Network Essentials Study Guide (Version A)

¡Supera tus tareas y exámenes ahora con Quizwiz!

The designated private IP addresses are within the three IP address ranges

* 10.0.0.0 - 10.255.255.255 * 172.16.0.0 - 172.31.255.255 * 192.168.0.0 - 192.168.255.255

Which three IP addresses are considered private addresses? (Choose three.)

- 192.168.5.29 - 172.17.254.4 - 10.234.2.1

What two radio frequency bands are used in home Wireless LANs? (Choose two.)

- 5 GHz -2.4 GHz

Which two statements describe characteristics of network addresses? (Choose two.)

- A MAC address is also referred to as a physical address because it is permanently embedded on the NIC. - A valid public IPv4 or IPv6 address is needed in order for devices to communicate over the internet.

What are three characteristics of multicast transmission? (Choose three.)

- A single packet can be sent to a group of host. - Multicast transmission can be used by routers to exchange routing information. - The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.

When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)

- Generate the asymmetric RSA keys. - Configure the correct IP domain name. -Create a valid local username and password database.

What are two benefits of using a layered network model? (Choose two.)

- It assists in protocol design. - It prevents technology in one layer from affecting other layers.

Three methods that allow IPv6 and IPv4 to co-exist. Match each method with its description.

- The IPv4 packets and IPv6 packets coexist in the same network. (dual-stack) - The IPv6 packet is transported inside an IPv4 packet (tunneling) - IPv6 packets are converted into IPv4 packets, and vice versa (translation)

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

- line console 0 - login -password cisco

Match the commands to the correct actions. (Not all options are used.)

- provides security on the console. (Router(config-line)# password class) - displays a message when the router is accessed. (Router(config)# banner motd #) - configures a name on the router. (Router(config)# hostname CL1)

Convert the following decimal number into HEX: 593

0X251

Convert the following decimal number into HEX: 620

0X26C

Convert the following decimal into hexadecimal: 2,001

0X7D1

How many bits are there in each hextet of an IPv6 address?

128

You have a network with a custom subnet mask of 255.255.255.240. How many usable IP addresses are available.

14

What is the broadcast address of the network 192.168.100.200 255.255.255.248.

192.168.100.207

What is the subnet ID of the network 192.168.165.189 /26

192.168.165.128

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to the other hosts?

251

You have a prefix length of /19. What is your custom subnet mask?

255.255.224.0

You have a prefix length of /20. What is your custom subnet mask?

255.255.240.0

Refer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?

255.255.255.255

A client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?

443

You have a network with a custom subnet mask of 255.255.255.248. How many useable IP addresses are available.

6

Convert the following IPv6 address into the most compressed form 0678:0DF5:0000:CB34:0034:0000:0000:02B0 (Must be in CAPS)

678:DF5:0:CB34:34::2B0

Convert the following hexadecimal into decimal: 0X2DF

735

Convert the following IPv6 address into the most compressed form 0009:FEA0:00DA:F4A8:008A:0000:0000:0000

9:FEA0:DA:F4A8:A8::

What is the difference between the terms keyword and argument in the IOS command structure?

A keyword is a specific parameter. An argument is not a predefined variable.

A student is attempting to access an 802.11n wireless network. What method is used to manage contention-based access on this wireless network?

CSMA/CA

Match each DHCP message type with its description. (Not all options are used.)

DHCPACK - the DHCP server confirming that the address lease has been accepted DHCPREQUEST - the client accepting the IP address provided by the DHCP server DHCPNACK - ? DHCPDISCOVER - a client initiating a message to find a DHCP message DHCPOFFER - a DHCP server responding to the initial request by a client

What type of attack is the ping of death?

Denial of Service (DoS)

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

Disable SSID broadcast.

What is the purpose of using SSH to connect to a router?

It allows a secure remote connection to the router command line interface.

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully.

A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?

Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.

A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?

The PC was preconfigured to use DHCP.

A network administrator issues the Switch(config)# interface FastEthernet 0/1 command on a Cisco switch. Which term is used to describe the "0/1 part in the command?

argument

Which network technology allows devices to communicate using both IPv4 and IPv6 addressing at the same time?

dual stack

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)

first mode - user EXEC mode second mode - privileged EXEC mode third mode - global configuration mode final mode - line configuration mode

When a router is powered on, where will the router first search for a valid IOS image to load by default?

flash memory

What type of access is secured on a Cisco router or switch with the enable secret command?

privileged EXEC

A network administrator establishes a connection to a switch via SSH. What characteristics uniquely describes the SSH connection?

remote access to a switch where data is encrypted during the session

Which type of address does a switch use to build the MAC address table?

source MAC address

A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send the ARP request?

the broadcast MAC address

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

What addressing information is recorded by a switch to build its MAC address table?

the source Layer 2 address of incoming frames.

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

virtualization

Which type of wireless communication is based on 802.11 standards?

Wi-Fi


Conjuntos de estudio relacionados

AP Lit Question 2 Literary Terms

View Set

CNA: Chapter 4: Body Systems and Related Conditions

View Set

NEURO-Amyotrophic Lateral Sclerosis (ALS)

View Set

English The Norton Field Guide To Writing

View Set