cisco 1 v5.1 final exam 26-52
.com
Which domain name would be an example of a top-level domain?
The address is returned to the pool for reuse when the lease expires.
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
255.255.255.128
A site administrator has been told that a particular network at the site must accommodate 126 hosts. Which subnet mask would be used that contains the required number of host bits?
nslookup
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?
the destination port number
A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?
DHCP
A wireless host needs to request an IP address. What protocol would be used to process the request?
62
How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?
The administrator will be presented with the R1> prompt.
Refer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?
10.0.0.0/8 172.16.0.0/12 192.168.0.0/16
What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)
A single packet can be sent to a group of hosts. Multicast transmission can be used by routers to exchange routing information. Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255.
What are three characteristics of multicast transmission? (Choose three.)
to retain contents when power is removed to store the startup configuration file
What are two functions of NVRAM? (Choose two.)
routing packets toward the destination encapsulating PDUs from the transport layer
What are two services provided by the OSI network layer? (Choose two.)
to identify missing segments at the destination to reassemble the segments at the remote location
What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)
resource sharing without a dedicated server
What is a key characteristic of the peer-to-peer networking model?
203.0.113.211
What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?
2001:0:0:abcd::1
What is the most compressed representation of the IPv6 address 2001:0000:0000:abcd:0000:0000:0000:0001?
It converts IPv6 packets into IPv4 packets.
What purpose does NAT64 serve in IPv6?
login block-for 60 attempts 5 within 60
When applied to a router, which command would help mitigate brute-force password attacks against the router?
malware that was written to look like a video game
Which example of malicious code would be classified as a Trojan horse?
FE80::/10
Which range of link-local addresses can be assigned to an IPv6-enabled interface?
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
Which scenario describes a function provided by the transport layer?
The size of each subnet may be different, depending on requirements.
Which statement is true about variable-length subnet masking?
192.168.1.64/26
Which subnet would include the address 192.168.1.96 as a usable host address?
compression encryption
Which two tasks are functions of the presentation layer? (Choose two.)