Which component of the AAA service security model provides identity verification?
AAuditing
BAuthorization
CAuthentication
DAccounting
DRAG DROP -
Move each cloud computing service model from the list on the left to the correct example on the right.
Note: You will receive partial credit for each correct answer.
Which wireless security option uses a pre-shared key to authenticate clients?
AWPA2-Enterprise
B802.1q
C802.1x
DWPA2-Personal
DRAG DROP -
Move the MFA factors from the list on the left to their correct examples on the right. You may use each factor once, more than once, or not at all.
Note: You will receive partial credit for each correct selection.
Question 6
Security Fundamentals
0
Question 7
Networking Fundamentals
Question 8
IP Services
Question 9
IP Connectivity
Question 10
Security Fundamentals
Question 11
IP Connectivity
Question 12
IP Connectivity
Question 13
IP Connectivity
Question 14
Networking Fundamentals
Question 15
IP Services
Question 16
Networking Fundamentals
Question 17
IP Connectivity
Question 18
Networking Fundamentals
Question 19
Security Fundamentals
Question 20
Automation and Programmability
Question 21
IP Connectivity
Question 22
Networking Fundamentals
Question 23
Network Access
Question 24
IP Connectivity
Question 25
Network Access
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
HOTSPOT -
You plan to use a network firewall to protect computers at a small office.
For each statement about the output, select True or False.
Note: You will receive partial credit for each correct selection.
A help desk technician receives the four trouble tickets listed below. Which ticket should receive the highest priority and be addressed first?
ATicket 1: A user requests relocation of a printer to a different network jack in the same office. The jack must be patched and made active.
BTicket 2: An online webinar is taking place in the conference room. The video conferencing equipment lost internet access.
CTicket 3: A user reports that response time for a cloud-based application is slower than usual.
DTicket 4: Two users report that wireless access in the cafeteria has been down for the last hour.
HOTSPOT -
You want to list the IPv4 addresses associated with the host name www.companypro.net.
Complete the command by selecting the correct option from each drop-down list.
Examine the following command output:
Which two conclusions can you make from the output of the tracert command? (Choose two.)
Note: You will receive partial credit for each correct answer.
AThe routers at hops 5 and 6 are offline.
BThe trace successfully reached the www.cisco.com server.
CThe trace failed after the fourth hop.
DThe device sending the trace has IPv6 address 2600:1408:c400:38d::b33.
EThe IPv6 address associated with the www.cisco.com server is 2600:1408:c400:38d::b33.
DRAG DROP -
Move the security options from the list on the left to its characteristic on the right. You may use each security option once, more than once, or not at all.
Note: You will receive partial credit for each correct answer.
HOTSPOT -
Computers in a small office are unable to access companypro.net. You run the ipconfig command on one of the computers. The results are shown in the exhibit.
You need to determine if you can reach the router.
Which command should you use? Complete the command by selecting the correct options from each drop-down list.
A user reports that a company website is not available. The help desk technician issues a tracert command to determine if the server hosting the website is reachable over the network. The output of the command is shown as follows:
What can you tell from the command output?
AThe router at hop 3 is not forwarding packets to the IP address 192.168.1.10.
BRequests to the web server at 192.168.1.10 are being delayed and time out.
CThe server address 192.168.1.10 is being blocked by a firewall on the router at hop 3.
DThe server with the address 192.168.1.10 is reachable over the network.
Which two statements are true about the IPv4 address of the default gateway configured on a host? (Choose two.)
Note: You will receive partial credit for each correct selection.
AThe IPv4 address of the default gateway must be the first host address in the subnet.
BThe default gateway is the Loopback0 interface IPv4 address of the router connected to the same local network as the host.
CThe default gateway is the IPv4 address of the router interface connected to the same local network as the host.
DThe same default gateway IPv4 address is configured on each host on the local network.
EHosts learn the default gateway IPv4 address through router advertisement messages.
HOTSPOT -
For each statement about the output, select True or False.
Note: You will receive partial credit for each correct selection.
Which protocol allows you to securely upload files to another computer on the internet?
AICMP
BSFTP
CHTTP
DNIP
Which command will display the following output?
Ashow inventory
Bshow cdp neighbor
Cshow mac-address-table
Dshow ip interface
A user initiates a trouble ticket stating that an external web page is not loading. You determine that other resources both internal and external are still reachable.
Which command can you use to help locate where the issue is in the network path to the external web page?
Aipconfig/all
Bnslookup
Ctracert
Dping -t
HOTSPOT -
An app on a user's computer is having problems downloading data. The app uses the following URL to download data: https://www.companypro.net:7100/api
You need to use Wireshark to capture packets sent to and received from that URL.
Which Wireshark filter options would you use to filter the results? Complete the command by selecting the correct option from each drop-down list.
Note: You will receive partial credit for each correct selection.
Which device protects the network by permitting or denying traffic based on IP address, port number, or application?
AFirewall
BVPN gateway
CIntrusion detection system
DAccess point
Which two pieces of information should you include when you initially create a support ticket? (Choose two.)
AThe actions taken to resolve the fault
BA description of the conditions when the fault occurs
CDetails about the computers connected to the network
DA detailed description of the fault
EThe description of the top-down fault-finding procedure
An engineer configured a new VLAN named VLAN2 for the Data Center team. When the team tries to ping addresses outside VLAN2 from a computer in VLAN2, they are unable to reach them.
What should the engineer configure?
AAdditional VLAN
BDefault gateway
CStatic route
DDefault route
HOTSPOT -
You purchase a new Cisco switch, turn it on, and connect to its console port. You then run the following command:
For each statement about the output, select True or False.
Note: You will receive partial credit for each correct selection.
You want to store files that will be accessible by every user on your network.
Which endpoint device do you need?
ASwitch
BAccess point
CHub
DServer
Which address is included in the 192.168.200.0/24 network?
A192.168.1.13
B192.168.200.13
C192.168.199.13
D192.168.201.13
What is the purpose of assigning an IP address to the management VLAN interface on a Layer 2 switch?
ATo enable the switch to resolve URLs for the attached the devices
BTo enable access to the CLI on the switch through Telnet or SSH
CTo enable the switch to act as a default gateway for the attached devices
DTo enable the switch to provide DHCP services to other switches in the network