Professional Documents
Culture Documents
Networking MCQ
Networking MCQ
Networking MCQ
6
YOU TO DIAL
NUMBERS BY TYP
ON THE KEYBOAR
904 A CISCO ROUTER IS BOOTING AND HAS JUST COMPLETED THE POST PROCESS. IT IS
3 NOW READY TO FIND AND LOAD AN IOS IMAGE. WHAT FUNCTION DOES THE ROUTER
PERFORM NEXT? IT CHECKS TH
CONFIGURATION
904 THE COMBINATION OF _________ AND __________ IS OFTEN TERMED THE LOCAL
4 ADDRESS OF THE LOCAL PORTION OF THE IP ADDRESS.
NETWORK NU
HOST NUMBER
905 YOU HAVE A NETWORK THAT NEEDS 29 SUBNETS WHILE MAXIMIZING THE NUMBER
0 OF HOST ADDRESSES AVAILABLE ON EACH SUBNET. HOW MANY BITS MUST YOU
BORROW FROM THE HOST FIELD TO PROVIDE THE CORRECT SUBNET MASK? 2
905 YOUR INTERNET WORK CONSISTS ENTIRELY OF CISCO DEVICES. YOU HAVE GIVEN A
2 COMMAND SHOW CDP NEIGHBORS. IN THE RESPONSE, YOU GET S UNDER THE HEAD
CAPABILITY. WHAT DOES THE LETTER S MEAN? IT MEANS �S
ROUTE BRIDGE�
905 What protocol does PPP use to identify the Network layer protocol?
3
NCP
905 WHICH PROTOCOL WORKING AT THE TRANSPORT LAYER PROVIDES
4 ACONNECTIONLESS SERVICE BETWEEN HOSTS ?
IP
905 THE DOS ATTACK IN WHICH THE ATTACKER ESTABLISHES A LARGE NUMBER OF HALF-
6 OPEN OR FULLY OPEN TCP CONNECTIONS AT THE TARGET HOST IS ?
BANDWIDTH F
905 WHICH METHOD(S) IS USED TO MOVE DATA THROUGH A NETWORK OF LINKS AND
7 SWITCHES ?
CIRCUIT SWIT
905 THE DOS ATTACK IN WHICH THE ATTACKER SENDS DELUGE OF PACKETS TO THE
8 TARGETED HOST IN ?
CONNECTION
905 A LIST OF PROTOCOLS USED BY A SYSTEM, ONE PROTOCOL PER LAYER, IS CALLED ?
9
PROTOCOL
ARCHITECTURE