Module 3 CCNA1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices? FIN ACK SYN RST

ACK

Which destination address is used in an ARP request frame? 1. 0.0.0.0 2. 255.255.255.255 3. FFFF.FFFF.FFFF 4. AAAA.AAAA.AAAA 5. the physical address of the destination host

FFFF.FFFF.FFFF

Which method is used to send a ping message specifying the source address for the ping? 1. Issue the ping command from within interface configuration mode. 2. Issue the ping command without specifying a destination IP address. 3. Issue the ping command without extended commands. 4. Issue the ping command after shutting down un-needed interfaces.

Issue the ping command without specifying a destination IP address.

Which three fields are used in a UDP segment header? (Choose three.) 1. Window Size 2. Length 3. Source Port 4. Acknowledgment Number 5. Checksum 6. Sequence Number

Length Source Port Checksum

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests? 1. The NIC in the PC is bad. 2. The TCP/IP protocol is not enabled. 3. The router that is attached to the same network as the workstation is down. 4. Nothing can be determined for sure at this point.

Nothing can be determined for sure at this point.

Which applications or services allow hosts to act as client and server at the same time? 1. client/server applications 2. email applications 3. P2P applications 4. authentication services

P2P applications

What IPv4 header field identifies the upper layer protocol carried in the packet? 1. Protocol 2. Identification 3. Version 4. Differentiated Services

Protocol

Which two protocols may devices use in the application process that sends email? (Choose two.) 1. HTTP 2. SMTP 3. POP 4. IMAP 5. DNS 6. POP3

SMTP DNS

Which transport layer feature is used to guarantee session establishment? 1. UDP ACK flag 2. TCP 3-way handshake 3. UDP sequence number 4. TCP port number

TCP 3-way handshake

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? 1. The client sets the window size for the session. 2. The client sends an ISN to the server to start the 3-way handshake. 3. The client randomly selects a source port number. 4. The client sends a synchronization segment to begin the session.

The client randomly selects a source port number.

What is the effect of using the Router# copy running-config startup-config command on a router? 1. The contents of ROM will change. 2. The contents of RAM will change. 3. The contents of NVRAM will change. 4. The contents of flash will change.

The contents of NVRAM will change.

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly? 1. Time-to-Live 2. Sequence Number 3. Acknowledgment Number 4. Differentiated Services

Time-to-Live

What is the difference between a virus and a worm? 1. Viruses self-replicate but worms do not. 2. Worms self-replicate but viruses do not. 3. Worms require a host file but viruses do not. 4. Viruses hide in legitimate programs but worms do not.

Worms self-replicate but viruses do not.

What are two characteristics of peer-to-peer networks? (Choose two.) 1. scalability 2. one way data flow 3. decentralized resources 4. centralized user accounts 5. resource sharing without a dedicated server

decentralized resources resource sharing without a dedicated server

Which information is used by routers to forward a data packet toward its destination? 1. source IP address 2. destination IP address 3. source data-link address 4. destination data-link address

destination IP address

Which component is designed to protect against unauthorized communications to and from a computer? 1. security center 2. port scanner 3. antimalware 4. antivirus 5. firewall

firewall

Which term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header? 1. header checksum 2. source IPv4 address 3. protocol 4. TTL

header checksum

When applied to a router, which command would help mitigate brute-force password attacks against the router? 1. exec-timeout 30 2. service password-encryption 3. banner motd $Max failed logins = 5$ 4. login block-for 60 attempts 5 within 60

login block-for 60 attempts 5 within 60

An administrator is troubleshooting connectivity issues and needs to determine the IP address of a website. What is the best command to use to accomplish the task? 1. nslookup 2. show ipv6 route 3. show ipv6 interface 4. copy startup-config running-config

nslookup

Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is? 1. netstat 2. tracert 3. nslookup 4. ipconfig

nslookup

In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used? 1. peer-to-peer 2. client-based 3. master-slave 4. point-to-point

peer-to-peer

Which term describes a field in the IPv4 packet header used to identify the next level protocol? 1. protocol 2. destination IPv4 address 3. source IPv4 address 4. TTL

protocol

Which term describes a field in the IPv4 packet header used to identify the next level protocol? 1. protocol 2. version 3. differentiated services 4. header checksum

protocol

What routing table entry has a next hop address associated with a destination network? 1. directly-connected routes 2. local routes 3. remote routes 4. C and L source routes

remote routes

Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply? 1. the MAC address of S1 2. the MAC address of the G0/0 interface on R1 3. the MAC address of the G0/0 interface on R2 4. the MAC address of S2 5. the MAC address of File_server1

the MAC address of the G0/0 interface on R1

What information about a Cisco router can be verified using the show version command? 1. the routing protocol version that is enabled 2. the value of the configuration register 3. the operational status of serial interfaces 4. the administrative distance used to reach networks

the value of the configuration register

What are two functions of NVRAM? (Choose two.) 1. to store the routing table 2. to retain contents when power is removed 3. to store the startup configuration file 4. to contain the running configuration file 5. to store the ARP table

to retain contents when power is removed to store the startup configuration file

Which two fields are included in the TCP header but not in the UDP header? (Choose two.) 1. window 2. checksum 3. source port 4. destination port 5. sequence number

window sequence number

Which statement is true about Cisco IOS ping indicators? 1. '!' indicates that the ping was unsuccessful and that the device may have issues finding a DNS server. 2. 'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful. 3. '.' indicates that the ping was successful but the response time was longer than normal. 4. A combination of '.' and '!' indicates that a router along the path did not have a route to the destination address and responded with an ICMP unreachable message.​

'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.

Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer? 1. neighbor table 2. ARP cache 3. routing table 4. MAC address table

ARP cache

Which three protocols operate at the application layer of the TCP/IP model? (Choose three.) 1. ARP 2. TCP 3. UDP 4. FTP 5. POP3 6. DHCP

FTP POP3 DHCP

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation? 1. Next Header 2. Flow Label 3. Traffic Class 4. Differentiated Services

Flow Label

Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication? HTTP FTP DNS SMTP

DNS

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.) 1. FTP 2. HTTP 3. DNS 4. SNMP 5. DHCP 6. SMTP

HTTP FTP SMTP

An administrator decides to use "5$7*4#033!" as the password on a newly installed router. Which statement applies to the password choice? 1. It is strong because it contains 10 numbers and special characters. 2. It is weak because it is often the default password on new devices. 3. It is weak since it uses easily found personal information. 4. It is strong because it uses a minimum of 10 numbers, letters and special characters.

It is strong because it contains 10 numbers and special characters

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds? 1. RouterA(config)# login block-for 10 attempts 2 within 30 2. RouterA(config)# login block-for 30 attempts 2 within 10 3. RouterA(config)# login block-for 2 attempts 30 within 10 4. RouterA(config)# login block-for 30 attempts 10 within 2

RouterA(config)# login block-for 30 attempts 2 within 10

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher? 1. peer-to-peer 2. master-slave 3. client/server 4. point-to-point

client/server

Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address? 1. destination IPv4 address 2. protocol 3. TTL 4. header checksum

destination IPv4 address

What is one advantage that the IPv6 simplified header offers over IPv4? 1. smaller-sized header 2. little requirement for processing checksums 3. smaller-sized source and destination IP addresses 4. efficient packet handling

efficient packet handling

Which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities? 1. reconnaissance 2. DoS 3. dictionary 4. man-in-the-middle

reconnaissance

What type of attack may involve the use of tools such as nslookup and fping? 1. access attack 2. reconnaissance attack 3. denial of service attack 4. worm attack

reconnaissance attack

Which command can an administrator issue on a Cisco router to send debug messages to the vty lines? 1. terminal monitor 2. logging console 3. logging buffered 4. logging synchronous

terminal monitor

What is the purpose of the network security accounting function? 1. to require users to prove who they are 2. to determine which resources a user can access 3. to keep track of the actions of a user 4. to provide challenge and response questions

to keep track of the actions of a user

What is the purpose of the network security authentication function? 1. to require users to prove who they are 2. to determine which resources a user can access 3. to keep track of the actions of a user 4. to provide challenge and response questions

to require users to prove who they are

A network technician is troubleshooting an issue and needs to verify all of the IPv6 interface addresses on a router. What is the best command to use to accomplish the task? 1. show ipv6 interface 2. show interfaces 3. show ip nat translations 4. show ip route

show ipv6 interface

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts? 1. stateful packet inspection 2. URL filtering 3. application filtering 4. packet filtering

stateful packet inspection

Which network service automatically assigns IP addresses to devices on the network? 1. DHCP 2. Telnet 3. DNS 4. traceroute

DHCP

Match the description to the type of firewall filtering. (Not all options are used.) 1. stateful packet inspection 2. URL filtering 3. application filtering 4. packet filtering

1. prevents or allows access based on whether the traffic is in response to requests from internal hosts 2. prevents or allows access based on web addresses or keywords 3. prevents or allows access based on the port numbers used in the request 4. prevents or allows access based on the IP or MAC addresses of the source and destination

A client creates a packet to send to a server. The client is requesting SMTP service. What number will be used as the destination port number in the sending packet? 1. 25 2. 443 3. 161 4. 110

25

A client creates a packet to send to a server. The client is requesting HTTPS service. What number will be used as the destination port number in the sending packet? 1. 443 2. 161 3. 110 4. 80

443

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC? 1. 4501 2. 6001 3. 6000 4. 4500

4501

A client creates a packet to send to a server. The client is requesting HTTP service. What number will be used as the destination port number in the sending packet? 1. 80 2. 67 3. 53 4. 69

80

What is an example of network communication that uses the client-server model? 1. A user uses eMule to download a file that is shared by a friend after the file location is determined. 2. A workstation initiates an ARP to find the MAC address of a receiving host. 3. A user prints a document by using a printer that is attached to a workstation of a coworker. 4. A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

What do the client/server and peer-to-peer network models have in common? 1. Both models have dedicated servers. 2. Both models support devices in server and client roles. 3. Both models require the use of TCP/IP-based protocols. 4. Both models are used only in the wired network environment.

Both models support devices in server and client roles.

What is considered the most effective way to mitigate a worm attack? 1. Change system passwords every 30 days. 2. Ensure that all systems have the most current virus definitions. 3. Ensure that AAA is configured in the network. 4. Download security updates from the operating system vendor and patch all vulnerable systems.

Download security updates from the operating system vendor and patch all vulnerable systems.

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.) 1. Fast Ethernet interfaces 2. console ports 3. serial interfaces 4. vty ports 5. loopback interfaces

console ports vty ports

What kind of port must be requested from IANA in order to be used with a specific application? 1. registered port 2. private port 3. dynamic port 4. source port

registered port

What is the complete range of TCP and UDP well-known ports? 1. 0 to 255 2. 0 to 1023 3. 256 - 1023 4. 1024 - 49151

0 to 1023

A network administrator requires access to manage routers and switches locally and remotely. Match the description to the access method. 1. remote access via a dialup connection 2. preferred out-of-band access method 3. remote access method that uses encryption 4. unsecure remote access

1. AUX 2. FTP 3. SSH 4. Telnet

A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. 1. 2. 3. 4.

1. Client sends a FIN 2. server sends an ACK 3. server sends a FIN 4. client sends an ACK

Identify the steps needed to configure a switch for SSH.

1. Create local user 2. generate RSA keys 3. Configure a domain name 4. use login local command 5. use transport input ssh command

Match the configuration mode with the command that is available in that mode. login copy running-config startup-config enable interface fastethernet 0/0

1. R1(config-line)# 2. R1# 3. R1> 4. R1(config)#

Refer to the exhibit. A network administrator is connecting a new host to the Payroll LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? RTR1(config)# interface gi0/1 RTR1(config-if)# RTR1(config-if)# ip address 10.27.15.17 255.255.255.0 RTR1(config-if)# no shutdown RTR1(config-if)# interface gi0/0 RTR1(config-if)# description Connects to the Payroll LAN RTR1(config-if)# ip address 10.27.14.148 255.255.255.0 RTR1(config-if)# no shutdown RTR1(config-if)# interface s0/0/0 RTR1(config-if)# RTR1(config-if)# ip address 10.14.15.254 255.255.255.0 RTR1(config-if)# no shutdown RTR1(config-if)# interface s0/0/1 RTR1(config-if)# description Connects to the Head Office WAN RTR1(config-if)# ip address 203.0.113.39 255.255.255.0 RTR1(config-if)# no shutdown RTR1(config-if)# end 1. 10.27.14.148 2. 10.27.14.1 3. 10.14.15.254 4. 203.0.113.39 5. 10.27.15.17

10.27.14.148

A client creates a packet to send to a server. The client is requesting POP3 service. What number will be used as the destination port number in the sending packet? 1. 110 2. 67 3. 53 4. 69

110

Which IPv4 address can a host use to ping the loopback interface? 1. 126.0.0.1 2. 127.0.0.0 3. 126.0.0.0 4. 127.0.0.1

127.0.0.1

A client creates a packet to send to a server. The client is requesting SNMP service. What number will be used as the destination port number in the sending packet? 1. 161 2. 443 3. 110 4. 80

161

Refer to the exhibit. A user PC has successfully transmitted packets to www.cisco.com. Which IP address does the user PC target in order to forward its data off the local network? 1. 172.24.255.17 2. 172.24.1.22 3. 172.20.0.254 4. 172.24.255.4 5. 172.20.1.18

172.20.0.254

A client creates a packet to send to a server. The client is requesting FTP service. What number will be used as the destination port number in the sending packet? 1. 21 2. 69 3. 67 4. 80

21

A client creates a packet to send to a server. The client is requesting SSH service. What number will be used as the destination port number in the sending packet? 1. 22 2. 69 3. 67 4. 80

22

A client creates a packet to send to a server. The client is requesting telnet service. What number will be used as the destination port number in the sending packet? 1. 23 2. 443 3. 161 4. 110

23

Match each weakness with an example. 1. security policy weakness 2. configuration weakness 3. technological weakness a. A network engineer is examining the operating system of a network device for vulnerabilities. configuration weakness b. When implementing an access list on a router, a network engineer did not filter a type of malicious traffic. security policy weakness c. The network administrator did not fully consider the implications of unauthorized users accessing the network.

3. A network engineer is examining the operating system of a network device for vulnerabilities. configuration weakness 2. When implementing an access list on a router, a network engineer did not filter a type of malicious traffic. security policy weakness 1. The network administrator did not fully consider the implications of unauthorized users accessing the network.

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC? 1. 3001 2. 6001 3. 4500 4. 6000

3001

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received four packets of data from the PC? 1. 6001 2. 3001 3. 1501 4. 1500

6001

A client creates a packet to send to a server. The client is requesting TFTP service. What number will be used as the destination port number in the sending packet? 1. 69 2. 67 3. 53 4. 80

69

Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate? 1. Connectivity to the remote device was successful. 2. A router along the path did not have a route to the destination. 3. A ping packet is being blocked by a security device along the path. 4. The connection timed out while waiting for a reply from the remote device.

A router along the path did not have a route to the destination.

Which scenario describes a function provided by the transport layer? 1. A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network. 2. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header. 3. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window. 4. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

What property of ARP causes cached IP-to-MAC mappings to remain in memory longer? 1. Entries in an ARP table are time-stamped and are purged after the timeout expires. 2. A static IP-to-MAC address entry can be entered manually into an ARP table. 3. The type field 0x806 appears in the header of the Ethernet frame. 4. The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.

Entries in an ARP table are time-stamped and are purged after the timeout expires.

By following a structured troubleshooting approach, a network administrator identified a network issue after a conversation with the user. What is the next step that the administrator should take? 1. Verify full system functionality. 2. Test the theory to determine cause. 3. Establish a theory of probable causes. 4. Establish a plan of action to resolve the issue.

Establish a theory of probable causes.

When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.) 1. Set the user privilege levels. 2. Generate the asymmetric RSA keys. 3. Configure the correct IP domain name. 4. Configure role-based CLI access. 5. Create a valid local username and password database. 6. Manually enable SSH after the RSA keys are generated.

Generate the asymmetric RSA keys. Configure the correct IP domain name. Create a valid local username and password database.

What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza? 1. Ethernet 2. Gnutella 3. POP 4. SMTP

Gnutella

Which application layer protocol uses message types such as GET, PUT, and POST? 1. DNS 2. DHCP 3. SMTP 4. HTTP 5. POP3

HTTP

Which three application layer protocols use TCP? (Choose three.) 1. SMTP 2. FTP 3. SNMP 4. HTTP 5. TFTP 6. DHCP

HTTP FTP SMTP

Which protocol is used by a client to communicate securely with a web server? 1. SMTP 2. SMB 3. IMAP 4. HTTPS

HTTPS

How are port numbers used in the TCP/IP encapsulation process? 1. Source port numbers and destination port numbers are not necessary when UDP is the transport layer protocol being used for the communication. 2. Source port and destination port numbers are randomly generated. 3. If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations. 4. Destination port numbers are assigned automatically and cannot be changed.

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option? 1. It forces the trace to use IPv6. 2. It limits the trace to only 6 hops. 3. It sets a 6 milliseconds timeout for each replay. 4. It sends 6 probes within each TTL time period.

It forces the trace to use IPv6.

An administrator decides to use "pR3s!d7n&0" as the password on a newly installed router. Which statement applies to the password choice? 1. It is strong because it uses a minimum of 10 numbers, letters and special characters. 2. It is weak because it is often the default password on new devices. 3. It is weak since it uses easily found personal information. 4. It is weak since it is a word that is easily found in the dictionary.

It is strong because it uses a minimum of 10 numbers, letters and special characters.

An administrator decides to use "pR3s!d7n&0" as the password on a newly installed router. Which statement applies to the password choice? 1. It is strong because it uses a minimum of 10 numbers, letters and special characters. 2. It is weak since it is a word that is easily found in the dictionary. 3. It is strong because it uses a passphrase. 4. It is strong because it contains 10 numbers and special characters.

It is strong because it uses a minimum of 10 numbers, letters and special characters.

An administrator decides to use "WhatAreyouwaiting4" as the password on a newly installed router. Which statement applies to the password choice? 1. It is strong because it uses a passphrase. 2. It is weak because it is often the default password on new devices. 3. It is weak since it uses easily found personal information. 4. It is weak since it is a word that is easily found in the dictionary.

It is strong because it uses a passphrase.

An administrator decides to use "password" as the password on a newly installed router. Which statement applies to the password choice? 1. It is weak because it is a commonly used password. 2. It is weak since it is a word that is easily found in the dictionary. 3. It is strong because it uses a passphrase. 4. It is strong because it uses a minimum of 10 numbers, letters and special characters.

It is weak because it is a commonly used password.

An administrator decides to use "admin" as the password on a newly installed router. Which statement applies to the password choice? 1. It is weak because it is often the default password on new devices. 2. It is strong because it uses a passphrase. 3. It is strong because it uses a minimum of 10 numbers, letters and special characters. 4. It is strong because it contains 10 numbers and special characters.

It is weak because it is often the default password on new devices.

An administrator decides to use "12345678!" as the password on a newly installed router. Which statement applies to the password choice? 1. It is weak because it uses a series of numbers or letters. 2. It is strong because it uses a passphrase. 3. It is weak since it is a word that is easily found in the dictionary. 4. It is strong because it uses a minimum of 10 numbers, letters and special characters.

It is weak because it uses a series of numbers or letters.

An administrator decides to use "Elizabeth" as the password on a newly installed router. Which statement applies to the password choice? 1. It is weak because it uses easily found personal information. 2. It is strong because it uses a passphrase. 3. It is weak since it is a word that is easily found in the dictionary. 4. It is strong because it uses a minimum of 10 numbers, letters and special characters.

It is weak because it uses easily found personal information

An administrator decides to use "Feb121978" as the password on a newly installed router. Which statement applies to the password choice? 1. It is weak because it uses easily found personal information. 2. It is strong because it uses a passphrase. 3. It is weak since it is a word that is easily found in the dictionary. 4. It is strong because it uses a minimum of 10 numbers, letters and special characters.

It is weak because it uses easily found personal information.

An administrator decides to use "RobErT" as the password on a newly installed router. Which statement applies to the password choice? 1. It is weak since it uses easily found personal information. 2. It is strong because it uses a passphrase. 3. It is strong because it uses a minimum of 10 numbers, letters and special characters. 4. It is strong because it contains 10 numbers and special characters.

It is weak since it uses easily found personal information.

What is an advantage of SMB over FTP?​ 1. Only with SMB can data transfers occur in both directions. 2. Only SMB establishes two simultaneous connections with the client, making the data transfer faster.​ 3. SMB is more reliable than FTP because SMB uses TCP and FTP uses UDP.​ 4. SMB clients can establish a long-term connection to the server.​

SMB clients can establish a long-term connection to the server.​

A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices? 1. FTP 2. HTTP 3. SSH 4. Telnet

SSH

What is the advantage of using SSH over Telnet? 1. SSH is easier to use. 2. SSH operates faster than Telnet. 3. SSH provides secure communications to access hosts. 4. SSH supports authentication for a connection request.

SSH provides secure communications to access hosts.

Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator? 1. Connectivity between H1 and H3 is fine. 2. H3 is not connected properly to the network. 3. Something is causing interference between H1 and R1. 4. Performance between the networks is within expected parameters. 5. Something is causing a time delay between the networks.

Something is causing a time delay between the networks.

An employee complains that a Windows PC cannot connect to the Internet. A network technician issues the ipconfig command on the PC and is shown an IP address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.) 1. The PC cannot contact a DHCP server. 2. The DNS server address is misconfigured. 3. The default gateway address is not configured. 4. The PC is configured to obtain an IP address automatically. 5. The enterprise network is misconfigured for dynamic routing.

The PC cannot contact a DHCP server. The PC is configured to obtain an IP address automatically.

A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers? 1. The network administrator suspects a virus because the ping command did not work. 2. The network administrator wants to verify Layer 2 connectivity. 3. The network administrator wants to verify the IP address configured on router R2. 4. The network administrator wants to determine if connectivity can be established from a non-directly connected network.

The network administrator wants to verify Layer 2 connectivity.

Which statement describes the ping and tracert commands? 1. Tracert shows each hop, while ping shows a destination reply only. 2. Tracert uses IP addresses; ping does not. 3. Both ping and tracert can show results in a graphical display. 4. Ping shows whether the transmission is successful; tracert does not.

Tracert shows each hop, while ping shows a destination reply only.

Refer to the exhibit. Host H3 is having trouble communicating with host H1. The network administrator suspects a problem exists with the H3 workstation and wants to prove that there is no problem with the R2 configuration. What tool could the network administrator use on router R2 to prove that communication exists to host H1 from the interface on R2, which is the interface that H3 uses when communicating with remote networks? 1. traceroute 2. show cdp neighbors 3. Telnet 4. an extended ping

an extended ping

A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue? 1. a change in the bandwidth according to the show interfaces output 2. a next-hop timeout from a traceroute 3. an increase in host-to-host ping response times 4. a change in the amount of RAM according to the show version output

an increase in host-to-host ping response times

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data? 1. internetwork 2. session 3. presentation 4. application 5. network access

application

Why does HTTP use TCP as the transport layer protocol? 1. to ensure the fastest possible download speed 2. because HTTP is a best-effort protocol 3. because transmission errors can be tolerated easily 4. because HTTP requires reliable delivery

because HTTP requires reliable delivery

What is a basic characteristic of the IP protocol? 1. connectionless 2. media dependent 3. user data segmentation 4. reliable end-to-end delivery

connectionless

A student wants to save a router configuration to NVRAM. What is the best command to use to accomplish the task? 1. copy running-config startup-config 2. show interfaces 3. show ip nat translations 4. show ip route

copy running-config startup-config

What is an accurate description of redundancy? 1. configuring a router with a complete MAC address database to ensure that all frames can be forwarded to the correct destination 2. configuring a switch with proper security to ensure that all traffic forwarded through an interface is filtered 3. designing a network to use multiple virtual devices to ensure that all traffic uses the best path through the internetwork 4. designing a network to use multiple paths between switches to ensure there is no single point of failure

designing a network to use multiple paths between switches to ensure there is no single point of failure

