Internetworking with TCP/IP
Which utility displays a host's current Network Basic Input/Output System (NetBIOS) over a TCP/IP connection?
nbtstat.
How does the receiver Simple Mail Transfer Protocol (SMTP) respond to the sender SMTP issued Data command?
354 start mail input.
Which three of the following are H.323 gatekeeper functions? (Choose three.)
Admissions control. Call signaling. Bandwidth management.
Which two of the following are the interior gateway routing protocol (IGRP) default metrics? (Choose two.)
Bandwidth Delay
Which three of the following cost factors might least cost routing use to calculate a minimum-cost path for a packet? (Choose three.)
Bandwidth. Delay. Cash costs.
Which of the following are the three Simple Mail Transfer Protocol (SMTP) mail transfer phases? (Choose three.)
Connection closure. Data transfer. Connection establishment.
The concept of a virtual terminal allows for which of the following? (Choose two.)
Connectivity to multiple host computers Multitasking host computers
At which Open Systems Interconnection reference model (OSI/RM) layer does the physical address reside?
Data Link
Which IP packet bits does open shortest path first (OSPF) use to provide Type of Service (ToS) routing?
Delay, throughput, reliability, and cost (D-T-R-C) bits.
How does enhanced interior gateway routing protocol (EIGRP) avoid routing loops?
Diffusing Update Algorithm (DUAL).
In order to automatically build a routing table, which type of indirect routing must a router use?
Dynamic.
Which three of the following are advantages of remote terminal access (Telnet) over direct terminal-to-host access? (Choose three.)
Increased user productivity Access to multiple, separate sites from the same terminal Reduction in the number of physical terminals
Which routing type allows networks to recover from failed routes?
Multipath routing.
Which Simple Network Management Protocol (SNMP) sets object values on an agent with it's protocol data units (PDU)?
SetRequest
What is the decimal equivalent of the binary number 1010?
10
Which two of the following are examples of local area network (LAN) logical addresses? (Choose two.)
201.90.35.78 Port 23
Which portion of the transmission control protocol (TCP) header specifies the next sequence number the receiver expects from the connection source?
Acknowledgment number.
Which Simple Network Management Protocol (SNMP) management mode allows us to change a device's characteristics and operating parameters?
Active management.
Which two of the following are default Interior Gateway Routing Protocol (IGRP) features? (Choose two.)
Route update period = 90 seconds Maximum hop count = 100
Convert the binary IP address 10101111.11001100.00010110.01010101 to a decimal IP address.
175.204.22.85
Which types of transmission control protocol (TCP) segments contain window size advertisements?
ACK
How does the Domain Name System (DNS) resolve fully qualified domain names (FQDN) to IP addresses?
By looking up the names in an address mapping database.
How does routing information protocol (RIP) resolve the count-to- infinity problem?
Hop-count limits.
Convert the decimal IP address 206.190.36.45 to a binary IP address.
11001110.10111110.00100100.00101101
How many Dynamic Host Configuration Protocol (DHCP) address allocation steps are required to enable the client to successfully acquire a lease from a server?
4
Which network device allows us to connect dissimilar network topologies?
Bridge.
Which portion of the Simple Network Management Protocol (SNMP) architecture is responsible for implementing SNMP and exchanging messages between the management station and the managed elements?
The SNMP engine.
Which best describes IP's use of the time-to-live (TTL) field?
The TTL specifies the time a datagram is allowed to remain on the network.
What happens to a datagram marked as "do not fragment" if it must be transmitted across a network segment with a maximum transmission unit field (MTU) smaller than the datagram?
The transmitting network device will drop the datagram, and notify the source.
Which three of the following applications utilize user datagram protocol (UDP)? (Choose three.)
Trivial file transfer protocol (TFTP). Simple network management protocol (SNMP). Domain Name System (DNS).
Transmission control protocol (TCP) establishes which type of circuit between applications?
Virtual
Which protocol reduces the number of client terminal protocols the remote host must support?
Virtual terminal protocol (VTP).
Which of the following troubleshooting tools tells how many hops to the destination computer?
tracert.
Which of the choices below is an example of an exterior gateway protocol (EGP)?
Border gateway protocol (BGP).
The Open Systems Interconnection Reference Model (OSI/RM) Data Link Layer serves which primary purpose?
It builds a flat network model with unroutable physical addresses.
How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from forgery and interception?
It uses digital signatures and public-key encryption techniques.
How does a network address translation (NAT) netmask work to map internal addresses to external addresses?
It works as an inverse mask, converting the internal network address portion to a public address.
Simple Network Management Protocol (SNMP) structures management information base (MIB) information in which of the following trees?
A name tree.
An Interior Gateway Routing Protocol (IGRP) interior route is which of the following?
A path to a directly attached, subnetted route
Which Domain Name System (DNS) record type specifies name to address translation, such as used in a glue record entry?
Address (A).
Which of the following echoes information back from an IP process?
ping.
Which two of the following devices work only with the binary representations of network data? (Choose two.)
Hub Repeader
A Class D address is also known as which type of address?
Multicast
Which Domain Name System (DNS) record lists a zone's name servers?
Name server (NS).
Which command can we use in conjunction with the address resolution protocol (ARP) command to determine the hostname of a cached NetBIOSover-IP address?
Nbtstat -A <IPaddress>.
