Data Communications and Networking 2

IT6223 Data Communications and Networking 2
(PreLimQuiz-2)

Data Communications and Networking 2(Cisco 2) is all about network routing and switching essentials. In this course you will have a clear understanding in what are routers,and switches are all about and its purpose. Also in this course we’ve prepared for you well suited laboratory exercises for you to gain knowledge and skills in configuring these devices in different scenarios and in different networking environments. In between you will have some tips or pointers for you to make things easier. This course will not just help you to understand topics easier but prepare you in the real life networking environment and help you in passing some Cisco certification exams.For this course,it is essential at least you have a basic background in networking and you need to download Cisco Packet Tracer Student software as your simulation tool for the labs.



Question 1

Not yet answered
Marked out of 1.00

Question text

SSH protocol by default uses Port ______.
Select one:

Question 2

Not yet answered
Marked out of 1.00

Question text

This attack tries to crack a password on another device. The first phase of this attack starts with the attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list.
Select one:

Question 3

Not yet answered
Marked out of 1.00

Question text

Which of the following is the command to configure the IP domain name of the network (mycompany.com)
Select one:

Question 4

Not yet answered
Marked out of 1.00

Question text

What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access.
Select one:

Question 5

Not yet answered
Marked out of 1.00

Question text

A protocol that provides an encrypted connection to a remote device.
Select one:

Question 6

Not yet answered
Marked out of 1.00

Question text

Global configuration mode is used to configure system globally, or to enter specific configuration modes to configure specific elements such as protocols. What is the command to enter global configuration mode?
Select one:

Question 7

Not yet answered
Marked out of 1.00

Question text

In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.
Select one:

Question 8

Not yet answered
Marked out of 1.00

Question text

This is used to connect a PC to the console port of a switch for configuration.
Select one:

Question 9

Not yet answered
Marked out of 1.00

Question text

Telnet protocol by default uses Port ______.
Select one:

Question 10

Not yet answered
Marked out of 1.00

Question text

What is the command to configure the interface to automatically negotiate speed with the connected device?
Select one:

Question 1

Answer saved
Marked out of 1.00

Question text

Telnet protocol by default uses Port ______.
Select one:

Question 2

Answer saved
Marked out of 1.00

Question text

Sometimes switch ports must manually have their duplex mode manually configured. This duplex mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously.
Select one:

Question 3

Answer saved
Marked out of 1.00

Question text

This is used to connect a PC to the console port of a switch for configuration.
Select one:

Question 4

Answer saved
Marked out of 1.00

Question text

A protocol that provides an encrypted connection to a remote device.
Select one:

Question 5

Answer saved
Marked out of 1.00

Question text

What is the command to configure the interface to automatically negotiate speed with the connected device?
Select one:

Question 6

Answer saved
Marked out of 1.00

Question text

This is a security technology that determines which devices attached to switch ports can respond to DHCP requests. This can be used to prevent unauthorized DHCP messages that contain information such as IP address related data being provided to legitimate network devices.
Select one:

Question 7

Answer saved
Marked out of 1.00

Question text

If an error occurs while loading the operating system because of missing or damaged system files, the load loader can be access through a console connection. What button in the switch you need to press while reconnecting the power cord?
Select one:

Question 8

Answer saved
Marked out of 1.00

Question text

What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access.
Select one:

Question 9

Answer saved
Marked out of 1.00

Question text

Global configuration mode is used to configure system globally, or to enter specific configuration modes to configure specific elements such as protocols. What is the command to enter global configuration mode?
Select one:

Question 10

Answer saved
Marked out of 1.00

Question text

What is the status of the Port speed LED if the LED light is blinking green?
Select one: