Chapter 16 and 17 Exam Review 2015 Statistics

How to find: Printing "Ctrl + F" in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not hither, find information technology in Questions Bank.

NOTE: If you accept the new question on this test, delight annotate Question and Multiple-Choice listing in class below this article. We volition update answers for you lot in the shortest time. Thank you! Nosotros truly value your contribution to the website.

Introduction to Networks ( Version 7.00) – Modules sixteen – 17: Building and Securing a Pocket-size Network Exam

1. Which component is designed to protect confronting unauthorized communications to and from a estimator?

  • security center
  • port scanner
  • antimalware
  • antivirus
  • firewall

2. Which command volition block login attempts on RouterA for a catamenia of 30 seconds if there are 2 failed login attempts within ten seconds?

  • RouterA(config)# login block-for 10 attempts 2 within 30
  • RouterA(config)# login block-for 30 attempts 2 within 10
  • RouterA(config)# login block-for two attempts xxx within x
  • RouterA(config)# login cake-for 30 attempts 10 within two

3. What is the purpose of the network security accounting function?

  • to require users to testify who they are
  • to determine which resources a user can access
  • to keep track of the actions of a user
  • to provide claiming and response questions

four. What blazon of assail may involve the employ of tools such as nslookup and fping?

  • admission attack
  • reconnaissance attack
  • deprival of service attack
  • worm attack

5. Lucifer each weakness with an example. (Not all options are used.)
CCNA 1 v7 Modules 16 - 17: Building and Securing a Small Network Exam Answers 1

6. Match the type of information security threat to the scenario. (Not all options are used.)
CCNA 1 v7 Modules 16 - 17: Building and Securing a Small Network Exam Answers 2

Explanation:
Afterwards an intruder gains access to a network, common network threats are as follows:

  • Information theft
  • Identity theft
  • Data loss or manipulation
  • Disruption of service

Peachy the password for a known username is a blazon of access set on.

seven. Which example of malicious code would exist classified as a Trojan horse?

  • malware that was written to look like a video game
  • malware that requires manual user intervention to spread between systems
  • malware that attaches itself to a legitimate programme and spreads to other programs when launched
  • malware that tin can automatically spread from ane organisation to another past exploiting a vulnerability in the target

eight. What is the difference between a virus and a worm?

  • Viruses self-replicate but worms practice not.
  • Worms cocky-replicate but viruses do non.
  • Worms crave a host file just viruses practise not.
  • Viruses hide in legitimate programs but worms do not.

Explanation: Worms are able to self-replicate and exploit vulnerabilities on computer networks without user participation.

9. Which attack involves a compromise of data that occurs between two end points?

  • denial-of-service
  • man-in-the-middle attack
  • extraction of security parameters
  • username enumeration

Explanation: Threat actors frequently endeavor to access devices over the cyberspace through communication protocols. Some of the about popular remote exploits are equally follows:

  • Human being-In-the-middle attack (MITM) – The threat actor gets between devices in the system and intercepts all of the information existence transmitted. This information could but exist collected or modified for a specific purpose and delivered to its original destination.
  • Eavesdropping assail – When devices are existence installed, the threat actor tin intercept data such equally security keys that are used past constrained devices to constitute communications in one case they are upwards and running.
  • SQL injection (SQLi) – Threat actors uses a flaw in the Structured Query Language (SQL) application that allows them to have access to change the data or gain authoritative privileges.
  • Routing assault – A threat player could either place a rogue routing device on the network or modify routing packets to manipulate routers to send all packets to the called destination of the threat actor. The threat actor could then drop specific packets, known every bit selective forwarding, or drop all packets, known as a sinkhole assail.

ten. Which type of assault involves an adversary attempting to gather information about a network to identify vulnerabilities?

