Search Header Logo

Networking Quiz

Authored by Trung Chi

Computers

University

Used 2+ times

Networking Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does using the service password-encryption command on a router provide additional security?

by encrypting all passwords passing through the router

by encrypting passwords in the plain text configuration file

by requiring entry of encrypted passwords for access to the device

by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

by automatically suggesting encrypted passwords for use in configuring the router

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When are packets processed by an inbound access list?

before they are routed to an outbound interface

after they are routed to an outbound interface

before and after they are routed to an outbound interface

after they are routed to an outbound interface but before being placed in the outbound queue

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?

255.255.255.248

255.255.255.224

0.0.0.224

0.0.0.8

0.0.0.7

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three valid reasons to assign ports to VLANs on a switch? (Choose three.)

to logically group hosts according to function

to increase the size of the collision domain

to increase network security

to isolate broadcast traffic

to make VTP easier to implement

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to establish a secure terminal connection to a remote network device?

SNMPv1

SSH

ARP

WEP

Telnet

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)

source IP address and destination IP address

VLAN number

source switch port number

TCP or UDP port numbers

protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?

transport output all

transport preferred all

transport type all

transport input all

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?