Security, and Automation with All Correct & 100%
Verified Answers| Already Graded A+
Which design feature will limit the size of a failure domain in an enterprise network? ✔Correct
Answer-the use of the building switch block approach
Which two things should a network administrator modify on a router to perform password recovery?
(Choose two.) ✔Correct Answer-the configuration register value
the startup configuration file
What type of network uses one common infrastructure to carry voice, data, and video signals?
✔Correct Answer-converged
What are three advantages of using private IP addresses and NAT? (Choose three.) ✔Correct
Answer-hides private LAN addressing from outside devices that are connected to the Internet
permits LAN expansion without additional public IP addresses
conserves registered public IP addresses
Which two scenarios are examples of remote access VPNs? (Choose two.) ✔Correct Answer-A
mobile sales agent is connecting to the company network via the Internet connection at a hotel.
An employee who is working from home uses VPN client software on a laptop in order to connect to
the company network.
What are three benefits of cloud computing? (Choose three.) ✔Correct Answer-It streamlines the
IT operations of an organization by subscribing only to needed services.
It enables access to organizational data anywhere and at any time.
It eliminates or reduces the need for onsite IT equipment, maintenance, and management.
What is a characteristic of a single-area OSPF network? ✔Correct Answer-All routers are in the
backbone area.
A network administrator has been tasked with creating a disaster recovery plan. As part of this plan,
the administrator is looking for a backup site for all of the data on the company servers. What service
or technology would support this requirement? ✔Correct Answer-data center
Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor
adjacency? ✔Correct Answer-hello
Which two statements are characteristics of a virus? (Choose two.) ✔Correct Answer-A virus can
be dormant and then activate at a specific time or date.
A virus typically requires end-user activation
, The type of end user interaction required to launch a virus is typically opening an application,
opening a web page, or powering on the computer. Once activated, a virus may infect other files
located on the computer or other computers on the same network.
Which public WAN access technology utilizes copper telephone lines to provide access to subscribers
that are multiplexed into a single T3 link connection? ✔Correct Answer-DSL
A customer needs a metropolitan area WAN connection that provides high-speed, dedicated
bandwidth between two sites. Which type of WAN connection would best fulfill this need?
✔Correct Answer-Ethernet WAN
A company has contracted with a network security firm to help identify the vulnerabilities of the
corporate network. The firm sends a team to perform penetration tests to the company network.
Why would the team use debuggers? ✔Correct Answer-to reverse engineer binary files when
writing exploits and when analyzing malware
What command would be used as part of configuring NAT or PAT to clear dynamic entries before the
timeout has expired? ✔Correct Answer-clear ip nat translation
What are two characteristics of video traffic? (Choose two.) ✔Correct Answer-Video traffic latency
should not exceed 400 ms.
Video traffic is unpredictable and inconsistent.
In setting up a small office network, the network administrator decides to assign private IP addresses
dynamically to workstations and mobile devices. Which feature must be enabled on the company
router in order for office devices to access the internet? ✔Correct Answer-NAT
A data center has recently updated a physical server to host multiple operating systems on a single
CPU. The data center can now provide each customer with a separate web server without having to
allocate an actual discrete server for each customer. What is the networking trend that is being
implemented by the data center in this situation? ✔Correct Answer-virtualization
Which two IPsec protocols are used to provide data integrity? ✔Correct Answer-MD5
SHA
If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain
access to the client image? ✔Correct Answer-The host initiates a clientless VPN connection using a
compliant web browser to download the client.
A company is considering updating the campus WAN connection. Which two WAN options are
examples of the private WAN architecture? (Choose two.) ✔Correct Answer-leased line
Ethernet WAN
Which type of QoS marking is applied to Ethernet frames? ✔Correct Answer-CoS
Which is a characteristic of a Type 2 hypervisor? ✔Correct Answer-does not require management
console software
What are the two types of VPN connections? (Choose two.) ✔Correct Answer-site-to-site
remote access