Final exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is an accurate description of redundancy?

designing a network to use multiple paths between switches to ensure there is no single point of failure

What is the role of an IPS?

detecting and blocking of attacks in real time

A message is sent to all hosts on a remote network. Which type of message is it?

directed broadcast

What are the three IPv6 addresses displayed when the route from PC1 to PC2 is traced? (Choose three.)

2001:DB8:1:1::1 2001:DB8:1:2::1 2001:DB8:1:3::2

What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?

2001:DB8:BC15:A

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

2001:db8::a0b0:8:1

Which address prefix range is reserved for IPv4 multicast?

224.0.0.0 - 239.255.255.255

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

vty ports console ports

A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?

when the value of the Hop Limit field reaches zero

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

1022

What is the prefix length notation for the subnet mask 255.255.255.224? /25 /26 /28 /27

/27

Which application layer protocol uses message types such as GET, PUT, and POST?

HTTP

Consider the following range of addresses:2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:00A2:0000::...2001:0DB8:BC15:00AF:0000::The prefix-length for the range of addresses is

/60

Which three statements describe a DHCP Discover message? (Choose three.)

1) All hosts receive the message, but only a DHCP server replies. 2) The message comes from a client seeking an IP address. 3) The destination IP address is 255.255.255.255.

Which three fields are used in a UDP segment header? (Choose three.)

1) Checksum 2) Length 3) Source Port

Which two protocols may devices use in the application process that sends email? (Choose two.)

1) DNS 2) SMTP

Which two characteristics are associated with UDP sessions? (Choose two.)

1) Destination devices receive traffic with minimal delay. 2) Received data is unacknowledged.

Which three application layer protocols use TCP? (Choose three.)

1) FTP 2) SMTP 3) DHCP

A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. (Not all options are used.)

1) The client sends FIN. 2) The server sends ACK. 3) The server sends FIN. 4) client sends Ack

Which two types of applications are best suited for UDP? (Choose two.)

1) applications that handle reliability themselves 2) applications that can tolerate some data loss, but require little or no delay

What are two characteristics of peer-to-peer networks? (Choose two.)

1) decentralized resources 2) resource sharing without a dedicated server

Which two fields are included in the TCP header but not in the UDP header? (Choose two.)

1) window 2) sequence number

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

1)session layer 2) application layer 3) presentation layer

Identify the steps needed to configure a switch for SSH. The answer order does not matter. (Not all options are used.)

1. Create a local user 2. Generate RSA 3. Configure a domain name 4. Use `transport input ssh` command 5. Use `login local` command

A client creates a packet to send to a server. The client is requesting SNMP service. What number will be used as the destination port number in the sending packet?

161

What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)

192.168.0.0/16,10.0.0.0/8,172.16.0.0/12

Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network.

192.168.0.192 /27 - Network C 192.168.0.0 /25 - Network A 192.168.0.128 /26 - Network B 192.168.0.224 /30 - Network D

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

Which three addresses are valid public addresses? (Choose three.)

198.133.219.17 128.107.12.117 64.104.78.227

Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?

3FFE:1044:0:0:AB::57

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?

6001

How many host addresses are available on the 192.168.10.128/26 network?

62

What is the usable number of host IP addresses on a network that has a /26 mask?

62

Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate?

A router along the path did not have a route to the destination.

Which scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window

What is an example of network communication that uses the client-server model?

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

ACK

What do the client/server and peer-to-peer network models have in common?

Both models support devices in server and client roles

What is true about the Server Message Block protocol?

Clients establish a long term connection to servers. Navigation Bar

Which network service automatically assigns IP addresses to devices on the network?

DHCP

Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?

DNS

Match the type of information security threat to the scenario. (Not all options are used.) information theft identity theft data loss disruption of service

Data Loss-Installing virus code to destroy surveillance recordings for certain days Identity Theft-Pretending to be someone else by using stolen personal information to apply for a credit card Disruption of Service-Preventing users from accessing a website by sending a large number of link requests in a short period Information Theft-Obtaining trade secret documents illegally

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

By following a structured troubleshooting approach, a network administrator identified a network issue after a conversation with the user. What is the next step that the administrator should take?

Establish a theory of probable causes.

Which address is a valid IPv6 link-local unicast address?

FE80::1:4545:6578:ABC1

When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)

Generate the asymmetric RSA keys. Configure the correct IP domain name. Create a valid local username and password database.

Which protocol is used by a client to communicate securely with a web server?

HTTPS

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

ICMP

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?

ICMPv6

How are port numbers used in the TCP/IP encapsulation process?

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

An administrator decides to use "pR3s!d7n&0" as the password on a newly installed router. Which statement applies to the password choice?

It is strong because it uses a minimum of 10 numbers, letters and special characters.

What does a client do when it has UDP datagrams to send?

It just sends the datagrams.

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?

Nothing can be determined for sure at this point.

Which applications or services allow hosts to act as client and server at the same time?

