Ad Blocker Detectado
Nuestro sitio web es posible al mostrar anuncios en línea a nuestros visitantes. Por favor considere apoyarnos deshabilitando su bloqueador de anuncios.
Ránking de puntuaciones: CCNA1 v6.0 Chapter 11 Exam
Posición | Nombre | Realizado el | Puntos | Resultado |
---|---|---|---|---|
La tabla se está cargando | ||||
No hay datos disponibles | ||||
Límite de tiempo: 0
SUmario del cuestionario
0 de 27 preguntas completado
Preguntas:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
Información
CCNA1 v6.0 Chapter 11 Exam
Ya has realizado este cuestionario antes. Por tanto, no puedes empezarlo otra vez.
Cargando el cuestionario...
Debes ser un usuario registrado para poder realizar el cuestionario.
Tienes que terminar antes el siguiente cuestionario, para iniciar este cuestionario:
Resultados
0 de 27 preguntas contestadas correctamente
Tu tiempo:
El tiempo se ha terminado
Has conseguido 0 de 0 puntos posibles (0)
Puntuación de promedio: |
|
Tu puntuación |
|
Categorías
- No asignada a ninguna categoría 0%
Tus resultado se han guardado en el ránking
Cargando
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- Contestada
- Revisada
-
Pregunta 1 de 27
1. Pregunta
1 puntosA newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
Correcto
Incorrecto
-
Pregunta 2 de 27
2. Pregunta
1 puntosWhich network design consideration would be more important to a large corporation than to a small business?
Correcto
Incorrecto
-
Pregunta 3 de 27
3. Pregunta
2 puntosWhich two traffic types require delay sensitive delivery? (Choose two.)
Correcto
Incorrecto
-
Pregunta 4 de 27
4. Pregunta
3 puntosA network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth? (Choose three.)
Correcto
Incorrecto
-
Pregunta 5 de 27
5. Pregunta
2 puntosWhich two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)
Correcto
Incorrecto
-
Pregunta 6 de 27
6. Pregunta
1 puntosSome routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
Correcto
Incorrecto
-
Pregunta 7 de 27
7. Pregunta
1 puntosWhich type of network threat is intended to prevent authorized users from accessing resources?
Correcto
Incorrecto
-
Pregunta 8 de 27
8. Pregunta
2 puntosWhich two actions can be taken to prevent a successful network attack on an email server account? (Choose two.)
Correcto
Incorrecto
-
Pregunta 9 de 27
9. Pregunta
1 puntosWhich firewall feature is used to ensure that packets coming into a network are legitimate responses initiated from internal hosts?
Correcto
Incorrecto
-
Pregunta 10 de 27
10. Pregunta
1 puntosWhat is the purpose of the network security authentication function?
Correcto
Incorrecto
-
Pregunta 11 de 27
11. Pregunta
1 puntosA network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?
Correcto
Incorrecto
-
Pregunta 12 de 27
12. Pregunta
1 puntosWhat is the purpose of using SSH to connect to a router?
Correcto
Incorrecto
-
Pregunta 13 de 27
13. Pregunta
2 puntosWhich two steps are required before SSH can be enabled on a Cisco router? (Choose two.)
Correcto
Incorrecto
-
Pregunta 14 de 27
14. Pregunta
1 puntosWhat is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?
Correcto
Incorrecto
-
Pregunta 15 de 27
15. Pregunta
1 puntosWhich command will backup the configuration that is stored in NVRAM to a TFTP server?
Correcto
Incorrecto
-
Pregunta 16 de 27
16. Pregunta
1 puntosRefer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?
Correcto
Incorrecto
-
Pregunta 17 de 27
17. Pregunta
1 puntosWhen should an administrator establish a network baseline?
Correcto
Incorrecto
-
Pregunta 18 de 27
18. Pregunta
1 puntosRefer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?
Correcto
Incorrecto
-
Pregunta 19 de 27
19. Pregunta
1 puntosWhich statement is true about CDP on a Cisco device?
Correcto
Incorrecto
-
Pregunta 20 de 27
20. Pregunta
1 puntosA network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?
Correcto
Incorrecto
-
Pregunta 21 de 27
21. Pregunta
1 puntosA network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?
Correcto
Incorrecto
-
Pregunta 22 de 27
22. Pregunta
1 puntosA network technician issues the C:\> tracert -6 http://www.cisco.com command on a Windows PC. What is the purpose of the -6 command option?
Correcto
Incorrecto
-
Pregunta 23 de 27
23. Pregunta
1 puntosWhich command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH?
Correcto
Incorrecto
-
Pregunta 24 de 27
24. Pregunta
1 puntosFill in the blank.
- (VoIP, voip, VOIP) defines the protocols and technologies that implement the transmission of voice data over an IP network
Correcto
Incorrecto
-
Pregunta 25 de 27
25. Pregunta
1 puntosFill in the blank. Do not use abbreviations.
- The show (file systems, FILE SISTEMS) command provides information about the amount of free nvram and flash memory with the permissions for reading or writing data.
Correcto
Incorrecto
-
Pregunta 26 de 27
26. Pregunta
1 puntosFill in the blank. Do not use abbreviations.
- The (show version, SHOW VERSION) command that is issued on a router is used to verify the value of the software configuration register.
Correcto
Incorrecto
-
Pregunta 27 de 27
27. Pregunta
4 puntosMatch the type of information security threat to the scenario. (Not all options are used.)
Ordenar elementos
- data loss
- identity theft
- disruption of service
- information theft
-
installing virus code to destroy surveillance recordings for certain days
-
pretending to be someone else by using stolen personal information to apply for a credit card
-
preventing userd from accessing a website by sending a large number of link requests in a short period
-
obtaining trade secret documents illegally
Correcto
Incorrecto