Question

The graphic contains two subnets. The subnet Teachers contains two hosts connected through a switch: host A with MAC address 00-00-0c-94-36-aa and IP address 172.16.10.100/24, and host B with MAC address 00-00-0c-94-36-bb and IP address 172.16.10.200/24. The switch is connected to the router through the Fast Ethernet 0 interface. This interface has a MAC address 00-00-0c-94-36-ab and an IP address 172.16.10.99/24. The other interface of the router, Fast Ethernet 1 has a MAC address 00-00-0c-94-36-cd and IP address 172.16.20.99/24. This interface is part of subnet Students and it is connected to another switch. Two other hosts are connected to this switch: host C with MAC address 00-00-0c-94-36-cc and IP address 172.16.20.100/24, and host D with MAC address 00-00-0c-94-36-dd and IP address 172.16.20.200/24.

Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?

Question

Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

Question

What are proprietary protocols?

Question

What will happen if the default gateway address is incorrectly configured on a host?

Question

Which scenario describes a function provided by the transport layer?

Question

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Question

Which two statements describe features of an IPv4 routing table on a router? (Choose two.)​

Question

What attribute of a NIC would place it at the data link layer of the OSI model?

Question

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

Question

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

Question

What technique is used with UTP cable to help protect against signal interference from crosstalk?

Question

What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)

Question

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?

Question

What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)

Question

What are the three parts of an IPv6 global unicast address? (Choose three.)

Question

Which subnet would include the address 192.168.1.96 as a usable host address?

Question

A central router is directly connected to four other routers.  Each of those routers is connected to a cloud of computers.  The clouds are labeled "75 Hosts", "100 Hosts", "25 Hosts", and "50 Hosts".

Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?

Question

Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network.

  1. Network C → 192.168.0.192 /27
  2. Network A → 192.168.0.0 /25
  3. Network D → 192.168.0.224 /30
  4. Network B → 192.168.0.128 /26

Question

How does the service password-encryption command enhance password security on Cisco routers and switches?

Question

Match the firewall function to the type of threat protection it provides to the network.

  1. prevents access based on IP or MAC address → packet filtering
  2. prevents access to websites → URL filtering
  3. prevents unsolicited incoming sessions → stateful packet inspection
  4. prevents access by port number → application filtering

Question

Match each description to its corresponding term.

  1. message encoding → the process of converting information from one format into another acceptable for transmission
  2. message encapsulation → the process of placing one message format inside another message format
  3. message sizing → the process of breaking up a long message into individual pieces before being sent over the network

Question

A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?

Question

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?

Question

Why would a Layer 2 switch need an IP address?

Question

A CLI output that says the following:  Switch1> config t             ^ % Invalid input detected at '^' marker.  The ^ is under the "f" in the word "config"

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

Question

What command can be used on a Windows PC to see the IP configuration of that computer?

Question

What is an advantage to using a protocol that is defined by an open standard?

Question

What are two functions that are provided by the network layer? (Choose two.)

Question

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

Question

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

Question

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

Question

Match the description to the IPv6 addressing component.

  1. This network portion of the address is assigned by the provider. → global routing prefix
  2. This part of the address is used by an organization to identify subnets. → subnet ID
  3. This part of the address is the equivalent to the host portion of an IPv4 address. → interface ID

Question

Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

Question

Match each description with the corresponding TCP mechanism.

  1. received by a sender before transmitting more segments in a session → acknowledgment
  2. method of managing segments of data loss → retransmission
  3. used to identify missing segments of data → sequence numbers
  4. number of bytes a destination device can accept and process at one time → window size

Question

What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)

Question

The exhibit shows a network topology. PC1 and PC2 are connected to the Fa0/1 and Fa0/2 ports of the SW1 switch, respectively. SW1 is connected through its Fa0/3 port to the Fa0/0 interface of the RT1 router. RT1 is connected through its Fa0/1 to the Fa0/2 port of SW2 switch. SW2 is connected through its Fa0/1 port to the PC3.

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?​

Question

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

Question

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

Question

What method is used to manage contention-based access on a wireless network?

Question

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)

Question

Match the type of threat with the cause.

  1. maintenance threats → poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling
  2. environmental threats → temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)
  3. hardware threats → physical damage to servers, routers, switches, cabling plant, and workstations
  4. electrical threats → voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

Question

What are two features of ARP? (Choose two.)

Question

A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?

Question

Which switching method drops frames that fail the FCS check?

Question

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

Question

A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)

Question

Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

Question

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?

Question

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

Question

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

Question

Which information does the show startup-config command display?

Question

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

Question

Match each description with an appropriate IP address.

  1. a loopback address → 127.0.0.1
  2. an experimental address → 240.2.6.255
  3. a public address → 198.133.219.2
  4. a link-local address → 169.254.1.5

Question

What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)

Question

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?

Question

What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

Question

What is one main characteristic of the data link layer?

Question

Which range of link-local addresses can be assigned to an IPv6-enabled interface?​

Question

The exhibit shows PC1 assigned an address of 192.168.10.8/24 attached to a switch that is attached to the G0/0 port of R1. R1 has a serial connection to R2 through port S0/0/0 on both routers. Port G0/0 on router R2 connects to a switch that connects to a PC labeled PC2 with the IP address of 192.168.11.5/24.

Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?

Question

The graphic contains the following information: <output omitted>   Interface: 192.168.1.67 --- 0xa  Internet Address        Physical Address      Type 192.168.1.254           64-0f-29-0d-36-91     dynamic 192.168.1.255           ff-ff-ff-ff-ff-ff            static 224.0.0.22                 01-00-5e-00-00-16    static   224.0.0.251               01-00-5e-00-00-fb     static 224.0.0.252               01-00-5e-00-00-fc     static 255.255.255.255        ff-ff-ff-ff-ff-ff     static Interface: 10.82.253.91 --- 0x10  Internet Address        Physical Address      Type 10.82.253.92             64-0f-29-0d-36-91     dynamic 224.0.0.22                 01-00-5e-00-00-16     static   224.0.0.251               01-00-5e-00-00-fb     static 224.0.0.252               01-00-5e-00-00-fc     static 255.255.255.255       ff-ff-ff-ff-ff-ff            static​

Refer to the exhibit. Which protocol was responsible for building the table that is shown?

Question

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​

Question

A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.)

Question

What are two characteristics shared by TCP and UDP? (Choose two.)

Question

What are two characteristics of IP? (Choose two.)

Question

What two security solutions are most likely to be used only in a corporate environment? (Choose two.)

Question

The exhibit show the output from the show ip interface brief command executed on a switch. The output is as follows: Switch#  show ip interface brief Interface          IP-Address       OK?   Method   Status    Protocol FastEthernet0/1     unassigned      YES     manual      up          up FastEthernet0/2     unassigned      YES     manual     down   down FastEthernet0/3     unassigned      YES     manual     down   down FastEthernet0/5     unassigned      YES     manual     down   down FastEthernet0/6     unassigned      YES     manual     down   down (output omitted) FastEthernet0/23  unassigned       YES     manual     down   down FastEthernet0/24  unassigned       YES     manual     down   down Vlan1                      192.168.11.3     YES    manual     up         up

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

Question

What is a benefit of using cloud computing in networking?

Question

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees.
What three network characteristics are described in this scenario? (Choose three.)

Question

Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)

Question

Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)

Question

The graphic displays a terminated RJ45 connector. The untwisted wires at the end of the PVC sheath are crimped by the connector.

Refer to the exhibit. What is wrong with the displayed termination?

Question

A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?

Question

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

Question

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

Question

What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?

Question

A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices:
Subnetwork A: IP phones – 10 addresses
Subnetwork B: PCs – 8 addresses 
Subnetwork C: Printers – 2 addresses 

What single subnet mask would be appropriate to use for the three subnetworks?

Question

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed

The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

Question

The exhibit shows the R1 router with three separate connections to three switches. Each switch has a PC. Under each PC from left to right are the following numbers and words: 10.18.10.0/26, 10.18.10.192/29, and 10 hosts.

Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)

Question

Four PCs and a server are connected to a switch. The switch is connected the the LBMISS router. The LBMISS router is connected via a serial link to the "cloud" labeled ISP.

Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?

Question

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)

Question

Host A has IP address 172.168.10.99 /26 and a MAC address of AA:AA:AA:AA:AA:AA. A switch connects between host A and an Ethernet port on router R2. That port has an IP address of 172.168.10.65 /26 and a MAC address of BB:BB:BB:BB:BB:BB. R2 connects to router R1 via a serial port assigned 172.168.10.129 /30. The R1 serial interface has the IP address of 172.168.10.130 /30. The R1 Ethernet port connected to another switch has an IP address of 172.168.11.65 /26 and a MAC address of CC:CC:CC:CC:CC:CC. Host B connects to the same switch as R1. Host B has an IP address of 172.168.11.88 /26 and a MAC address of DD:DD:DD:DD:DD:DD.

Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?

Question

What is the purpose of the TCP sliding window?

Question

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

Question

A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

Question

Three hosts (labeled A, B, and C) connect to a switch that connects to router R1. Router R1 connects through a serial connection to router R2. R2 connects to a switch that connects to host D.

Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?

Question

Host1 connects to Switch1 and then to Router1. Router1 connects to Router2 via a serial link. Router2 connects to Switch2 and Switch2 connects to a server. Router2 also connects to an ISP via a serial link.

Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

Question

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

Question

Match each type of frame field to its function.

  1. Error detection → This field checks if the frame has been damaged during the transfer.
  2. Addressing → This field helps to direct the frame toward its destination.
  3. Frame start → This field identifies the beginning of a frame.
  4. Type → This field is used by the LLC to identify the Layer 3 protocol.

Question

What is an advantage for small organizations of adopting IMAP instead of POP?

Question

The graphic displays the following: C:\Windows\system32> tracert 192.168.100.1 Tracing route to 192.168.100.1 over a maximum of 30 hops 1   1 ms   <1 ms   <1 ms    10.10.10.10 2   2 ms    2 ms    1 ms    192.168.1.22 3   2 ms    2 ms    1 ms    192.168.1.62 4   2 ms    2 ms    1 ms    172.16.1.1 Trace complete.

Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)

Question

What are three characteristics of the CSMA/CD process? (Choose three.)

Question

Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)

Question

Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?

Question

What are the two most effective ways to defend against malware? (Choose two.)

Question

The graphic shows a network topology that consists of three routers, R1, R2, and R3, that are connected to one another by serial links. The R1 G0/0 and G0/1 interfaces are attached to one LAN switch each. Each LAN switch has three hosts attached to it. One of the hosts that is attached to the G0/0 interface of R1 is labeled as H1. The R1 S0/0/0 interface is attached to R2. The R2 S0/0/1 interface is attached to a cloud that is labelled ISP. The R2 S0/1/0 interface is attached to the S0/0/0 interface of R3. The G0/0 interface of R3 is attached to a LAN switch. The LAN switch has three hosts attached to it.

Refer to the exhibit. The IP address of which device interface should be used as the default gateway setting of host H1?

Question

Which wireless technology has low-power and data rate requirements making it popular in home automation applications?

Question

Which layer of the TCP/IP model provides a route to forward messages through an internetwork?

Question

Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?

Question

There are 3 routers. A line from the first router points to a text box that states 30 hosts. The first router is connected to the second router with a serial link. The second router is connected to the third router with a serial link. A line from the third router points to a text box that states 14 hosts.

Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets?

Question

What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?

Question

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

Question

What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?

Question

What is a function of the data link layer?

Question

Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)

Question

A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network?

Question

The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?

Question

What happens when the transport input ssh command is entered on the switch vty lines?

Question

What are two common causes of signal degradation when using UTP cabling? (Choose two.)

Question

What are three commonly followed standards for constructing and installing cabling? (Choose three.)

Question

Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?

Question

What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

Question

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 25 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 90 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

Question

A client packet is received by a server. The packet has a destination port number of 53. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?

Question

A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?

Question

What service is provided by POP3?

Question

What service is provided by Internet Messenger?

Question

What service is provided by SMTP?

Question

What service is provided by HTTPS?

Question

What service is provided by DHCP?

Question

What service is provided by HTTP?

Question

What service is provided by BOOTP?

Question

What service is provided by HTTP?

Question

What service is provided by FTP?

Question

What service is provided by DNS?

Question

What characteristic describes a virus?

Question

What characteristic describes a Trojan horse?

Question

What characteristic describes spyware?

Question

What characteristic describes adware?

Question

What characteristic describes a DoS attack?

Question

What characteristic describes identity theft?

Question

What characteristic describes a VPN?

Question

What characteristic describes an IPS?

Question

What characteristic describes antivirus software?

Question

What characteristic describes antispyware?

Question

What does the term "attenuation" mean in data communication?

Question

Please rate your motivation to do well in this course:

Question

Please indicate how enthusiastic you are about the content of this course and the things you’re learning (or have learned):

Question

Please indicate your interest in this course:

Question

The hands-on lab activities helped me to achieve the stated course objectives.

Question

Overall, the online course materials were of high quality.

Question

Having access to equipment in the classroom helped me learn.

Question

Access:

Please rate how easy it is for you to access the course materials online from home:

Question

Prepare for Certification exam(s)

Question

Learn skills that can be used in your current or a future job

Question

Increase your value in the job market

Question

Obtain a new job or advance in your current job

Question

Continue my education:

Question

On the job training:

Question

Take Certification Exam(s):

Question

The Cisco Networking Academy Program furthered my goals.

Question

Rate the reading level of this course:

Question

Further your education

Question

Packet Tracer activities helped me learn.

Question

Is your career goal to work in IT and/or networking?

Question

Interactive activities helped me learn.

Question

Please rate your confidence with the overall skills you learned in this course:

Question

Why did you enroll in this course? (Check all that apply.)

Question

Are you currently employed in a Technology field?

Question

Develop professional skills (such as written or oral communication, computer literacy, problem-solving, or teamwork).

Question

Please choose the option below that best describes your current goal or motivation for taking Cisco Networking Academy courses:

Question

How would you like to see the course improved? (Check all that apply)

Question

The online quizzes helped to prepare me for the chapter exams.

Question

The exam scores accurately reflected my understanding of the curriculum.

Question

The videos helped to reinforce key concepts.

Question

The course curriculum was technically accurate.

Question

Configure switches and end devices to provide access to local and remote network resources.

Question

Explain how physical and data link layer protocols support the operation of Ethernet in a switched network.

Question

Configure routers to enable end-to-end connectivity between remote devices.

Question

Create IPv4 and IPv6 addressing schemes and verify network connectivity between devices.

Question

Explain how the upper layers of the OSI model support network applications.

Question

Configure a small network with security best practices.

Question

Take another Cisco Networking Academy course:

Question

This course as a whole

Question

Curriculum Materials:

Question

Classroom Instruction:

Question

Access to Equipment / Software:

Question

Labs:

Question

Packet Tracer:

Question

Assessment (including quizzes and exams):

Question

Preparedness to teach the course

Question

Clear and easy to understand lessons

Question

Approachability with questions and ideas

Question

Presenting information in multiple ways

Question

Making the topic interesting

Question

I would take another course from this instructor.

Question

I learned a lot from this instructor.

Question

This instructor emphasized learning through practice (such as hands-on labs).

Question

Please rate how easy it is to use a computer in your classroom:

Question

Videos:

Question

Interactive activities:

Question

Packet Tracer Physical Mode activities:

Question

Packet Tracer Physical Mode activities helped me achieve the stated course objectives.

Question

Please rate how easy it is to use equipment in your classroom: