2
Cisco Module 1-3 Checkpoint Exam Study Guide || || || || || || ||
questions with accurate detailed solutions || || || ||
1. During a routine inspection, a technician discovered that software that was installed on a
|| || || || || || || || || || || || || || ||
computer was secretly collecting data about websites that were visited by users of the computer.
|| || || || || || || || || || || || || || ||
Which type of threat is affecting this computer? - ✔✔spyware
|| || || || || || || || ||
2. Which term refers to a network that provides secure access to the corporate offices by
|| || || || || || || || || || || || || || || ||
suppliers, customers and collaborators? - ✔✔extranet || || || || ||
3. A large corporation has modified its network to allow users to access network resources from
|| || || || || || || || || || || || || || || ||
their personal laptops and smart phones. Which networking trend does this describe? - ✔✔bring
|| || || || || || || || || || || || || ||
your own device || ||
4. What is an ISP? - ✔✔It is an organization that enables individuals and businesses to connect to
|| || || || || || || || || || || || || || || || || ||
the Internet.
||
5. Match the requirements of a reliable network with the supporting network architecture. (Not all
|| || || || || || || || || || || || || || ||
options are used.) - ✔✔ || || || ||
6. An employee at a branch office is creating a quote for a customer. In order to do this, the
|| || || || || || || || || || || || || || || || || || || ||
employee needs to access confidential pricing information from internal servers at the Head
|| || || || || || || || || || || || ||
Office. What type of network would the employee access? - ✔✔an intranet
|| || || || || || || || || || ||
7. Which statement describes the use of powerline networking technology? - ✔✔A device
|| || || || || || || || || || || || ||
connects to an existing home LAN using an adapter and an existing electrical outlet.
|| || || || || || || || || || || || ||
8. A networking technician is working on the wireless network at a medical clinic. The technician
|| || || || || || || || || || || || || || || ||
accidentally sets up the wireless network so that patients can see the medical records data of other
|| || || || || || || || || || || || || || || || ||
patients. Which of the four network characteristics has been violated in this situation? -
|| || || || || || || || || || || || || ||
✔✔security
, 2
10. What two criteria are used to help select a network medium from various network media?
|| || || || || || || || || || || || || || || ||
(Choose two.) - ✔✔the distance the selected medium can successfully carry a signal, the
|| || || || || || || || || || || || || ||
environment where the selected medium is to be installed || || || || || || || ||
11. What type of network traffic requires QoS? - ✔✔video conferencing
|| || || || || || || || || ||
12. A user is implementing security on a small office network. Which two actions would provide
|| || || || || || || || || || || || || || || ||
the minimum security requirements for this network? (Choose two.) - ✔✔implementing a
|| || || || || || || || || || || ||
firewall, installing antivirus software|| || ||
13. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and
|| || || || || || || || || || || || || || || || || || || ||
interfaces that can be protected with passwords. (Choose three.) - ✔✔VTY interface, console
|| || || || || || || || || || || || ||
interface, privileged EXEC mode || || ||
14. Which interface allows remote management of a Layer 2 switch? - ✔✔the switch virtual
|| || || || || || || || || || || || || || ||
interface
15. What function does pressing the Tab key have when entering a command in IOS? - ✔✔It
|| || || || || || || || || || || || || || || || ||
completes the remainder of a partially typed word in a command.
|| || || || || || || || || ||
16. While trying to solve a network issue, a technician made multiple changes to the current
|| || || || || || || || || || || || || || || ||
router configuration file. The changes did not solve the problem and were not saved. What action
|| || || || || || || || || || || || || || || ||
can the technician take to discard the changes and work with the file in NVRAM? - ✔✔Issue the
|| || || || || || || || || || || || || || || || || ||
reload command without saving the running configuration.
|| || || || || ||
17. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping
|| || || || || || || || || || || || || || ||
command. What is the purpose of using these keystrokes? - ✔✔to interrupt the ping process
|| || || || || || || || || || || || || ||
18. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If
|| || || || || || || || || || || || || || || ||
the administrator uses a console connection to connect to the switch, which password is needed to
|| || || || || || || || || || || || || || || ||
access user EXEC mode? - ✔✔lineconin
|| || || || ||
Cisco Module 1-3 Checkpoint Exam Study Guide || || || || || || ||
questions with accurate detailed solutions || || || ||
1. During a routine inspection, a technician discovered that software that was installed on a
|| || || || || || || || || || || || || || ||
computer was secretly collecting data about websites that were visited by users of the computer.
