What characteristic describes a virus?
What characteristic describes a virus? the use of stolen credentials to access private data a network device that filters access and traffic coming into a network malicious software or code…
What characteristic describes a virus? the use of stolen credentials to access private data a network device that filters access and traffic coming into a network malicious software or code…
A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device…
What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted? 255.255.255.224 255.255.255.128 255.255.255.240 255.255.255.192 255.255.255.0 Explanation…
An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? 4096 256 512 1024 Explanation &…
What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.) Router Advertisement Destination Unreachable Neighbor Solicitation Route Redirection Host Confirmation Time Exceeded Explanation & Hint:…
What method is used to manage contention-based access on a wireless network? CSMA/CD priority ordering CSMA/CA token passing Explanation & Hint: The method used to manage contention-based access on a…
A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.) source port number HTTP server…
A client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting? DNS HTTP DHCP SMTP Explanation & Hint:…
A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions…
Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)…
Which two commands can be used on a Windows host to display the routing table? (Choose two.) route print show ip route netstat -r netstat -s tracert Answers Explanation &…
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be…
What attribute of a NIC would place it at the data link layer of the OSI model? attached Ethernet cable TCP/IP protocol stack IP address RJ-45 port MAC address Explanation…
Which connector is used with twisted-pair cabling in an Ethernet LAN? Answers RJ 45 For more Questions and Answers: CCNA 1 v7 – ITN v7.02 – ITNv7 – Final Exam…
What are three commonly followed standards for constructing and installing cabling? (Choose three.) pinouts tensile strength of plastic insulator cable lengths connector types cost per meter (foot) connector color Explanation…
What characteristic describes spyware? a network device that filters access and traffic coming into a network software that is installed on a user device and collects information about the user…
A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator…
A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet? when the values…
Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.) Two devices are attached to the switch. The default…
Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) Destination MAC addresses will never change in a frame that…