Which two files are loaded into RAM of a Cisco switch when it is booted? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two files are loaded into RAM of a Cisco switch when it is booted? (Choose two.) routing table IOS image file file that contains customer settings startup configuration file…

Continue ReadingWhich two files are loaded into RAM of a Cisco switch when it is booted? (Choose two.)

What is required for a network administrator to perform out-of-band management tasks on a Cisco device?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is required for a network administrator to perform out-of-band management tasks on a Cisco device? a valid IP address configured on VLAN 1 SSH enabled and functional on the…

Continue ReadingWhat is required for a network administrator to perform out-of-band management tasks on a Cisco device?

A network administrator has decided to use WPA2 for security in a WLAN. Which statement describes WPA2?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator has decided to use WPA2 for security in a WLAN. Which statement describes WPA2? WPA2 uses preconfigured keys to encrypt and decrypt data. WPA2 specifies the use…

Continue ReadingA network administrator has decided to use WPA2 for security in a WLAN. Which statement describes WPA2?

Which wireless access point association parameter is used by the wireless client to distinguish between multiple wireless networks in the same vicinity?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which wireless access point association parameter is used by the wireless client to distinguish between multiple wireless networks in the same vicinity? password network mode SSID channel setting Answers Explanation…

Continue ReadingWhich wireless access point association parameter is used by the wireless client to distinguish between multiple wireless networks in the same vicinity?

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source? phishing vishing backdoor Trojan Answers Explanation & Hints: Phishing…

Continue ReadingWhat is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user? adware pop-ups spyware pop-unders Answers Explanation…

Continue ReadingWhat type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

What is the primary means for mitigating virus and Trojan horse attacks?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the primary means for mitigating virus and Trojan horse attacks? antivirus software encryption antisniffer software blocking ICMP echo and echo-replies Answers Explanation & Hints: Antivirus software is the…

Continue ReadingWhat is the primary means for mitigating virus and Trojan horse attacks?

What technology enables a cell phone to be used as a hands-free device?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What technology enables a cell phone to be used as a hands-free device? Wi-Fi Bluetooth 4G Yosemite Answers Explanation & Hints: Bluetooth provides a way to connect wireless devices, such…

Continue ReadingWhat technology enables a cell phone to be used as a hands-free device?

What would a technician require in order to install a hypervisor on a client machine?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What would a technician require in order to install a hypervisor on a client machine? an SSD multiple storage drives a server housed by a cloud service provider virtualization software…

Continue ReadingWhat would a technician require in order to install a hypervisor on a client machine?

Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth? ADSL SDSL CDMA TDMA Answers Explanation & Hints: ADSL provides higher downstream bandwidth to the user than…

Continue ReadingWhich DSL technology provides higher downstream bandwidth to the user than upstream bandwidth?

Which type of wireless communication is based on 802.11 standards?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of wireless communication is based on 802.11 standards? Wi-Fi Cellular WAN Bluetooth Infrared Answers Explanation & Hints: The IEEE 802.11 standards define Wi-Fi wireless LAN specifications.

Continue ReadingWhich type of wireless communication is based on 802.11 standards?

Which type of network technology is used for low-speed communication between peripheral devices?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of network technology is used for low-speed communication between peripheral devices? Bluetooth Ethernet 802.11 channels Answers Explanation & Hints: Bluetooth is a wireless technology that uses the 2.4…

Continue ReadingWhich type of network technology is used for low-speed communication between peripheral devices?

What are three private IPv4 address? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are three private IPv4 address? (Choose three.) 10.1.1.1 172.32.5.2 192.167.10.10 172.16.4.4 192.168.5.5 224.6.6.6 Answers Explanation & Hints: Private IP addresses are reserved to be exclusively used for internal networks…

Continue ReadingWhat are three private IPv4 address? (Choose three.)

Which network does a host with IP address 172.32.65.13 reside on if it is using a default subnet mask?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which network does a host with IP address 172.32.65.13 reside on if it is using a default subnet mask? 172.32.65.0 172.32.65.32 172.32.0.0 172.32.32.0 Answers Explanation & Hints: In classful IPv4…

Continue ReadingWhich network does a host with IP address 172.32.65.13 reside on if it is using a default subnet mask?

A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates…

Continue ReadingA network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?

In implementing a LAN in a corporation, what are three advantages of dividing hosts between multiple networks connected by a distribution layer? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

In implementing a LAN in a corporation, what are three advantages of dividing hosts between multiple networks connected by a distribution layer? (Choose three.) It provides increased security. Only LAN…

Continue ReadingIn implementing a LAN in a corporation, what are three advantages of dividing hosts between multiple networks connected by a distribution layer? (Choose three.)

A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?…

Continue ReadingA router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?

Which network device can serve as a boundary to divide a Layer 2 broadcast domain?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which network device can serve as a boundary to divide a Layer 2 broadcast domain? router Ethernet bridge Ethernet hub access point Answers Explanation & Hints: Layer 1 and 2…

Continue ReadingWhich network device can serve as a boundary to divide a Layer 2 broadcast domain?