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? 1. source MAC address 2. source IP address 3. destination MAC address 4. Ethernet type 5. destination IP address

destination MAC address

What is the role of an IPS? 1. detecting and blocking of attacks in real time 2. connecting global threat information to Cisco network security devices 3. authenticating and validating traffic 4. filtering of nefarious websites

detecting and blocking of attacks in real time

A teacher is having difficulties connecting his PC to the classroom network. He needs to verify that a default gateway is configured correctly. What is the best command to use to accomplish the task? 1. ipconfig 2. copy running-config startup-config 3. show interfaces 4. show ip nat translations

ipconfig

A user wants to know the IP address of the PC. What is the best command to use to accomplish the task? 1. ipconfig 2. copy running-config startup-config 3. show interfaces 4. show ip nat translations

ipconfig

A support technician needs to know the IP address of the wireless interface on a MAC. What is the best command to use to accomplish the task? 1. ipconfig getifaddr en0 2. copy running-config startup-config 3. show interfaces 4. show ip nat translations

ipconfig getifaddr en0

A user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application-aware firewall with intrusion detection capabilities on the ISP connection. The user installs a second firewall to separate the company network from the public network. Additionally, the user installs an IPS on the internal network of the company. What approach is the user implementing? 1. attack based 2. risk based 3. structured 4. layered

layered

What feature of SSH makes it more secure than Telnet for a device management connection? 1. confidentiality with IPsec 2. stronger password requirement 3. random one-time port connection 4. login information and data encryption

login information and data encryption

Which example of malicious code would be classified as a Trojan horse? 1. malware that was written to look like a video game 2. malware that requires manual user intervention to spread between systems 3. malware that attaches itself to a legitimate program and spreads to other programs when launched 4. malware that can automatically spread from one system to another by exploiting a vulnerability in the target

malware that was written to look like a video game

Which attack involves a compromise of data that occurs between two end points? 1. denial-of-service 2. man-in-the-middle attack 3. extraction of security parameters 4. username enumeration

man-in-the-middle attack

Which two functions are primary functions of a router? (Choose two.) 1. packet forwarding 2. microsegmentation 3. domain name resolution 4. path selection 5. flow control

packet forwarding path selection

What is a key characteristic of the peer-to-peer networking model? 1. wireless networking 2. social networking without the Internet 3. network printing using a print server 4. resource sharing without a dedicated server

resource sharing without a dedicated server

The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.) 1. physical 2. session 3. network 4. presentation 5. data link 6. transport 7. application

session presentation application

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) 1. physical layer 2. session layer 3. transport layer 4. application layer 5. presentation layer 6. data link layer

session layer application layer presentation layer

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices? 1. show version 2. show ip route 3. show interfaces 4. show cdp neighbors detail

show cdp neighbors detail

Students who are connected to the same switch are having slower than normal response times. The administrator suspects a duplex setting issue. What is the best command to use to accomplish the task? 1. show interfaces 2. ipconfig getifaddr en0 3. copy running-config startup-config 4. show ip nat translations

show interfaces

A network technician is troubleshooting an issue and needs to verify the IP addresses of all interfaces on a router. What is the best command to use to accomplish the task? 1. show ip interface brief 2. nslookup 3. ipconfig getifaddr en0 4. show ip route

show ip interface brief

Which command can an administrator execute to determine what interface a router will use to reach remote networks? 1. show arp 2. show interfaces 3. show ip route 4. show protocols

show ip route

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task? 1. show running-config 2. show ipv6 route 3. show ipv6 interface 4. copy startup-config running-config

show ipv6 interface

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task? 1. show running-config 2. show interfaces 3. copy running-config startup-config 4. show ip nat translations

show running-config

Which term describes a field in the IPv4 packet header that contains a 32-bit binary value associated with an interface on the sending device? 1. source IPv4 address 2. destination IPv4 address 3. protocol 4. TTL

source IPv4 address

Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH? 1. debug all 2. logging synchronous 3. show running-config​ 4. terminal monitor

terminal monitor

Which factor determines TCP window size? 1. the amount of data to be transmitted 2. the number of services included in the TCP segment 3. the amount of data the destination can process at one time 4. the amount of data the source is capable of sending at one time

the amount of data the destination can process at one time

What type of information is contained in a DNS MX record? 1. the FQDN of the alias used to identify a service 2. the IP address for an FQDN entry 3. the domain name mapped to mail exchange servers 4. the IP address of an authoritative name server

the domain name mapped to mail exchange servers

Which parameter does the router use to choose the path to the destination when there are multiple routes available? 1. the lower metric value that is associated with the destination network 2. the lower gateway IP address to get to the destination network 3. the higher metric value that is associated with the destination network 4. the higher gateway IP address to get to the destination network

the lower metric value that is associated with the destination network

What is the purpose of a small company using a protocol analyzer utility to capture network traffic on the network segments where the company is considering a network upgrade? 1. to identify the source and destination of local network traffic 2. to capture the Internet connection bandwidth requirement 3. to document and analyze network traffic requirements on each network segment 4. to establish a baseline for security analysis after the network is upgraded

to document and analyze network traffic requirements on each network segment

Why would a network administrator use the tracert utility? 1. to determine the active TCP connections on a PC 2. to check information about a DNS name in the DNS server 3. to identify where a packet was lost or delayed on a network 4. to display the IP address, default gateway, and DNS server address for a PC

to identify where a packet was lost or delayed on a network

What is the function of the HTTP GET message? 1. to request an HTML page from a web server 2. to send error information from a web server to a web client 3. to upload content to a web server from a web client 4. to retrieve client email from an email server using TCP port 110

to request an HTML page from a web server

A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What two types of network services is the network administrator trying to accommodate? (Choose two.) 1. voice 2. video 3. instant messaging 4. FTP 5. SNMP

voice video

In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.) 1. when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated 2. when a faster delivery mechanism is needed 3. when delivery overhead is not an issue 4. when applications do not need to guarantee delivery of the data 5. when destination port numbers are dynamic

when a faster delivery mechanism is needed when applications do not need to guarantee delivery of the data

Within a production network, what is the purpose of configuring a switch with a default gateway address? 1. Hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination. 2. A switch must have a default gateway to be accessible by Telnet and SSH. 3. The default gateway address is used to forward packets originating from the switch to remote networks. 4. It provides a next-hop address for all traffic that flows through the switch.

The default gateway address is used to forward packets originating from the switch to remote networks.

Which three statements describe a DHCP Discover message? (Choose three.) 1. The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF). 2. The destination IP address is 255.255.255.255. 3. The message comes from a server offering an IP address. 4. The message comes from a client seeking an IP address. 5. All hosts receive the message, but only a DHCP server replies. 6. Only the DHCP server receives the message.

The destination IP address is 255.255.255.255. The message comes from a client seeking an IP address. All hosts receive the message, but only a DHCP server replies.

What property of ARP causes the request to be flooded out all ports of a switch except for the port receiving the ARP request? 1. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. 2. The type field 0x806 appears in the header of the Ethernet frame. 3. Entries in an ARP table are time-stamped and are purged after the timeout expires. 4. ARP replies are broadcast on the network when a host receives an ARP request.

The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.

