IST 202 CCNa V7 Final exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device obtain a destination MAC address? It will send the frame with a broadcast MAC address. It will send an ARP request for the MAC address of the destination device. It will send the frame and use the device MAC address as the destination. It will send an ARP request to the DNS server for the destination MAC address. It will send an ARP request for the MAC address of the default gateway.

It will send an ARP request for the MAC address of the default gateway.

Which scenario describes a function provided by the transport layer? A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header. A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

What method is used to manage contention-based access on a wireless network? CSMA/CA token passing priority ordering CSMA/CD

CSMA/CA

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) Enable inbound vty Telnet sessions. Enable inbound vty SSH sessions. Configure the IP domain name on the router. Generate two-way pre-shared keys. Configure DNS on the router. Generate the SSH keys.

2/3/6

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.) Passwords have been configured on the switch. The default SVI has been configured. The switch can be remotely managed. Two physical interfaces have been configured. Two devices are attached to the switch. One device is attached to a physical interface.

2/3/6

Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets? 88 158 200 224 72

200

What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted? 255.255.255.0 255.255.255.192 255.255.255.224 255.255.255.128 255.255.255.240

255.255.255.192

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.0 255.255.255.128 255.255.255.248 255.255.255.192

255.255.255.248

Refer to the exhibit. Which protocol was responsible for building the table that is shown? ICMP DNS DHCP ARP

ARP

Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.) Capture traffic during peak utilization times to get a good representation of the different traffic types. Capture traffic on the weekends when most employees are off work. Perform the capture on different network segments. Only capture traffic in the areas of the network that receive most of the traffic such as the data center. Only capture WAN traffic because traffic to the web is responsible for the largest amount of traffic on a network.

Capture traffic during peak utilization times to get a good representation of the different traffic types. Perform the capture on different network segments.

What happens when the transport input ssh command is entered on the switch vty lines? The switch requires remote connections via a proprietary client software. The SSH client on the switch is enabled. Communication between the switch and remote users is encrypted. The switch requires a username/password combination for remote access.

Communication between the switch and remote users is encrypted

A client packet is received by a server. The packet has a destination port number of 53. What service is the client requesting? Telnet FTP SSH DNS

DNS

Which two statements describe features of an IPv4 routing table on a router? (Choose two.)​ The netstat -r command can be used to display the routing table of a router.​ The routing table stores information about routes derived from the active router interfaces. The routing table lists the MAC addresses of each active interface. Directly connected interfaces will have two route source codes in the routing table: C and S . If a default static route is configured in the router, an entry will be included in the routing table with source code S .

Directly connected interfaces will have two route source codes in the routing table: C and S . If a default static route is configured in the router, an entry will be included in the routing table with source code S .

Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.) The average transmission time between the two hosts is 2 milliseconds. The connectivity between these two hosts allows for videoconferencing calls. This host does not have a default gateway configured. There are 4 hops between this device and the device at 192.168.100.1. There is connectivity between this device and the device at 192.168.100.1.

There are 4 hops between this device and the device at 192.168.100.1. There is connectivity between this device and the device at 192.168.100.1.

Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.) data link presentation application transport session network

presentation application session

Which two commands can be used on a Windows host to display the routing table? (Choose two.) route print tracert show ip route netstat -s netstat -r

route print netstat -r

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.) extensive cabling mobility options security coverage area packet collision interference

security coverage area interference

Match the description to the IPv6 addressing component. (Not all options are used.)

subnet id = the part of the address is used by the organization to identify subnets global routing prefix= the network portion of the address is assigned by the provider interface id= the part of the address is the equivalent to the host portion of the IPv4 address

A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use? point-to-point peer-to-peer (P2P) client-based master-slave

P2P

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?​ RT1 will send an ARP reply with the PC2 MAC address.​ RT1 will send an ARP reply with the RT1 Fa0/0 MAC address.​ SW1 will send an ARP reply with the SW1 Fa0/1 MAC address.​ SW1 will send an ARP reply with the PC2 MAC address.​ PC2 will send an ARP reply with the PC2 MAC address.

