Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3667
Q:

Users on the 192.168.10.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server?

A. IP route 0.0.0.0 0.0.0.0 s0/0/0
B. IP route 0.0.0.0 0.0.0.0 209.165.200.226
C. IP route 209.165.200.0 255.255.255.0 192.168.10.250
D. IP route 192.168.10.0 255.255.255.0 209.165.100.250

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3652
Q:

What is the specific term for the unwanted signal interference from adjacent pairs in the cable?

A) EMI B) RFI
C) Crosstalk D) Attenuation
 
Answer & Explanation Answer: C) Crosstalk

Explanation:

The term for the unwanted signal interference from adjacent pairs in the cable is crosstalk

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3640
Q:

Which layer is responsible for keeping the data from different applications seperate on the network?

Answer

The session layer creates sessions between different host's applications.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

5 3630
Q:

What command is the Windows version of the Cisco command that displays the networks traversed on a path to a network destination?

A) ping B) traceroute
C) arp D) tracert
 
Answer & Explanation Answer: D) tracert

Explanation:

tracert is the Windows version of the Cisco command that displays the networks traversed on a path to a network destination.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3604
Q:

In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

A) All hosts have equal priority B) The two hosts that caused the collision will have equal priority
C) The host that sent the jam signal after the collision D) The host with the highest MAC address
 
Answer & Explanation Answer: A) All hosts have equal priority

Explanation:

After the expiration of the backoff algorithm , all hosts have equal priority.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3593
Q:

When a ping to the loopback address fails , what can you assume?

A) The IP address of the local host is incorrect B) The IP address of the remote host is incorrect
C) The NIC is not functional D) The IP stack has failed to initialize
 
Answer & Explanation Answer: D) The IP stack has failed to initialize

Explanation:

When a ping to the loopback address fails , you can assume the IP stack has failed to initialize.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3589
Q:

Which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?

A) /28 B) /29
C) /30 D) /31
 
Answer & Explanation Answer: C) /30

Explanation:

A point-to-point link uses only two hosts. A/30, or 255.255.255.252, mask provides two hosts per subnet.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3572