  • reconnaissance
  • DoS
  • lexicon
  • man-in-the-middle

eleven. Match the description to the type of firewall filtering. (Not all options are used.)
CCNA 1 v7 Modules 16 - 17: Building and Securing a Small Network Exam Answers 3

12. What is the purpose of the network security authentication function?

  • to require users to evidence who they are
  • to determine which resource a user tin access
  • to keep track of the deportment of a user
  • to provide claiming and response questions

Explanation: Authentication, authorization, and accounting are network services collectively known as AAA. Authentication requires users to prove who they are. Authorization determines which resources the user can access. Accounting keeps track of the actions of the user.

13. Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

  • stateful packet inspection
  • URL filtering
  • awarding filtering
  • packet filtering

14. When applied to a router, which control would aid mitigate brute-force password attacks against the router?

  • exec-timeout thirty
  • service password-encryption
  • banner motd $Max failed logins = five$
  • login block-for threescore attempts 5 within 60

Explanation: The login block-for command sets a limit on the maximum number of failed login attempts allowed inside a defined menstruation of time. If this limit is exceeded, no further logins are allowed for the specified period of time. This helps to mitigate brute-force password corking since it will significantly increase the amount of time required to cleft a password. The exec-timeout command specifies how long the session can be idle before the user is asunder. The service password-encryption control encrypts the passwords in the running configuration. The imprint motd command displays a message to users who are logging in to the device.

15. Identify the steps needed to configure a switch for SSH. The answer club does non affair. (Non all options are used.)
CCNA 1 v7 Modules 16 - 17: Building and Securing a Small Network Exam Answers 4

Explanation: The login and password cisco commands are used with Telnet switch configuration, not SSH configuration.

16. What characteristic of SSH makes it more secure than Telnet for a device management connection?

  • confidentiality with IPsec
  • stronger countersign requirement
  • random i-time port connection
  • login information and data encryption

Explanation: Secure Crush (SSH) is a protocol that provides a secure management connection to a remote device. SSH provides security past providing encryption for both authentication (username and password) and the transmitted data. Telnet is a protocol that uses unsecure plaintext transmission. SSH is assigned to TCP port 22 past default. Although this port tin can be changed in the SSH server configuration, the port is not dynamically changed. SSH does not utilize IPsec.

17. What is the advantage of using SSH over Telnet?

  • SSH is easier to employ.
  • SSH operates faster than Telnet.
  • SSH provides secure communications to access hosts.
  • SSH supports authentication for a connectedness asking.

Explanation: SSH provides a secure method for remote access to hosts by encrypting network traffic between the SSH client and remote hosts. Although both Telnet and SSH request authentication before a connection is established, Telnet does non back up encryption of login credentials.

18. What is the office of an IPS?

  • detecting and blocking of attacks in real time
  • connecting global threat information to Cisco network security devices
  • authenticating and validating traffic
  • filtering of nefarious websites

Explanation: An intrusion prevention system (IPS) provides real-time detection and blocking of attacks.

19. A user is redesigning a network for a small company and wants to ensure security at a reasonable cost. The user deploys a new application-enlightened firewall with intrusion detection capabilities on the Internet service provider connexion. The user installs a 2nd firewall to separate the company network from the public network. Additionally, the user installs an IPS on the internal network of the company. What approach is the user implementing?

  • attack based
  • risk based
  • structured
  • layered

Explanation: Using different defenses at various points of the network creates a layered approach.

20. What is an accurate clarification of redundancy?

  • configuring a router with a consummate MAC address database to ensure that all frames tin can be forwarded to the correct destination
  • configuring a switch with proper security to ensure that all traffic forwarded through an interface is filtered
  • designing a network to utilise multiple virtual devices to ensure that all traffic uses the best path through the internetwork
  • designing a network to utilise multiple paths betwixt switches to ensure in that location is no single point of failure

Caption: Redundancy attempts to remove any single indicate of failure in a network by using multiple physically cabled paths between switches in the network.

21. A network administrator is upgrading a pocket-sized concern network to requite high priority to real-time applications traffic. What ii types of network services is the network administrator trying to adjust? (Choose two.)

