ICS 621 Midterm Exam (Part 1)
Which statement is true about Cisco IOS ping indicators?
"U" may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
(config)# service password-encryption
What is the decimal equivalent of the hexadecimal value of 3F?
00111111
Whats is the layer 2 multicast MAC address that corresponds to the layer 3 IPv4 multicast address 224.139.34.56
01-00-5E-0B-22-38
What is the maximum possible throughput between the PC and the server?
128 kb/s (on the chart); the max throughput between any two nodes on a network is determined by the slowest link between those nodes
The minimum ethernet frame size is _____ bytes. Anything smaller than that should be considered a "runt frame".
64
What are the two sizes (minimum and maximum) of an ethernet frame?
64 bytes 1518 bytes
What is SDSL?
A business class service that provides the same upload and download speeds over telephone lines
What is an example of a scenario where the use of a WISP would be recommended?
A farm in a rural area without wired broadband access
What is auto-MDIX?
A feature that detects ethernet cable type
What is a WAN?
A network infrastructure that provides access to other networks over a large geographic area
What is intranet?
A private connection on LANS and WANS that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization
What is ARPANET?
A project that started the development on inter-network connections using the TCP/IP that has evolved into the internet today
What is a converged network?
A single network that delivers voice, video, and data to a variety of devices
What is cellular?
Access via the cellphone network
What is store-and-forward?
Always stores the entire frame Checks the CRC before forwarding Checks the frame length before forwarding
What type of address is 01-00-5E-0A-00-02?
An address that reaches a specific group of hosts cxzz
What is ISP?
An organization that enables individuals and businesses to connect to the internet
On ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represents the _____ MAC address
Broadcast
What method is used to manage contention-based access on a wireless network?
CSMA/CA
On which two interfaces or ports can security be improved by configuring executive timeouts?
Console ports VTY ports
Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5
DHCP
Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved?
Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another Destination IP addresses in a packet header remain constant along the entire path to a target host
Which two functions are provided to the users by the context - sensitive help feature of the Cisco IOS CLI (command line interface)?
Displaying a list of all available commands within the current mode Determining which option, keyword, or argument is available for the entered command
What is considered the most effective way to mitigate a worm attack?
Download security updates from the operating system vendor and patch all vulnerable systems
How should traffic flow be captures in order to best understand traffic patterns in a network?
During peak utilization times
Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss are considered
Electrical threats
Temperature extremes or humidity extremes are considered
Environmental threats
A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?
Extended star
Which destination address is used in an ARP request frame?
FFFF.FFFF.FFFF*
True or false? Mobile devices do not require IP addresses to communicate on the internet.
False
A fiber optic cable is damaged on a campus between two dorms. Although the cable has been cut, students in the dorms only experience a very short interruption of network services. What characteristic of network is shown in this scenario?
Fault tolerance
What is one of the most effective security tools available for protecting users from external threats?
Firewalls
Which method of data transfer allows information to be sent and received at the same time?
Full duplex
What makes fiber preferable to copper cabling for interconnecting buildings?
Greater distance per cable run Limited susceptibility to EMI/RFI Greater bandwidth potential
What are two characteristics of a scalable network?
Grows in size without impacting existing users Suitable for modular devices that allow for expansion
H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true?
H1 sends a unicast message to H2, and the switch forwards it directs to H2
What are physical damage to servers, routers, switches, cabling plant, and workstations called?
Hardware threats
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP fails?
Have a second router that is connected to another ISP
What is metro ethernet?
High-speed business class copper or fiber connection
Which two factors influence the method that is used for media access control?
How the connection between nodes appears to the data link layer How the nodes share the media
Which protocol is used by the traceroute commend to send and receive echo-requests and echo-replies?
ICMP
https://1385107.netacad.com/assessment_questions/33846428/files/23525788/download?verifier=E7wW1EKe0av6v13QvT6Tqg6kK2xk09iEq5TkRTe1
Intermediary
What is the purpose of the preamble in the ethernet frame?
Is used for timing synchronization
Which statement correctly describes frame encoding?
It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits
What statement describes ethernet?
It defines the most common LAN type in the world
Which two functions or operations are performed by the MAC sublayer?
It is responsible for media access control It adds a header and trailer to form an OSI layer 2 PDU
How does BYOD change the way in which businesses implement networks?
It provides flexibility in where and how users can access network resources
Which action is taken by a layer 2 switch when it receives a layer 2 broadcast frame?
It sends the frame to all ports except the port on which it received the frame
The ARP table in a switch maps which two types of address together?
Layer 3 address to a layer 2 address
In fiber optics media, the signals are represented as patterns of ____?
Light
Which device acts as a gateway to allow hosts to send traffic to remote IP networks?