You need to integrate these six class C networks 201.36.35.0/24, 201.36.72.0/24, 201.36.78.0/24, 201.36.79.0/24, 201.36.80.0/24, and 201.36.141.0/24. Which of these networks would be in the classless interdomain routing (CIDR) network range 201.36.72.0/21?
201.36.72.0/24 201.36.78.0/24 201.36.79.0/24
Which TCP/IP Transport Layer protocol provides an end-to-end, transaction-oriented, best-effort, connectionless service?
User datagram protocol (UDP).
Using the subnet mask 255.255.255.192, which sets of host addresses will be able to communicate on the same network segment?
210.68.165.65 to 210.68.165.120
In which three ways do organizations benefit from using private IP addresses? (Choose three.)
-They gain more network design flexibility with a large address range. -They prevent Internet address clashes when obtaining only a small range of Internet Corporation for Assigned Names and Numbers (ICANN) assigned addresses.-They conserve public IP addresses when uniqueness is not required.
When troubleshooting a network, we begin by performing which of the following?
Identify the issue.
What is the binary equivalent of the decimal number 254?
11111110
In a Class B network, if you borrowed 9 bits, how many usable subnets would you create?
512
What is the decimal value of the binary number 1000?
8
Network Interface Layer, Internet Layer, Transport Layer, Application Layer.
Printer.
Which TCP/IP protocol has us attach a remote device to the local file system by mounting it?
Network File System (NFS).
Which TCP/IP Application Layer protocol allows companies to publicly post information over the Internet?
Network News Transfer Protocol (NNTP)
Which two of the following are considered reserved IP addresses? (Choose two.)
0.x.y.z 127.x.y.z
Which is another name for the decimal number system?
Base 10
Which is another name for the binary number system?
Base 2
Which three of the following networking devices break up collisions? (Choose three.)
Bridge Switch Router
What must the Network Layer do to a received frame first in order to determine the route over which it will forward the datagram to the next network?
Decapsulate the packet.
Simple mail transfer protocol (SMTP) is which type of message delivery system?
Direct delivery
Network News Transfer Protocol (NNTP) allows TCP/IP users to perform which of the following?
Download news articles.
Which two choices are examples of trivial file transfer protocol (TFTP) use? (Choose two.)
Download router upgrades.Software upgrades to IP telephones.
If you want to locate a previously saved Uniform Resource Locator (URL) so that you can quickly return to it as needed, where on the browser toolbar would you look?
Favorites
Which of the following is the primary purpose of the Open Systems Interconnection Reference Model (OSI/RM) Transport Layer?
It defines well known logical port addresses for communications between applications.
Which is the primary purpose of the Open Systems Interconnection reference model (OSI/RM) Session Layer?
It establishes, manages, and terminates dialogs between Presentation Layer entities.
The Open Systems Interconnection Reference Model (OSI/RM) Application Layer serves which primary purpose?
It provides the user interface to the system.
The Open Systems Interconnection Reference Model (OSI/RM) Network Layer serves which primary purpose?
It uses Layer 3 (Network Layer) addresses to create multiple routed networks.
A file transfer protocol (FTP) server administrator can control server access in which three ways? (Choose three.)
Make only portions of the drive visible Control read and write privileges Limit file access
Which three of the following are network management model components for Simple Network Management Protocol (SNMP)? (Choose three.)
Managed devices. Network management station (NMS). Network management protocol.
Simple Network Management Protocol (SNMP) gathers network information from what type of database?
Management information base (MIB).
Which two of the following are examples of email programs? (Choose two.)
Microsoft Outlook UNIX Sendmail
Which three of the following are examples of Simple Network Management Protocol (SNMP) router management categories? (Choose three.)
Performance Configuration Security.
Of the five trivial file transfer protocol (TFTP) packet types, which three choices below are TFTP packet types? (Choose three.)
Read request Write request Acknowledgment
Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-text data as attachments?
SMTP only carries ASCII text characters.
Which OSI/RM Data Link Layer 2 device creates multiple network segments, each offering the full network bandwidth?
Switch
Which Simple Network Management Protocol (SNMP) remote monitoring (RMON) extension prepares reports about a group of devices that head a measured parameter's statistical list?
The Host Top N Group.
When might you use the rlogin TCP/IP application?
To remotely connect one UNIX workstation to another.
Which name resolution technique dynamically resolves Windows host names to IP addresses?
Windows Internet Naming Service (WINS).
Considering the default Cisco router default administrative distances (AD), which of the following routes will a router consider more trustworthy than the others?
Static route.
Which three choices are indirect routing types? (Choose three.)
Static. Default. Dynamic.
Which application protocols does file transfer protocol (FTP) use on its command channel?
Telnet
How would IP multicasting map address 224.0.0.1 to an Ethernet multicast address?
01:00:5E:00:00:01
Which are considered private Internet protocol (IP) addresses? (Choose three.)
10.0.0.0 172.31.255.255 192.168.0.0
What is the binary equivalent of the subnet mask 255.248.0.0?
11111111.11111000.00000000.00000000
Which Dynamic Host Configuration Protocol (DHCP) option code is used for specifying vendor specific options?
128
Using the default Class C subnet mask, 255.255.255.0, which two addresses will be able to communicate on the same network segment? (Choose two.)
192.200.129.18 192.200.129.179
Using the subnet mask 255.255.255.248, which two addresses are on the same subnet? (Choose two.)