  • vocalism
  • video
  • instant messaging
  • FTP
  • SNMP

22. What is the purpose of a small company using a protocol analyzer utility to capture network traffic on the network segments where the visitor is considering a network upgrade?

  • to place the source and destination of local network traffic
  • to capture the Internet connection bandwidth requirement
  • to document and clarify network traffic requirements on each network segment
  • to establish a baseline for security assay after the network is upgraded

Caption: An important prerequisite for considering network growth is to empathise the type and amount of traffic that is crossing the network equally well equally the current traffic flow. By using a protocol analyzer in each network segment, the network administrator can document and clarify the network traffic blueprint for each segment, which becomes the base in determining the needs and means of the network growth.

23. Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP accost 10.1.i.ane. What does the output of this command signal?
CCNA 1 v7 Modules 16 - 17: Building and Securing a Small Network Exam Answers 5

  • Connectivity to the remote device was successful.
  • A router along the path did not have a route to the destination.
  • A ping packet is being blocked by a security device forth the path.
  • The connection timed out while waiting for a reply from the remote device.

Explanation: In the output of the ping command, an exclamation mark (!) indicates a response was successfully received, a menstruum (.) indicates that the connection timed out while waiting for a reply, and the letter of the alphabet "U" indicates that a router along the path did not accept a route to the destination and sent an ICMP destination unreachable bulletin back to the source.

24. Which method is used to send a ping message specifying the source address for the ping?

  • Outcome the ping command from inside interface configuration mode.
  • Issue the ping command without specifying a destination IP address.
  • Consequence the ping command without extended commands.
  • Result the ping control after shutting down un-needed interfaces.

Caption: By issuing the ping command without a destination IP address in privileged EXEC mode, the Cisco IOS enters extended ping style. This allows the user to implement extended commands which include source IP accost.​

25. A network engineer is analyzing reports from a recently performed network baseline. Which state of affairs would depict a possible latency result?

  • a alter in the bandwidth according to the evidence interfaces output
  • a next-hop timeout from a traceroute
  • an increase in host-to-host ping response times
  • a modify in the amount of RAM according to the show version output

Explanation: While analyzing historical reports an administrator can compare host-to-host timers from the ping command and draw possible latency bug.​

26. Which statement is true near Cisco IOS ping indicators?​

  • '!' indicates that the ping was unsuccessful and that the device may have issues finding a DNS server.
  • 'U' may indicate that a router along the path did non contain a road to the destination address and that the ping was unsuccessful.
  • '.' indicates that the ping was successful but the response fourth dimension was longer than normal.
  • A combination of '.' and '!' indicates that a router along the path did non accept a route to the destination accost and responded with an ICMP unreachable message.​

Explanation: The most common indicators of a ping issued from the Cisco IOS are "!", ".", and "U". The "!" indicates that the ping completed successfully, verifying connectivity at Layer 3. The "." may indicate that a connectivity trouble, routing problem, or device security event exists forth the path and that an ICMP destination unreachable bulletin was non provided. The "U" indicates that a router along the path may not have had a road to the destination address, and that it responded with an ICMP unreachable message.

27. A user reports a lack of network connectivity. The technician takes command of the user automobile and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can exist determined for sure by the results of these tests?

  • The NIC in the PC is bad.
  • The TCP/IP protocol is not enabled.
  • The router that is attached to the aforementioned network as the workstation is downward.
  • Nothing tin can be determined for sure at this point.

Explanation: In networks today, a failed ping could mean that the other devices on the network are blocking pings. Farther investigation such every bit checking network connectivity from other devices on the same network is warranted.

28. A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option?

  • It forces the trace to use IPv6.
  • Information technology limits the trace to merely six hops.
  • It sets a 6 milliseconds timeout for each replay.
  • It sends 6 probes within each TTL time catamenia.

