Networking Basics Final Exam
Which three addresses are valid public addresses? (Choose three.) 198.133.219.17 10.15.250.5 64.104.78.227 172.31.1.25 128.107.12.117 192.168.1.245
198.133.219.17 64.104.78.227 128.107.12.117 The ranges of private IPv4 addresses are as folllows: 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255
Which wireless RF band do IEEE 802.11b/g devices use? 60 GHz 2.4 GHz 5 GHz 900 MHz
2.4 GHz 900 MHz is an FCC wireless technology that was used before development of the 802.11 standards. 900 MHz devices have a larger coverage range than the higher frequencies have and do not require line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at 60 GHz.
Which number grouping is a valid IPv6 address? 2001:0db8:3c55:0015:1010:0000:abcd:ff13 12aa::1298:1200::129b 1b10::1100::2001::2900::ab11::1102::0000::2900 1234:1230::1238::1299:1000::
2001:0db8:3c55:0015:1010:0000:abcd:ff13 An IPv6 address is made up of 128 bits represented in hexadecimal numbers.There are two rules that help reduce the number of digits needed to represent an IPv6 address. Rule 1 - Omit leading zeros in any 16-bit section. Rule 2 - Replace any single group of consecutive zeros with a double colon (::). This can only be used once within an IPv6 address.
What is the shortest valid representation of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200? 2001:DB8:0:1470::200 2001:0DB8::1470:0:0:0:2 2001:DB8::1470::200 2001:0DB8:0:147::02
2001:DB8:0:1470::200 A double colon (::) can replace any single, contiguous string of one or more 16-bit segments (hextets) consisting of all 0s, and can only be used once per IPv6 address. Any leading 0s (zeros) in any 16-bit section or hextet can be omitted.
How many bits are in an IPv4 address? 256 128 32 64
32 An IPv4 address is comprised of 4 octets of binary digits, each containing 8 bits, resulting in a 32-bit address.
Which statement describes the use of powerline networking technology? A device connects to an existing home LAN using an adapter and an existing electrical outlet. Wireless access points use powerline adapters to distribute data through the home LAN. A home LAN is installed without the use of physical cabling. New "smart" electrical cabling is used to extend an existing home LAN.
A device connects to an existing home LAN using an adapter and an existing electrical outlet. Powerline networking adds the ability to connect a device to the network using an adapter wherever there is an electrical outlet. The network uses existing electrical wiring to send data. It is not a replacement for physical cabling, but it can add functionality in places where wireless access points cannot be used or cannot reach devices.
What are two characteristics of multicast transmission? (Choose two.) Computers use multicast transmission to request IPv4 addresses. Multicast messages map lower layer addresses to upper layer addresses. A single packet can be sent to a group of hosts. The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255. Multicast transmission can be used by routers to exchange routing information.
A single packet can be sent to a group of hosts. Multicast transmission can be used by routers to exchange routing information. Broadcast messages consist of single packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses, and map upper layer addresses to lower layer addresses. A multicast transmission is a single packet sent to a group of hosts and is used by routing protocols, such as OSPF and RIPv2, to exchange routes. The address range 224.0.0.0 to 224.0.0.255 is reserved for link-local addresses to reach multicast groups on a local network.
For what purpose are IPv4 addresses utilized? An IPv4 address is used to identify the number of IP networks available. An IPv4 address is used to uniquely identify the application that requested the information from a remote device. An IPv4 address is used to uniquely identify a device on an IP network. An IPv4 address is burned into the network card to uniquely identify a device.
An IPv4 address is used to uniquely identify a device on an IP network. A MAC address is burned into a NIC to uniquely identify a device. A port number is used to uniquely identify the application that requested information. The subnet mask identifies how many hosts can be on a network and the network number. There is not really any parameter that identifies the number of free IP networks.
Which type of device provides an Internet connection through the use of a phone jack? DSL modem cable modem satellite modem Wi-Fi AP
DSL modem DSL technology uses the existing telephone network. For that reason, a DSL modem commonly has an RJ-11 phone port.
