Preview

Nt1310 Unit 1 Question Paper

Good Essays
Open Document
Open Document
4923 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 1 Question Paper
1. Refer to the exhibit. After entering the commands in the exhibit, the administrator receives a “password required, but none set” message when attempting to connect to S1. What is the problem?
The enable secret password was not set.
S1 does not have login configured on the vty lines.
S1 does not have a password configured for the vty lines.
The crypto key is not properly configured to generate passwords.
The VLAN1 interface has not be enabled with the no shutdown command.
2. Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting? user EXEC mode privileged EXEC mode global configuration mode interface configuration mode

3. Refer to the exhibit. Which
…show more content…
Company policy requires disabling the command history buffer on network devices. An administrator enters terminal no history sizeat the command prompt on a Cisco Catalyst switch and receives no error messages back, but the command history buffer is still available. What is the problem?
The command contained a syntax error.
The Cisco IOS version does not support disabling the command history buffer.
The command history can only be disabled on a router, not a switch.
The size parameter reset the default buffer size but did not disable access to the buffer. 40. Refer to the exhibit. What does “LEARNING” mean as it relates to the
Spanning Tree Protocol?
The switch is sending and receiving data frames.
The switch is not receiving BPDUs, but is sending and receiving data.
The switch is participating in the election process by forwarding the BPDUs it receives.
The switch is receiving BPDUs and populating the MAC address table, but not sending data.

41. Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message? only computer 4 computer 3 and RTR-A computer 4 and RTR-A

computer 1, computer 2, computer 4, and

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 9 Exam Paper

    • 486 Words
    • 2 Pages

    For QAM, each carrier is ASK modulated. The two independent signals are simultaneously transmitted and at the receiver, the two signals are demodulated, and the results combined to produce the original binary input.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1330 Unit 2 homework

    • 364 Words
    • 2 Pages

    Check the workstations using ipconfig /all and find out if the ip range is within the address range you assigned, if it is a different address then the workstation failed to contact the DHCP server and has gone into apipa mode. The Network Interface Card might be assigned an incorrect driver. Another possible cause of the problem is that the patch cable is not plugged into the Network Interface Card, or is not connected to a switch on the other end. However, it could be that the server has run out of IP addresses that it can assign to clients. You can easily tell if this is the problem by comparing the size of the DHCP address scope to the number of devices on your network that request IP addresses from the DHCP server. But since only some of the workstations have got addresses the problem might be the DHCP server. Start off by doing some ping tests to verify that the DHCP server is able to communicate across the network. If the DHCP server is able to communicate with other computers on the network, then I recommend verifying that the DHCP server has an IP address that is compatible with the scope that the server is configured to assign addresses from. The server itself has to be assigned a static address in the same subnet range, such as 192.168.0.199. If this still doesn’t solve the problem make sure that the DHCP server is still authorized by the Active Directory to lease IP addresses. You should also check to verify that the scope is active, and that the necessary services are running on the DHCP server.…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ones we have known about nodes in the network and links between them, then to analyze this network some SNA Measures are used. These measures are mathematical aggregation functions which calculates various aspects related to each node and also some of them can calculate some of the aspects with respect to the whole network .…

    • 596 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    What is the molecular geometry of the red carbon atom in the following compound,f[HCequiv {color{red}C }-CH_{3}f]…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    64. Yes p, because the elements are the same and they have the same number of…

    • 373 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 368 Words
    • 2 Pages

    The stakeholder involved in this decision is Anne Distagne, the CEO of Linkage Construction, Inc. She was the individual involved in the decision-making process. of falsifying information to not display the significant increase in profit.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Paper II - Section : II Embedded Systems INDEX No 1 2 3 4 5 6 7 8 9 10 Toggle Port LED Simulate Binary Counter at Port Generate delay using TIMER_0 Stepper Motor (clockwise/Anticlockwise) Generating square wave at port pin Generating Triangular wave at port pin Sine wave generation using look-up table Microcontrollers communicating over a serial link Read switch-status from i/p port and display at o/p port Using Input Capture Pin (ICP), measure pulse width & display at o/p port Topic Date 6-9-2010 9-9-2010 17-9-2010 24-9-2010 8-10-2010 15-10-2010 15-10-2010 29-10-2010 22-11-2010 24-11-2010 Page 02 03 04 06 07 09 10 11 13 15 Sign…

    • 742 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This section only evaluates your entry of config commands that relate to actual device configuration.…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (i) No, in a datagram network the routing table cannot contain two same destination addresses, since all of the destination addresses are distinct (unique) in a datagram based network i.e. it’s impossible to have duplicates in a routing table because of the distinctiveness…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4 Paper

    • 567 Words
    • 3 Pages

    Emails provide stability to the organizations. Emails are the backbone that forms the base for the organization structure. Organization has different department for a different purpose. In order to communicate with the environment. Organizations use MS Outlook for maintaining a healthy communication environment in different departments. Every user mailbox data is stored in on exchange server in the form of edb files. In the presence of certain conditions EDB files of MS Outlook get corrupt and are not accessible.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 381 Words
    • 2 Pages

    1. Create an insert function that will take nodes and add them up in the binary tree.…

    • 381 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It is major to see that private broadband speed ask for has an immensely fluctuating character. Families move stunningly in their centrality of usage, the kind of occupations they use their relationship for and the measure of progress these applications make. In this consider, we address this respectable mix by constraining between different groupings of customers, and our general outcomes are midpoints over these outlines. While the advance of the intensity for exchange speed is related to that of download speeds, their improvements are not by any associate of the creative vitality poorly characterized. Despite phenomenal things, download speeds are from time to time more desperate to customers as they are dependably holding up to use substance or use an application, while they are normally less squashed while exchanging data.…

    • 626 Words
    • 3 Pages
    Good Essays

Related Topics