29. Why would a network administrator employ the tracert utility?

  • to make up one's mind the active TCP connections on a PC
  • to cheque information about a DNS name in the DNS server
  • to identify where a packet was lost or delayed on a network
  • to display the IP accost, default gateway, and DNS server address for a PC

Explanation: The tracert utility is used to identify the path a package takes from source to destination. Tracert is commonly used when packets are dropped or not reaching a specific destination.

30. A ping fails when performed from router R1 to directly connected router R2. The network administrator then gain to issue the show cdp neighbors command. Why would the network administrator event this control if the ping failed betwixt the two routers?

  • The network administrator suspects a virus considering the ping command did not work.
  • The network ambassador wants to verify Layer ii connectivity.
  • The network administrator wants to verify the IP address configured on router R2.
  • The network administrator wants to determine if connectivity can be established from a non-directly continued network.

Explanation: Theshow cdp neighborscommand can be used to prove that Layer i and Layer 2 connectivity exists between 2 Cisco devices. For example, if two devices have duplicate IP addresses, a ping between the devices will fail, merely the output ofshow cdp neighbors will be successful. Theshow cdp neighbors detailcould exist used to verify the IP accost of the direct continued device in case the same IP address is assigned to the two routers.

31. A network engineer is troubleshooting connectivity bug among interconnected Cisco routers and switches. Which command should the engineer use to discover the IP address information, host name, and IOS version of neighboring network devices?

  • show version
  • prove ip road
  • show interfaces
  • show cdp neighbors item

Explanation: Theshow cdp neighbors particularcontrol reveals much information nigh neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. Theshow interfaces and show version commands display data about the local device.

32. What information about a Cisco router tin be verified using the testify version control?

  • the routing protocol version that is enabled
  • the value of the configuration register
  • the operational condition of serial interfaces
  • the administrative distance used to reach networks

Explanation: The value of the configuration annals tin can be verified with thetestify version command.

33. Which command should be used on a Cisco router or switch to allow log letters to be displayed on remotely connected sessions using Telnet or SSH?

  • debug all
  • logging synchronous
  • prove running-config​
  • terminal monitor

34. Which control can an administrator result on a Cisco router to send debug messages to the vty lines?

  • concluding monitor
  • logging console
  • logging buffered
  • logging synchronous

Caption: Debug messages, like other IOS log messages, are sent to the console line by default. Sending these messages to the terminal lines requires the terminal monitor command.

35. By following a structured troubleshooting arroyo, a network ambassador identified a network issue later on a conversation with the user. What is the next footstep that the administrator should take?

  • Verify total system functionality.
  • Test the theory to decide cause.
  • Establish a theory of probable causes.
  • Institute a programme of action to resolve the issue.

Explanation: A structured network troubleshooting approach should include these steps in sequence:

  1. Identify the problem.
  2. Establish a theory of probable causes.
  3. Test the theory to make up one's mind cause.
  4. Establish a programme of action to resolve the outcome.
  5. Verify total organisation functionality and implement preventive measures.
  6. Document findings, deportment, and outcomes.

36. Users are complaining that they are unable to browse sure websites on the Net. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain proper noun of the website. Which troubleshooting tool would be most useful in determining where the trouble is?

  • netstat
  • tracert
  • nslookup
  • ipconfig

Caption: Thenslookup command can be used to expect upwards information about a detail DNS name in the DNS server. The data includes the IP address of the DNS server beingness used too as the IP address associated with the specified DNS proper noun. This command tin can help verify the DNS that is used and if the domain name to IP address resolution works.

37. An employee complains that a Windows PC cannot connect to the Cyberspace. A network technician issues the ipconfig control on the PC and is shown an IP accost of 169.254.10.3. Which two conclusions can be fatigued? (Choose two.)

  • The PC cannot contact a DHCP server.
  • The DNS server address is misconfigured.
  • The default gateway address is not configured.
  • The PC is configured to obtain an IP address automatically.
  • The enterprise network is misconfigured for dynamic routing.