194.212.56.18 194.212.56.20
Which three of the following are functions of the TCP/IP Internetwork Layer? (Choose three.)
A global addressing structure Packet fragmentation Service type request
Which best describes a Dynamic Host Configuration Protocol (DHCP) scope?
A range of addresses from which the server chooses a client address assignment
Which three parts of the transmission control protocol (TCP) header help the protocol ensure reliable communications between applications? (Choose three.)
ACK control bits Sequence numbers Checksum
Typing ipconfig in the Windows command line interface (CLI) displays which three of the following pieces of client configuration information? (Choose three.)
Adapter address. IP address. Lease expiration.
In TCP/IP, what does a network host use to find a physical address, given a logical address?
Address resolution protocol (ARP).
What is the first step in most client requests?
Address resolution.
Which TCP/IP protocol allows a diskless workstation to discover its IP address, as well as download a boot file?
Bootstrap Protocol (BOOTP).
A router that can receive packets from a neighboring router and forward them to at least one other router is called what?
Border system (BS).
Address resolution protocol (ARP) requests are sent as which type of Ethernet frame?
Broadcast
Which of the following choices is the correct order in which a Dynamic Host Configuration Protocol (DHCP) client initially obtains an IP address?
DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK
If a hypertext transfer protocol (HTTP) client does not specify a document name in its HTTP request message, what will the HTTP server return in response?
Default document.
To reduce routing information traffic between adjacent networks, Open Shortest Path First (OSPF) networks elect which two devices? (Choose two.)
Designated router (DR). Backup designated router (BDR).
Which Dynamic Host Configuration Protocol (DHCP) network address allocation mechanism assigns a host a temporary IP address
Dynamic
With the subnet mask 255.255.255.128, how frequently will the Class B subnets increment, and in which octet?
Every 128 hosts; third and fourth octets.
Which two of the following might cause a ping across network boundaries to fail? (Choose two.)
Firewalls on the router ports. Internet Control Message Filters (ICMP) filters on the router ports.
What type of routing table update message does Interior Gateway Routing Protocol (IGRP) send to quickly remove a route and place it in holddown?
Flash updates.
Which of the following are H.323 audio codecs? (Choose two.)
G.711 G.728
Which three choices are Interior Gateway Routing Protocol (IGRP) stability features? (Choose three.)
Holddowns Split horizons Poison reverse updates
IP routing information protocol (RIP) uses which of the following metrics to make path decisions?
Hop count
Which statement best describes Internet Message Access Protocol (IMAP)?
IMAP allows users to scan email headers and choose email messages to download from the email server.
Which addresses combine to create a transmission control protocol (TCP) socket?
IP and port.
When might a BOOTP client discard a BOOTREPLY message? (Choose three.)
If the destination port number is 67.If the BOOTREPLY targets another media access control (MAC) address. If the BOOTREPLY includes a transaction ID other than its own.
Which troubleshooting step is likely to require the most time?
Isolate the cause.
How does network address translation (NAT) help secure a private network from outside attacks?
It allows networks to use private IP addresses on the internal network, and still access the Internet.
How does the user datagram protocol (UDP) support multiple application destinations on the same host?
It carries port numbers in its header, used to logically address a destination application.
Which statement best describes an Open Shortest Path First (OSPF) virtual link?
It connects area border routes (ABR) over a nonbackbone area.
How does a transmission control protocol (TCP) process handle a failed connection?
It sends an RST segment when the maximum retry count is exceeded.
The Open Systems Interconnection reference model (OSI/RM) Physical Layer serves which primary purpose?
It transmits data in the form of bits across the physical medium.
The broadcast packets used by link-state protocols to share routing information about neighbor routers are called what?
Link-state Algorithms (LSA).
Which advanced routing function allows for redundant paths between networks?
Load splitting.
For which three purposes might you use multicasting on an IP network? (Choose three.)
Online training Teleconferencing Software distribution
Which network segment hosts respond to an address resolution protocol (ARP) request?
Only the target host responds
Which are the two control entries found in a master file resource record (RR) entry? (Choose two.)
Origin Include
Which statement best describes proxy address resolution protocol (ARP)?
Proxy ARP allows a router to answer an ARP request on behalf of a remote host.
Which choice best describes a Simple Network Management Protocol (SNMP) proxy agent?
Proxy agents translate between SNMP and proprietary management systems.
In which three of the following ways does RIPv2 differ from routing information protocol (RIP)? (Choose three.)
RIPv2 adds a Route Tag routing table entry. RIPv2 supports variable length subnet masks. RIPv2 provides update message authentication.
Which IP protocol allows a diskless workstation to contact a server and obtain an IP address?
Reverse address resolution protocol (RARP).
Which TCP/IP application allows users to display locally a remote UNIX host's screen?
Rlogin
Which network device allows communication between separate IP networks?
Router.
Which network device can isolate broadcast traffic to the local network segment?
Router.
Which two dynamic routing protocols create flat network topologies? (Choose two.)
Routing information protocol (RIP). Interdomain routing protocol (IDRP).
What does each link-state router build to describe the cost to reach each destination network?
Shortest path first (SPF) tree.
An H.323 multipoint control unit (MCU) provides which service on a converged network?
Terminal conferencing.
As a result of issuing the file transfer protocol (FTP) DIR command, each file listing entry begins with a "-"; what does the "-" indicate?
The entries are files
A subnet's broadcast address has which portion's bits set to all ones?
