IT Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What are two characteristics of a scalable network? (Choose two.)

-grows in size without impacting existing users -suitable for modular devices that allow for expansion

What is the Layer 2 multicast MAC address that corresponds to the Layer 3 IPv4 multicast address 224.139.34.56?

01-00-5E-0B-22-38

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

10 segments

What is an advantage of network devices using open standard protocols?

A client host and a server running different operating systems can successfully exchange data.

Which scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

ACK SYN

Why is NAT not needed in IPv6?

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Which statement describes a characteristic of cloud computing?

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

What is true about the Server Message Block protocol?

Clients establish a long term connection to servers.

What statement illustrates a drawback of the CSMA/CD access method?

Collisions can decrease network performance.

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)

Destination IP addresses in a packet header remains constant along the entire path to a target host. Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

EMI RFI

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

FTP DHCP DNS

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission

HTTP, TCP, IP, Ethernet

What are two features of ARP? (Choose two.)

If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.

What is a service provided by the Flow Label field of the IPv6 header?

It informs network devices to maintain the same path for real-time application packets.

What is a characteristic of a contention-based access method?

It is a nondeterministic method.

What is one advantage of using fiber optic cabling rather than copper cabling?

It is able to carry signals much farther than copper cabling.

What does a client do when it has UDP datagrams to send?

It just sends the datagrams.

What are two services performed by the data link layer of the OSI model? (Choose two.)

It provides media access control and performs error detection. It accepts Layer 3 packets and encapsulates them into frames.

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?

It will send an ARP request for the MAC address of the default gateway.

Which two interfaces will allow access via the VTY lines to configure the router? (Choose two.)

LAN interfaces WAN interfaces

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)

Logical link control is implemented in software. The data link layer uses LLC to communicate with the upper layers of the protocol suite.

What is true concerning physical and logical topologies?

Logical topologies refer to how a network transfers data between devices.

Which address or combination of addresses does a Layer 3 switch use to make forwarding decisions?

MAC and IP addresses

PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?

PC2 will send an ARP reply with its MAC address.

Which type of connector does a network interface card use?

RJ-45

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

SSH

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

Satellite Cellular

Which transport layer feature is used to guarantee session establishment?

TCP 3-way handshake

A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?

The PC was preconfigured to use DHCP.

Which statement is true about the TCP/IP and OSI models?

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

What happens if the first packet of a TFTP transfer is lost?

The TFTP application will retry the request if a reply is not received.

What are two characteristics of RAM on a Cisco device?

The contents of RAM are lost during a power cycle. The configuration that is actively running on the device is stored in RAM.

A technician wishes to transfer a large file from a file server to a remote router. Which statement is correct about this scenario?

The file is segmented and then reassembled in the correct order at the destination, if necessary, by the upper-layer protocol.

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI.

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with other hosts in the other network.

What is the function of the kernel of an operating software?

The kernel provisions hardware resources to meet software requirements.

A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.)

The link between switches will work as full-duplex. The link between the switches will work at the fastest speed that is supported by both switches. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.

Which two statements describe a fixed configuration Ethernet switch? (Choose two.)

The number of ports on the switch cannot be increased. A fixed configuration switch may be stackable.

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

The packet will be sent directly to the destination host.

Why are two strands of fiber used for a single fiber optic connection?

They allow for full-duplex connectivity.

What are two functions of end devices on a network?

They are the interface between humans and the communication network. They originate the data that flows through the network.

Which statement is correct about network protocols?

They define how messages are exchanged between the source and the destination.

How do hosts ensure that their packets are directed to the correct network destination?

They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Use the console port to locally access the switch from a serial or USB interface of the PC.

Which statement describes the use of powerline networking technology?

a device connects to an existing home LAN using an adapter and an existing electrical outlet.

Which expression accurately defines the term bandwidth?

a measure of the data carrying capacity of the media

Which phrase describes an FTP daemon?

a program that is running on an FTP server

What does a client application select for a TCP or UDP source port number?

a random value in the range of the registered ports

Which device performs the function of determining the path that messages should take through internetworks?

a router

Which two TCP header fields are used to confirm receipt of data?

acknowledgment number sequence number

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

application presentation session

If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

application, transport, Internet, and network access layers

How does adding an Ethernet line card affect the form factor of a switch?

by expanding the port density

What security violation would cause the most amount of damage to the life of a home user?

capturing of personal data that leads to identity theft

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

congestion

After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router reboots. What command should be issued?

copy running-config startup-config

A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?

data confidentiality

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

data link

Which address does a NIC use when deciding whether to accept a frame?

destination MAC address

Which IPv4 header field is responsible for defining the priority of the packet?

differentiated services

What process is used to place one message inside another message for transfer from the source to the destination?

encapsulation

What is contained in the trailer of a data-link frame?

error detection

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

fault tolerance

What is a beneficial feature of the UDP transport protocol?

fewer delays in transmission

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

flow control

Which PDU format is used when bits are received from the network medium by the NIC of a host?

frame

Which method of data transfer allows information to be sent and received at the same time?

full duplex

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

if there is connectivity with the destination device

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

implementing a firewall installing antivirus software

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

interference coverage area security

Which two statements describe intermediary devices?

intermediary devices connect individual hosts to the network intermediary devices direct the path of the data.

What command can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

What is the purpose of the preamble in an Ethernet frame?

is used for timing synchronization

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

lacks centralized administration easy to create less cost to implement

Which three commands are used to set up a password for a person who attaches a cable to a new router so that an initial configuration can be performed? (Choose three.)

line console 0 password cisco login

A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

multiplexing

Compared to UDP, what factor causes additional network overhead for TCP communication?

network traffic that is caused by retransmissions

What are proprietary protocols?

protocols developed by organizations who have control over their definition and operation

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

route print netstat -r

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

segment

Which command displays a summary chart of all router interfaces, their IP addresses, and their current operational status?

show ip interface brief

Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)

startup configuration IOS image file

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

switch the packet to the directly connected interface

Which factor determines TCP window size?

the amount of data the destination can process at one time

What is a socket?

the combination of a source IP address and port number or a destination IP address and port number

A technician is manually configuring a computer with the necessary IP parameters to communicate over the corporate network. The computer already has an IP address, a subnet mask, and a DNS server. What else has to be configured for Internet access?

the default gateway address

What type of network must a home user access in order to do online shopping?

the internet

Which characteristic describes the default gateway of a host computer?

the logical address of the router interface on the same network as the host computer

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent?

the next byte that the destination expects to receive

What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)

to identify where the frame starts and ends to distinguish data bits from control bits

What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs

When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?

upper-layer connection-oriented protocols

What type of network traffic requires QoS?

video conferencing

When would a switch record multiple entries for a single switch port in its MAC address table?

when another switch is connected to the switch port

When would the Cisco IOS image held in ROM be used to boot the router?

when the full IOS cannot be found

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

wireless LAN


संबंधित स्टडी सेट्स

Business Ethics ( Corporate Social Responsibility and Individual in business)

View Set

Chapter 36, Reproduction and Development

View Set

History of the Holocaust Final Exam Study Guide part 1 (1st half material)

View Set

PrepU: Chapter 22 Nursing Management of the Postpartum Woman at Risk

View Set

Social Problems, chapter 1, Social Problems, chapter 3, Social Problems, chapter 4, Social Problems, chapter 5, Social Problems, chapter 7, Social Problems, chapter 8, Social Problems, chapter 9, Social Problems, chapter 10, Social Problems, chapter...

View Set

Political Science Exam 2 Study Guide

View Set