5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Match the firewall function to the type of threat protection it provides to the network. (Not all options are used.)

.

What service is provided by BOOTP?

Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.

What is a benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?

POP3

Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments?

Zigbee

Which layer of the TCP/IP model provides a route to forward messages through an internetwork?

internet

What two security solutions are most likely to be used only in a corporate environment? (Choose two.)

intrusion prevention systems; virtual private networks

What command can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

What characteristic describes a virus?

malicious software or code running on an end device

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame; enables IPv4 and IPv6 to utilize the same physical medium

A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?

reconnaissance

What characteristic describes identity theft?

the use of stolen credentials to access private data

What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?

255.255.255.192

Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

Security rules are applied to the default gateway device, preventing it from processing ping requests.

What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)

neighbor advertisements; neighbor solicitations

A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

nslookup

What characteristic describes a VPN?

a tunneling protocol that provides remote users with secure access into the network of an organization

Refer to the exhibit. The switches have a default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for the default gateway. Which network devices will receive the ARP request sent by host A?

only hosts B, C, and router R1

What service is provided by DNS?

Resolves domain names, such as cisco.com, into IP addresses.

What service is provided by POP3?

Retrieves email from the server by downloading the email to the local mail application of the client.

What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)

Router Advertisement; Neighbor Solicitation

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?

SSH

What service is provided by SMTP?

Allows clients to send email to a mail server and the servers to send email to other servers.

What method is used to manage contention-based access on a wireless network?

CSMA/CA

Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)

10.18.10.208/28; 10.18.10.224/28

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.248

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

256

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server; default gateway

A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?

FTP

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device obtain a destination MAC address?

It will send an ARP request for the MAC address of the default gateway.

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

switch the packet to the directly connected interface


Ensembles d'études connexes

CHAPTER 9 Drug Therapy During Pregnancy and Breast-Feeding

View Set

Prep u questions for Hygiene, nursing process,

View Set

Foundations of comp. sci. chapt. 1

View Set

Discharge of Negotiable Instrument

View Set