What property of ARP forces all Ethernet NICs to process an ARP request? 1. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. 2. The source MAC address appears in the header of the Ethernet frame. 3. The type field 0x806 appears in the header of the Ethernet frame. 4. ARP replies are broadcast on the network when a host receives an ARP request.

The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.) 1. packets with destination of 172.17.10.5 2. packets with destination of 172.17.12.10 3. packets with destination of 172.17.14.8 4. packets with destination of 172.17.8.20 5. packets with destination of 172.17.6.15

1. FastEthernet1/1 2. Fast Ethernet1/0 3. FastEthernet0/1 4. The packet is dropped 5. FastEthernet0/0

Match the command with the device mode at which the command is entered. 1. login 2. service password-encryption 3. ip address 192.168.4.4 255.255.255.0 4. copy running-config startup-config 5. enable

1. R1(config-line)# 2. R1(config)# 3. R1(config-if)# 4. R1# 5. R1>

Match the commands to the correct actions. (Not all options are used.) 1. provides security on the console 2. displays a message when the router is accessed 3. configures a name on the router

1. Router(config-line)# password-class 2. Router(config)# banner motd # 3. Router(config)# hostname CL1

Match the phrases to the functions during the bootup process of a Cisco router. phase 1 phase 2 phase 3

1. perform the POST and load the bootstrap program 2. locate and load the Cisco IOS software 3. locate and load the startup configuration file

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC? 1. 1 segment 2. 10 segment 3. 100 segment 4. 1000 segment

10 segment

Refer to the exhibit. A network administrator is connecting a new host to the Manager LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? Floor(config)# interface gi0/1 Floor(config-if)# description Connects to the Registrar LAN Floor(config-if)# ip address 10.118.63.65 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface gi0/0 Floor(config-if)# description Connects to the Manager LAN Floor(config-if)# ip address 10.118.62.196 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface s0/0/0 Floor(config-if)# description Connects to the ISP Floor(config-if)# ip address 10.62.63.254 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface s0/0/1 Floor(config-if)# description Connects to the Head Office WAN Floor(config-if)# ip address 209.165.200.87 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# end 1. 10.118.62.196 2. 10.118.62.1 3. 10.62.63.254 4. 209.165.200.87 5. 10.118.63.65

10.118.62.196

Refer to the exhibit. A network administrator is connecting a new host to the Store LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? HQ(config)# interface gi0/1 HQ(config-if)# description Connects to the Branch LAN HQ(config-if)# ip address 172.19.99.99 255.255.255.0 HQ(config-if)# no shutdown HQ(config-if)# interface gi0/0 HQ(config-if)# description Connects to the Store LAN HQ(config-if)# ip address 172.19.98.230 255.255.255.0 HQ(config-if)# no shutdown HQ(config-if)# interface s0/0/0 HQ(config-if)# description Connects to the ISP HQ(config-if)# ip address 10.98.99.254 255.255.255.0 HQ(config-if)# no shutdown HQ(config-if)# interface s0/0/1 HQ(config-if)# description Connects to the Head Office WAN HQ(config-if)# ip address 209.165.200.120 255.255.255.0 HQ(config-if)# no shutdown HQ(config-if)# end 1. 172.19.98.230 2. 172.19.98.1 3. 10.98.99.254 4. 209.165.200.120 5. 172.19.99.99

172.19.98.230

Refer to the exhibit. A network administrator is connecting a new host to the Service LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? Main(config)# interface gi0/1 Main(config-if)# description Connects to the Service LAN Main(config-if)# ip address 172.29.157.156 255.255.255.0 Main(config-if)# no shutdown Main(config-if)# interface gi0/0 Main(config-if)# description Connects to the Engineering LAN Main(config-if)# ip address 172.29.156.36 255.255.255.0 Main(config-if)# no shutdown Main(config-if)# interface s0/0/0 Main(config-if)# description Connects to the ISP Main(config-if)# ip address 10.156.157.254 255.255.255.0 Main(config-if)# no shutdown Main(config-if)# interface s0/0/1 Main(config-if)# description Connects to the Head Office WAN Main(config-if)# ip address 198.51.100.177 255.255.255.0 Main(config-if)# no shutdown Main(config-if)# end 1. 172.29.157.156 2. 172.29.157.1 3. 10.156.157.254 4. 198.51.100.177 5. 172.29.156.36

172.29.157.156

Refer to the exhibit. A network administrator is connecting a new host to the Service LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? Main(config)# interface gi0/1 Main(config-if)# description Connects to the Service LAN Main(config-if)# ip address 192.168.167.166 255.255.255.0 Main(config-if)# no shutdown Main(config-if)# interface gi0/0 Main(config-if)# description Connects to the Engineering LAN Main(config-if)# ip address 192.168.166.46 255.255.255.0 Main(config-if)# no shutdown Main(config-if)# interface s0/0/0 Main(config-if)# description Connects to the ISP Main(config-if)# ip address 10.166.167.254 255.255.255.0 Main(config-if)# no shutdown Main(config-if)# interface s0/0/1 Main(config-if)# description Connects to the Head Office WAN Main(config-if)# ip address 198.51.100.189 255.255.255.0 Main(config-if)# no shutdown Main(config-if)# end 1. 192.168.167.166 2. 192.168.167.1 3. 10.166.167.254 4. 198.51.100.189 5. 192.168.166.46

192.168.167.166

Refer to the exhibit. A network administrator is connecting a new host to the Medical LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? BldgA(config)# interface gi0/1 BldgA(config-if)# description Connects to the Medical LAN BldgA(config-if)# ip address 192.168.201.200 255.255.255.0 BldgA(config-if)# no shutdown BldgA(config-if)# interface gi0/0 BldgA(config-if)# description Connects to the Client LAN BldgA(config-if)# ip address 192.168.200.80 255.255.255.0 BldgA(config-if)# no shutdown BldgA(config-if)# interface s0/0/0 BldgA(config-if)# description Connects to the ISP BldgA(config-if)# ip address 10.200.201.254 255.255.255.0 BldgA(config-if)# no shutdown BldgA(config-if)# interface s0/0/1 BldgA(config-if)# description Connects to the Head Office WAN BldgA(config-if)# ip address 203.0.113.222 255.255.255.0 BldgA(config-if)# no shutdown BldgA(config-if)# end 1. 192.168.201.200 2. 192.168.201.1 3. 10.200.201.254 4. 203.0.113.222 5. 192.168.200.80

