ccna modules 8-15

¡Supera tus tareas y exámenes ahora con Quizwiz!

given the IPv6 address prefix 2001:db8::48, what will be the last subnet that is created if the subnet that is created if the subnet prefix is changed to /52?

2001:db8:0:f000::/52

a client creates a packet to send to a server. the client is requesting FTP service. what number will be used as the destination port number in the sending packet?

21

a client creates a packet to send to the server. the client is requesting SSH service. what number will be used as the destination port number in the sending packet?

22

a client creates a packet to send to a server. the client is requesting SMTP service. what number will be used as the destination port number in the sending packet?

25

what is the complete range of TCP and UDP well-known parts?

0 to 1023

match the IPv6 address with the IPv6 address type. (not all options are used.)

ALL NODE MULTICAST 2001:DB8:BAF:3F57:FE94 LOOPBACK FF02::1 UNIQUE LOCAL ::1 GLOBAL UNICAST FF02::1:FAE:F85:F

Why is NAT not needed in IPv6?​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF

a user issues a ping FE80:65AB:DCC1::100 command and receives a response that includes a code of 3. what does this code represent?

address unreachable

Why does HTTP use TCP as the transport layer protocol?

because HTTP requires reliable delivery

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?

beyond the scope of the source address

which two characteristics are associated with UDP sessions? (choose two)

destination devices receive traffic with minimal delay received data is unacknowledged

a host is transmitting a unicast. which host or hosts will receive it?

one specific host

in what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?

peer-to-peer

What kind of port must be requested from IANA in order to be used with a specific application?

registered port

What source IP address does a router use by default when the traceroute command is issued?

the IP address of the outbound interface

what is a socket?

the combination of a source IP address and port number or a destination IP address and port number

which two fields are included in the TCP header but not in the UDP header? (choose two)

window sequence number

a user issues a ping 2001:DB8:FACE:39::10 command and receives a response that includes a code of 3. what does this code represent?

address unreachable

an IPv6 enabled device sends a data packet with the destination address of FF02::1. what is the target of this packet?

all IPv6 enabled devices on the local link or network

which two functions are primary functions of a router? (choose two)

packet forwarding path selection

a user issues a ping of FE80:65AB:DCC1::100 command and receives a response that includes a code of 4. what does this code represent?

port unreachable

a technician uses the ping 127.0.0.1 command. what is the technician testing?

the TCP/IP stack on a network host

a router boots and enters setup mode. what is the reason for this?

the configuration file is missing from NVRAM

which two types of applications are best suited for UDP? (choose two)

applications that handle reliability themselves applications that can tolerate some data loss, but require little or no delay

a user issues a ping 2001:DB8:FACE:39::10

beyond the scope of the source address

a user issues a ping 192.135.250.103 command and receives a response that includes a code of 1. what does this code represent?

host unreachable

what does a client do when it has UDP datagrams to send?

it just sends that datagrams

what are two services provided by the OSI network layer? (choose two)

routing packets toward the destination encapsulating PDUs from the transport layer

which IMCPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?

time exceeded

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

client/server

what is true about the Server Message Block protocol?

clients establish a long term connection to servers

How are port numbers used in the TCP/IP encapsulation process?

if multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

which protocol is used by a client to communicate securely with a web server?

HTTPS

what happens when the transport input ssh command is entered on the switch vty lines?

communication between the switch and remote users is encrypted

what property of ARP causes the request to be flooded out all ports of a switch except for the port receiving the ARP request?

the destination MAC address appears in the header of the ethernet frame

under which two circumstances will a switch flood a frame out of every port except for the frame it was received on? (choose two)

the frame has the broadcast address as the destination address. the destination address is unknown to the switch.

what will happen if the default gateway address is incorrectly configured on a host?

the host cannot communicate with hosts in other networks

what property of ARP causes reply only to the source sending an ARP request?

the source MAC address appears in the header of the ethernet frame.

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

2001:DB8::A0B0:8:1

packets with destination of 172.17.10.5

serial0/0/0

packets with a destination of 172.17.8.20

the packet is dropped

which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?

version

In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)

when a faster delivery mechanism is needed when applications do not need to guarantee delivery of the data

what is the prefix length notation for the subnet mask 255.255.255.224

/27

Which IPv4 address can a host use to ping the loopback interface?

