CCNA Final Exam Pt. 3 (78 - 117)
111. A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?
IMAP
95. When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?
store-and-forward
86. Which switching method drops frames that fail the FCS check?
store-and-forward switching
79. What are the three parts of an IPv6 global unicast address? (Choose three.)
subnet ID, global routing prefix, interface ID
107. A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.0
91. What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?
1E6F:65FF:FEC2:BDF8
105. A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addresses PCs - 20 addresses needed Printers - 2 addresses needed Scanners - 2 addresses needed The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?
255.255.255.224
116. A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.240
88. What service is provided by FTP?
Allows for data transfers between a client and a file server.
82. What method is used to manage contention-based access on a wireless network?
CSMA/CA
89. A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
DNS server, default gateway
81. A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
Exit privileged EXEC mode and press Enter .
87. Which range of link-local addresses can be assigned to an IPv6-enabled interface?
FE80::/10
103. How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords that are stored in router or switch configuration files.
93. What service is provided by BOOTP?
Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.
115. What attribute of a NIC would place it at the data link layer of the OSI model?
MAC address
90. Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)
NAT introduces problems for some applications that require end-to-end connectivity., NAT provides a solution to slow down the IPv4 address depletion.
104. Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
The Source Address field name from IPv4 is kept in IPv6,The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
97. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)
accessing the media, data encapsulation
108. What are three commonly followed standards for constructing and installing cabling? (Choose three.)
cable lengths,pinouts,connector types
112. What are two characteristics shared by TCP and UDP? (Choose two.)
port numbering & use of checksum
83. What is a function of the data link layer?
provides for the exchange of frames over a common local media
85. What characteristic describes spyware?
software that is installed on a user device and collects information about the user
94. What characteristic describes adware?
software that is installed on a user device and collects information about the user
102. Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?
the network performance baseline
106. What characteristic describes identity theft?
the use of stolen credentials to access private data
84. What is the purpose of the TCP sliding window?
to request that a source decrease the rate at which it transmits data
117. What technique is used with UTP cable to help protect against signal interference from crosstalk?
twisting the wires together into pairs
80. A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
Interference, Security, coverage area
78. An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?
all IPv6 configured routers on the local link