NET-125 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth? A. multiplexing B. window size C. acknowledgments

A

A network admin is implementing administrator is network a policy that strong, complex passwords. Which data protection requires goal does this policy support A. data confidentiality B. keyword protection C. administator

A

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? A. a user who is trying to guess a password to access the router* B. a worm that is attempting to access another part of the network C. an unidentified individual who is trying to access the network equipment room

A

A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option? A. It forces the trace to use IPv6. B. It limits the trace to only 6 hops. C. It sets a 6 milliseconds timeout for each replay.

A

A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued? A. The ARP cache is cleared. B. The current content of the ARP cache is displayed. C. The detailed information of the ARP cache is displayed.

A

A physical topology that is a variation or combination of a point-to-point, hub and spoke, or mesh topology is commonly known as a topology. A.Hybrid B. star C. bus D. mesh

A

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet? A. when the value in the TTL field reaches zero B. when the host responds with an ICMP Echo Reply message C. when the RTT value reaches zero

A

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? A. intranet B. internet C. WAN

A

As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame? A. The transmitting node inserts start and stop bits into the frame B. The transmitting node sends a beacon to notify that a data frame is attached. C. The receiving node identifies the beginning of a frame by seeing a physical address

A

How many bits are in an IPv4 address? A. 32 B. 64 C. 128

A

Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D? A. Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address. B. Host A sends out the packet to the switch. The switch sends the packet only to the host D, which in turn responds. C. Host D sends an ARP request to host A.

A

To save time, IOS commands may be partially entered and then completed by typing which key or key combination? A. Tab B. Ctrl-P C. Ctrl-N D. Up Arrow E. Right Arrow F. Down Arrow

A

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used? A. peer-to-peer B. client-based C. master-slave

A

What addressing information is recorded by a switch to build its MAC address table? A. the source Layer 2 address of incoming frames B. the destination Layer 2 address of outgoing frames C. the destination Layer 3 address of incoming packets

A

What does TCP do if the sending source detects network congestion on the path to the destination? A. The source will decrease the amount of data that it sends before it must receive acknowledgements from the destination. B. The destination will request retransmission of the entire message. C. The source host will send a request for more frequent acknowledgments to the destination.

A

What happens if the first packet of a TFTP transfer is lost? A. The TFTP application will retry the request if a reply is not received. B. The client will wait indefinitely for the reply. C. The next-hop router or the default gateway will provide a reply with an error code.

A

What happens to runt frames received by a Cisco Ethernet switch? A. The frame is dropped. B. The frame is broadcast to all other devices on the same network. C. The frame is sent to the default gateway.

A

What information about a Cisco router can be verified using the show version command? A. the value of the configuration register* B. the administrative distance used to reach networks C. the operational status of serial interfaces

A

What is an advantage for small organizations of adopting IMAP instead of POP? A. Messages are kept in the mail servers until they are manually deleted from the email client. B. When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time. C. IMAP sends and retrieves email, but POP only retrieves email.

A

What is an advantage of using standards to develop and implement protocols? A. Products from different manufactures can interoperate successfully B. Different manufacturers are free to apply different requirements when implementing a protocol. C. Standards provide flexibility for manufacturers to create devices that comply with unique requirements.

A

What is an example of network communication that uses the client-server model? A. A user prints a document by using a printer that is attached to a workstation of a coworker. B. A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

A

What is contained in the trailer of a data-link frame? A. error detection B. logical address C. physical address D. data

A

What is the aim of an ARP spoofing attack? A. to associate IP addresses to the wrong MAC address B. to flood the network with ARP reply broadcasts C. to fill switch MAC address tables with bogus addresses

A

What is the binary equivalent of the decimal number 232? A. 11101000 B. 11000110 C. 10011000 D. 11110010

A

What is the decimal equivalent of the binary number 10010101? A. 149 B. 157 C. 168

A

What is the decimal equivalent of the hex number 0x3F? A. 63 B. 77 C. 87 D. 93

A

What is the definition of bandwidth? A. the amount of data that can flow from one place to another in a given amount of time

A

What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame? A. 64 bytes B. 512 bytes C. 1024 bytes

A

What is the purpose of ICMP messages? A. to provide feedback of IP packet transmissions B. to monitor the process of a domain name to IP address resolution C. to ensure the delivery of an IP packet

A

What is the purpose of the network security authentication function? A. to require users to prove who they are B. to determine which resources a user can access C. to keep track of the actions of a user