The host portion.
Which statement best describes Handshake #1?
The initiator sends a SYN segment to the target host's transmission control process (TCP) process.
What results from trapping data with an Simple Network Management Protocol (SNMP) agent?
The managed device alerts the management station of a threshold violation.
Which enhanced interior gateway routing protocol (EIGRP) routing table keeps a list of neighbors which are directly attached to one of the router's interfaces?
The neighbor table.
Where does the Domain Name System (DNS) namespace begin?
The root.
A router makes its packet forwarding decisions based on what information?
The router's routing table.
Distance vector algorithms (DVA) operate in which manner?
They advertise their routing tables to directly connected neighbor routers.
Why does Internet Control Message Protocol (ICMP) use identifier and sequence numbers?
To allow the sender to match ICMP reply messages with requests.
Which two of the following are reasons why an organization would choose to subnet their network? (Choose two.)
To build a more scalable network To conserve network addresses
Quality of Service (QoS) routing uses which Internet protocol (IP) header field to make route decisions?
Type of Service (ToS).
Which IP packet frame field ensures that the gateways handling a datagram agree on the datagram's format?
Version
In which cases will a BOOTP relay agent discard a BOOTREQUEST message? (Choose three.)
When the destination port is 68. If the OpCode is not 1 or 2. If the Hop count field value exceeds 16.
Which Telnet single command option code tells the requestor that the remote will not perform the option?
Won't (252).
Which address resolution protocol (ARP) command option shows the contents of the local ARP cache?
arp -a.
Which are TCP/IP network troubleshooting tools? (Choose three.)
Netstat. Ping. Tracert.
Zones maintain domain name information in which record types?
Resource records (RR).
Hubs connect network hosts in which configuration?
Star
Which is a valid Class B network address?
151.129.89.76
Which TCP/IP troubleshooting tool is the fastest and easiest method to evaluate whether a host is available across a TCP/IP network?
Ping
Which two codecs support audio coding at 64 Kbps? (Choose two.)
G.711 G.722
Which best describes a BOOTP relay agent?
It forwards client BOOTREQUEST messages across subnet boundaries.
How does virtual terminal protocol (VTP) support remote terminal access?
It provides generic terminal interfaces for data and control transfer.
How does the transmission control protocol (TCP) receiver control the data flowing from the source?
It sets the receive window size with each ACK segment it returns.
Which multimedia protocol specifies a multipoint conferencing transport?
T.120
Which of the following is another name for a distance vector algorithm (DVA)?
Bellman-Ford algorithm.
Which network device requires a device driver in order to connect hosts to the network segment?
Network interface card (NIC).
Which H.323 recommendation protocol handles registration, admission, and status (RAS)?
H.225
Why might we use Internet Control Message Protocol (ICMP) testing on an IP network?
To obtain feedback about various problems that might occur on the network.
Why would you use a Bootstrap Protocol (BOOTP) relay agent on your network?
To pass BOOTP messages between subnets
When troubleshooting, why is it important to recreate a problem?
To recognize that there is a problem. To record the circumstances in which the problem occurred. To help focus your efforts. All of the above.
Which Quality of Service (QoS( protocols could a network support to provide robust voice over Internet protocol (VoIP) services? (Choose two.)
(Choose two.) 802.1p. Resource Reservation Protocol (RSVP).
When troubleshooting a problem crossing network responsibilities, why is it best to start with the local network and work out? (Choose three.)
-It allows us to eliminate and resolve any internal problems first. -It provides information we can use to support our case, if the problem proves to be external to our network. -It breaks up the troubleshooting effort to specific areas of responsibility.
On an IP network, all hosts must be able to handle a packet size of at least how many bytes?
576
If we borrow 3 bits from a Class C network address, how many usable subnets have we created?
8
Which three of the following are file transfer protocol (FTP) objectives? (Choose three.)
File sharing. Transparent file storage technology. Reliable data transfer.
Which three choices are transmission control protocol (TCP) features? (Choose three.)
Flow control. Packet error recovery. Demultiplexing multiple applications.
A file transfer protocol (FTP) control port is used by an FTP server to perform which of the following?
Interpret requests from a client.
Network address translation (NAT) IP address translation assigns external addresses to internal devices in which way?
It assigns the internal address to one of a pool of external addresses.
Which protocol data unit (PDU) type requests that the management agent return attribute values for a list of managed objects?
GetRequest.
Which two of the following result from using Open Shortest Path First (OSPF) routing areas? (Choose two.)
Greatly reduced routing information traffic within the entire autonomous system (AS). The development of a routing information hierarchy.
Which protocols assist H.323 in controlling and monitoring connections? (Choose two.)
H.225 H.245
Which Simple Mail Transfer Protocol (SMTP) command identifies the sending host?
HELO
Which best describes why an hypertext transfer protocol (HTTP) server can handle multiple simultaneous connections?
HTTP is stateless, which means the server has no knowledge of previous Connections after they are dropped
Open Shortest Path First (OSPF) routers send which type of packet to locate their neighbors?
Hello
Which type of network architecture allows routers to perform different tasks depending on their functional position within an area?
Hierarchical.
Which three of the following are distance vector algorithm (DVA) stability features? (Choose three.)
Holddowns Hop-count limits Split horizons
Which metric does Interior Gateway Routing Protocol (IGRP) use on a network with only one medium, such as one running 16-Mbps Token Ring exclusively?
