IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNAIn computer network communications which data transfer process does the application layer protocol FTP use?IT Administrator asked 4 years ago • CCNAWhat action takes place when a frame entering a switch has a broadcast destination MAC address?IT Administrator asked 4 years ago • CCNAWhich LAN attack involves sending unsolicited ARP replies, with the MAC Address of the threat actor and the IP address of the default gateway, to other hosts on a subnet?IT Administrator asked 4 years ago • CCNAA network engineer is designing a borderless switched network in a hierarchical fashion. Which guideline might cause the engineer to implement a three-tier layer model?ITExamAnswers asked 4 years ago • CCNAWhich two 802.11 WLAN standards operate in both the 2.4 Ghz and in the 5Ghz frequency bands?(Choose two)IT Administrator asked 4 years ago • CCNAWhat term describes allowing delay-sensitive packets such as voice to be sent before packets in other queues based on strict priority queuing ?IT Administrator asked 4 years ago • CCNAA network engineer is examining Cisco router configurations across an internetwork. Consider the following routing table entryIT Administrator asked 4 years ago • CCNAWhich two 802.11 WLAN standards operate in both the 2.4 GHz and in the 5 GHz frequency bands? (Choose two.)IT Administrator asked 4 years ago • CCNAWhich field in an IPv4 packet header will typically stay the same during its transmission?ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOpsMatch the purpose to the related configuration item. (Not all options are used.)ITExamAnswers asked 4 years ago • CCNAWhich two protocols may devices use in the application process that sends email? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA CyberOpsA client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting?ITExamAnswers asked 4 years ago • CCNAWhat is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?ITExamAnswers asked 4 years ago • CCNAWhat three network characteristics are described in this scenario? (Choose three.)ITExamAnswers asked 4 years ago • CCNAWhy would a network administrator use the config-register 0x2102 command on a Cisco network device?IT Administrator asked 4 years ago • CCNA