Chapters 1-4 NetAcad

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Based on the DHCP configuration, how many active DHCP clients can be on the network at the same time?​ Chapter 4.3.3

10 - Because the address pool starts at 192.168.1.100 and ends at 192.168.1.109 the DHCP IP address pool size is 10 hosts. This means that there can only be up to 10 active hosts on the network at the same time.

What are three private IPv4 address? (Choose three.) Chapter 4

10.1.1.1 172.16.4.4 192.168.5.5 Refer to curriculum topic: 4.2.2 Private IP addresses are reserved to be exclusively used for internal networks and they cannot be used on the Internet. IPv4 addresses in the networks, 10.0.0.0/8, 172.16.0.0/16-172.31.0.0/16, and 192.168.0.0/24-192.168.255.0/24, are designated as private IPv4 addresses.

How many binary bits exist within an IPv6 address? Chapter 4

128 Refer to curriculum topic: 4.5.1 IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from 32 bits to 128 bits.

When a computer assembles a frame to be sent over the network, what is the maximum size of an Ethernet frame? Chapter 3.3.1

1518 bytes

Which network does a host with IP address 172.32.65.13 reside on if it is using a default subnet mask? Chapter 4

172.32.0.0 Refer to curriculum topic: 4.2.1 In classful IPv4 addressing, a network with the first octet of 172 is a Class B network with the default subnet mask 255.255.0.0. Thus the network address is 172.32.0.0.

What is an equivalent representation of the full IPv6 address? 2031:0000:0300:0000:0000:00c0:8000:130B Chapter 4

2031:0:300::C0:8000:130B

How many usable hosts are available given a Class C IP address with the default subnet mask? Chapter 4

254 The default subnet mask for a Class C network is 255.255.255.0. Thus there are 8 bits available for assigning host addresses. Eight bits in binary is equivalent to 256 in decimal (2^8 = 256). These numbers are from 0 to 255. However, host portion 0 is reserved for the network address, and the host address with all 1s (in this case 255) is reserved for the broadcast address. Therefore, usable host addresses are 256-2=254.

Which destination IPv4 address does a DHCPv4 client use to send the initial DHCP Discover packet when the client is looking for a DHCP server? Chapter 4

255.255.255.255 Refer to curriculum topic: 4.3.3 Broadcast communications on a network may be directed or limited. A directed broadcast is sent to all hosts on a specific network. A limited broadcast is sent to 255.255.255.255. When a DHCP client needs to send a DHCP Discover packet in order to seek DHCP servers, the client will use this IP address of 255.255.255.255 as the destination in the IP header because it has no knowledge of the IP addresses of DHCP servers.

Which type of technology is used to provide digital data transmissions over cell phone networks? 4G Wi-Fi NFC Bluetooth

4G Refer to curriculum topic: 2.1.1 3G, 4G, and 4G-LTE are technologies that are used to provide enhanced cell phone networks that are capable of fast data transmission.

What are three characteristics of multicast transmission? (Choose three.) Chapter 4

A single packet can be sent to a group of hosts. Multicast transmission can be used by routers to exchange routing information. The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.

A small SOHO uses a wireless integrated router for employee workstations to connect to the Internet. For security consideration, the SSID is not broadcast and the IP address configuration is provided by the DHCP server in the router. An employee reports that the workstation cannot connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are two possible reasons for the problem? (Choose two.) An invalid SSID is configured. The wireless client is not configured for DHCP. A bad cable exists between the client and the integrated router. An incorrect default gateway is manually configured on the client. A default gateway is improperly configured on the wireless router.

An invalid SSID is configured. The wireless client is not configured for DHCP.

Match the components in the notation 100Base-T to the specification. (Not all options are used.) BASE T 100 Chapter 3

BASE = Baseband Transmission T = Twisted Pair Cable 100 = 100 mb/s

What are two differences between binary and decimal numbers? (Choose two.) Chapter 4.1.2

Binary numbers are based on powers of 2. Decimal numbers include 0 through 9 Computing devices use the binary system for data processing and storage. Binary numbers are based on powers of 2 and decimal numbers are based on powers of 10

Which wireless technology can be used to connect wireless headphones to a computer? NFC Bluetooth Wi-Fi 4G-LTE

Bluetooth Refer to curriculum topic: 2.1.1 Bluetooth is a low-power, short range wireless technology that provides connectivity for accessories such as speakers, headphones, and microphones.

