Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
Refers to the transmission of this digital data between two or more computers and a computer network or data network that allows computers to exchange data.
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation?
What type of information would be found on a logical topology diagram?
What is the function of the kernel of an operating software?
What organization is responsible for the overall management and development of Internet standards?
An ______ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.
How is the Cisco IOS generally accessed and navigated?
Within a production network, what is the purpose of configuring a switch with a default gateway address?
In fiber optic meda, the signals are represented as patterns of _____
What is true about the Ethernet MAC address? (Choose three.)
Why would a technician enter the command copy startup-config running config?
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
Which technology would be best to provide a home user with a highspeed, always-on Internet connection?
What type of delivery uses data link layer addresses?
Which entities are involve in a temporary communication that is established by the transport layer?
What is a group of web pages that groups of individuals can edit and view together called?
Which address is used as a destination address on a broadcast Ethernet frame?
What is an advantage of UDP over TCP?
During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?
Which two statements are true regarding the user EXEC mode? (Choose two.)
A new department has been established with 511 hosts that require addresses. Currently the company uses the 10.20.0.0/16 address space. How many bits must the network administrator borrow to provide addresses for this subnet without wasting addresses?
Which message timing factor impacts how much information can be sent and the speed at which it can be delivered?
During troubleshooting procedures, from which location will most Cisco routers load a limited IOS
Which two message timing mechanisms are used in data communication? (Choose two.)
What is a fault-tolerant network?
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
Which term defines the processing capabilities of a switch by rating how much data can be processed per second?
Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?
Which statement describes a characteristic of the frame header fields of the data link layer?
A network administrator has borrowed 3 bits from the 10.20.0.0/25 network to create subnets. The administrator then decided to use the first subnet for point-to-point serial WAN connections each requiring two addresses. How many WAN connections can the administrator address using only the first subnet if he is using VLSM?
Which two factors influence the method that is used for media access control? (Choose two.)
A _____ address is defined as a reserved address that routes packets back to the host
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?
What is the primary defense against unauthorized remote access to network devices?
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
In fiber optic meda, the signals are represented as patterns of _____
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
Why would a network administrator use the CLI of the Cisco IOS?
Which logical address is used for delivery of data to a remote network?
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
What is the Cisco IOS?
A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
Which statement describes a feature of an IOS host name configuration?
What is an advantage of using standards to develop and implement protocols?
Which type of IPv6 address is not routable and used for communication on a single subnet?
Which two engineering organizations define open standards and protocols that apply to the data link layer?
What range of ports can either be used by TCP or UDP to identify the requested service on the destination device or as a client source port?
A _____ network is able to expand to accept new devices and applications without affecting performance.
What are the primary purposes of the transport layer? (Choose three.)
The farther you are from the central office when utilizing a DSL connection, the ______ the connection speed
When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the CLI, what will be returned in the CLI?
Which two components are added to the PDU at the network access layer? (Choose two.)
What type of IPv6 address should be used for communication that is limited to a single network segment?
A network administer has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly?
In which scenario would the use of a WISP be recommended?
What two criteria are used to help select a network medium from various network media? (Choose two.)
Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks?
What are two functions of end devices on a network? (Choose two.)
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this command?
Which statement is correct about network protocols?
What type of communication will send a message to all devices on a local area network?
On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the _____ MAC address.
A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?
What is the purpose of the network address?
Which organization is responsible for developing communications standards for Voice over IP (VoIP) devices?
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
The shortest compressed format of the IPv6 address 2001: 0DB8:0000:1470:0000:0000:0000:0200 is _____
Which devices would be considered end devices on a network? (Choose four.)
Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
Which two statements describe intermediary devices? (Choose two.)
What is the purpose of using a source port number in a TCP communication?
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
Which command or key combination allows a user to return to the previous level in the command hierarchy?
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Which statement correctly describes frame encoding?
At which layers of the OSI model does Ethernet function? (Choose two.)
For which three reasons was a packet switched connectionless data communications technology used when developing the Internet (Choose three.)
Which of the following are examples of proprietary protocols? (Choose two.)
In which scenario would the use of a WISP be recommended
Which TCP header field specifies the number of bytes that can be accepted before an acknowledgement is required?
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
Which type of traffic must receive the highest priority from QoS?
What happens when a data collision occurs on an Ethernet bus?
Which device acts as gateway to allow hosts to send traffic to remote IP networks?
What is a network infrastructure that provides access to other networks over a wide geographic area?
Which of the following are disadvantages of peer-to-peer networking? (Choose two.)
Which organization is responsible for the standard that defines Media Access Control for wired Ethernet?
Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to the interface?
What is the name given to a one-to-many message delivery option?
What is an advantage that UDP has over TCP?
What is the command netstat –r used for?
What is and advantage of using standards to develop and implement protocols?
A collision fragment, also known as a _____ frame, is a frame of fewer than 64 bytes in length.
Which is a function of the Logical Link Control (LLC) sublayer?
What is a characteristic of a WAN hub-and-spoke topology?
What happens to frames that are too long or too short for the channel used?
What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
Which entities are involved in a temporary communication that is established by the transport layer?
Which of the following are business-class Internet connection technologies normally supplied by a service provider? (Choose two.)
When is a wired connection preffered to a wireless connection by an end-user device?
