Data Com final exam
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
(config)# service password-encryption
Fill in the blank.The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7 is
00000111
Which three are components of message timing? (Choose three.)
1. Access method 2. Flow control 3. Response timeout
Match the Internet connectivity type to the appropriate description or characteristic. (Not all options are used.)
1. Metro Ethernet - high-speed business class copper or fiber connection 2. Satellite - requires a dish and clear line of sight for service 3. SDSL - business class service that provides the same upload and download speeds over telephone lines 4. Cable - signal carried on the same copper or fiber medium as the television signal 5. Cellular - access via the cell phone network
Refer to the exhibit (other side). Match the example networks to the type of network. (Not all options are used.)
1. Network A - MAN 2. Network B - LAN 3. Network C - WLAN 4. Network D - WAN
Which three devices are considered end devices in a network? (Choose three.)
1. VoIP phone 2. security camera 3. TelePresence endpoint
What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
1. greater bandwidth potential 2. limited susceptibility to EMI/RFI 3. greater distances per cable run
Match the type of threat with the cause. (Not all options are used.)
1. hardware threats - physical damage to servers, routers, switches, cabling plant, and workstations 2. environmental threats - temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry) 3. electrical threats - voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss 4. maintenance threats - poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling
Which two types of devices are typically assigned static IP addresses? (Choose two.)
1. printers 2. web servers
What are two characteristics of a scalable network? (Choose two.)
1. suitable for modular devices that allow for expansion 2. grows in size without impacting existing users
Three methods allow IPv6 and IPv4 to co-exist. Match each method with its description. (Not all options are used.)
1.(Q) The IPv4 packets and IPv6 packets coexist in the same network. (A) Dual stack 2. (Q) The IPv6 packet is transported inside an IPv4 packet. (A) tunneling 3. (Q) IPv6 packets are converted into IPv4 packets, and vice versa. (A) translation
Refer to the exhibit (other side). What is the maximum possible throughput between the PC and the server?
128 kb/s
The network portion of the address 172.16.30.5/16 is .
172.16
What is the decimal equivalent of the hexadecimal value of 3F?
63
Which statement describes a characteristic of a converged network?
A single network that delivers voice, video, and data to a variety of devices.
A protocol that enables a sending node to determine the MAC address of the intended receiving node
ARP
Defines a set of tools that programs can use to access the network
Application layer
How does BYOD change the way in which businesses implement networks?
BYOD provides flexibility in where and how users can access network resources.
A service that provides an IP address
DHCP
Which process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5?
DHCP
A TCP/IP application that resolves domain and computer names to IP addresses and IP addresses to domain and computer names.
DNS
Defines the rules for accessing and using the Physical layer.
Data link layer
MATCH THE LAYERS OF THE OSI MODEL
Datalink- 2 Presentation - 6 Session - 5 Physical - 1 Network - 3 Transport - 4 Application - 7
What is considered the most effective way to mitigate a worm attack?
Download security updates from the operating system vendor and patch all vulnerable systems.
What is the process of converting information into the proper form for transmission?
Encoding
Which step of the communication process is concerned with properly identifying the address of the sender and receiver?
Formatting
Refer to the graphic (other side). H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true?
H1 sends a unicast message to H2, and the switch forwards it directly to H2.
A secure form of HTTP that uses secure sockets layer
HTTPS
MATCH THE LAYERS OF THE TCP/IP MODEL
Internet - 2 Application - 4 Network access - 1 Transport - 3
What is an ISP?
It is an organization that enables individuals and businesses to connect to the Internet.
Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?
It sends the frame to all ports except the port on which it received the frame.
Translates a systems private IP address to public IP address before sending out to a larger network
NAT
The layer at which data-packet routing takes place.
Network layer
A protocol that provides connections to networks, intranets, extranets and VPNs through the Internet.
PPTP
An inner frame placed around data by the Internet Protocol
Packet
Defines the physical form taken by data when it travels across a cable. Cabling and hubs are in the physical layer.
Physical layer
Presents data from the sending system in a form that the applications on the receiving system can understand.
Presentations layer
How is SSH different from Telnet?
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
Match the description with the media. (Not all options are used.)
STP - This type of copper media is used in industrial or similar environments where there is a lot of interference Wireless - This media provides the most mobility options Optical fiber - This type of media is used for high transmission speed and can transfer data over long distances Coaxial - Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.
Manages the connections between machines on the network.
Session layer
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
The end-user device needs mobility when connecting to the network.
If the default gateway is configured incorrectly on the host, what is the impact on communications?
The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
Breaks up data it receives from the upper layers into smaller pieces for transport
Transport layer
An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again?
Use DHCP to automatically assign addresses.
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
VPN
What is a WAN?
a network infrastructure that provides access to other networks over a large geographic area
Which message delivery option is used when all devices need to receive the same message simultaneously?
broadcast
At which layer of the OSI model would a physical address be encapsulated?
data link layer
Which logical address is used for delivery of data to a remote network?
destination IP address
A logical grouping of networking resources
domain
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?
fault tolerance
What is one of the most effective security tools available for protecting users from external threats?
firewalls
Which method of data transfer allows information to be sent and received at the same time?
full duplex
Refer to the exhibit (other side). Which term correctly identifies the device type that is included in the area B?
intermediary
What layer of the TCP/IP protocol model determines the best path through the network?
internet
What type of delivery uses data link layer addresses?
local delivery
Which device acts as a gateway to allow hosts to send traffic to remote IP networks?
local router
What type of message is sent to a specific group of hosts?
multicast
What is the purpose of protocols in data communications?
providing the rules required for a specific type of communication to occur
What is the primary purpose of ARP?
resolve IPv4 addresses to MAC addresses
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
spyware
An TCP/IP application that provides terminal emulation
telnet
Why would a technician enter the command copy startup-config running-config?
to copy an existing configuration into RAM
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?
to test that the host has the capability to reach hosts on other networks
What is the purpose of the OSI physical layer?
transmitting bits across the local media
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?
transport
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?
tunneling