0 of 10 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
0 of 10 questions answered correctly
Time has elapsed
You have reached 0 of 0 points, (0)
Question 1 of 10
What is the role of a point-to-point networking protocol over Ethernet (PPoE)?Correct
After its introduction in 1999, most ISPs utilize PPoE for dial-up connectivity.
Question 2 of 10
Which of the following comprises an inappropriate mechanism for ensuring router security?
I. Routing protocols should be carried out by highly skilled and experienced security individuals.
II. Security personnel should block all unused ports.
III. There is a need for enabling packet filtering in security maintenance.
IV. The security personnel should disable unused services and interfaces.Correct
Please note that routing protocols should not be carried out by highly skilled and experienced security individuals only.
Question 3 of 10
Which of the following statements evidences a true attribute of half-duplex Ethernet operation?Correct
Please note the logical circuit feeding to a single cable requires the establishment of a one-way bridge in half-duplex transmission.
Question 4 of 10
Which of the following outlines the most appropriate basis for the use of the layered OSI reference model in the data communication industry?
I. It offers room for the establishment of multiple complementary standards that avails operational opportunities for the companies.
II. It provides the basis for dividing network communication processes into multiple components that foster component design, development, and troubleshooting.
III. It defines the functions of each layer of the model that provides the basis for usage standardization.
IV. It saves a company’s investment in R&D processes due to the ability to use electronic components from different vendors.Correct
In data communication, the layered OSI reference model divides communication processes to facilitate designing, developing, and troubleshooting, which is essential for usage standardization.
Question 5 of 10
In system administration, which set of commands will facilitate setting up an Ethernet interface on CISCO router that allows sap and Novell-ether encapsulations?Correct
Please note the following network command is required for setup and subinterfaces for enabling two types of encapsulation: interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface Ethernet0.2 IPX encapsulation sap IPX network 6c.
Question 6 of 10
Which of the following statements is valid for ICMP?Correct
Please note ICMP requires a redirect message to inform about a wrongly routed packet.
Question 7 of 10
What are the main methods of network switching?Correct
In computer networking, the main methods of network switching are circuit switching, packet switching, and message switching.
Question 8 of 10
Which of the following statements evidence the appropriate description or characteristic of Classless Inter-Domain Routing (CIDR)?Correct
Kindly note that CIDR routing lacks any type of network classification.
Question 9 of 10
Which of the following statements is true about interface-based access lists?Correct
Kindly note the interface-based access lists enable an individual to configure an access list in multiple layer protocol per direction.
Question 10 of 10
Which of the following statements offer an acceptable and true factor about the Port Aggregation Protocol?Correct
The Port Aggregation Protocol offers a basis for changes on the port-channel face that apply to physical ports across the board.