What is the purpose of protocols in data communications?
Which field in an Ethernet frame is used for error detection?
The 8-bit binary value for 41 is _____
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
What happens if part of an FTP message is not delivered to the destination?
The farther you are from the central office when utilizing a DSL connection, the _____ the connection speed
What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer? (Choose three.)
Which OSI reference model layer is responsible for common representation of the data transferred between application layer services?
What are the contents of the data field in a frame?
A ______ address is defined as a reserved address that routes packets back to the host
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
The Ethernet _____ sublayer is responsible for communicating directly with the physical layer.
How does the network layer use the MTU value?
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?
What is the name given to the Ethernet MAC sublayer PDU?
Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
When a client connects to an HTTP server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response?
Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?
What happens when two devices on the same subnet are communicating?
Which application use UDP as the transport layer protocol?
Which device performs the function of determining the path that messages should take through internet works?
What is the primary purpose of ARP?
Which address is a multicast MAC address?
What is a wiki?
To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain
Which application layer protocol allows users on one network to reliably transfer files to and from a host on another network?
Which of these statements regarding UTP network cabling are true? (Choose two.)
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
Which three fields are used in a UDP segment header? (Choose three.)
What name is given to a group of interrelated protocols necessary to perform a communication function?
What command will display a list of keywords available for viewing the status of an IOS switch?
Which two statements are true of the deterministic access method?(Choose two.)
Why is DHCP preferred for use on large networks?
What is the transport layer PDU?
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer
A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?
A client is downloading a large file from a server using FTP. Many of the segments are lost during transit. What will most likely happen?
A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?
Which number or set of numbers represents a socket?
Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
What process is used to place one message inside another message for transfer from the source to the destination?
Which destination address is used in an ARP request frame?
Which of the following elements do both human and computer communication systems have in common? (Choose three.)
What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?
What is encrypted with the enable secret command?
Which two functions or operations are performed by the MAC sublayer? (Choose two.)
Where is the configuration used during startup on Cisco IOS devices located?
The last host address on the 10.15.25.0/24 network is _____
Which TCP/IP model layer is responsible for providing the best path through the network?
Which two statement describe broadcast transmissions on a wired network? (Choose two.)
What are two functions that are provided by the network layer? (Choose two.)
Which statement describes a network that supports QoS?
What is assigned by the transport layer to identify an application or service?
Which message delivery option is used when all devices need to receive the same message simultaneously?
Which statement accurately describes public IP addresses?
An _____ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.
Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC?
What is the purpose of the physical link control field in a data link layer header?
What are the purpose and functions of the physical layer in data networks? (Choose two.)
Which two files are loaded into RAM by the router when it boots? (Choose two.)
Which of the following OSI model layers have the same functionality as the network access layer in the TCP/IP model? (Choose two.)
Which statement is true about an interface that is configured with the IPv6 address command?
What are the primary requirements of information security? (Choose three.)
What type of address is 01-00-5E-0A-00-02?
Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?
What is a characteristic of a contention-based access method?
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
Which type of network design combines voice, video, and data on the same communication channel?
The TCP/IP application layer effectively consists of which three OSI layers?
What is a characteristic of UDP?
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Which of the following IPv4 addresses would be used in a private network?
What three protocols do email users and servers use to process email? (Choose three.)
What type of connection to a Cisco IOS switch is used to make the initial configuration?
What type of protocol describes communication over a data link and the physical transmission of data on the network media?
What is a converged network?
What does UDP do when receiving messages that are more than one datagram in length?
What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3?
What are the parts of an IPv4 address? (Choose two.)
What will a network administrator use to modify a configuration on a Cisco router?
What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)
Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model? (Choose two.)
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectObject Oriented Programming Laboratory
Network Security
Mobile Programming
Management Information Systems
Mobile Application Design and Development
Mobile Application Design and Development 2
Managing Information and Technology
Mail and Web Services
Living in the Information Technology Era
Information Technology Capstone Project
Information Technology Practicum
Intro to Hardware Description Language
Introduction to Computing
Introduction to Multimedia
Introduction to Human Computer
Introduction to Information Systems
Internet Technology in Real Estate
Integrative Programming and Technology 2
Internet Marketing and Entrepreneurship
Information Assurance and Security 2
Information Systems Operations and Maintenance
Information Assurance and Security 3
Information Security and Management
Fundamentals of Database System
Fundamentals of Investigation and Intelligence
Digital Imaging
Database Management System
Data Structures and Algorithms
Data Communications and Networking 2
Cyber Security: Theories and Practice
Chemistry for Engineers
Computer Fundamentals
Load Testing
Animation Project
3D Game Art Development
Auditing and Assurance Concepts and Applications
System Administration and Maintenance
Computer Programming
Integrative Programming and Technology
Data Communications and Networking 4
Current Trends and Issues
Linux Administration
Applied Business Tools and Technologies
Software Engineering
Systems Integration and Architecture
Application Lifecycle Management
Data Communications and Networking 3
Information Assurance and Security
Principles of Operating System and its Application
Driver Device
Air Conditioning and Refrigeration Service
Refrigeration Service
Network Administration
Maintenance Technology
Industrial Electronics Maintenance
Electronics Engineering Technology
Computer Support Technician
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts