Net Exam part 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are two recommendations for an organization that is implementing network device naming standards? (Choose two.) a. Device names should be in a consistent format. b. a device name, especially for PC's, should include an IP address. c. each device name should include upper/lower case letters, numbers and symbols. d. a device name should be more than 8 characters. e. each device should have a unique, meaningful name.

a. Device names should be in a consistent format. e. each device should have a unique, meaningful name.

What is a technology used in a cellular telephone network? a. Global system for mobile communication (GSM) b. Wi- Fi c. Bluetooth d. fiber- optic

a. Global system for mobile communication (GSM)

A router receives an incoming packet and determines that the destination host is located on a LAN directly attached to one of the router interfaces. Which destination address will the router use to encapsulate the Ethernet frame when forwarding the packet? a. MAC address of the destination host. b. MAC address of the interface of the connected router c. MAC address of the SVI on the switch d. MAC address of the default gateway of the LAN.

a. MAC address of the destination host.

Which of the following is a wireless communication technology that enables a smartphone to communicate with a payment system within a few centimeters away? a. NFC b. GPS c. Wi-Fi d. Bluetooth

a. NFC

Which type of network cable contains multiple copper wires and uses extra shielding to prevent interference? a. STP b. Coax c. UTP d. fiber- optic

a. STP

Which organization defines the two different patterns, or wiring schemes, called T568A and T568B? a. TIA/EIA b. TCP/IP c. IEEE d. IETF

a. TIA/EIA

Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?​ a. Trojan horse b. worm c. spyware d. virus

a. Trojan horse

What characteristic describes a firewall appliance? a. a network device that filters access and traffic coming into a network b. software that identifies email spam and automatically deletes or places them in a junk folder. c. malicious software or code running on an end device d. applications that protect end devices from becoming infected with malicious software.

a. a network device that filters access and traffic coming into a network

A technician is setting up equipment on a network. Which three devices will need IP addresses? (Choose three.) a. an IP phone b. a wireless mouse c. a server with two NIC's d. a PDA that is attached to a networked workstation e. a printer with an integrated NIC f. a Web camera that is attached directly to a host.

a. an IP phone c. a server with two NIC's e. a printer with an integrated NIC

Directly connecting like-devices, such as two computers, requires what type of UTP Ethernet cable? a. crossover b. straight- through c. STP d. CAT3

a. crossover

A type of interference that occurs when cables are bundled together for long lengths is known as: a. crosstalk b. cross- interference c. bundled - interference d. crosscheck

a. crosstalk

Which IP configuration parameter provides the IP address of a network device that a computer would use to access the internet? a. default gateway b. subnet mask c. host IP address d. DNS server

a. default gateway

A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI? a. fiber optic b. STP c. UTP d. Coaxial

a. fiber optic

What is a feature of Packet Tracer? a. it allows building and modeling network configurations. b. it allows a functional replacement for real physical network equipment. c. it can be used to examine network data flows for a corporate network that connects to the internet. d. it can be used to trace a packer from source to destination using real corporate data.

a. it allows building and modeling network configurations.

Logical or Physical? Refer to the exhibit. Which type of topology drawing is shown? a. logical b. physical

a. logical

When the growth of a small network is being planned, which design element will include the physical and logical topology of the network? a. network documentation b. budget c. device inventory d. traffic analysis

a. network documentation

Refer to the exhibit. Which Packet Tracer menu option would be used to change the preferences such as showing port labels in the logical workspace? a. options b. Extensions c. Tools d. File e. Edit

a. options

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source? a. phishing b. backdoor c. vishing d. trojan

a. phishing

What role does a router play on a network? a. selecting the path to destination networks b. connecting smaller networks into a single broadcast domain c. forwarding later 2 broadcasts d. forwarding frame based on a MAC address.

a. selecting the path to destination networks

A teenager has asked the grandparents for a specific type of mobile technology. The grandparents do not remember the specific name of the device, but remember that the teenager wants to receive a cell phone call on it. Which technology is likely to be the one the teenager wants? a. smart watch b. GPS c. VR headset d. VR headset e. e-reader

a. smart watch

A student is creating a wired network in Packet Tracer. The student added six PCs. What other device is needed so that the PCs can communicate with one another? a. switch b. cloud c. IoT gateway d. firewall

a. switch

Which of the following is NOT a criterion for choosing a network media? a. the type of data that can be transmitted b. the maximum distance that the media can successfully carry a signal c. the cost of installing the media d. the environment in which the media is installed

a. the type of data that can be transmitted

What characteristic describes identity theft? a. the use of stolen credential to access private data. b. software that is installed on a user device and collects information about the user c. software that identifies email spam and automatically deletes or places them in a junk folder d. an attack that slows or crashes a device or network service.

a. the use of stolen credential to access private data.

Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask? a. to identify the network address of the destination network. b. to identify the host address of the destination host. c.to identify the broadcast address of the destination network d. to identify faulty frames

a. to identify the network address of the destination network.

A network administrator would like to determine the path a packet takes to reach the destination 192.168.1.1. What is the best command to determine the network path? a. tracert 192.168.1.1 b. ipconfig 192.168.1.1 c. ping 127.0.0.1 d. ping 192.168.1.1

a. tracert 192.168.1.1

Which is the most common type of wired media to connect end devices to an Ethernet LAN? a. twisted- pair cable b. coaxial cable c. fiber- optic cable

a. twisted- pair cable

A physical topology diagram includes which of the following? (Choose three) a. where hosts are located b. IP addressing on each device c. where networking devices are located d. device names e. where wiring is installed

a. where hosts are located c. where networking devices are located e. where wiring is installed

What are three private IPv4 address? (Choose three.) a. 224.6.6.6 b. 192.168.5.5 c. 192.167.10.10 d. 172.16.4.4 e. 172.32.5.2 f. 10.1.1.1

b. 192.168.5.5 d. 172.16.4.4 f. 10.1.1.1

How many usable hosts are available given a Class C IP address with the default subnet mask? a. 252 b. 254 c. 256 d. 255

b. 254

Which wireless technology can be used to connect wireless headphones to a computer? a. NFC b. Bluetooth c. 4G-LTE d. Wi-Fi

b. Bluetooth

Which term describes the interference when electrical impulses from one cable cross over to an adjacent cable? a. RFI b. Collision c. Crosstalk d. crossover

b. Collision

What are two differences between binary and decimal numbers? (Choose two.) a. Decimal numbers are based on powers of 1. b. Decimal numbers include 0 through 9. c. Binary numbers are based on powers of 2. d. Binary numbers consist of three states: on, off, null. Decimal numbers do not have states. e. Numbers typed on a keyboard are entered as binary and converted to decimal by the computer.

b. Decimal numbers include 0 through 9. c. Binary numbers are based on powers of 2.

Refer to the exhibit. A user is creating a wired and wireless network using Packet Tracer. The user has added a home wireless router, a PC, and a laptop. The user configures the home wireless router. Which icon represents the tool that can be used on the laptop to view the SSID and connect to the wireless router? a. command prompt b. PC wireless c. IP configuration d. Web Browser

b. PC wireless

Refer to the exhibit. The IP address of which device interface should be used as the default gateway setting of host H1? a. R1: S0/0/0 b. R1: G0/0 c.R2: S0/0/0 d. R2 S0/0/1

b. R1: G0/0

What type of Ethernet twisted-pair cable may be required when the electrical environment has strong EMI and RFI interference? a. UTP b. STP c. fiber - optic d. coaxial

b. STP

A traveling sales representative uses a cell phone to interact with the home office and customers, track samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet connectivity method would be a preferred method to use on the mobile device due to the low cost? a. cellular b. Wi-Fi c. DSL d. Cable

b. Wi-Fi

What are three characteristics of a multicast transmission? (Choose three.) a. computers use multicast transmission to request IPv4 addresses. b. a single packet can be sent to group of hosts. c. multicast transmission can be used by routers to exchange routing information. d. multicast messages map lower layer addresses to upper layer address. e. Routers will not forward multicast address in the range of 224.0.0.0 to 224.0.0.255. f. the source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255

b. a single packet can be sent to group of hosts. c. multicast transmission can be used by routers to exchange routing information. e. Routers will not forward multicast address in the range of 224.0.0.0 to 224.0.0.255.

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer? a. two factor authentication b. antispyware c. password manager d. firewall

b. antispyware

Which type of data cable is used by television companies to carry data and video signals? a. fiber- optic b. coaxial c. shielded twisted- pair d. unshielded twisted- pair

b. coaxial

What is the most common type of wired media used by TV companies to connect and carry signals to a set-top box within a home? a. twisted- pair cable b. coaxial cable c. fiber- optic cable

b. coaxial cable

What type of attack is the ping of death? a. brute force b. denial of service c. social engineering

b. denial of service

Which type of network cable is commonly used in backbone networks and telephone companies? a. twisted- pair cable b. fiber- optic cable c. Shielded twisted- pair cable d. coaxial cable

b. fiber- optic cable

A group of newly hired entry-level network engineers are talking about the network cabling they are going to have to install as a team. What is a characteristic of Ethernet straight-through UTP cable? a. it can only use the T568A standard at both ends of the cable. b. it is susceptible to interference from EMI and RFI. c. it can be used to connect two network hosts. d. It is cisco proprietary

b. it is susceptible to interference from EMI and RFI.

