CCNA v7 Final 21-40
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?
-After a user is successfully authenticated (logged into the server), the authorization is the process of determining what network resources the user can access and what operations (such as read or edit) the user can perform. -authorization
A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.)
-Fiber optic provides higher data capacity but is more expensive than copper cabling. -Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires.
Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)
-POP -DNS
Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)
-There are 4 hops between this device and the device at 192.168.100.1. -There is connectivity between this device and the device at 192.168.100.1. -Explain:The output displays a successful Layer 3 connection between a host computer and a host at 19.168.100.1. It can be determined that 4 hops exist between them and the average transmission time is 1 milliseconds. Layer 3 connectivity does not necessarily mean that an application can run between the hosts.
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
-coverage area -security -interference -Explanation: The three areas of concern for wireless networks focus on the size of the coverage area, any nearby interference, and providing network security. Extensive cabling is not a concern for wireless networks, as a wireless network will require minimal cabling for providing wireless access to hosts. Mobility options are not a component of the areas of concern for wireless networks.
What are two characteristics of IP? (Choose two.)
-does not require a dedicated end-to-end connection -operates independently of the network media -Explain:The Internet Protocol (IP) is a connectionless, best effort protocol. This means that IP requires no end-to-end connection nor does it guarantee delivery of packets. IP is also media independent, which means it operates independently of the network media carrying the packets.
What are two common causes of signal degradation when using UTP cabling? (Choose two.)
-improper termination -low-quality cable or connectors
What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)
-message size -message encoding -delivery options
An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario? (Choose three.)
-quality of service -fault tolerance -security
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26 -Explanation: For the subnet of 192.168.1.64/26, there are 6 bits for host addresses, yielding 64 possible addresses. However, the first and last subnets are the network and broadcast addresses for this subnet. Therefore, the range of host addresses for this subnet is 192.168.1.65 to 192.168.1.126. The other subnets do not contain the address 192.168.1.96 as a valid host address.
Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?
255.255.255.128 Explanation: The largest subnet in the topology has 100 hosts in it so the subnet mask must have at least 7 host bits in it (27-2=126). 255.255.255.0 has 8 hosts bits, but this does not meet the requirement of providing the maximum number of subnets.
A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices: Subnetwork A: IP phones - 10 addresses Subnetwork B: PCs - 8 addresses Subnetwork C: Printers - 2 addresses What single subnet mask would be appropriate to use for the three subnetworks?
255.255.255.240 -Explain:If the same mask is to be used, then the network with the most hosts must be examined for number of hosts. Because this is 10 hosts, 4 host bits are needed. The /28 or 255.255.255.240 subnet mask would be appropriate to use for these networks.
Which scenario describes a function provided by the transport layer?
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window. -Explain:The source and destination port numbers are used to identify the correct application and window within that application.
What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)
Layer 1 statuses - IP addresses Explanation: The command show ip interface brief shows the IP address of each interface, as well as the operational status of the interfaces at both Layer 1 and Layer 2. In order to see interface descriptions and speed and duplex settings, use the command show running-config interface. Next-hop addresses are displayed in the routing table with the command show ip route, and the MAC address of an interface can be seen with the command show interfaces.
Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?
Layer 2 destination address = 00-00-0c-94-36-abLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.200Layer 3 source address = 172.16.10.200
Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
The administrator must first enter privileged EXEC mode before issuing the command.
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network?
tracert
What technique is used with UTP cable to help protect against signal interference from crosstalk?
twisting the wires together into pairs -Explanation: To help prevent the effects of crosstalk, UTP cable wires are twisted together into pairs. Twisting the wires together causes the magnetic fields of each wire to cancel each other out.
Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?
worm -Explanation: A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.