Intro To Networks Final Exam Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?

.com

What is the prefix length for the IP address 172.24.185.0 with a subnet mask of 255.255.255.192 ?

/26

What is the hexadecimal value of the decimal value 109?

0x6D

What is the binary value of the decimal value 110?

1101110

Which well-known port number is used by the SNMP protocol?

161

Which IP address represents the network address for the network that includes IP addresss 172.17.185.178/26?

172.17.185.128

Main(config)# interface gi0/1 Main(config-if)# description Connects to the payroll LAN Main(config-if)# ip address 172.22.52.94 255.255.255.240 Main(config-if)# no shutdown Main(config-if)# interface s0/0/1 Main(config-if)# description Connects to HeadOffice WAN Main(config-if)# ip address 10.52.168.126 255.255.255.192 Main(config-if)# no shutdown Main(config-if)# end ~ An administrator is adding a new host to the Payroll LAN. Which IP address would be an appropriate address for the new host?

172.22.52.81

A DHCP server is used to assign IP addresses dynamically to the hosts of a network. The address pool is configured with 172.19.184.0/24. There are 19 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

235

Given network 172.16.184.0, which subnet mask would be used if 7 host bits are available?

255.255.255.128

What subnet mask is required to support 512 subnets on network 172.29.0.0/16?

255.255.255.128

What class address is represented by the IP address 64.104.0.203 ?

A

What is a characteristic of a fault tolerant network?

A network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure

A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?

An increase in host-to-host ping response times

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

Crosstalk, electromagnetic interference

Which protocol or service functions at the application layer of the TCP/IP model?

DNS

A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

DSL

A Telnet client is receiving a response from a Telnet server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

Ethernet, IP, TCP, Telnet

What are two examples of the cut-through switching method?

Fast-forward switching, Fragment-free switching

What three services are provided by the transport layer?

Flow control, Connection establishment, Error recovery

Which protocol is used for viewing web information?

HTTPS

What function does pressing the Tab key have when entering a command in IOS?

It completes the remainder of a partially typed word in command

What are the two characteristics of an SVI?

It is associated with VLAN1 by default, It is not associated with any physical interface on a switch, It provides a means to remotely manage a switch.

What is done to an IP packet before it is transmitted over the physical medium?

It is encapsulated in a Layer 2 frame

What is a benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

Which two functions are primary functions of a router? (Choose two.)

Packet forwarding, Path selection

What action would be an example of a network attack that focused on disruption of service?

Preventing legal users from accessing data services

What is a key characteristic of the peer-to-peer networking model?

Resource sharing without a dedicated server

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

Route print, netstat -r

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see Layer 1 and Layer 2 details of a switch port?

Show interfaces

R1#config t R1(config)#enable password Cisco123 R1(config)#enable secret Cisco234 R1(config)#service password-encryption R1(config)#line con 0 R1(config)#password Cisco789 R1(config)#end R1#copy running-config startup-config R1#reload ~What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?~

The administrator will be presented with the R1> prompt.

A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?

The command is being entered from the wrong mode of operation

Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?

The delimiting character appears in the banner message

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)

The frame has the broadcast address as the destination address, The destination address is unknown to the switch.

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with other hosts in the local network.

C:\Windows\system32> tracert 192.168.100.1 Tracing route to 192.168.100.1 over a maximum of 30 hops 1 1 ms <1ms <1ms 10.10.10.10 2 2 ms 2 ms 1ms 192.168.1.22 3 2 ms 2 ms 1 ms 192.168.1.62 4 2 ms 2 ms 1 ms 172.16.1.1 5 2 ms 2 ms 1 ms 192.168.100.1 Trace complete. On the basis of the output, which two statements about network connectivity are correct?

There are 4 hops between this device and the device at 192.168.100.1, There is connectivity between this device and the device at 192.168.100.1

What are two functions of NVRAM?

To retain contents when power is removed, To store the startup configuration file

Which tool or utility is used in the reconnaissance network attacks?

Trust exploitation

Which procedure is used to reduce the effect of crosstalk in copper cables?

Twisting opposing circuit wire pairs together

What are two actions performed by a Cisco switch? (Choose two.)

Utilizing the MAC address table to forward frames via the destination MAC address, Using the source MAC address of frames to build and maintain a MAC address table

A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?

WAN

Which connection provides a secure CLI session with encryption to a Cisco switch?

an SSH connection

Main (config)# enable secret 2r321ciscoC Main (config)# line console 0 Main (config-line)# password 2rCtb Main (config-line)# login Main (config-line)# exit Main (config)# line vty 0 15 Main (config-line)# password bb33r2r Main (config-line)# login Main (config-line)# end ----- What password allows an administrator to login remotely? -----

bb22r2

What does the IP address 172.16.8.255/26 represent?

broadcast

What is a field in the data part of an Ethernet frame?

data

What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?

destination and source port numbers

What type of address is represented by the IP address 169.254.185.95

link-local

When applied to a router, which command would help mitigate brute-force password attacks against the router?

login block-for 60 attempts 5 within 60

Which example of malicious code would be classified as a Trojan horse?

malware that was written to look like a video game

Which type of UTP cable is used to connect a PC to a switch port?

straight-through


Ensembles d'études connexes

Окружающий мир 3 класс.Биология (119) карточки

View Set

Factors Affecting Life Insurance Premiums, Endowment Value, Reduced Paid Up Option, and Guaranteed Insurability Rider

View Set

thema 'hoe ziet hij of zij eruit?'

View Set

Psych 101 FINALS (ch 8-11) review

View Set

AI-Powered Shopping ads Certification Test

View Set

DEL Unit 02: Electrical Quantities and Ohm's Law

View Set

ACCT 4631 - Internal Auditing: CIA Quiz Topics 12, 13, 14

View Set

Chapter 47: Drug Therapy for Parkinson's Disease and Anticholinergics

View Set

Chapter 3 - Ethical Guidelines - Exam 3

View Set

204 Final Exam: Geographic Situations

View Set

AP Gov - Unit 3 - Civil Liberties MC Test

View Set

Elsevier: Chapters 20, 49, 50, 53, 54, 55, 39, 40, 47

View Set