Networking Essentials Study Guide
A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host? Subnet mask: 255.255.0.0 Default gateway: 128.107.255.254
128.107.255.1
Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?
Encryption
What is a purpose of an IP address?
It identifies the source and destination of data packets.
Which type of device filtering can be enabled on some wireless access points or wireless routers?
MAC Address Filtering
What advantage does SSH offer over Telnet?
More secure method for server access. Provides secure remote login & other secure network services as well as provide stronger authentication.
A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?
NFC
Which three attacks exploit human behavior? (looking for three.)
Pretexting, Phising, and vishing
What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?
SYN (synchronous) flooding
A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?
They are the network (192.168.30.0/24) and broadcast IP addresses (192.168.30.255/24).
Which two ports can be used for the initial configuration of a Cisco router? (looking for two ports.)
Two console ports- RJ-45 port & new USB type-B (mini-B USB) connector
Why do streaming audio and video applications use UDP instead of TCP?
UDP constantly sends the audio and video application rather than delaying due to TCP checking if the data packets are sent.
What type of Internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity?
WiFi
Which technology is used to uniquely identify a WLAN network?
WiFi
RouterA#
add a password required to access the priviledged EXEC mode
ping
asks the name server for information on the destination domain
RouterA(config-if)#
configure a WAN interface
RouterA(config-line)#
configure vty lines
ipconfig
displays IP settings on host
netstat
displays network connections
tracert
displays the route that is taken to the destination
RouterA(config)#
enter configuration mode
Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (looking for three steps.)
1. Go to settings, Connections, WiFi 2. Input SSID 3. Input Password
Which three items should be documented after troubleshooting an internal web server crash? (Choose three.)
1. The Solution to the problem 2.The Successful troubleshooting steps 3.The Unsuccessful troubleshooting steps
Which address prefix range is reserved for IPv4 multicast?
224.0.0.0 to 239.255.255.255
What is the minimum size of a valid Ethernet frame?
64 bytes
An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?
Brute Force attack
Which protocol is used to automatically assign IP addresses to hosts?
DHCP
Which step should be taken next once a problem is resolved during a troubleshooting process?
Document the steps used to solve the problem
What are two advantages of using fiber-optic cabling to interconnect devices? ( looking for two advantages.)
Fiber-optic cable is immune from EMI and RFI.
Which protocol is used by web servers to serve up a web page?
HTTP
Which protocol is used to transfer web pages from a server to a client device?
HTTP or HTTPS
Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three pieces of info.)
IP Address, Subnet mask, Default gateway
When is an IP address required to be configured on a Cisco LAN switch?
IP Addresses allow for the Switch to be managed & configured over a network
What was the reason for the creation and implementation of IPv6?
IPv6 allows us to have more address space due to the increase in demand
At which layer of the TCP/IP model does TCP operate?
The Transport Layer
What are three advantages of using private IP addresses and NAT? (looking for three advantages.)
hides private LAN addressing from outside devices that are connected to the Internet, permits LAN expansion without additional public IP addresses
What is a disadvantage of deploying a peer-to-peer network model?
lack of centralized administration, not as secure and scalable
The functions of which two layers of the OSI model are matched to the network access layer of the TCP/IP model? (looking for two layers.)
physical, data link
nslookup
tests end-to-end connectivity between hosts
Which three pieces of information are identified by a URL? (looking for three pieces of info)
the protocol that is being used, the domain name that is being accessed, the location of the resource
Which type of network cable is commonly used to connect office computers to the local network?
twisted-pair cable
