Cisco Exam 1- 3 of 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached? -cut-through -store-and-forward -fast-forward -fragment-free

store-and-forward

Which switching method drops frames that fail the FCS check? -store-and-forward switching -borderless switching -ingress port buffering -cut-through switching

store-and-forward switching

What service is provided by FTP? -A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web. -An application that allows real-time chatting among remote users. -Allows for data transfers between a client and a file server. -Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.

Allows for data transfers between a client and a file server.

What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) error detection frame delimiting accessing the media data encapsulation logical addressing

accessing the media data encapsulation

What method is used to manage contention-based access on a wireless network? token passing CSMA/CA priority ordering CSMA/CD

CSMA/CA

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.) DNS server source port number HTTP server source MAC address default gateway

DNS server default gateway

Which range of link-local addresses can be assigned to an IPv6-enabled interface? FEC0::/10 FDEE::/7 FE80::/10 FF00::/8

FE80::/10

A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting? FTP LDAP SLP SNMP

FTP

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.) -NAT adds authentication capability to IPv4. -NAT introduces problems for some applications that require end-to-end connectivity. -NAT will impact negatively on switch performance. -NAT provides a solution to slow down the IPv4 address depletion. -NAT improves packet handling. -NAT causes routing tables to include more information.

NAT introduces problems for some applications that require end-to-end connectivity. NAT provides a solution to slow down the IPv4 address depletion.

What characteristic describes adware? -a network device that filters access and traffic coming into a network -software that is installed on a user device and collects information about the user -the use of stolen credentials to access private data -an attack that slows or crashes a device or network service

software that is installed on a user device and collects information about the user

What technique is used with UTP cable to help protect against signal interference from crosstalk? -wrapping a foil shield around the wire pairs -twisting the wires together into pairs -terminating the cable with special grounded connectors -encasing the cables within a flexible plastic sheath

twisting the wires together into pairs

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.) -The Source Address field name from IPv4 is kept in IPv6. -The Version field from IPv4 is not kept in IPv6. -The Destination Address field is new in IPv6. -The Header Checksum field name from IPv4 is kept in IPv6. -The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

-The Source Address field name from IPv4 is kept in IPv6. -The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.) -Two physical interfaces have been configured. -The switch can be remotely managed. -One device is attached to a physical interface. -Passwords have been configured on the switch. -Two devices are attached to the switch. -The default SVI has been configured.

-The switch can be remotely managed. -One device is attached to a physical interface -The default SVI has been configured

What are two characteristics shared by TCP and UDP? (Choose two.) -default window size -connectionless communication -port numbering -3-way handshake -ability to to carry digitized voice -use of checksum

-port numbering -use of checksum

What characteristic describes identity theft? -the use of stolen credentials to access private data -software on a router that filters traffic based on IP addresses or applications -software that identifies fast-spreading threats -a tunneling protocol that provides remote users with secure access into the network of an organization

-the use of stolen credentials to access private data

What is the purpose of the TCP sliding window? -to ensure that segments arrive in order at the destination -to end communication when data transmission is complete -to inform a source to retransmit data from a specific point forward -to request that a source decrease the rate at which it transmits data

-to request that a source decrease the rate at which it transmits data

Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.) 10.18.10.200/28 10.18.10.208/28 10.18.10.240/27 10.18.10.200/27 10.18.10.224/27 10.18.10.224/28

10.18.10.208/28 10.18.10.224/28

What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process? -0C6F:65FF:FEC2:BDF8 -1E6F:65FF:FEC2:BDF8 -C16F:65FF:FEC2:BDF8 -106F:65FF:FEC2:BDF8

1E6F:65FF:FEC2:BDF8 Explanation: To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three steps are taken. Change the seventh bit of the MAC address from a binary 0 to a binary 1 which changes the hex C, into a hex E. Insert hex digits FFFE into the middle of the address. Rewrite the address in IPv6 format. The three steps, when complete, give the interface ID of 1E6F:65FF:FEC2:BDF8.

