Annex A Final Study Guide
What would be an example of a top-level domain?
.com
What is the dotted decimal representation of the IPv4 address which is represented in binary string of 00001010.01100100.00010101.00000001?
10.100.21.1
What IPv4 address is a loopback address that can be pinged to test the local TCP/IP configuration?
127.0.10.0
What is the dotted decimal representation of the IPv4 address 11001011.10101001.01110001.11010011?
203.169.113.211
If you must provide for 126 hosts. Which subnet mask would be used?
255.255.255.128
What scenario describes a function provided by the transport layer?
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
What method is used to manage contention-based access on a wireless network?
CSMA/CA
What data link layer media access control method does Ethernet use?
CSMA/CD
What protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?
HTTP
Describe port numbers?
If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.
What are characteristics of fiber-optic cable?
It is more expensive than UTP cabling is. It is not affected by EMI or RFI.
What is a characteristic of the LLC sublayer?
It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?
It will discard the frame.
What are the benefits of using cloud computing in networking?
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
Networks change the way we do what?
Networks change the way we learn, collaborate, work, and play
What type of attack involves the unauthorized discovery and mapping of network systems and services?
Reconnaissance
What are characteristics of multicast transmission?
Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255. Multicast transmission can be used by routers to exchange routing information. A single packet can be sent to a group of hosts.
What utility is available on a Windows PC to view current running applications and processes?
Task manager
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
The address is returned to the pool for reuse when the lease expires.
Describe variable-length subnet masking?
The size of each subnet may be different, depending on requirements.
Data is being sent from a source PC to a destination server. What correctly describe the function of TCP or UDP?
UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. The source port field identifies the running application or service that will handle data returning to the PC.
A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What types of network services is the network administrator trying to accommodate?
Voice and Video
What is a characteristic of a fault tolerant network?
a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure
What category of address is 224.10.0.254/24?
blank
What category of address is 10.0.0.159/27?
broadcast
What category of address is 192.168.1.191/26?
broadcast
What are the characteristic of UTP cabling?
cancellation
What tasks are functions of the presentation layer?
compression encryption
What aspect should be considered when choosing devices in the design of a small network?
cost of devices
What are the functions of the data link layer?
delimiting groups of bits into frames data link layer addressing detection of errors through CRC calculations
What addresses are mapped by ARP?
destination MAC address to a destination IPv4 address
What category of address is 192.168.100.161/25?
host
What category of address is 203.0.113.100/24?
host
What security solutions are most likely to only be used in a corporate environment?
intrusion prevention systems, virtual private networks
What command would help lessen brute-force password attacks against the router?
login block-for 60 attempts 5 within 60
What are examples of malicious code that could be classified as a Trojan horse?
malware that was written to look like a video game
What category of address is 10.10.10.128/25?
network
What category of address is 172.110.12.64/28?
network
When the growth of a small network is being planned, which design element will include the physical and logical topology of the network?
network documentation
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?
nslookup
What topology provides high availability and connects some, but not all, remote sites?
partial mesh
In what type of network do devices operate as both clients and servers?
peer to peer
In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?
peer-to-peer
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
physical layer
What tool can be implemented in a small network to help minimize network latency for real-time streaming applications?
protocol analyzer
What type of attack may involve the use of tools such as nslookup and fping?
reconnaissance attack
What is a key characteristic of the peer-to-peer networking model?
resource sharing without a dedicated server
What are two characteristics of peer-to-peer networks? (Choose two.)
resource sharing without a dedicated server decentralized resources
What services are provided by the OSI network layer?
routing packets toward the destination Encapsulating PDUs from the transport layer
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. What network characteristics has been violated in this situation?
security
What items are contained in an Ethernet header and trailer?
source MAC address error-checking information destination MAC address
What type of physical topology can be created by connecting all Ethernet cables to a central device?
star
What is stored in the NVRAM of a Cisco router?
startup config
What frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?
store-and-forward switching
You notice that the network throughput appears lower than the bandwidth expected. Which factors could influence the differences in throughput?
the amount of traffic that is currently passing through the network the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing
A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?
the destination port number
What things can be determined when given an IP address and subnet mask of an attached network device?
the last host address on a network the network address of a specific network
What are ways that TCP uses the sequence numbers in a segment?
to identify missing segments at the destination to reassemble the segments at the remote location
What are functions of NVRAM?
to retain contents when power is removed to store the startup configuration file
You would like to determine the path a packet takes to reach the destination 192.168.1.1. What is the best command to determine the network path?
tracert 192.168.1.1
What applications or services allow hosts to act as client and server at the same time?
uTorrent, Bittorrent, etc.