Networking 1 exam review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

16) Which router component holds the routing table, and running configuration file? *

RAM

74) Which two statements correctly describe a router memory type and its contents? (Choose two.) *

RAM is volatile and stores the IP routing table. ROM is nonvolatile and contains basic diagnostic software.

97) Which command can you use to encrypt all current and future plain-text passwords that are stored in the running configuration? *

service password-encryption

40) Which statement is true concerning private IP addresses? *

solves the issue of a finite number of available public IP addresses

90) Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame? *

store-and-forward switching

11) Which two items are required for initial configuration of Cisco routers if the IOS command-line interface is used? (Choose two.) *

terminal emulation software a rollover cable

1) Which method of interacting with an operating system involves typing commands at a command prompt? *

CLI

54) Which IPv4 class provides the highest number of host addresses per network? *

Class A

20) If a host needs to be configured with an IPv4 address automatically from a server, what protocol would be used to process that request? *

DHCP

58) A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? *

DSL

27) Refer to the exhibit. Which interface would be used to make initial configurations on the router? *

E

30) Which type of address is used in a Layer 2 frame header? *

MAC addresses only

96) Which Cisco IOS router prompt indicates that you are in Global Configuration mode? *

Router(config)#

36) Which part of an IP address identifies a specific device on a network? *

host portion

99) Which command will assign a static global IPv6 address to an interface? *

ipv6 address 2001::12:1/64

60) Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode? *

linevtyin

77) At a minimum, which address is required on IPv6-enabled interfaces? *

link-local

95) Which range of link-local addresses can be assigned to an IPv6-enabled interface?​ *

FE80::/10

18) Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D? *

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

3) Which item must be unique to each computer and cannot be duplicated on a network? *

IP address

2) Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.) *

IP address subnet mask default gateway

72) What are two features of ARP? (Choose two.) *

If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

7) Refer to the exhibit. What two facts can be determined from the output of the ping command? (Choose two.) *

One packet timed out. Four packets of data were successfully received.

15) Which two statements correctly identify the function of router memory components? (Choose two.) *

ROM contains diagnostic self test procedures executed on hardware modules. Flash memory does not lose its contents when a router is powered off.

29) Refer to the exhibit. Based on the exhibited router output, what two conclusions can be made? (Choose two.) *

The service password-encryption command has not been added to the configuration. The secret password will be required to enter privileged EXEC mode on this router.

83) An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? *

to interrupt the ping process

92) What are two functions of NVRAM? (Choose two.) *

to retain contents when power is removed to store the startup configuration file

64) Which protocol functions at the network layer? *

IP

34) Refer to the graphic. What type of cabling is shown? *

UTP

14) Which two statements describe the functions or characteristics of ROM in a router? (Choose two.) *

maintains instructions for POST diagnostics stores bootstrap program

56) Which task is the responsibility of the DNS server? *

mapping URLs to IP addresses.

69) A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? *

mesh

50) What does the use of redundant network components supply to a network? *

reliability

33) What does the tracert command test? *

the network path to a destination

21) What are two actions performed by a Cisco switch? (Choose two.) *

utilizing the MAC address table to forward frames via the destination MAC address using the source MAC addresses of frames to build and maintain a MAC address table

46) Which two things can be determined by using the ping command? (Choose two.) *

-the average time it takes a packet to reach the destination and for the response to return to the source -whether or not the destination device is reachable through the network

98) Which IPv6 prefix is used by the typical LAN for IPv6 networks? *

/64

12) Refer to the exhibit. The router named "myhome" has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router? *

0008.a3b6.ce05

75) What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.) *

10.0.0.0/8 172.16.0.0/12 192.168.0.0/16

25) The router reads each bit to determine the class of an address. Which three series of binary numbers would the router identify as public Class C addresses? (Choose three.) *

11000110.10000101.11011011.01010111 11010001.10100101.11001000.11101101 11000000.00011111.00000111.10111011

52) Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. *

11100111

55) IPv6 increases the IP address size from 32 bits to how many bits? *

128

37) A host with the IP address 172.32.65.13 and a default subnet mask belongs to what network? *

172.32.0.0

53) What is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask? *

192.168.32.255

26) Given a host with the IP address 192.168.65.54 and a subnet mask of 255.255.255.240, to which network does the host belong? *

192.168.65.48

23) Which three addresses are valid public addresses? (Choose three.) *

198.133.219.17 128.107.12.117 64.104.78.227

76) What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234? *

2001:DB8:0:AB00::1234

93) What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011? *

203.0.113.211

38) Which default subnet mask provides the most host bits? *

255.0.0.0

45) In an 8 bit binary number, what is the total number of combinations of the eight bits? *

256

35) How large are IPv4 addresses? *

32 bits

39) Assuming a default mask, which portion of the IP address 175.124.35.4 represents the host? *

35.4

28) What type of cable is used for connectivity between a model 2620 router and a model 2950 switch (point A), a model 2950 switch and a model 1900 switch (point B), and a model 2950 switch and a host (point C)? *

A - straight-through; B - crossover; C - straight-through

22) What are two characteristics of CSMA/CD? (Choose two.) *

After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. A device listens and waits until the media is not busy before transmitting.

