FINAL NETWORK EXAM QUIZES
an experimental address
240.2.6.255
The last host address on the 10.15.25.0/24 network is ??
254
A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?
255.255.255.224
Which statement is true about Cisco IOS ping indicators?
'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.
The last host address on the 10.15.25.0/24 network is ??
.254
What is the prefix length notation for the subnet mask 255.255.255.224?
/27
The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7 is
00000111
What are three responsibilities of the transport layer? (Choose three.)
1. meeting the reliability requirements of applications, if any 2. multiplexing multiple communication streams from many users or applications on the same network 3. identifying the applications and services on the client and server that should handle transmitted data
ANSWER???
10.18.10.208/28 10.18.10.224/28
A loopback address?
127.0.0.1
a link-local address
169.254.1.5
The network portion of the address 172.16.30.5/16 is ?
172.16
The network portion of the address 172.16.30.5/16 is?
172.16
A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?
4
How many host addresses are available on the 192.168.10.128/26 network?
62
A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?
65536
On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)
Console and VTY ports
Which process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5?
DHCP?
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)
DNS VoiP
A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
DNS server default gateway
What is considered the most effective way to mitigate a worm attack?
Download security updates from the operating system vendor and patch all vulnerable systems.
Why is DHCP preferred for use on large networks?
It is a more efficient way to manage IP addresses than static address assignment.
Which three fields are used in a UDP segment header? (Choose three.)
Length Source Port Checksum
Which element of scaling a network involves identifying the physical and logical topologies?
Network Documentation
Which protocol can be used to transfer messages from an email server to an email client?
POP3
hardware threats
Physical damage
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 30 attempts 2 within 10
Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)
Session App Presentaion
Which transport layer feature is used to guarantee session establishment?
TCP 3-way handshake
True or False? In FTP transactions, an FTP client uses the pull method to download files from an FTP server.
TRUEEE
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
The client randomly selects a source port number.
What is true about a client-server network?
The network includes a dedicated server
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?
The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?
Tunneling
What is an advantage of UDP over TCP?
UDP communication requires less overhead.
What type of traffic would most likely have the highest priority through the network??
Voice
On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?
a home router
An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?
all IPv6 enabled devices on the local link or network
FF02::1
all node multicast
Which TCP/IP model layer is closest to the end user?
application
What type of applications are best suited for using UDP?
applications that are sensitive to delay
What does the IP address 192.168.1.15/29 represent?
broadcast address
Step 1
client send FIN
step 4
client sends ACK
step 3
server sends FIN
The IPv4 packets and IPv6 packets coexist in the same network.
dual-stack
How should traffic flow be captured in order to best understand traffic patterns in a network?
during peak utilization times
Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)
exhibit router s s s PC PC PC (10 hosts)
What is one of the most effective security tools available for protecting users from external threats?
firewalls
A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme?
geographic location device type
2001:DB8::BAF:3F57:FE94
global unicast
This part of the address is the equivalent to the host portion of an IPv4 address.
interface ID
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?
ipconfig /displaydns
Which type of IPv6 address is not routable and used only for communication on a single subnet?
link-local address
::1
loopback
Which command is used to manually query a DNS server to resolve a specific host name?
nslookup
A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?
peer-to-peer (P2P)
maintenance threats
poorhandling
Network services use _______________ to define a set of rules that govern how devices communicate and the data formats used in a network.
protocol
What are two benefits of subnetting networks? (Choose two.)
reducing the size of broadcast domains grouping devices to improve management and security
Step 2
server send ACK
An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?
show file systems
FF02::1:FFAE:F85F
solicited node multicast
This part of the address is used by an organization to identify subnets.
subnet ID
An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?
subnetwork 192.168.1.64 subnet mask 255.255.255.192
What does the value of the window size specify?
the amount of data that can be sent before an acknowledgment is required
What type of information is contained in a DNS MX record?
the domain name mapped to mail exchange servers
What is the purpose of using a source port number in a TCP communication?
to keep track of multiple conversations between devices
What is the purpose of the TCP sliding window?
to request that a source decrease the rate at which it transmits data
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?
to test that the host has the capability to reach hosts on other networks
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?
tracert 10.1.1.5
IPv6 packets are converted into IPv4 packets, and vice versa.
translation
What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence?
transport
The IPv6 packet is transported inside an IPv4 packet.
tunneling
electrical Threats
voltage spikes
Which two types of devices are typically assigned static IP addresses? (Choose two.)
web servers printers
Which number or set of numbers represents a socket?
192.168.1.1:80
a public address
198.133.219.2
Three devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.) Device 1: IP address 192.168.10.77/28 on subnet 1 Device 2: IP address192.168.10.17/30 on subnet 2 Device 3: IP address 192.168.10.35/29 on subnet 3
1NN = 192.168.10.64 BN = 192.168.10.79 2nn = 192.168.10.16 bn = 192.168.10.19 3nn = .32 bn = .39
What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?
2001:D12:AA04:B5::/64
The shortest compressed format of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200 is ??
2001:DB8:0:1470::200
environmental threats
Extreme temp
This network portion of the address is assigned by the provider.
Global routing prefix
What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?
Gnutella
Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
HTTP MPEG GIF
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?
Have a second router that is connected to another ISP.
Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?
ICMP
In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?
SLACC
What is an advantage of SMB over FTP?
SMB clients can establish a long-term connection to the server.