Advanced Networking Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the broadcast address for IP address 172.16.0.0 /16 ?

172.16.255.255

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

62

Which domain name would be an example of a top level domain?

.com

What is the CIDR (/) notation for the subnet mask 255.255.255.192 ?

/26

In which scenario would the use of a WISP be recommended?

A farm in a rural area without wired broadband access

What is a WAN?

A network infrastructure that provides access to other networks over a large geographic area

Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

Audio conference, financial transaction, webpage

Which message delivery option is used when all devices need to receive the same message simultaneously?

Broadcast

What method is used to manage contention-based access on a wireless network?

CSMA/CA

What are two benefits of using a layered network model?

It assists in protocol design It prevents technology in one layer from affecting other layers

An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination?

The transmission continues without the missing portion

What is the CIDR (/) notation for the subnet mask 255.192.0.0 ? Please include the / in your answer.

/10

Given the IP address 192.168.55.73 and subnet mask 255.255.255.192 what is the first valid IP address on this network?

192.168.55.65

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​

All IPv6 configured routers on the local link

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

Client/server

If a device receives an Ethernet frame of 60 bytes, what will it do?

Drop the frame

What layer is responsible for routing messages through an internetwork in the TCP/IP model?

Internet (or Network for OSI model)

Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack?

Session and presentation

The component of the operating software that provides the user interface is called the ____________

Shell

During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network

The physical address is added

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption

What is the CIDR (/) notation for the subnet mask 255.255.255.0 ?

/24

What is the CIDR (/) notation for the subnet mask 255.255.255.192?

/26

What is the CIDR / notation (prefix length) for a subnet mask that is given as 255.255.255.240 ?

/28

What is the CIDR (/) notation for the subnet mask 255.255.255.252 ? Please include the / in your answer.

/30

What are the three ranges of IP addresses that are reserved for internal private use?

192.168.0.0 /16 10.0.0.0 /8 172.16.0.0 /12

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that?

192.168.1.64/27 and 192.168.1.96/28

What is the last valid IP address for the network 192.168.10.0/27

192.168.10.30

What is the subnet mask for an IP address with a CIDR prefix of /16?

255.255.0.0

What is the network mask (subnet mask) for an IP address that has a CIDR prefix of /18 ?

255.255.192.0

What is the network mask (subnet mask) for an IP address that has a CIDR prefix of /22

255.255.252.0

A site administrator has been told that a particular network at the site must accommodate 126 hosts. Which subnet mask would be used that contains the required number of host bits?

255.255.255.128

What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?

255.255.255.192

What is the network mask (subnet mask) for an IP address that has a CIDR prefix of /27 ?

255.255.255.224

What is the network mask (subnet mask) for an IP address that has a CIDR prefix of /28 ?

255.255.255.240

Which two factors influence the method that is used for media access control?

How the connection between nodes appears to the data link layer How nodes share the media

Which two protocols function at the internet layer?

IP ICMP

Converting 00110011 to decimal results in what decimal number?

51

Which two statements are true regarding the user EXEC mode?

A. Only some aspects of the router configuration can be viewed. B. The device prompt for this mode ends with the ">" symbol.

Match each type of frame field to its function (Addressing, Error Detection, Type, Frame Start)

Addressing - This field helps to direct the frame toward its destination. Error Detection - This field checks if the frame has been damaged during the transfer. Type - This field is used by the LLC to identify the Layer 3 protocol. Frame Start - This field identifies the beginning of a frame.

What will be the result of failed login attempts if the following command is entered into a router? login block-for 150 attempts 4 within 90

All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds.

Which connection provides a secure CLI session with encryption to a Cisco switch?

An SSH connection

Where are Cisco IOS debug output messages sent by default?

Console line

A wireless host needs to request a IP address. What protocol would be used to process the request

DHCP

What is an advantage to using a protocol that is defined by an open standard?

It encourages competition and promotes choices

Which statement describes a characteristic of the traceroute utility?

It identifies the routers in the path from a source host to a destination host.

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

What is done to an IP packet before it is transmitted over the physical medium?

It is encapsulated in a layer 2 frame

What are two characteristics of fiber-optic cable?

It is more expensive than UTP cabling It is not affected by EFI or RFI

What is a characteristic of the LLC sublayer?

