Internetworking 1 Fall Final Exam Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

{EXTRA} Which IP addresses are private? (THREE!)

- 10.1.1.1 - 172.16.4.4 - 192.168.5.5

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

- A frame with the destination MAC address of RouterA. - A packet with the destination IP address of ServerB.

A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

- DNS server - default gateway

What three statements describe features or functions of media access control? (Choose three.)

- It is responsible for detecting transmission errors in transmitted data. - Data link layer protocols define the rules for access to different media. - Ethernet utilizes CSMA/CD.

Which two statements are true about routers and switches? (Choose two.)

- Switches and routers filter collisions. - A switch uses MAC addresses to build a forwarding table, whereas a router uses information learned about IP networks to build its routing table.

Which three statements characterize the transport layer protocols? (Choose three.)

- TCP and UDP port numbers are used by application layer protocols. - TCP uses windowing and sequencing to provide reliable transfer of data. - TCP is a connection-oriented protocol. UDP is a connectionless protocol.

What data would be saved and where would the data be placed if a network administrator issued the following command? (Choose two.)

- The data to be saved is the configuration that is stored in NVRAM. - The data will be saved to a TFTP server.

What three primary functions does data link layer encapsulation provide? (Choose three.)

- addressing - error detection - frame delimiting

What are the three parts of an IPv6 global unicast address? (Choose three.)

- global routing prefix - subnet ID - interface ID

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

- greater distances per cable run - limited susceptibility to EMI/RFI - greater bandwidth potential

What are two characteristics of a scalable network? (Choose two.)

- grows in size without impacting existing users - contains modular devices that allow for expansion

Which two items are parts of a socket? (Choose two.)

- host IP address - port number

Which two functions are primary functions of a router? (Choose two.)

- packet switching - path selection

Which of the following are functions of NVRAM? (Choose two.)

- retains contents when power is removed - stores the startup configuration file

What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

- to identify missing segments at the destination - to reassemble the segments at the remote location

What are two actions performed by a Cisco switch? (Choose two.)

- using the source MAC addresses of frames to build and maintain a MAC address table - utilizing the MAC address table to forward frames via the destination MAC address

Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.)

- video - voice

A host PC just attempted to lease an address with DHCP. Which messages are broadcasted? (TWO!)

1. DHCPDISCOVER 2. DHCPREQUEST

{STUDY} What are the three primary functions provided by layer 2 data encapsulation? (THREE!)

1. Data link layer addressing 2. Detection of errors through CRC calculations 3. Conversions of bits into data signals

For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (THREE!)

1. It can rapidly adapt to the loss of data transmission facilities. 2. It efficiently utilizes the network infrastructure to transfer data. 3. Data packets can travel multiple paths through the network simultaneously.

* Wireshark output * What acknowledged segment number will the host will return?

306

A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?

4

{EXTRA} Which area would most likely be an extranet for the company network?

Area C

Which media access method requires that an end device send a notification?

CSMA/CA

Matching: Copper cable / Fibre optic / Wireless Options: - long-haul networks - horizontal cable structure - waiting rooms in hospital - backbone cabling in an enterprise - guests access at coffee shop - desktop PC to enterprise office

Copper cable - desktop PC to enterprise office - long-haul networks Fibre optic - horizontal cable structure - backbone cabling in an enterprise Wireless - guests access at coffee shop - waiting rooms in hospital

What can be determined when a network technician issues the command ipconfig /all on a Windows XP PC?

DHCP lease information

A home user is looking for... high speed transmission over regular phone lines.

DSL

Which field in an IPv4 packet header stays the same during transmission?

Destination address

Which function is provided by TCP?

Detection of missing packets

In performing protocol analysis when should traffic be captured?

During hours of peak network use

What is a characteristic of a scalable network?

Easy expansion

To boot a Cisco integrated services router from a USB flash drive requires that the drive be formatted with what file system?

FAT16

What IPv6 prefix is designed for use as internally routable private address space?

FC00::/7

What is a characteristic of end-to-end?

Files may traverse multiple paths to reach the destination

Correct order for PDU encapsulation.

Frame header, Network header, Transport header, Data, Frame trailer

What will happen if the default gateway is incorrect?

Host cannot communicate with hosts in other networks.

{STUDY} What is the most effective way to mitigate worm and virus attacks?

Install security updates to patch

Ctrl-shift-6 key?

Interupts the ping process

{EXTRA} What is an important function of the physical layer of the OSI model?

It encodes frames into electrical, optical, or radio, wave signals

What will a layer 2 switch do when a destination MAC address is not in the MAC table?