When a network administrator changes the IPv4 and IPv6 address of a computer, which topology diagram will need to be updated? a. physical topology diagram b. logical topology diagram c. both physical and logical topology diagram

b. logical topology diagram

Which command can be used to verify connectivity between two host devices? a. nslookup b. ping c. netstat d. ipconfig

b. ping

Connecting a unlike-devices, such as a computers to an Ethernet switch, requires what type of UTP Ethernet cable? a. crossover b. straight - through c. STP d. CAT 3

b. straight - through

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry? a. analyze the destination IP address b. switch the packet to the directly connected interface c. look up the next- hop address for the packet d. discard the traffic after consulting the route table

b. switch the packet to the directly connected interface

Which address should be configured as the default gateway address of a client device? a. the layer 2 address of the switch management interface. b. the IPv4 address of the router interface that is connected to the same LAN. c. the IPv4 address of the router interface that is connected to the internet. d. the Layer 2 address of the switch port that is connected to the workstation.

b. the IPv4 address of the router interface that is connected to the same LAN.

Which IP address type is intended for a specific host? a. simulcast b. unicast c. broadcast d. multicast

b. unicast

What is the equivalent decimal value given a binary number of 11001010? a. 212 b.202 c. 196 d.240

b.202

Which network does a host with IP address 172.32.65.13 reside on if it is using a default subnet mask? a. 172.32.32.0 b. 172.32.65.32 c. 172.32.0.0 d. 172.32.65.0

c. 172.32.0.0

Which type of technology is used to provide digital data transmissions over cell phone networks? a. bluetooth b. Wi - Fi c. 4G d. NFC

c. 4G

A technician selected the GUI interface on a wireless router and added a DNS address of 208.67.220.220. The technician then immediately exited the GUI interface. What will occur as a result of this configuration? a. the technical should have used the config tab to enter the DNS address b. All connected host devices, configured with DHCP, will automatically be sent the IP address of the DNS server. c. Because the technician forgot to save the configuration, the DNS server address will not be sent to connect devices. d. The technician should check the physical tab to ensure that the wireless router is powered on.

c. Because the technician forgot to save the configuration, the DNS server address will not be sent to connect devices.

Refer to the exhibit. Which menu item would be used to bring up a web browser? a. attributes b. programming c. Desktop d. Config e. Physical

c. Desktop

Which wireless technology is used on smart phones to transmit data to another device within very close proximity? a. Wi-Fi b. Bluetooth c. NFC d. 3G/4G

c. NFC

Refer to the exhibit. A student is working on a Packet Tracer lab that includes a home wireless router to be used for both wired and wireless devices. The router and laptop have been placed within the logical workspace. The student adds a laptop device and wants to replace the wired network card with a wireless network card. What is the first step the student should do to install the wireless card? a. select the config tab and then the wireless network card checkbox. b. Drag the wired network card into the list on the left side. c. Power off the laptop by clicking the power button d. Select the WPC300N option from the left and drag that card to the side of the laptop.

c. Power off the laptop by clicking the power button

What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​ a. brute force b. ping of death c. SYN flooding d. phishing

c. SYN flooding

What is an example of social engineering? a. the infection of a computer by a virus carried by a trojan. b. an anonymous programmer directing DDoS attack on a data center c. an unidentified person claiming to be a technician collecting user information from employees d. a computer displaying unauthorized pop -ups and adware

c. an unidentified person claiming to be a technician collecting user information from employees

A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next? a. route the packet out Gigabit 0/1 interface b. look into the ARP cache to determine the destination IP address c. create a new Layer 2 Ethernet frame to be sent to the destination d. look into the routing table to determination network is in the routing table.

c. create a new Layer 2 Ethernet frame to be sent to the destination

Which type of Ethernet cable should be used to directly connect two devices that both use the same pins for transmitting and receiving data? a. straight- through twisted-pair cable b. coaxial cable c. crossover twisted- pair cable d. fiber- optic cable

c. crossover twisted- pair cable

Which type of attack attempts to overwhelm network links and devices with useless data? a. brute force b. virus c. denial of service d. spyware

c. denial of service

Which information is used by routers to forward a data packet toward its destination? a. Source IP address b. source data-link address c. destination IP address d. destination data-link address

c. destination IP address

How does a phisher typically contact a victim? a. telephone b. spyware c. email d. adware

c. email

Which type of wired media is used to carry digital information at very high speeds over long distances? a. twisted-pair cable b. coaxial cable c. fiber-optic cable

c. fiber-optic cable

Refer to the exhibit. Which network device is being configured within Packet Tracer? a. laptop b. switch c. home wireless router d. PC

c. home wireless router

Which of the following is an advantage of coaxial cable compared to UTP? a. easier to install b. less expensive c. improved data carry characteristics d. easier to troubleshoot

c. improved data carry characteristics

n implementing a LAN in a corporation, what are three advantages of dividing hosts between multiple networks connected by a distribution layer? (Choose three.) a. it increases traffic bandwidth between segments through distribution layer devices. b. it reduces complexity and expense by using LAN switch devices. c. it makes the hosts invisible to those on other local network segments. d. it provided increased security e. it splits up broadcast domains and decreases traffic. f. only LAN switches are needed.

c. it makes the hosts invisible to those on other local network segments. d. it provided increased security e. it splits up broadcast domains and decreases traffic.