Which type of packet is sent by a DHCP server after receiving a DHCP Discover message? Chapter 4

DHCP Offer Refer to curriculum topic: 4.3.3 When a DHCP server receives a DHCP Discover packet from a client, the server responds with a DHCP Offer packet to let the client know that an IP address is available and reserved for the client.

The [ ] is a part of the network that is used for servers which are accessible by both internal and external users.

DMZ

Which network device is used to translate a domain name to the associated IP address? router DNS server DHCP server default gateway

DNS server Refer to curriculum topic: 2.1.2 A DNS server is a network device that is used to translate a domain name to its IP address. A user will identify a website using a domain name, such as www.cisco.com and a DNS server will translate it to an associated IP address.

What makes it possible for e-mail to be sent and received on a wide variety of devices, including cell phones, PDAs, laptops, and desktop computers? Chapter 3.1.2

E-mail software is written using standards and protocols that ensure compatibility.

What is a technology used in a cellular telephone network? Bluetooth fiber-optic Global System for Mobile Communications (GSM) Wi-Fi

Global System for Mobile Communications (GSM) Refer to curriculum topic: 2.1.1 The most common type of cellular telephone network is called Global System for Mobile Communications or GSM network and it relays a voice signal from one tower to another tower, until it is delivered to a destination.

When a user is visiting an e-learning website to learn about networking, the user computer is acting as a [ ]

Host

The [ ] is an organization that develops and maintains Ethernet and wireless standards.​ Chapter 3.2.2

IEEE - The Institute of Electrical and Electronic Engineers (IEEE) is responsible for developing, approving, and maintaining standards concerning network communication.

What type of information is contained in an ARP table? Chapter 3.4.3

IP address to MAC address mappings

A user calls the help desk to report a workstation problem. Which three questions would produce the most helpful information for troubleshooting? (Choose three.) If you received an error message, what was it? What changes have you made to your workstation? Do you have the warranty for your workstation? What operating system version is running on your workstation? Have you used a network monitoring tool on your workstation? Have you performed a backup recently?

If you received an error message, what was it? What changes have you made to your workstation? What operating system version is running on your workstation?

What is the primary motivation for development of IPv6? Chapter 4.5.1

Like IP addressing, there is also a special MAC address for broadcast purposes, namely FF-FF-FF-FF-FF-FF.

Using a systematic troubleshooting approach, a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information, which two questions are associated with Layer 3? (Choose two.) Is the PC configured for DHCP? Does a browser connection to www.cisco.com work? Is the network cable plugged in? From the PC, is the default gateway reachable using the ping command? Is there a link light on the network card?

Is the PC configured for DHCP? From the PC, is the default gateway reachable using the ping command?

What is the purpose of an IP address? It identifies the physical location of a data center. It identifies a location in memory from which a program runs. It identifies a return address for replying to email messages. It identifies the source and destination of data packets on a network.

It identifies the source and destination of data packets on a network. Refer to curriculum topic: 1.3.2 Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determine how the packets should be routed from source to destination by intermediate devices.

A network administrator attempted to access the company website and received a "page not found" error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude? It is normal web surfing activity. It is likely that someone attempted a DoS attack. The link to the website does not have enough capacity and needs to be increased. The web server was turned off and was not able to service requests.

It is likely that someone attempted a DoS attack.

The [ ] address is a physical address assigned to every Ethernet network interface.​ Chapter 3.2.2

MAC - The Ethernet standard requires that all interfaces have a physical address. This address is called the Media Access Control address, or MAC address.

A wireless network was recently installed in a coffee shop and customer mobile devices are not receiving network configuration information. What should be done to correct the problem? Check the connection of the DNS server to the Internet. Provide peripheral devices to customers. Make sure the DHCP server is functional. Ensure that the default gateway device is working properly.

Make sure the DHCP server is functional. Refer to curriculum topic: 2.1.2 End-user devices can request an address from a pool of addresses that are maintained by a DHCP server.

