Introduction to Networks FINAL EXAM (D)
Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?
Security rules are applied to the default gateway device, preventing it from processing ping requests.
What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?
255.255.255.192
A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.240
A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.248
An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?
256
A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?
SSH
What characteristic describes a virus?
malicious software or code running on an end device
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?
nslookup
A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?
reconnaissance
What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)
1. Router Advertisement 2. Neighbor Solicitation
What two security solutions are most likely to be used only in a corporate environment? (Choose two.)
1. intrusion prevention systems 2. virtual private networks
What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)
1. neighbor advertisements 2. neighbor solicitations
What service is provided by SMTP?
Allows clients to send email to a mail server and the servers to send email to other servers.
What method is used to manage contention-based access on a wireless network?
CSMA/CA
A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?
POP3
A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?
FTP
A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device obtain a destination MAC address?
It will send an ARP request for the MAC address of the default gateway.
What service is provided by BOOTP?
Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.
What is a benefit of using cloud computing in networking?
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
What service is provided by DNS?
Resolves domain names, such as cisco.com, into IP addresses.
What service is provided by POP3?
Retrieves email from the server by downloading the email to the local mail application of the client.
Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments?
ZigBee
What characteristic describes a VPN?
a tunneling protocol that provides remote users with secure access into the network of an organization
Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
internet
What command can be used on a Windows PC to see the IP configuration of that computer?
ipconfig
During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?
switch the packet to the directly connected interface
What characteristic describes identity theft?
the use of stolen credentials to access private data