ICS 621 Midterm Exam (Part 1)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which statement is true about Cisco IOS ping indicators?

"U" may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption

What is the decimal equivalent of the hexadecimal value of 3F?

00111111

Whats is the layer 2 multicast MAC address that corresponds to the layer 3 IPv4 multicast address 224.139.34.56

01-00-5E-0B-22-38

What is the maximum possible throughput between the PC and the server?

128 kb/s (on the chart); the max throughput between any two nodes on a network is determined by the slowest link between those nodes

The minimum ethernet frame size is _____ bytes. Anything smaller than that should be considered a "runt frame".

64

What are the two sizes (minimum and maximum) of an ethernet frame?

64 bytes 1518 bytes

What is SDSL?

A business class service that provides the same upload and download speeds over telephone lines

What is an example of a scenario where the use of a WISP would be recommended?

A farm in a rural area without wired broadband access

What is auto-MDIX?

A feature that detects ethernet cable type

What is a WAN?

A network infrastructure that provides access to other networks over a large geographic area

What is intranet?

A private connection on LANS and WANS that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization

What is ARPANET?

A project that started the development on inter-network connections using the TCP/IP that has evolved into the internet today

What is a converged network?

A single network that delivers voice, video, and data to a variety of devices

What is cellular?

Access via the cellphone network

What is store-and-forward?

Always stores the entire frame Checks the CRC before forwarding Checks the frame length before forwarding

What type of address is 01-00-5E-0A-00-02?

An address that reaches a specific group of hosts cxzz

What is ISP?

An organization that enables individuals and businesses to connect to the internet

On ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represents the _____ MAC address

Broadcast

What method is used to manage contention-based access on a wireless network?

CSMA/CA

On which two interfaces or ports can security be improved by configuring executive timeouts?

Console ports VTY ports

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5

DHCP

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved?

Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another Destination IP addresses in a packet header remain constant along the entire path to a target host

Which two functions are provided to the users by the context - sensitive help feature of the Cisco IOS CLI (command line interface)?

Displaying a list of all available commands within the current mode Determining which option, keyword, or argument is available for the entered command

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems

How should traffic flow be captures in order to best understand traffic patterns in a network?

During peak utilization times

Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss are considered

Electrical threats

Temperature extremes or humidity extremes are considered

Environmental threats

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?

Extended star

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF*

True or false? Mobile devices do not require IP addresses to communicate on the internet.

False

A fiber optic cable is damaged on a campus between two dorms. Although the cable has been cut, students in the dorms only experience a very short interruption of network services. What characteristic of network is shown in this scenario?

Fault tolerance

What is one of the most effective security tools available for protecting users from external threats?

Firewalls

Which method of data transfer allows information to be sent and received at the same time?

Full duplex

What makes fiber preferable to copper cabling for interconnecting buildings?

Greater distance per cable run Limited susceptibility to EMI/RFI Greater bandwidth potential

What are two characteristics of a scalable network?

Grows in size without impacting existing users Suitable for modular devices that allow for expansion

H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true?

H1 sends a unicast message to H2, and the switch forwards it directs to H2

What are physical damage to servers, routers, switches, cabling plant, and workstations called?

Hardware threats

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP fails?

Have a second router that is connected to another ISP

What is metro ethernet?

High-speed business class copper or fiber connection

Which two factors influence the method that is used for media access control?

How the connection between nodes appears to the data link layer How the nodes share the media

Which protocol is used by the traceroute commend to send and receive echo-requests and echo-replies?

ICMP

https://1385107.netacad.com/assessment_questions/33846428/files/23525788/download?verifier=E7wW1EKe0av6v13QvT6Tqg6kK2xk09iEq5TkRTe1

Intermediary

What is the purpose of the preamble in the ethernet frame?

Is used for timing synchronization

Which statement correctly describes frame encoding?

It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits

What statement describes ethernet?

It defines the most common LAN type in the world

Which two functions or operations are performed by the MAC sublayer?

It is responsible for media access control It adds a header and trailer to form an OSI layer 2 PDU

How does BYOD change the way in which businesses implement networks?

It provides flexibility in where and how users can access network resources

Which action is taken by a layer 2 switch when it receives a layer 2 broadcast frame?

It sends the frame to all ports except the port on which it received the frame

The ARP table in a switch maps which two types of address together?

Layer 3 address to a layer 2 address

In fiber optics media, the signals are represented as patterns of ____?

Light

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

Local router

Which two statements describe features or functions of the logical link control sublayer in ethernet standards?

Logical link control is implemented in software The data link layer uses LLC to communicate with the upper layers of protocol suite

What is cut-through?

