PDF Download
FREE AND STUDY GAMES ABOUT NETWORKING SA1 EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -87 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: displays the next screen
Answer:
Space bar Question 2: At which OSI layer is a source MAC address added to a PDU during the encapsulation process?
Answer:
data link layer Question 3: Which of the following is the name for all computers connected to a network that participate directly in network communication?
Answer:
Host Question 4: At which OSI layer is a source port number added to a PDU during the encapsulation process?
Answer:
transport layer
Question 5: Provide redundant links and devices.
Answer:
fault tolerance Question 6: What two criteria are used to help select a network medium from various network media? (Choose two.)
Answer:
- the distance the selected medium can successfully carry a signal
- the environment where the selected medium is to be installed
Question 7: What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?
Answer:
show ip interface brief Question 8: A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center
Answer:
fault tolerance Question 9: A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)
Answer:
- implementing a firewall
- installing antivirus software
Question 10: An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
Answer:
The administrator must first enter privileged EXEC mode before issuing the command
Question 11: Protect the network from unauthorized access.
Answer:
security Question 12: Expand the network without degrading the service for existing users.
Answer:
scalability Question 13: Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.)
Answer:
ServerB will generate a frame with the destination MAC address of RouterB.ServerB will generate a packet with the destination IP address of HostA.Question 14: What term describes a computing model where server software runs on dedicated computers?
Answer:
client/server Question 15: In the show running-config command, which part of the syntax is represented by running-config ?
Answer:
a keyword
Question 16: high bandwidth connection that runs over telephone line
Answer:
DSL Question 17: An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?
Answer:
to interrupt the ping process
Question 18: What term describes the ability to use personal devices across a business or campus network?
Answer:
BYOD Question 19: During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
Answer:
spyware Question 20: What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Answer:
quality of service
Question 21: Which two devices are intermediary devices? (Choose two)
Answer:
Router Switch
Question 22: The Ethernet header is added.
Answer:
Fourth
Question 23: The TCP header is added.
Answer:
Second
Question 24: final mode
Answer:
line configuration mode