade

70 Qs

Tin 12 - Bài 1-4

Tin 12 - Bài 1-4

12th Grade

73 Qs

flowchart and algorithm

flowchart and algorithm

9th - 12th Grade

66 Qs

EXAM REVISION 1-2

EXAM REVISION 1-2

1st Grade - University

72 Qs

Final Exam Answers Full - ENSA (71-140)

Final Exam Answers Full - ENSA (71-140)

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Kalei Cook

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

71 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

71. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)

reduced costs

decreased number of critical points of failure

increased flexibility

  • increased bandwidth availability

increased network management options

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

72. What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

to scan for accessibility

  • to retrieve and modify data

to gather information about the network and devices

to prevent other users from accessing the system

to escalate access privileges

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

73. A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?

botnet

spyware

virus

rootkit

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

74. An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq dns .

If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?

permitted

denied

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

75. Refer to the exhibit. From which location did this router load the IOS?

flash memory

NVRAM?

RAM

ROM

a TFTP server?

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

76. Refer to the exhibit. Which data format is used to represent the data for network automation applications?

XML

YAML

HTML

JSON

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

77. What QoS step must occur before packets can be marked?

classifying

shaping

queuing

policing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?