32) Which device can act as a router, switch, and wireless access point in one package? *

Integrated Service Router (ISR)

94) What purpose does NAT64 serve in IPv6? *

It converts IPv6 packets into IPv4 packets.

71) What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? *

It forwards the frame out of all ports except for the port at which the frame was received.

78) Which statement describes a characteristic of the traceroute utility? *

It identifies the routers in the path from a source host to a destination host.

66) What is done to an IP packet before it is transmitted over the physical medium? *

It is encapsulated in a Layer 2 frame.

87) What are two characteristics of fiber-optic cable? (Choose two.) *

It is not affected by EMI or RFI. It is more expensive than UTP cabling is.

89) What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? *

It will discard the frame.

100) Who is the best Networking teacher that you have ever had? *

John Johnson

68) What are the two sublayers of the OSI model data link layer? (Choose two.) *

MAC LLC

80) What is a benefit of using cloud computing in networking? *

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

47) Refer to the exhibit. Host A cannot connect to the web server at 192.168.100.2. Based on the output of the tracert command, which device is most likely causing the problem? *

Router F

13) Which command is used to create an encrypted password that restricts access to the privileged EXEC mode of a Cisco router? *

RouterA(config)# enable secret cisco

43) To save time, IOS commands may be partially entered and then completed by typing which key or key combination? *

Tab

42) A network administrator needs to configure a router. Which of the following connection methods requires the network to be working? *

Telnet

17) Refer to the exhibit. Workstation A sends an IP packet to workstation B. Which two statements describe the encapsulation of the packet as it passes through the network? (Choose Two) *

The Layer 2 header is stripped from the packet by each router. The Layer 2 header changes at each router.

62) What is the purpose of the SVI on a Cisco switch? *

The SVI provides a virtual interface for remote access to the switch.

59) Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? *

The administrator must first enter privileged EXEC mode before issuing the command.

82) A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this? *

The command is being entered from the wrong mode of operation.

57) Refer to the exhibit. The PC is trying to ping router B at 192.168.2.2, but it fails. What is the problem? *

The default gateway on the PC should be 192.168.1.1.

10) Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.) *

There are no collisions in full-duplex mode. A dedicated switch port is required for each node. The host network card and the switch port must both be in full-duplex mode.

61) A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? *

This command prevents someone from viewing the running configuration passwords.

24) What type of address is 172.16.134.64 with the subnet mask 255.255.255.224? *

This is a network address.

44) Which two statements are true regarding the user EXEC mode? (Choose two.) *

This is the default mode on an unconfigured router when first powered up. Only some aspects of the router configuration can be viewed.

41) Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) *

VTY interface console interface privileged EXEC mode

81) Which connection provides a secure CLI session with encryption to a Cisco switch? *

an SSH connection

79) Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types? *

audio conference, financial transactions, web page

48) What is the correct encapsulation order when data is passed from Layer 1 up to Layer 4 of the OSI model? *

bits, frames, packets, segments

63) Which message delivery option is used when all devices need to receive the same message simultaneously? *

broadcast

70) What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? *

destination MAC address

86) What is a characteristic of UTP cabling? *

cancellation

9) Refer to the exhibit. Which password will the administrator need to use on this device to enter privileged EXEC mode? *

cisco

73) What is a basic characteristic of the IP protocol? *

connectionless

49) What are two functions of the physical layer of the OSI model? (Choose two.) *

converting frames to bits signal generation

19) Which layer of the OSI model handles the process of identifying and discarding damaged frames? *

data link

91) What addresses are mapped by ARP? *

destination MAC address to a destination IPv4 address

67) In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.) *

electromagnetic interference crosstalk

4) Which term is used to describe the process of placing one message format into another format so that the message can be delivered across the appropriate medium? *

encapsulation

5) Which layer of the OSI model defines logical addressing? *

network

8) Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A? *

only hosts B, C, and router R1

88) A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites? *

partial mesh

85) A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? *

physical layer

51) Refer to the exhibit. To allow IP communication between the two networks, what type of device is required? *

router

6 ) Which device connects a local LAN to a geographically separate network? *

router

65) What PDU is associated with the transport layer? *

segment

84) Which name is assigned to the transport layer PDU? *

segment

31) What device is typically used as the default gateway for a computer? *

the router interface closest to the computer


Ensembles d'études connexes

Darwin's influences and Principles of Evolution

View Set

Ancient Greek Philosophers - Unit 1 - CHALLENGE 3: Plato and Aristotle

View Set

Ch 27 - Coronary Vascular Disease

View Set

History of Psychology Video Notes

View Set

Parts of the brain and what each does

View Set

Help desk Chapter 6 Help Desk Operation

View Set

Chapter 15 Concept recall questions

View Set