CTS1650 Final
What is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64?
A9CD:47FF:FE57:FE94
Which device is used by other network devices to authenticate and authorize management access?
AAA server
Which of the following DNS record types is used to resolve IPv6 addresses?
AAAA
Which peer-to-peer application allows users to share pieces of many files with each other at the same time?
BitTorrent
A wireless host needs to request an IPv4 address. What protocol would be used to process the request?
DHCP
This zone is used to house servers that should be accessible to outside users.
DMZ
Which two are protocols that belong in the OSI application layer?
DNS / SMTP
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)
DNS / VoIP
What Windows 10 tool is useful to determine which applications are using network services on a host?
Data Usage
Which two types of ICMP messages are common to both ICMPv4 and ICMPv6? (Choose two.)
Destination or Service Unreachable / Time Exceeded
Which type of network threat is intended to prevent authorized users from accessing resources?
DoS attacks
What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
.com
Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)
10.5.4.1, 10.5.4.99
Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. What is the network address of Host-A?
172.16.0.0
Which number or set of numbers represents a socket?
192.168.1.1:80
Which of these ports are used by FTP? (Choose two.)
20 / 21
What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?
2001:DB8:0:AB00::1234
What is the prefix associated with the IPv6 address 2001:DB8:D15:EA:CC44::1/64?
2001:DB8:D15:EA::/64
What is the most compressed representation of the IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001?
2001:db8:0:abcd::1
What subnet mask is represented by the slash notation /20?
255.255.240.0
A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.224. How many usable host addresses will this subnet provide?
30
How many usable IP addresses are available on the 192.168.1.0/27 network?
30
Given a /32 Global Routing Prefix and a /64 prefix, how many bits would be allocated for the Subnet ID?
32
How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?
62
Which two statements are correct about public IPv4 addresses? (Choose two.)
To access a device over the internet, the destination IPv4 address must be a public address. / Public IPv4 address exhaustion is a reason why there are private IPv4 address and why organizations are transitioning to IPv6.
What field is used to provide flow control?
Window Size
Which software installed on key hosts can reveal the types of network traffic flowing through the network?
Wireshark
What are three parts of an IPv6 global unicast address? (Choose three.)
a global routing prefix that is used to identify the network portion of the address that has been provided by the ISP / a subnet ID that is used to identify networks inside of the local enterprise site / an interface ID that is used to identify the local host on the network
On a home network, which device is most likely to provide dynamic IPv4 addressing to clients on the home network?
a home router
What does the term vulnerability mean?
a weakness that makes target susceptible to an attack
George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of "file" and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George's workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario?
access attack
Which is appropriate for providing endpoint security?
antivirus software
This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts.
application
Which TCP/IP model layer is closest to the end user?
application
These three OSI layers define the same functions as the TCP/IP model application layer.
application / presentation / session
What are two forms of software programs or processes that provide access to the network? (Choose two.)
application layer service / network applications
What type of applications are best suited for using UDP?
applications that are sensitive to delay
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
IMAP
What is necessary to plan and use when implementing a network?
IP addressing scheme
What is indicated by a successful ping to the ::1 IPv6 address?
IP is properly installed on the host
Why is DHCP for IPv4 preferred for use on large networks?
It is a more efficient way to manage IPv4 addresses than static address assignment is
What is the purpose of the command ping ::1?
It tests the internal configuration of an IPv6 host.
Which dynamic addressing method for GUAs is the one where devices rely solely on a DHCPv6 server for their addressing information?
Method 3 : Stateful DHCPv6
Which of the following DNS resource record types resolves authoritative name servers?
NS
Which protocol can be used to transfer messages from an email server to an email client?
POP3
This message type is used when uploading data files to a web server.
POST
Which two statements are correct about private IPv4 addresses? (Choose two.)
Private IPv4 addresses are assigned to devices within an organization's intranet (internal network). / Any organization (home, school, office, company) can use the 10.0.0.0/8 address.
Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?
RIR's
Which type of ICMPv6 message would a host send to acquire an IPv6 configuration when booting up?
Router Solicitation (RS) message
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 30 attempts 2 within 10
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
SMB
This protocol is used by a client to send email to a mail server.
SMTP
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)
SYN / ACK
Which control bit flags are used during the three-way handshake?
SYN and ACK
Which two network protocols are used to establish a remote access network connection to a device? (Choose two.)
Secure Shell (SSH) / Telnet
Which field in an IPv6 GUA is used for subnetting?
Subnet ID
What happens when a sending host senses there is congestion?
The sending host reduces the number of bytes it sends before receiving an acknowledgement from the destination host.
Which statement is true about variable-length subnet masking?
The size of each subnet may be different, depending on requirements.
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?
