Netacad mod 7-14

¡Supera tus tareas y exámenes ahora con Quizwiz!

A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?

.

What is the prefix length notation for the subnet mask 255.255.255.224?

/27

What is the complete range of TCP and UDP well-known ports?

0 to 1023

What is the special value assigned to the first 24 bits of a multicast MAC address transporting an IPv4 packet?

01-00-5E

Which IPv4 address can a host use to ping the loopback interface?

127.0.0.1

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

14

Which number or set of numbers represents a socket?

192.168.1.1.80

What subnet mask is represented by the slash notation /20?

255.255.240.0

Which subnet mask would be used if 5 host bits are available?

255.255.255.224

Which subnet mask would be used if exactly 4 host bits are available?

255.255.255.240

A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.224. How many usable host addresses will this subnet provide?​

30

How many usable IP addresses are available on the 192.168.1.0/27 network?

30

Which statement accurately describes a characteristic of IPv4?

32 bit address

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?

4 2^(2) /24-/26

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

62

If a network device has a mask of /26, how many IP addresses are available for hosts on this network?

62

What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)

64 1518

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

DNS voip

Which destination address is used in an ARP request frame?

FFFF:FFFF:FFFF

What addresses are mapped by ARP?

IPv4 address to a destination MAC address

How does the network layer use the MTU value?

MTU is passed to the network layer by data link layer

An administrator is configuring a new router to permit out-of-band management access. Which set of commands will allow the required login using a password of cisco?

R1(config) line con 0 R1(config) password cisco R1(config) login

Which command is used to encrypt all passwords in a router configuration file?

R1(config)# service password-encryption

Which router component holds the routing table, ARP cache, and running configuration file?

RAM

Which two operations are provided by TCP but not by UDP? (Choose two.)

acknowledge received data retransmitting any unacknowledged data

What is the purpose of the banner motd command?

announcement to those that log onto router

A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task?

any line config mode

What type of applications are best suited for using UDP?

applications that are sensitive to delay

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?

arp -a

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

client randomly selects a port number

Which function or operation is performed by the LLC sublayer?

communicates to upper layers

Which field in an IPv4 packet header will typically stay the same during its transmission?

destination address

Which two things can be determined by using the ping command? (Choose two.)

destination device is reachable through network average time it takes packet to reach destination and for response from source

When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?

destination ip address

Which information is used by routers to forward a data packet toward its destination?

destination ip address

What is auto-MDIX?

detects cable type

What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address?

discard it

What happens to runt frames received by a Cisco Ethernet switch?

dropped

How does a networked server manage requests from multiple clients for different services?

each request has combination of source and destination port numbers coming from unique ip address

Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?

enable secret trustknow1

Which statement is true about MAC addresses?

first 3 bytes are used by vendor assinged oui

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

forwards frame out of all ports except port which frame was received

What field content is used by ICMPv6 to determine that a packet has expired?

hop limit field

What does the IP address 172.17.4.250/24 represent?

host address

Which two parts are components of an IPv4 address? (Choose two.) what are they for 192.168.10.20

host port - 20 network portion - 192.168.10.20

Which protocol is used by IPv4 and IPv6 to provide error messaging?

icmp

Which protocol provides feedback from the destination host to the source host about errors in packet delivery?

icmp

Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?

identifying network address of destination network

What type of information is contained in an ARP table?

ipv4 mac address mapping

Which two characteristics describe Ethernet technology? (Choose two.)

it is supported by ieee 802.3 standard uses mac address to ensure data is sent to correct destination

What is the purpose of using a source port number in a TCP communication?

keep track of conversation between devices

The ARP table in a switch maps which two types of address together?

layer 3 address to layer 2 address

Which characteristic describes the default gateway of a host computer?

logical address of the router interface on same network as host

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

media access control adds header and trailer forming osi layer 2 pdu

What statement describes a characteristic of MAC addresses?

must be globally unique

What message is sent by a host to check the uniqueness of an IPv6 address before using that address?

neighbor solicitation

Which command can be used on a Windows host to display the routing table?

netstat -r

Which statement regarding the service password-encryption command is true?

once used all passwords are encrypted

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

packet sent directly to destination host

Which command can be used to test connectivity between two devices using echo request and echo reply messages?

ping

Which utility uses the Internet Control Messaging Protocol (ICMP)?

ping

Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?

priveleged exec mode

What type of address is 01-00-5E-0A-00-02?

reaches specific group of hosts

What is one function of the ARP protocol?

resolving ipv4 to mac address

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

send frame to all ports except the port that received frame

Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?

show ip interface brief

What TCP mechanism is used to enhance performance by allowing a device to continuously send a steady stream of segments as long as the device is also receiving necessary acknowledgements?

sliding window

What information is added during encapsulation at OSI Layer 3?

source and destination ip address

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

source decreases the amount of data that it transmits before it receives acknowledgement from destination

What addressing information is recorded by a switch to build its MAC address table?

source layer 2 of incoming frames

What is stored in the NVRAM of a Cisco router?

startup config

Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table?

switch

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

switch

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

syn ack

Which transport layer feature is used to establish a connection-oriented session?

tcp-3 way handshake

A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies. What conclusion can be drawn based on this connectivity test?

tcp/ip implementation function

What is a socket?

the combination of source ip address and port number or destination ip address and port number

A router boots and enters setup mode. What is the reason for this?

the config file is missing from nvram

When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP?

the mac address of the router interface closest to sending host

What happens if part of an FTP message is not delivered to the destination?

the part of ftp message that was lost is resent

Which statement is true about variable-length subnet masking?

the size of each subnet may be different

A PC is configured to obtain an IPv4 address automatically from network 192.168.1.0/24. The network administrator issues the arp -a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

this is a static map entry

Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?

time exceeded

What is the purpose of the startup configuration file on a Cisco router?

to contain commands that are used to initially configure a router on startup

How does the ARP process use an IPv4 address?

to determine mac address of device on same network

What is the purpose of the subnet mask in conjunction with an IP address?

to determine the subnet which the host belongs

What is the purpose of ARP in an IPv4 network?

to obtain a specific MAC address when an IP address is known

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to test that the host has the capability to reach host on other networks

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?

traceroute

A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node

tracert

What is a function of the tracert command that differs from the ping command when they are used on a workstation?

tracert command shows the information of routers in path

What is a responsibility of transport layer protocols?

tracking individual conversation

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

upper layer keep track of received data and can request retransmission from upper layer on sending host


Conjuntos de estudio relacionados

MKTG 3010 Exam Two, SmartBook 2.0 Chapter 5 Assignment, IBM Chapter 4, Man3025 Chapter 5 LS

View Set

Section 4 Practice Quiz Questions

View Set

Mod 1 Breast/Female Reproductive Disorders

View Set

Semester 1-3 BIO Topics Grade 12 (EXAMS)

View Set

Module 8 Civil Rights Test 2 GOV

View Set

MCAT Psychology 12/30/15 (From test 3)

View Set