ITN Practice Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A nibble consists of _________ bits. a. 4 b. 4 hexadecimal c. 8 d. 8 hexadecimal

a

A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? a. dsl b.dial-up c. satellite d. cell modem e. cable modem

a

A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks? a. 192.168.99.0/26 AND 192.168.99.64/27 b. 192.168.99.0/27 AND 192.168.99.32/26 c. 192.168.99.0/27 AND 192.168.99.32/28 d. 192.168.99.0/28 AND 192.168.99.16/28 e. 192.168.99.0/28 AND 192.168.99.64/26

a

What information does the loopback test provie? a. The TCP/IP stack on the device is working correctly b. The device has end-to-end connectivity c. DHCP is working correctly d. The device has the correct IP address on the network

a

What is the function of CSMA/CA in a WLAN? a. It provides the mechanism for media access. b. It describes the smallest building block of the WLAN. c. It assures that clients are connected to the correct WLAN. d. It allows a host to move between cells without loss of signal.

a

Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details? a. Request for Comments b. IRTF research papers c. protocol models d. IEEE standards

a

Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access? a. line b. router c. global d. interface e. privileged EXEC

a

Which subnet would include the address 192.168.1.96 as a usable host address? a. 192.168.1.64/26 b. 192.168.1.32/27 c. 192.168.1.32/28 d. 192.168.1.64/29

a

For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.) a. It can rapidly adapt to the loss of data transmission facilities. b. It efficiently utilizes the network infrastructure to transfer data. c. Data packets can travel multiple paths through the network simultaneously. d. It allows for billing of network use by the amount of time a connection is established. e. It requires that a data circuit between the source and destination be established before data can be transferred.

a,b,c

Which two statements describe the characteristics of fiber-optic cabling? (Choose two.) a. Fiber-optic cabling does not conduct electricity. b. Fiber-optic cabling has high signal loss. c. Fiber-optic cabling is primarily used as backbone cabling. d. Multimode fiber-optic cabling carries signals from multiple sending devices. e. Fiber-optic cabling uses LEDs for single-mode cab​les and laser technology for multimode cables.

a,c

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) a. greater distances per cable run b. lower installation cost c. limited susceptibility to EMI/RFI d. durable connections e. greater bandwidth potential f. easily terminated

a,c,e

A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) a. regenerating data signals b. acting as a client or a server c. providing a channel over which messages travel d. applying security settings to control the flow of data e. notifying other devices when errors occur f. serving as the source or destination of the messages

a,d,e

What are the two main components of Cisco Express Forwarding (CEF)? (Choose two.) a. adjacency tables b. MAC-address tables c. routing tables d. ARP tables e. forwarding information base (FIB)

a,e

A network administrator enters the service password encryption command into the configuration mode of a router. what does this command accomplish? a. Encrypts password as they are transmitted across serial WAN links b. The command prevents someone from viewing the running configuration passwords c. The command enables a strong encryption algorithm for the "Enable Secret Password" command d. The command automatically encrypts passwords in configuration files that are currently stored in NVRAM e. The command provides an exclusive encrypted password for external service persomel who are required to do router maintenance

b

A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix? a. 3 b. 4 c. 6 d. 8 e. 14 f. 16

b

An administrator is testing connectivity to a remote device with the ip address 10.1.1.1. Pinging 10.1.1.1 gets a 0% success rate. What does this indicate? a. Connectivity to the remote device was successful b. A router along the path did not have a route to the destination c. A ping packet is being blocked by a security device along the path d. The connection timed out while waiting for a reply from the remote device

b

To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged? a. The command should have been copy startup-config tftp. b. The configuration should have been copied to the running configuration instead. c. The configuration changes were copied into RAM and require a reboot to take effect. d. A TFTP server can only be used to restore the Cisco IOS, not the router configuration.

b

Using VLSM, what is the largest and smallest subnet mask required on this network, including the links between routers, in order to minimize address waste? ________________________________________ Site 1: 100 Hosts Site2: 500 Hosts | Site3:25 Hosts Site4:50 Hosts ________________________________________ a. 255.255.254.0 and 255.255.255.224 b. 255.255.254.0 and 255.255.255.252 c. 255.255.255.128 and 255.255.255.224 d. 255.255.255.0 and 255.255.255.252

b

Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity? a. indicates the point of failure in the connection b. shows the IP address of the next hop router for each route c. lists the IP addresses of all hops the traffic will pass through to reach the destination network d. shows the incoming and outgoing interfaces the traffic will go through in order to reach the destination network

b

What are two actions performed by a Cisco switch? (Choose two.) a. building a routing table that is based on the first IP address in the frame header b. using the source MAC addresses of frames to build and maintain a MAC address table c. forwarding frames with unknown destination IP addresses to the default gateway d. utilizing the MAC address table to forward frames via the destination MAC address e. examining the destination MAC address to add new entries to the MAC address table

b,d

What are the three parts of an IPv6 global unicast address? Choose three) a. broadcast address b. Global routing prefix c. Subnet mask d. Subnet ID e. Interface ID

b,d,e

A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 192.168.25.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. The administrator knows immediately that this IP will not work. Why? a. This is a loopback address. b. This is a link-local address. c. This is a private IP address. d. There is an IP address conflict.

