Cisco Quarter Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What service is provided by SMTP?

Allows clients to send email to a mail server and the servers to send email to other servers.

what service is provided by SMTP

Allows clients to send email to a mail server and the servers to send email to other servers.

What method is used to manage contention-based access on a wireless network?

CSMA/CA

Destination Port of 53

DNS

A user is attempting to access http://www.cisco.com/ without success. Which two configuration value must set on the host to allow this access?

DNS server and default gateway

what are three commonly followed standards for constructing and installing cabling?

cable length, pinouts, connector types

What are two functions that are provided by the network layer? (Choose two.)

directing data packets to destination hosts on other networks and providing end devices with a unique network identifier.

What are two characteristics of IP?

does not require a dedicated end-to-end connection operates independently of the network media

Destination port number 53

DNS

Layer 3

TTL, Source IP address

198.133.219.2

Public Address

used to identify missing segments of data

sequence numbers

Layer 4

Acknowledgment number, destination port number

240.2.6.255

Experimental address

An organization is assigned an ipv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? (64-56)

2^8 = 256

Layer 2

802.2 header, FCS, and Destination MAC address

What are three characteristics of the CSMA/CD process?

A device listens and wait until the media is not busy before transmitting After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired All of the devices on a segment see data that passes on the network medium

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?

All IPv6 configured routers on the local link

Which two statements describe features of an IPv4 routing table on a router? (Choose two.)

Directly connected interfaces will have two route source codes in the routing table: C and L If a default static route is configured in the router, an entry will be included in the routing table with source code S.

What service is provided by DHCP?

Dynamically assigns IP addresses to end and intermediary devices.

A client packet received by a server. The packet has a destination port number of 21. What service is the client requesting?

FTP

TCP

HTTP, SMTP, FTP

Application protocols for TCP:

HTTP, SMTP,FTP

A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?

IMAP

What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)

IP address and Layer 1 statuses

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication?

Integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper AND implements CSMA/CD over legacy shared half-duplex media

what mechanism is used by a router to prevent a received IPv4 packet from travelling endlessly on a network?

It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to source host.

What is an advantage to using a protocol that is defined by an open standard?

It encourages competition and promotes choices

A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?

It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?

It will send an ARP request for the MAC address of the default gateway.

What attribute of a NIC would place it at the data link layer of the OSI model?

MAC address

Benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software

What is a benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)

POP and DNS

Similarity between TCP and UDP?

Port numbering and use of checksum

What is a function of the data link layer?

Provides for the exchange of frames over a common local media

Destination port number 22

SSH

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?

Source address field name from IPv4 is kept in PIv6 and the TTL field from IPv4 has been replaced by the Hop Limit Field in IPv6.

A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?

TFTP

UDP

TFTP and DHCP

Application protocols for UDP:

TFTP, DHCP

A technician with PC is using multiple applications while connected to the Ethernet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

The data flow is being tracked based on the source port number that is used by each application

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Time-to-Live (TTL)

prevents access to websites

URL filtering

What service is provided by HTTPS?

Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.

A user is executing tracert to a remote device. At what point would a router, which in the path to the destination device, stop forwarding the packet?

When the value in the TTL field reaches zero

which wireless technology has low-power and low-data rate requirements making it popular n loT environments?

Zigbee

169.254.0.1 - 169.254.255.254

a link-local address

Characteristic describes a VPN?

a tunneling protocol that provides remote users with secure access into the network of an organization

What are two primary responsibilities of the Ethernet MAC sublayer?(Choose two.)

accessing the media and data encapsulation

Received by a sender before transmitting more segments in a session

acknowledgement

This field helps to direct the frame toward its destination.

addressing

DoS attack (Denial of Service attack)

an attack that slows or crashes a device or network service

What characteristic describes DoS attack?

an attack that slows or crashes a device or network service

prevents access by port number

application filtering

This field checks if the frame has been damaged during the transfer.

error detection

what range of link-local addresses can be assigned to an IPv6-enabled interface?

fe80::/10

This field identifies the beginning of a frame.

frame start

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

interference, security, and coverage area

what command can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

127.0.0.1

loopback address

what does the term "attenuation" mean in data communication?

loss of signal strength as distance increases

What characteristic describes a Trojan horse?

malicious software or code running on an end device

What characteristic describes a virus?

malicious software or code running on an end device

process of placing one message format inside another message formet

message encapsulation

the process of converting info from one format to another acceptable for transmission

message encoding

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)

message size, message encoding, and delivery options

the process of breaking up a long message into individual pieces before being sent over the network

message sizing

What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)

neighbor solicitations and neighbor advertisements

two command on a Windows host to display the routing table?

netstat -r AND route print

Peer-to-Peer

no dedicated server required AND Client and server roles are set on a per request basis

prevents access based on IP or MAC address

packet filtering

what are two characteristics shared by TCP and UDP?

port numbering and use of checksum

Peer-to-peer applications

requires a specific interface AND a background service is required

method of managing segments of data loss

retransmission

what characteristic describes an IPS? (Intrusion Prevention Software)

software that identifies fast-spreading threats

what characteristic describes adware?

software that is installed on a user device and collects information about the user

prevents unsolicited incoming sessions

stateful packet inspection

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

store-and-forward

Which switching method drops frames that fil the FCS check?

store-and-forward switching

An administrator is trying to config the switch but receives this error message. What is the problem? (Switch1> config t)

the admin must first enter privileged EXEC mode before issuing the command

Which info does the show startup-config command display

the contents of the saved configuration file in the NVRAM

Which two statements are correct in a comparison of iPv4 and IPv6 packet headers?

the source address field name from IPv4 and IPv6.

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

What is the purpose of the TCP sliding window?

to request that a source decrease the rate at which it transmits data

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs

This field is used by the LLC to identify the Layer 3 protocol.

type

service provided by HTTPS?

uses encryption to secure the exchange of text, graphic images, sound, and video on the web

number of bytes a destination device can accept and process at one time

window size


संबंधित स्टडी सेट्स

Chapter 2 - Business cycles and forecasting

View Set

Quiz 11 - Disorders of Heart Failure and Circulatory Shock

View Set

Notes on Sponsorships- Chapter 11

View Set

Population Genetics - Study Guide

View Set

Property-Colorado statutes rules and regulations common to all lines

View Set

Statistics, Data, and Math Reasoning Quiz

View Set

CIS 3003 - Human-Computer Interaction - Quiz 1

View Set

Ch. 21 Collective Behavior & Social Movements

View Set