циско 64-111

циско 64-111

1st Grade

55 Qs

quiz-placeholder

Similar activities

айзат 1-58

айзат 1-58

1st - 5th Grade

58 Qs

Holy macaroni

Holy macaroni

1st Grade

56 Qs

Demilade's Assessment

Demilade's Assessment

1st Grade

50 Qs

циско 21-63

циско 21-63

1st Grade

53 Qs

циско конец

циско конец

1st Grade

53 Qs

акт  100-150

акт 100-150

1st - 5th Grade

50 Qs

Computer Basics Quiz

Computer Basics Quiz

1st - 5th Grade

50 Qs

икт 2 (100-150)

икт 2 (100-150)

1st Grade

50 Qs

циско 64-111

циско 64-111

Assessment

Quiz

Others

1st Grade

Medium

Created by

6frnrdv4vj apple_user

Used 5+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

analyze the destination IP address

switch the packet to the directly connected interface

look up the next-hop address for the packet

discard the traffic after consulting the route table

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes antispyware?

applications that protect end devices from becoming infected with malicious software

a network device that filters access and traffic coming into a network

software on a router that filters traffic based on IP addresses or applications

a tunneling protocol that provides remote users with secure access into the network of an organization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

Telnet

AUX

SSH

Console

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the two most effective ways to defend against malware? (Choose two.)

Implement network firewalls

Update the operating system and other application software

Install and update antivirus software

Implement a VPN

Implement RAID

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?

brute-force attack

Trojan horse

DoS

buffer overflow

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?

User Datagram Protocol field

transport layer error check field

flow control field

frame check sequence field

error correction process field

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.248

255.255.255.0

255.255.255.128

255.255.255.192

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?