CCNA Discovery 2: DsmbISP Chapter 6 Exam Answers v4.0

1. Refer to the exhibit. Which configuration command or commands contributed to the output that is shown? routerA(config-router)# no version 2 routerA(config)# interface fa0/0 routerA(config-if)# ip address 172.19.0.0 255.255.0.0 routerA(config-router)# network 192.168.3.0 routerA(config)# no ip default-gateway 2. Refer to the exhibit. What is the maximum number of RIP …

CCNA Discovery 2: DsmbISP Chapter 5 Exam Answers v4.0

1. Refer to the exhibit. Which three sets of commands are required to enable administrators to connect to the Switch1 console over Telnet for configuration and management? (Choose three.) Switch1(config)# interface fa0/1 Switch1(config-if)# ip address 192.168.2.64 255.255.255.192 Switch1(config)# interface fa0/1 Switch1(config-if)# ip address 192.168.2.66 255.255.255.192 Switch1(config)# interface vlan …

CCNA Discovery 2: DsmbISP Chapter 3 Exam Answers v4.0

1. Refer to the exhibit. Which type of twisted pair cable is used between each device? A=console, B=straight, C=crossover, D= crossover, E=straight A=straight, B=straight, C=straight, D=crossover, E=console A=crossover, B=straight, C=straight, D=crossover, E=crossover A=console, B=straight, C=straight, D=crossover, E=crossover A=console, B=crossover, C=crossover, D=straight, E=straight 2. Which three issues should be noted …

CCNA Discovery 2: DsmbISP Chapter 2 Exam Answers v4.0

1. Which two functions are provided by the upper layers of the OSI model? (Choose two.) placing electrical signals on the medium for transmission initiating the network communication process encrypting and compressing data for transmission segmenting and identifying data for reassembly at the destination choosing the appropriate path …

CCNA Discovery 1: DHomeSB Chapter 8 Exam Answers v4.0

1. Identify three techniques used in social engineering. (Choose three.) fishing vishing phishing spamming pretexting junk mailing 2. During a pretexting event, how is a target typically contacted? by e-mail by phone in person through another person 3. While surfing the Internet, a user notices a box claiming …