Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
Which of the following does the sudo iptables -F command accomplish?
Which of the following chains is used for incoming connections that aren't delivered locally?
You need to transfer data from one laptop to another, and you would like to use an Ethernet cable. You do not have a hub or a switch.Which type of cable should you use?
You have a network that uses a logical bus topology. How do messages travel through the network?
You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI.Which type of cable should you use?
Which of the following is the process of breaking a message into packets, adding controls and other information, and then transmitting the message through the transmission medium?
Which of the following describes the point where the service provider's responsibility to install and maintain wiring and equipment ends and the customer's begins?
An attack against the availability of a network/system; typically uses many attacking machines to direct traffic against a given target.What is the name of this?
Which of the following tools can be used to grant remote users access to the internal IT environment?
Two employees in the Sales department work different shifts with their laptop computers and share the same Ethernet port in the office. Which set of commands would allow only these two laptops to use the Ethernet port and create violation log entry without shutting down the port if a violation occurs?1. switchport mode access switchport port-security 2. switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation restrict 3. switchport mode access switchport port-security maximum 2 switchport port-security mac-address sticky 4. switchport mode access switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation protect
Refer to the exhibit. Which two statements are correct based on the output as shown in the exhibit? (Choose two.)1. Traffic with the destination address of a public web server will be sourced from the IP of 192.168.1.10. 2. The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10.3. The host with the address 209.165.200.235 will respond to requests by using a source address of 209.165.200.2354. The output is the result of the show ip nat translations command 5. The output is the result of the show ip nat statistics command
A network administrator is designing an ACL. The networks 192.168.1.0/25, 192.168.0.0/25, 192.168.0.128/25, 192.168.1.128/26, and 192.168.1.192/26 are affected by the ACL. Which wildcard mask, if any, is the most efficient to use when specifying all of these networks in a single ACL permit entry?1. 0.0.0.1272. 0.0.0.2553. 0.0.1.2554. 0.0.255.2555. A single ACL command and wildcard mask should not be used to specify these particular networks or other traffic will be permitted or denied and present a security risk.
A network technician has been asked to secure all switches in the campus network. The security requirements are for each switch to automatically learn and add MAC addresses to both the address table and the running configuration. Which port security configuration will meet these requirements?1. auto secure MAC addresses 2. dynamic secure MAC addresses 3. static secure MAC addresses 4. sticky secure MAC addresses
Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)1. They automatically switch the path to the destination network when the topology changes 2. They improve the efficiency of discovering neighboring networks. 3. They take less time to converge when the network topology changes 4. They Improve network security 5. They use fewer router resources
Which statement describes a route that has been learned dynamically?1. The default gateway address is not provided in the pool.2. No clients have communicated with the DHCPv6 server yet.3. The IPv6 DHCP pool configuration has no IPv6 address range specified.4. The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.
A network administrator is configuring port security on a Cisco switch. When a violation occurs, which violation mode that is configured on an interface will cause packets with an unknown source address to be dropped with no notification sent?1. off2. restrict3. protect4. shutdown
What is a basic function of the Cisco Borderless Architecture access layer?1. aggregates Layer 2 broadcast 2. domains provides access to the user 3. aggregates Layer 3 routing boundaries 4. provides fault isolation
A small company has a web server in the office that is accessible from the Internet. The IP address 192.168.10.15 is assigned to the web server. The network administrator is configuring the router so that external clients can access the web server over the Internet. Which item is required in the NAT configuration?1. an IPv4 address pool2. an ACL to identify the local IPv4 address of the web server3. the keyword overload for the ip nat inside source command4. the ip nat inside source command to link the inside local and inside global addresses
Refer to the exhibit. NAT is configured on Remote and Main. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between Main and the web server?1. 192.0.2.1 2. 209.165.200.226 3. 203.0.113.5 4. 209.165.200.245 5. 10.130.5.76 6. 172.16.1.10
A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228.236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home?1. ip nat inside source static tcp 209.165.200.225 443 10.18.7.5 443ip nat inside source static udp 209.165.200.225 4365 10.18.7.5 43652. No additional configuration is necessary3. ip nat pool mktv 10.18.7.5 10.18.7.54. ip nat inside source static tcp 10.18.7.5 443 209.165.200.225 443ip nat inside source static udp 10.18.7.5 4365 209.165.200.225 43655. ip nat outside source static 10.18.7.5 209.165