Hop count.
Which three of the following are examples of dynamic routing protocol metrics? (Choose three.)
Hop count. Line capacity. Transmission delay.
Which two mechanisms might a host use to resolve fully qualified domain names (FQDN) to IP addresses? (Choose two.)
Hosts table Domain Name System (DNS)
The Telnet default network virtual terminal (NVT) provides which fundamental characteristics? (Choose three.)
It embeds control commands in the data stream. The keyboard generates 128 ASCII codes. It transmits data as a 7-bit ASCII value in an 8-bit field.
Which statement best describes network address translation (NAT) masquerading?
It hides all internal addresses behind one external address.
How does a transmission control protocol (TCP) application acknowledge the last message's receipt?
It increments the received sequence number by one and sends it in the response message's Acknowledgment Number field.
Which best describes the Telnet single commands options Do (253) code?
It indicates that the sending Telnet desires the other party perform some specified option.
Which best describes transmission control protocol's (TCP) use of the Window header field?
It is bidirectional, so both ends can control data flow.
How does network address and port translation (NAPT) handle an IP packet's source and destination port and IP addresses?
It leaves the destination port and address as is, and changes the source port and address to addresses from its address pool.
How does a router determine where to send packets addressed to hosts on remote networks?
It looks in its routing table for an entry for the destination network.
Which statement best describes an Open Shortest Path First (OSPF) area border router (ABR)?
It maintains a link-state database for each area to which it is connected.
Which statement correctly describes Class of Service (CoS) routing?
It makes routing decisions based on the packet's service category.
How does dynamic address translation enhance network security?
It only maps internal hosts to external addresses for the duration of the connection.
How does RIPv2 authentication protect routing table information?
It password protects routing table updates between routers.
Which statement best describes split horizons?
It prevents a router from advertising a route out to the interface on which the route was learned.
Which three of the following terms refer to a physical address? (Choose three.)
Media access control (MAC) address. Adapter address. Hardware a
It increments the received sequence number by one and sends it in the response message's Acknowledgment Number field.
Network Interface Layer, Internet Layer, Transport Layer, Application Layer.
Which network address translation (NAT) address mapping technique maps internal IP addresses to a single, external IP address?
Network address and port translation (NAPT).
Which device provides the connection point between a workstation or personal computer (PC) and the network?
Network interface card (NIC).
Which two TCP/IP protocols are used for network management?(Choose two.)
Remote monitoring (RMON). Simple Network Management Protocol (SNMP).
Which best describes using a remote terminal versus direct access to a number of different hosts?
Remote terminal access provides single terminal access to a number of remote hosts.
Which protocol works with Internet protocol version 6 (IPv6) Quality of Service (QoS) mechanisms to provide video and other realtime data with reserved bandwidth across a data flow's path?
Resource Reservation Protocol (RSVP).
Given the subnet mask 255.255.254.0, and considering the trick you learned for identifying subnet masking patterns, in which octet will the subnet wire addresses increment?
Second
Which combined information triggers a transmission control protocol (TCP) or user datagram protocol (UDP) application to respond to an information request?
The Internet protocol (IP) address and port number.
What happens when a dynamic network address translation (NAT) device runs out of addresses to assign?
The NAT device refuses new connections.
A Domain Name System (DNS) start of authority (SOA) entry indicates which of the following?
The domain's primary DNS
In which two ways might using static routes provide additional network security over other routing options? (Choose two.)
They can limit packet traffic to only a single, dedicated route. They share no routing information with other routers.
Which best describes Telnet's use of subnegotiations?
They can vary in length and format.
Which statement best describes transmission control protocol's (TCP) use of sequence numbers?
They identify the sequence number of the first data byte in the segment.
If a Class B address's subnet mask is 255.255.254.0, in which octet does our subnet portion increment?
Third
If a Class B address's subnet mask is 255.255.255.192, in which octet does the subnet portion increment?
Third and fourth.
Why did the Internet Engineering Task Force (IETF) design classless interdomain routing (CIDR)?
To reduce routing table entries.
To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers contact which type of TCP/IP application server?
Domain Name System (DNS).
Which remote monitoring (RMON) group records and stores sample statistics for each monitored interface?
The History Control Group.
What does the class network number 127.x.y.z designate?
A loopback address
A hub that repeats and regenerates signals is called which type of hub?
Active
Which three of the following are included in the TCP/IP Internetwork Layer? (Choose three.)
Internet Group Management Protocol (IGMP). Internet protocol (IP). Address resolution protocol (ARP).
Which TCP/IP application distributes news articles read from a central database?
Network News Transfer Protocol (NNTP).
Remote monitoring (RMON) uses which devices, placed on remote network segments, to gather network information?
Probes.
Which TCP/IP UNIX specific application would allow us to connect to a remote database over the network, but restrict database activity to the remote host?
Rlogin.
Which three devices forward broadcast traffic? (Choose three.)
Switch. Bridge. Repeater.
What happens when the browser application finishes downloading the files necessary to display a web page?
The browser and server drop the connections, and the browser maintains the page and its elements in memory.
Which Simple Network Management Protocol (SNMP) protocol data unit (PDU) notifies the management station of the occurrence of a significant event?
Trap
Which is the best reason to use the file transfer protocol (FTP) application?
When you need to pass large files over a slow connection
At what maximum distance would you have to add a repeater to a 10Base2 network segment to prevent signal degradation
185m
Which two choices are TCP/IP email protocols? (Choose two.)
