1. Question
Actioned
Item completed: 02/15/2022 04:47 AM
Value: 1
Answer: Routing table
PASS
2. Question
Actioned
Item completed: 02/15/2022 04:47 AM
Value: 1
Answer: 0.0.0.0/0 is a default route. The router uses it to route packets if it doesn’t have a more specific route to the destination
PASS
3. Question
Actioned
Item completed: 02/15/2022 04:47 AM
Value: 1
Answer: Dynamic routing protocols are better in large environments where there are many networks and devices
PASS
4. Question
Actioned
Item completed: 02/15/2022 04:48 AM
Value: 1
Answer: Distance vector routing protocol exchanges the whole routing table, while link state routing protocol exchanges information about all connected networks
PASS
5. Question
Actioned
Item completed: 02/15/2022 04:48 AM
Value: 1
Answer: EIGRP routes
PASS
Score : 5 out of 5 (100%)
Which OSI layer is responsible for directing data from one LAN to another?
Hide Feedback
Correct
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Hide Feedback
Correct
When a router can't determine a path to a message's destination, where does it send the message?
Hide Feedback
Correct
A routing protocol's reliability and priority are rated by what measurement?
Hide Feedback
Correct
Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet?
Hide Feedback
Correct
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Hide Feedback
Correct
What kind of device can monitor a connection at the demarc but cannot interpret data?
Hide Feedback
Correct
What specifications define the standards for cable broadband?
Hide Feedback
Correct
What method does a GSM network use to separate data on a channel?
Hide Feedback
Correct
Which of these cellular technologies offers the fastest speeds?
Hide Feedback
Correct
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?
Hide Feedback
Correct
Which type of DoS attack orchestrates an attack bounced off uninfected computers?
Hide Feedback
Correct
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Hide Feedback
Correct
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Hide Feedback
Correct
What type of attack relies on spoofing?
Hide Feedback
Correct
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?
Hide Feedback
Correct
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Hide Feedback
Correct
Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.
Hide Feedback
Correct
Which of the following is considered a secure protocol?
Hide Feedback
Correct
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
Hide Feedback
Correct
Comments
Post a Comment