A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take? Configure a DNS server. Enable WPA encryption. Configure DMZ settings. Disable SSID broadcast.
Disable SSID broadcast. Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced.
A tourist is traveling through the countryside and needs to connect to the internet from a laptop. However, the laptop only has Wi-Fi and Ethernet connections. The tourist has a smartphone with 3G/4G connectivity. What can the tourist do to allow the laptop to connect to the internet? Use an Ethernet cable to connect the smartphone to the laptop. Enable tethering and create a hotspot. Use the smartphone to access web pages and then pass the web pages to the laptop. Use the smartphone to access the internet through a satellite connection and then share that connection with the laptop.
Enable tethering and create a hotspot. Many cell phones have the ability to connect to other devices through a feature called tethering. The connection can be made using Wi-Fi, Bluetooth, or a USB cable. Once a device is connected, it is able to use the cellular connection of the phone to access the internet. When a cellular phone allows Wi-Fi devices to connect and use the mobile data network, this is called a hotspot.
What will a Cisco LAN switch do if it receives an incoming frame and the destination MAC address is not listed in the MAC address table? Drop the frame. Use ARP to resolve the port that is related to the frame. Forward the frame out all ports except the port where the frame is received. Send the frame to the default gateway address.
Forward the frame out all ports except the port where the frame is received. A LAN switch populates the MAC address table based on source MAC addresses. When a switch receives an incoming frame with a destination MAC address that is not listed in the MAC address table, the switch forwards the frame out all ports except for the ingress port of the frame. When the destination device responds, the switch adds the source MAC address and the port on which it was received to the MAC address table.
What benefit does DHCP provide to a network? DHCP allows users to refer to locations by a name rather than an IP address. Hosts can connect to the network and get an IP address without manual configuration. Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has static assignments. Hosts always have the same IP address and are therefore always reachable.
Hosts can connect to the network and get an IP address without manual configuration. DHCP provides automatic IP address configuration to hosts on a network. Hosts will be dynamically assigned an address when they connect to the network, although not necessarily the same address each time they connect. If there are static and dynamic addresses used together on the network there could still be the possibility of address conflicts. DNS can be used in conjunction with DHCP to allow users to communicate using names rather than IP addresses.
When analog voice signals are converted for use on a computer network, in what format are they encapsulated? frames IP packets segments bits
IP packets When Voice over iP (VoIP) is being used, analog voice signals are translated into digital data in the form of IP packets. This translation allows the phone call to be carried through a computer network.
How are port numbers used in the TCP/IP encapsulation process? If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations. Source port and destination port numbers are randomly generated. Destination port numbers are assigned automatically and cannot be changed. Source port numbers and destination port numbers are not necessary when UDP is the transport layer protocol being used for the communication.
If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations. Both UDP and TCP use port numbers to provide a unique identifier for each conversation. Source port numbers are randomly generated and are used to track different conversations. Destination port numbers identify specific services by using either a default port number for the service or a port number that is assigned manually by a system administrator.
Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.) Input the authentication password. Enter the network SSID. Set the IP address. Change the MAC address. Choose the correct security type. Activate the Bluetooth antenna.
Input the authentication password. Enter the network SSID. Choose the correct security type. In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps: Enter the network SSID of the wireless network. Choose the security type used by the wireless network. Input the password to authenticate successfully.
Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping? Security rules are applied to the default gateway device, preventing it from processing ping requests. The default gateway is not operational. The TCP/IP stack on the default gateway is not working properly. The default gateway device is configured with the wrong IP address.
Security rules are applied to the default gateway device, preventing it from processing ping requests. If the ping from one host to another host on a remote network is successful, this indicates that the default gateway is operational. In this scenario, if a ping from one host to the default gateway failed, it is possible that some security features are applied to the router interface, preventing it from responding to ping requests.
Which command would a technician use to display network connections on a host computer? ipconfig tracert netstat nslookup
The netstat command is a network utility that can be used to display active TCP connections that are open and running on a networked host.
