IT Questions Bank Mar 16, 2020 Last Updated: Apr 13, 2022 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA CyberOpsHow is a DHCPDISCOVER transmitted on a network to reach a DHCP server?IT Administrator asked 2 years ago • CCNA CyberOps, CCNA, Networking EssentialsA device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the network identifier of the device?ITExamAnswers asked 2 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8Which method would an IPv6-enabled host using SLAAC employ to learn the address of the default gateway?IT Administrator asked 2 years ago • CCNA CyberOps, CCNA, Network Addressing and Basic TroubleshootingWhich two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)ITExamAnswers asked 3 years ago • CCNA, CCNA CyberOps, Network Addressing and Basic TroubleshootingHow many usable IP addresses are available on the 192.168.1.0/27 network?ITExamAnswers asked 3 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhat type of route is created when a network administrator manually configures a route that has an active exit interface?IT Administrator asked 2 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhich two commands can be used on a Windows host to display the routing table? (Choose two.)ITExamAnswers asked 3 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingA computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?ITExamAnswers asked 3 years ago • CCNA, CCNA CyberOps, IT Essentials 8, Network Addressing and Basic Troubleshooting, Networking EssentialsWhat is the first step in the CSMA/CA process when a wireless client is attempting to communicate on the wireless network?IT Administrator asked 2 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhat is used on WLANs to avoid packet collisions?IT Administrator asked 2 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhich LAN topology requires a central intermediate device to connect end devices?ITExamAnswers asked 2 years ago • CCNA CyberOps, Network Addressing and Basic TroubleshootingWhich two statements are true about NTP servers in an enterprise network? (Choose two.)ITExamAnswers asked 3 years ago • CCNA 2 v6, CCNA 3 v7, CCNA CyberOps, CCNP, DevNetWhen a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?IT Administrator asked 2 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8Which is an example of social engineering?ITExamAnswers asked 2 years ago • CCNA CyberOps, IT Essentials, IT Essentials 8A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative tool to force the release of system resources from the unresponsive application?ITExamAnswers asked 2 years ago • CCNA CyberOps, Endpoint Security, IT Essentials, IT Essentials 8