practice final exam
Refer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22?
172.16.19.255 The 172.16.16.0/22 network has 22 bits in the network portion and 10 bits in the host portion. Converting the network address to binary yields a subnet mask of 255.255.252.0. The range of addresses in this network will end with the last address available before 172.16.20.0. Valid host addresses for this network range from 172.16.16.1-172.16.19.254, making 172.16.19.255 the broadcast address.
What will be the result of failed login attempts if the following command is entered into a router? login block-for 150 attempts 4 within 90
All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds.
What best describes the destination IPv4 address that is used by multicasting?
a single IP multicast address that is used by all destinations in a group
What type of communication rule would best describe CSMA/CD?
access method
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?
all IPv6 enabled devices on the local link all IPv6 DHCP servers *all IPv6 configured routers on the local link* all IPv6 enabled devices across the network WHY? FF02::2 identifies all IPv6 routers that exist on the link or network. FF02::1 is the target for all IPv6 enabled devices on the link or network.
What three services are provided by the transport layer? (Choose three.)
connection establishment error recovery flow control
What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?
destination IP address source IP address Ethernet type source MAC address *destination MAC address*
What is the objective of a network reconnaissance attack?
discovery and mapping of systems
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
extranet
refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?
linevtyin
Which two automatic addressing assignments are supported by DHCP? (Choose two.)
physical address of the sender local server address *subnet mask* *default gateway address* physical address of the recipient
What is the purpose of ICMP messages?
to inform routers about network topology changes to ensure the delivery of an IP packet *to provide feedback of IP packet transmissions* to monitor the process of a domain name to IP address resolution
Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?
2001:db8:0:f000::/52 Prefix 2001:db8::/48 has 48 network bits. If we subnet to a /52, we are moving the network boundary four bits to the right and creating 16 subnets. The first subnet is 2001:db8::/52 the last subnet is 2001:db8:0:f000::/52.
Which statement describes a characteristic of the traceroute utility?
It utilizes the ICMP Source Quench messages. *It identifies the routers in the path from a source host to a destination host.* It is primarily used to test connectivity between two hosts. It sends four Echo Request messages. WHY? Traceroute is a utility that generates a list of hops (or routers) along the path from a source host to the destination host.
A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?
Nothing can be determined for sure at this point.
Which two statements correctly describe a router memory type and its contents? (Choose two.)
ROM is nonvolatile and stores the running IOS. FLASH is nonvolatile and contains a limited portion of the IOS. *RAM is volatile and stores the IP routing table.* NVRAM is nonvolatile and stores a full version of the IOS. *ROM is nonvolatile and contains basic diagnostic software.*
What is the purpose of the SVI on a Cisco switch?
The SVI adds Layer 4 connectivity between VLANs. The SVI provides a physical interface for remote access to the switch. *The SVI provides a virtual interface for remote access to the switch.* The SVI provides a faster method for switching traffic between ports on the switch.
A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?
The data flow is being tracked based on the source port number utilized by each application.
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
This command enables a strong encryption algorithm for the enable secret password command. This command automatically encrypts passwords in configuration files that are currently stored in NVRAM. This command encrypts passwords as they are transmitted across serial WAN links. This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance. *This command prevents someone from viewing the running configuration passwords.*
The graphic shows the output of the command netstat -r issued on a workstation: C:\Windows\system32> netstat -r <output omitted> IPv6 Route Table ======================================================= Active Routes: If Metric Network Destination Gateway 9 306 ::/0 On-link 1 306 ::1/128 On-link 9 306 2001::/32 On-link 9 306 2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128 On-link 4 281 fe80::/64 On-link 9 306 fe80::/64 On-link 4 281 fe80::1c20:5d8b:4b44:bd40/128 On-link 9 306 fe80::30d0:115:3f57:fe4c/128 On-link 1 306 ff00::/8 On-link 4 281 ff00::/8 On-link 9 306 ff00::/8 On-link ======================================================= Refer to the exhibit. A user issues the command netstat -r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?
fe80::30d0:115:3f57:fe4c/128
If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?
physical *data link* Layer 4 Layer 3
In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)
size of the network signal modulation technique *electromagnetic interference* bandwidth *crosstalk*