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

What are the two sublayers of the OSI model data link layer?

LLC/MAC

At a minimum, which address is required on IPv6-enabled interfaces?

Link local

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

Local router

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

Mesh

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network?

Message encoding, message size and delivery options

Match the description with the media (STP, Wireless, Optical Fiber, Coaxial)

STP - This type of copper media is used in industrial or similar environments where there is a lot of interference. Wireless - This type of media provides the most mobility options. Optical Fiber - This type of media is used for high transmission speed and can also transfer data over long distances. Coaxial - Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.

What PDU is associated with the transport layer?

Segment

Which name is assigned to the transport layer PDU?

Segment

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

Stateful Packet Inspection

A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?

The command is being entered from the wrong mode of operation

What is the purpose of the OSI physical layer?

Transmitting bits across the local media

What is the network address of the host identified with IP address of 172.25.67.99 /23 in binary?

10101100.00011001.01000010.01100011

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

Application

If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?

Data Link

At which layer of the OSI model would a physical address be encapsulated?

Data Link Layer

What are three primary functions provided by layer 2 data encapsulation

Data link layer addressing Detection of errors through CRC calculations Delimiting groups of bits into frames

Which two automatic addressing assignments are supported by DHCP?

Default gateway address Subnet mask

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

Destination MAC address

What is the objective of a network reconnaissance attack?

Discovery and mapping of systems

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?

Displaying a list of all available commands within the current mode Determining which option, keyword, or argument is available for the entered command

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?

Extended Star

Which switching method has the lowest level of latency?

Fast forward

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

Fault tolerance

Match the requirements of a reliable network with the supporting network architecture

Fault tolerance: Provide redundant links and devices Scalability: Expand the network without degrading service for existing users Security: Protect the network from unauthorized access

Which method of data transfer allows information to be sent and received at the same time?

Full Duplex

What unique address is embedded in an Ethernet NIC and used for communication on an Ethernet network?

MAC address

Which example of malicious code would be classified as a Trojan horse?

Malware that was written to look like a video game

The MAC address of a PC does not change when the PC is moved to a different network because the MAC address is embedded in the ______________ of the PC

Network Interface Card (NIC)

What is the benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel or software

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?

Nothing can be determined for sure at this point

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

Physical layer

Which two statements correctly describe a router memory type and its contents? (Choose two.)

RAM is volatile and stores the IP routing table ROM is nonvolatile and contains basic diagnostic software

What is a key characteristic of the peer-to-peer networking model?

Resource sharing without a dedicated server

What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?

The computer receives an IP address that starts with 169.254

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

The data flow is being tracked based on the source port number utilized by each application.

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on?

The frame has the broadcast address as the destination address The destination address is unknown to the switch

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

When looking at a client /server network topology with two routers and two switches between the PC and server, with throughput speed listed on the lines between each of these devices, which speed will be the maximum amount of throughput between the PC and server?

The lowest listed throughput value (PAY ATTENTION TO UNITS: kb/s vs. mb/s)

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

The new configuration will be loaded if the switch is restarted

What are two characteristics of Ethernet MAC addresses?

They are globally unique They are expressed as 12 hexadecimal digits

Which statement describes a characteristic of the frame header fields of the data link layer?

They vary depending on protocols

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command prevents someone from viewing the running configuration passwords

Given the IP address 208.17.255.1 what statement would be true?

This is a class C address

Given the IP address 172.16.134.64 and subnet mask of 255.255.255.224, which of the following would describe this address?

This is a network address

What are two functions of NVRAM?

To store the startup configuration file To retain contents when the power is removed

An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again?

Use DHCP to automatically assign addresses

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines?

the hostname should be fewer than 64 characters in length the hostname should contain no spaces the hostname should begin with a letter


Conjuntos de estudio relacionados

Health Insurance - Chapter 7: Health Insurance Underwriting

View Set

VNSG 1323: Chapter 24 Prep U Questions

View Set

Manhattan Advanced 500 with Mnemonic

View Set

CCNA 2 v7 Modules 7 - 9: Available and Reliable Networks

View Set

CRAVEN PrepU: Ch. 19 Infection Control

View Set

Spreadsheets and Concept Application: Lecture 14- Goal Seek, Solver and Regression

View Set