netfund mt2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.255.240?

. /28

R4 has a connected route for 172.16.8.0/22. Which of the following answers lists a subnet that overlaps with this subnet? a

. 172.16.11.0/25

Working at the help desk, you receive a call and learn a user's PC IP address and mask (10.55.66.77, mask 255.255.255.0). When thinking about this using classful logic, you determine the number of network (N), subnet (S), and host (H) bits. Which of the following is true in this case?

. H=8

Which of the following commands correctly configures a static route?

. ip route 10.1.3.0 255.255.255.0 10.1.130.253

Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.254.0?

/23

An engineer first confirms that a router's interface Fa0/0 is up and working. He then configures that interface with the ip address 10.101.101.101 255.255.255.128 command. The engineer leaves configuration mode, and issues the show ip route command. Which of the following masks will be listed in the output that describes the connected route that exists as a result of this new ip address command?

/25

An engineer has planned to use Class B network 172.19.0.0 and a single subnet mask throughout the network. The answers list the masks considered by the engineer. Choose the mask that, among the answers, supplies the largest number of hosts per subnet, while also supplying enough subnet bits to support 1000 subnets.

/26

. An IP subnetting design effort is under way at a company. So far, the senior engineer has decided to use Class B network 172.23.0.0. The design calls for 100 subnets, with the largest subnet needing 500 hosts. Management requires that the design accommodate 50 percent growth in the number of subnets and the size of the largest subnet. The requirements also state that a single mask must be used throughout the Class B network. How many masks meet the requirements?

0

An IP subnetting design effort is under way at a company. So far, the senior engineer has decided to use Class B network 172.23.0.0. The design calls for 100 subnets, with the largest subnet needing 500 hosts. Management requires that the design accommodate 50 percent growth in the number of subnets and the size of the largest subnet. The requirements also state that a single mask must be used throughout the Class B network. How many masks meet the requirements?

0

Which of the following are not valid Class A network IDs?

1.0.0.0 9.0.0.0

An IP subnetting design requires 200 subnets and 120 hosts/subnet for the largest subnets, and requires that a single mask be used throughout the one private IP network that will be used. The design also requires planning for 20 percent growth in the number of subnets and number of hosts/subnet in the largest subnet. Which of the following answers lists a private IP network and mask that, if chosen, would meet the requirements?

10.0.0.0/22

Which of the following is a classful IPv4 address?

10.10.10.10/8

What is the minimum acceptable key size for today's security standards?

128 bytes

As the network engineer, you are provided with the following IP address and subnet mask 172.16.10.22 255.255.255.240. What is the valid host range for this IP address?

172.16.10.17 through 172.16.10.30

Which of the following is not a valid subnet ID for network 172.19.0.0 using mask /24, assuming that mask /24 is used throughout the network?

172.19.0.16

Which of the following is not a valid subnet ID for network 172.19.0.0 using mask /24, assuming that mask /24 is used throughout the network?

172.19.0.16

Which of the following is a network broadcast address?

172.30.255.255

Which of the following are private IP networks?

172.31.0.0 192.168.255.0

Which of the following are private IP networks?

172.31.0.0 192.168.255.0

A design already includes subnets 192.168.1.0/26, 192.168.1.128/30, and 192.168.1.160/29. Which of the following subnets is the numerically lowest subnet ID that could be added to the design, if you wanted to add a subnet that uses a /28 mask?

192.168.1.64/28

Which of the following are valid subnet IDs for network 192.168.9.0 using mask /29, assuming that mask /29 is used throughout the network? a

192.168.9.144

Which of the following is valid subnet ID for network 192.168.9.0 using mask /29, assuming that mask /29 is used throughout the network?

192.168.9.144

Which of the following IP addresses could be assigned to a host?

207.87.255.133/28

You have decided to use the class B network of 172.16.0.0/16 in your new London branch office of your network. You want to ensure that 100 subnets can be created, with each subnet accommodating at least 300 systems. What mask would met your requirements?

255.255.254.0

Which of the following answers lists the dotted-decimal notation (DDN) equivalent of /30?

255.255.255.252

Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use TCP/IP?

3

Which of the following Wi-Fi standards has the highest effective throughput?

802.11n

Which wireless networking standard operates in both the 2.4-GHz and 5-GHz bands?

802.11n

Which of the following are public IP networks?

9.0.0.0 192.1.168.0 1.0.0.0

As the network engineer, you are presented with the following 172.16.0.0/18 IP addressing information. Identify all the possible subnet IDs from the list below, assuming that the /18 subnet is used throughout the network.

?

A packet is sent to a destination address. That single packet is replicated by a few routers based on the routers' knowledge of hosts that had earlier registered to receive packets sent to that destination address. The routers do not forward copies of the packet onto subnets where no hosts have registered, and do forward copies of the packet onto subnets where at least one host has registered to receive those packets.

A multicast address

A packet is sent to a destination address. That single packet is routed through the network to the final router, which then sends the packet to all hosts connected to that one subnet. Which of the following IP address types was used as the destination IP address?

A subnet broadcast address

In which of the following ways does a wireless LAN differ from an Ethernet LAN?

A wireless LAN uses different techniques at the Physical layer to transmit data

How is a wireless NIC different from a NIC that requires a cable?

A wireless NIC contains an antenna.

Which of the following IP addresses could be assigned to a host? Select 2 answers.

A. 150.159.216.202/24 D. 214.122.127.76/26

Which of the following IP address/mask combinations, if configured on a working router interface, would create a connected route for an entire classful network, instead of a route for a subnet of a classful network?

A. 192.168.1.1/24 \ B. 172.16.1.1/16

An engineer at Acme Corporation was tasked with the subnetting design for a new branch location. The only information the engineer was given is shown here:

A. Subnet: 4, Host: 4 D. Subnet: 5, Host: 3

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?

Access control

Which of the following network enhancements can introduce new security risks?

Adding remote access for users who travel Providing Web access to a server's data files

Fred decides to migrate from an old DHCP server platform to use a Cisco router at the headquarters building. This DHCP server, created with configuration in IOS on a Cisco router, supports 200 remote subnets. Which of the following settings are made outside of a per-subnet pool of addresses?

Addresses in that subnet excluded from being leased by the server

What is the network broadcast address for the classful network of 172.16.0.0?

B. 172.16.255.255

Which of the following are reserved private IP addresses, according to RFC 1918?

B. 172.29.42.167 172.16.0.0 - 172.31.255.255 C. 192.168.10.1 192.168.0.0 - 192.168.255.255 D. 10.127.255.37 10.0.0.0 - 10.255.255.255

In a VLSM subnetting plan, another engineer has created many subnets using a /24 mask, including the currently-unused subnet 10.20.20.0/24. The other engineer had assigned this subnet to you, to subdivide further for a small project. You need to choose one mask to use to subdivide the original subnet, to accommodate 8 subnets and 30 hosts per subnet. What mask would you choose?

B. 255.255.255.224

In a LAN, which of the following terms best equates to the term VLAN?

Broadcast domain

What does CSMA/CD stand for?

Carrier Sense Multiple Access/Collison Detection

When surfing online, you get some strange data on an apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?

Certificate Authority (CA)

Two new Cisco 2960 switches are removed from their cardboard boxes. The two switches have been placed into a rack and power applied, but no Ethernet cables are connected yet. Which of the following answers describes the method to get the two switches to communicate using an 802.1Q trunk which requires the least number of steps?

Connect the switches using a crossover cable on two Fastethernet ports, and then configure trunking on just one of the two switches using the switchport mode trunk interface subcommand.

Which tunneling protocol is accepted and used by multiple vendors?

L2TP

You can limit access to certain computers with

MAC filtering

Which IPv4 address type utilizes Class D addresses?

Multicast

Working at the help desk, you receive a call and learn a user's PC IP address and mask (192.168.9.1/27). When thinking about this using classful logic, you determine the number of network (N), subnet (S), and host (H) bits. Which of the following is true in this case?

N=24

Before Class B network 172.16.0.0 is subnetted by a network engineer, what part of the structure of the IP addresses in this network already exists, with a specific size?

Network

Before Class B network 172.16.0.0 is subnetted by a network engineer, what parts of the structure of the IP addresses in this network already exist, with a specific size?

Network Host

. A Class B network needs to be subnetted such that it supports 100 subnets and 100 hosts/subnet. Which of the following answers list a workable combination for the number of network, subnet, and host bits?

Network = 16, subnet = 9, host = 7 Network = 16, subnet = 8, host = 8

Imagine that you are told that switch 1 is configured with the dynamic auto parameter for trunking on its Fa0/5 interface, which is connected to switch 2. You have to configure switch 2. Which of the following settings for trunking could allow trunking to work?

On and Dynamic Desirable

The size of a subnet is calculated with the formula 2 raised to the H minus 2. Why are two hosts subtracted from this possible size?

One host address is reserved for the subnet number, and the other is reserved for the subnet broadcast address.

Host A is a PC, connected to switch SW1 and assigned to VLAN 1. Which of the following

Other hosts attached to the same switch and also in VLAN 1

PC1, a new PC, just booted for the first time when connected to an enterprise network. PC1 used DHCP to lease IP address 10.1.1.1, learning mask 255.255.255.0, DNS server 10.9.9.9, and default gateway 10.1.1.2, with a lease time of 7 days. Assume that the PC has sent nothing else over the network because the DHCP process completed. The user then opens a web browser and types www.ciscopress.com. Which of the following actions happens next? a. PC1 sends an ARP request to find the web server's MAC address. b. PC1 sends an ARP request to find the default gateway's (10.1.1.2) MAC address. c. PC1 sends a DNS request about www.ciscopress.com to the DNS server (10.9.9.9). d. PC1 sends an IP packet to the www.ciscopress.com web server IP address.

