Introduction to Networking - Practice Final (1)

¡Supera tus tareas y exámenes ahora con Quizwiz!

A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?

/28 - /26 = 2. 2^2 = 4

The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create?

/64 - /52 = 12. 2^12 = 4096

A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks?

1. 192.168.99.0/26 2. 192.168.99.64/27

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?

1. The Source Address field name from IPv4 is kept in IPv6. 2. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (2)

1. dns server 2. default gateway

What are the three parts of an IPv6 global unicast address?

1. global routing prefix 2. subnet ID 3. interface ID

What are two ways that TCP uses the sequence numbers in a segment?

1. identify missing segments at destination 2. reassemble segments at the remote location

Which two functions are primary functions of a router?

1. packet switching 2. path selection

For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (3)

1. rapidly adapt to the loss of data transmission facilities. 2. efficiently utilizes the network infrastructure to transfer data. 3. data packets can travel multiple paths through the network simultaneously.

What three statements describe features or functions of media access control?

1. responsible for detecting transmission errors in transmitted data 2. Data link layer protocols define the rules for access to different media. 2. Ethernet utilizes CSMA/CD

What are two actions performed by a Cisco switch? (2)

1. using the source MAC addresses of frames to build and maintain a MAC address table 2. utilizing the MAC address table to forward frames via the destination MAC address

In dotted decimal notation, the IP address ___________ is the last host address for the network 172.25.0.64/26

1010 1100.000 11001.0000 0000.0111 1110 = 172.25.0.126

A nibble consists of ______ bits.

4

A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?

6001

The minimum Ethernet frame size is______ bytes. Anything smaller than that should be considered a "runt frame."

64

Switch# ping 10.1.1.1 Type escape sequence to abort. Sending , 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds: UUUU Success rate is 0 percent (0/5) Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate

A router along the path did not have a route to the destination

Which statement describes a characteristic of the traceroute utility?

It identifies the routers in the path from a source host to a destination host.

Which devices should be secured to mitigate against MAC address spoofing attacks?

Layer 2 devices

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Locate and load the startup-config file from NVRAM

A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem?

Move the cable to the router console port

Which service will translate private internal IP addresses into Internet routable public IP addresses?

NAT

To revert to a previous configuration, an administrator issues the command *copy tftp startup-config* on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?

The configuration should have been copied to the running configuration instead

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device needs mobility when connecting to the network

A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says "This connection has limited or no connectivity." The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem?

The workstation is unable to obtain an IP address from a DHCP server

A network administrator enters the *service password-encryption* command into the configuration mode of a router. What does this command accomplish?

This command prevents someone from viewing the running configuration passwords

A router boots and enters setup mode. What is the reason for this?

configuration file is missing from NVRAM

logical topology diagram

depicts the IP addressing scheme and groupings of devices and ports

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

discard the frame

Why are port numbers included in the TCP header of a segment?

enables a receiving host to forward the data to the appropriate application

A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

leased line

Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

line

Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode?

no switchport

A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

partial mesh

What is the function of CSMA/CA in a WLAN?

provides the mechanism for media access

physical topology diagram

shows how devices are connected to each other and the network, focusing on the physical locations of intermediary devices, configured ports, and cabling

Which is a function of the *show ip route* command when used as a tool for troubleshooting network connectivity?

shows the IP address of the next hop router for each route

What information is added during encapsulation at OSI Layer 3?

source and destination IP address

What is one purpose of the TCP three-way handshake?

synchronizing sequence numbers between source and destination in preparation for data transfer


Conjuntos de estudio relacionados

Parol Evidence Rule - Cha. 21 - Contracts

View Set

A.1.2 Con limón y sal (Julieta Venegas) Answers

View Set

Psych exam on Prejudice, Stereotyping, and Discrimination

View Set

Math II - Finding Outcomes Quiz 100% CORRECT

View Set

ACCY 304 CH. 14 ADAPTIVE PRACTICE

View Set