IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Networking EssentialsWhat are two functions of a router? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v4, CCNA 2 v6, CCNA 3 v6, CCNA 3 v7, Networking Basics, Networking EssentialsWhich protocol is used by a server that needs to send an email message to another server in order to support successful delivery of the message?ITExamAnswers asked 3 years ago • Networking EssentialsWhich three IP addresses are considered private addresses? (Choose three.)IT Administrator asked 4 years ago • CCNA CyberOps, Networking EssentialsWhat technique is used in social engineering attacks?ITExamAnswers asked 4 years ago • CCNA CyberOps, Networking EssentialsA network administrator attempted to access the company website and received a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?ITExamAnswers asked 3 years ago • Networking EssentialsWhich two devices are shared peripherals? (Choose two.)ITExamAnswers asked 3 years ago • Networking EssentialsWhich three factors should be considered when choosing the appropriate network media? (Choose three.)ITExamAnswers asked 3 years ago • Networking Basics, Networking EssentialsWhat are three characteristics of UTP cabling? (Choose three.)ITExamAnswers asked 3 years ago • Networking EssentialsWhich interface allows remote management of a Layer 2 switch?ITExamAnswers asked 4 years ago • CCNA, Networking EssentialsWhat does the letter C mean next to an entry in the output of the show ip route command?ITExamAnswers asked 3 years ago • CCNA, Networking Devices and Initial Configuration, Networking EssentialsWhich address is a valid IPv6 address that could be assigned to a host?ITExamAnswers asked 3 years ago • Networking EssentialsWhich two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)ITExamAnswers asked 4 years ago • CCNA, Networking Basics, Networking EssentialsMatch the components in the notation 100Base-T to the specification. (Not all options are used.)ITExamAnswers asked 3 years ago • Networking EssentialsWhich technology is used to uniquely identify a WLAN network?ITExamAnswers asked 3 years ago • Networking Basics, Networking EssentialsWhat are two benefits of wireless networks over wired networks? (Choose two.)ITExamAnswers asked 3 years ago • Networking Essentials