Networking Basics FINAL TEST

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?

directly connected route

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

easy to create. less cost to implement. Because network devices and dedicated servers are not required, peer-to-peer networks are easy to create, less complex, and have lower costs. Peer-to-peer networks also have no centralized administration. They are less secure, not scalable, and those devices acting as both client and server may perform slower.

What process involves placing one message format inside of another message format?

encapsulation

What layer is responsible for routing messages through an internetwork in the TCP/IP model?

internet

What is a disadvantage of deploying a peer-to-peer network model?

lack of centralized administration

Which command would a technician use to display network connections on a host computer?

netstat The netstat command is a network utility that can be used to display active TCP connections that are open and running on a networked host.

At which layer of the OSI model would a logical address be added during encapsulation?

network layer

Which type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work?

reference model. There are two common types of network communication models: Protocol model - This model closely matches the structure of a particular protocol suite and describes the functions that occur at each layer of protocols within the suite. The TCP/IP model is an example of a protocol model. Reference model - The primary purpose is to aid in a clearer understanding of the functions and processes necessary for network communications.This type of model does not specify exactly how a function should be accomplished. The OSI model is an example of a reference model.

Which scenario is suitable for deploying twisted-pair cables?

to connect PC workstations in an office

An employee is having connectivity issues. Why might a network technician try to ping the default gateway from the employee laptop?

to verify connectivity with the device that provides access to remote networks

A technician is troubleshooting a network connectivity problem. Pings to the local wireless router are successful but pings to a server on the Internet are unsuccessful. Which CLI command could assist the technician to find the location of the networking problem?

tracert

A network administrator has a multi-floor LAN to monitor and maintain. Through careful monitoring, the administrator has noticed a large amount of broadcast traffic slowing the network. Which device would you use to best solve this problem?

router

What information does an Ethernet switch examine and use to build its address table?

source MAC address

What information is added to the switch table from incoming frames?

source MAC address and incoming port number

When analog voice signals are converted for use on a computer network, in what format are they encapsulated?

When Voice over iP (VoIP) is being used, analog voice signals are translated into digital data in the form of IP packets. This translation allows the phone call to be carried through a computer network.

Which two criteria are used to help select a network medium for a network? (Choose two.)

the environment where the selected medium is to be installed. the distance the selected medium can successfully carry a signal

A traveling sales representative uses a cell phone to interact with the home office and customers, track samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet connectivity method would be a preferred method to use on the mobile device due to the low cost?

Wi-Fi

Which wireless RF band do IEEE 802.11b/g devices use?

2.4 GHz

Which number grouping is a valid IPv6 address?

2001:0db8:3c55:0015:1010:0000:abcd:ff13 An IPv6 address is made up of 128 bits represented in hexadecimal numbers.There are two rules that help reduce the number of digits needed to represent an IPv6 address. Rule 1 - Omit leading zeros in any 16-bit section. Rule 2 - Replace any single group of consecutive zeros with a double colon (::). This can only be used once within an IPv6 address.

How many bits are in an IPv4 address?

32

Which statement describes the use of powerline networking technology?

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

What are two characteristics of multicast transmission? (Choose two.)

A single packet can be sent to a group of hosts. Multicast transmission can be used by routers to exchange routing information.

A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)?(Choose two.)

A wireless router will perform Network Address Translation (NAT) whenever a private (local) source IPv4 address is translated to a public (global) address.

Which type of device provides an Internet connection through the use of a phone jack?

DSL modem

term

Domain Name System- A user requests a website by typing in its name. Email- A service that allows workers to send messages to each other over the Internet. File transfer - A user uploads new files to his or her website. Dynamic Host Configuration- A workstation gets its IP address automatically. Web service- A user types in a URL and a page loads in the client browser. SSH- A network technician accesses a network device securely from a remote site.

A tourist is traveling through the countryside and needs to connect to the internet from a laptop. However, the laptop only has Wi-Fi and Ethernet connections. The tourist has a smartphone with 3G/4G connectivity. What can the tourist do to allow the laptop to connect to the internet?

Enable tethering and create a hotspot.

A cable installation company is trying to convince a customer to use fiber-optic cabling instead of copper cables for a particular job. What is one advantage of using fiber-optic cabling compared to copper cabling?

Fiber-optic cabling is completely immune to EMI and RFI.

What will a Cisco LAN switch do if it receives an incoming frame and the destination MAC address is not listed in the MAC address table?

Forward the frame out all ports except the port where the frame is received.

What benefit does DHCP provide to a network?

Hosts can connect to the network and get an IP address without manual configuration.

How are port numbers used in the TCP/IP encapsulation process?

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

Input the authentication password. Enter the network SSID. Choose the correct security type.

When a host sends a packet, how does it determine if the destination of the packet is on the same local network or on a remote network?

It uses the subnet mask to compare the source and destination IP address.

What are two methods typically used on a mobile device to provide internet connectivity? (Choose two.)

cellular. Wi-Fi

Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

Security rules are applied to the default gateway device, preventing it from processing ping requests.

A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.)

The target web server is down.. A ping would fail if the destination device was not operational. It would also fail if the DNS server was unavailable to convert the URL to an IP address. The fact that a computer had a static IP address is not a factor. Even if the target protocol (HTTP) is not functioning, the server would still respond to a ping.

A user is setting up a home wireless network. A global address is to be used in NAT translations for traffic flowing through the wireless router. How is this global address assigned?

The wireless router will act as a DHCP client in order to receive global addressing from the ISP.


संबंधित स्टडी सेट्स

新概念1-9 How are you today?(句子)

View Set

1. Pelvis Anatomy (add uterine and ovarian sizes; ratio sizes)

View Set

PSYC439 Cognitive Psychology Midterm Study Guide

View Set

Descriptive Analysis/ Historical-Contextual Analysis/ Situational Analysis

View Set

Building Construction Final (ch. 8-12)

View Set

PSYC 305 cengage practice quizzes ch 1-3

View Set

Management Test 3 (Quiz Questions)

View Set

general insurance review question quiz

View Set

Skeletal muscle functions and structure

View Set

Chapter 6: Transcription and Translation

View Set