Which category of network components includes wires and cables used in a wired network? a. devices b. peripherals c. media d. hosts

c. medias

Which portion of the network layer address does a router use to forward packets? a. host portion b. gateway address c. network portion d. broadcast address

c. network portion

What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user? a. adware b. pop -ups c. spyware d. pop - unders

c. spyware

Refer to the exhibit. One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T568A standard. What type of cable would be created in this manner? a. rollover b. fiber-optic c. straight- through d. crossover

c. straight- through

What will a router do if it cannot determine where to forward an incoming packet? a. the router will forward it out all interfaces b. the router will send an incident message to the network administrator. c. the router will drop it. d. the router will save it in the sending queue and try to forward it again later.

c. the router will drop it.

A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses? a. 192.168.30.0/24 is the IP address reserved for the default gateway, and 192.168.30.255/24 is the IP address reserved for the DHCP server. b. 192.168.30.0/24 and 192.168.30.255/24 IP address are reserved for outside internet connectivity. c. 192.168.30.255/24 IP addresses are reserved for the email and DNS servers. d. 192.168.30.0/24 is the network IP address and 192.168.30.255/24 is the IP broadcast address.

d. 192.168.30.0/24 is the network IP address and 192.168.30.255/24 is the IP broadcast address.

Which of the following is a low-power, shorter range wireless technology that is intended to replace wired connectivity for accessories such as speakers or a mouse? a. NFC b. GPS c. Wi-Fi d. Bluetooth

d. Bluetooth

Which of the following is the most common type of connector used to terminate twisted-pair cabling? a. RJ-10 b. RJ- 11 c. RJ- 41 d. RJ-45

d. RJ-45

Which Packet Tracer operating system installation option requires that the person installing it knows whether the system is a 32- or 64-bit operating system? a. apple iOS b. Linux c. Android d. Windows

d. Windows

What is the primary means for mitigating virus and Trojan horse attacks? a. encryption b. blocking ICMP echo and echo- replies c. antisniffer software d. antivirus software

d. antivirus software

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router? a. dynamic route that is learned through EIGRP b. static route c. default route d. directly connected route

d. directly connected route

Which type of cabling is immune to RFI and EFI? a. coaxial b. UTP c. STP d. fiber - optic

d. fiber - optic

Which statement describes the physical topology for a LAN? a. it describes whether the LAN is a broadcast or token-passing network. b. it shows the order in which hosts access the network. c. it depicts the addressing scheme that is employed in the LAN. d. it defines how hosts and networks devices connect to the LAN.

d. it defines how hosts and networks devices connect to the LAN.

What is a purpose of an IP address? a. it identifies a location in memory from which a program runs. b. it identifies a return address for replying to email messages. c. it identifies the physical location of a data center. d. it identifies the source and destination of data packets.

d. it identifies the source and destination of data packets.

Which type of cable connection would be used in Packet Tracer to connect a FastEthernet port on a PC to a switch port? fiber a. fiber b. crossover c. console d. straight- through

d. straight- through

Refer to the exhibit. A user is building a home wireless network within Packet Tracer. The user adds 2 PCs and 2 laptops. Which device would be needed to create the network? a. the device labeled B b. the device labeled C c. the device labeled D d. the device labeled A

d. the device labeled A

Which address prefix range is reserved for IPv4 multicast? a.127.0.0.0 - 127.255.255.255 b. 240.0.0.0 - 254.255.255.255 c. 169.254.0.0 - 169.254.255.255 d. 244.0.0.0 - 239.255.255.255

d.244.0.0.0-239.255.255.255

When IPv4 is configured for a computer on a network, what does the subnet mask identify? a. the pool of addresses assigned within the network b. the part of the IP address that identifies the network. c. the device that the computer uses to access another network. d. the dynamic subnetwork configuration.

the part of the IP address that identifies the network.


Ensembles d'études connexes

Exam 1: Health Promotion of Adolescent

View Set

Chapter 7 Creating a Flexible Organization

View Set

n) Chapter 7 Brooker - using chapter 9 Campbell, chapter 8 Mader & others**

View Set