127.0.0.1

match the subnetwork to a host address that would be included within the subnetwork. (not all options are used)

192.168.1.32/27 - 192.168.4.48 192.168.1.64/27 - 192.168.1.68 192.168.1.96/27 - 192.168.1.121

a company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. the company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. which two networks would achieve that? (choose two)

192.168.1.64/27 192.168.1.96/28

which three addresses are valid public addresses? (choose three)

198.133.219.17 128.107.12.117 64.104.78.227

Which is the compressed format of the IPv6 address 2002:0042::00C4:1008:0025:0190::0990?

2000:420:C4:1008:25:190::990

match the description with an appropriate IP address. (not all options are used)

A PRIVATE ADDRESS 172.19.20.5 A LOOPBACK ADDRESS 127.0.0.1 AN EXPERIMENTAL ADDRESS 240.2.6.255 A TEST-NET ADDRESS 192.0.2.123 A LINK-LOCAL ADDRESS 169.254.1.5

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

ACK

which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

ICMP

Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?

ICMPv6

which applications or services all hosts to act as client and server at the same time?

P2P applications

what is an advantage of SMB over FTP?

SMB clients can establish a long-term connection to the server.

Which three application layer protocols use TCP? (choose three)

SMPT HTTP FTP

which two protocols may devices use in the application process that sends email? (choose two)

SMTP DNS

a network administrator requires access to manage routers and switches locally and remotely. match the description to the access method. (not all options are used)

SSH remote access method that uses encryption CONSOLE remote access via a dial up connection AUX preferred out-of-band access method TELNET unsecure remote access

which transport layer feature is used to guarantee session establishment?

TCP 3-way handshake

which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?

TTL

what is a characteristic of UDP?

UDP reassembles the received datagrams in the order they were received.

a host is transmitting a mulitcast. which host or hosts will receive it?

a specifically defined group of hosts

a host is transmitting a multicast. which host or hosts will receive it?

a specifically defined group of hosts

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?

application

which OSI layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted?

application

what is a basic characteristic of the IP protocol?

connectionless

what is one advantage that the IPv6 simplified header offers over IPv4?

efficient packet handling

which term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header?

header checksum

which three fields are used in a UDP segment header? (choose three)

length source port checksum

which three commands are used to set up secure access to a router through a connection to the console interface? (choose three)

line console login password cisco

what are three responsibilities of the transport layer? (choose three)

meeting the reliability requirements of applications, if any multiplexing multiple communication streams from many users or applications on the same network identifying the applications and services on the client and server that should handle transmitted data

which of the two types of IPv6 messages are used in place of ARP for address resolutions?

neighbor solicitation neighbor advertisement

a user issues a ping 10.10.14.67 command and receives a response that includes the code of 0. what does this code represent?

network unreachable

What is a key characteristic of the peer-to-peer networking model?

resource sharing without a dedicated server

what information is used by TCP to reassemble and reorder received segments?

sequence numbers

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

session layer application layer presentation layer

a network technician issue the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. what is the result after this command is issued?

the ARP cache is cleared

which parameter does the router use to choose the path to the destination when there are multiple layers available?

the lower metric value that is associated with the destination network

how do hosts ensure that their packets are directed to the correct network destination?

they have to keep their own local routing table that contains a route to the loopback interface, a local network route and a remote default route.

A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?

when the value of the Hop Limit field reaches zero

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?

time-to-live

what is the aim of the ARP spoofing attack?

to associate IP addresses to the wrong MAC address

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

2001:0DB8::A0B0:8:1:0:1000

which is the compressed format of the IPv6 address 2001:0DB8:0000:0000:A0B0:0008:0001?

2001:DB8::AB:8:1

what is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64

2001:DB8:BC15:A

Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?

2002:42:10:C400::909

a client creates a packet to send to the server. the client is requesting telnet service. what number will be used as the destination port number in the sending packet?

23

which property of ARP causes cached IP-to-MAC mappings to remain in memory longer?

Entries in an ARP table are time-stamped and are purged after the timeout expires.

Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

FE80:9EA:0:2200::FE0:290

Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

FE80:9EA:0::2200::FE0:290

which IPv6 prefix is reserved for communication between devices on the same link?

FE80::/10

which address is a valid IPv6 link-local unicast address?

