Networking Essentials Final Exam Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?

192.168.30.0/24 is the network IP address and 192.168.30.255/24 is the IP broadcast address.

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

Input the authentication password. Enter the network SSID. Choose the correct security type.

What is a purpose of an IP address?

It identifies the source and destination of data packets.

Which type of device filtering can be enabled on some wireless access points or wireless routers?

MAC address

A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?

NFC

Which technology is used to uniquely identify a WLAN network?

SSID

What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​

SYN flooding

Which step should be taken next once a problem is resolved during a troubleshooting process?

Update the documentation.

An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?

brute force

What are three advantages of using private IP addresses and NAT? (Choose three.)

conserves registered public IP addresses hides private LAN addressing from outside devices that are connected to the Internet permits LAN expansion without additional public IP addresses

What advantage does SSH offer over Telnet?

encryption

Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?

encryption

What type of Internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity?

satellite

Which three attacks exploit human behavior? (Choose three.)

pretexting phishing vishing

Which address prefix range is reserved for IPv4 multicast?

224.0.0.0 - 239.255.255.255

What is the minimum size of a valid Ethernet frame?

64 bytes

Which two ports can be used for the initial configuration of a Cisco router? (Choose two.)

AUX console

Which protocol is used to automatically assign IP addresses to hosts?

DHCP

What are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.)

Fiber-optic cable is immune from EMI and RFI. Fiber-optic cables can extend several miles.

Which protocol is used by web servers to serve up a web page?

HTTP

Which protocol is used to transfer web pages from a server to a client device?

HTTP

Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.)

IP address subnet mask default gateway

Why do streaming audio and video applications use UDP instead of TCP?

Streaming audio and video applications cannot tolerate the delay caused by retransmission.

What is a disadvantage of deploying a peer-to-peer network model?

lack of centralized administration

The functions of which two layers of the OSI model are matched to the network access layer of the TCP/IP model? (Choose two.)

physical data link

Which three pieces of information are identified by a URL? (Choose three.)

the protocol that is being used the domain name that is being accessed the location of the resource

What was the reason for the creation and implementation of IPv6?

to relieve IPv4 address depletion

At which layer of the TCP/IP model does TCP operate?

transport

Which type of network cable is commonly used to connect office computers to the local network?

twisted-pair cable

Which three items should be documented after troubleshooting an internal web server crash? (Choose three.)

when the problem occurred steps that were performed to identify the cause of the problem steps that were performed that failed to identify the cause of the problem

When is an IP address required to be configured on a Cisco LAN switch?

when the switch needs to be managed through an in-band connection

Fill in the blank. A is a computer that is infected with malicious software and instructed to join a botnet.​

zombie


Ensembles d'études connexes

2.1.II - Keystone Species & Biodiversity

View Set

Minnesota Driver's Manual 2012 Chapter 5 - Signs

View Set

Assessment of Musculoskeletal Function

View Set

Rodzaje norm i przepisów. Akt normatywny.

View Set