CNT 101 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

(250.2.6.255) Where does this IP Address go?

An Experimental address

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

Cut-Through

What does the term "attenuation" mean in data communication?

Loss of signal strength as distance increases

What three requirements are defined by the protocols used in network communications to allow message transmission across a network?

Message Size, Message Encoding, and Delivery Options

If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the ethernet frame header attached by PC1?

Nothing, because the route to the destination network

Which three layers of the OSI model map to the application layer of the TCP/IP model?

Presentation, Application, and session

(172.18.45.9) Where does this IP address go?

Public address

The IP address of which interface should be used as the default gateway setting of HOST H1.

R1 G0/0

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent Tights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption?

RFI & EMI

(169.254.1.5) Where does this IP Address go?

A link-local address

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Time-to-live

A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?

TFTP

An administrator is trying to configure the switch but receives that's displayed. What's the problem?

The administrator must enter privileged EXEC mode before issuing the command

A technician with a PC is using multiple applications while connected to the internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

The data flow is being tracked based on the source port number that is used by each application.

What are the two functions performed at the MAC subslayer of the OSI Data Layer Link to facilitate Ethernet Communication?

1. Applies delimiting of ethernet frame fields to synchronize communication between nodes 2. Adds Ethernet control information to network protocol data.

What's part of layer 2

1. Destination Mac Address 2. 802.12 header 3. Frame Check Sequence

What are the characteristics for Cut-through?

1. Has tow latency 2. May forward runt frames 3. Begins Forwarding when the destination address is received

What's part of layer 4

1. TTL 2. Destination options

A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?

255.255.255.128

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?

Authorization

What command can be used on a Windows PC to see the IP configuration of that computer?

ip config

What Protocols are part of TCP?

1. DHCP 2.FTP 3. HTTP 4. SMTP

What's part of layer 3

1. Source IP address 2. Acknowledgement numbers

A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices: Subnetwork A: IP phones -'10 addresses Subnetwork B: PCs 8 addresses Subnetwork C: Printers 2 addresses What single subnet mask would be appropriate to use for the three subnetworks?

255 255 255.240

A network administrator is adding a new LAN to a branch office. The new LAN must support 25 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.224

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access?

A DNS Server & a default gateway

What service is provided by HTTP?

A basic set of rules for exchanging text, graphic images sound, Video. and other multimedia files on the web.

(127.0.0.1) Where does this IP Address go to?

A loopback Address

Which scenario describes a function provided by the transport layer?

A student has two web browsers windows open in order to access websites. The transport layer ensures the correct web page s delivered to the correct browser

A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?

Access

What is an advantage to using a protocol that is defined by an open standard?

An open standard protocol is not controlled or regulated by standards organizations

What happens when the transport input SSH command is entered on the switch vty lines?

Communication between the switch & remote users is encrypted

During the process of forwarding traffic, what will the router do immediately after the destination IP address to a network on a directly connected routing table entry?

Discard the traffic after consulting the route table

Which range of link-local addresses can be assigned to an IPv6-enabled interface?

FE80::/10

What mechanism is used by a router to prevent a received iPv4 packet from traveling endlessly on a network?

It decrements the value of the TTL field by I and if the result is 0. It discards the packet and sends a Time Exceeded message to the source host.

What Protocol is part of UDP?

TFTP

Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?

Worm

Which wireless technology has low-power and data rate requirements making it popular in-home automation applications?

Zigbee

What characteristic describes antispyware?

applications that protect end device from becoming Infected with malicious software

What method is used to manage contention-based access on a wireless network?

CSMA/CA

What is a function of the data link layer?

provides the formatting of data

What's Message encoding

the process of converting information from one format into another acceptable for transmission

What is one main characteristic of the data link layer?

It Shields the upper layer protocol from being aware of the physical medium to be used the communication

A client is using SLAAC to obtain an iPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?

It must send an iCMPv6 Router Solicitation message to determine what default gateway It should use.

Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?

Layer 2 destination address 00-00-0c-94-36-cd Layer 2 source address = 00-00-0c-94-36-bb Layer 3 destination address = 172.16.20.99 Layer 3 source address = 172.16.10.200

A new network administrator has been asked to enter a banner message on a cisco device. What's the fastest way administrator could test whether the banner is properly configured?

Exit privileged EXEC mode & press enter

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario?

Fault Tolerance, Integrity, & Scalability

Which two protocols operate at the top layer of the TCP/IP protocol suite?

IP & TCP

The switches are in their default configuration. A Host needs to communicate with Host D, but host A doesn't the MAC address for its default gateway. Which Host will receive the ARP Request sent by Host A.

Only Host B, C, & Router 1

What will happen if the default gateway address is incorrectly configured on a host?

The Host cannot communicate with hosts in other networks.

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?

The IPv6 enabled router Interfaces begin sending CCMPv6 Router Advertisement messages

What's message sizing

The process of breaking up a long message into individual pieces before being sent over network

What's message encapsulation

The process of placing one message format inside another message format

The switches are in their default configuration. Which two network addresses can be assigned to the network containing to hosts? NOTE: stay within the 10.18.10.0/24 range of addresses.

1. 10.18.10 200/27 2. 10.18.10 200/28

What are the characteristics of store and forward?

1. Always stores the entire frame 2. Checks the CRC before forwarding 3. Checks frame length before forwarding

What are two features of ARP?

1. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply. 2. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination. generates an ARP broadcast.

What are the two characteristics of IP

1. It operates independently of the network media 2. It does not require a dedicated end-to-end connection

What two pieces of information are displayed in the output of the show ip brief command?

1. Layer 1 statuses 2. IP address

What are the two common causes of signal degradation when using UTP cabling?

1. Low-quality cable or connectors 2. Improper termination

Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer?

1. Perform the capture on different network segments 2. Capture traffic during peak utilization times to get a good representation of the different traffic types

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network?

1. Security 2. Coverage Area 3. Interference

On the basis of the output, which statements about network connectivity are correct?

1. There is a connectivity between this device and the device at 192.168.100.1 2. The average transmission time between the two hosts is 2 milliseconds

What are the two most effective ways to defend against malware?

1. Update the operating system and other application software 2. Install and Update anti-virus software

A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information?

1. nslookup 2. arp -a 3. ipconfig

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/126

What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?

2001: DA48:FC5: A4/64

Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important five audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

Audio Conference, financial transactions, Web page

Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?

DNS


Conjuntos de estudio relacionados

과목 3 수렵도구의 사용법 / 1종: 평가영역 2 수렵용 총기(엽총,공기총)의 특성

View Set

Homework CH00: The Nature of Science

View Set

(Nutrition) Ch.18 & 19 ~ Review Questions

View Set

FINAL MARK 3336 - Mid term 1 & 2

View Set

Constitutional History and Law: Exam 2

View Set

artificial intelligence chapter 2

View Set

Lesson 1: Comparing and Contrasting Different Types of Social Engineering Techniques

View Set