Senin, 20 Juni 2011

CCNA Discovery 3 Module 2 Exam Answers Version 4

Which two situations require a network administrator to use out-of-band management to change a router configuration? (Choose two.)

A DoS attack crippled the daily operations of a large company for 8 hours. Which two options could be implemented by the network administrator to possibly prevent such an attack in the future? (Choose two.)

What device is responsible for moving packets to destination networks outside the local network?

What is the demarcation?

Which two types of information should be included in a business continuity plan? (Choose two.)

What two features are true of an IDF? (Choose two.)

What is the maximum recommended cable length for Fast Ethernet over UTP?

Which two pieces of information are documented in a logical topology map? (Choose two.)

Which two statements are true about a network operations center (NOC)? (Choose two.)

It is crucial that network administrators be able to examine and configure network devices from their homes. Which two approaches allow this connectivity without increasing vulnerability to external attacks? (Choose two.)

A network administrator needs to configure Telnet access to a router. Which group of commands enable Telnet access to the router?

An investment company has multiple servers that hold mission critical data. They are worried that if something happens to these servers, they will lose this valuable information. Which type of plan is needed for this company to help minimize loss in the event of a server crash?

What type of connection point is a point of presence (POP)?

A network administrator has just inserted a new WIC2T controller into the first available slot of an 1841 router. The administrator needs to configure the first serial interface of this new controller. Which interface should be used?

A Cisco router needs to be configured from a remote location by the use of out-of-band management. Which method should be used?

Which two router parameters can be set from interface configuration mode? (Choose two.)

Which two items protect a corporate network against malicious attacks at the enterprise edge ? (Choose two.)

A network administrator must define specific business processes to implement if a catastrophic disaster prevents a company from performing daily business routines. Which portion of the network documentation is the administrator defining?

What information can an administrator learn using the show version command?

Which three items would be found in a NOC? (Choose three.)

When searching for information about authentication methods and usernames of company personnel, where can a network administrator look?

A network manager wants to have processes in place to ensure that network upgrades do not affect business operations. What will the network manager create for this purpose?

Which type of network map shows the location of hosts, network devices, and media?

0 Komentar Teman - Teman:

Posting Komentar

Kawan berilah sedikit komentar untuk memberi smangat kepada Admin, dan jika temen-temen mau copas posting sekiranya untuk mencantumkan sumber dari blog ini, contoh : Blog'e Cah TI Malem '08

Template by:

Free Blog Templates

SELAMAT DATANG DI .: BLOG'e CAH TI MALEM '08 :. | TEMPAT BERBAGI MATERI KUIAH dan SEDIKIT ILMU PENGETAHUAN | SMS TANPA MODAL MONGGO KE SMS GRATIEZ BROW | TAMPILAN TEMPLATE MAXIMAL DI MOZILLA FIREFOX 4.0 | TERIMA KASIH ATAS KUNJUNGAN TEMEN - TEMEN SEMUANYA | DO'Anya YA KAWAN SEMOGA SEKRIPSI KAMI LANCAR DAN DAPAT SELESAI DALAM SATU SEMESTER KEDEPAN