Simple Mail Transfer Protocol (SMTP). Internet Message Access Protocol (IMAP).
Internet email uses which two protocols? (Choose two.)
Simple Mail Transfer Protocol (SMTP). Post Office Protocol version 3 (POP3).
Which TCP/IP application allows a network user to remotely log on and manipulate a network device?
Telnet.
Which two statements are true concerning IP addressing?
The host portion should not be all 1s. The network portion bits should not be all 0s.
The Internet Assigned Numbers Authority (IANA) recommends organizations use private IP addresses under which condition?
The network uses gateways, routers, or firewalls to act on the network host's behalf.
How long is an Internet protocol version 6 (IPv6) address?
128 bits.
Which is the valid Class B IP address range?
128.001.hhh.hhh-191.254.hhh.hhh
How many total bits does a Class B subnet allow us to borrow from the host portion?
14
Using the subnet mask 255.255.255.240, which two addresses are on the same subnet? (Choose two.)
200.193.15.49 200.193.15.61
A Class C network address provides for how many network and host bits?
24 network, 8 hosts
A Class C address provides for a maximum of how many usable hosts?
254
The maximum Domain Name System (DNS) domain name length is how many characters?
255
Which broadcast IP address limits packets to the local network Asegment only?
255.255.255.255
How many Internet Control Message Protocol (ICMP) packets does the tracert utility send per hop?
3
How many fragments will the transmitting device have to create to match the datagram to the segment's 512 maximum transfer unit (MTU) size, having a 1,500-byte datagram, and a 20-byte IP header?
4
If we borrow 12 bits from a Class B address, how many usable subnets have we created?
4,096
At which point in the lease period does the client first attempt to renew its lease?
50 percent
Which would cause a router to update a route entry still in the holddown period set by a previously received update?
A triggered update with a lower hop count than previously received
Which text file type is the file transfer protocol (FTP) default?
ASCII
Simple Network Management Protocol (SNMP) represents object syntax with a subset of which International Organization for Standardization (ISO) standard?
ASN.1
When do a Telnet terminal and remote host negotiate options?
After establishing the transmission control protocol (TCP) connection.
When can a Dynamic Host Configuration Protocol (DHCP) server reuse an address offered in a DHCPOFFER message?
After the server times out waiting for a DHCPREQUEST message
Concerning routing information protocol (RIP), what is meant by the statement "maximum diameter of 15 hops"?
Any single network cannot be more than 15 hops away.
How does a diskless workstation identify itself when requesting an IP address using reverse address resolution protocol (RARP)?
By its media access control (MAC) address.
In which instance could you use Enhanced Interior Gateway Routing protocol (EIGRP) as a routing protocol?
Cisco routers in the same autonomous system (AS) as other Cisco routers.
In which instance could you use Interior Gateway Routing Protocol (IGRP) as a routing protocol?
Cisco routers in the same autonomous system (AS) as other Cisco routers.
Which key combination will terminate a continuous Ping issued with the Ping -t option?
Ctrl+C.
Which Simple Mail Transfer Protocol (SMTP) command designates that the message's text follows?
DATA.
What does Dynamic Host Configuration Protocol (DHCP) Overview and Objectives (DHCP) provide that Bootstrap Protocol (BOOTP) cannot?
DHCP assigns reusable addresses to any requesting host.
How might a Dynamic Host Configuration Protocol (DHCP) client relinquish its current lease?
DHCPRELEASE message.
Internet protocol (IP) provides which three of the following services to transmission control protocol (TCP)? (Choose three.)
Datagram routing. Time-to-live (TTL). Differentiated Services Code Point (DSCP).
Which services does Real-time Transport Protocol (RTP) provide to add reliability to packet voice networks? (Choose three.)
Delivery monitoring. Sequence numbering. Timestamping.
What type of network communication does not require a router's services?
Direct routing.
Border gateway protocol (BGP), though an exterior gateway protocol (EGP), operates as which type of routing protocol?
Distance Vector Algorithm (DVA).
If the number of hosts per subnet exceeds 255, how might you solve for the subnet incremental range?
Divide the number of hosts by 256.
Which TCP/IP client/server service would allow an administrator to quickly reconfigure host configuration information?
Dynamic host configuration protocol (DHCP).
Which Dynamic Host Configuration Protocol (DHCP) address allocation method assigns reusable addresses to DHCP clients?
Dynamic.
Which routing type allows network administrators to implement route load balancing and fault tolerance?
Dynamic.
In a subnetted Class B network, in what state will the host bits be on each subnet's broadcast address?
Each subnet's host bits are set to all 1s.
A ping command uses which Internet Control Message Protocol (ICMP) message types? (Choose two.)
Echo Request. Echo Reply.
Which of the following protocols scales better within a Cisco autonomous system?
Enhanced Interior Gateway Routing Protocol.
By default, how frequently do routing information protocol (RIP) routers send out response messages to neighbor routers?
Every 30 seconds
Which of the following protocols do autonomous systems (AS) use to exchange routing information between themselves?
Exterior gateway protocol (EGP).
Which two statements concerning multicasting are true? (Choose two.)
IP multicast group membership is dynamic. User datagram protocol (UDP) uses IP multicast services.
Which of the following is the generic routing protocol type that routers use to communicate within an autonomous system (AS)?