A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.) The HTTP protocol is not working properly on the target server. The computer has been assigned a static IP address. The Windows domain or workgroup name that is configured on the computer is incorrect. The target web server is down. DNS service is unavailable on the customer network.
The target web server is down. DNS service is unavailable on the customer network. A ping would fail if the destination device was not operational. It would also fail if the DNS server was unavailable to convert the URL to an IP address. The fact that a computer had a static IP address is not a factor. Even if the target protocol (HTTP) is not functioning, the server would still respond to a ping.
A user is setting up a home wireless network. A global address is to be used in NAT translations for traffic flowing through the wireless router. How is this global address assigned? The wireless router will act as a DHCP client in order to receive global addressing from the ISP. The host devices will select an unused IP address on the LAN for performing NAT through the wireless router. The network administrator will choose an available IP address from the LAN and configure the global addressing of the wireless router. The default gateway IP address of the LAN device is used as the global address for NAT translations through the wireless router.
The wireless router will act as a DHCP client in order to receive global addressing from the ISP. The public (global) address used in NAT is commonly the public IP address that resides on the external facing interface of the wireless router.This IP address is commonly provided via DHCP from the ISP.
A traveling sales representative uses a cell phone to interact with the home office and customers, track samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet connectivity method would be a preferred method to use on the mobile device due to the low cost? cable DSL Wi-Fi cellular
Wi-Fi Mobile devices typically use either the cellular network or a Wi-Fi network to connect to the internet. The Wi-Fi connection is preferred because it uses less battery power and is free in many places.
What are two methods typically used on a mobile device to provide internet connectivity? (Choose two.) cellular GPS Wi-Fi NFC Bluetooth
cellular Wi-Fi Mobile devices commonly use Wi-Fi and cellular to connect to the internet. The cellular connection uses the cellular data network for a fee. The Wi-Fi connection uses an 802.11 wireless network in the area to connect to the internet.
What type of route is indicated by the code C in an IPv4 routing table on a Cisco router? directly connected route default route static route dynamic route learned from another router
directly connected route Routing table entries have codes that indicate how a route was entered into the routing table. A code C stands for a directly connected route.
What data encoding technology is used in copper cables? modulation of specific frequencies of electromagnetic waves electrical pulses modulation of light rays pulses of light
electrical pulses Data is transmitted across a network on media. Modern networks primarily use three types of media to interconnect devices: Metal wires within cables (copper cable, such as twisted-pair and coaxial cable) - Data is encoded into electrical impulses. Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into pulses of light. Wireless transmission - Data is encoded via modulation of specific frequencies of electromagnetic waves.
What process involves placing one message format inside of another message format? encapsulation flow control segmentation encoding
encapsulation When a message is placed inside of another message, this is known as encapsulation. On networks, encapsulation takes place when one protocol data unit is carried inside of the data field of the next lower protocol data unit.
A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.) personnel type geographic location device type department support model
geographic location device type The IP address design being used is by geographic location (for example, one campus is 10.1, another campus 10.2, another campus 10.3). The other design criterion is that the next octet number designates IP phones, or a specific device type, with numbers starting with 4, but which can include other numbers. Other devices that might get a designation inside this octet could be printers, PCs, and access points.
What layer is responsible for routing messages through an internetwork in the TCP/IP model? internet network access session transport
internet The TCP/IP model consists of four layers: application, transport, internet, and network access. Of these four layers, it is the internet layer that is responsible for routing messages. The session layer is not part of the TCP/IP model but is rather part of the OSI model.
What is a disadvantage of deploying a peer-to-peer network model? high degree of complexity lack of centralized administration difficulty of setup high cost
lack of centralized administration The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability.
At which layer of the OSI model would a logical address be added during encapsulation? network layer data link layer transport layer physical layer
network layer Logical addresses, also known as IP addresses, are added at the network layer. Physical addresses are edded at the data link layer. Port addresses are added at the transport layer. No addresses are added at the physical layer.