What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64? 2001:DA48::/64 2001:DA48:FC5::A4:/64 2001:DA48:FC5:A4::/64 2001::/64

2001:DA48:FC5:A4::/64

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.240 255.255.255.0 255.255.255.248 255.255.255.224

255.255.255.0

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addresses PCs - 20 addresses needed Printers - 2 addresses needed Scanners - 2 addresses needed The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks? 255.255.255.192 255.255.255.252 255.255.255.240 255.255.255.248 255.255.255.0 255.255.255.224

255.255.255.224

A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.192 255.255.255.248 255.255.255.224 255.255.255.240

255.255.255.240

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured? -Enter CTRL-Z at the privileged mode prompt. -Exit global configuration mode. -Power cycle the device. -Reboot the device. -Exit privileged EXEC mode and press Enter .

Exit privileged EXEC mode and press Enter

A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting? IMAP FTP SSH Telnet

IMAP

The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet? IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76 IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33 IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33 IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46

IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33

How does the service password-encryption command enhance password security on Cisco routers and switches? -It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet. -It encrypts passwords that are stored in router or switch configuration files. -It requires that a user type encrypted passwords to gain console access to a router or switch. -It encrypts passwords as they are sent across the network.

It encrypts passwords that are stored in router or switch configuration files.

What service is provided by BOOTP? -Uses encryption to secure the exchange of text, graphic images, sound, and video on the web. -Allows for data transfers between a client and a file server. -Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network. -A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.

Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.

What attribute of a NIC would place it at the data link layer of the OSI model? -attached Ethernet cable -IP address -MAC address -RJ-45 port -TCP/IP protocol stack

MAC address

PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next? -PC2 will send an ARP reply with its MAC address. -SW1 will send an ARP reply with the SW1 Fa0/1 MAC address. -SW1 will send an ARP reply with the PC2 MAC address. -PC2 will send an ARP reply with the PC2 MAC address. -RT1 will send an ARP reply with the RT1 Fa0/0 MAC address. -RT1 will send an ARP reply with the PC2 MAC address.

PC2 will send an ARP reply with its MAC address. PC2 will send an ARP reply with the PC2 MAC address.

What is wrong with the displayed termination? The woven copper braid should not have been removed. The wrong type of connector is being used. The untwisted length of each wire is too long. The wires are too thick for the connector that is used.

The untwisted length of each wire is too long

What are three commonly followed standards for constructing and installing cabling? (Choose three.) cost per meter (foot) cable lengths connector color pinouts connector types tensile strength of plastic insulator

cable lengths pinouts connector types

The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A? only host D only router R1 only hosts A, B, and C only hosts A, B, C, and D only hosts B and C only hosts B, C, and router R1

only hosts B, C, and router R1

What is a function of the data link layer? provides the formatting of data provides end-to-end delivery of data between hosts provides delivery of data between two applications provides for the exchange of frames over a common local media

provides for the exchange of frames over a common local media

What characteristic describes spyware? -a network device that filters access and traffic coming into a network -software that is installed on a user device and collects information about the user -an attack that slows or crashes a device or network service -the use of stolen credentials to access private data

software that is installed on a user device and collects information about the user

Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior? -syslog records and messages -the network performance baseline -debug output and packet captures -network configuration files

the network performance baseline


Conjuntos de estudio relacionados

Engel v Vitale and Comparison Cases AP Gov

View Set

Chapter 29 Face and Neck Injuries

View Set

CMIS 342 Chapter 5 Quiz and Vocab

View Set

Chapter 4 : Equilibrium - How Supply and Demand Determine Prices

View Set

Anatomy and Physiology 2: Chapter 20: Cardiovascular System: Vessels and Circulation

View Set

Provided Quizzing: Chapter 14: Missouri State Laws

View Set

Acute Coronary Syndrome: Unstable Angina, NSTEMI, and STEMI

View Set