Networking FINAL EXAM Modules: 11 - 17 / Group: 4,5,6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of these ports are used by FTP?

-20 -21

Which three services are provided by the AAA framework?

-Authentication -Authorization -Accounting

Which elements are required to scale to a larger network?

-Budget -Network Documentation

Which three are transport layer responsibilities?

-Conversation Multiplexing -Segmenting Data and Reassembling Segments. -Tracking Individual Conversations

Which two are protocols that belong in the OSI application layer?

-DNS -SMTP

Which two fields are the same in a TCP and UDP header?

-Destination Port Number -Source Port Number

Which two applications would use the TCP transport layer protocol?

-FTP -HTTP

Which three protocols or standards are used at the application layer of the TCP/IP model?

-HTTP -GIF -MPEG

Which three options are major issues associated with IPv4?

-IP Address Depletion -Increased Network Complexity and internet routing table expansion -Lack of end -to-end connectivity

Which two options are improvements provided by IPv6 as compared to IPv4?

-Increased the IP address space. -Uses a simple header to provide improved packet handling.

Which is true of the IPv6 header?

-It consists of 40 octets. -It contains 8 header fields.

Which two ICMPv6 messages are used in to determine the MAC address of a known IPv6 address?

-Neighbor Advertisement -Neighbor Solicitation

Which two parts are components of an IPv4 address?

-Network portion -Host portion

Which two statements are correct about private IPv4 addresses?

-Private IPv4 addresses are assigned to devices within an organization's intranet (internal network). -Any organization (home, school, office, company) can use the 10.0.0.0/8 address.

Which two operations are provided by TCP but not by UDP?

-Retransmitting any unacknowledged data -Acknowledging received data

Which two ICMPv6 messages are used in SLAAC?

-Router Advertisement -Router Solicitation

Which two ICMPv6 messages are used during the Ethernet MAC address resolution process?

-Router Solicitation -Neighbor Advertisement

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices?

-SYN -ACK

Which two network protocols are used to establish a remote access network connection to a device?

-Secure Shell (SSH) -Telnet

Which two applications would use the UDP transport layer protocol?

-TFTP -VOIP

Which two statements are correct about public IPv4 addresses?

-To access a device over the internet, the destination IPv4 address must be public access. -Public IPv4 address exhausted is a reason why there are private IPv6

Which two commands could be entered on a Windows host to view its IPv4 and IPv6 routing table?

-netstat -r -route print

Which IPv4 address can a host use to ping the loopback interface?

127.0.0.1

Which number or set of numbers represents a socket?

192.168.1.1:80

Which subnet mask would be used if 5 host bits are available?

255.255.255.224

Which subnet mask would be used if exactly 4 host bits are available?

255.255.255.240

Which device is used by other network devices to authenticate and authorize management access?

AAA Server

Which of the following DNS record types is used to resolve IPv6 addresses?

AAAA

Which statement is true about ARP?

ARP entries are cached temporarily

Which is appropriate for providing endpoint security?

Antivirus Software

Which TCP/IP model layer is closest to the end user?

Application

Which statement regarding the service password-encryption command is true?

As soon as the service password-encryption

Which delivery method does not guarantee that the packet will be delivered fully without errors?

Best Effort

Which peer-to-peer application allows users to share pieces of many files with each other at the same time?

BitTorrent

Which address type is not supported in IPv6?

Broadcast

Which statement is true about CDP on a Cisco device?​

CDP can be disabled globally or on a specific interface.

Which factor must be considered when selecting network devices?

Cost

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?

DHCP

Which layer is responsible for taking an IP packet and preparing it for transmission over the communications medium?

Data Link Layer

Which field in an IPv4 packet header will typically stay the same during its transmission?

Destination Address

Which information is used by routers to forward a data packet toward its destination?

Destination IP Address

Which of the following techniques use native IPv6 connectivity?

Dual Stack

Which benefit does SSH offer over Telnet for remotely managing a router?

Encryption

Which IPv6 network prefix is only intended for local links and can not be routed?

FE80::/10

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF

Which component is designed to protect against unauthorized communications to and from a computer?

Firewall

Which device controls traffic between two or more networks to help prevent unauthorized access?

Firewall

Which part of a GUA is assigned by the ISP?

Global Routing Prefix

Which protocol uses encryption?