Which three types of nodes should be assigned static IP addresses on a network? (Choose three.) printers servers tablets desktop PCs gateways mobile laptops
printers servers gateways Servers, printers, and intermediary devices, such as routers, switches, and access points should have statically assigned IP addresses so that they are accessible to users and available for remote management.
Which type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work? reference model protocol model hierarchical design model TCP/IP model
reference model There are two common types of network communication models: Protocol model - This model closely matches the structure of a particular protocol suite and describes the functions that occur at each layer of protocols within the suite. The TCP/IP model is an example of a protocol model. Reference model - The primary purpose is to aid in a clearer understanding of the functions and processes necessary for network communications.This type of model does not specify exactly how a function should be accomplished. The OSI model is an example of a reference model.
A network administrator has a multi-floor LAN to monitor and maintain. Through careful monitoring, the administrator has noticed a large amount of broadcast traffic slowing the network. Which device would you use to best solve this problem? server switch router host
router All hosts within a single LAN belong to one broadcast domain. As the number of hosts increase, it could cause more traffic on the segment and may slow network performance. To solve the performance issue, a router would be the device used to segment the single LAN into multiple LANs.
What information does an Ethernet switch examine and use to build its address table? destination IP address source MAC address destination MAC address source IP address
source MAC address An Ethernet switch examines the source MAC address of an incoming frame. If the source MAC address is not in the MAC address table, the switch will add it to the table with the associated ingress Ethernet port.
What information is added to the switch table from incoming frames? source IP address and incoming port number source MAC address and incoming port number destination IP address and incoming port number destination MAC address and incoming port number
source MAC address and incoming port number A switch "learns" or builds the MAC address table based on the source MAC address as a frame comes into the switch. A switch forwards the frame onward based on the destination MAC address.
Which scenario is suitable for deploying twisted-pair cables? to connect a TV set to the wall plug at home to connect network devices in backbone networks to connect data centers with high bandwidth requirements over long distances to connect PC workstations in an office
to connect PC workstations in an office Ethernet technology generally uses twisted-pair cables to interconnect devices. Because Ethernet is the foundation for most local networks, twisted-pair is the most commonly used type of network cabling for connecting office computers.
An employee is having connectivity issues. Why might a network technician try to ping the default gateway from the employee laptop? to verify connectivity with the device that provides access to remote networks to verify that an IP address was provided by the DHCP server to determine if the laptop address is included in the DNS server to verify that the SVI interface on the switch is configured correctly
to verify connectivity with the device that provides access to remote networks The default gateway address is usually the address of the router interface. The router provides access to remote networks, so a successful ping to the default gateway would mean that the laptop is able to communicate with the router.
A technician is troubleshooting a network connectivity problem. Pings to the local wireless router are successful but pings to a server on the Internet are unsuccessful. Which CLI command could assist the technician to find the location of the networking problem? tracert ipconfig msconfig ipconfig/renew
tracert The tracert utlility (also known as the tracert command or tracert tool) will enable the technician to locate the link to the server that is down. The ipconfig command displays the computer network configuration details. The ipconfig/renew command requests an IP address from a DHCP server. Msconfig is not a network troubleshooting command.
Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.) transport data link physical session network
transport network The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI session layer (with the presentation layer) is included within the TCP/IP application layer.
A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)?(Choose two.) when a host is sending packets to a remote site owned by the manufacturer of the wireless router in order to request a digital copy of the device manual when a host is sending HTTP packets to the wireless router in order to update the network addressing of the LAN when a host is sending packets to the ISP in order to request a speed increase for Internet services when a host is sending a print job to a network printer on the LAN when a host is sending packets to a local server in order to update the network media settings and music playlists
when a host is sending packets to a remote site owned by the manufacturer of the wireless router in order to request a digital copy of the device manual when a host is sending packets to the ISP in order to request a speed increase for Internet services A wireless router will perform Network Address Translation (NAT) whenever a private (local) source IPv4 address is translated to a public (global) address.