Modules 5-11 Chapter Quizzes
AAA Server
What authenticates users to allow access to specific network resources and records what the user does while connected to the resource? AAA Server ACL Port Mirroring VPN
It identifies the routers in the path from a source host to a destination host.
What characterizes a traceroute utility? It utilizes the ICMP Route Redirection messages. It is primarily used to test connectivity between two hosts. It identifies the routers in the path from a source host to a destination host. It sends four Echo Request messages.
Syslog
What gathers a variety of statistics for devices that are configured to send and log status messages? NetFlow NTP SNMP Syslog
It connects multiple networks that are geographically separated.
What is a characteristic of a WAN? It requires a wireless access point to connect users to the network. It spans across a campus or city to enable sharing of regional resources. It connects multiple networks that are geographically separated. It is typically owned and managed by a single home or business.
It encrypts the entire body of the packet for more secure communications.
What is a feature of the TACACS+ protocol? It encrypts the entire body of the packet for more secure communications. It hides passwords during transmission using PAP and sends the rest of the packet in plaintext. It utilizes UDP to provide more efficient packet transfer. It combines authentication and authorization as one process.
connects to remote servers on behalf of clients
What is a function of a proxy firewall? filters IP traffic between bridged interfaces drops or forwards traffic based on packet header information connects to remote servers on behalf of clients uses signatures to detect patterns in network traffic
VPN
What is a private network that is created over a public network? AAA Server ACL Port Mirroring VPN
ACL
What is a series of commands that control whether a device forwards or drops packets based on information found in the packet header? AAA Server ACL Port Mirroring VPN
.com
What is an example of a top-level domain? .com root.cisco.com cisco.com www.cisco.com
IP is properly installed on the host.
What is indicated by a successful ping to the ::1 IPv6 address? All hosts on the local link are available. The host is cabled properly. IP is properly installed on the host. The link-local address is correctly configured. The default gateway address is correctly configured.
An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately.
What is the main difference between the implementation of IDS and IPS devices? An IDS uses signature-based technology to detect malicious packets, whereas an IPS uses profile-based technology. An IDS needs to be deployed together with a firewall device, whereas an IPS can replace a firewall. An IDS can negatively impact the packet flow, whereas an IPS can not. An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately.
segmentation
What is the process of dividing a large data stream into smaller pieces prior to transmission? Sequencing duplexing multiplexing segmentation
to filter the traffic that is moving in and out of the PC
What is the purpose of a personal firewall on a computer? to protect the computer from viruses and malware to increase the speed of the Internet connection to filter the traffic that is moving in and out of the PC to protect the hardware against fire hazard
port mirroring
What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out another interface toward a network analysis device? SNMP port mirroring network tap NetFlow
NetFlow
What provides statistics on packet flows passing through a networking device? NetFlow NTP SNMP Syslog Servers
NTP (Network Time Protocol)
What sets the date and time on network devices? NetFlow NTP SNMP Syslog Servers
STP (Spanning Tree Protocol)
What technology is used to prevent Layer 2 loops? VTP ARP NTP STP
time exceeded
Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded? port unreachable time exceeded protocol unreachable network unreachable
distribution
Which layer of the hierarchical design model is a control boundary between the other layers? core distribution network access
SNMP
Which network service allows administrators to monitor and manage network devices? NetFlow SNMP syslog NTP
SMB (Server Message Block)
What application layer protocol describes the services that are used for file sharing in Microsoft networks? SMB SMTP Telnet DNS DHCP
receive AP's MAC address (BSSID) send client's MAC address to AP receive AP's association identifier (AID)
What are three events that can occur in Step 3 (Association) of the client and AP association process? (Choose three.) receive AP's MAC address (BSSID) send client's MAC address to AP agree with AP to share Open authentication initiate shared key request receive AP's association identifier (AID)
does not require a dedicated end-to-end connection operates independently of the network media
What are two characteristics of IP? (Choose two.) retransmits packets if errors occur does not require a dedicated end-to-end connection re-assembles out of order packets into the correct order at the receiver end guarantees delivery of packets operates independently of the network media
encapsulating PDUs from the transport layer routing packets toward the destination
What are two services provided by the OSI network layer? (Choose two.) encapsulating PDUs from the transport layer routing packets toward the destination placement of frames on the media collision detection performing error detection
Sequence Number
What field is used by the destination host to reassemble segments into the original order? Control Bits Destination Port Sequence Number Source Port Window Size
The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host.