FE80::1:4545:6578:ABC1

which is the compressed format of the IPv6 address FE80:0000:0000:0220:0B3F:F0E0:0029

FE80::220:B3F:F0E0:29

a manufacturing company subscribes to certain hosted services from its ISP. the services that are required include hosted world wide web, file transfer, and e-mail. which protocols represent these three key applications? (choose three)

FTP HTTP SMTP

which three protocols operate at the application layer of the TCP/IP model? (choose three)

FTP POP3 DHCP

packets with a destination of 172.17.6.15

FastEthernet0/0

packets with a destination of 172.17.14.8

FastEthernet1/0

packets with destination of 172.17.12.10

FastEthernet1/1

what is a common protocol that is used with peer-to-peer applications such as WireShare, BearShare, and Shareza?

Gnutella

which application layer protocol uses message types such as GET, PUT, and POST?

HTTP

match the configuration mode with the command that is available in that mode. (not all options are used)

LOGIN R1(config-line)# COPY RUNNING-CONFIG START-UP CONFIG R1# ENABLE R1> INTERFACE FASTETHERNET 0/0 R1(config)#

what are two characteristics of peer-to-peer networks? (choose two)

decentralized resources resource sharing without a dedicated server

a user issues a ping 192.135.250.103 command a receives a response that includes a code of 1. what does this code represent?

host unreachable

what are two roles of the transport layer in data communication on a network? (choose two)

identifying the proper application for each communication stream tracking the individual communication between applications on the source and destination hosts

What do the client/server and peer-to-peer network models have in common?

both models support devices in server and client roles

a client application needs to terminate a TCP communication session with a server. place the termination process steps in the order that they will occur.

client sends FIN server sends ACK server sends FIN client sends ACK

Which field in the TCP header indicates the status of the three-way handshake process?

control bits

which factor determines TCP window size?

the amount of data the destination can process at one time

which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

the client randomly selects a source port number

Which three statements describe a DHCP Discover message? (Choose three.)

the destination IP address 255.255.255.255 the message comes from a client seeking an IP address. all hosts receive the message, but only DHCP server replies

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

10 segments

a client creates a packet to send to a server. the client is requesting POP3 service. what number will be used as the destination port number in the sending packet?

110

a client creates a packet to send to a server. the client is requesting SNMP service. what number will be used as the destination port number in the sending packet?

161

a site administrator has been told a particular network at the site must accommodate 126 hosts. which subnet mask would be used that contains the required number of host bits?

255.255.255.128

a client creates a packet to send to a server. the client is requesting HTTPS service. what number will be used as the destination address?

443

a PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and packet size of 1,500 bytes. which byte of information will the server acknowledge after it has received four packets of data from the PC?

6001

a network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?

65536

a client creates a packet to send to a server. the client is requesting TFTP service. what number will be used as the destination port number in the sending packet?

69

a client creates a packet to send to a server. the client is requesting HTTP service. what number will be used in the destination port number in the sending packet?

80

what property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table?

A static IP-to-MAC address entry can be entered manually into an ARP table.

which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?

DNS

match the command with the device mode at which the command is entered. (not all options are used)

LOGIN R1(config-line)# SERVICE PASSWORD-ENCRYPTION R1(config)# IP ADDRESS 192.168.4.4.255.255.255.0 R1(config-if)# COPY RUNNING-CONFIG STARTUP-CONFIG R1(config-line)# ENABLE R1>

match the phases to the functions during the boot up process of a cisco router. (not all options are used)

PHASE 1 perform the POST and load the bootstrap program PHASE 2 locate and load the startup configuration file PHASE 3 locate and load the startup configuration file

match the commands to the correct actions (not all options are used)

Router(config-line)# password class provides security on the console Router(config)# banner motd # displays a message when the router is accessed Router(config)#hostname CL 1 configures the name on the router

Which three statements characterize UDP? (Choose three.)

UDP provides basic connectionless transport layer functions UDP relies on application layer protocols for error detection UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms

Which scenario describes a function provided by the transport layer?

a student has two web browser windows open in order to access two delivered to correct web page is delivered to the correct browser window

what is an example of network communication that uses the client-server model?

a workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser

which information is used by routers to forward a data packet towards its destination?

destination IP address

what important information is examined in the Ethernet frame header by a layer 2 device in order to forward the data onward?

destination MAC address

what information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?

destination and source port numbers

which term describes a field in IPv4 packet header that contains an 8-bit binary value used to determine the priority of each packet?

differentiated services

what property of ARP allows hosts on a LAN to send traffic to remote networks?

local hosts learn in the MAC address of the default gateway.

a user issues a ping of 198.133.219.8 command and receives a response that includes a code of 0. what does this code represent?