Local router
Which two statements describe features or functions of the logical link control sublayer in ethernet standards?
Logical link control is implemented in software The data link layer uses LLC to communicate with the upper layers of protocol suite
What is cut-through?
Low latency May forward RUNT frames Begins forwarding when the destination address is perceived
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
The end-user devices needs mobility when connecting to that network
Which statement is true about MAC addresses?
The first three bytes are used by the vendor assigned OUI
What happens to runt frames received by a Cisco ethernet switch?
The frame is dropped
When a hostname is configured through the Cisco CLI, which three naming conventions are apart of the guidelines?
The hostname must be less than 64 characters The hostname cannot contain spaces The hostname should begin with a letter
What addressing information is recorded by a switch to build its MAC address table?
The source layer 2 address of incoming frames
Which statement describes the treatment of ARP requests on the local link?
They are received and processed by every device on the local network
What statement describes a characteristic of MAC addresses?
They must be globally unique
Which statement describes a characteristic of the frame header fields of the data link layer?
They vary depending on the protocols
Why would you enter the command copy startup-config running-config?
To copy existing configuration into RAM
Which is a function of the Logical Link Layer (LLC) sublayer?
To identify which network protocol is being used
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?
Tracert 10.1.1.5
What is the purpose of the OSI physical layer?
Transmitting bits across the local media
When a device is sending data to another device on a remote network, the ethernet frame is sent to the MAC address of the default gateway
True
Each time an employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can be done to prevent this situation from happening again?
Use DHCP (dynamic host configuration protocol) to automatically assign IP addresses
What feature would allow an employee to gain secure access to a company network?
VPN - Virtual Private Network
Passwords can be used to restrict access to all or parts of the Cisco IOS. What modes and interfaces can be protected with passwords?
VTY (virtual teletype) interface Console interface Privileged EXEC mode
Which three devices are considered end devices in a network?
VoIP phone, Security Camera, TelePresence Endpoint
A particular website does not appear to be responding on a windows 7 computer. What command could the technician use to shoe any cached entries for this webpage?
ipconfig/displaydns
On a Cisco switch, _______ memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports.
port-based
PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?
RT1 will send an ARP reply with its own Fa0/0 MAC address
A collision fragment, also known as a ______ frame, is a frame of fewer than 64 bytes in length.
RUNT
What is a satellite?
Requires a dish and a clear line of sight for service
What is the primary purpose of ARP?
Resolve IPv4 addresses to MAC addresses
What type of cable is used to connect a workstation serial port to a Cisco router console port?
Rollover (console)
Which command will block login attempts on router A for a period of 30 seconds if there are 2 failed log in attempts within 10 seconds?
RouterA(config)# login block-for 30 attempts 2 within 10
How is SSH (secure shell) different from Telenet?
SSH provides security to remote sessions by encrypting messages and using user authentication Telenet is considered insecure and sends messages in plaintext
A technician configures a switch with these commands: Switch A (config)# interface VLAN 1 Switch A (config-if)# ip address 192.168.1.1 255.255.255.255.0 Switch A (config-if)# no shutdown What is the technician configuring?
SVI - Switch Virtual Interface
A layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?
Shared memory buffering
The component of the operating software that provides the user interface is called the _______?
Shell
An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?
Show file systems
What is cable?
Signal is carried on the same copper or fiber medium as the television signal
What is an example of an internal security threat to an organization?
Someone leaving a note around with their password written on it
When the store-and-forward method of switching is in use, what part of the ethernet frame is used to perform an error check?
Source MAC address is in the header
ARP ______ is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses.
Spoofing
During a routine inspection, a technician discovers software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
Spyware
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?
Store-and-forward
Which switching method uses the CRC value in a frame?
Store-and-forward
To save time, IOS (internetwork Operating System) commands may be partially entered and then completed by typing which key?
Tab
What is a characteristic of a WAN hub and spoke topology?
The branch sites are connected to a central site through point to point links
Which two statements are true regarding the user EXEC mode?
The device prompt for this mode ends with the ">" symbol Only some aspects of the router configuration can be viewed
Network service use ______ to define a set of rules that govern how devices communicate and the data formats used in a network
Protocols
Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling
Maintenance threats
https://1385107.netacad.com/assessment_questions/33846436/files/23525791/download?verifier=TUpbT2Uj6SSXgwZxn5AFPaMRmEm0k9mUM6h8cNfQ
Network A - MAN Network B - LAN Network C - WLAN Network D - WAN
The IP address of an interface on an IOS device was just changed. What else must be done in order to apply those changes to the device?
Nothing. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the enter key has been pressed
What are two potential network problems that can result from address resolution protocol (ARP) operation?
On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic
In order to test end-to-end connectivity you would use the ____ command?
Ping