What happens when a sending host senses there is congestion? The receiving host increases the number of bytes it sends before receiving an acknowledgment from the sending host. The receiving host reduces the number of bytes it sends before receiving an acknowledgment from the sending host. The sending host increases the number of bytes it sends before receiving an acknowledgment from the destination host. The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host.
source MAC address
What information does an Ethernet switch examine and use to build its address table? source MAC address source IP address destination IP address destination MAC address
destination MAC address
What information does an Ethernet switch examine and use to forward a frame? source MAC address destination IP address source IP address destination MAC address
determines the path and directs data along the way to its final destination
What is a role of an intermediary device on a network? runs applications that support collaboration for business determines the path and directs data along the way to its final destination forms the interface between the human network and the underlying communication network functions as the primary source of information for end devices
2001:db8:eeff:a::1
What is the correct compressed format of the IPv6 address 2001:0db8:eeff:000a:0000:0000:0000:0001? 2001:db8:eeff:a::0001 2001:db8:eeff:a:::1 2001:db8:eeff:a::1 2001:db8:eeff:a:1
encapsulation
What is the name of the process of adding protocol information to data as it moves down the protocol stack? de-encapsulation sequencing segmentation encapsulation
to request that a source decrease the rate at which it transmits data
What is the purpose of the TCP sliding window? to ensure that segments arrive in order at the destination. to end communication when data transmission is complete. to request that a source decrease the rate at which it transmits data. to inform a source to retransmit data from a specific point forward.
flow control
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? response timeout flow control encapsulation access method
encapsulation
What process involves placing one PDU inside of another PDU? segmentation encoding flow control encapsulation
DAD (Duplicate Address Detection)
What process is used in ICMPv6 for a host to verify that an IPv6 address is unique before configuring it on an interface? SLAAC DAD ARP EUI-64
What type of server would use IMAP? FTP Telnet DNS email DHCP
HTTP
Which application layer protocol uses message types such as GET, PUT, and POST? POP3 SMTP DHCP HTTP DNS
TCP 3-way handshake
Which transport layer feature is used to guarantee session establishment? UDP ACK flag UDP sequence number TCP 3-way handshake TCP port number
Application gateway
Which type of firewall filters information at Layers 3, 4, 5, and 7 of the OSI reference model? Host-based Hybrid Application gateway Packet filtering Stateful
ipconfig /displaydns
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? arp -a nslookup ipconfig /all ipconfig /displaydns
to verify that the TCP/IP stack is operational
A user complains that the workstation cannot access the network. The network technician asks the user to issue the ping 127.0.0.1 command. What is the purpose of using this command? to check that the workstation can reach a DHCP server to verify that the TCP/IP stack is operational to test the reachability of a remote network to verify that the NIC is configured with a static address
0607:1234:aa10:ba01
A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device? ba01 0607:1234:aa10:ba01 2001:0DB8 2001:0DB8:75a3
all hosts in the same network
A host is transmitting a broadcast. Which host or hosts will receive it? a specially defined group of hosts all hosts on the Internet all hosts in the same network the closest neighbor on the same network
traceroute
A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? ipconfig traceroute netstat telnet
traceroute
A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? telnet traceroute ipconfig netstat
the TCP/IP stack on a network host
A technician uses the ping 127.0.0.1 command. What is the technician testing? the TCP/IP stack on a network host connectivity between a PC and the default gateway connectivity between two adjacent Cisco devices connectivity between two PCs on the same network physical connectivity of a particular PC and the network
Layer 3
At what layer of the OSI model do routers operate? Layer 2 Layer 4 Layer 5 Layer 3
transport layer
At which OSI layer is a destination port number added to a PDU during the encapsulation process? network layer application layer transport layer data link layer
It is the criterion that is used to filter traffic.
How is a source IP address used in a standard ACL? It is used to determine the default gateway of the router that has the ACL applied. It is the address to be used by a router to determine the best path to forward packets. It is the address that is unknown, so the ACL must be placed on the interface closest to the source address. It is the criterion that is used to filter traffic.
