Module 8-10 Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Why is NAT not needed in IPv6?​ -Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​ -Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​ -The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet. -The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

What is the startup process of the Cisco router?

POST -> IOS -> startup config

What IPv4 header field identifies the upper layer protocol carried in the packet? -Identification -Protocol -Version -Differentiated Services

Protocol

Within a production network, what is the purpose of configuring a switch with a default gateway address? -The default gateway address is used to forward packets originating from the switch to remote networks. -It provides a next-hop address for all traffic that flows through the switch. -A switch must have a default gateway to be accessible by Telnet and SSH. -Hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination.

The default gateway address is used to forward packets originating from the switch to remote networks.

Which parameter does the router use to choose the path to the destination when there are multiple routes available? -the lower metric value that is associated with the destination network -the higher gateway IP address to get to the destination network -the higher metric value that is associated with the destination network -the lower gateway IP address to get to the destination network

the lower metric value that is associated with the destination network

What is the aim of an ARP spoofing attack? -to flood the network with ARP reply broadcasts -to fill switch MAC address tables with bogus addresses -to overwhelm network hosts with ARP requests -to associate IP addresses to the wrong MAC address

to associate IP addresses to the wrong MAC address

Which statement describes a feature of the IP protocol? -IP relies on upper layer services to handle situations of missing or out-of-order packets. -MAC addresses are used during the IP packet encapsulation. -IP relies on Layer 2 protocols for transmission error control. -IP encapsulation is modified based on network media.

IP relies on upper layer services to handle situations of missing or out-of-order packets.

Which term describes a field in the IPv4 packet header used to limit the lifetime of a packet?

TTL

A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued? -The detailed information of the ARP cache is displayed. -The ARP cache is synchronized with the router interface. -The current content of the ARP cache is displayed. -The ARP cache is cleared.

The ARP cache is cleared.

What is a basic characteristic of the IP protocol? -user data segmentation -connectionless -reliable end-to-end delivery -media dependent

connectionless

What are two potential network problems that can result from ARP operation? (Choose two.) -Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. -Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network. -Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port. -Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing. -On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.

-Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. -On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.) -The destination address in the frame is a known unicast address. -The source address in the frame is a multicast address. -The frame has the broadcast address as the destination address. -The source address in the frame header is the broadcast address. -The destination address is unknown to the switch.

-The frame has the broadcast address as the destination address. -The destination address is unknown to the switch.

What are two services provided by the OSI network layer? (Choose two.) -routing packets toward the destination -collision detection -performing error detection -encapsulating PDUs from the transport layer -placement of frames on the media

-routing packets toward the destination -encapsulating PDUs from the transport layer


Conjuntos de estudio relacionados

BSC 196 Exam 2 Practice Questions

View Set

InQuizitive: Chapter 11: The South, Slavery, and King Cotton, 1800-1860

View Set

Exams 3 and 4 Principles of Management

View Set

grounding and bonding power point, grounding and bonding highlights, grounding and bonding review, grounding and bonding trade terms, grounding and bonding concept check

View Set

Ch.10 - Money, Banks, Bank of Canada

View Set

Chapter 25: Nitrogen Acquisition and Amino Acid Metabolism

View Set

Chapter 62: Caring for Clients with Traumatic Musculoskeletal Injuries

View Set

Articles of Confederation/Constitutional Convention

View Set