A

What message type is used by an HTTP client to request data from a web server? A. GET B. POST C. PUT

A

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? A. flow control B. flow management C. network D. transport

A

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain? A. .com B. www C. http

A

What process is used to place one message inside another message for transfer from the source to the destination? A. encapsulation B. de-encapsulation C. flow contol D. transfer

A

What service defines the protocols and technologies that implement the transmission of voice packets over an IP network? A. VoIP B. NAT C. DHCP D. QoS

A

What subnet mask is represented by the slash notation /20? A. 255.255.240.0 B. 255.255.255.192 C. 255.255.224.0 D. 255.255.255.0

A

What type of communication will send a message to all devices on a local area network? A. broadcast B. alcast C. multicast

A

What type of network traffic requires QoS A. video conferencing B. conferencing

A

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business? A. IMAP B. POP C. SMTP

A

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? A. wireless LAN B. zZ C. zzz

A

Which characteristic describes the default gateway of a host computer? A. the logical address of the router interface on the same network as the host computer B. the physical address of the switch interface connected to the host computer C. the physical address of the router interface on the same network as the host computer

A

Which device performs the function of determining the path that messages should take through internetworks? A. A router B. xX C. xxx

A

Which expression accurately defines the term bandwidth A. measure of the data carrying capacity of the media B. For frodo C. nike D. ?

A

Which interface allows remote management of a Layer 2 switch? A. The switch virtual interface B. Access manger C. Data link

A

Which method of data transfer allows information to be sent and received at the same time? A. full duplex B. multiplex C. simplex D. half-duplex

A

Which statement describes a characteristic of a converged network? A. A single network that delivers voice, video, and data to a variety of devices. B. Network services are delivered over a wide range of network platforms. C. The network establishes separate communication channels for each network service.

A

Which statement describes a characteristic of cloud computing A. Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world. B. Tyler

A

Which statement describes the treatment of ARP requests on the local link? A. They are received and processed by every device on the local network. B. They must be forwarded by all routers on the local network. C. They are received and processed only by the target device. D. They are dropped by all switches on the local network

A

Which statement describes the use of powerline networking technology A. A device connects to an existing home LAN using an adapter and an existing electrical outlet

A

Which statement is correct about network protocols? A. They define how messages are exchanged between the source and the destination B. They define how messages are moved to host-to-host

A

Which switching method uses the CRC value in a frame? A. store-and-forward B. fragment-free C. cut-through D. fast-forward

A

Which term describes the state of a network when the demand on the network resources exceeds the available capacity A. congestion B. connection C. intelligent

A

Which type of network threat is intended to prevent authorized users from accessing resources? A. DoS attacks B. access attacks C. reconnaissance attacks

A

Why does HTTP use TCP as the transport layer protocol? A. because HTTP requires reliable delivery B. to ensure the fastest possible download speed C. because HTTP is a best-effort protocol

A

Why is it important to configure a hostname on a device? A. to identify the device during remote access (SSH or telnet)

A

Why would a Layer 2 switch need an IP address? A. to enable the switch to be managed remotely B. to send messages over the network C. to communication to host-to-host

A

What are two examples of hybrid topologies? (Choose two.) A. partial mesh B. extended star C. bus topologie D. full mesh E. star topologie

A, B

What are two reasons a network administrator might want to create subnets? (Choose two.) A. easier to implement security policies B. improves network performance C. reduction in number of switches needed D. simplifies network design

A, B

What two criteria are used to help select network media? (Choose two.) A. the distance the media can successfully carry a signal B. The environment where the media is to be installed

A, B

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) A. cellular B. satellite C. kill D. pool

A, B

Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.) A. DSL B. cable C. Pope D. look

A, B

Which two characteristics are associated with UDP sessions? (Choose two.) A. Received data is unacknowledged. B. Destination devices receive traffic with minimal delay. C. Unacknowledged data packets are retransmitted. D. Destination devices reassemble messages and pass them to an application.