During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move a few workstations cannot get a valid IP address. What should be checked first to identify the root cause of the problem? Check the operation status of the DHCP server. Test if these workstations can ping the default gateway. Make sure the cables are functional and properly plugged. Install all software updates.

Make sure the cables are functional and properly plugged.

Which function does NAT perform in a wireless router? Chapter 4.4.3

NAT takes an internal source IP address and translates it to a global IP address.

The [ ] model breaks network communications down into seven functional layers. Chapter 3.2.1

OSI

When a network is installed in a high school, it is important for a network admin to create a [ ] topology diagram to document where each host is located and how they are connected to the network.

Physical

Which type of network cable contains multiple copper wires and uses extra shielding to prevent interference? STP UTP fiber-optic coax

STP Refer to curriculum topic: 2.3.2 Shielded twisted-pair (STP) cables contain additional shielding and is commonly used when EMI or RFI interference would negatively affect the data communication crossing a network cable.

What are two wiring schemes defined by the TIA/EIA organization for Ethernet installation in homes and businesses? (Choose two.) T568A STP T568B UTP RJ-45

T568A T568B

A customer calls the help line to report a computer problem. The help line technician responds and works with the customer for some time. However, the technician cannot identify the root cause of the problem. What should the technician do to help the customer? Tell the customer that a replacement computer will be shipped immediately. Suggest that the customer visit the support website for more detailed information. Tell the customer that a ticket is created and another technician will contact the user soon. Ask for the email address of the customer in order to send all the support documents for the computer.

Tell the customer that a ticket is created and another technician will contact the user soon.

A network technician enters the command ipconfig /release followed by ipconfig /renew in order to ensure that the DHCP IP configuration on a workstation is updated. However, the workstation does not receive a valid IP configuration for the network. Which two problems may exist on the network? (Choose two.) There is a DHCP server issue. The DHCP lease time is misconfigured. The gateway router address needs to be updated. There is no network connectivity to the DHCP server. The ipconfig /all command must be issued to restore all IP configurations.

There is a DHCP server issue. There is no network connectivity to the DHCP server.

Which statement describes the ping and tracert commands? Tracert shows each hop, while ping shows a destination reply only. Tracert uses IP addresses; ping does not. Both ping and tracert can show results in a graphical display. Ping shows whether the transmission is successful; tracert does not.

Tracert shows each hop, while ping shows a destination reply only.

Which IP address type is intended for a specific host? Chapter 4.2.3

Unicast - A communication that has a single source going to a single destination is a unicast. A communication from a single source to a group of destinations is a multicast. A communication from a single source to all destinations on the same local network is a broadcast.

What is the Internet? the type of physical media used by computers to access the World Wide Web a network of networks an application used to access the World Wide Web a small isolated internal network of a company

a network of networks Refer to curriculum topic: 1.1.1 The Internet is essentially a network of networks. Each user connects to the Internet by using a physical cable or through wireless media. Underneath this network of networks lies a very real backbone of connections that bring the world to personal computing devices.

A technician is setting up equipment on a network. Which three devices will need IP addresses? (Choose three.) Chapter 4

a printer with an integrated NIC a server with two NICs an IP phone Refer to curriculum topic: 4.1.1 A device needs an IP address in order to connect to a network. A device that is attached to a networked device can use the established connection to access the network.

What are two common causes of a physical layer network connectivity problem? (Choose two.) a monitor unplugged an Ethernet cable plugged into a wrong port an incorrect default gateway an unassigned IP address a faulty Ethernet cable

an Ethernet cable plugged into a wrong port a faulty Ethernet cable

What terms represent the maximum and actual speed that can be utilized by a device to transfer data? bandwidth; throughput throughput; bandwidth bandwidth; goodput throughput; goodput

bandwidth; throughput Refer to curriculum topic: 1.1.3 Bandwidth measures the maximum rate at which a device can transfer data. However, in practice, the actual speed for data transfer could be reduced because of numerous factors like network congestion, overhead etc. This actual rate of transfer is known as throughput.

Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system​? brute force phishing pretexting DDoS

brute force

How does an activity LED on wireless routers indicate that traffic is moving through a port? by flashing by staying turned off by staying a solid green color by staying a solid amber color

by flashing

Which type of network cable is used to connect the components that make up satellite communication systems? coaxial fiber-optic shielded twisted-pair unshielded twisted-pair

coaxial

Which type of Ethernet cable should be used to directly connect two devices that both use the same pins for transmitting and receiving data? straight-through twisted-pair cable fiber-optic cable coaxial cable crossover twisted-pair cable

crossover twisted-pair cable Refer to curriculum topic: 2.3.4 Devices that use the same pins to transmit and receive data require the use of a crossover cable in order to successfully exchange data.

Which term describes the interference when electrical impulses from one cable cross over to an adjacent cable? crossover crosstalk RFI collision

crosstalk Refer to curriculum topic: 2.3.2 Crosstalk occurs when cables are bundled together for long lengths and the electrical impulses from one cable cross over to an adjacent cable

Information in its raw or unorganized form that represents something is known as [ ].

data

Which two layers of the OSI model specify protocols that are associated with Ethernet standards? (Choose two.) Chapter 3.2.2

data link layer

Which IP configuration parameter provides the IP address of a network device that a computer would use to access the Internet? default gateway host IP address subnet mask DNS server

default gateway Refer to curriculum topic: 2.1.2 The types of IP configuration on a host device include these: IP address - identifies the host on the network. Subnet mask - identifies the network on which the host is connected. Default gateway - identifies the networking device that the host uses to access the Internet or another remote network. DNS server - identifies the server that is used to translate a domain name into an IP address.

What type of attack is the ping of death? brute force virus social engineering denial of service

denial of service

Which type of attack attempts to overwhelm network links and devices with useless data? virus spyware brute force denial of service

denial of service

What address type does a switch use to make selective forwarding decisions? Chapter 3.4.2

destination MAC

A small office uses a wireless router to connect to a cable modem for Internet access. The network administrator receives a call that one office computer cannot access external websites. The first troubleshooting step that the network administrator performs is to ping the wireless router from the office computer. Which troubleshooting technique does this represent? top-down bottom-up substitution divide-and-conquer

divide-and-conquer

What is an advantage of the peer-to-peer network model? scalability high level of security ease of setup centralized administration

ease of setup Refer to curriculum topic: 1.3.1 The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The advantages of peer-to-peer networking include ease of setup, lower cost, and less complexity.

How does a phisher typically contact a victim?

email

What is a characteristic of a computer worm? malicious software that copies itself into other executable programs tricks users into running the infected software a set of computer instructions that lies dormant until triggered by a specific event exploits vulnerabilities with the intent of propagating itself across a network

exploits vulnerabilities with the intent of propagating itself across a network

Authorized users are not considered a security threat to the network. true false

false

Which type of network cable is commonly used in backbone networks and telephone companies? coaxial cable fiber-optic cable twisted-pair cable shielded twisted-pair cable

fiber-optic cable

A [ ] is a device usually installed between two or more networks to block undesirable traffic.

firewall

Which term is used to refer to a Layer 2 PDU?​ Chapter 3.3.1

frame

What is the purpose of the core layer in the Cisco hierarchical network design model? Chapter 3.4.1

high-speed backbone switching 0

Which type of network component is used to interconnect computing devices? shared peripheral host intermediate device network media

intermediate device Refer to curriculum topic: 2.1.2 Network devices are located in the path that messages take between a source host and a destination host and are commonly referred to as intermediate devices.

Which two devices are considered end devices? (Choose two.) laptop router switch printer hub

laptop printer Refer to curriculum topic: 1.2.2 A device that forms the interface between users and the underlying communication network is known as an end device. End devices are either the source or destination of a message.

What is the delay in the amount of time for data to travel between two points on a network? bandwidth throughput latency goodput

latency Refer to curriculum topic: 1.1.3 Latency is a term used to indicate delay when getting a packet from one point to another. Network connections with small amounts of delay are called low-latency networks, whereas network connections with long delays are called high-latency networks. High latency creates bottlenecks in any network communications.

