Jumat, 07 Januari 2011

CCNA Quiz Chapter 2 Discovery 3


  1. Drag each term on the left to its correct description on the right. (Not all options are used.)
>>           DoS                        maliciously prevents access to network resources by legitimate users
Demark                boundary that designates responsibility for equipment maintenance and troubleshooting
POP                       physical link to outside networks at the enterprise edge
CPE                        equipment located at the customer facility
VPN                       allows remote workers to access the internal network securely
  1. What information can be found by using the command show mac-address-table on a Cisco Catalyst switch?
>> the port the switch will use to forward frames to a host
  1. While troubleshooting a network problem, the network administrator issues the show version command on a router. What information can be found using this command?
>> the amount of NVRAM, DRAM, and flash memory installed on the router
  1. After gathering a through list of network applications, the traffic generated by these applications, and the priority of this traffic, a network engineer wishes to integrate this information into a single document for analysis. How can this be accomplished?
>> create a logical topology map of the network and annotate it with the network application data
  1. One evening a network administrator attempted to success a recently deployed website and receive a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there were hundred of requests for the web site home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?
>> it is likely that someone attempted a DoS attack
  1. What type of media typically connects an MDF switch to an IDF switch in another building?
>> fiber-optic
  1. Which three devices can receive power over the same twisted pair Ethernet cable that carries data? (Choose three.)
>> wireless access points >> web cameras >> IP phones
  1. Drag the hardware characteristic on the left to the hardware type on the right
>>           routers (interconnect networks, define broadcast domains, enhance security with ACLs), switches (connect IP phones and access points to the network, appear more commonly at the access layer, connect hosts to the network)
  1. Which two protocols can be used to access a Cisco router for in-band management?
>> SSH, Telnet
  1. A network analyst is documenting the existing network at ABC Corporation. The analyst decides to start at the core router to identify and document the Cisco network devices attached to the core. Which command executed on the core router provides the required information?
>> show cdp neighbors detail

0 komentar:

Posting Komentar