A, B

Which two connection options provide an always-on, high- bandwidth Internet connection to computers in a home office? A. DSL B. cable

A, B

Which two definitions accurately describe the associated application layer protocol? (Choose two.) A. Telnet - provides remote access to servers and networking devices B. DNS - resolves Internet names to IP addresses

A, B

Which two statements describe intermediary devices? A. direct path of the data B. connect individual hosts to the network C. path date D. hosts

A, B

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to- peer network? A. easy to create B. lacks centralized admin C. less cost to implement

A, B, C

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.) A. FTP B. HTTP C. SMTP

A, B, C

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.) A. Security B. Interference C. coverage area

A, B, C

The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.) A. session B. presentation C. application

A, B, C

What three application layer protocols are part of the TCP/IP protocol suite? (choose three) A. DHCP B. DNS C. FTP D. PPP E. ARP F. IP

A, B, C

What are three characteristics of multicast transmission? (Choose three.) A. The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network. B. A single packet can be sent to a group of hosts. C. Multicast messages map lower layer addresses to upper layer addresses. D. Computers use multicast transmission to request IPv4 addresses. E. Multicast transmission can be used by routers to exchange routing information.

A, B, E

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.) A. password cisco B. login C. enable secret cisco D. line vty 0 4 E. line console 0

A, B, E

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.) A. RFI B. crosstalk C. EMI D. extended length of cabling

A, C

What are two functions of end devices on a network? (Choose two.) A. originate the data that flows through the network B. interface between humans and the communication network

A, C

What are two types of IPv6 unicast addresses? (Choose two.) A. loopback B. multicast C. link-local D. anycast

A, C

What are two types of router interfaces? (Choose two.) A. WAN B. SVI C. LAN D. Telnet

A, C

Which two actions can be taken to prevent a successful network attack on an email server account? (Choose two.) A. Never send the password through the network in a clear text. B. Never use passwords that need the Shift key. C. Limit the number of unsuccessful attempts to log in to the server. D. Use servers from different vendors.

A, C

Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.) A. Give the router a host name and domain name.* B. Create a banner that will be displayed to users when they connect. C. Generate a set of secret keys to be used for encryption and decryption.*

A, C

Which two pieces of information are in the RAM of a Cisco router during normal operation? (Choose two.) A. Cisco IOS B. basic diagnostic software C. startup configuration file D. IP routing table

A, D

Which three application layer protocols use TCP? (Choose three.) A. SMTP B. SNMP C. TFTP D. HTTP E. FTP

A, D, E

A host device is receiving live streaming video. How does the device account for video data that is lost during transmission? A. The device will use sequence numbers to pause the video stream until the correct data arrives. ​ B. The device will continue receiving the streaming video, but there may be a momentary disruption. C. The device will delay the streaming video until the entire video stream is received.

B

A message is sent to all hosts on a remote network. Which type of message is it? A. limited broadcast B. directed broadcast C. multicast

B

A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. How many usable host addresses will this subnet provide?​ A. 4 B. 6 C. 8 D. 10 E. 12

B

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addresses PCs - 20 addresses needed Printers - 2 addresses needed Scanners - 2 addresses needed The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks? A. 255.255.255.240 B. 255.255.255.224 C. 255.255.255.252 D. 255.255.255.0

B

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0SwitchA(config-if)# no shutdown What is the technician configuring? A.Telnet access B. SVI C. password encryption D. physical switchport access

B

A web client is sending a request for a webpage to a web server. From the perspective of the client, what i the correct order of the protocol stack that is used to prepare the request for transmission? A. Ethernet, IP, TCP, HTTP B. HTTP, TCP, IP, Ethernet C. HTTP, IP, TCP, Ethernet D. Ethernet, TCP, HTTP, IP

B

An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured? A. SLAAC B. stateless DHCPv6 C. stateful DHCPv6

B

Following default settings, what is the next step in the router boot sequence after the IOS loads from flash? A. Load the running-config file from RAM. B. Locate and load the startup-config file from NVRAM. C. Perform the POST routine.

B

How is SSH different from Telnet? A. SSH makes connections over the network, whereas Telnet is for out-of-band access. B. SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. C. SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet.

B

How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks? A. five B. three C. two E. four

B

In which scenario would the use of a WISP be recommended? A. an Internet cafe in a city B. a farm in a rural area without wired broadband access C. any home with multiple wireless devices D. an apartment in a building with cable access to the Internet

B

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? A. configuration B. environmental C. electrical

B

What do the client/server and peer-to-peer network models have in common? A. Both models have dedicated servers. B. Both models support devices in server and client roles. C. Both models require the use of TCP/IP-based protocols.

B

What does a client do when it has UDP datagrams to send? A. It sends to the server a segment with the SYN flag set to synchronize the conversation. B. It just sends the datagrams. C. It queries the server to see if it is ready to receive data.

