ITN Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which two acronyms represent the data link sublayers that Ethernet relies upon to operate? (Choose two.)

LLC, MAC

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?

extended star

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

nslookup cisco.com, ping cisco.com

Refer to the exhibit. What does the value of the window size specify?

the amount of data that can be sent before an acknowledgment is required

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM.

A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection?

Add a connection to the Internet via a DSL line to another ISP.

Which statement describes network security?

It ensures sensitive corporate data is available for authorized users.

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

Peer-to-peer

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?

SSH

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)

Data Link, Physical

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?

A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer.

What is a characteristic of a switch virtual interface (SVI)?​

An SVI is created in software and requires a configured IP address and a subnet mask in order to provide remote access to the switch.

Why is NAT not needed in IPv6?​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)

Does not conduct electricity, used as backbone cabling/

Two network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching?

Errors when fast-forwards switching is used.

Which two issues can cause both runts and giants in Ethernet networks? (Choose two.)

Half-duplex operations, a malfunctioning NIC

Which two devices would be described as intermediary devices? (Choose two.)

IPS, Wireless LAN controller

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Places info in Ethernet frame to identify net layer protocol being encapsulated, and adds Ethernet control info to net prot data.

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

Segment

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

Session, application, presentation

What happens when a switch receives a frame and the calculated CRC value is different than the value that is in the FCS field?

Switch drops the frame

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

To which TCP port group does the port 414 belong?

Well-known

What task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command?

connectivity to the internet

What does a router do when it receives a Layer 2 frame over the network medium?

de-encapsulates the frame

Refer to the exhibit. A user issues the command netstat -r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?

fe80::30d0:115:3f57:fe4c/128

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

if there is connectivity with the destination device

Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?

ipv4 address

What type of IPv6 address is represented by ::1/128?

loopback

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

protocol unreachable, route redirection

What routing table entry has a next hop address associated with a destination network?

remote routes

What characteristic describes spyware?

software that is installed on a user device and collects information about the user

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish?

testing the integrity of the TCP/IP stack on the local machine

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?

the use of full-duplex capable Layer 2 switches

What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time?

throughput


Ensembles d'études connexes

Prep U Professional Behaviors/Professionalism

View Set

FINANCE PORTFOLIO MANAGEMENT EXAM 1

View Set

Ch1 The Sociological Perspective

View Set

Accounting Information Systems: Marshall B. Romney Chapters 1-7

View Set