Introduction to Network Fundamentals FINAL EXAM

¡Supera tus tareas y exámenes ahora con Quizwiz!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption

What is the recommended prefix length for most IPv6 subnets?

/64

Which subnet mask would be used if 5 host bits are available?

255.255.255.224

Which subnet mask would be used if exactly 4 host bits are available?

255.255.255.240

How many usable IP addresses are available on the 192.168.1.0/27 network?

30

Given a /32 Global Routing Prefix and a /64 prefix, how many bits would be allocated for the Subnet ID?

32

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?

4

Which statement describes a characteristic of a converged network?

A single network that delivers voice, video, and data to a variety of devices.

How does BYOD change the way in which businesses implement networks?​

BYOD provides flexibility in where and how users can access network resources.

Which media uses patterns of light to represent bits?

Fiber Optic

Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery?

ICMPv4 and ICMPv6

Which two statements are correct about an IPv4 address? (Choose two.)

It contains a network portion and It contains a host portion

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

What type of IPv6 address begins with fe80?

LAA

Which dynamic addressing method for GUAs is the one where devices rely solely on the contents of the RA message for their addressing information?

Method 1: SLAAC

Which dynamic addressing method for GUAs is the one where devices rely solely on a DHCPv6 server for their addressing information?

Method 2:SLAAC and Stateless DHCPV6

Which of the following fiber-optic cable types can help data travel approximately 1.24 miles or 2 km/2000m?

Multimode

Which of the following fiber-optic cable types use light emitting diodes (LEDs) as a data light source transmitter?

Multimode

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?

RIRs

Which command is used to encrypt all passwords in a router configuration file?

Router_A (config) # service password-encryption

Which two situations are the result of excessive broadcast traffic? (Choose two)

Slow network operations and Slow device operations

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

Spyware

What is the purpose of the sequencing function in network communication?

To uniquely label transmitted segments of data for proper reassembly by the receiver

UDP and TCP belong to which layer of the TCP/IP protocol?

Transport

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface, console interface, privileged EXEC mode

Which three devices are considered end devices in a network? (Choose three.)

VoIP phone, security camera, TelePresence endpoint

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access

What is a WAN?

a network infrastructure that provides access to other networks over a large geographic area

IP is inherently unreliable because packet delivery is not guaranteed.

best effort

There is no connection with the destination established before sending data packets.

connectionless

Determines the priority of each packet

differentiated services

Which of the following techniques use native IPv6 connectivity?

dual stack

Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?

enable secret trustknow1

What is the name of the process of adding protocol information to data as it moves down the protocol stack?

encapsulation

True or False. RA messages are sent to all IPv6 routers by hosts requesting addressing information.

false

True or False: The Subnet ID field in an GUA must borrow bits from the interface ID.

false

True or false? When a frame is encoded by the physical layer, all bits are sent over the media at the same time.

false

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

fault tolerance

What are two characteristics of a scalable network? (Choose two.)

grows in size without impacting existing users and suitable for modular devices that allow for expansion

Detects corruption in the IPV4 header

header checksum

What does the IP address 172.17.4.250/24 represent? Select one:

host address

Which two statements are correct about an IPv4 subnet mask?

it differentiates the network portion from the host portion of an IPV4 address and the 1 bits determine the network portion of an IPV4 address, and the 0 bits determine the host portion.

What is the purpose of the banner motd command? Select one:

it provides a way to make announcements to those who log into a router

Operation is independent of the medium (i.e., copper, fiber-optic, or wireless) carrying the data.

media independent

What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered?

portsmouth(config)#

Which devices will not forward an IPv4 broadcast packet by default?

router

Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?

show ip interface brief

Which of the following fiber-optic cable types use lasers in a single stream as a data light source transmitter?

single-mode

A router boots and enters setup mode. What is the reason for this?

the configuration file is missing from NVRAM

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

the hostname should be fewer than 64 characters in length, the hostname should contain no spaces, the hostname should begin with a letter

What is stored in the NVRAM of a Cisco router?

the startup configuration

Limits the lifetime of a packet

time to live

What is the purpose of the startup configuration file on a Cisco router?

to contain the commands that are used to initially configure a router on startup

True or False: 4 out of 5 RIRs no longer have enough IPv4 addresses to allocate to customers on a regular basis.

true

True or False? IPv6 was designed with subnetting in mind.

true

True or false. Standards organizations are usually vendor-neutral.

true

Contains the value 0100

version


Conjuntos de estudio relacionados

Chapter 10-ENTR-202-Small Business Promotion: Capturing the Eye of Your Market

View Set

Economics chapters 4 quiz questions

View Set

Final Exam (Semester A) - World History

View Set

Chapter 9: Production and Operations Management

View Set

Module 8 - Databases [Knowledge Check]

View Set