Examen 1-3
Examen 1-3
Data is sent from the internet layer to the network access layer.
Packets are sent from the network access layer to the transport layer.
Segments are sent from the transport layer to the internet layer.
Frames are sent from the network access layer to the internet layer
2. WHICH PDU FORMAT IS USED WHEN BITS ARE RECEIVED FROM THE NETWORK
MEDIUM BY THE NIC OF A HOST?
file
frame
packet
segment
internet
transport
network access
sesión
physical layer
data link layer
network layer
transport layer
bits
data
frame
packet
segment
8. WHAT THREE APPLICATION LAYER PROTOCOLS ARE PART OF THE TCP/IP PROTOCOL
SUITE? (CHOOSE THREE.)
ARP
DHCP
DNS
FTP
NAT
PPP
This command encrypts passwords as they are transmitted across serial WAN
links.
This command prevents someone from viewing the running configuration
passwords.
This command enables a strong encryption algorithm for the enable secret
password command.
This command automatically encrypts passwords in configuration files that are
currently stored in NVRAM.
This command provides an exclusive encrypted password for external service
personnel who are required to do router maintenance.
10. WHAT FUNCTION DOES PRESSING THE TAB KEY HAVE WHEN ENTERING A
COMMAND IN IOS?
11. WHAT COMMAND IS USED TO VERIFY THE CONDITION OF THE SWITCH INTERFACES,
INCLUDING THE STATUS OF THE INTERFACES AND A CONFIGURED IP ADDRESS?
ipconfig
ping
traceroute
show ip interface brief
12. WHAT ARE THREE CHARACTERISTICS OF AN SVI? (CHOOSE THREE.)
13. PASSWORDS CAN BE USED TO RESTRICT ACCESS TO ALL OR PARTS OF THE CISCO IOS.
SELECT THE MODES AND INTERFACES THAT CAN BE PROTECTED WITH PASSWORDS.
(CHOOSE THREE.)
VTY interface
console interface
Ethernet interface
boot IOS mode
privileged EXEC mode
router configuration mode
14. WHICH TWO HOST NAMES FOLLOW THE GUIDELINES FOR NAMING CONVENTIONS
ON CISCO IOS DEVICES? (CHOOSE TWO.)
Branch2!
RM-3-Switch-2A4
Floor(15)
HO Floor 17
SwBranch799
15. WHAT ARE TWO CHARACTERISTICS OF RAM ON A CISCO DEVICE? (CHOOSE TWO.)
the command
a keyword
a variable
a prompt
encapsulation
flow control
access method
response timeout
an intranet
the Internet
an extranet
a local area network
23. What method can be used by two computers to ensure that packets are not dropped
because too much data is being sent too quickly?
encapsulation
flow control
access method
response timeout
24. Match each characteristic to its corresponding Internet connectivity type.
(Not all options are used.)
fault tolerance
scalability
security
Quality of Service (QoS)
Reliability
fault tolerance
scalability
security
Quality of Service (QoS)
reliability