Interior gateway protocol (IGP).
Which router protocol type shares routing information within an autonomous system (AS)?
Interior gateway protocol (IGP).
Which three of the following are interior gateway protocol (IGP) examples? (Choose three.)
Interior gateway routing protocol (IGRP). Routing information protocol (RIP). Open shortest path first (OSPF).
A router that an administrator designates to forward packets between autonomous systems (AS) is called what?
Intermediate system (IS).
Which IP protocol will a router use to inform neighbor routers of congestion on an interface?
Internet Control Message Protocol (ICMP).
In what three ways does Open Shortest Path First (OSPF) control network routing table update traffic? (Choose three.)
It provides for partitioning networks into subdomains, called area routes. It supports multicast, rather than broadcast route update messages. It passes only route table changes, rather than entire tables.
What happens if the retransmission timer set by the sending transmission control protocol (TCP) times out before it receives an acknowledgment.
It retransmits the outstanding segments.
Which of the following describes a Domain Name System (DNS) resolver?
It retrieves IP address information.
How does a sending transmission control protocol (TCP) process handle a zero receive window size?
It sends periodic probe segments and waits for an ACK with a nonzero window size.
How does the Telnet network virtual terminal (NVT) support complex terminals?
It supports a 3-byte negotiation sequence.
What message type does border gateway protocol (BGP) send to test a connection's state?
KeepAlive.
Can the "arp" command be used to determine your own media access control (MAC) address?
No
An Open Shortest Path First (OSPF) autonomous system border router (ASBR) runs which two routing protocols? (Choose two.)
OSPF on interfaces on its own autonomous system (AS). Exterior Gateway Protocol (EGP) on interfaces on other autonomous systems (AS).
What is the primary difference between active and passive destinations in an enhanced interior gateway routing protocol (EIGRP) topology table?
Passive tables are stable and trusted.
Tracert uses which of the following commands and IP fields to carry out its operation?
Ping and time-to-live (TTL).
How can we verify that name resolution is working correctly?
Ping one or more network hosts by both name and address.
Which ping tests would indicate that TCP/IP is working correctly on a network segment? (Choose three)
Ping the local IP address. Ping other local segment hosts by IP address. Ping the local network segment router port.
How would we verify that TCP/IP is working on the local host?
Ping the local loopback address.
Internet Control Message Protocol (ICMP) supports which TCP/IP utility?
Ping.
Which routing information protocol (RIP) stability feature sets a route's hop count to 16, preventing further updates from setting an incorrect route to an unreachable network?
Poison reverse
Which transmission control protocol (TCP) function forces data delivery before filling the transmit buffer?
Push
Which two flags can a sending application set to force the transmission control protocol (TCP) process to send data before filling the transmit buffer? (Choose two.)
Push (PSH). Urgent (URG).
Which is the file transfer protocol (FTP) command used to place files on an FTP server?
Put.
Which command does the sender Simple Mail Transfer Protocol (SMTP) issue to terminate the transmission control protocol (TCP) connection?
QUIT.
Which Simple Mail Transfer Protocol (SMTP) command does the sender process use to identify separate recipient mailboxes?
RCPT.
How does remote monitoring 2 (RMON2) differ from remote monitoring (RMON)?
RMON2 looks at Layer 3 traffic, while RMON only looks at Layers 1 and 2.
Which two of the following result from implementing classless interdomain routing (CIDR)? (Choose two.)
Reduced network bandwidth utilization. Conservation of available addresses.
Which two of the following are advantages gained from using static routes? (Choose two.)
Reduced network overhead Added network security
Which of the following statements concerning Simple Mail Transfer Protocol (SMTP) is correct?
SMTP delivers mail from one computer to another.
Which type of packet does the receiving transmission control protocol (TCP) send to the source indicating its receipt of the source's SYN packet?
SYN-ACK
In what ways does open shortest path first (OSPF) improve upon the limitations of distance vector algorithm (DVA) protocols, such as routing information protocol (RIP)? (Choose three.)
Shortest Path First (SPF) technology resists routing loops. Routers exchange routing table updates only. All routing table exchanges are authenticated.
Which three of the following are typical network manager components? (Choose three.)
Simple Network Management Protocol (SNMP) engine. Transport/link. Management information base (MIB) database.
Which two statements are true concerning distance vector algorithm (DVA) routing protocols? (Choose two.)
Slow convergence can cause such problems as routing loops and lost packets. They usually require fewer router resources to compute the best path to a destination network than do other routing protocols.
Which three modes does file transfer protocol (FTP) use to transfer data? (Choose three.)
Stream. Block. Compressed.
On which network type is a static route best used?
Stub.
Which are the well know transmission control protocol (TCP) ports for file transfer protocol (FTP) server control and data? (Choose two.)
TCP Port 20 TCP Port 21
The Simple Mail Transfer Protocol (SMTP) receiver accepts incoming email on which well known port?
TCP Port 25
Before data can be sent between applications using transmission control protocol (TCP), which of the following must occur?
TCP connection must be established.
Which two of the following are examples of relative domain names in the ncti.com domain? (Choose two.)
Telnet Telnet.ncti
Which address resolution protocol (ARP) feature allows the local host to maintain a mapping of recently discovered IP-to-media access control (MAC) addresses?
The ARP cache
When subnetting Class B addresses, what is the first subnet's wire address equal to?
The default network wire address.