It forwards the frame out of all ports except the port at which the frame was received

Which statement describes a characteristic of the traceroute utility?

It identifies the routers in the path from a source host to a destination host.

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

{EXTRA} Consider IP address configuration from PC1

It is the IP address of the Router1 interface that connects to PC1 LAN to router.

{STUDY} What is a characteristic of the LLC sublayer?

It places information in the frame that allows multiple layer 3 protocols to use the same network interface and media

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

It will discard the frame.

[ ] [ ] > { } - { } < [ ] [ ] ping to PC3 issued from PCs 0, 1, and 2 in that order. Which MAC address will be contained in S1 for Fa 0/1 ?

Just PC0 and PC1 MAC address

Which devices should be secured to mitigate against MAC address spoofing attacks?

Layer 2 devices

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

Matching: Link-Local / Multicast / Global Unicast Options ( one unused ) : - FE80:0:56BA:FEEE:A0BA:47FF:FE36:532B - FF02::2 - 2001:DB8:A1:0B:C76::1 - ::1/128 - FF02::1:FF3A:25:C9 - FE80::1 - 2001:DB8:10::12

Link-Local - FE80:0:56BA:FEEE:A0BA:47FF:FE36:532B - FE80::1 - ( prefix FE80: ) Multicast - FF02::1:FF3A:25:C9 - FF02::2 - ( prefix FF02: ) Global Unicast - 2001:DB8:A1:0B:C76::1 - 2001:DB8:10::12 - ( prefix 2001: ) Unused - ::1/128

Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Locate and load the startup-config file from NVRAM.

Which address on a PC does not change?

MAC address

https://assessment.netacad.net/assessment/images/24653.jpg * Refer to the exhibit. * A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem?

Move the cable to the router console port.

Fill in the blank: Data communications a host may need to send message to a group in the form of ___

Multicast

Which design has the most networks?

N shaped network https://assessment.netacad.net/assessment/images/i206402v1n1_206402-A.png

Which service will translate private internal IP addresses into Internet routable public IP addresses?

NAT

Which technology provides a solution to IPv4 addressing depletion... Allowing multiple devices to use one public IP?

NAT

Which default order will a router search for startup config info?

NVRAM, TFTP, Setup Mode

Technician uses ping 127.0.0.1 command.

The TPC/IP stack on the network host

https://assessment.netacad.net/assessment/images/i208702v1n1_208702.jpg * Refer to the exhibit. * What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?

The administrator will be presented with the R1> prompt.

* Memory analysis * Refer to the exhibit. what is the significance of the asterisk ( * ) in the exhibited output?

The asterisk designates which file system is default.

{STUDY} What is the auto-MDIX feature on a switch?

The automatic config of an interface for a straight-through or crossover Ethernet cable connection

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM.

To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?

The configuration should have been copied to the running configuration instead.

Authorized access only! router> * Refer to the exhibit. * From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command * # banner motd V Authorized access only! Violators will be prosecuted! V * When users log in using Telnet, the banner does not appear correctly. What is the problem?

The delimiting character appears in the banner message.

# copy running-config startup-config

The new configuration will be loaded if the switch restarts

Three bank employees... QoS?

audio, financial, web

https://assessment.netacad.net/assessment/images/i208694v1n1_header.jpg * Refer to the exhibit. * Which layer of the OSI model would format data in this way?

data link

Fill in the blank. Do not abbreviate. Use lower case. Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode? ​

no switchport

An application software company has just purchased a small multimedia development studio and a small advertising firm. Because of corporate mergers and corporate administration turnover, the IP addressing scheme redesign has not yet occurred and available network addresses are tight. What will be the biggest concern when the network administrator is making the IP addressing scheme adjustment to bring these two companies onto the corporate network?

number of current hosts at each site

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the secret keyword that is displayed on the web page?

packet

A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

partial mesh

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

physical layer

Which connection provides a secure CLI session with encryption?

An SSH connection

Which two describe a router memory type and contents? (TWO!)

1. RAM is volatile and stores IP routing table 2. ROM is nonvolatile and contains basic diagnostic software

Open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which information is obtained from this command output?

10.20.20.3, non-authoritative answer

What is he range of host IP addresses for the subnet 172.16.1.32/29 ?

172.16.1.33 - 172.16.1.38

Which IP address is a valid host address?

172.16.4.255/22

The IP addressing policy of a company dictates that the last usable host address in each subnet is reserved for the default gateway. For the subnet 192.168.1.0/27, what will be the address of the default gateway?

192.168.1.30

Which subnet would include the address 192.168.1.96 as a usable host?

