Home CCNA - Routing & Switching CCNA – Routing & Switching v2 🔍 CCNA – Routing & Switching v2 Categoria: CCNA - Routing & Switching Descrição Avaliações (0) 0 CCNA - Routing & Switching v2 1 / 15 A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination? the network domain of the destination host the IP address of the default gateway the MAC address of the destination host the MAC address of the default gateway 2 / 15 Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The source port field identifies the running application or service that will handle data returning to the PC. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. TCP is the preferred protocol when a function requires lower network overhead. The TCP source port number identifies the sending host on the network. 3 / 15 What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.) IP addresses interface descriptions MAC addresses next-hop addresses Layer 1 statuses speed and duplex settings 4 / 15 A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network? ping nslookup tracert ipconfig /displaydns 5 / 15 A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.) Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. Fiber optic cabling requires specific grounding to be immune to EMI. Fiber optic cabling is susceptible to loss of signal due to RFI. Fiber optic cable is able to withstand rough handling. Fiber optic provides higher data capacity but is more expensive than copper cabling. 6 / 15 What technique is used with UTP cable to help protect against signal interference from crosstalk? wrapping a foil shield around the wire pairs. twisting the wires together into pairs. terminating the cable with special grounded connectors. encasing the cables within a flexible plastic sheath. 7 / 15 A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.) extensive cabling mobility options packet collision interference security coverage área 8 / 15 Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? virus worm phishing spam 9 / 15 Which scenario describes a function provided by the transport layer? A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site. 10 / 15 What does the term “attenuation” mean in data communication? strengthening of a signal by a networking device leakage of signals from one cable pair to another time for a signal to reach its destination loss of signal strength as distance increases 11 / 15 Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.) TCP IP UDP POP DNS Ethernet 12 / 15 A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework? automation accounting authentication authorization 13 / 15 What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.) message size message encoding connector specifications media selection delivery options end-device installation 14 / 15 What are two characteristics of IP? (Choose two.) does not require a dedicated end-to-end connection operates independently of the network media retransmits packets if errors occur re-assembles out of order packets into the correct order at the receiver end guarantees delivery of packets 15 / 15 An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario? (Choose three.) security quality of service scalability powerline networking integrity fault tolerance Sua nota é LinkedIn Facebook Twitter VKontakte Avaliações Não há avaliações ainda. Seja o primeiro a avaliar “CCNA – Routing & Switching v2”Cancelar respostaO seu endereço de e-mail não será publicado. Campos obrigatórios são marcados com *Sua avaliação * Avaliar… Perfeito Bom Razoável Nada mal Muito ruim Nome *E-mail *Sua avaliação sobre o produto * Eu aceito as políticas de privacidade Salvar meus dados neste navegador para a próxima vez que eu comentar. Enviar Produtos relacionados CCNA – Routing & Switching v1 CCNA - Routing & Switching Leia mais
0 CCNA - Routing & Switching v2 1 / 15 A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination? the network domain of the destination host the IP address of the default gateway the MAC address of the destination host the MAC address of the default gateway 2 / 15 Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The source port field identifies the running application or service that will handle data returning to the PC. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. TCP is the preferred protocol when a function requires lower network overhead. The TCP source port number identifies the sending host on the network. 3 / 15 What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.) IP addresses interface descriptions MAC addresses next-hop addresses Layer 1 statuses speed and duplex settings 4 / 15 A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network? ping nslookup tracert ipconfig /displaydns 5 / 15 A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.) Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. Fiber optic cabling requires specific grounding to be immune to EMI. Fiber optic cabling is susceptible to loss of signal due to RFI. Fiber optic cable is able to withstand rough handling. Fiber optic provides higher data capacity but is more expensive than copper cabling. 6 / 15 What technique is used with UTP cable to help protect against signal interference from crosstalk? wrapping a foil shield around the wire pairs. twisting the wires together into pairs. terminating the cable with special grounded connectors. encasing the cables within a flexible plastic sheath. 7 / 15 A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.) extensive cabling mobility options packet collision interference security coverage área 8 / 15 Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? virus worm phishing spam 9 / 15 Which scenario describes a function provided by the transport layer? A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site. 10 / 15 What does the term “attenuation” mean in data communication? strengthening of a signal by a networking device leakage of signals from one cable pair to another time for a signal to reach its destination loss of signal strength as distance increases 11 / 15 Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.) TCP IP UDP POP DNS Ethernet 12 / 15 A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework? automation accounting authentication authorization 13 / 15 What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.) message size message encoding connector specifications media selection delivery options end-device installation 14 / 15 What are two characteristics of IP? (Choose two.) does not require a dedicated end-to-end connection operates independently of the network media retransmits packets if errors occur re-assembles out of order packets into the correct order at the receiver end guarantees delivery of packets 15 / 15 An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario? (Choose three.) security quality of service scalability powerline networking integrity fault tolerance Sua nota é LinkedIn Facebook Twitter VKontakte Avaliações Não há avaliações ainda. Seja o primeiro a avaliar “CCNA – Routing & Switching v2”Cancelar respostaO seu endereço de e-mail não será publicado. Campos obrigatórios são marcados com *Sua avaliação * Avaliar… Perfeito Bom Razoável Nada mal Muito ruim Nome *E-mail *Sua avaliação sobre o produto * Eu aceito as políticas de privacidade Salvar meus dados neste navegador para a próxima vez que eu comentar. Enviar
Avaliações
Não há avaliações ainda.