Networking Essentials Practice Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the role of an intermediary device on a network?

Determines the path and directs data along the way to the final destination

When a wireless router is being configured for the first time, what type of wired connection is used?

Ethernet patch cable

What is a function of DNS server?

It determines the IP address that is associated with a specific host domain name

What us required for a network administrator to perform out-of-band management on a Cisco device?

A computer directly connected to the console port of the device

Which is an example of social engineering?

An unidentified person claiming to be technician collecting user information from employees

What is the reason that electronic data is represented as bits in computer processing and data communication?

Bits are more efficient for storing data

A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?

Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF

Which term is used to describe a network device that relies on another device to obtain information?

Client

What is the default subnet mask for an IP address of 198.133.219.4?

255.255.255.0

Which two devices are shared peripherals?

-Scanner -Printer

Which term is used to describe transport layer ports in the range of 1 through 1023?

Well-known

What are two options for expanding storage space on a Cisco router?

-Flash slots -USB ports

Which number grouping is a valid IPv6 address?

2001:0db8:3c55:0015:1010:0000:abcd:ff13

What is indicated by the 100 in the 100BASE-T standard?

Megabits per second

If the default gateway is configured incorrectly on a host, what is the impact on communications?

The host is unable to communicate with hosts on remote networks

When is a straight-through cable in a network?

When connecting a host to a switch

Which type of network is covered by the IEEE 802.11 standards?

Wifi

Open PT activity. What is the phrase displayed on the web page?

Your configuration is correct

Which utility can e used to view a list of open TCP connections on Linux or Windows systems?

Netstat

Refer to the exhibit. The command output is from a wireless DHCP host connected to the Linksys integrated router. What can be determined from the output?

The DHCP configuration needs to be checked

Which organization publishes and manages the Request for Comments (RFC) documents?

IETF

When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?

Logical topology diagram

Match the term to the Category.

-Authentication: EAP, open, pre-shared keys -Encryption: WEP, WPA

Match the protocol with the function.

-DHCP: automatically configures hosts with IP address -SSH: retrieves email messages by clients -DNS: resolves Internet names tow IP addresses

A user calls the help desk to report a work station problem. Which three questions would produce the most helpful information for troubleshooting?

-If you received an error message, what was it? -What operating system version is running on your workstation? -What changes have you made in your workstation?

When a Cisco device is powered on, the ___ begins to test the device and determine if it is functioning properly.

POST

Which type of network component can be used to share an attached printer to the network?

Personal computer

Which command can be used to verify connectivity between two host devices?

Ping

Which protocol operates at the transport layer of the TCP/IP model and ensures reliable delivery of IP packets?

TCP

Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?

Trojan horse

A file is downloaded from the internet. After the user opens the downloaded files, the hard drive crashes and all information on the computer is lost. What type of attack occurred?

Virus

What are two benefits of wireless networks over wired networks?

-Mobility -Anytime, anywhere connectivity

What are three characteristics of multicast transmission?

-Multicast transmission can be used by routers to exchange routing information -Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255 -A single packet can be sent to a group of hosts

Match the type of attack with the description.

-Vishing: the attacker uses voicemail to persuade a victim to call a legitimate looking telephone number -Pretexting: the attacker uses invented scenarios to gain the trust of victim -Phising: the attacker pretends to represent a legitimate outside organization

Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be useful in determining where the problem is?

Nslookup


संबंधित स्टडी सेट्स

OB Unit 1 Test (Chapter 1, 3, 4)

View Set

crónica de una muerte anunciada

View Set

Physics Light and Color Test: Multiple Choice

View Set