Category: CCNA v7.0
1. Which elements are required to scale to a larger network? (Choose two.) budget device configurations increased bandwidth network documentation windows hosts 2. Which software installed on key hosts can reveal the types of network traffic flowing through the network? Linux MacOS SSH Windows Wireshark 3. What Windows …
17.2.4 Check Your Understanding – Small Network Applications and Protocols Answers
1. What are two forms of software programs or processes that provide access to the network? (Choose two.) antivirus software application layer services gaming software network applications productivity software virtual machine software 2. Which two network protocols are used to establish a remote access network connection to a …
17.1.6 Check Your Understanding – Devices in a Small Network Answers
1. Which statement correctly relates to a small network? Small networks are complex. Small networks require an IT department to maintain. The majority of businesses are small. 2. Which factor must be considered when selecting network devices? color console connections cost elasticity 3. What is necessary to plan …
16.3.8 Check Your Understanding – Network Attack Mitigation Answers
1. Which device controls traffic between two or more networks to help prevent unauthorized access? AAA Server firewall ESA/WSA IPS 2. Which device is used by other network devices to authenticate and authorize management access? AAA Server firewall ESA/WSA IPS 3. Which backup policy consideration is concerned with …
16.2.5 Check Your Understanding – Network Attacks Answers
1. Angela, an IT staff member at ACME Inc., notices that communication with the company’s web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME’S …
16.1.4 Check Your Understanding – Security Threats and Vulnerabilities Answers
1. What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? data loss or manipulation disruption of service identify theft information theft 2. What kind of threat is described when a threat actor makes illegal online purchases using …
15.5.3 Check Your Understanding – File Sharing Services Answers
1. How many connections are required by FTP between client and server? 1 2 3 4 2. True or false? FTP data transfers take place from client to server (push) and from server to client (pull). True False 3. Which of these ports are used by FTP? (Choose …
15.4.9 Check Your Understanding – IP Addressing Services Answers
1. Which of the following DNS record types is used to resolve IPv6 addresses? A NS AAAA MX 2. True or false? A DNS server that receives a request for a name resolution that is not within its DNS zone will send a failure message to the requesting …
15.3.5 Check Your Understanding – Web and Email Protocols Answers
1. This message type is used when uploading data files to a web server. GET POST PUT 2. This protocol is used by a web browser to establish a connection to a web server. HTTP SSL IMAP SMTP 3. This protocol is used by a client to send …
15.2.5 Check Your Understanding – Peer-to-Peer Answers
1. True or false? The peer-to-peer networking model requires the implementation of a dedicated server for data access. True False 2. True or false? In a peer-to-peer network environment every peer can function as both a client and a server. True False 3. Which peer-to-peer application allows users …