Data Com final exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption

Fill in the blank.The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7 is

00000111

Which three are components of message timing? (Choose three.)

1. Access method 2. Flow control 3. Response timeout

Match the Internet connectivity type to the appropriate description or characteristic. (Not all options are used.)

1. Metro Ethernet - high-speed business class copper or fiber connection 2. Satellite - requires a dish and clear line of sight for service 3. SDSL - business class service that provides the same upload and download speeds over telephone lines 4. Cable - signal carried on the same copper or fiber medium as the television signal 5. Cellular - access via the cell phone network

Refer to the exhibit (other side). Match the example networks to the type of network. (Not all options are used.)

1. Network A - MAN 2. Network B - LAN 3. Network C - WLAN 4. Network D - WAN

Which three devices are considered end devices in a network? (Choose three.)

1. VoIP phone 2. security camera 3. TelePresence endpoint

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

1. greater bandwidth potential 2. limited susceptibility to EMI/RFI 3. greater distances per cable run

Match the type of threat with the cause. (Not all options are used.)

1. hardware threats - physical damage to servers, routers, switches, cabling plant, and workstations 2. environmental threats - temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry) 3. electrical threats - voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss 4. maintenance threats - poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

Which two types of devices are typically assigned static IP addresses? (Choose two.)

1. printers 2. web servers

What are two characteristics of a scalable network? (Choose two.)

1. suitable for modular devices that allow for expansion 2. grows in size without impacting existing users

Three methods allow IPv6 and IPv4 to co-exist. Match each method with its description. (Not all options are used.)

1.(Q) The IPv4 packets and IPv6 packets coexist in the same network. (A) Dual stack 2. (Q) The IPv6 packet is transported inside an IPv4 packet. (A) tunneling 3. (Q) IPv6 packets are converted into IPv4 packets, and vice versa. (A) translation

Refer to the exhibit (other side). What is the maximum possible throughput between the PC and the server?

128 kb/s

The network portion of the address 172.16.30.5/16 is .

172.16

What is the decimal equivalent of the hexadecimal value of 3F?

63

Which statement describes a characteristic of a converged network?

A single network that delivers voice, video, and data to a variety of devices.

A protocol that enables a sending node to determine the MAC address of the intended receiving node

ARP

Defines a set of tools that programs can use to access the network

Application layer

How does BYOD change the way in which businesses implement networks?​

BYOD provides flexibility in where and how users can access network resources.

A service that provides an IP address

DHCP

Which process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5?

DHCP

A TCP/IP application that resolves domain and computer names to IP addresses and IP addresses to domain and computer names.

DNS

Defines the rules for accessing and using the Physical layer.

Data link layer

MATCH THE LAYERS OF THE OSI MODEL

Datalink- 2 Presentation - 6 Session - 5 Physical - 1 Network - 3 Transport - 4 Application - 7

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

What is the process of converting information into the proper form for transmission?

Encoding

Which step of the communication process is concerned with properly identifying the address of the sender and receiver?

Formatting

Refer to the graphic (other side). H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true?

H1 sends a unicast message to H2, and the switch forwards it directly to H2.

A secure form of HTTP that uses secure sockets layer

HTTPS

MATCH THE LAYERS OF THE TCP/IP MODEL

Internet - 2 Application - 4 Network access - 1 Transport - 3

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

It sends the frame to all ports except the port on which it received the frame.

Translates a systems private IP address to public IP address before sending out to a larger network

NAT

The layer at which data-packet routing takes place.

Network layer

A protocol that provides connections to networks, intranets, extranets and VPNs through the Internet.

PPTP

An inner frame placed around data by the Internet Protocol

Packet

Defines the physical form taken by data when it travels across a cable. Cabling and hubs are in the physical layer.

Physical layer

Presents data from the sending system in a form that the applications on the receiving system can understand.

Presentations layer

How is SSH different from Telnet?

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

Match the description with the media. (Not all options are used.)

STP - This type of copper media is used in industrial or similar environments where there is a lot of interference Wireless - This media provides the most mobility options Optical fiber - This type of media is used for high transmission speed and can transfer data over long distances Coaxial - Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.

Manages the connections between machines on the network.

Session layer

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device needs mobility when connecting to the network.

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

Breaks up data it receives from the upper layers into smaller pieces for transport

Transport layer

An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again?

Use DHCP to automatically assign addresses.

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

What is a WAN?

a network infrastructure that provides access to other networks over a large geographic area

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast

At which layer of the OSI model would a physical address be encapsulated?

data link layer

Which logical address is used for delivery of data to a remote network?

destination IP address

A logical grouping of networking resources

domain

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

fault tolerance

What is one of the most effective security tools available for protecting users from external threats?

firewalls

Which method of data transfer allows information to be sent and received at the same time?

full duplex

Refer to the exhibit (other side). Which term correctly identifies the device type that is included in the area B?

intermediary

What layer of the TCP/IP protocol model determines the best path through the network?

internet

What type of delivery uses data link layer addresses?

local delivery

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

local router

What type of message is sent to a specific group of hosts?

multicast

What is the purpose of protocols in data communications?

providing the rules required for a specific type of communication to occur

What is the primary purpose of ARP?

resolve IPv4 addresses to MAC addresses

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

spyware

An TCP/IP application that provides terminal emulation

telnet

Why would a technician enter the command copy startup-config running-config?

to copy an existing configuration into RAM

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to test that the host has the capability to reach hosts on other networks

What is the purpose of the OSI physical layer?

transmitting bits across the local media

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

transport

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

tunneling


Ensembles d'études connexes

Individual Life Insurance Contract - Provisions and Options QUIZ

View Set

Tx Principles of Real Estate Part 2

View Set

Database Programming Final Exam Review

View Set

Ch. 4 Study Guide- Application Software: Programs that Let you Work and Play

View Set