Low latency May forward RUNT frames Begins forwarding when the destination address is perceived

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user devices needs mobility when connecting to that network

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI

What happens to runt frames received by a Cisco ethernet switch?

The frame is dropped

When a hostname is configured through the Cisco CLI, which three naming conventions are apart of the guidelines?

The hostname must be less than 64 characters The hostname cannot contain spaces The hostname should begin with a letter

What addressing information is recorded by a switch to build its MAC address table?

The source layer 2 address of incoming frames

Which statement describes the treatment of ARP requests on the local link?

They are received and processed by every device on the local network

What statement describes a characteristic of MAC addresses?

They must be globally unique

Which statement describes a characteristic of the frame header fields of the data link layer?

They vary depending on the protocols

Why would you enter the command copy startup-config running-config?

To copy existing configuration into RAM

Which is a function of the Logical Link Layer (LLC) sublayer?

To identify which network protocol is being used

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

Tracert 10.1.1.5

What is the purpose of the OSI physical layer?

Transmitting bits across the local media

When a device is sending data to another device on a remote network, the ethernet frame is sent to the MAC address of the default gateway

True

Each time an employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can be done to prevent this situation from happening again?

Use DHCP (dynamic host configuration protocol) to automatically assign IP addresses

What feature would allow an employee to gain secure access to a company network?

VPN - Virtual Private Network

Passwords can be used to restrict access to all or parts of the Cisco IOS. What modes and interfaces can be protected with passwords?

VTY (virtual teletype) interface Console interface Privileged EXEC mode

Which three devices are considered end devices in a network?

VoIP phone, Security Camera, TelePresence Endpoint

A particular website does not appear to be responding on a windows 7 computer. What command could the technician use to shoe any cached entries for this webpage?

ipconfig/displaydns

On a Cisco switch, _______ memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports.

port-based

PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

RT1 will send an ARP reply with its own Fa0/0 MAC address

A collision fragment, also known as a ______ frame, is a frame of fewer than 64 bytes in length.

RUNT

What is a satellite?

Requires a dish and a clear line of sight for service

What is the primary purpose of ARP?

Resolve IPv4 addresses to MAC addresses

What type of cable is used to connect a workstation serial port to a Cisco router console port?

Rollover (console)

Which command will block login attempts on router A for a period of 30 seconds if there are 2 failed log in attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

How is SSH (secure shell) different from Telenet?

SSH provides security to remote sessions by encrypting messages and using user authentication Telenet is considered insecure and sends messages in plaintext

A technician configures a switch with these commands: Switch A (config)# interface VLAN 1 Switch A (config-if)# ip address 192.168.1.1 255.255.255.255.0 Switch A (config-if)# no shutdown What is the technician configuring?

SVI - Switch Virtual Interface

A layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

Shared memory buffering

The component of the operating software that provides the user interface is called the _______?

Shell

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

Show file systems

What is cable?

Signal is carried on the same copper or fiber medium as the television signal

What is an example of an internal security threat to an organization?

Someone leaving a note around with their password written on it

When the store-and-forward method of switching is in use, what part of the ethernet frame is used to perform an error check?

Source MAC address is in the header

ARP ______ is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses.

Spoofing

During a routine inspection, a technician discovers software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

Spyware

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

Store-and-forward

Which switching method uses the CRC value in a frame?

Store-and-forward

To save time, IOS (internetwork Operating System) commands may be partially entered and then completed by typing which key?

Tab

What is a characteristic of a WAN hub and spoke topology?

The branch sites are connected to a central site through point to point links

Which two statements are true regarding the user EXEC mode?

The device prompt for this mode ends with the ">" symbol Only some aspects of the router configuration can be viewed

Network service use ______ to define a set of rules that govern how devices communicate and the data formats used in a network

Protocols

Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

Maintenance threats

https://1385107.netacad.com/assessment_questions/33846436/files/23525791/download?verifier=TUpbT2Uj6SSXgwZxn5AFPaMRmEm0k9mUM6h8cNfQ

Network A - MAN Network B - LAN Network C - WLAN Network D - WAN

The IP address of an interface on an IOS device was just changed. What else must be done in order to apply those changes to the device?

Nothing. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the enter key has been pressed

What are two potential network problems that can result from address resolution protocol (ARP) operation?

On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic

In order to test end-to-end connectivity you would use the ____ command?

Ping


संबंधित स्टडी सेट्स

NBCOT Exam: Hand and UE Disorders and Injuries

View Set

Yak - Chapter 13 Distribution and Deployment of Field Forces

View Set

Transitions Exam 1: Nursing Licensure and Certification/ Nursing Research and Evidence-Based Practice

View Set

lesson 9.4 Animal feeds and feeding AG

View Set