B

What is a WAN? A. a network infrastructure designed to provide data storage, retrieval, and replication B. a network infrastructure that provides access to other networks over a large geographic area C. a network infrastructure that spans a limited physical area such as a city D. a network infrastructure that provides access in a small geographic area

B

What is a result of connecting two or more switches together? A. The size of the collision domain is increased. B. The size of the broadcast domain is increased. C. The number of collision domains is reduced.

B

What is a role of the Logical Link Control sublayer? ?. to mark frames to identify the network layer protocol being carried ? ? ?

B

What is a socket? A. the combination of the source and destination IP address and source and destination Ethernet address B. the combination of a source IP address and port number or a destination IP address and port number C. the combination of the source and destination sequence numbers and port numbers

B

What is an ISP? A. It is a protocol that establishes how computers within a local network communicate. B. It is an organization that enables individuals and businesses to connect to the Internet. C. It is a networking device that combines the functionality of several different networking devices in one.

B

What is an advantage of network devices using open standard protocols? A. Network communications is confined to data transfers between devices from the same vendor. B. A client host and a server running different operating systems can successfully exchange data. C. Internet access can be controlled by a single ISP in each market. D. Competition and innovation are limited to specific types of products.

B

What is auto-MDIX? A. an Ethernet connector type B. a feature that detects Ethernet cable typ​e C. a type of port on a Cisco switch D. a type of Cisco switch

B

What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64? A.2001:DB8:BC15 B. 2001:DB8:BC15:A C. 2001:DB8:BC15:A:1

B

What is the purpose of the subnet mask in conjunction with an IP address? A. to identify whether the address is public or private B. to determine the subnet to which the host belongs C. to uniquely identify a host on a network

B

What is true about the Server Message Block protocol? A. Different SMB message types have a different format. B. Clients establish a long term connection to servers. C. SMB messages cannot authenticate a session.

B

What technique is used with UTP cable to help protect against signal interference from crosstalk? A. wrapping a foil shield around the wire pairs B. twisting the wires together into pairs C. encasing the cables within a flexible plastic sheath D. terminating the cable with special grounded connectors

B

What type of network must a home user access in order to do online shopping? A. inter dc B. the internet C. vvV

B

When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway. A. false B. true

B

When is UDP preferred to TCP? A. when all the data must be fully received before any part of it is considered useful B. when an application can tolerate some loss of data during transmission C. when segments must arrive in a very specific sequence to be processed successfully

B

Which PDU format is used when bits are received from the network medium by the NIC of a host? A.file B. frame C. packet D. segment

B

Which characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications among many hosts? A. the selection of paths for and direct packets toward the destination B. the ability to operate without regard to the data that is carried in each packet C. the ability to manage the data transport between processes running on hosts

B

Which firewall feature is used to ensure that packets coming into a network are legitimate responses initiated from internal hosts? A. application filtering B. stateful packet inspection C. URL filtering

B

Which phrase describes an FTP daemon? A. a diagnostic FTP program B. a program that is running on an FTP server C. a program that is running on an FTP client

B

Which statement describes a hardware feature of a Cisco 1941 router that has the default hardware configuration? A. It does not have an AUX port. B. It has two types of ports that can be used to access the console. C. It does not require a CPU because it relies on Compact Flash to run the IOS.

B

Which statement is true about FTP? A. The client can choose if FTP is going to establish one or two connections with the server. B. The client can download data from or upload data to the server. C. FTP is a peer-to-peer application.

B

Which statement is true about MAC addresses? A. A NIC only needs a MAC address if connected to a WAN. B. The first three bytes are used by the vendor assigned OUI. C. The ISO is responsible for MAC addresses regulations.

B

What are three parts of an IPv6 global unicast address? (Choose three.) A. an interface ID that is used to identify the local host on the network B. an interface ID that is used to identify the local network for a particular host C. a subnet ID that is used to identify networks inside of the local enterprise site D. a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP

B, C

What are two potential network problems that can result from ARP operation? (Choose two.) A. Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing. B. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. C. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.

B, C

What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.) A. to identify and control bits B. to identify where the frame starts and ends C. to distinguish data bits from control bits

B, C

Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.) A. Capture traffic on the weekends when most employees are off work. B. Capture traffic during peak utilization times to get a good representation of the different traffic types. C. Perform the capture on different network segments.