38. Refer to the showroom. Host H3 is having problem communicating with host H1. The network administrator suspects a trouble exists with the H3 workstation and wants to prove that there is no problem with the R2 configuration. What tool could the network administrator employ on router R2 to prove that communication exists to host H1 from the interface on R2, which is the interface that H3 uses when communicating with remote networks?
CCNA 1 v7 Modules 16 - 17: Building and Securing a Small Network Exam Answers 6

  • traceroute
  • show cdp neighbors
  • Telnet
  • an extended ping

39. Refer to the exhibit. Baseline documentation for a small company had ping circular trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?
CCNA 1 v7 Modules 16 - 17: Building and Securing a Small Network Exam Answers 7

  • Connectivity betwixt H1 and H3 is fine.
  • H3 is not connected properly to the network.
  • Something is causing interference between H1 and R1.
  • Performance between the networks is within expected parameters.
  • Something is causing a time filibuster between the networks.

xl. Which network service automatically assigns IP addresses to devices on the network?

  • DHCP
  • Telnet
  • DNS
  • traceroute

Caption: Dynamic Host Configuration Protocol (DHCP) can be used to allow terminate devices to automatically configure IP information, such as their IP accost, subnet mask, DNS server, and default gateway. The DNS service is used to provide domain proper noun resolution, mapping hostnames to IP addresses. Telnet is a method for remotely accessing a CLI session of a switch or router.Tracerouteis a command used to determine the path a bundle takes as information technology traverses the network.

41. Which command can an administrator execute to determine what interface a router volition use to reach remote networks?

  • show arp
  • show interfaces
  • prove ip route
  • show protocols

Explanation: Theshow ip route command is used to display the IP routing table of the router. The IP routing tabular array will prove a list of known local and remote networks and the interfaces that the router volition utilise to accomplish those networks.

42. On which two interfaces or ports can security be improved past configuring executive timeouts? (Cull 2.)

  • Fast Ethernet interfaces
  • panel ports
  • serial interfaces
  • vty ports
  • loopback interfaces

Caption: Executive timeouts allow the Cisco device to automatically disconnect users later on they take been idle for the specified time. Console, vty, and aux ports can exist configured with executive timeouts.

43. When configuring SSH on a router to implement secure network direction, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions take to be performed to consummate the SSH configuration? (Choose three.)

  • Set up the user privilege levels.
  • Generate the disproportionate RSA keys.
  • Configure the correct IP domain name.
  • Configure role-based CLI access.
  • Create a valid local username and password database.
  • Manually enable SSH after the RSA keys are generated.

Explanation: SSH is automatically enabled after the RSA keys are generated. Setting user privilege levels and configuring role-based CLI access are good security practices but are non a requirement of implementing SSH.

44. What is considered the most effective way to mitigate a worm set on?

  • Change system passwords every 30 days.
  • Ensure that all systems accept the most current virus definitions.
  • Ensure that AAA is configured in the network.
  • Download security updates from the operating system vendor and patch all vulnerable systems.

Caption: Because worms accept advantage of vulnerabilities in the system itself, the about constructive way to mitigate worm attacks is to download security updates from the operating arrangement vendor and patch all vulnerable systems.

45. Which statement describes the ping and tracert commands?

  • Tracert shows each hop, while ping shows a destination reply only.
  • Tracert uses IP addresses; ping does not.
  • Both ping and tracert tin show results in a graphical brandish.
  • Ping shows whether the manual is successful; tracert does not.

Explanation: Theping utility tests end-to-end connectivity between the 2 hosts. Withal, if the message does not reach the destination, in that location is no way to determine where the trouble is located. On the other manus, thetraceroute utility (tracert in Windows) traces the route a message takes from its source to the destination.Traceroute displays each hop along the way and the time it takes for the message to get to that network and dorsum.