The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination
Which three services are provided by the AAA framework? (Choose three.)
authorization / accounting / authentication
Which address type is not supported in IPv6?
broadcast
Which elements are required to scale to a larger network? (Choose two.)
budget / network documentation
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
client
What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
closest to the end user / the creation and maintenance dialogue between source and destination applications
Which three are transport layer responsibilities? (Choose three.)
conversation multiplexing / segmenting data and reassembling segments / tracking individual conversations
Which factor must be considered when selecting network devices?
cost
What kind of threat is described when a threat actor alters data records?
data loss or manipulation
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
data loss or manipulation
A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario?
denial of service (DoS) attack
Angela, an IT staff member at ACME Inc., notices that communication with the company's web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME'S web server. What type of attack is described in this scenario?
denial of service (DoS) attack
What is the most important motivating factor for moving to IPv6?
depletion of IPv4 addresses
At a minimum, which address is required on IPv6-enabled interfaces?
link-local
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?
link-local
Which type of IPv6 address is not routable and used only for communication on a single subnet?
link-local address
What TCP mechanism is used to enhance performance by allowing a device to continuously send a steady stream of segments as long as the device is also receiving necessary acknowledgements?
sliding window
Which two situations are the result of excessive broadcast traffic? (Choose two)
slow network operation / slow device operations
A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection?
terminal monitor
A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?
test the theory to determine the cause
Which IPv6 network prefix is only intended for local links and can not be routed?
FE80::/10
Which two applications would use the TCP transport layer protocol? (Choose two.)
FTP / HTTP
True or False. RA messages are sent to all IPv6 routers by hosts requesting addressing information.
False
True or false? A DNS server that receives a request for a name resolution that is not within its DNS zone will send a failure message to the requesting client.
False
True or false? HTTP is a secure protocol.
False
True or false? Resource sharing over SMB is only supported on Microsoft operating systems.
False
True or false? The peer-to-peer networking model requires the implementation of a dedicated server for data access.
False
What message type is used by an HTTP client to request data from a web server?
GET
Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
GIF / MPEG / HTTP
This protocol is used by a web browser to establish a connection to a web server.
HTTP
Which protocol uses encryption?
HTTPS
A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies. What conclusion can be drawn based on this connectivity test?
The TCP/IP implementation is functional
Which statement is true about FTP?
The client can download data from or upload data to the server
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
The client randomly selects a source port number
True or false? FTP data transfers take place from client to server (push) and from server to client (pull).
True
True or false? In a peer-to-peer network environment every peer can function as both a client and a server.
True
How many connections are required by FTP between client and server?
Two (over ports 20 and 21)
Which of the following is a feature of the Gnutella protocol?
Users can share whole files with other users
What is the objective of a network reconnaissance attack?
discovery and mapping of systems
What kind of threat is described when a threat actor overloads a network to deny other users network access?
disruption of service
What kind of threat is described when a threat actor prevents legal users from accessing data services?
disruption of service
Which of the following techniques use native IPv6 connectivity?
dual stack
Which benefit does SSH offer over Telnet for remotely managing a router?
encryption
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
environmental
A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next?
escalate the trouble ticket to the manager to approve the change
This is a function of the OSI session layer.
exchange of information to initiate dialog between peers
Which component is designed to protect against unauthorized communications to and from a computer?
firewall
Which device controls traffic between two or more networks to help prevent unauthorized access?
firewall
For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
firewall settings
What is one of the most effective security tools available for protecting users from external threats?
firewalls
What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?
identity theft
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
identity theft
What kind of threat is described when a threat actor is stealing the user database of a company?
information theft
What kind of threat is described when a threat actor steals scientific research data?
information theft
Which is a feature of IMAP?
it downloads a copy of email messages leaving the original on the server
Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario?
malware attack
Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah's computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?
malware attack
Which two tasks can be performed by a local DNS server? (Choose two.)
mapping name-to-IP addresses for internal hosts / forwarding name resolution requests between servers
What message is sent by a host to check the uniqueness of an IPv6 address before using that address?
neighbor solicitation
A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.)
no debug ip icmp / undebug all
MKV, GIF, and JPG standards are associated with which OSI layer?
presentation
What is required to classify traffic according to priority?
quality of service (QoS)
What type of attack may involve the use of tools such as nslookup and fping?
reconnaissance
Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario?
reconnaissance attack
What is required to maintain a high degree of reliability and eliminate single points of failure?
redundancy
A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
remote access to a switch where data is encrypted during the session
Which two operations are provided by TCP but not by UDP? (Choose two.)
retransmitting any unacknowledged data / acknowledging received data
What is a socket?
the combination of a source IP address and port number or a destination IP address and port number
Which of the following is displayed by the nslookup utility?
the configured default DNS server
Which statement correctly relates to a small network?
the majority of businesses are small
What happens if part of an FTP message is not delivered to the destination?
the part of the FTP message that was lost is re-sent.
What is the purpose of using a source port number in a TCP communication?
to keep track of multiple conversations between devices
What is the purpose of the network security accounting function?
to keep track of the action of a user
What is a responsibility of transport layer protocols?
tracking individual conversations
What three configuration steps must be performed to implement SSH access to a router? (Choose three.)
user account / unique hostname / IP domain name
Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?
validation
Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?
worm
What is the recommended prefix length for most IPv6 subnets?
/64
Host-A has the IPv4 address and subnet mask 192.168.1.50 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)
192.168.1.1, 192.168.1.100
Which subnet mask would be used if 5 host bits are available?