DMZ
Refer to the exhibit. The network "A" contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as "A"? DMZ untrusted network perimeter security boundary internal network
Port Mirroring
What allows a switch to make duplicate copies of traffic passing through it, and then send it out a port with a network monitor attached? AAA Server ACL Port Mirroring VPN
SNMP (Simple Network Management Protocol)
Which option allows administrators to monitor and manage network devices? NetFlow NTP SNMP Syslog Servers
IPsec
Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN? MD5 AES ESP IPsec
It is a cloud-based security service to scan traffic for malware and policy enforcement.
Which statement describes the Cisco Cloud Web Security? It is an advanced firewall solution to guard web servers against security threats. It is a cloud-based security service to scan traffic for malware and policy enforcement. It is a security appliance that provides an all-in-one solution for securing and controlling web traffic. It is a secure web server specifically designed for cloud computing.
threat intelligence
Which technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats? threat intelligence network admission control website filtering and block listing network profiling
interface identifier connection type
Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.) cable type and identifier interface identifier connection type cable specification device type OS/IOS version
Transparent
Which type of firewall filters IP traffic between a pair of bridged interfaces? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent
inside global
In NAT translation for internal hosts, what address would be used by external users to reach internal hosts? outside local inside global outside global inside local
a home router
On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network? a home router a dedicated file server a DNS server an ISP DHCP server
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? It is the IP address of the ISP network device located in the cloud. It is the IP address of the Router1 interface that connects the company to the Internet. It is the IP address of Switch1 that connects PC1 to other devices on the same LAN. It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
203.0.113.5
Refer to the exhibit. NAT is configured on Remote and Main. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between Main and the web server? 192.0.2.1 10.130.5.76 172.16.1.10 203.0.113.5 209.165.200.226 209.165.200.245
The UDP destination port number identifies the application or service on the server which will handle the data. The source port field identifies the running application or service that will handle data returning to the PC. UDP segments are encapsulated within IP packets for transport across the network.
Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The UDP destination port number identifies the application or service on the server which will handle the data. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. The source port field identifies the running application or service that will handle data returning to the PC. The TCP source port number identifies the sending host on the network. TCP is the preferred protocol when a function requires lower network overhead. UDP segments are encapsulated within IP packets for transport across the network.
the next byte that the destination expects to receive
During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent? the last sequence number that was sent by the source one number more than the sequence number the next byte that the destination expects to receive the total number of bytes that have been received
passive mode
For which discovery mode will an AP generate the most traffic on a WLAN? passive mode active mode open mode mixed mode
Each VLAN must have a different network number.
How are IP addressing designs affected by VLAN implementations? Each VLAN must have a different network number. VLANs do not support VLSM. Each VLAN must have a different subnet mask. VLANs do not use a broadcast address.
BYOD provides flexibility in where and how users can access network resources.
How does BYOD change the way in which businesses implement networks? BYOD provides flexibility in where and how users can access network resources. BYOD requires organizations to purchase laptops rather than desktops. BYOD devices are more expensive than devices that are purchased by an organization. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
to convert information to the appropriate form for transmission
In computer communication, what is the purpose of message encoding? to negotiate correct timing for successful communication to interpret information to break large messages into smaller frames to convert information to the appropriate form for transmission
listen for beacon frames to find WLAN SSIDs (passive mode) send a probe request to the AP with or without a known SSID (active mode)
What are two events that can occur in Step 1 (Discovery) of the client and AP association process? (Choose two.) agree with AP to share Open authentication send client's MAC address to AP listen for beacon frames to find WLAN SSIDs (passive mode) send a probe request to the AP with or without a known SSID (active mode)
agree with AP to share Open authentication initiate shared key authentication process
What are two events that can occur in Step 2 (Authentication) of the client and AP association process? (Choose two.) send client's MAC address to AP agree with AP to share Open authentication receive AP's MAC address (BSSID) initiate shared key authentication process
identifying the proper application for each communication stream tracking the individual communication between applications on the source and destination hosts
What are two roles of the transport layer in data communication on a network? (Choose two.) performing a cyclic redundancy check on the frame for errors providing the interface between applications and the underlying network over which messages are transmitted identifying the proper application for each communication stream providing frame delimiting to identify bits making up a frame tracking the individual communication between applications on the source and destination hosts
Window Size
What field is used to provide flow control? Control Bits Destination Port Sequence Number Source Port Window Size
when the value of the Hop Limit field reaches zero
A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet? when the router receives an ICMP time exceeded message when the target host responds with an ICMP echo reply message when the value of the Hop Limit field reaches 255 when the value of the Hop Limit field reaches zero
network unreachable
A user issues a ping 192.168.219.8 command and receives a response that includes a code of 0. What does this code represent? protocol unreachable network unreachable host unreachable port unreachable
port unreachable
A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 3. What does this code represent? port unreachable host unreachable network unreachable protocol unreachable
Ethernet, IP, TCP, HTTP
A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? Ethernet, IP, TCP, HTTP HTTP, TCP, IP, Ethernet Ethernet, TCP, IP, HTTP HTTP, Ethernet, IP, TCP
They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.
