Introduction to Networks FINAL EXAM (D)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

Security rules are applied to the default gateway device, preventing it from processing ping requests.

What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?

255.255.255.192

A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.240

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.248

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

256

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?

SSH

What characteristic describes a virus?

malicious software or code running on an end device

A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

nslookup

A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?

reconnaissance

What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)

1. Router Advertisement 2. Neighbor Solicitation

What two security solutions are most likely to be used only in a corporate environment? (Choose two.)

1. intrusion prevention systems 2. virtual private networks

What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)

1. neighbor advertisements 2. neighbor solicitations

What service is provided by SMTP?

Allows clients to send email to a mail server and the servers to send email to other servers.

What method is used to manage contention-based access on a wireless network?

CSMA/CA

A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?

POP3

A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?

FTP

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device obtain a destination MAC address?

It will send an ARP request for the MAC address of the default gateway.

What service is provided by BOOTP?

Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.

What is a benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

What service is provided by DNS?

Resolves domain names, such as cisco.com, into IP addresses.

What service is provided by POP3?

Retrieves email from the server by downloading the email to the local mail application of the client.

Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments?

ZigBee

What characteristic describes a VPN?

a tunneling protocol that provides remote users with secure access into the network of an organization

Which layer of the TCP/IP model provides a route to forward messages through an internetwork?

internet

What command can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

switch the packet to the directly connected interface

What characteristic describes identity theft?

the use of stolen credentials to access private data


Conjuntos de estudio relacionados

Chapter 13, Sections 1, 2, 3, And 4

View Set

Analyzing the Marketing Environment

View Set

Cybersecurity Final Exam Review (Chapters 12-15)

View Set

NUR 222 - Ch 43-47 - Test 4 PrepU superset

View Set

Conversation 1-3 BOLD questions only (1)

View Set

Nursing Care of the Child With an Alteration in Behavior, Cognition, or Development

View Set

Health & Illness Final Exam (second half of review questions)

View Set