NETI 105 FINAL EXAM Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

linevtyin

************************************** SW1(config)# enable password letmein enable secret secretin line console 0 password lineconnin login exit line vty 0 15 password linevtyin login exit ************************************** Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

straight-through

Which type of UTP cable is used to connect a PC to a switch port?

WPA*

Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?

to identify the network address of the destination network

Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?

TFTP

___________ is a best-effort, connectionless application layer protocol that is used to transfer files.

segment

What PDU is associated with the transport layer?

destination MAC address to a destination IPv4 address

What addresses are mapped by ARP?

data link layer addressing, detection of errors through CRC calculations, & delimiting groups of bits into frames

What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

10.0.0.0/8* 172.16.0.0/12* 192.168.0.0/16*

What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)

LLC & MAC

What are the two sublayers of the OSI model data link layer? (Choose two.)

A single packet can be sent to a group of hosts. * Multicast transmission can be used by routers to exchange routing information. * Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255.*

What are three characteristics of multicast transmission? (Choose three.)

using the source MAC addresses of frames to build and maintain a MAC address table & utilizing the MAC address table to forward frames via the destination MAC address

What are two actions performed by a Cisco switch? (Choose two.)

It assists in protocol design. & It prevents technology in one layer from affecting other layers.

What are two benefits of using a layered network model? (Choose two.)

It is not affected by EMI or RFI. & It is more expensive than UTP cabling is.

What are two characteristics of fiber-optic cable? (Choose two.)

to interrupt the ping process

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

/60

Consider the following range of addresses: 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: ... 2001:0DB8:BC15:00AF:0000:: The prefix-length for the range of addresses is

RAM

During normal operation, from which location do most Cisco routers run the IOS?

fast-forward switching & fragment-free switching

What are two examples of the cut-through switching method? (Choose two.)

to retain contents when power is removed * to store the startup configuration file*

What are two functions of NVRAM? (Choose two.)

routing packets toward the destination * encapsulating PDUs from the transport layer*

What are two services provided by the OSI network layer? (Choose two.)

a single IP multicast address that is used by all destinations in a group

What best describes the destination IPv4 address that is used by multicasting?

The transmission continues without the missing portion.*

What happens when part of an Internet VoIP transmission is not delivered to the destination?

destination MAC address

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

source and destination IP address

What information is added during encapsulation at OSI Layer 3?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

What is a benefit of using cloud computing in networking?

cancellation

What is a characteristic of UTP cabling?

a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure

What is a characteristic of a fault tolerant network?

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

What is a characteristic of the LLC sublayer?

It encourages competition and promotes choices.

What is an advantage to using a protocol that is defined by an open standard?

It is encapsulated in a Layer 2 frame

What is done to an IP packet before it is transmitted over the physical medium?

203.0.113.211*

What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?

It interfaces between the users and the kernel.

What is the function of the shell in an OS?

2001:0:0:abcd::1*

What is the most compressed representation of the IPv6 address 2001:0000:0000:abcd:0000:0000:0000:0001?

to provide feedback of IP packet transmissions*

What is the purpose of ICMP messages?

The SVI provides a virtual interface for remote access to the switch

What is the purpose of the SVI on a Cisco switch?

to keep track of the actions of a user

What is the purpose of the network security accounting function?

CSMA/CA

What method is used to manage contention-based access on a wireless network?

TCP

What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

It converts IPv6 packets into IPv4 packets.

What purpose does NAT64 serve in IPv6?

radio waves

What type of communication medium is used with a wireless LAN connection?

access method

What type of communication rule would best describe CSMA/CD?

It forwards the frame out of all ports except for the port at which the frame was received.

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It will discard the frame.

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

when a regular telephone line is used*

When is a dial-up connection used to connect to an ISP?

an SSH connection

Which connection provides a secure CLI session with encryption to a Cisco switch?

store-and-forward switching

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

FF00::/8*

Which group of IPv6 addresses cannot be allocated as a host source address?

Ctrl-Shift-6

Which keys act as a hot key combination that is used to interrupt an IOS process?

broadcast

Which message delivery option is used when all devices need to receive the same message simultaneously?

segment

Which name is assigned to the transport layer PDU?

packet switching* path selection*

Which of the following are primary functions of a router? (Choose two.)

FE80::/10*

Which range of link-local addresses can be assigned to an IPv6-enabled interface?

extranet

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

198.133.219.17* 128.107.12.117* 64.104.78.227 *

Which three addresses are valid public addresses? (Choose three.)

network & transport

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)

Wireless NIC & Wireless client software

Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)

/64 & /68

Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)

IP & ICMP

Which two protocols function at the internet layer? (Choose two.)

DHCPDISCOVER & DHCPREQUEST

A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network? (Choose two.)

regenerating data signals* applying security settings to control the flow of data* notifying other devices when errors occur*

A host is accessing an FTP server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

This command prevents someone from viewing the running configuration passwords.

A network administrator enters the service passwordencryption command into the configuration mode of a router. What does this command accomplish?

physical layer

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

predictable static IP addresses for easier identification*

A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?

the amount of traffic that is currently crossing the network, the type of traffic that is crossing the network, & the latency that is created by the number of network devices that the data is crossing

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

partial mesh

A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

The command is being entered from the wrong mode of operation.

A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?

DSL

A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

mesh

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

16

How many bits make up the single IPv6 hextet :10CD:?

62*

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

ROM is nonvolatile and contains basic diagnostic software.* RAM is volatile and stores the IP routing table.*

Which two statements correctly describe a router memory type and its contents? (Choose two.)

data link

If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?

crosstalk & electromagnetic interference

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

process the frame as it is

In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do?

NVRAM, TFTP, setup mode*

In which default order will a router search for startup configuration information?

broadcast SSID* default administrator password*

Match the IPv6 address to the IPv6 address type. (Not all options are used.) What two preconfigured settings that affect security are found on most new wireless routers? (Choose two.)

audio conference, database, HTTP*

On a school network, students are surfing the web, searching the library database, and attending an audio conference with their sister school in Japan. If network traffic is prioritized with QoS, how will the traffic be classified from highest priority to lowest priority?

VLAN 1

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

The administrator must first enter privileged EXEC mode before issuing the command.

Switch1> config t ^ % Invalid input detected at '^' marker. ***************************************** Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

audio conference, financial transactions, web page

Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?


Ensembles d'études connexes

Physics Questions - Science Bowl

View Set

Combo with "Algebra I - Unit 1: Foundations of Algebra Quiz 3: Properties of the Real Numbers" and 1 other

View Set

SERIES 7: Prospecting for New Customers

View Set

Social Security Disability Insurance

View Set