Networking Essentials Practice Final
What is the role of an intermediary device on a network?
Determines the path and directs data along the way to the final destination
When a wireless router is being configured for the first time, what type of wired connection is used?
Ethernet patch cable
What is a function of DNS server?
It determines the IP address that is associated with a specific host domain name
What us required for a network administrator to perform out-of-band management on a Cisco device?
A computer directly connected to the console port of the device
Which is an example of social engineering?
An unidentified person claiming to be technician collecting user information from employees
What is the reason that electronic data is represented as bits in computer processing and data communication?
Bits are more efficient for storing data
A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?
Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF
Which term is used to describe a network device that relies on another device to obtain information?
Client
What is the default subnet mask for an IP address of 198.133.219.4?
255.255.255.0
Which two devices are shared peripherals?
-Scanner -Printer
Which term is used to describe transport layer ports in the range of 1 through 1023?
Well-known
What are two options for expanding storage space on a Cisco router?
-Flash slots -USB ports
Which number grouping is a valid IPv6 address?
2001:0db8:3c55:0015:1010:0000:abcd:ff13
What is indicated by the 100 in the 100BASE-T standard?
Megabits per second
If the default gateway is configured incorrectly on a host, what is the impact on communications?
The host is unable to communicate with hosts on remote networks
When is a straight-through cable in a network?
When connecting a host to a switch
Which type of network is covered by the IEEE 802.11 standards?
Wifi
Open PT activity. What is the phrase displayed on the web page?
Your configuration is correct
Which utility can e used to view a list of open TCP connections on Linux or Windows systems?
Netstat
Refer to the exhibit. The command output is from a wireless DHCP host connected to the Linksys integrated router. What can be determined from the output?
The DHCP configuration needs to be checked
Which organization publishes and manages the Request for Comments (RFC) documents?
IETF
When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?
Logical topology diagram
Match the term to the Category.
-Authentication: EAP, open, pre-shared keys -Encryption: WEP, WPA
Match the protocol with the function.
-DHCP: automatically configures hosts with IP address -SSH: retrieves email messages by clients -DNS: resolves Internet names tow IP addresses
A user calls the help desk to report a work station problem. Which three questions would produce the most helpful information for troubleshooting?
-If you received an error message, what was it? -What operating system version is running on your workstation? -What changes have you made in your workstation?
When a Cisco device is powered on, the ___ begins to test the device and determine if it is functioning properly.
POST
Which type of network component can be used to share an attached printer to the network?
Personal computer
Which command can be used to verify connectivity between two host devices?
Ping
Which protocol operates at the transport layer of the TCP/IP model and ensures reliable delivery of IP packets?
TCP
Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?
Trojan horse
A file is downloaded from the internet. After the user opens the downloaded files, the hard drive crashes and all information on the computer is lost. What type of attack occurred?
Virus
What are two benefits of wireless networks over wired networks?
-Mobility -Anytime, anywhere connectivity
What are three characteristics of multicast transmission?
-Multicast transmission can be used by routers to exchange routing information -Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255 -A single packet can be sent to a group of hosts
Match the type of attack with the description.
-Vishing: the attacker uses voicemail to persuade a victim to call a legitimate looking telephone number -Pretexting: the attacker uses invented scenarios to gain the trust of victim -Phising: the attacker pretends to represent a legitimate outside organization
Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be useful in determining where the problem is?
Nslookup