IT6223 Data Communications and Networking 2
(PreLimQuiz-2)
Data Communications and Networking 2(Cisco 2) is all about network routing and switching essentials. In this course you will have a clear understanding in what are routers,and switches are all about and its purpose. Also in this course we’ve prepared for you well suited laboratory exercises for you to gain knowledge and skills in configuring these devices in different scenarios and in different networking environments. In between you will have some tips or pointers for you to make things easier. This course will not just help you to understand topics easier but prepare you in the real life networking environment and help you in passing some Cisco certification exams.For this course,it is essential at least you have a basic background in networking and you need to download Cisco Packet Tracer Student software as your simulation tool for the labs.
Question 1
Not yet answered
Marked out of 1.00
Question text
SSH protocol by default uses Port ______.
Select one:
Question 2
Not yet answered
Marked out of 1.00
Question text
This attack tries to crack a password on another device. The first phase of this attack starts with the attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list.
Select one:
Question 3
Not yet answered
Marked out of 1.00
Question text
Which of the following is the command to configure the IP domain name of the network (mycompany.com)
Select one:
Question 4
Not yet answered
Marked out of 1.00
Question text
What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access.
Select one:
Question 5
Not yet answered
Marked out of 1.00
Question text
A protocol that provides an encrypted connection to a remote device.
Select one:
Question 6
Not yet answered
Marked out of 1.00
Question text
Global configuration mode is used to configure system globally, or to enter specific configuration modes to configure specific elements such as protocols. What is the command to enter global configuration mode?
Select one:
Question 7
Not yet answered
Marked out of 1.00
Question text
In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.
Select one:
Question 8
Not yet answered
Marked out of 1.00
Question text
This is used to connect a PC to the console port of a switch for configuration.
Select one:
Question 9
Not yet answered
Marked out of 1.00
Question text
Telnet protocol by default uses Port ______.
Select one:
Question 10
Not yet answered
Marked out of 1.00
Question text
What is the command to configure the interface to automatically negotiate speed with the connected device?
Select one:
Question 1
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
Telnet protocol by default uses Port ______.Select one:
Telnet protocol by default uses Port ______.
Select one:
Question 2
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
Sometimes
switch ports must manually have their duplex mode manually configured.
This duplex mode increases effective bandwidth by allowing both ends of a
connection to transmit and receive data simultaneously.Select one:
Sometimes
switch ports must manually have their duplex mode manually configured.
This duplex mode increases effective bandwidth by allowing both ends of a
connection to transmit and receive data simultaneously.
Select one:
Question 3
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
This is used to connect a PC to the console port of a switch for configuration.Select one:
This is used to connect a PC to the console port of a switch for configuration.
Select one:
Question 4
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
A protocol that provides an encrypted connection to a remote device.Select one:
A protocol that provides an encrypted connection to a remote device.
Select one:
Question 5
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
What is the command to configure the interface to automatically negotiate speed with the connected device?Select one:
What is the command to configure the interface to automatically negotiate speed with the connected device?
Select one:
Question 6
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
This
is a security technology that determines which devices attached to
switch ports can respond to DHCP requests. This can be used to prevent
unauthorized DHCP messages that contain information such as IP address
related data being provided to legitimate network devices.Select one:
This
is a security technology that determines which devices attached to
switch ports can respond to DHCP requests. This can be used to prevent
unauthorized DHCP messages that contain information such as IP address
related data being provided to legitimate network devices.
Select one:
Question 7
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
If
an error occurs while loading the operating system because of missing
or damaged system files, the load loader can be access through a console
connection. What button in the switch you need to press while
reconnecting the power cord?Select one:
If
an error occurs while loading the operating system because of missing
or damaged system files, the load loader can be access through a console
connection. What button in the switch you need to press while
reconnecting the power cord?
Select one:
Question 8
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
What
type of DHCP attack where in an attacker floods the DHCP server with
DHCP requests to use all the available IP addresses that the DHCP server
can issue. After these IP addresses are issued, the server cannot issue
any more addresses, and this situation produces a denial-of-service
(DoS) attackas new clients cannot obtain network access.Select one:
What
type of DHCP attack where in an attacker floods the DHCP server with
DHCP requests to use all the available IP addresses that the DHCP server
can issue. After these IP addresses are issued, the server cannot issue
any more addresses, and this situation produces a denial-of-service
(DoS) attackas new clients cannot obtain network access.
Select one:
Question 9
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
Global
configuration mode is used to configure system globally, or to enter
specific configuration modes to configure specific elements such as
protocols. What is the command to enter global configuration mode?Select one:
Global
configuration mode is used to configure system globally, or to enter
specific configuration modes to configure specific elements such as
protocols. What is the command to enter global configuration mode?
Select one:
Question 10
Answer savedMarked out of 1.00
Answer saved
Marked out of 1.00
Question text
What is the status of the Port speed LED if the LED light is blinking green?Select one:
What is the status of the Port speed LED if the LED light is blinking green?
Select one: