In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.) crosstalk bandwidth size of the network signal modulation technique electromagnetic…

Comments Off on In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the…

Comments Off on A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

What is an advantage of network devices using open standard protocols?

What is an advantage of network devices using open standard protocols? Network communications is confined to data transfers between devices from the same vendor. A client host and a server…

Comments Off on What is an advantage of network devices using open standard protocols?

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address? DNS server address subnet…

Comments Off on When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? This command encrypts passwords as they are transmitted across serial…

Comments Off on A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command? The new configuration will be…

Comments Off on After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?

What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address? ipconfig ping traceroute show ip interface brief…

Comments Off on What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?

What are three characteristics of an SVI? (Choose three.)

What are three characteristics of an SVI? (Choose three.) It is designed as a security protocol to protect switch ports. It is not associated with any physical interface on a…

Comments Off on What are three characteristics of an SVI? (Choose three.)

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode…

Comments Off on An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)

How is SSH different from Telnet?

How is SSH different from Telnet? SSH makes connections over the network, whereas Telnet is for out-of-band access. SSH provides security to remote sessions by encrypting messages and using user…

Comments Off on How is SSH different from Telnet?

What are two characteristics of RAM on a Cisco device? (Choose two.)

What are two characteristics of RAM on a Cisco device? (Choose two.) RAM provides nonvolatile storage. The configuration that is actively running on the device is stored in RAM. The…

Comments Off on What are two characteristics of RAM on a Cisco device? (Choose two.)

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed…

Comments Off on Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.) implementing a firewall installing a wireless…

Comments Off on A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at…

Comments Off on An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

An administrator decides to use “Elizabeth” as the password on a newly installed router. Which statement applies to the password choice?

An administrator decides to use "Elizabeth" as the password on a newly installed router. Which statement applies to the password choice? It is weak because it uses easily found personal…

Comments Off on An administrator decides to use “Elizabeth” as the password on a newly installed router. Which statement applies to the password choice?