CCNA v7.0 test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville? access Trojan horse reconnaissance DoS

DoS

What type of IPv6 address is represented by ::1/128? EUI-64 generated link-local global unicast unspecified loopback

loopback

Given network 172.18.109.0, which subnet mask would be used if 6 host bits were available? 255.255.192.0 255.255.224.0 255.255.255.192 255.255.255.248 255.255.255.252

255.255.255.192

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model? A packet-filtering firewall uses session layer information to track the state of a connection, whereas a stateful firewall uses application layer information to track the state of a connection. Both stateful and packet-filtering firewalls can filter at the application layer. A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer. A stateful firewall can filter application layer information, whereas a packet-filtering firewall cannot filter beyond the network layer.

A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer.

A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection? Add a second NIC to the web server. Add a connection to the Internet via a DSL line to another ISP. Add another web server to prepare failover support. Add multiple connections between the switches and the edge router.

Add a connection to the Internet via a DSL line to another ISP

Why is NAT not needed in IPv6?​ Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​ The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​ The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Which destination address is used in an ARP request frame? 0.0.0.0 255.255.255.255 the physical address of the destination host FFFF.FFFF.FFFF AAAA.AAAA.AAAA

FFFF.FFFF.FFFF

Which two statements describe the characteristics of fiber-optic cabling? (Choose two.) Fiber-optic cabling does not conduct electricity. Multimode fiber-optic cabling carries signals from multiple sending devices. Fiber-optic cabling is primarily used as backbone cabling. Fiber-optic cabling uses LEDs for single-mode cab​les and laser technology for multimode cables. Fiber-optic cabling has high signal loss.

Fiber-optic cabling does not conduct electricity. Fiber-optic cabling is primarily used as backbone cabling.

Which statement describes network security? It supports growth over time in accordance with approved network design procedures. It synchronizes traffic flows using timestamps. It ensures sensitive corporate data is available for authorized users.

It ensures sensitive corporate data is available for authorized users.

Which two acronyms represent the data link sublayers that Ethernet relies upon to operate? (Choose two.) SFD LLC CSMA MAC FCS

LLC, MAC

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used? peer-to-peer client-based master-slave point-to-point

P2P

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.) presentation physical network data link transport application session

Presentation, application, session

What service is provided by POP3? Retrieves email from the server by downloading the email to the local mail application of the client. An application that allows real-time chatting among remote users. Allows remote access to network devices and servers. Uses encryption to provide secure remote access to network devices and servers.

Retrieves email from the server by downloading the email to the local mail application of the client

1. A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting? SSH TFTP DHCP DNS

SSH

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? The entire command, configure terminal, must be used. The administrator is already in global configuration mode. The administrator must first enter privileged EXEC mode before issuing the command. The administrator must connect via the console port to access global configuration mode.

The administrator must first enter privileged EXEC mode before issuing the command.

A router boots and enters setup mode. What is the reason for this? The IOS image is corrupt. Cisco IOS is missing from flash memory. The configuration file is missing from NVRAM. The POST process has detected hardware failure.

The configuration file is missing from NVRAM.

If the default gateway is configured incorrectly on the host, what is the impact on communications? There is no impact on communications. The host is unable to communicate on the local network. The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

Which two devices would be described as intermediary devices? (Choose two.) wireless LAN controller server assembly line robots IPS gaming console retail scanner

Wireless LAN controller IPS

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? a user who is trying to guess a password to access the router a worm that is attempting to access another part of the network an unidentified individual who is trying to access the network equipment room a device that is trying to inspect the traffic on a link

a user who is trying to guess a password to access the router

What does the IP address 192.168.1.15/29 represent? subnetwork address unicast address multicast address broadcast address

broadcast address

What does a router do when it receives a Layer 2 frame over the network medium? re-encapsulates the packet into a new frame forwards the new frame appropriate to the medium of that segment of the physical network determines the best path de-encapsulates the frame

de-encapsulates the frame

Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address? destination IPv4 address protocol TTL header checksum

destination IPv4 address

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

enables IPv4 and IPv6 to utilize the same physical medium places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame handles communication between upper layer networking software and Ethernet NIC hardware adds Ethernet control information to network protocol data

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN? bus extended star ring partial mesh

exteneded star

Which two issues can cause both runts and giants in Ethernet networks? (Choose two.) using the incorrect cable type half-duplex operations a malfunctioning NIC electrical interference on serial interfaces CRC errors

half-duplex operations a malfunctioning NIC

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.) data link network physical session transport

network, transport

Which command is used to manually query a DNS server to resolve a specific host name? tracert ipconfig /displaydns nslookup net

nslookup

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.) nslookup cisco.com ping cisco.com ipconfig /flushdns net cisco.com nbtstat cisco.com

nslookup cisco.com ping cisco.com

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​ neighbor solicitation router advertisement router solicitation protocol unreachable route redirection

protocol unreachable route redirection

What type of address is 198.133.219.162? link-local public loopback multicast

public

What routing table entry has a next hop address associated with a destination network? directly-connected routes local routes remote routes C and L source routes

remote routes

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model? bits frame packet segmen

segment

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task? copy running-config startup-config show interfaces show ip nat translations show running-config

show running-config

What characteristic describes spyware? software that is installed on a user device and collects information about the user the use of stolen credentials to access private data an attack that slows or crashes a device or network service a network device that filters access and traffic coming into a network

software that is installed on a user device and collects information about the use

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish? pinging a host computer that has the IP address 127.0.0.1 on the network tracing the path to a host computer on the network and the network has the IP address 127.0.0.1 checking the IP address on the network card testing the integrity of the TCP/IP stack on the local machine

testing the integrity of the TCP/IP stack on the local machine

Refer to the exhibit. What does the value of the window size specify? the amount of data that can be sent at one time the amount of data that can be sent before an acknowledgment is required the total number of bits received during this TCP session a random number that is used in establishing a connection with the 3-way handshake

the amount of data that can be sent before an acknowledgment is required

Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?

the ip address for the interface g 0/1

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? the virtually unlimited availability of IPv6 addresses the use of CSMA/CA the use of full-duplex capable Layer 2 switches the development of half-duplex switch operation the use of Gigabit Ethernet speeds

the use of full-duplex capable layer 2 switches

What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time? latency goodput throughput bandwidth

throughput

. What are two ways to protect a computer from malware? (Choose two.) Empty the browser cache. Use antivirus software. Delete unused software. Keep software up to date. Defragment the hard disk.

use antivirus software, keep software up to date

Network information: * local router LAN interface: 172.19.29.254 / fe80:65ab:dcc1::10* local router WAN interface: 198.133.219.33 / 2001:db8:FACE:39::10* remote server: 192.135.250.103 What task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command? verifying that there is connectivity within the local network creating a network performance benchmark to a server on the company intranet determining the path to reach the remote server verifying that there is connectivity to the internet

verifying that there is connectivity to the internet

To which TCP port group does the port 414 belong? well-known private or dynamic public registered

well-known


Ensembles d'études connexes

Solving Systems of Linear Equations: Substitution: Quiz

View Set

Algebra II 3.10: Factor Over the Complex Numbers

View Set

Descubre 1 · Capítulo 4 · Fotonovela

View Set

Ch 14: Adolescence: Behavioral Development

View Set