PC2 will send an ARP reply with the PC2 MAC address.

Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.) IP TCP Ethernet UDP DNS POP

POP DNS

Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping? The default gateway is not operational. Security rules are applied to the default gateway device, preventing it from processing ping requests. The default gateway device is configured with the wrong IP address. The TCP/IP stack on the default gateway is not working properly.

Security rules are applied to the default gateway device, preventing it from processing ping requests.

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​ All router interfaces will be automatically activated. The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages. Each router interface will generate an IPv6 link-local address.​ It statically creates a global unicast address on this router.​

The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? The administrator must first enter privileged EXEC mode before issuing the command. The entire command, configure terminal , must be used. The administrator must connect via the console port to access global configuration mode. The administrator is already in global configuration mode.

The administrator must first enter privileged EXEC mode before issuing the command.

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows? The data flow is being tracked based on the source IP address that is used by the PC of the technician. The data flow is being tracked based on the destination MAC address of the technician PC. The data flow is being tracked based on the destination IP address that is used by the PC of the technician. The data flow is being tracked based on the source port number that is used by each application

The data flow is being tracked based on the source port number that is used by each application

What will happen if the default gateway address is incorrectly configured on a host? A ping from the host to 127.0.0.1 would not be successful. The host cannot communicate with other hosts in the local network. The host will have to use ARP to determine the correct address of the default gateway. The host cannot communicate with hosts in other networks. The switch will not forward packets initiated by the host.

The host cannot communicate with other hosts in the local network.

The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command? The switch can be remotely managed from a host on another network. The switch will have a management interface with the address 172.16.100.1. The switch can communicate with other hosts on the 172.16.100.0 network. The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.

The switch can be remotely managed from a host on another network.

Refer to the exhibit. What is wrong with the displayed termination? The wrong type of connector is being used. The untwisted length of each wire is too long. The wires are too thick for the connector that is used. The woven copper braid should not have been removed.

The untwisted length of each wire is too long.

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework? authorization automation accounting authentication

authorization

What are two functions that are provided by the network layer? (Choose two.) directing data packets to destination hosts on other networks providing end devices with a unique network identifier carrying data between processes that are running on source and destination hosts providing dedicated end-to-end connections placing data on the network medium

directing data packets to destination hosts on other networks providing end devices with a unique network identifier placing data on the network medium

Match the characteristic to the forwarding method

google answer

Match the description with an appropriate IP address a link local address a public address an experimental address a loop back address

google answer

Match the header field with the appropriate layer of the OSI model

google answer

Math each item of the topology diagram on which it is typically identified Ip address of a server location of a desktop pc in a classroom USB port on a desktop PC in a classroom path of cables that connect rooms to wiring closets

google answer

match the description to its corresponding term message encoding message sizing message encapsulation

google answer

Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router? Layer 2 destination address = 00-00-0c-94-36-cdLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.99Layer 3 source address = 172.16.10.200 Layer 2 destination address = 00-00-0c-94-36-ddLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.200Layer 3 source address = 172.16.10.200 Layer 2 destination address = 00-00-0c-94-36-abLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.200Layer 3 source address = 172.16.100.200 Layer 2 destination address = 00-00-0c-94-36-abLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.200Layer 3 source address = 172.16.10.200

google answer and explination

Match each description with the corresponding TCP mechanism

google anwer

What are two features of ARP? (Choose two.) When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses. An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and the multicast MAC address. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply. If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment.

