Networking Quiz

Networking Quiz

University

10 Qs

quiz-placeholder

Similar activities

Cyber 2 Module 4

Cyber 2 Module 4

9th Grade - Professional Development

15 Qs

Switching Methods

Switching Methods

University

10 Qs

Practicum Week 4 Review

Practicum Week 4 Review

10th Grade - University

11 Qs

Lecture 13

Lecture 13

University

10 Qs

Tecnologias de Roteamento - Nivelamento

Tecnologias de Roteamento - Nivelamento

University

15 Qs

Module 7-DHCPv4

Module 7-DHCPv4

9th Grade - University

9 Qs

AZ-204_basics

AZ-204_basics

University

7 Qs

CompTIA A+ 220-1001

CompTIA A+ 220-1001

University

10 Qs

Networking Quiz

Networking Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Trung Chi

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does using the service password-encryption command on a router provide additional security?

by encrypting all passwords passing through the router

by encrypting passwords in the plain text configuration file

by requiring entry of encrypted passwords for access to the device

by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

by automatically suggesting encrypted passwords for use in configuring the router

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When are packets processed by an inbound access list?

before they are routed to an outbound interface

after they are routed to an outbound interface

before and after they are routed to an outbound interface

after they are routed to an outbound interface but before being placed in the outbound queue

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?

255.255.255.248

255.255.255.224

0.0.0.224

0.0.0.8

0.0.0.7

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three valid reasons to assign ports to VLANs on a switch? (Choose three.)

to logically group hosts according to function

to increase the size of the collision domain

to increase network security

to isolate broadcast traffic

to make VTP easier to implement

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to establish a secure terminal connection to a remote network device?

SNMPv1

SSH

ARP

WEP

Telnet

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)

source IP address and destination IP address

VLAN number

source switch port number

TCP or UDP port numbers

protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?

transport output all

transport preferred all

transport type all

transport input all

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?