46. A technician is to document the current configurations of all network devices in a higher, including those in off-site buildings. Which protocol would exist best to use to securely access the network devices?

  • FTP
  • HTTP
  • SSH
  • Telnet

Explanation: Telnet sends passwords and other information in clear text, while SSH encrypts its data. FTP and HTTP practise not provide remote device admission for configuration purposes.

47. Open the PT Activity. Perform the tasks in the action instructions and then respond the question.

CCNA 1 v7 Modules 16 - 17 Building and Securing a Small Network Exam

CCNA 1 v7 Modules 16 – 17 Building and Securing a Small Network Exam

Which command has to be configured on the router to consummate the SSH configuration?

  • service password-encryption
  • ship input ssh
  • enable secret form
  • ip domain-name cisco.com

Explanation: The missing command to complete the SSH configuration isship input ssh inline vty 0 4 way.The commandsservice password-encryption andenable secret class do configure secure features on the router, simply are non required to configure SSH. The controlip domain-name cisco.com is not required because the command ip domain-name span.com has been used.

48. An administrator decides to apply "WhatAreyouwaiting4" as the password on a newly installed router. Which statement applies to the password pick?

  • It is strong because it uses a passphrase.
  • It is weak considering information technology is often the default password on new devices.
  • It is weak since it uses easily found personal information.
  • It is weak since it is a word that is easily found in the dictionary.

49. An ambassador decides to use "pR3s!d7n&0" equally the password on a newly installed router. Which argument applies to the countersign selection?

  • It is stiff because it uses a minimum of 10 numbers, messages and special characters.
  • It is weak because it is often the default countersign on new devices.
  • It is weak since information technology uses easily found personal information.
  • It is weak since it is a word that is easily found in the lexicon.

50. An administrator decides to use "v$7*4#033!" as the password on a newly installed router. Which argument applies to the password choice?

  • It is strong considering it contains 10 numbers and special characters.
  • It is weak because it is often the default countersign on new devices.
  • Information technology is weak since it uses easily found personal information.
  • It is strong because it uses a minimum of 10 numbers, letters and special characters.

51. An administrator decides to use "pR3s!d7n&0" equally the password on a newly installed router. Which argument applies to the password choice?

  • It is stiff because it uses a minimum of 10 numbers, letters and special characters.
  • Information technology is weak since it is a give-and-take that is hands found in the dictionary.
  • It is strong because information technology uses a passphrase.
  • Information technology is strong because it contains 10 numbers and special characters.

52. An administrator decides to use "12345678!" as the password on a newly installed router. Which statement applies to the password choice?

  • It is weak because it uses a serial of numbers or messages.
  • It is potent because it uses a passphrase.
  • It is weak since it is a word that is easily found in the dictionary.
  • It is strong because it uses a minimum of 10 numbers, letters and special characters.

53. An administrator decides to use "admin" as the password on a newly installed router. Which argument applies to the countersign option?

  • It is weak because information technology is frequently the default countersign on new devices.
  • It is strong considering it uses a passphrase.
  • It is strong because information technology uses a minimum of 10 numbers, messages and special characters.
  • It is stiff considering information technology contains ten numbers and special characters.

54. An administrator decides to apply "Feb121978" every bit the password on a newly installed router. Which statement applies to the countersign option?

  • Information technology is weak because it uses hands institute personal information.
  • It is potent because it uses a passphrase.
  • Information technology is weak since it is a word that is easily found in the lexicon.
  • It is potent because information technology uses a minimum of 10 numbers, letters and special characters.

55. An administrator decides to use "countersign" as the password on a newly installed router. Which statement applies to the password pick?

  • It is weak considering it is a commonly used countersign.
  • It is weak since information technology is a give-and-take that is easily found in the dictionary.
  • It is strong considering it uses a passphrase.
  • It is potent because it uses a minimum of 10 numbers, messages and special characters.

