Annex A final study guide
What security solutions are most likely to only be used in a corporate environment?
* Antivirus and Antispyware * Firewall Filtering * Dedicated Firewall Systems * Access Control Lists (ACL) * Intrusion Prevention Systems (IPS) * Virtual Private Networks (VPN)
What are characteristics of multicast transmission?
*A single packet can be sent to a group of hosts. *Multicast transmission can be used by routers to exchange routing information. *Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255
What are characteristics of fiber-optic cable?
*Core: Pure Glass *Cladding: Mirror *Jacket: protects the core and cladding
What are two characteristics of peer-to-peer networks? (Choose two.)
*Decentralized Resources *Resource sharing without a dedicated server
What items are contained in an Ethernet header and trailer?
*Inside the Header: MAC Address *Inside the Trailer: CRC (Cyclic Redundancy Check)
What services are provided by the OSI network layer?
*routing packets toward the destination *encapsulating PDUs from the transport layer
You notice that the network throughput appears lower than the bandwidth expected. Which factors could influence the differences in throughput?
*the amount of traffic that is currently crossing the network *the type of traffic that is crossing the network *the latency that is created by the number of network devices that the data is crossing
What are ways that TCP uses the sequence numbers in a segment?
*to identify missing segments at the destination *to reassemble the segments at the remote location
What would be an example of a top-level domain?
.com
If you must provide for 126 hosts. Which subnet mask would be used?
/25
What is the dotted decimal representation of the IPv4 address which is represented in binary string of 00001010.01100100.00010101.00000001?
10.100.21.1
What IPv4 address is a loopback address that can be pinged to test the local TCP/IP configuration?
127.0.0.1
What is the dotted decimal representation of the IPv4 address 11001011.10101001.01110001.11010011?
203.169.113.211
What method is used to manage contention-based access on a wireless network?
CSMA/CA
What data link layer media access control method does Ethernet use?
Contention based access or CSMA/CD
What protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?
DNS
What are the functions of the data link layer?
Exchange of frames between nodes, allows upper layers access to media, and controls how data is placed and received on the media
What tasks are functions of the presentation layer?
Formatting, Compressing, and Encrypting data
What scenario describes a function provided by the transport layer?
Having two separate web browsers and pages open and traffic getting directed to the correct place
What is a characteristic of the LLC sublayer?
It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media
What addresses are mapped by ARP?
MAC address to an IP address
What are the benefits of using cloud computing in networking?
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
What tool can be implemented in a small network to help minimize network latency for real-time streaming applications?
QoS quality of service
What type of attack may involve the use of tools such as nslookup and fping?
Reconnaissance attack
What frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?
Store-and-forward
What utility is available on a Windows PC to view current running applications and processes?
Task manager
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
The address is returned to the pool for reuse when the lease expires.
Describe variable-length subnet masking?
The size of each subnet may be different, depending on requirements
What is stored in the NVRAM of a Cisco router?
The start up config
Describe port numbers?
Way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server
What things can be determined when given an IP address and subnet mask of an attached network device?
Whether it is a Network, Host, or Broadcast address
What is a characteristic of a fault tolerant network?
a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure
What is a characteristic of UTP cabling?
cancellation
Networks change the way we do what?
communicate
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?
discard the Frame
You would like to determine the path a packet takes to reach the destination 192.168.1.1. What is the best command to determine the network path?
ipconfig 192.168.1.1
What command would help lessen brute-force password attacks against the router?
login block-for 60 attempts 5 within 60
What are examples of malicious code that could be classified as a Trojan horse?
malware that was written to look like a video game
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?
nslookup
What topology provides high availability and connects some, but not all, remote sites?
partial mesh
In what type of network do devices operate as both clients and servers?
peer to peer
What applications or services allow hosts to act as client and server at the same time?
peer-to-peer
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
physical layer
What type of attack involves the unauthorized discovery and mapping of network systems and services?
reconnaissance attack
What is a key characteristic of the peer-to-peer networking model?
resource sharing without a dedicated server
What type of physical topology can be created by connecting all Ethernet cables to a central device?
star topology
A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?
the destination port number
What are functions of NVRAM?
to retain contents when power is removed, and to store the startup configuration file
A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What types of network services is the network administrator trying to accommodate?
voice and video