In fiber-optic media, the signals are represented as patterns of [ ].

light

Which three elements do all communication methods have in common? (Choose three.) Chapter 3.1.1

message destination message source transmission medium

What are two sources of electromagnetic interference that can affect data transmissions? (Choose two.) LED monitor microwave oven infrared remote control cordless phone florescent light fixture

microwave oven florescent light fixture

What type of message is sent to a specific group of hosts? Chapter 4

multicast Refer to curriculum topic: 4.2.3 A communication that has a single source going to a single destination is a unicast. A communication from a single source to a group of destinations is a multicast. A communication from a single source to all destinations on the same local network is a broadcast.

Which command would a technician use to display network connections on a host computer? nslookup netstat tracert ipconfig

netstat

What type of network is defined by two computers that can both send and receive requests for resources? client/server peer-to-peer enterprise campus

peer-to-peer

Which type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work? Chapter 3.1.3

reference model - The primary purpose is to aid in a clearer understanding of the functions and processes necessary for network communications.This type of model does not specify exactly how a function should be accomplished. The OSI model is an example of a reference model.

What role does a router play on a network? Chapter 3.4.4

selecting the path to destination networks

Which term is used to describe a network device with the primary function of providing information to other devices? workstation console server client

server

Which three layers of the OSI model make up the application layer of the TCP/IP model? (Choose three.) Chapter 3.2.1

session presentation application

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user? adware pop-ups spyware pop-unders

spyware

Which term refers to the set of rules that define how a network operates? Chapter 3.1.2

standard

A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent? top-down bottom-up substitution divide-and-conquer

substitution

What are three characteristics of UTP cabling? (Choose three.) uses light to transmit data susceptible to EMI and RFI commonly used between buildings easiest type of networking cable to install most commonly used networking cable commonly used for Internet connectivity by a cable TV provider

susceptible to EMI and RFI easiest type of networking cable to install most commonly used networking cable

Which two criteria are used to help select a network medium for a network? (Choose two.) the types of data that need to be prioritized the cost of the end devices that are used in the network the distance the selected medium can successfully carry a signal the number of intermediate devices that are installed in the network the environment where the selected medium is to be installed

the distance the selected medium can successfully carry a signal the environment where the selected medium is to be installed

Which criterion can be used to select the appropriate type of network media for a network? the types of data that need to be prioritized the cost of the end devices that are used in the network the number of intermediary devices that are installed in the network the environment where the selected medium is to be installed

the environment where the selected medium is to be installed Refer to curriculum topic: 1.2.2 Criteria for choosing a network medium are the distance across which the selected medium can successfully carry a signal, the environment in which the selected medium is to be installed, the amount of data and the speed at which the data must be transmitted, and the cost of the medium and its installation.

The home computer of a user is working properly. However, the user cannot access the Internet. The Internet connection is provided through a cable company. The user cannot identify the cause of the problThe home computer of a user is working properly. However, the user cannot access the Internet. The Internet connection is provided through a cable company. The user cannot identify the cause of the problem. Who should the user contact for further help? the operating system vendor the help line of the cable company the help line of the computer manufacturer the support web site of the computer vendor em. Who should the user contact for further help?

the help line of the cable company

When IPv4 is configured for a computer on a network, what does the subnet mask identify? Chapter 4

the part of the IP address that identifies the network Refer to curriculum topic: 4.1.3 The IP addressing system is a hierarchical addressing system. An IP address is made up of two parts: the network address and the host address. For IPv4, the subnet mask is used to identify which portion of an IPv4 address is the network address and which portion is the host address.

A technician has been asked to troubleshoot a simple network problem that seems to be caused by software. Which troubleshooting approach should be used? bottom-up top-down divide and conquer substitution

top-down

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? ipconfig netstat telnet traceroute

traceroute

Which items are collectively referred to as network media? routers and switches wires and radio waves firewalls and servers PCs and laptops

wires and radio waves


Ensembles d'études connexes

Ch 46 - Hematologic or Neoplastic Disorder

View Set

Chapter 18: Intraoperative Nursing Management

View Set

Ch. 2 (Historical Perspectives) Questions

View Set

ATI HEALTH ASSESS: HEAD, NECK, NEUROLOGICAL

View Set

Programming and Logic Design, Chapter 2, Variable Naming Conventions

View Set

Integumentary Disorders Comprehensive Examination

View Set