PC1 sends an ARP request to find the default gateway's (10.1.1.2) MAC address.

Which remote access protocol is used over an Ethernet network?

PPPoE

Which cloud computing service model gives software developers access to multiple operating systems for testing?

PaaS (Platform as a Service)

What feature must be configured on a router to redirect traffic from an insecure port to a secure one?

Port forwarding

In public key encryption, which key is used to decrypt the message?

Private key

What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?

RRAS and DirectAccess together enable always-on remote connections.

What term is used to describe when a mobile user moves out of one access point's range and into the range of another?

Reassociation

Which of the four messages used by DHCP is sent by the client to ask for the server to lease the IPv4 address listed from the server?

Request

As a network administrator, what should you do if you notice that a user account has experienced multiple failed logon attempts?

Revoke the user's logon privileges.

Wireless access points are assigned a unique name or _____.

SSID

Which two protocols are available to create secure transmissions for HTTP sessions?

SSL/TLS

What does SSID stand for?

Service set identifier

A major security weakness of WEP is the fact that it uses a _____ network key

Shared

Why is it a good idea to change your wireless router's password?

So other people cannot change the router's settings

What type of connection is used to attach to the network port on a wireless router?

Straight-through patch cable

Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP use?

TCP, UDP

A network engineer spends time thinking about the entire Class B network 172.16.0.0, and how to subnet that network. He then chooses how to subnet this Class B network and creates an addressing and subnetting plan, on paper, showing his choices. If you compare his thoughts about this network before subnetting the network, to his thoughts about this network after mentally subnetting the network, which of the following occurred to the parts of the structure of addresses in this network?

The host part got smaller

How does knowing about failed logon attempts help a network administrator's security efforts?

The information could help her determine whether an unauthorized user is attempting to log on with that username.

Host A is a PC, connected to switch SW1 and assigned to VLAN 1. Which of the following are typically assigned an IP address in the same subnet as host A?

The local router's LAN interface Other hosts attached to the same switch and also in VLAN 1

Which of the following best describes authentication?

The process of accepting and matching a username with unique account information, such as a password

How is a wireless router's configuration utility usually accessed?

Through a Web browser

What kind of ticket is held by Kerberos' TGS?

Ticket-granting ticket (TGT)

Which of the following types of software can be patched to improve their security? (Choose all that apply.)

a. Router OS b. Web browser c. Email client d. Workstation OS

Which of the following are true about IP address 192.168.6.7's IP network? (Choose two answers.)

a. The network ID is 192.168.6.0. c. The default mask for the network is 255.255.255.0.

A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has been disabled. An engineer gets into configuration mode and issues the vlan 22 command, followed by the name Hannahs-VLAN command. Which of the following are true?

a. VLAN 22 is listed in the output of the show vlan brief command. b. VLAN 22 is listed in the output of the show running-config command.

An engineer has calculated the list of subnet IDs, in consecutive order, for network 172.30.0.0, assuming that the /22 mask is used throughout the network. Which of the following are true? (Choose two answers.) a. Any two consecutive subnet IDs differ by a value of 22 in the third octet. b. Any two consecutive subnet IDs differ by a value of 16 in the fourth octet. c. The list contains 64 subnet IDs. d. The last subnet ID is 172.30.252.0.

c. The list contains 64 subnet IDs. d. The last subnet ID is 172.30.252.0.

Which of the following are a potential disadvantages of wireless LANs as comapred with cabled LANs

Controlling access to a wireless LAN is more difficult

You have been assigned a class B IP network to use in your Enterprise. Which one answer offers the closest estimate to the number of IPv4 addresses in that class B network?

D. Over 65,000

What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?

DirectAccess

Which of the four messages used by DHCP is sent by the client to look for a DHCP server?

Discover

A PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual four DHCP messages that flow between the PC and the DHCP server, which ones do the client send?

Discover Request

In the context of Windows networking, why must failed logon attempts be recorded by a domain controller instead of by any random server on the network?

Domain controllers authenticate users

An enterprise puts the DHCP and DNS servers on VLAN 10/subnet 10 in Atlanta, using IP address 10.1.10.1 for the DHCP server and 10.1.10.2 for the DNS server. A remote router sits in Boston, with devices on the Boston LAN using the DHCP and DNS servers in Atlanta. Which of the following needs to be configured in the routers in this enterprise to support DHCP and DNS? a. The ip helper-address 10.1.10.1 command in the Atlanta router b. The ip helper-address 10.1.10.2 command in the Boston router c. The ip name-server 10.1.10.2 command in the Atlanta router d. The ip dhcp-server 10.1.10.1 command in the Boston router e. None of the other answers is correct.