In a set of subnet address ranges, which is the first wire address in the first subnet?
The default network's wire address.
When subnetting Class A addresses, which two of the following is the first subnet's wire address equal to? (Choose two.)
The default wire address. Netid.0.0.0.
Which statement is true concerning IP routing?
The destination and source media access control (MAC) addresses change at each hop.
Why might a device send an Internet Control Message Protocol (ICMP) source quench message?
The device does not have the buffering capacity to forward a datagram.
When written in binary, the first part of a subnetted Class B network's wire address will show which bit pattern?
The network portion set as the default Class B network portion, the subnet portion to all 0s, and the host portion to all 0s.
Given the IP address 67.89.124.189 and the subnet mask 255.224.0.0, which is the subnetted octet, and how frequently will it increment?
The second octet, by 32.
What happens first when an IP host needs to resolve an IP address to a media access control (MAC) address?
The sending host looks in its address resolution protocol (ARP) cache for the necessary mapping.
In order for a host to communicate on a subnetted networksegment, which two portions of its IP address must match those of the subnet address? (Choose two.)
The subnet portion The network portion
Which three of the following are typical resolver functions? (Choose three.)
Translation of host name to host address (IP address). Translation of host address to host name. General lookup function that returns all of a resource record's (RR) content, rather than a processed form
Which of the following services does Simple Mail Transfer Protocol (SMTP) use?
Transmission control protocol (TCP).
Which three of the following are typical management agent components? (Choose three.)
Transport protocol. Simple Network Management Protocol (SNMP) engine. Management profile.
Which is a true statement concerning user datagram protocol (UDP)?
UDP servers must listen for service requests on well known ports, or else the transactions may fail.
Which best describes the user datagram protocol (UDP) demultiplexing process?
UDP uses port numbers to allow multiple applications to communicate simultaneously on the same host.
Which choice is the best solution for allowing externally initiated connections through a network address and port translation (NAPT) network address translation (NAT) device?
Use static address mappings for any internal services we wish to make externally available.
Which TCP/IP tool allows you to display a workstation's network configuration values?
ipconfig.
Which of the following commands shows the addresses configured on a Microsoft PC?
ipconfig.
Which of the following helps to determine local addressing information?
ipconfig.
Which command uses Network Basic Input/Output System (NetBIOS) to display protocol statistics on a local host?
nbtstat.
Which of the following commands shows the path between source and destination in a TCP/IP network?
tracert.
Which TCP/IP application allows us to transfer files either within a browser or at the command line?
File transfer protocol (FTP).
Which TCP/IP Internetwork Layer provides troubleshooting utilities, such as ping and traceroute?
Internet Control Message Protocol (ICMP).
Which two protocols deliver email directly to the email client? (Choose two.)
Post Office Protocol version 3 (POP3). Internet Message Access Protocol version 4 (IMAP4).
Which of the following best describes an email message's communication flow through the TCP/IP model layers?
The Transport Layer breaks the data stream into pieces, which it passes to the Network Interface Layer. The Network Interface Layer adds the source and destination Internet protocol (IP) addresses, and forwards the packets to the Internetwork Layer. The Internetwork Layer builds frames and converts them to bits for transport across the physical network.
Which protocol allows clients to locate and download IP addressing and configuration information on an automatically renewable (lease) basis?
Dynamic Host Configuration Protocol (DHCP).
Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported data types? (Choose two.)
Moving Picture Experts Group (MPEG). Graphics interchange format (GIF).
For what purpose would you choose to run the Telnet application?
To configure a router.
For what application is file transfer protocol (FTP) an excellent choice?
To download large files.
If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the 50-percent point, what happens next?
It attempts to obtain a lease at 87.5-percent lease time.
A remote monitoring 2 (RMON2) probe can capture a network segment's performance statistics based on which two of the following? (Choose two.)
IP address. Application.
In which two ways does a Simple Network Management Protocol (SNMP) agent respond to the management station? (Choose two.)
By responding to the management station's requests for updated data By trapping information that exceeds a set threshold and forwarding the data to the management station
Telnet is a protocol in which TCP/IP layer?
Application
Which file transfer protocol (FTP) command allows you to change directories within a file listing?
CD
What is the binary equivalent of the decimal number 129?
10000001
Which is the valid Class C IP address range?
192.000.001.hhh-223.255.254.hhh
The TCP/IP model Application Layer maps to which three Open Systems Interconnection reference model (OSI/RM) layers?
Application Layer - Session Layer - Presentation Layer.
Which three of the following are devices manageable with simple network management protocol (SNMP)? (Choose three.)
Applications. Bridges. Routers.
Which three of the following are Dynamic Host Configuration Protocol (DHCP) address allocation mechanisms? (Choose three.)
Automatic Dynamic Manual
Bridges and OSI/RM Layer 2 switches filter traffic in which way?
By building physical address to port mappings and making forwarding decisions based on these mappings.
Transmission control protocol (TCP) includes which three types of mechanisms to ensure reliable data transmission?
Checksum - Acknowledgements - Sequence number
Which three of the following are common Telnet application uses? (Choose three.)
Connect to an online database Connect remotely to run a specific application Connect to a router for network information
The file transfer protocol (FTP) server process can run as which two of the following? (Choose two.)
Daemon Windows service
When a management station polls a device agent process to collect information, the network management system is operating in which Simple Network Management Protocol (SNMP) network management mode?
Passive.