192.168.201.200

Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? Floor(config)# interface gi0/1 Floor(config-if)# description Connects to the Registrar LAN Floor(config-if)# ip address 192.168.235.234 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface gi0/0 Floor(config-if)# description Connects to the Manager LAN Floor(config-if)# ip address 192.168.234.114 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface s0/0/0 Floor(config-if)# description Connects to the ISP Floor(config-if)# ip address 10.234.235.254 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface s0/0/1 Floor(config-if)# description Connects to the Head Office WAN Floor(config-if)# ip address 203.0.113.3 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# end 1. 192.168.235.234 2. 192.168.235.1 3. 10.234.235.254 4. 203.0.113.3 5. description Connects to the ISP

192.168.235.234

What property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table? 1. A static IP-to-MAC address entry can be entered manually into an ARP table. 2. Entries in an ARP table are time-stamped and are purged after the timeout expires. 3. The type field 0x806 appears in the header of the Ethernet frame. 4. The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.

A static IP-to-MAC address entry can be entered manually into an ARP table.

What statement describes the function of the Address Resolution Protocol? 1. ARP is used to discover the IP address of any host on a different network. 2. ARP is used to discover the IP address of any host on the local network. 3. ARP is used to discover the MAC address of any host on a different network. 4. ARP is used to discover the MAC address of any host on the local network.

ARP is used to discover the MAC address of any host on the local network.

Why is NAT not needed in IPv6?​ 1. Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​ 2. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​ 3. The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​ 4. The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

What is true about the Server Message Block protocol? 1. Different SMB message types have a different format. 2. Clients establish a long term connection to servers. 3. SMB messages cannot authenticate a session. 4. SMB uses the FTP protocol for communication.

Clients establish a long term connection to servers.

What happens when the transport input ssh command is entered on the switch vty lines? 1. The SSH client on the switch is enabled. 2. Communication between the switch and remote users is encrypted. 3. The switch requires a username/password combination for remote access. 4. The switch requires remote connections via a proprietary client software.

Communication between the switch and remote users is encrypted.

Which two characteristics are associated with UDP sessions? (Choose two.) 1. Destination devices receive traffic with minimal delay. 2. Transmitted data segments are tracked. 3. Destination devices reassemble messages and pass them to an application. 4. Received data is unacknowledged. 5. Unacknowledged data packets are retransmitted.

Destination devices receive traffic with minimal delay. Received data is unacknowledged.

What information is used by TCP to reassemble and reorder received segments? 1. port numbers 2. sequence numbers 3. acknowledgment numbers 4. fragment numbers

sequence numbers

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured? 1. Reboot the device. 2. Enter CTRL-Z at the privileged mode prompt. 3. Exit global configuration mode. 4. Power cycle the device. 5. Exit privileged EXEC mode and press Enter.

Exit privileged EXEC mode and press Enter.

Which statement describes a feature of the IP protocol? 1. IP encapsulation is modified based on network media. 2. IP relies on Layer 2 protocols for transmission error control. 3. MAC addresses are used during the IP packet encapsulation. 4. IP relies on upper layer services to handle situations of missing or out-of-order packets.

IP relies on upper layer services to handle situations of missing or out-of-order packets.

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? 1. It is the IP address of the Router1 interface that connects the company to the Internet. 2. It is the IP address of the Router1 interface that connects the PC1 LAN to Router1. 3. It is the IP address of Switch1 that connects PC1 to other devices on the same LAN. 4. It is the IP address of the ISP network device located in the cloud.

It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.

What does a client do when it has UDP datagrams to send? 1. It just sends the datagrams. 2. It queries the server to see if it is ready to receive data. 3. It sends a simplified three-way handshake to the server. 4. It sends to the server a segment with the SYN flag set to synchronize the conversation.

It just sends the datagrams.

What property of ARP allows hosts on a LAN to send traffic to remote networks? 1. Local hosts learn the MAC address of the default gateway. 2. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. 3. The source MAC address appears in the header of the Ethernet frame. 4. The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.

Local hosts learn the MAC address of the default gateway.

What are two potential network problems that can result from ARP operation? (Choose two.) 1. Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing. 2. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. 3. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. 4. Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network. 5. Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port.

On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.

Which term describes a field in the IPv4 packet header used to limit the lifetime of a packet? 1. TTL 2. source IPv4 address 3. protocol 4. header checksum

TTL

A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued? 1. The ARP cache is cleared. 2. The current content of the ARP cache is displayed. 3. The detailed information of the ARP cache is displayed. 4. The ARP cache is synchronized with the router interface.

The ARP cache is cleared.

What information does the loopback test provide? 1. The TCP/IP stack on the device is working correctly. 2. The device has end-to-end connectivity. 3. DHCP is working correctly. 4. The Ethernet cable is working correctly. 5. The device has the correct IP address on the network.

The TCP/IP stack on the device is working correctly.

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? 1. The cable is not connected properly to the NIC. 2. The computer has an invalid IP address. 3. The computer has an incorrect subnet mask. 4. The computer has an invalid default gateway address

The computer has an invalid default gateway address

A router boots and enters setup mode. What is the reason for this? 1. The IOS image is corrupt. 2. Cisco IOS is missing from flash memory. 3. The configuration file is missing from NVRAM. 4. The POST process has detected hardware failure.

The configuration file is missing from NVRAM.

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.) 1. The frame has the broadcast address as the destination address. 2. The destination address is unknown to the switch. 3. The source address in the frame header is the broadcast address. 4. The source address in the frame is a multicast address. 5. The destination address in the frame is a known unicast address.

The frame has the broadcast address as the destination address. The destination address is unknown to the switch.

What will happen if the default gateway address is incorrectly configured on a host? 1. The host cannot communicate with other hosts in the local network. 2. The switch will not forward packets initiated by the host. 3. The host will have to use ARP to determine the correct address of the default gateway. 4. The host cannot communicate with hosts in other networks. 5. A ping from the host to 127.0.0.1 would not be successful.

The host cannot communicate with hosts in other networks.

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent? 1. The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host. 2. The packet will be sent directly to the destination host. 3. The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host. 4. The packet will be sent only to the default gateway

The packet will be sent directly to the destination host.

What property of ARP causes a reply only to the source sending an ARP request? 1. The source MAC address appears in the header of the Ethernet frame. 2. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. 3. The type field 0x806 appears in the header of the Ethernet frame. 4. ARP replies are broadcast on the network when a host receives an ARP request.