255.255.255.224
How does a networked server manage requests from multiple clients for different services?
each request has a combination of source and destination port numbers, coming from a unique IP address
Which Windows command would display the protocols in use, the local address and port numbers, the foreign address and port numbers, and the connection state?
netstat
What is a function of the tracert command that differs from the ping command when they are used on a workstation?
the tracert command shows the information of routers in the path
Which port group includes port numbers for FTP, HTTP, and TFTP applications?
well-known ports
Which two fields are the same in a TCP and UDP header? (Choose two.)
Destination Port Number / Source Port Number
What are the two methods a device can use to generate its own IPv6 interface ID?
EUI-64 / Randomly Generated
True or False: The Subnet ID field in an GUA must borrow bits from the interface ID.
False
Which protocol is used by IPv4 and IPv6 to provide error messaging?
ICMP
Which protocol provides feedback from the destination host to the source host about errors in packet delivery?
ICMP
Which TCP header statement is true?
It consists of 10 fields in a 20-byte header
Which UDP header statement is true?
It consists of 4 fields in an 8-byte header
What type of IPv6 address begins with fe80?
LLA
Which type of IPv6 unicast address is not routable between networks?
LLA
What field is used by the destination host to reassemble segments into the original order?
Sequence Number
Which transport layer feature is used to establish a connection-oriented session?
TCP 3-way handshake
True or False: 4 out of 5 RIRs no longer have enough IPv4 addresses to allocate to customers on a regular basis.
True
True or False? IPv6 was designed with subnetting in mind.
True
Which of the following is a stateless best-effort delivery transport layer protocol?
UDP
Which transport layer protocol statement is true?
UDP is a best-effort delivery protocol
Which UDP datagram reassembly statement is true?
UDP reassembles the data in the order that it was received.
Which transport layer protocol would be used for VoIP applications?
User Datagram Protocol (UDP)
How many exchanges are needed to end both sessions between two hosts?
four exchanges
What does the IP address 172.17.4.250/24 represent?
host address
Which two parts are components of an IPv4 address? (Choose two.)
network portion, host portion
Which command can be used to test connectivity between two devices using echo request and echo reply messages?
ping
Which utility uses the Internet Control Messaging Protocol (ICMP)?
ping
Which devices will not forward an IPv4 broadcast packet by default?
router
Which two things can be determined by using the ping command? (Choose two.)
the destination device is reachable through the network / the average time it takes a packet to reach the destination and for the response to return to the source
Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?
time exceeded
What is the purpose of the subnet mask in conjunction with an IP address?
to determine the subnet to which the host belongs
What is the minimum configuration for a router interface that is enabled for IPv6?
to have a link-local IPv6 address
Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?
to identify the network address of the destination network
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?
to test that the host has the capability to reach hosts on other networks
A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?
traceroute
A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?
tracert
Which layer is responsible for establishing a temporary communication session between the source and destination host applications?
transport layer
A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?
"."
What is the prefix length notation for the subnet mask 255.255.255.224?
/27
What is the complete range of TCP and UDP well-known ports?
0 to 1023
Assume a host with IP address 10.1.1.10 wants to request web services from a server at 10.1.1.254. Which of the following would display the correct socket pair?
10.1.1.10:1099, 10.1.1.254:80
Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. What is the network address of Host-A?
10.5.4.0
Given a /48 Global Routing Prefix and a /64 prefix, what is the subnet portion of the following address: 2001:db8:cafe:1111:2222:3333:4444:5555
1111
If a network device has a mask of /28, how many IP addresses are available for hosts on this network?
14
Your organization is issued the IPv6 prefix of 2001:db8:130f::/48 by your service provider. With this prefix, how many bits are available for your organization to create /64 subnetworks if interface ID bits are not borrowed?
16
Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)
172.16.4.99, 172.16.0.1
What is the network address for the IPv6 address 2001:DB8:AA04:B5::1/64?
2001:DB8:AA04:B5::/64
Which subnet mask would be used if exactly 4 host bits are available?
255.255.255.240
A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?
4
If a network device has a mask of /26, how many IP addresses are available for hosts on this network?
62
Why is UDP desirable for protocols that make a simple request and reply transactions?
Low Overhead
Which dynamic addressing method for GUAs is the one where devices rely solely on the contents of the RA message for their addressing information?
Method 1 : SLAAC
Which dynamic addressing method for GUAs is the one where devices get their IPv6 configuration in a RA message and request DNS information from a DHCPv6 server?
Method 2: SLAAC and Stateless DHCPv6
Which of the following would be valid source and destination ports for a host connecting to an email server?
Source : 49152, Destination : 25
Which of the following would be valid source and destination ports for a host connecting to a DNS server?
Source : 49152, Destination : 53
Which transport layer protocol ensures reliable same-order delivery?
TCP
Which two applications would use the UDP transport layer protocol? (Choose two.)
TFTP / VoIP
Which part of a GUA is assigned by the ISP?
Global Routing Prefix
What field content is used by ICMPv6 to determine that a packet has expired?
Hop Limit field