АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

Chapter 11 Quiz

Читайте также:
  1. CHAPTER 1
  2. Chapter 1
  3. CHAPTER 1
  4. Chapter 1
  5. CHAPTER 1
  6. CHAPTER 1
  7. CHAPTER 1
  8. CHAPTER 10
  9. CHAPTER 10
  10. CHAPTER 10
  11. CHAPTER 10
  12. Chapter 10

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails: Have a second router that is connected to another ISP

Place the recommended steps for worm attack mitigation in the correct order. (Not all options are used.): 1Containment;2 Inoculation;3 Quarantine;4 Treatment

What is an advantage of using a deterministic IP addressing scheme: controlling access to devices by IP address

What are the two WEP key lengths: 64,128 bit

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds: RouterA(config)# login block-for 30 attempts 2 within 10

Match the type of threat with the cause. (Not all options are used.): hardware threats(physical damage to servers, routers, switches, cabling plant, and workstations); environmental threats(temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry); electrical threats(voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss); maintenance threats(poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling)

What is the factory default setting for the configuration register on Cisco routers: 0x2102

What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command: the IP address of the neighbor

While downloading an IOS image from a TFTP server, an administrator sees long strings of exclamation marks (!) output to the console. What does this mean: The transfer is working

A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem: Ensure the correct cable is used; Ensure the link status LED on the integrated router is lit

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router: show file systems

On which two interfaces or ports can security be improved by configuring executive timeouts: console ports; vty ports

Which type of malware will disguise itself as a legitimate program and execute its malicious code once the program is run: Trojan

Which statement is true about Cisco IOS ping indicators: '.' may indicate that the ping was blocked by a firewall

 


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.)