FINAL NETWORK EXAM QUIZES

¡Supera tus tareas y exámenes ahora con Quizwiz!

an experimental address

240.2.6.255

The last host address on the 10.15.25.0/24 network is ??

254

A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?

255.255.255.224

Which statement is true about Cisco IOS ping indicators?​

'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.

The last host address on the 10.15.25.0/24 network is ??

.254

What is the prefix length notation for the subnet mask 255.255.255.224?

/27

The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7 is

00000111

What are three responsibilities of the transport layer? (Choose three.)

1. meeting the reliability requirements of applications, if any 2. multiplexing multiple communication streams from many users or applications on the same network 3. identifying the applications and services on the client and server that should handle transmitted data

ANSWER???

10.18.10.208/28 10.18.10.224/28

A loopback address?

127.0.0.1

a link-local address

169.254.1.5

The network portion of the address 172.16.30.5/16 is ?

172.16

The network portion of the address 172.16.30.5/16 is?

172.16

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?

4

How many host addresses are available on the 192.168.10.128/26 network?

62

A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?

65536

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

Console and VTY ports

Which process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5?

DHCP?

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

DNS VoiP

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server default gateway

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

Why is DHCP preferred for use on large networks?

It is a more efficient way to manage IP addresses than static address assignment.

Which three fields are used in a UDP segment header? (Choose three.)

Length Source Port Checksum

Which element of scaling a network involves identifying the physical and logical topologies?

Network Documentation

Which protocol can be used to transfer messages from an email server to an email client?

POP3

hardware threats

Physical damage

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

Session App Presentaion

Which transport layer feature is used to guarantee session establishment?

TCP 3-way handshake

True or False? In FTP transactions, an FTP client uses the pull method to download files from an FTP server.

TRUEEE

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

The client randomly selects a source port number.

What is true about a client-server network?

The network includes a dedicated server

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

Tunneling

What is an advantage of UDP over TCP?

UDP communication requires less overhead.

What type of traffic would most likely have the highest priority through the network??

Voice

On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?

a home router

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

all IPv6 enabled devices on the local link​ or network

FF02::1

all node multicast

Which TCP/IP model layer is closest to the end user?

application

What type of applications are best suited for using UDP?

applications that are sensitive to delay

What does the IP address 192.168.1.15/29 represent?

broadcast address

Step 1

client send FIN

step 4

client sends ACK

step 3

server sends FIN

The IPv4 packets and IPv6 packets coexist in the same network.

dual-stack

How should traffic flow be captured in order to best understand traffic patterns in a network?

during peak utilization times

Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)

exhibit router s s s PC PC PC (10 hosts)

What is one of the most effective security tools available for protecting users from external threats?

firewalls

A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme?

geographic location device type

2001:DB8::BAF:3F57:FE94

global unicast

This part of the address is the equivalent to the host portion of an IPv4 address.

interface ID

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /displaydns

Which type of IPv6 address is not routable and used only for communication on a single subnet?

link-local address

::1

loopback

Which command is used to manually query a DNS server to resolve a specific host name?

nslookup

A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?

peer-to-peer (P2P)

maintenance threats

poorhandling

Network services use _______________ to define a set of rules that govern how devices communicate and the data formats used in a network.

protocol

What are two benefits of subnetting networks? (Choose two.)

reducing the size of broadcast domains grouping devices to improve management and security

Step 2

server send ACK

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

show file systems

FF02::1:FFAE:F85F

solicited node multicast

This part of the address is used by an organization to identify subnets.

subnet ID

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?

subnetwork 192.168.1.64 subnet mask 255.255.255.192

What does the value of the window size specify?

the amount of data that can be sent before an acknowledgment is required

What type of information is contained in a DNS MX record?

the domain name mapped to mail exchange servers

What is the purpose of using a source port number in a TCP communication?

to keep track of multiple conversations between devices

What is the purpose of the TCP sliding window?

to request that a source decrease the rate at which it transmits data

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to test that the host has the capability to reach hosts on other networks

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5

IPv6 packets are converted into IPv4 packets, and vice versa.

translation

What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence?

transport

The IPv6 packet is transported inside an IPv4 packet.

tunneling

electrical Threats

voltage spikes

Which two types of devices are typically assigned static IP addresses? (Choose two.)

web servers printers

Which number or set of numbers represents a socket?

192.168.1.1:80

a public address

198.133.219.2

Three devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.) Device 1: IP address 192.168.10.77/28 on subnet 1 Device 2: IP address192.168.10.17/30 on subnet 2 Device 3: IP address 192.168.10.35/29 on subnet 3

1NN = 192.168.10.64 BN = 192.168.10.79 2nn = 192.168.10.16 bn = 192.168.10.19 3nn = .32 bn = .39

What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?

2001:D12:AA04:B5::/64​

The shortest compressed format of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200 is ??

2001:DB8:0:1470::200

environmental threats

Extreme temp

This network portion of the address is assigned by the provider.

Global routing prefix

What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?

Gnutella

Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)

HTTP MPEG GIF

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

ICMP

In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?

SLACC

What is an advantage of SMB over FTP?

SMB clients can establish a long-term connection to the server.​


Conjuntos de estudio relacionados

AP Macroeconomics Remote Learning Week 5

View Set

Organizational Behavior Chapter 1 35-67

View Set

Algebraic and Verbal expressions

View Set

Chapter 40: Nursing Care of a Family when a Child has a Respiratory Disorder

View Set

Krueger, Explorations in Economics 1e, Module 46

View Set