1. Which IOS mode allows access to all commands and features? global configuration mode interface subconfiguration mode line console subconfiguration mode privileged EXEC mode user EXEC mode 2. Which IOS mode are you in if the Switch(config)# prompt is displayed? global configuration mode interface subconfiguration mode line console …
1. Which interface connects to external networks, usually over a large distance? auxiliary port console port SSH access LAN interface WAN interface 2. What is a way to remotely access the command-line interface (CLI) over a network interface? auxiliary port console port SSH access LAN interface WAN interface …
1. True or false? A router has many Ethernet ports to provide access to devices on the network. true false 2. Which of the following interfaces can be used to manage the router? (Choose three.) console ports NIM slots auxiliary port USB port management interface 3. True or …
1. Which of the following is the correct order of the three basic steps for powering up a switch? check the components, connect the cables to the switch, power up the switch power up the switch, check the components, connect the cables to the switch connect the cables …
1. True or false? The lower the device is in the OSI model, the more intelligent it is. true false 2. True or false? Switches typically provide LAN connectivity and routers interconnect local networks. true false 3. Which switch selection factor are you typically considering when deciding that …
1. Which of the following security measures will prevent wireless clients from seeing that your WLAN is available? MAC address filtering disabling SSID broadcast implementing port forwarding configuring authentication 2. Which of the following security measures will require users to enter a password to access your WLAN? MAC …
1. What characteristic describes a firewall appliance? a network device that filters access and traffic coming into a network software that identifies email spam and automatically deletes or places them in a junk folder malicious software or code running on an end device applications that protect end devices …
1. Which of the following is software installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email? antispyware antivirus popup blocker spam filter 2. Which of the following is software installed on an end-user workstation or server to …
1. Which of the following is installed to prevent unwanted advertisements from displaying on your computer? virus protection firewall patches and updates popup blocker 2. Which of the following controls traffic to and from your network? virus protection firewall patches and updates popup blocker 3. Which of the …
1. Which of the following describes a DoS attack? (Choose two.) The attack is relatively simple to conduct, even by an unskilled threat actor. The attack originates from multiple, coordinated sources. Zombies are controlled by a command and control server. A threat actor builds a network of infected …