B, C

What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.) A. 56 bytes B. 64 bytes C. 128 bytes D. 1518 bytes E. 1024 bytes

B, D

What are two characteristics of IP? (Choose two.) A. retransmits packets if errors occur B. operates independently of the network media C. guarantees delivery of packets D. does not require a dedicated end-to-end connection

B, D

What are two characteristics of a scalable network? (Choose two.) A. easily overloaded with increased traffic B. grows in size without impacting existing users C. is not as reliable as a small network D. suitable for modular devices that allow for expansion E. offers limited number of applications

B, D

Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.) A. It provides an address only to devices that are authorized to be connected to the network. B. It reduces the burden on network support staff. C. It guarantees that every device that needs an address will get one. D. It ensures that addresses are only applied to devices that require a permanent address. E. It eliminates most address configuration errors. Navigation Bar

B, E

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts? A. 254 B. 253 C. 251

C

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC? A. 1 segment B. 1000 segments C. 10 segmentS

C

A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices? A. random static addresses to improve security B. addresses from different subnets for redundancy C. predictable static IP addresses for easier identification

C

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices? A. devices with a fixed number and type of interfaces B. devices that have support for network monitoring C. devices with support for modularity

C

An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again? A. Configure the IP address on an SVI on the laptop. B. Use a virtual private network instead of the company LAN. C. Use DHCP to automatically assign addresses. D. Use laptops that do not require IP addresses.

C

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network? A. ACL B. IPS C. VPN D. BYOD

C

At which layer of the OSI model would a logical address be encapsulated? A. physical layer B. data link layer C. network layer D. transport layer

C

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent? A. the total number of bytes that have been received B. the last sequence number that was sent by the source C. the next byte that the destination expects to receive

C

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? A. DoS attack​ B. identity theft C. spyware D. zero-day attack

C

How does BYOD change the way in which businesses implement networks?​ A. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies. B. BYOD devices are more expensive than devices that are purchased by an organization. C. BYOD provides flexibility in where and how users can access network resources.

C

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0? A. 510 B. 512 C. 1022 D. 1024 E. 2046

C

If a network device has a mask of /28, how many IP addresses are available for hosts on this network? A. 256 B. 62 C. 14 D. 16 E. 32

C

The acronym refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources. A.cyod B. cope C. byod

C

What IPv4 header field identifies the upper layer protocol carried in the packet? A. Version B. Differentiated Services C. Protocol D. Identification

C

What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame? C. LLC

C

What are proprietary protocols? A. protocols developed by private organizations to operate on any vendor hardware B. protocols that can be freely used by any organization or vendor C. protocols developed by organizations who have control over their definition and operation D. a collection of protocols known as the TCP/IP protocol suite

C

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? A. (config)# enable secret Secret_Password B. (config-line)# password secret C. (config)# service password-encryption D. (config)# enable secret Encrypted_Password

C

What does the IP address 172.17.4.250/24 represent? A. network address B. broadcast address C. host address

C

What field content is used by ICMPv6 to determine that a packet has expired? A. Time Exceeded field B. CRC field C. Hop Limit field

C

What happens if part of an FTP message is not delivered to the destination? A. The message is lost because FTP does not use a reliable delivery method. B. The part of the FTP message that was lost is re-sent. C. The entire FTP message is re-sent.

C

What information is used by TCP to reassemble and reorder received segments? A. port numbers B. acknowledgment numbers C. sequence numbers

C

What is a characteristic of UDP? A. UDP reassembles the received datagrams in the order they were received. B. Applications that use UDP are always considered unreliable.​ C. UDP datagrams take the same path and arrive in the correct order at the destination.​

C

What is a characteristic of a TCP server process? A. An individual server can have two services assigned to the same port number within the same transport layer services. B. Every application process running on the server has to be configured to use a dynamic port number. C. There can be many ports open simultaneously on a server, one for each active server application.

C

What is one advantage of using fiber optic cabling rather than copper cabling? A. It is able to be installed around sharp bends. B. It is usually cheaper than copper cabling. C. It is able to carry signals much further than copper cabling.