c

A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode? a. enable password letmein b. enable secret secretin c. (config-line)#password lineconin (for console 0) d. (config-line)#password linevtyin (for vty 0 15)

c

A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the AUX port on the router, then configures HyperTerminl as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem? a. Connect to the Ethernet port on the PC b. Change the connection settings to even parity c. Move the cable to the router console port d. Use crossover cable instead of rollover

c

A router boots and enters startup mode. What is the reason for this? a. The IOS image is corrupt b. Cisco IOS is missing from flash memory c. The configuration file is missing from NVRAM d. The POST process has detected hardware failure

c

An administrator need to upgrade the IOS in a router to a version that supports new features. Which factors should the administrator consider before performing the upgrade? a. The Old IOS must be removed first b. NVRAM must be erased before the new IOS can be installed c. The new IOS might require more RAM to funcrion properly d. The old IOS should be backed up to NVRAM so that it is not lost during a power failure

c

Consider the following range of addresses: 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: ... 2001:0DB8:BC15:00AF:0000:: The prefix-length for the range of addresses is _____ a. /56 b. /52 c. /60 d. /64

c

The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create? a. 1024 b. 2048 c. 4096 d. 8192 e. 65536

c

What is the purpose of ICMP messages? a. to inform routers about network topology changes b. to ensure the delivery of an IP packet c. to provide feedback of IP packet transmissions d. to monitor the process of a domain name to IP address resolution

c

Which IPv6 address notation is valid? a. 2001:0DB8::ABCD::1234 b. ABCD:160D::4GAB:FFAB c. 2001:DB8:0:1111::200 d. 2001::ABCD::

c

Which devices should be secured to mitigate against MAC address spoofing attacks? a. Layer 7 devices b. Layer 4 devices c. Layer 2 devices d. Layer 3 devices

c

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.) a. The Header Checksum field name from IPv4 is kept in IPv6. b. The Destination Address field is new in IPv6. c. The Source Address field name from IPv4 is kept in IPv6. d. The Version field from IPv4 is not kept in IPv6. e. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

c,e

A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information? a. DHCPDISCOVER b. DHCPOFFER c. DHCPREQUEST d. DHCPACK e. DHCPNACK

d

A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose? a. dsl b.dial-up c. satellite d. leased line e. cable modem

d

A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says "This connection has limited or no connectivity." The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem? a. The workstation NIC has malfunctioned. b. The subnet mask was configured incorrectly. c. The DNS server IP address needs to be configured. d. The workstation is unable to obtain an IP address from a DHCP server.

d

What is one purpose of the TCP three-way handshake? a. sending echo requests from the source to the destination host to establish the presence of the destination b. determining the IP address of the destination host in preparation for data transfer c. requesting the destination to transfer a binary file to the source d. synchronizing sequence numbers between source and destination in preparation for data transfer

d

What is the effect of setting the security mode to WEP on the Linksys integrated router? a. It identifies the wireless LAN. b. It allows the access point to inform clients of its presence. c. It translates IP addresses into easy-to-remember domain names. d. It encrypts data between the wireless client and the access point. e. It translates an internal address or group of addresses into an outside, public address.

d

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? a. It initiates an ARP request. b.It broadcasts the frame out of all ports on the switch. c. It notifies the sending host that the frame cannot be delivered. d.It forwards the frame out of all ports except for the port at which the frame was received.

d

What will be the result of entering these configuration commands the next time a network administrator connects a console cable to the router and no additional commands have been entered? _______________________________________ #config t (config)#enable password Cisco123 (config)#enable secret Ciscow234 (config)#service password-encryption (config)#line con 0 (config-line)#password Cisco789 (config-line)#end #copy running-config startup-config #reload ________________________________________ a. The administrator will be required to enter Cisco123. b. The administrator will be required to enter Cisco234. c. The administrator will be required to enter Cisco789. d. The administrator will be presented with the R1> prompt.

d

Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode? ​ a. no shut b. disable switchport c. enable layer3 d. no switchport

d

Which service will translate private internal IP addresses into Internet routable public IP addresses? a. ARP b. DHCP c. DNS d. NAT

d

Why are the paired wires twisted in a CAT5 cable? a. to facilitate cable termination in the connector b. to extend the signaling length c. to improve the mechanical strength d. to provide eletromagnetic noise cancellation

d

Wireless security mode: WEP What is the effect of setting the security mode to WEP on the Linksys integrated router? a. It identifies the wireless LAN b. It allows the access point to inform clients of its presence c. It translates IP addresses into easy-to-remember domain names d. It encrypts data between the wireless client and the access point e. It translates an internal address or group of addresses into an outside, public address.

d

Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.) a. email b. file transfer c. instant messaging d. video e. voice

d,e


संबंधित स्टडी सेट्स

Health midterm true/ false section

View Set

Anatomy Lab Mastering Questions Test #2 Muscular System Gross Anatomy 1+2

View Set

Business Ethics | Chapter 11 quiz

View Set

Korean War - The First Event of the Cold War

View Set