Cisco Network Technician Career Path Exam Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A new employee is attempting to configure a cell phone to connect to the email server of the company. Which port number should be selected when using the IMAP4 protocol to access email messages stored on the local server? A. 143 B. 69 C. 25 D. 110

A. 143

A client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address? A. 443 B. 110 C. 404 D. 80

A. 443

What is one difference between a switch and a router? A. A router propagates broadcast messages, and a switch does not propagate broadcast messages. B. A router creates smaller broadcast domains, and a switch extends the size of a broadcast domain. C. A router uses a routing table to store information about destination host IP addresses, and a switch uses an ARP table to store information about destination host MAC addresses. D. A router provides segmentation at Layer 2, and a switch provides segmentation at Layer 3.

A. A router propagates broadcast messages, and a switch does not propagate broadcast messages.

Which two scenarios would benefit the user the most by adding quality of service (QoS) to the network? (Choose two.) A. Students are watching a lecture from a YouTube site. B. Students are updating information about their sport activities on the class Facebook page. C. A student is sending emails to a friend. D. A student is communicating via Skype with a friend in another country.

A. Students are watching a lecture from a YouTube site. D. A student is communicating via Skype with a friend in another country.

A secretary receives a phone call from someone claiming that their manager is about to give an important presentation but the presentation files are corrupted. The caller sternly asks that the secretary email the presentation right away to a personal email address. The caller also states that the secretary is being held personally responsible for the success of this presentation. What type of social engineering tactic is the caller using? A. intimidation B. trusted partners C. familiarity D. urgency

A. intimidation

What is the purpose of protocols in data communications? A. Specifying the bandwidth of the channel or medium for each type of communication. B. Providing the rules required for a specific type of communication to occur. C. Specifying the device operating systems that will support the communication. D. Dictating the content of the message sent during communication

B. Providing the rules required for a specific type of communication to occur.

Which three statements describe the functions of the Cisco hierarchical network design model? (Choose three.) A. The distribution layer distributes network traffic directly to end users. B. The access layer provides a means of connecting end devices to the network. C. Route summarization is not necessary at the core and distribution layers. D. The distribution layer is responsible for traffic filtering and isolating failures from the core. E. The goal of the core layer is maximizing throughput. F. The core layer usually employs a star topology.

B. The access layer provides a means of connecting end devices to the network. D. The distribution layer is responsible for traffic filtering and isolating failures from the core. E. The goal of the core layer is maximizing throughput.

How do hosts ensure that their packets are directed to the correct network destination? A. They search in their own local routing table for a route to the network destination address and pass this information to the default gateway. B. They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​ C. They always direct their packets to the default gateway, which will be responsible for the packet delivery. D. They send a query packet to the default gateway asking for the best route.

B. They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​

A user reports that the computer occasionally loses connectivity when streaming videos from the web. The technician suspects that a network hardware issue may exist in a device located between the computer and the internet edge router. Which documentation would the technician use to determine where network devices are located in the path from the user to the edge router? A. logical topology map B. physical topology map C. three-layer enterprise network design model D. cloud service architecture diagram

B. physical topology map

When IPv4 is configured for a computer on a network, what does the subnet mask identify? A. he device that the computer uses to access another network B. The part of the IP address that identifies the network C. The dynamic subnetwork configuration close D. The pool of addresses assigned within the network

B. the part of the IP address that identifies the network

Which IPv6 address notation is valid? A. ABCD:160D::4GAB:FFAB B. 2001::ABCD:: C. 2001:DB8:0:1111::200 D. 2001:0DB8::ABCD::1234

C. 2001:DB8:0:1111::200

What is a benefit of adding a router within an IP network? A. Reduces the number of hosts that can connect to the network. B. Controls host-to-host traffic within a single local network. C. Keeps broadcasts contained within a local network. D. Increases the size of the local network

C. Keeps broadcasts contained within a local network.

A user has taken a personal laptop to work. The laptop is unable to discover the name of the office wireless network. What are two potential causes of this problem? (Choose two.) A. The wireless router is set to mixed mode. B. The laptop has not received an IP address from the wireless router. C. The network does not support the wireless protocol in use by the laptop. D. The wireless router is not broadcasting the SSID. E. The laptop must be configured with the office workgroup name.

C. The network does not support the wireless protocol in use by the laptop. D. The wireless router is not broadcasting the SSID.

A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.) A. netsh interface ipv6 show neighbor B. tracert C. nslookup D. ping E. arp -a F. ipconfig G. telnet

C. nslookup D. ping F. ipconfig

In the OSI model, what three functional areas are addressed by physical layer standards? (Choose three.) A. error detection and retransmission B. frame encapsulation C. signaling D. physical components E. media access control F. encoding

C. signaling D. physical components F. encoding

What do you call an impersonation attack that takes advantage of a trusted relationship between two systems? A. spamming B. sniffing C. spoofing D. man-in-the-middle

C. spoofing

What are two potential network problems that can result from ARP operation? (Choose two.) A. Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network. B. Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port. C. Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing. D. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. done E. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.

D. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. done E. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.


Ensembles d'études connexes

NU271 Week 9 PrepU: Reproduction

View Set

DNA Repair System & Its mechanisms(3)

View Set

Assessment Exam 1 : Module 2: Chapters 3, and 6

View Set