Ad Blocker Detectado
Nuestro sitio web es posible al mostrar anuncios en línea a nuestros visitantes. Por favor considere apoyarnos deshabilitando su bloqueador de anuncios.
SUmario del cuestionario
0 de 24 preguntas completado
Preguntas:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
Información
CCNA 1 Chapter 11 v5 Exam Answers
Ya has realizado este cuestionario antes. Por tanto, no puedes empezarlo otra vez.
Cargando el cuestionario...
Debes ser un usuario registrado para poder realizar el cuestionario.
Tienes que terminar antes el siguiente cuestionario, para iniciar este cuestionario:
Resultados
0 de 24 preguntas contestadas correctamente
Tu tiempo:
El tiempo se ha terminado
Has conseguido 0 de 0 puntos posibles (0)
Puntuación de promedio: |
|
Tu puntuación |
|
Categorías
- No asignada a ninguna categoría 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- Contestada
- Revisada
-
Pregunta 1 de 24
1. Pregunta
1 Which two statements about a service set identifier (SSID) are true? (Choose two.)
Correcto
Incorrecto
-
Pregunta 2 de 24
2. Pregunta
2 Which type of network attack involves the disabling or corruption of networks, systems, or services?
Correcto
Incorrecto
-
Pregunta 3 de 24
3. Pregunta
3 Which command will backup the configuration that is stored in NVRAM to a TFTP server?
Correcto
Incorrecto
-
Pregunta 4 de 24
4. Pregunta
4 Open the PT Activity.
How long will a user be blocked if the user exceeds the maximum allowed number of unsuccessful login attempts?
Correcto
Incorrecto
-
Pregunta 5 de 24
5. Pregunta
5 Fill in the blank. Do not use abbreviations.
- The (show version, SHOW VERSION) command that is issued on a router is used to verify the value of the software configuration register.
Correcto
Incorrecto
-
Pregunta 6 de 24
6. Pregunta
6 What is a security feature of using NAT on a network?
Correcto
Incorrecto
-
Pregunta 7 de 24
7. Pregunta
7 A network administrator has determined that various computers on the network are infected with a worm. Which sequence of steps should be followed to mitigate the worm attack?
Correcto
Incorrecto
-
Pregunta 8 de 24
8. Pregunta
8 Which WLAN security protocol generates a new dynamic key each time a client establishes a connection with the AP?
Correcto
Incorrecto
-
Pregunta 9 de 24
9. Pregunta
9.
Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?
Correcto
Incorrecto
-
Pregunta 10 de 24
10. Pregunta
10 When should an administrator establish a network baseline?
Correcto
Incorrecto
-
Pregunta 11 de 24
11. Pregunta
11 A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?
Correcto
Incorrecto
-
Pregunta 12 de 24
12. Pregunta
12 Which statement is true about CDP on a Cisco device?
Correcto
Incorrecto
-
Pregunta 13 de 24
13. Pregunta
13 What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?
Correcto
Incorrecto
-
Pregunta 14 de 24
14. Pregunta
14 A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario?
Correcto
Incorrecto
-
Pregunta 15 de 24
15. Pregunta
15 If a configuration file is saved to a USB flash drive attached to a router, what must be done by the network administrator before the file can be used on the router?
Correcto
Incorrecto
-
Pregunta 16 de 24
16. Pregunta
16 Which network design consideration would be more important to a large corporation than to a small business?
Correcto
Incorrecto
-
Pregunta 17 de 24
17. Pregunta
17 Which protocol supports rapid delivery of streaming media?
Correcto
Incorrecto
-
Pregunta 18 de 24
18. Pregunta
18.
Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?
Correcto
Incorrecto
-
Pregunta 19 de 24
19. Pregunta
19 Which two statements characterize wireless network security? (Choose two.)
Correcto
Incorrecto
-
Pregunta 20 de 24
20. Pregunta
20 Which two actions can be taken to prevent a successful attack on an email server account? (Choose two.)
Correcto
Incorrecto
-
Pregunta 21 de 24
21. Pregunta
21 How should traffic flow be captured in order to best understand traffic patterns in a network?
Correcto
Incorrecto
-
Pregunta 22 de 24
22. Pregunta
22 What do WLANs that conform to IEEE 802.11 standards allow wireless user to do?
Correcto
Incorrecto
-
Pregunta 23 de 24
23. Pregunta
23 Fill in the blank.
- (VoIP) defines the protocols and technologies that implement the transmission of voice data over an IP network.
Correcto
Incorrecto
-
Pregunta 24 de 24
24. Pregunta
24 Fill in the blank. Do not use abbreviations.
- The show (file systems, FILE SYSTEMS) command provides information about the amount of available and free flash memory and its permissions for reading or writing data.
Correcto
Incorrecto
peter ssekuwanda
Basing on the course more time is needed to read and understand