Networking FINAL EXAM Modules: 11 - 17 / Group: 4,5,6
Which of these ports are used by FTP?
-20 -21
Which three services are provided by the AAA framework?
-Authentication -Authorization -Accounting
Which elements are required to scale to a larger network?
-Budget -Network Documentation
Which three are transport layer responsibilities?
-Conversation Multiplexing -Segmenting Data and Reassembling Segments. -Tracking Individual Conversations
Which two are protocols that belong in the OSI application layer?
-DNS -SMTP
Which two fields are the same in a TCP and UDP header?
-Destination Port Number -Source Port Number
Which two applications would use the TCP transport layer protocol?
-FTP -HTTP
Which three protocols or standards are used at the application layer of the TCP/IP model?
-HTTP -GIF -MPEG
Which three options are major issues associated with IPv4?
-IP Address Depletion -Increased Network Complexity and internet routing table expansion -Lack of end -to-end connectivity
Which two options are improvements provided by IPv6 as compared to IPv4?
-Increased the IP address space. -Uses a simple header to provide improved packet handling.
Which is true of the IPv6 header?
-It consists of 40 octets. -It contains 8 header fields.
Which two ICMPv6 messages are used in to determine the MAC address of a known IPv6 address?
-Neighbor Advertisement -Neighbor Solicitation
Which two parts are components of an IPv4 address?
-Network portion -Host portion
Which two statements are correct about private IPv4 addresses?
-Private IPv4 addresses are assigned to devices within an organization's intranet (internal network). -Any organization (home, school, office, company) can use the 10.0.0.0/8 address.
Which two operations are provided by TCP but not by UDP?
-Retransmitting any unacknowledged data -Acknowledging received data
Which two ICMPv6 messages are used in SLAAC?
-Router Advertisement -Router Solicitation
Which two ICMPv6 messages are used during the Ethernet MAC address resolution process?
-Router Solicitation -Neighbor Advertisement
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices?
-SYN -ACK
Which two network protocols are used to establish a remote access network connection to a device?
-Secure Shell (SSH) -Telnet
Which two applications would use the UDP transport layer protocol?
-TFTP -VOIP
Which two statements are correct about public IPv4 addresses?
-To access a device over the internet, the destination IPv4 address must be public access. -Public IPv4 address exhausted is a reason why there are private IPv6
Which two commands could be entered on a Windows host to view its IPv4 and IPv6 routing table?
-netstat -r -route print
Which IPv4 address can a host use to ping the loopback interface?
127.0.0.1
Which number or set of numbers represents a socket?
192.168.1.1:80
Which subnet mask would be used if 5 host bits are available?
255.255.255.224
Which subnet mask would be used if exactly 4 host bits are available?
255.255.255.240
Which device is used by other network devices to authenticate and authorize management access?
AAA Server
Which of the following DNS record types is used to resolve IPv6 addresses?
AAAA
Which statement is true about ARP?
ARP entries are cached temporarily
Which is appropriate for providing endpoint security?
Antivirus Software
Which TCP/IP model layer is closest to the end user?
Application
Which statement regarding the service password-encryption command is true?
As soon as the service password-encryption
Which delivery method does not guarantee that the packet will be delivered fully without errors?
Best Effort
Which peer-to-peer application allows users to share pieces of many files with each other at the same time?
BitTorrent
Which address type is not supported in IPv6?
Broadcast
Which statement is true about CDP on a Cisco device?
CDP can be disabled globally or on a specific interface.
Which factor must be considered when selecting network devices?
Cost
Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?
DHCP
Which layer is responsible for taking an IP packet and preparing it for transmission over the communications medium?
Data Link Layer
Which field in an IPv4 packet header will typically stay the same during its transmission?
Destination Address
Which information is used by routers to forward a data packet toward its destination?
Destination IP Address
Which of the following techniques use native IPv6 connectivity?
Dual Stack
Which benefit does SSH offer over Telnet for remotely managing a router?
Encryption
Which IPv6 network prefix is only intended for local links and can not be routed?
FE80::/10
Which destination address is used in an ARP request frame?
FFFF.FFFF.FFFF
Which component is designed to protect against unauthorized communications to and from a computer?