How do hosts ensure that their packets are directed to the correct network destination? They always direct their packets to the default gateway, which will be responsible for the packet delivery. They search in their own local routing table for a route to the network destination address and pass this information to the default gateway. They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route. They send a query packet to the default gateway asking for the best route.
30
How many usable IP addresses are available on the 192.168.1.0/27 network? 62 30 16 32 254 256
The part of the FTP message that was lost is re-sent.
What happens if part of an FTP message is not delivered to the destination? The FTP source host sends a query to the destination host. The message is lost because FTP does not use a reliable delivery method. The part of the FTP message that was lost is re-sent. The entire FTP message is re-sent.
The DDNS provider detects a change to the client IP address and immediately updates the mapping change. DDNS (Dynamic DNS)
What is a benefit of using DDNS? DDNS has a service called ICANN Lookup used to obtain the registration record of a URL. DDNS is a more secure version of DNS and has a robust security profile. DDNS is a starting point for identifying potentially dangerous internet locations that may have been reached through the network. The DDNS provider detects a change to the client IP address and immediately updates the mapping change.
There can be many ports open simultaneously on a server, one for each active server application.
What is a characteristic of a TCP server process? There can be many ports open simultaneously on a server, one for each active server application. Every application process running on the server has to be configured to use a dynamic port number. A host running two different applications can have both configured to use the same server port. An individual server can have two services assigned to the same port number within the same transport layer services.
segment
What is the PDU associated with the transport layer? segment packet bits frame
to display the host routing table
What is the command netstat -r used for? to release the assigned IP address to renew the default gateway to display the host routing table to display the TCP sockets
The IPv4 network address of 10.128.16.0 255.255.240.0
What is the result of a logical AND operation of: 10.128.17.4 255.255.240.0? The IPv4 network address of 10.128.0.0 255.255.240.0 The IPv4 network address of 10.128.16.0 255.255.240.0 The IPv4 network address of 10.128.17.0 255.255.240.0 The IPv4 network address of 10.128.17.4 255.255.240.0
neighbor solicitation
What message is sent by a host to check the uniqueness of an IPv6 address before using that address? ARP request neighbor solicitation echo request router solicitation
Layer 2
Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments? Layer 3 Layer 2 Layer 7 Layer 4
application
Which OSI model layer contains protocols for process-to-process communication? transport application network session
WLC (Wireless LAN Controller)
Which device can control and manage a large number of corporate APs? WLC LWAP switch router
wireless access point (WAP)
Which device connects wireless clients to the network? switch router wireless access point (WAP) end device
end devices
Which device must connect to another device to gain access to the network? end devices wireless access point switch router
switch
Which device uses MAC addresses to determine the exit port? switch router end device wireless LAN Controller
It communicates with upper protocol layers.
Which function or operation is performed by the LLC sublayer? It adds a header and trailer to a packet to form an OSI Layer 2 PDU. It performs data encapsulation. It is responsible for media access control. It communicates with upper protocol layers.
Distribution layer
Which layer aggregates traffic and provides connectivity to services? Access layer Core layer Distribution layer Hierarchical layer
DHCPREQUEST
Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server? DHCPDISCOVER DHCPACK DHCPOFFER DHCPREQUEST
ZPF (Zone-Based Policy Firewalls)
Which network design groups interfaces into zones with similar functions or features? layered private self-zone ZPF
Core layer
Which network design layer provides connectivity between distribution layers for large LAN environments? Access layer Core layer Distribution layer Hierarchical layer
Access layer
Which network design layer provides endpoints and users with a connection to the network? Access layer Core layer Distribution layer Hierarchical layer
SSID
Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured? SSID BESS ESS ad hoc
67 DHCP
Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.) 67 DHCP 80 53 DNS SMB
POP3
Which protocol enables mail to be downloaded from an email server to a client and then deletes the email from the server? POP3 IMAP SMTP HTTP
ICMP (Internet Control Message Protocol)
Which protocol is used by ping to test connectivity between network hosts? ICMP TCP ARP DHCP
data link
Which protocol stack layer encapsulates data into frames? data link transport network application
ICMPv6
Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host? ARPv6 DHCPv6 ICMPv6 UDP
An SVI is needed for each VLAN
Which sentence correctly describes the SVI inter-VLAN routing method? A physical interface is needed for every VLAN that is created. The encapsulation type must be configured on the SVI. An SVI is needed for each VLAN. Subinterfaces have to be created.
