циско 64-111

циско 64-111

1st Grade

55 Qs

quiz-placeholder

Similar activities

B.inggris kls 4 PAS

B.inggris kls 4 PAS

1st Grade

59 Qs

PAT PROGRAM DASAR X TKJ 2025

PAT PROGRAM DASAR X TKJ 2025

1st Grade - University

50 Qs

Homework 190424

Homework 190424

1st - 5th Grade

50 Qs

Informatika

Informatika

1st Grade

50 Qs

ikt

ikt

1st - 5th Grade

55 Qs

english grammar

english grammar

1st - 5th Grade

50 Qs

Reading and Language Arts Practice

Reading and Language Arts Practice

1st - 5th Grade

54 Qs

Math

Math

1st - 5th Grade

60 Qs

циско 64-111

циско 64-111

Assessment

Quiz

Others

1st Grade

Medium

Created by

6frnrdv4vj apple_user

Used 5+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

analyze the destination IP address

switch the packet to the directly connected interface

look up the next-hop address for the packet

discard the traffic after consulting the route table

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes antispyware?

applications that protect end devices from becoming infected with malicious software

a network device that filters access and traffic coming into a network

software on a router that filters traffic based on IP addresses or applications

a tunneling protocol that provides remote users with secure access into the network of an organization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

Telnet

AUX

SSH

Console

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the two most effective ways to defend against malware? (Choose two.)

Implement network firewalls

Update the operating system and other application software

Install and update antivirus software

Implement a VPN

Implement RAID

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?

brute-force attack

Trojan horse

DoS

buffer overflow

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?

User Datagram Protocol field

transport layer error check field

flow control field

frame check sequence field

error correction process field

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.248

255.255.255.0

255.255.255.128

255.255.255.192

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?