C

What is one advantage that the IPv6 simplified header offers over IPv4? A. little requirement for processing checksums B. smaller-sized source and destination IP addresses C. efficient packet handling D. smaller-sized header

C

What is the complete range of TCP and UDP well-known ports? A. 1024 - 49151 B. 0 to 255 C. 0 to 1023

C

What is the function of the CRC value that is found in the FCS field of a frame? A. to verify the physical address in the frame B. to compute the checksum header or the data field in the frame C. to verify the integrity of the received frame D. to verify the logical address in the frame

C

What is the function of the Nslookup utility? A. to manually force a client to send a DHCP request B. to view the network settings on a host C. to manually query the name servers to resolve a given host name

C

What is the function of the kernel of an operating software? A. the kernel has to meet hardware requirements B. the kernel control the OS C. the kernel provisions hardware resources to meet software requirements

C

What kind of port must be requested from IANA in order to be used with a specific application? A. private port B. dynamic port C. registered port

C

What routing table entry has a next hop address associated with a destination network? A. C and L source routes B. local routes C. remote routes D. directly-connected routes

C

What statement describes Ethernet? A. It is the required Layer 1 and 2 standard for Internet communication. B. It defines a standard model used to describe how networking works. C. It defines the most common LAN type in the world.

C

What statement describes a characteristic of MAC addresses? A. They have a 32-bit binary value. B. They are only routable within the private network. C. They must be globally unique. D. They are added as part of a Layer 3 PDU.

C

What type of address is automatically assigned to an interface when IPv6 is enabled on that interface? A. loopback B. global unicast C. link-local D. unique local

C

What type of information is included in the transport header? A. encoded application data B. destination and source logical addresses C. destination and source port numbers

C

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router? A. dynamic route that is learned through EIGRP B. default route C. directly connected route D. static route

C

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary? A. The best-effort delivery process guarantees that all packets that are sent are received. B. Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available. C. Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

C

When should an administrator establish a network baseline? A. when the traffic is at peak in the network B. when there is a sudden drop in traffic C. at regular intervals over a period of time

C

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications? A. SMTP B. DHCP C. SMB

C

Which characteristic describes an IPv6 enhancement over IPv4?​ A.Both IPv4 and IPv6 support authentication, but only IPv6 supports privacy capabilities. B. IPv6 addresses are based on 128-bit flat addressing as opposed to IPv4 which is based on 32-bit hierarchical addressing. C. The IPv6 header is simpler than the IPv4 header is, which improves packet handling.

C

Which characteristic describes crosstalk? A. the loss of wireless signal over excessive distance from the access point B. the distortion of the network signal from fluorescent lighting C. the distortion of the transmitted messages from signals carried in adjacent wires

C

Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH? A. logging synchronous B. show running-config​ C. terminal monitor

C

Which device acts as a gateway to allow hosts to send traffic to remote IP networks? A. DNS server B. DHCP server C. local router D. local switch

C

Which factor determines TCP window size? A. the number of services included in the TCP segment B. the amount of data to be transmitted C. the amount of data the destination can process at one time

C

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly? A. Sequence Number B. Acknowledgment Number C. Time-to-Live

C

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data? A. session B. presentation C. application

C

Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057? A. 3FFE:1044:0:0:00AB::0057 B. 3FFE:1044:0000:0000:00AB::0057 C. 3FFE:1044:0:0:AB::57 D. 3FFE:1044::AB::57

C

Which protocol is used by a client to communicate securely with a web server? A. SMTP B. IMAP C. HTTPS

C

Which statement describes an extended star topology? A. All end and intermediate devices are connected in a chain to each other. B. End devices are connected together by a bus and each bus connects to a central intermediate device. C. End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.

C

Which statement is true about the TCP/IP and OSI models? A. The TCP/IP is the same as OSI B. The TCP/IP Internet layer and OSI Layer 5 provides the similar functions C. The TCP/IP transport layer and OSI Layer 4 provide similar services and functions

C

Which subnet mask would be used if 5 host bits are available? A. 255.255.255.240 B. 255.255.255.128 C. 255.255.255.224​

C

Why would a technician enter the command copy startup-config running-config? A. to remove all configurations from the switch B. to save an active configuration to NVRAM C. to copy an existing configuration into RAM D. to make a changed configuration the new startup configuration

C

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? C. implementing a firewall D. installing antivirus software

C, D

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) A. RST B. URG C. ACK D. SYN

C, D

Which type of connector does a network interface card use? A. DIN B. PS-2 C. RJ-11 D. Rj-45

C, D

Which three IP addresses are private ? (Choose three.) A. 172.32.5.2 B. 224.6.6.6 C. 172.16.4.4 D. 10.1.1.1 E. 192.168.5.5

C, D, E

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? A. data link B. network C. application D. presentation E. session

C, D, E

Which two things can be determined by using the ping command? (Choose two.) A. the IP address of the router nearest the destination device B. the number of routers between the source and destination device C. the destination device is reachable through the network D. the average time it takes each router in the path between source and destination to respond E. the average time it takes a packet to reach the destination and for the response to return to the source

C, E

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here? A. quality of service (QoS) B. scalability C. security D. fault tolerance E. integrity

D

A router boots and enters setup mode. What is the reason for this? A. The POST process has detected hardware failure. B. Cisco IOS is missing from flash memory. C. The IOS image is corrupt. D. The configuration file is missing from NVRAM.