P2P applications

Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?

SLAAC

What is the advantage of using SSH over Telnet?

SSH provides secure communications to access hosts.

Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?

Something is causing a time delay between the networks.

Three methods allow IPv6 and IPv4 to co-exist. Match each method with its description. (Not all options are used.)

The IPv4 packets and IPv6 packets coexist in the same network: dual-stack The IPv6 packet is transported inside an IPv4 packet: tunneling IPv6 packets are converted into IPv4 packets, and vice versa: translation

An employee complains that a Windows PC cannot connect to the Internet. A network technician issues the ipconfig command on the PC and is shown an IP address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.)

The PC cannot contact a DHCP server. The PC is configured to obtain an IP address automatically.

A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?

The network administrator wants to verify Layer 2 connectivity.

A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?

This is a private IP address.

Which statement describes the ping and tracert commands?

Tracert shows each hop, while ping shows a destination reply only.

Which field in the TCP header indicates the status of the three-way handshake process?

control bits

A student wants to save a router configuration to NVRAM. What is the best command to use to accomplish the task?

copy running-config startup-config

What is the difference between a virus and a worm?

Worms self-replicate but viruses do not.

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

all IPv6 enabled devices on the local link​ or network

Refer to the exhibit. Host H3 is having trouble communicating with host H1. The network administrator suspects a problem exists with the H3 workstation and wants to prove that there is no problem with the R2 configuration. What tool could the network administrator use on router R2 to prove that communication exists to host H1 from the interface on R2, which is the interface that H3 uses when communicating with remote networks?

an extended ping

A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?

an increase in host-to-host ping response times

Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?

anycast

Why does HTTP use TCP as the transport layer protocol?

because HTTP requires reliable delivery

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

client/server

Match each IPv4 address to the appropriate address category. (Not all options are used.)

host address: 192.168.100.161/25 203.0.113.100/24 network address: 10.10.10.128/25 172.110.12.64/28 broadcast address: 192.168.1.191/26 10.0.0.159/27

What type of IPv6 address is FE80::1?

link-local

Match each description with an appropriate IP address. (Not all options are used.)

link-local address --> 5 (169.254.1.5) public address --> 4 (198.133.219.2) experimental address --> 3 (240.2.6.255) loopback address --> 1 (127.0.0.1)

What feature of SSH makes it more secure than Telnet for a device management connection?

login information and data encryption

What are two types of IPv6 unicast addresses? (Choose two.)

loop back link-local

Which attack involves a compromise of data that occurs between two end points?

man-in-the-middle attack

Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is?

nslookup

A host is transmitting a unicast. Which host or hosts will receive it?

one specific host

In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?

peer-to-peer.

A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 4 . What does this code represent?

port unreachable

What kind of port must be requested from IANA in order to be used with a specific application?

registered port

What is a key characteristic of the peer-to-peer networking model?

resource sharing without a dedicated server

What information is used by TCP to reassemble and reorder received segments?

sequence numbers.

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices?

show cdp neighbors detail

Which command can an administrator execute to determine what interface a router will use to reach remote networks?

show ip route

A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?

ssh

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

stateful packet inspection

Match the description to the type of firewall filtering. (Not all options are used.)

stateful packet inspection:=prevents or allows access based on weather the traffic is in response to requests from internal hosts URL filtering:=prevents or allows access based on web addresses or keywords application filtering:=prevents or allows allows access based on the port numbers used in the request packet filtering:=prevents or allows access based on the IP or MAC addresses of the source and destination

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?

subnetwork 192.168.1.64 subnet mask 255.255.255.192

Match each weakness with an example. (Not all options are used.)

technological weakness-a network engineer is examining the operating system of a network device for vulnerabilities configuration weakness-when implementing an access list on a router, a network engineer did not filter a type of malicious traffic security policy weakness-the network administrator did not fully consider the implications of unauthorized users accessing the network

Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?

terminal monitor

What source IP address does a router use by default when the traceroute command is issued?

the IP address of the outbound interface

What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?

the MAC address of the IPv6 enabled interface

What type of information is contained in a DNS MX record?

the domain name mapped to mail exchange servers.

What is the purpose of a small company using a protocol analyzer utility to capture network traffic on the network segments where the company is considering a network upgrade?

to document and analyze network traffic requirements on each network segment

Why would a network administrator use the tracert utility?

to identify where a packet was lost or delayed on a network

What is the function of the HTTP GET message?

to request an HTML page from a web server

What is the purpose of the network security authentication function?

to require users to prove who they are

Which command has to be configured on the router to complete the SSH configuration?

transport input ssh


Kaugnay na mga set ng pag-aaral

Ch2. Field Underwriting, Application, Premiums, Receipts

View Set

NURS 220 Final Video Questions, Evolve quiz questions, and prep work quiz questions

View Set

U.S. Government: Chapter Three Review and Study Guide

View Set

Quiz 2: U.S. States, Capital Cities, and the Global Traveler

View Set