2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets?

200

What service is provided by HTTP?

A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addressesPCs - 20 addresses neededPrinters - 2 addresses neededScanners - 2 addresses needed The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

255.255.255.224

What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)

A large number of ARP request and reply messages may slow down the switching process, leading the switch to make many changes in its MAC table; The ARP request is sent as a broadcast, and will flood the entire subnet.

Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)

Capture traffic during peak utilization times to get a good representation of the different traffic types; Perform the capture on different network segments.

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

Configure the IP domain name on the router; Generate the SSH keys; Enable inbound vty SSH sessions.

A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting?

DHCP

Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?

DNS

Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?

IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33

What is an advantage to using a protocol that is defined by an open standard?

It encourages competition and promotes choices.

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?

It will send an ARP request for the MAC address of the default gateway.

Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?

Layer 2 destination address = 00-00-0c-94-36-ab; Layer 2 source address = 00-00-0c-94-36-bb; Layer 3 destination address = 172.16.20.200; Layer 3 source address = 172.16.10.200

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

NAT provides a solution to slow down the IPv4 address depletion; NAT introduces problems for some applications that require end-to-end connectivity.

What are proprietary protocols?

protocols developed by organizations who have control over their definition and operation

Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)

POP; DNS

Match each item to the type of topology diagram on which it is typically identified. (Not all options are used.)

Physical topology: location of a desktop PC in a classroom, path of cables that connect rooms to wiring closets; logical topology: IP addresses of a server

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?

The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6; The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

What are the two most effective ways to defend against malware? (Choose two.)

Update the operating system and other application software; Install and update antivirus software.

Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)

application; session; presentation

What does the term "attenuation" mean in data communication?

loss of signal strength as distance increases

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees.What three network characteristics are described in this scenario? (Choose three.)

quality of service; fault tolerance; security

Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?

remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

store-and-forward

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely


Ensembles d'études connexes

#1 PEDS Ch 46 - Nursing Care of the Child With an Alteration in Cellular Regulation / Hematologic or Neoplastic Disorder

View Set

Authoritarian leadership - a style of leadership in which the leader tells the employees what needs to be done and how to perform it without getting their advice or ideas.

View Set

Chapter 14 - Distribution Decisions

View Set

Psychology Chapter 12.5 Prejudice and Discrimination

View Set

Anatomy Chapter 6: Osseous Tissue and Bone Structure

View Set

BUS 484 ADVANCED ACCOUNTING QUIZ 1

View Set