if a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

What are two common causes of signal degradation when using UTP cabling? (Choose two.) improper termination low-quality shielding in cable loss of light over long distances low-quality cable or connectors installing cables in conduit

improper termination low-quality cable or connectors

What does the term "attenuation" mean in data communication? time for a signal to reach its destination strengthening of a signal by a networking device leakage of signals from one cable pair to another loss of signal strength as distance increases

loss of signal strength as distance increases

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.) message encoding message size connector specifications media selection end-device installation delivery options

message encoding message size delivery options

A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem? tracert ipconfig nslookup netstat

nslookup

What are two characteristics of IP? (Choose two.) retransmits packets if errors occur operates independently of the network media re-assembles out of order packets into the correct order at the receiver end does not require a dedicated end-to-end connection guarantees delivery of packets

operates independently of the network media does not require a dedicated end-to-end connection

Match the firewall function to the type of threat protection it provides to the network. (Not all options are used.)

packet filtering = prevents access based on ip or mac address url filtering= prevents access to websites stateful packet inspection = prevents unsolicited incomming sessions. application filtering = prevents access by port number

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame enables IPv4 and IPv6 to utilize the same physical medium applies source and destination MAC addresses to Ethernet frame integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper implements trailer with frame check sequence for error detection

places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame enables IPv4 and IPv6 to utilize the same physical medium

What is a function of the data link layer? provides for the exchange of frames over a common local media provides delivery of data between two applications provides the formatting of data provides end-to-end delivery of data between hosts

provides delivery of data between two applications

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees.What three network characteristics are described in this scenario? (Choose three.) integrity quality of service fault tolerance security scalability powerline networking

quality of service fault tolerance security

Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1? remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0 open the header and use it to determine whether the data is to be sent out S0/0/0 nothing, because the router has a route to the destination network open the header and replace the destination MAC address with a new one

remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0

Which information does the show startup-config command display?​ the IOS image copied into RAM the contents of the current running configuration file in the RAM the bootstrap program in the ROM the contents of the saved configuration file in the NVRAM

the contents of the saved configuration file in the NVRAM

Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior? syslog records and messages the network performance baseline debug output and packet captures network configuration files

the network performance baseline

What characteristic describes identity theft? software that identifies fast-spreading threats a tunneling protocol that provides remote users with secure access into the network of an organization software on a router that filters traffic based on IP addresses or applications the use of stolen credentials to access private data

the use of stolen credentials to access private data

What technique is used with UTP cable to help protect against signal interference from crosstalk? twisting the wires together into pairs wrapping a foil shield around the wire pairs terminating the cable with special grounded connectors encasing the cables within a flexible plastic sheath

twisting the wires together into pairs

Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? phishing worm spam virus

worm

What is an advantage to using a protocol that is defined by an open standard? An open standard protocol is not controlled or regulated by standards organizations. It encourages competition and promotes choices. A company can monopolize the market. The protocol can only be run on equipment from a specific vendor. Navigation Bar

It encourages competition and promotes choices.

What service is provided by BOOTP? Allows for data transfers between a client and a file server. A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web. Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network. Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.

Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.

Which subnet would include the address 192.168.1.96 as a usable host address? 192.168.1.64/26 192.168.1.32/27 192.168.1.32/28 192.168.1.64/29

192.168.1.64/26

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​ all IPv6 enabled devices on the local link​ all IPv6 DHCP servers​ all IPv6 enabled devices across the network​ all IPv6 configured routers on the local link​

all IPv6 enabled devices on the local link​

Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.) 10.18.10.200/27 10.18.10.200/28 10.18.10.224/27 10.18.10.240/27 10.18.10.224/28 10.18.10.208/28

0.18.10.200/28 10.18.10.224/28

Match each type of frame field to its function. (Not all options are used.)

addressing = this field helps to direct the frame toward its destination error detection = this field checks if the frame has been damaged during transfer type = this field is used by the LLC to identify layer 3 protocol frame start= this field identifies the beginning of a frame


संबंधित स्टडी सेट्स

Midterm 2 Anatomy and physiology (BI 331)

View Set

Chapter 24: Caring for Clients with Valvular Disorders of the Heart

View Set

ACCT 315 Exam 3 (CH 15,16,16,18,23,28)

View Set

Chapter 3: The human body: A nutrition perspective

View Set