network unreachable

what are two potential network problems that can result from ARP operation? (choose two)

on large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic

a user issues a ping 2001:DB8:3040:114::88 command and receives a response that includes a code of 4. what does this code represent?

port unreachable

which term describes a field in the IPv4 packet header used to identify the next level protocol?

protocol

the application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (choose three)

session presentation application

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

the packet will be sent directly to the destination host.

what property of ARP causes the NICs receiving an ARP request to pass the data portion of the ethernet frame to the ARP process?

the type field of 0x806 appears in the header of the ethernet frame

which statement describes the treatment of ARP requests on the local link?

they are received and processed by every device on the local network

what is the purpose of ICMP messages?

to provide feedback of IP packet transmissions

what is the function of the HTTP GET messages?

to request an HTML page from a web server

what three blocks of addresses are defined by RFC 1918 for private network use? (choose thress)

10.0.0.0/8 172.16.0.0/16 192.168.0.0/16

how many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

1022

what are three types of IPv6 addresses displayed when the route from PC1 to PC2 is traced? (choose three)

2001:DB8:1:1:1 2001:DB8:1:2::1 2001:DB8:1:3::2

which address prefix range is reserved for IPv4 multicast?

224.0.0.0-239.255.255.255

which subnet mask would be used if 5 host bits are available?

255.255.255.224

which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0057?

3FFE:1044:0:0:AB::57

a network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. how many equal-sized subnets are created?

4

how many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

62

what is the usable number of the host IP address on a network that has a /26 mask?

62

what are IPv4 address to layer 2 ethernet address mappings maintained on a host computer?

ARP cache

what statement describes the function of the address resolution protocol?

ARP is used to discover the MAC address of any host on the local network

three methods allow IPv6 and IPv4 to co-exist. Match the method with its description. (not all options are used)

DUAL STACK the IPv4 and IPv6 packets coexist in the same network TUNNELING the IPv6 packet is transported inside an IPv4 packet TRANSLATION IPv6 packets are converted into IPv4 packets and vice versa

which statement describes a feature of the IP protocol?

IP relies on upper layer services to handle situations of missing or out-of-order packets

a host is transmitting a broadcast. which host or hosts will receive it?

all hosts in the same subnet

which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?

anycast

a router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out to the Gigabit 0/1 interface. what will the router do next?

create a new layer 2 ethernet frame to be sent to the destination

a message is sent to all hosts on a remote network. which type of message is it?

directed broadcast

when transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?

flow label

what are two types of IPv6 unicast addresses? (choose two)

loopback link-local

which term describes a field in IPv4 packet header used to identify the next level protocol?

protocol

what routing table entry has a next hop address associated with a destination network?

remote routes

which term describes a field in the IPv4 packet header that contains a 32-bit binary value associated with an interface on the sending device?

source IPv4 address

what is used in EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?

the MAC address of the IPv6 enabled interface

what information does the loopback test provide?

the TCP/IP stack on the device is working correctly

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

the computer has an individual default gateway address

what is the affect of using the Router# copy running-config start-up config command on a router?

the contents of NVRAM will change

within a production network, what is the purposes of configuring a switch with a default gateway address?

the default gateway address is used to forward packets originating from the switch to remote networks.

what property of ARP forces all ethernet NICs to process an ARP request?

the destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the ethernet frame.

the global configuration in command ip default-gateway 172.16.100.1 is applied to a switch. what is the effect of this command?

the switch can be remotely managed from a host on another network

a high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. the videoconferencing is conducted between two end devices through the internet. the network administrator of school A configures the end device with the IP address 209.165.201.10. the administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. neither school is using a VPN. the administrator knows immediately that this IP will not work, why?

this is a private IP address

how many bits must be borrowed from the host portion of an addree to accommodate a router with five connected networks?

three

what are two functions of NVRAM? (choose two)

to retain contents when power is removed to store the startup configuration file


Conjuntos de estudio relacionados

Digital Forensics - Module 5 - Working with Windows and CLI Systems

View Set

Gynecologic Emergencies Ch.24 Hw

View Set

AIS-Ch.4: Relational Databases and Enterprises

View Set

High Performance Computing and Distributed Systems

View Set

La Division Celular - Notre 1er examen-7mo

View Set

MRU24.3: Video Activity: Moral Hazard

View Set

CNA 210 | Ch. 4, Advanced Cryptography and PKI

View Set

Animal Tissue and Animal Tissue Slides (BY124 Exam 1)

View Set