The source MAC address appears in the header of the Ethernet frame.

The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command? 1. The switch will have a management interface with the address 172.16.100.1. 2. The switch can be remotely managed from a host on another network. 3. The switch can communicate with other hosts on the 172.16.100.0 network. 4. The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.

The switch can be remotely managed from a host on another network.

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame? 1. The switch will discard the frame. 2. The switch will forward the frame only to port 2. 3. The switch will forward the frame to all ports except port 4. 4. The switch will forward the frame to all ports. 5. The switch will forward the frame only to ports 1 and 3.

The switch will forward the frame to all ports except port 4.

What property of ARP causes the NICs receiving an ARP request to pass the data portion of the Ethernet frame to the ARP process? 1. The type field 0x806 appears in the header of the Ethernet frame. 2. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. 3. Entries in an ARP table are time-stamped and are purged after the timeout expires. 4. ARP replies are broadcast on the network when a host receives an ARP request.

The type field 0x806 appears in the header of the Ethernet frame.

Which statement describes the treatment of ARP requests on the local link? 1. They must be forwarded by all routers on the local network. 2. They are received and processed by every device on the local network. 3. They are dropped by all switches on the local network. 4. They are received and processed only by the target device.

They are received and processed by every device on the local network.

How do hosts ensure that their packets are directed to the correct network destination? 1. They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​ 2. They always direct their packets to the default gateway, which will be responsible for the packet delivery. 3. They search in their own local routing table for a route to the network destination address and pass this information to the default gateway. 4. They send a query packet to the default gateway asking for the best route.

They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​

Which three statements characterize UDP? (Choose three.) 1. UDP provides basic connectionless transport layer functions. 2. UDP provides connection-oriented fast transport of data at Layer 3 3. UDP relies on application layer protocols for error detection. 4. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. 5. UDP relies on IP for error detection and recovery. 6. UDP provides sophisticated flow control mechanisms.

UDP provides basic connectionless transport layer functions. UDP relies on application layer protocols for error detection. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.

What is a characteristic of UDP? 1. UDP datagrams take the same path and arrive in the correct order at the destination.​ 2. Applications that use UDP are always considered unreliable.​ 3. UDP reassembles the received datagrams in the order they were received. 4. UDP only passes data to the network when the destination is ready to receive the data.

UDP reassembles the received datagrams in the order they were received.

Which OSI layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted? 1. application 2. presentation 3. session 4. transport

application

Which two types of applications are best suited for UDP? (Choose two.) 1. applications that need data flow control 2. applications that require reliable delivery 3. applications that handle reliability themselves 4. applications that need the reordering of segments 5. applications that can tolerate some data loss, but require little or no delay

applications that handle reliability themselves applications that can tolerate some data loss, but require little or no delay

Which field in the TCP header indicates the status of the three-way handshake process? 1. window 2. reserved 3. checksum 4. control bits

control bits

A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next? 1. route the packet out the Gigabit 0/1 interface 2. create a new Layer 2 Ethernet frame to be sent to the destination 3. look into the ARP cache to determine the destination IP address 4. look into the routing table to determine if the destination network is in the routing table

create a new Layer 2 Ethernet frame to be sent to the destination

What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device? 1. timing and synchronization 2. destination and source port numbers 3. destination and source physical addresses 4. destination and source logical network addresses

destination and source port numbers

Which term describes a field in the IPv4 packet header that contains an 8-bit binary value used to determine the priority of each packet? 1. differentiated services 2. destination IPv4 address 3. source IPv4 address 4. protocol

differentiated services

What are two roles of the transport layer in data communication on a network? (Choose two.) 1. identifying the proper application for each communication stream 2. tracking the individual communication between applications on the source and destination hosts 3. providing frame delimiting to identify bits making up a frame 4. performing a cyclic redundancy check on the frame for errors 5. providing the interface between applications and the underlying network over which messages are transmitted

identifying the proper application for each communication stream tracking the individual communication between applications on the source and destination hosts

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.) 1. interface fastethernet 0/0 2. line vty 0 4 3. line console 0 4. enable secret cisco 5. login 6. password cisco

line console 0 login password cisco

What are three responsibilities of the transport layer? (Choose three.) 1. meeting the reliability requirements of applications, if any 2. multiplexing multiple communication streams from many users or applications on the same network 3. identifying the applications and services on the client and server that should handle transmitted data 4. directing packets towards the destination network 5. formatting data into a compatible form for receipt by the destination devices 6. conducting error detection of the contents in frames

meeting the reliability requirements of applications, if any multiplexing multiple communication streams from many users or applications on the same network identifying the applications and services on the client and server that should handle transmitted data

Which two types of IPv6 messages are used in place of ARP for address resolution? 1. anycast 2. broadcast 3. echo reply 4. echo request 5. neighbor solicitation 6. neighbor advertisement

neighbor solicitation neighbor advertisement

What are two services provided by the OSI network layer? (Choose two.) 1. performing error detection 2. routing packets toward the destination 3. encapsulating PDUs from the transport layer 4. placement of frames on the media 5. collision detection

routing packets toward the destination encapsulating PDUs from the transport layer

What is a socket? 1. the combination of the source and destination IP address and source and destination Ethernet address 2. the combination of a source IP address and port number or a destination IP address and port number 3. the combination of the source and destination sequence and acknowledgment numbers 4. the combination of the source and destination sequence numbers and port numbers

the combination of a source IP address and port number or a destination IP address and port number

What is the aim of an ARP spoofing attack? 1. to flood the network with ARP reply broadcasts 2. to fill switch MAC address tables with bogus addresses 3. to associate IP addresses to the wrong MAC address 4. to overwhelm network hosts with ARP requests

to associate IP addresses to the wrong MAC address

Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100? 1. version 2. source IPv4 address 3. protocol 4. TTL

version


Kaugnay na mga set ng pag-aaral

Quiz 6b: Aeolian Processes and Arid Landscapes

View Set

Major Events in the Secret Life of Bees + OOE

View Set

NUR 112 Professionalism/Scope of Practice/Competent Care/Community Ethics

View Set

Urinalysis Exam 2 ( Lab CE 4 & 5 )

View Set

Logic: Concise Edition, CH 7A: Propositional Logic

View Set

Western Civilization Chapters 17 and 18

View Set