CCNA Final Exam Pt. 3 (78 - 117)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

111. A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?

IMAP

78. An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​

all IPv6 configured routers on the local link​

95. When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

store-and-forward

86. Which switching method drops frames that fail the FCS check?

store-and-forward switching

79. What are the three parts of an IPv6 global unicast address? (Choose three.)

subnet ID, global routing prefix, interface ID

107. A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.0

91. What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?

1E6F:65FF:FEC2:BDF8

105. A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addresses PCs - 20 addresses needed Printers - 2 addresses needed Scanners - 2 addresses needed The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

255.255.255.224

116. A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.240

88. What service is provided by FTP?

Allows for data transfers between a client and a file server.

82. What method is used to manage contention-based access on a wireless network?

CSMA/CA

89. A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server, default gateway

81. A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

Exit privileged EXEC mode and press Enter .

87. Which range of link-local addresses can be assigned to an IPv6-enabled interface?

FE80::/10

80. A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

Interference, Security, coverage area

103. How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

93. What service is provided by BOOTP?

Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.

115. What attribute of a NIC would place it at the data link layer of the OSI model?

MAC address

90. Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

NAT introduces problems for some applications that require end-to-end connectivity., NAT provides a solution to slow down the IPv4 address depletion.

104. Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6,The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

97. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

accessing the media, data encapsulation

108. What are three commonly followed standards for constructing and installing cabling? (Choose three.)

cable lengths,pinouts,connector types

112. What are two characteristics shared by TCP and UDP? (Choose two.)

port numbering & use of checksum

83. What is a function of the data link layer?

provides for the exchange of frames over a common local media

85. What characteristic describes spyware?

software that is installed on a user device and collects information about the user

94. What characteristic describes adware?

software that is installed on a user device and collects information about the user

102. Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

the network performance baseline

106. What characteristic describes identity theft?

the use of stolen credentials to access private data

84. What is the purpose of the TCP sliding window?

to request that a source decrease the rate at which it transmits data

117. What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs


Set pelajaran terkait

21.3 The Adaptive Immune Response: T lymphocytes and their functional types

View Set

Operator Overloading (Homework 11)

View Set

Ap Gov Unit 2 Test: Chapter 4 and 5

View Set

Banking and Financial Institution (Reviewer)

View Set

Med. Surg Test #1 Study Questions

View Set

Electrical Power Industry Reform Act of 2001

View Set