What is the function of a firewall?
monitor and control the incoming and outgoing network traffic.
Which two statements about interface labels are true? (Choose two.)
An interface label is part of the physical topology diagram.
An interface label includes information about the interface type.
An interface label is its IPv4 address.
An interface label is used only when a device has more than one interface.
An interface label can be arbitrarily selected by the device administrator.
An interface label is part of the physical topology diagram.
An interface label includes information about the interface type.
What is the availability percentage over a one-year period of a network that is not available for 15 minutes each month?
99.9657 percent.
Which network characteristic indicates the general expense to purchase, install, and maintain network components?
cost
To which ISO OSI model layer or layers does the TCP/IP model application layer correspond?
network
transport
session
session, presentation, and application
session, presentation, and application.
You are given a physical network diagram. Which two statements about the logical diagram for the same network are true? (Choose two.)
The logical diagram is obvious from the physical diagram.
The logical diagram can be drawn by adding device model information to the physical diagram.
The logical diagram can be drawn by examining device configurations.
The logical diagram can be drawn by analyzing data flows in the network.
The logical diagram is always different to the physical diagram.
The logical diagram can be drawn by examining device configurations.
The logical diagram can be drawn by analyzing data flows in the network.
Match the PDU with its description.
a Link layer PDU
an Internet layer PDU
the general term for the PDU that is used at the application layer
a Transport layer PDU
Link = Frame
Internet = Packet
The general term for the PDU that is used at the application layer = Data
Transport = segment
Which ISO OSI layer defines services to segment the data?
presentation layer
session layer
transport layer
network layer
Transport layer
Which two statements about the layered model of communication are true? (Choose two.)
Layering makes communication itself less complex.
Layer processes on a host logically communicate with the same layer processes on another host.
Layer processes on a host are independent and communicate with any of the other layers.
Layering facilitates troubleshooting by making it possible to diagnose and narrow a cause to specific layers.
Layering of functions is only theoretical and not implemented in real-world.
Layering makes communication itself less complex.
Layer processes on a host logically communicate with the same layer processes on another host.
Which statement is false regarding the encapsulation process?
Encapsulation is the process used by the sending device to remove one or more of the protocol headers.
Segment is the PDU of the transport layer.
The encapsulation process is performed from top to bottom layer.
Encapsulation increases the size of the PDU.
Encapsulation is the process used by the sending device to remove one or more of the protocol headers.
Which ISO OSI layer ensures that the application layer of the receiving system will be able to read the information that the application layer of another system has sent?
presentation layer.
Which option is available to a network engineer to interact with a network device?
A network engineer communicates directly with the device operating system using machine programming languages.
A shell program exposes operating system services and can be accessed via CLI or GUI.
A hardware input device, such as mouse, can be used to directly interact with the device.
The operating system can only communicate with the user through light indicators present on the outside of the hardware.
A shell program exposes operating system services and can be accessed via CLI or GUI.
In Cisco IOS Software, what are the two EXEC access levels?
admin EXEC
user EXEC
privileged EXEC
basic EXEC
advanced EXEC
user EXEC and privileged EXEC.
What are three examples of remote access locations? (Choose three.)
branch offices
head office
small office/home office
main office
a network in an airport lounge
branch offices, small office/home office, and a network in an airport lounge.
What is the expected result of the show running-config | exclude ! command executed on the Cisco IOS device?
CLI will display the negated versions of the commands in the running configuration file.
CLI will display the running configuration file but without any lines containing “!” in them
CLI will display only the lines copied from the external source.
CLI will display only the lines different to the lines in the startup-config file.
CLI will display the running configuration file but without any lines containing “!” in them.
In which type of applications does the user need to wait for a response when performing actions such as inventory lookup or a database update?
batch applications
real-time applications
interactive applications
human-to-human applications
interactive applications.
How does the Privileged EXEC Mode restrict the access to the configuration CLI commands?
The Privileged EXEC Mode provides access security by adding an additional password when trying to reach the configuration modes.
By default, the Privileged EXEC Mode asks users to enter passwords for entering the Global Configuration Mode.
Access to the Privileged EXEC Mode can be password protected to allow only authorized users to execute the privileged set of commands
Commands entered in the Privileged EXEC Mode intentionally show false device information for unauthorized users.
Access to the Privileged EXEC Mode can be password protected to allow only authorized users to execute the privileged set of commands.
What is the function of a WLAN controller?
monitor and control the incoming and outgoing network traffic
automatically handle the configuration of wireless access point
allow wireless devices to connect to a wired network
connect networks and intelligently choose the best paths between networks
automatically handle the configuration of wireless access point.
Which three of the following commands can be used to exit the user EXEC mode in a Cisco CLI session? (Choose three.)
exit
end
disable
quit
logout
escape
exit, disable, and logout
Which Cisco IOS command do you use to change from user EXEC mode into privileged EXEC mode?
enable
disable
admin
configure
configure terminal
enable