![2.2.4 Check Your Understanding - Switching Domains Answers 1 2.2.4 Check Your Understanding – Switching Domains Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
Category: CCNA v7.0
![2.2.4 Check Your Understanding - Switching Domains Answers 1 2.2.4 Check Your Understanding – Switching Domains Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
1. Which port speed will be autonegotiated between a host with a 1 Gbps NIC connecting to a Cisco Catalyst 2960 switch with a 100 Mbps port? 10 Mbps 100 Mbps 1 Gbps 10 Gbps 2. Which device separates broadcast domains? access point hub router switch 3. Which …
![1.5.11 Check Your Understanding - Verify Directly Connected Networks Answers 2 1.5.11 Check Your Understanding – Verify Directly Connected Networks Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
1.5.11 Check Your Understanding – Verify Directly Connected Networks Answers
1. Which command will display a summary of all IPv6-enabled interfaces on a router that includes the IPv6 address and operational status? show ip interface brief show ipv6 route show running-config interface show ipv6 interface brief 2. When verifying routes, what code is used to identify directly connected …
![17.6.5 Check Your Understanding - Troubleshooting Methodologies Answers 3 17.6.5 Check Your Understanding – Troubleshooting Methodologies Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
17.6.5 Check Your Understanding – Troubleshooting Methodologies Answers
1. A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process? Document findings, actions, and outcomes. Establish a plan of action and implement the solution. Identify the problem. Test the theory to …
![17.3.4 Check Your Understanding - Scale to Larger Networks Answers 4 17.3.4 Check Your Understanding – Scale to Larger Networks Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
17.3.4 Check Your Understanding – Scale to Larger Networks Answers
1. Which elements are required to scale to a larger network? (Choose two.) budget device configurations increased bandwidth network documentation windows hosts 2. Which software installed on key hosts can reveal the types of network traffic flowing through the network? Linux MacOS SSH Windows Wireshark 3. What Windows …
![17.2.4 Check Your Understanding - Small Network Applications and Protocols Answers 5 17.2.4 Check Your Understanding – Small Network Applications and Protocols Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
17.2.4 Check Your Understanding – Small Network Applications and Protocols Answers
1. What are two forms of software programs or processes that provide access to the network? (Choose two.) antivirus software application layer services gaming software network applications productivity software virtual machine software 2. Which two network protocols are used to establish a remote access network connection to a …
![17.1.6 Check Your Understanding - Devices in a Small Network Answers 6 17.1.6 Check Your Understanding – Devices in a Small Network Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
17.1.6 Check Your Understanding – Devices in a Small Network Answers
1. Which statement correctly relates to a small network? Small networks are complex. Small networks require an IT department to maintain. The majority of businesses are small. 2. Which factor must be considered when selecting network devices? color console connections cost elasticity 3. What is necessary to plan …
![16.3.8 Check Your Understanding - Network Attack Mitigation Answers 7 16.3.8 Check Your Understanding – Network Attack Mitigation Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
16.3.8 Check Your Understanding – Network Attack Mitigation Answers
1. Which device controls traffic between two or more networks to help prevent unauthorized access? AAA Server firewall ESA/WSA IPS 2. Which device is used by other network devices to authenticate and authorize management access? AAA Server firewall ESA/WSA IPS 3. Which backup policy consideration is concerned with …
![16.2.5 Check Your Understanding - Network Attacks Answers 8 16.2.5 Check Your Understanding – Network Attacks Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
16.2.5 Check Your Understanding – Network Attacks Answers
1. Angela, an IT staff member at ACME Inc., notices that communication with the company’s web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME’S …
![16.1.4 Check Your Understanding - Security Threats and Vulnerabilities Answers 9 16.1.4 Check Your Understanding – Security Threats and Vulnerabilities Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
16.1.4 Check Your Understanding – Security Threats and Vulnerabilities Answers
1. What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? data loss or manipulation disruption of service identify theft information theft 2. What kind of threat is described when a threat actor makes illegal online purchases using …
![15.5.3 Check Your Understanding - File Sharing Services Answers 10 15.5.3 Check Your Understanding – File Sharing Services Answers](https://itexamanswers.net/wp-content/themes/mts_splash/images/nothumb-splash-featured.png)
15.5.3 Check Your Understanding – File Sharing Services Answers
1. How many connections are required by FTP between client and server? 1 2 3 4 2. True or false? FTP data transfers take place from client to server (push) and from server to client (pull). True False 3. Which of these ports are used by FTP? (Choose …