56. An ambassador decides to apply "RobErT" as the password on a newly installed router. Which statement applies to the password choice?

  • It is weak since it uses easily found personal information.
  • It is stiff because it uses a passphrase.
  • It is strong because information technology uses a minimum of 10 numbers, letters and special characters.
  • Information technology is strong because it contains 10 numbers and special characters.

57. An administrator decides to utilize "Elizabeth" as the countersign on a newly installed router. Which statement applies to the password selection?

  • It is weak considering it uses easily found personal data.
  • It is stiff because it uses a passphrase.
  • It is weak since it is a give-and-take that is easily constitute in the lexicon.
  • It is strong because information technology uses a minimum of ten numbers, messages and special characters.

Rules for stiff passwords:
* minimum of viii characters, preferably ten.
* utilize complex combinations of numbers, special characters, and upper and lower case messages.
* avoid repetition, common lexicon words, letter or number sequences.
* avert names of children, relatives, pets, birthdays, or any easily identifiable personal information.
* can be created past misspelling words or replacing vowels with numbers or special characters.

58. A network technician is troubleshooting an issue and needs to verify the IP addresses of all interfaces on a router. What is the best command to use to accomplish the task?

  • show ip interface brief
  • nslookup
  • ipconfig getifaddr en0
  • prove ip route

59. Students who are connected to the same switch are having slower than normal response times. The administrator suspects a duplex setting consequence. What is the best command to use to achieve the task?

  • bear witness interfaces
  • ipconfig getifaddr en0
  • re-create running-config startup-config
  • show ip nat translations

60. A user wants to know the IP address of the PC. What is the best command to apply to achieve the task?

  • ipconfig
  • copy running-config startup-config
  • testify interfaces
  • testify ip nat translations

61. A student wants to relieve a router configuration to NVRAM. What is the best control to utilize to accomplish the task?

  • re-create running-config startup-config
  • show interfaces
  • evidence ip nat translations
  • show ip route

62. A support technician needs to know the IP address of the wireless interface on a MAC. What is the best control to use to achieve the task?

  • ipconfig getifaddr en0
  • copy running-config startup-config
  • evidence interfaces
  • show ip nat translations

63. A network technician is troubleshooting an consequence and needs to verify all of the IPv6 interface addresses on a router. What is the all-time control to utilise to accomplish the job?

  • show ipv6 interface
  • show interfaces
  • show ip nat translations
  • show ip route

64. A teacher is having difficulties connecting his PC to the classroom network. He needs to verify that a default gateway is configured correctly. What is the best command to use to accomplish the chore?

  • ipconfig
  • re-create running-config startup-config
  • show interfaces
  • show ip nat translations

65. Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best control to use to accomplish the chore?

  • bear witness running-config
  • prove interfaces
  • copy running-config startup-config
  • show ip nat translations

66. An administrator is troubleshooting connectivity issues and needs to make up one's mind the IP address of a website. What is the best command to employ to achieve the task?

  • nslookup
  • evidence ipv6 route
  • show ipv6 interface
  • copy startup-config running-config

67. Simply employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best control to utilise to attain the task?

  • show running-config
  • bear witness ipv6 route
  • show ipv6 interface
  • re-create startup-config running-config

68. What is a characteristic of UDP?

  • UDP datagrams take the aforementioned path and go far in the correct guild at the destination.​
  • Applications that employ UDP are ever considered unreliable.​
  • UDP reassembles the received datagrams in the order they were received.
  • UDP simply passes data to the network when the destination is prepare to receive the data.

Explanation: UDP has no way to reorder the datagrams into their transmission social club, so UDP simply reassembles the information in the social club it was received and forwards it to the application.​

doranyespire88.blogspot.com

Source: https://itexamanswers.net/ccna-1-v7-modules-16-17-building-and-securing-a-small-network-exam-answers.html

0 Response to "Chapter 16 and 17 Exam Review 2015 Statistics"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel