Documentos de Académico
Documentos de Profesional
Documentos de Cultura
0 exam Respuestas
Espaol- English
1. Qu consideracin de diseo de red podra ser ms importante para una empresa
grande que a una pequea empresa?
Redundancia
2. Qu hacen las redes WLAN que cumplan con los estndares IEEE 802.11
inalmbricos permiten a los usuarios hacer ?
Conectar hosts inalmbricos a equipos o servicios en una red Ethernet cableada
3. El comando _____ que se emite en un router se utiliza para verificar el valor del
registro de configuracin de software
show versin
4. Qu dos afirmaciones caracterizan seguridad de la red inalmbrica? (Elija dos
opciones).
Utilizando la direccin IP por defecto en un punto de acceso hace que la piratera sea ms
fcil.
Con la difusin de SSID deshabilitada, un atacante debe conocer el SSID para conectar.
5. Rellene el espacio en blanco.
VoIP__________ define los protocolos y tecnologas que implementan la transmisin de
datos de voz sobre una red IP.
6.Qu dos afirmaciones acerca de un identificador de conjunto de servicio (SSID) son
verdaderas? (Elegir dos).
Le dice a un dispositivo inalmbrico al que WLAN pertenece
Todos los dispositivos inalmbricos de la misma WLAN deben tener el mismo SSID
7.Si un archivo de configuracin se guarda en un pendrive USB conectado a un
router, lo que debe hacerse por el administrador de red antes el archivo puede
utilizarse en el router?
Edite el archivo de configuracin con un editor de texto.
8.Comando que se copia de seguridad de la configuracin almacenada en un servidor
TFTP en NVRAM?
copy startup-config tftp
La duracin del tiempo de espera de intentos de inicio de sesin es fijada por el bloque de
inicio de sesin-para 180 intentos 4 dentro de 60 comando. Este comando establece el
bloque de inicio de sesin en 180 segundos (3 minutos) despus de intentos de 4 incorrecta
dentro de un perodo de tiempo de 60 segundos. Este comando puede verse en el archivo de
configuracin de ejecucin.
English
1. Which network design consideration would be more important to a large
corporation than to a small business?
redundancy
2. What do WLANs that conform to IEEE 802.11 standards allow wireless users to
do?
connect wireless hosts to hosts or services on a wired Ethernet network
3. The _____ command that is issued on a router is used to verify the value of the
software configuration register
show version
Remember:
The show version command that is issued on a router displays the value of the
configuration register, the Cisco IOS version being used, and the amount of flash memory
on the device, among other information.
6. Which two statements about a service set identifier (SSID) are true? (Choose two.)
tells a wireless device to which WLAN it belongs
all wireless devices on the same WLAN must have the same SSID
7. If a configuration file is saved to a USB flash drive attached to a router, what must
be done by the network administrator before the file can be used on the router?
Edit the configuration file with a text editor.
8. Which command will backup the configuration that is stored in NVRAM to a TFTP
server?
copy startup-config tftp
Remember:
The startup configuration file is stored in NVRAM, and the running configuration is stored
in RAM. The copy command is followed by the source, then the destination.
11. Refer to the exhibit. Baseline documentation for a small company had ping round
trip time statistics of 36/97/132 between hosts H1 and H3. Today the network
administrator checked connectivity by pinging between hosts H1 and H3 that resulted
in a round trip time of 1458/2390/6066. What does this indicate to the network
administrator?
Something is causing a time delay between the networks
12. A ping fails when performed from router R1 to directly connected router R2. The
network administrator then proceeds to issue the show cdp neighbors command. Why
would the network administrator issue this command if the ping failed between the
two routers?
The network administrator wants to verify Layer 2 connectivity.
Remember:
The show cdp neighbors command can be used to prove that Layer 1 and Layer 2
connectivity exists between two Cisco devices. For example, if two devices have duplicate
IP addresses, a ping between the devices will fail, but the output of show cdp neighbors will
be successful. The show cdp neighbors detail could be used to verify the IP address of the
directly connected device in case the same IP address is assigned to the two routers.
14. What is the purpose of issuing the commands cd nvram: then dir at the privilege
exec mode of a router?
to list the content of the NVRAM
15. A network administrator has determined that various computers on the network
are infected with a worm. Which sequence of steps should be followed to mitigate the
worm attack?
containment, inoculation, quarantine, and treatment
16. A network administrator checks the security log and notices there was
unauthorized access to an internal file server over the weekend. Upon further
investigation of the file system log, the administrator notices several important
documents were copied to a host located outside of the company. What kind of threat
is represented in this scenario?
information theft
17. Which type of network attack involves the disabling or corruption of networks,
systems, or services?
denial of service attacks
19. Which WLAN security protocol generates a new dynamic key each time a client
establishes a connection with the AP?
WPA
20. How should traffic flow be captured in order to best understand traffic patterns in
a network?
during peak utilization times
22. Which two actions can be taken to prevent a successful attack on an email server
account? (Choose two.)
Limit the number of unsuccessful attempts to log in to the server.
Never send the password through the network in a clear text.