Show Posts in

CCNA 1 v7.0 Modules 11 – 13 Exam Answers

CCNA 1 v7.0 Modules 11 – 13: IP Addressing Exam Answers 2020 1. What is the prefix length notation for the subnet mask 255.255.255.224? /25 /26 /27* /28 2. How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask? 254 …

CCNA 1 v7.0 Modules 8 – 10 Exam Answers

CCNA 1 v7.0 Modules 8 – 10: Communicating Between Networks Exam Answers 2020 1. Which information is used by routers to forward a data packet toward its destination? source IP address destination IP address* source data-link address destination data-link address 2. A computer has to send a packet …

CCNA 1 v7.0 Modules 4 – 7 Exam Answers

CCNA 1 v7.0 Modules 4 – 7: Ethernet Concepts Exam Answers 2020 1. What is the purpose of the OSI physical layer? controlling access to media transmitting bits across the local media* performing error detection on received frames exchanging frames between nodes over physical network media 2. Why …

CCNA 1 v7.0 Modules 1 – 3 Exam answers

CCNA 1 v7.0 Modules 1 – 3: Basic Network Connectivity and Communications Exam Answers 2020 1. During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of …

CCNA Cyber OPS v1.1 Practice Final Exam Answers

1. What is the main purpose of cyberwarfare? to protect cloud-based data centers to gain advantage over adversaries* to develop advanced network devices to simulate possible war scenarios among nations 2. A technician has installed a third party utility that is used to manage a Windows 7 computer. …

CCNA Cyber OPS v1.1 Chapter 13 Exam Answers

CCNA Cyber OPS v1.1 Chapter 13 Exam Answers  1. In the NIST incident response process life cycle, which type of attack vector involves the use of brute force against devices, networks, or services? Media Impersonation Attrition * Loss or theft 2. Which NIST incident response life cycle phase …

CCNA Cyber OPS v1.1 Chapter 12 Exam Answers

1. Which two technologies are used in the ELSA tool? (Choose two.) MySQL * CapME Suricata Sphinx Search * Security Onion 2. What is the host-based intrusion detection tool that is integrated into Security Onion? OSSEC * Snort Sguil Wireshark 3. According to NIST, which step in the …

CCNA Cyber OPS v1.1 Chapter 11 Exam Answers

1. Which statement describes the tcpdump tool? It is a command line packet analyzer. * It is used to control multiple TCP-based applications. It accepts and analyzes data captured by Wireshark. It can be used to analyze network log data in order to describe and predict network behavior. …

CCNA Cyber OPS v1.1 Chapter 10 Exam Answers

1. Which HIDS is an open source product? Tripwire OSSEC * Cisco AMP AlienVault USM 2. In Windows Firewall, when is the Domain profile applied? When the host accesses the Internet When the host checks emails from an enterprise email server When the host is connected to a …

It-essentials v7.0 Chapter 14 Exam Answers

It-essentials v7.0 Chapter 14 Exam Answers 1. What is a common responsibility of a level one call center technician? entering a concise description of a customer problem into a ticketing system * remotely connecting to customer devices and implementing driver and software updates calling back customers and asking …