Firewall
Which device controls traffic between two or more networks to help prevent unauthorized access?
Firewall
Which part of a GUA is assigned by the ISP?
Global Routing Prefix
Which protocol uses encryption?
HTTPS
Which field is used to detect corruption in the IPv4 header?
Header Checksum
Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?
Hop Limit
Which protocol is used by IPv4 and IPv6 to provide error messaging?
ICMP
Which protocol provides feedback from the destination host to the source host about errors in packet delivery?
ICMP
Which statement accurately describes a characteristic of IPv4?
IPv4 has a 32-bit address space
Which TCP header statement is true?
It consists of 10 fields in a 20 byte header
Which is a feature of IMAP?
It downloads a copy of email messages leaving the original on the server
Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?
It sends the frame to all ports except the port on which it received the frame.
Which statement about host forwarding decisions is true?
Local hosts can reach each other without the need of a router.
Which dynamic addressing method for GUAs is the one where devices rely solely on the contents of the RA message for their addressing information?
Method 1: SLAAC
Which dynamic addressing method for GUAs is the one where devices get their IPv6 configuration in a RA message and request DNS information from a DHCPv6 server?
Method 2: SLAAC and Sateless DHCPv6
Which dynamic addressing method for GUAs is the one where devices rely solely on a DHCPv6 server for their addressing information?
Method 3: Stateful DHCPv6
Which of the following DNS resource record types resolves authoritative name servers?
NS
Which element of scaling a network involves identifying the physical and logical topologies?
Network Documentation
Which protocol can be used to transfer messages from an email server to an email client?
POP3
Which field includes common values such as ICMP (1), TCP (6), and UDP (17)?
Protocol
Which router component holds the routing table, ARP cache, and running configuration file?
RAM
Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?
RIRs
Which network design consideration would be more important to a large corporation than to a small business?
Redundancy
Which devices will not forward an IPv4 broadcast packet by default?
Router
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 30 attempts 2 within 10
Which command is used to encrypt all passwords in a router configuration file?
Router_A (config) # service password-encryption
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
SMB
Which control bit flags are used during the three-way handshake?
SYN and ACK
Which of the following would be valid source and destination ports for a host connecting to an email server?
Source: 49152, Destination: 25
Which of the following would be valid source and destination ports for a host connecting to a DNS server?
Source: 49152, Destination: 53
Which field in an IPv6 GUA is used for subnetting?
Subnet ID
Which is true of the IPv6 packet header?
The Hop Limit Field Replaces the IPv4 Time to Live field.
Which characteristic describes an IPv6 enhancement over IPv4?
The IPv6 header is simpler than the IPv4 header is, which improves packet handling.
Which statement is true about FTP?
The client can download data from or upload data to the server.
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
The client randomly selects a source port number.
Which of the following is displayed by the nslookup utility?
The configured default DNS server
Which default gateway statement is true?
The default gateway address is the IP address of the router on the local network
Which characteristic describes the default gateway of a host computer?
The logical address of the router interface on the same network as the host computer.
Which statement correctly relates to a small network?
The majority of businesses are small.
Which statement is true about variable-length subnet masking?
The size of each subnet may be different, depending on requirements.
Which statement is correct about IPv4 packet header fields?
The source and destination IPv4 addresses remain the same while traveling from source to destination.
Which is a characteristic of static routes?
They are manually configured
Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?
Time Exceeded
Which OSI layer sends segments to be encapsulated in an IPv4 or IPv6 packet?
Transport Layer
Which layer is responsible for establishing a temporary communication session between the source and destination host applications?
Transport Layer
Which of the following is a stateless best-effort delivery transport layer protocol?
UDP
Which of the following is a feature of the Gnutella protocol?
Users can share whole files with other users.
Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?
Validation
Which port group includes port numbers for FTP, HTTP, and TFTP applications?
Well-Known Ports
Which software installed on key hosts can reveal the types of network traffic flowing through the network?
Wireshark
Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?
Worm
Which command can be used on a Windows host to display the routing table?
netstat -r
Which command can be used to test connectivity between two devices using echo request and echo reply messages?
ping
Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?
privileged EXEC mode
Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?
show ip interface brief