E (None of the other answers is correct. ) .

In an enterprise-wide WLAN, coverage can be extended across multiple access points by joining them to the same ____.

ESS

Which of the following commands will allow you to set up a password on a Switch or Router?

Enable secret

WEP, WPA, and WPA2 are all forms of wireless .

Encryption

____________________ is used for confidentiality while ___________________ is used for integrity and authentication.

Encryption, hashing

Which of the following tools allows you to view security events that have occurred on a Windows Server 2012 R2 computer?

Event Viewer

Which of the following types of transmission media is the most secure?

Fiber-optic cable

On a Cisco Router or Switch, which of the following mode will let you change the host name?

Global Configuration Mode

Which of the following methods of accessing files over the Internet is the most secure?

HTTPS

Which encryption protocol does GRE use to increase the security of its transmissions?

IPSec

What are the two primary encryption techniques used by VPNs today?

IPsec and SSL

Which of the following security risks can potentially be addressed by applying a new patch to a software program

Insecure data transmissions between a Web client and Web server

Switch SW1 sends a frame to switch SW2 using 802.1Q trunking. Which of the answers describes how SW1 changes or adds to the Ethernet frame before forwarding the frame to SW2?

Inserts a 4-byte header and does not change the MAC addresses

Other WLANs can be a source of ______.

Interference

You have a 255.255.255.240 mask. Which two of the following are valid host addresses?

c. A, C

Router R1 lists a route in its routing table. Which of the following answers list a fact from a route that the router then compares to the packet's destination address? (Choose two answers.)

a. Mask c. Subnet ID

A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?

brute force attack

For the address 192.86.26.97/29, what is the binary conversion of the broadcast address?

c. 11000000 01010110 00011010 01100111

A packet is sent to a destination address. That single packet is routed through the network to the final router, which then sends the packet to all hosts connected to that one subnet. Which of the following IP address types was used as the destination IP address?

c. A subnet broadcast address

Why does the formula for the number of hosts per subnet (2H - 2) require the subtraction of two hosts?

To reserve addresses for the subnet broadcast address and subnet ID

Which IPv4 address type is the most commonly used for user applications?

Unicast

EAPoL is primarily used with what kind of transmission?

Wireless

You have been hired as a network consultant by the East Coast Savings bank. East Coast Savings would like to implement a wireless LAN, but with high standards of security. What sort of restrictions would you recommend placing on the wireless LAN?

Wireless LAN users may surf the Web, but may not access the rest of the bank's network without special security software.

Why is a wireless signal susceptible to noise?

Wireless transmissions cannot be shielded like transmissions along an Ethernet cable.

Which of the following masks, when used as the only mask within a Class B network, would supply enough subnet bits to support 100 subnets? (Choose two.)

a. /24 b. 255.255.255.252

R1 has configured interface Fa0/0 with the ip address 10.5.48.1 255.255.240.0 command. Which of the following subnets, when configured on another interface on R1, would not be considered an overlapping VLSM subnet?

a. 10.5.0.0 255.255.240.0

. Which of the following are not valid Class B network IDs?

a. 130.0.0.0 b. 191.255.0.0 c. 128.0.0.0 d. 150.255.0.0 e. All are valid Class B network IDs.

Which of the following are public IP networks?

a. 9.0.0.0 d. 192.1.168.0 e. 1.0.0.0

A Class B network needs to be subnetted such that it supports 100 subnets and 100 hosts/subnet. Which of the following answers list a workable combination for the number of network, subnet, and host bits? (Choose two answers.)

b. Network = 16, subnet = 8, host = 8 c. Network = 16, subnet = 9, host = 7

Which of the following are true about IP address 172.16.99.45's IP network? (Choose two answers.)

b. The network is a Class B network. d. The number of host bits in the unsubnetted network is 16.

Which of the following commands identify switch interfaces as being trunking interfaces: interfaces that currently operate as VLAN trunks?

b. show interfaces switchport c. show interfaces trunk

Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a

community cloud

All types of remote access techniques require some type of ________________, which accepts a remote connection and grants privileges to the network's resources.

remote access server (RAS)

Which Cisco IOS command would be used to display the configured range of IP addresses, statistics for a number of currently leased addresses, and a high water mark for leases from each configured pool?

show ip dhcp pool


Ensembles d'études connexes

Chapter 4: The Human Side of Marketing Research: Organizational and Ethical Issues

View Set

Chi Square ( χ2 test of independence)

View Set

CompTIA Network+ Chapter Three and Five

View Set

Kaplan Fundamentals Practice Tests A & B

View Set

Основи наукового пізнання сесія

View Set