D

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? A. Copy the running configuration to the startup configuration file. B. Copy the information in the startup configuration file to the running configuration. C. Reload the device and type yes when prompted to save the configuration. D. Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

D

Refer to the exhibit. Which term correctly identifies the device type that is included in the area B? A. Source B. End C. Transfer D. Intermediary

D

The ARP table in a switch maps which two types of address together? A. Layer 3 address to a Layer 4 address B. Layer 4 address to a Layer 2 address C. Layer 2 address to a Layer 4 address D. Layer 3 address to a Layer 2 address

D

What is a characteristic of port-based memory buffering? A. Frames in the memory buffer are dynamically linked to destination ports. B. All frames are stored in a common memory buffer. C. All ports on a switch share a single memory buffer. D. Frames are buffered in queues linked to specific ports.

D

What is indicated by a successful ping to the ::1 IPv6 address? A. The link-local address is correctly configured. B. The host is cabled properly. C. The default gateway address is correctly configured. D. IP is properly installed on the host.

D

What is indicated by the term throughput? A. the guaranteed data transfer rate offered by an ISP B. the capacity of a particular medium to carry data C. the time it takes for a message to get from sender to receiver D. the measure of the bits transferred across the media over a given period of time

D

What is the purpose of the startup configuration file on a Cisco router? A. to facilitate the basic operation of the hardware components of a device B. to contain the configuration commands that the router IOS is currently using C. to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS D. to contain the commands that are used to initially configure a router on startup

D

What is true concerning physical and logical topologies? D. Logical topologies refer to how a network transfers data between devices.

D

What security violation would cause the most amount of damage to the life of a home user D. capturing of personal data that leads to identity theft

D

What will happen if the default gateway address is incorrectly configured on a host? A.The host cannot communicate with other hosts in the local network. B. The switch will not forward packets initiated by the host. C. The host will have to use ARP to determine the correct address of the default gateway. D. The host cannot communicate with hosts in other networks.

D

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model? A. bits B. frame C. packet D. segment

D

Which address does a NIC use when deciding whether to accept a frame? A. source IP address B. source MAC address C. destination IP address D. destination MAC address E. source Ethernet address

D

Which application layer protocol uses message types such as GET, PUT, and POST? A. DNS B. DHCP C. SMTP D. HTTP

D

Which destination address is used in an ARP request frame? A. 255.255.255.255 B. 0.0.0.0 C. 01-00-5E-00-AA-23 D. FFFF.FFFF.FFFF

D

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices? A. RST B. SYN C. FIN D. ACK

D

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? A. physical B. transport C. application D. data link

D

Which network design consideration would be more important to a large corporation than to a small business? A. Internet router B. firewall C. low port density switch D. redundancy

D

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host? A. UDP B. ARPv6 D. ICMPv6

D

Which statement describes a characteristic of cloud computing? A. bed B. you C. Bed D. Applications can be accessed over the Internet through a subscription

D

Why are two strands of fiber used for a single fiber optic connection? ? ? ? ?Allow for full-duplex connectivity

D

a network is text, and graphics over the same communication channels A. crab rangoon B. IBS communication D. converged

D

Which two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains? (Choose two.) A. encapsulation B. trunking C. multiplexing D. dual stack E. tunneling

D, E

Which two traffic types require delay sensitive delivery? (Choose two.) A. email B. web C. FTP D. voice E. video

D, E

The term indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s). E. Bandwith

E

True or False? Mobile devices do not require IP addresses to communicate on the Internet. True False

False


Conjuntos de estudio relacionados

CS 332/ 532 Systems Programming Lecture Two Introduction

View Set

LS1 Week 8 Chapter 55 Management of Pt With Urinary Disorders

View Set

The Nature, Components, Types, and Physiology of Pain

View Set

Intro to Software engineering second important questions

View Set

Earth Science 8. Solar Power unit 8

View Set