Annex A Final Study Guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

What would be an example of a top-level domain?

.com

What is the dotted decimal representation of the IPv4 address which is represented in binary string of 00001010.01100100.00010101.00000001?

10.100.21.1

What IPv4 address is a loopback address that can be pinged to test the local TCP/IP configuration?

127.0.10.0

What is the dotted decimal representation of the IPv4 address 11001011.10101001.01110001.11010011?

203.169.113.211

If you must provide for 126 hosts. Which subnet mask would be used?

255.255.255.128

What scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

What method is used to manage contention-based access on a wireless network?

CSMA/CA

What data link layer media access control method does Ethernet use?

CSMA/CD

What protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?

HTTP

Describe port numbers?

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

What are characteristics of fiber-optic cable?

It is more expensive than UTP cabling is. It is not affected by EMI or RFI.

What is a characteristic of the LLC sublayer?

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

It will discard the frame.

What are the benefits of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

Networks change the way we do what?

Networks change the way we learn, collaborate, work, and play

What type of attack involves the unauthorized discovery and mapping of network systems and services?

Reconnaissance

What are characteristics of multicast transmission?

Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255. Multicast transmission can be used by routers to exchange routing information. A single packet can be sent to a group of hosts.

What utility is available on a Windows PC to view current running applications and processes?

Task manager

A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?

The address is returned to the pool for reuse when the lease expires.

Describe variable-length subnet masking?

The size of each subnet may be different, depending on requirements.

Data is being sent from a source PC to a destination server. What correctly describe the function of TCP or UDP?

UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. The source port field identifies the running application or service that will handle data returning to the PC.

A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What types of network services is the network administrator trying to accommodate?

Voice and Video

What is a characteristic of a fault tolerant network?

a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure

What category of address is 224.10.0.254/24?

blank

What category of address is 10.0.0.159/27?

broadcast

What category of address is 192.168.1.191/26?

broadcast

What are the characteristic of UTP cabling?

cancellation

What tasks are functions of the presentation layer?

compression encryption

What aspect should be considered when choosing devices in the design of a small network?

cost of devices

What are the functions of the data link layer?

delimiting groups of bits into frames data link layer addressing detection of errors through CRC calculations

What addresses are mapped by ARP?

destination MAC address to a destination IPv4 address

What category of address is 192.168.100.161/25?

host

What category of address is 203.0.113.100/24?

host

What security solutions are most likely to only be used in a corporate environment?

intrusion prevention systems, virtual private networks

What command would help lessen brute-force password attacks against the router?

login block-for 60 attempts 5 within 60

What are examples of malicious code that could be classified as a Trojan horse?

malware that was written to look like a video game

What category of address is 10.10.10.128/25?

network

What category of address is 172.110.12.64/28?

network

When the growth of a small network is being planned, which design element will include the physical and logical topology of the network?

network documentation

A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

nslookup

What topology provides high availability and connects some, but not all, remote sites?

partial mesh

In what type of network do devices operate as both clients and servers?

peer to peer

In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?

peer-to-peer

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

physical layer

What tool can be implemented in a small network to help minimize network latency for real-time streaming applications?

protocol analyzer

What type of attack may involve the use of tools such as nslookup and fping?

reconnaissance attack

What is a key characteristic of the peer-to-peer networking model?

resource sharing without a dedicated server

What are two characteristics of peer-to-peer networks? (Choose two.)

resource sharing without a dedicated server decentralized resources

What services are provided by the OSI network layer?

routing packets toward the destination Encapsulating PDUs from the transport layer

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. What network characteristics has been violated in this situation?

security

What items are contained in an Ethernet header and trailer?

source MAC address error-checking information destination MAC address

What type of physical topology can be created by connecting all Ethernet cables to a central device?

star

What is stored in the NVRAM of a Cisco router?

startup config

What frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

store-and-forward switching

You notice that the network throughput appears lower than the bandwidth expected. Which factors could influence the differences in throughput?

the amount of traffic that is currently passing through the network the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing

A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?

the destination port number

What things can be determined when given an IP address and subnet mask of an attached network device?

the last host address on a network the network address of a specific network

What are ways that TCP uses the sequence numbers in a segment?

to identify missing segments at the destination to reassemble the segments at the remote location

What are functions of NVRAM?

to retain contents when power is removed to store the startup configuration file

You would like to determine the path a packet takes to reach the destination 192.168.1.1. What is the best command to determine the network path?

tracert 192.168.1.1

What applications or services allow hosts to act as client and server at the same time?

uTorrent, Bittorrent, etc.


Conjuntos de estudio relacionados

PSYC 101 Chapter 13 Learning Curve, Lewis, Chico State

View Set

Inside Earth, Chapter 1, Sections 4 & 5: Seafloor Spreading and Plate Tectonics

View Set

CATA HOSA Introduction to forensic pathology

View Set

Chap. 7 & 8 - Financing Programs & Government Loans

View Set

Chapter 18: Logging and Time Services

View Set

English quiz: Logical fallacy Verbal irony Situational irony Dramatic irony

View Set

Nursing Management of Labor and Birth at Risk OB

View Set

Lilly Chapter 16: Congenital Heart Disease

View Set

Chapter 9 The Time Value of Money

View Set