Network essentials final
A workstation connected to an Ethernet switch port is experiencing connectivity problems. The network technician chooses to use the bottom-up troubleshooting method to identify the issue. What are two possible causes of physical layer network problems that the technician should check? (Choose two.)
1.Cables plugged into the wrong port 2. improperly terminated cables
Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network?
1.Enter the network SSID. 2.Choose the correct security type. 3.Input the authentication password.
Which three IPv4 header fields have no equivalent in an IPv6 header?
1.Flag 2.Identification 3.Fragment Offset
A PC has sent an RS message to an IPv6 router attached to the same network. Which two pieces of information will the router send to the client? (Choose two.)
1.Prefix Length 2.Prefix
1. Intended for a specific organization or entity, such as government 2.made up of 2 or more distinct cloud infrastructures bound together by technology 3.services made for the general public 4.intneded for exclusive use by multiple organizations with shared functional needs
1.Private Cloud 2.Hybrid Cloud 3.Public Cloud 4.Community
Which three best practices can help defend against social engineering attacks?
1.Resist the urge to click on enticing web links 2.Educate employees regarding policies 3.Do not provide password resets in a chat window
What are two characteristics of RAM on a Cisco device?
1.The configuration that is actively running on the device is stored in RAM 2.The contents of RAM are lost during a power cycle.
Which two criteria are used to help select a network medium for a network?
1.the distance the selected medium can successfully carry a signal 2.the environment where the selected medium is to be installed
PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet?
192.168.20.3 port 53
A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?
FF-FF-FF-FF-FF-FF and 255.255.255.255
What application protocol is used to transfer files between systems?
FTP
What layer is responsible for routing messages through an internetwork in the TCP/IP model?
Internet
Which troubleshooting tool can be used to determine the current TCP open connections on a PC?
Netstat
An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?
R1
What type of attack targets an SQL database using the input field of a user?
SQL injection
Host A wants to send a packet to host D. Before sending the packet; host A needs to find out if host D is on the same local network. How does the source host find out if it has the same network portion as the destination host?
a binary anding between the R1 default gateway IP address and the R2 default gateway IP address
A network technician is troubleshooting a Windows PC and notices its ARP cache contains invalid entries. What command would clear the ARP table on the PC?
arp -d
An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?
bluesnarfing
How can certain malicious attacks be prevented through the use of ISN numbers by TCP?
by ensuring all the ISN numbers start with 0 for the first segment
Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network? (Choose two.)
destination IP address subnet mask
A manager is driving to a business meeting but needs to connect on a Zoom call along the way. What internet connection is the manager likely to use for the Zoom call?
satellite
Which type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work?
reference model
What are two potential network problems that can result from ARP operation?
1. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. 2. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
1. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6. 2. The Source Address field name from IPv4 is kept in IPv6.
Which three statements describe the functions of the Cisco hierarchical network design model?
1. The goal of the core layer is maximizing throughput 2. The distribution layer is responsible for traffic filtering and isolating failures from the core 3. The access layer provides a means of connecting end devices to the network
A web designer calls to report that the web server web-s1.cisco.com is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)
1. The web server at 192.168.0.10 is reachable from the source host. 2.DNS cannot resolve the IP address for the server web-s1.cisco.com.
Which wireless RF band do IEEE 802.11b/g devices use?
2.4GHz
What is the key difference between a type 1 hypervisor and a type 2 hypervisor?
A type 1 hypervisor runs directly on the system hardware and a type 2 hypervisor requires a host OS to run.
What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?
Directly connected route
A cybercriminal sends a series of maliciously formatted packets to a database server, which causes the server to crash. What do you call this type of attack?
DoS
Match field names to the IP header where they would be found. (Not all options are used.) Flag Total Length Traffic Class Flow Label
IPV4- Flag, Total Length IPV6-Traffic Class, Flow Label
How are port numbers used in the TCP/IP encapsulation process?
If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.
Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B?
Source-af:3c:dc:4c:55:66 Dest-a0:4c:5f:21:33:77 Soruce-172.16.1.10 Dest-172.16.2.10
Which benefit of virtualization extends the life of OSs and applications to give organizations more time to migrate to newer solutions?
increase sever uptime
A ping to PC2 is issued from PC0, PC1, and PC3 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?
just PC0 and PC1 MAC addresses
A user is watching an on-demand movie. However, the movie keeps pausing and displaying "buffering" messages. What could be the cause of this disruption?
live video streaming uses UDP protocol which results in unreliable delivery
Which scenario is suitable for deploying twisted-pair cables?
to connect PC workstations in an office