Segments are sent from the transport layer to the internet layer.
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network? Frames are sent from the network access layer to the internet layer. Data is sent from the internet layer to the network access layer. Packets are sent from the network access layer to the transport layer. Segments are sent from the transport layer to the internet layer.
An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client.
Which statement best describes the operation of the File Transfer Protocol? An FTP client uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP Server. An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client. An FTP client uses a source port number of 20 and a randomly generated destination port number during the establishment of data traffic with an FTP Server. An FTP server uses a source port number of 20 and a randomly generated destination port number during the establishment of control traffic with an FTP client.
It is a physical address assigned to an Ethernet NIC by the manufacturer.
Which statement describes a MAC address? It is a physical address assigned to an Ethernet NIC by the manufacturer. It contains two portions, the network portion and the host portion. It is 128-bits in length. It identifies the source and destination addresses of hosts on the Internet.
Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.
Which statement describes a characteristic of cloud computing? Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world. A business can connect directly to the Internet without the use of an ISP. Devices can connect to the Internet through existing electrical wiring. Investment in new infrastructure is required in order to access the cloud.
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
Which statement is true about the TCP/IP and OSI models? The TCP/IP transport layer and OSI Layer 4 provide similar services and functions. The OSI Layer 7 and the TCP/IP application layer provide identical functions. The first three OSI layers describe general services that are also provided by the TCP/IP internet layer. The TCP/IP network access layer has similar functions to the OSI network layer.
192.168.5.5 172.16.4.4 10.1.1.1
Which three IP addresses are private ? (Choose three.) 172.32.5.2 192.168.5.5 192.167.10.10 224.6.6.6 172.16.4.4 10.1.1.1
Nmap
Which tool is used to provide a list of open ports on network devices? Nmap Ping Whois Tracert
It uses the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) access control method. It is supported by IEEE 802.3 standards.
Which two characteristics describe Ethernet technology? (Choose two.) It is supported by IEEE 802.5 standards. It typically uses an average of 16 Mb/s for data transfer rates. It uses the CSMA/CD access control method. It is supported by IEEE 802.3 standards. It uses a ring topology.
window sequence number
Which two fields are included in the TCP header but not in the UDP header? (Choose two.) window source port sequence number checksum destination port
ACK SYN
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) PSH ACK SYN FIN RST URG
RIP EIGRP
Which two protocols are considered distance vector routing protocols? (Choose two.) ISIS RIP EIGRP BGP OSPF
Ethernet switch access point
Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.) repeater Ethernet switch WLAN controller access point RADIUS authentication server
VoIP DNS
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two) POP3 FTP HTTP VoIP DNS
Host-based
Which type of firewall is a PC or server with firewall software running on it? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent
Hybrid
Which type of firewall is a combination of various firewall types? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent
Packet filtering
Which type of firewall is part of a router firewall, permitting or denying traffic based on Layer 3 and Layer 4 information? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent
https://www.ourblogs.info/
Which website is considered secure because it encrypts the communication between the website and visitors? http://www.thebanks.com/ ftp://download.openproject.net/ https://www.ourblogs.info/ http://www.secureaccess.com:8080/
channel settings
Which wireless parameter refers to the frequency bands used to transmit data to a wireless access point? scanning mode channel settings security mode SSID
to identify the network address of the destination network
Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask? to identify the broadcast address of the destination network to identify the host address of the destination host to identify the network address of the destination network to identify faulty frames
to display a list of the near-side router interfaces between the source device and the destination device
Why would a manager need to use the tracert command? to display a list of the near-side router interfaces between the source device and the destination device to quickly verify connectivity by sending echo-request messages to the destination and receiving a series of echo-reply messages from that destination to display a list of current processes running on a local or a remote computer to query the Domain Name System (DNS) to get domain names and mapping information