HTTPS

Which field is used to detect corruption in the IPv4 header?

Header Checksum

Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?

Hop Limit

Which protocol is used by IPv4 and IPv6 to provide error messaging?

ICMP

Which protocol provides feedback from the destination host to the source host about errors in packet delivery?

ICMP

Which statement accurately describes a characteristic of IPv4?

IPv4 has a 32-bit address space

Which TCP header statement is true?

It consists of 10 fields in a 20 byte header

Which is a feature of IMAP?

It downloads a copy of email messages leaving the original on the server

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

It sends the frame to all ports except the port on which it received the frame.

Which statement about host forwarding decisions is true?

Local hosts can reach each other without the need of a router.

Which dynamic addressing method for GUAs is the one where devices rely solely on the contents of the RA message for their addressing information?

Method 1: SLAAC

Which dynamic addressing method for GUAs is the one where devices get their IPv6 configuration in a RA message and request DNS information from a DHCPv6 server?

Method 2: SLAAC and Sateless DHCPv6

Which dynamic addressing method for GUAs is the one where devices rely solely on a DHCPv6 server for their addressing information?

Method 3: Stateful DHCPv6

Which of the following DNS resource record types resolves authoritative name servers?

NS

Which element of scaling a network involves identifying the physical and logical topologies?

Network Documentation

Which protocol can be used to transfer messages from an email server to an email client?

POP3

Which field includes common values such as ICMP (1), TCP (6), and UDP (17)?

Protocol

Which router component holds the routing table, ARP cache, and running configuration file?

RAM

Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?

RIRs

Which network design consideration would be more important to a large corporation than to a small business?

Redundancy

Which devices will not forward an IPv4 broadcast packet by default?

Router

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

Which command is used to encrypt all passwords in a router configuration file?

Router_A (config) # service password-encryption

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?

SMB

Which control bit flags are used during the three-way handshake?

SYN and ACK

Which of the following would be valid source and destination ports for a host connecting to an email server?

Source: 49152, Destination: 25

Which of the following would be valid source and destination ports for a host connecting to a DNS server?

Source: 49152, Destination: 53

Which field in an IPv6 GUA is used for subnetting?

Subnet ID

Which is true of the IPv6 packet header?

The Hop Limit Field Replaces the IPv4 Time to Live field.

Which characteristic describes an IPv6 enhancement over IPv4?​

The IPv6 header is simpler than the IPv4 header is, which improves packet handling.

Which statement is true about FTP?

The client can download data from or upload data to the server.

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

The client randomly selects a source port number.

Which of the following is displayed by the nslookup utility?

The configured default DNS server

Which default gateway statement is true?

The default gateway address is the IP address of the router on the local network

Which characteristic describes the default gateway of a host computer?

The logical address of the router interface on the same network as the host computer.

Which statement correctly relates to a small network?

The majority of businesses are small.

Which statement is true about variable-length subnet masking?

The size of each subnet may be different, depending on requirements.

Which statement is correct about IPv4 packet header fields?

The source and destination IPv4 addresses remain the same while traveling from source to destination.

Which is a characteristic of static routes?

They are manually configured

Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?

Time Exceeded

Which OSI layer sends segments to be encapsulated in an IPv4 or IPv6 packet?

Transport Layer

Which layer is responsible for establishing a temporary communication session between the source and destination host applications?

Transport Layer

Which of the following is a stateless best-effort delivery transport layer protocol?

UDP

Which of the following is a feature of the Gnutella protocol?

Users can share whole files with other users.

Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?

Validation

Which port group includes port numbers for FTP, HTTP, and TFTP applications?

Well-Known Ports

Which software installed on key hosts can reveal the types of network traffic flowing through the network?

Wireshark

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

Worm

Which command can be used on a Windows host to display the routing table?

netstat -r

Which command can be used to test connectivity between two devices using echo request and echo reply messages?

ping

Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?

privileged EXEC mode

Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?

show ip interface brief


Ensembles d'études connexes

Series 6: Regulations (Securities Act of 1933)

View Set

Culinary Essentials; Fruits and Vegetables

View Set

Federal Tax Considerations for Life Insurance and Annuities - Practice Questions

View Set

CLA 10 Unit 13 Trojan War: Beginning of Strife

View Set

Test bank: Ch.17 Gene Expression Bio 1

View Set