|| || || || || || || || || || || || || || ||
Which type of threat is affecting this computer? - ✔✔spyware
|| || || || || || || || ||
2. Which term refers to a network that provides secure access to the corporate offices by
|| || || || || || || || || || || || || || || ||
suppliers, customers and collaborators? - ✔✔extranet || || || || ||
3. A large corporation has modified its network to allow users to access network resources from
|| || || || || || || || || || || || || || || ||
their personal laptops and smart phones. Which networking trend does this describe? - ✔✔bring
|| || || || || || || || || || || || || ||
your own device || ||
4. What is an ISP? - ✔✔It is an organization that enables individuals and businesses to connect to
|| || || || || || || || || || || || || || || || || ||
the Internet.
||
5. Match the requirements of a reliable network with the supporting network architecture. (Not all
|| || || || || || || || || || || || || || ||
options are used.) - ✔✔ || || || ||
6. An employee at a branch office is creating a quote for a customer. In order to do this, the
|| || || || || || || || || || || || || || || || || || || ||
employee needs to access confidential pricing information from internal servers at the Head
|| || || || || || || || || || || || ||
Office. What type of network would the employee access? - ✔✔an intranet
|| || || || || || || || || || ||
7. Which statement describes the use of powerline networking technology? - ✔✔A device
|| || || || || || || || || || || || ||
connects to an existing home LAN using an adapter and an existing electrical outlet.
|| || || || || || || || || || || || ||
8. A networking technician is working on the wireless network at a medical clinic. The technician
|| || || || || || || || || || || || || || || ||
accidentally sets up the wireless network so that patients can see the medical records data of other
|| || || || || || || || || || || || || || || || ||
patients. Which of the four network characteristics has been violated in this situation? -
|| || || || || || || || || || || || || ||
✔✔security
, 2
10. What two criteria are used to help select a network medium from various network media?
|| || || || || || || || || || || || || || || ||
(Choose two.) - ✔✔the distance the selected medium can successfully carry a signal, the
|| || || || || || || || || || || || || ||
environment where the selected medium is to be installed || || || || || || || ||
11. What type of network traffic requires QoS? - ✔✔video conferencing
|| || || || || || || || || ||
12. A user is implementing security on a small office network. Which two actions would provide
|| || || || || || || || || || || || || || || ||
the minimum security requirements for this network? (Choose two.) - ✔✔implementing a
|| || || || || || || || || || || ||
firewall, installing antivirus software|| || ||
13. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and
|| || || || || || || || || || || || || || || || || || || ||
interfaces that can be protected with passwords. (Choose three.) - ✔✔VTY interface, console
|| || || || || || || || || || || || ||
interface, privileged EXEC mode || || ||
14. Which interface allows remote management of a Layer 2 switch? - ✔✔the switch virtual
|| || || || || || || || || || || || || || ||
interface
15. What function does pressing the Tab key have when entering a command in IOS? - ✔✔It
|| || || || || || || || || || || || || || || || ||
completes the remainder of a partially typed word in a command.
|| || || || || || || || || ||
16. While trying to solve a network issue, a technician made multiple changes to the current
|| || || || || || || || || || || || || || || ||
router configuration file. The changes did not solve the problem and were not saved. What action
|| || || || || || || || || || || || || || || ||
can the technician take to discard the changes and work with the file in NVRAM? - ✔✔Issue the
|| || || || || || || || || || || || || || || || || ||
reload command without saving the running configuration.
|| || || || || ||
17. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping
|| || || || || || || || || || || || || || ||
command. What is the purpose of using these keystrokes? - ✔✔to interrupt the ping process
|| || || || || || || || || || || || || ||
18. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If
|| || || || || || || || || || || || || || || ||
the administrator uses a console connection to connect to the switch, which password is needed to
|| || || || || || || || || || || || || || || ||
access user EXEC mode? - ✔✔lineconin
|| || || || ||