192.168.1.64/26

{EXTRA} * R1# copy running-config tftp * What IP should be entered?

192.168.11.252

A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks?

192.168.99.0/26 192.168.99.64/27

{MEMORIZE PLEASE} PT: Which IPv6 address is assigned to serial 0/0/0 an interface RT2

2001:db8:abc:5::1

[100 hosts] [500 hosts] [25 hosts] [50 hosts] * Refer to the exhibit. * Using VLSM, what is the largest and smallest subnet mask required on this network in order to minimize address waste?

255.255.254.0 and 255.255.255.252

The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create?

4096

A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?

6,001

An organization received the IPv6 prefix 2001:db8:1234::148 from an ISP. How many subnets?

65536

https://assessment.netacad.net/assessment/images/i204753v1n2_Question%209.png Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate?

A router along the path did not have a route to the destination.

How does a layer 3 switch differ from a layer 2 switch?

An IP address can be assigned to a physical port of a layer 3 switch, however this is not supported in layer 2 switches.

Where do most Cisco switches and Routers run the IOS?

RAM

A network admin is checking logs and sees unusual connectivity to multiple well know ports on a server. What kind of potential network attack could this indicate?

Reconaissance

What is the purpose of having a converged network?

Reduce the cost

{STUDY} Which describes TCP/IP encapsulation?

Segments are sent from the transport layer to the internet layer

{EXTRA} { } { } - [] - { } { } Refer to the exhibit. Which IP addressing scheme should be changed?

Site 2

Switch(config)# hostname My Switch

Switch(config)#

* IP configuration * A user is configuring a PC with the IP address displayed. what is the problem?

The IP address is not a usable host address.

A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says "This connection has limited or no connectivity." The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem?

The workstation is unable to obtain an IP address from a DHCP server.

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command prevents someone from viewing the running configuration passwords.

A PC is configured to obtain an IP address automatically. arp -a is used an sees 192.168.1.255 ff-ff-ff-ff-ff-ff . What is this?

This is a static map entry

{EXTRA} A frame is transmitted. Why does the receiving device check the FCS field in the frame?

To check the frame for possible transmission errors

{STUDY} What is the purpose of ICMP messages?

To provide feedback of IP packet transmission

What is the purpose of the routing process?

To select the paths that are used to direct traffic to destination networks.

Which procedure is used to reduce the effect of crosstalk in copper cables?

Twisting opposing circuit wires pairs together

a VoIP call uses ___ as the layer 4 protocal

UDP

Matching: User Exec Mode / Privileged Exec Mode / Global Config Options ( one unsued ) : - identified by prompting with # char - accessed by "configure terminal" - used to enable the password for vty lines - limited monitory commands - accessed by entering "enable" - first entrance into CLI of IOS devices - changes made affects the operation of device as a whole

User Exec Mode - limited monitory commands - first entrance into CLI of IOS devices Privileged Exec Mode - accessed by entering "enable" - identified by prompting with # char Global Config - changes made affects the operation of device as a whole - accessed by "configure terminal" Unused - used to enable the password for vty lines

Which switch interface would an administrator configure an IP address

VLAN 1

A particular website doesn't respond to windows 7 PC. Which command could show any cached DNS entries on a web page?

ipconfig /displaydns

A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

leased line

Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

line

* config showing the creation of passwords * Which password?

linevtyin

{EXTRA} When applied to a router, which command would mitigate. brute-force password attacks?

login block-for 60 attempts 5 within 60

https://assessment.netacad.net/assessment/images/i206383v1n1_206383.png * Refer to the exhibit. * Which command provides this output?

show version

Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity?

shows the IP address of the next hop router for each route

What information is added during encapsulation at OSI Layer 3?

source and destination IP address

What is one purpose of the TCP three-way handshake?

synchronizing sequence numbers between source and destination in preparation for data transfer

Why are port numbers included in the TCP header of a segment?

to enable a receiving host to forward the data to the appropriate application

Why are the paired wires twisted in a CAT5 cable?

to provide eletromagnetic noise cancellation

{EXTRA} PT: The Server0 message is ___

winner


Kaugnay na mga set ng pag-aaral

Interpersonal Relationships chapter 10

View Set

Fundamentals of Nursing Values, Ethics, and Advocacy

View Set

DRAFTING THE DECLARATION OF INDEPENDENCE

View Set

SBM Chapter 13 - Planning for the Harvest

View Set

Chapters 14 & 16 Adaptive Quizzing

View Set

Exam 2: Mastering Biology Questions

View Set