CCNA1 FINAL EXAM STUDY GUIDE part4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

*What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?* 255.255.255.0 255.255.255.128 255.255.255.192 255.255.255.224 255.255.255.240

255.255.255.192

*A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices:* *Subnetwork A: IP phones - 10 addresses Subnetwork B: PCs - 8 addresses Subnetwork C: Printers - 2 addresses* *What single subnet mask would be appropriate to use for the three subnetworks?* 255.255.255.0 255.255.255.240 255.255.255.248 255.255.255.252

255.255.255.240

*What network service resolves the URL entered on a PC to the IP address of the destination server?* DNS DHCP FTP SNMP

DNS

*Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)* DNS Ethernet IP POP TCP UDP

DNS POP

*What are two examples of the cut-through switching method? (Choose two.)* store-and-forward switching fast-forward switching CRC switching fragment-free switching QOS switching

fast-forward switching fragment-free switching

*A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?* DSL dialup satellite leased line cable modem

leased line

*What are two characteristics shared by TCP and UDP? (Choose two.)* default window size connectionless communication port numbering 3-way handshake ability to to carry digitized voice use of checksum

port numbering use of checksum

*What is one difference between the client-server and peer-to-peer network models?* Only in the client-server model can file transfers occur. Every device in a peer-to-peer network can function as a client or a server. A peer-to-peer network transfers data faster than a transfer using a client-server network. A data transfer that uses a device serving in a client role requires that a dedicated server be present.

Every device in a peer-to-peer network can function as a client or a server.

*What are three characteristics of an SVI? (Choose three.)* It is designed as a security protocol to protect switch ports. It is not associated with any physical interface on a switch. It is a special interface that allows connectivity by different types of media. It is required to allow connectivity by any device at any location. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.

It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.

Fill in the blank. *During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a __________ message*

Multicast

*After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?* flash ROM NVRAM RAM the configuration register a TFTP server

NVRAM

*A technician configures a switch with these commands:* SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown*What is the technician configuring?* Telnet access SVI password encryption physical switchport access

SVI

*A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?* a change in the bandwidth according to the show interfaces output a next-hop timeout from a traceroute an increase in host-to-host ping response times a change in the amount of RAM according to the show version output

an increase in host-to-host ping response times

*Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?* peer-to-peer master-slave client/server point-to-point

client/server

*What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?* reliability scalability quality of service accessibility

scalability

*What is the process of dividing a data stream into smaller pieces before transmission?* segmentation encapsulation encoding flow control

segmentation

*What information is added during encapsulation at OSI Layer 3?* source and destination MAC source and destination application protocol source and destination port number source and destination IP address

source and destination IP address

*Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?* stateful packet inspection URL filtering application filtering packet filtering

statefull packet inspection

*Which type of UTP cable is used to connect a PC to a switch port?* console rollover crossover straight-through

straight-through

*When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?* DNS server address subnet mask default gateway DHCP server address

subnet mask

*A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)* the amount of traffic that is currently crossing the network the sophistication of the encapsulation method applied to the data the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing the bandwidth of the WAN connection to the Internet the reliability of the gigabit Ethernet infrastructure of the backbone

the amount of traffic that is currently crossing the network the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing

*In computer communication, what is the purpose of message encoding?* to convert information to the appropriate form for transmission to interpret information to break large messages into smaller frames to negotiate correct timing for successful communication

to convert information to the appropriate form for transmission

*Why are port numbers included in the TCP header of a segment?* to indicate the correct router interface that should be used to forward a segment to identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data to enable a receiving host to forward the data to the appropriate application to allow the receiving host to assemble the packet in the proper order

to enable a receiving host to forward the data to the appropriate application

*What is the purpose of having a converged network?* to provide high speed connectivity to all end devices to make sure that all types of data packets will be treated equally to achieve fault tolerance and high availability of data network infrastructure devices to reduce the cost of deploying and maintaining the communication infrastructure

to reduce the cost of deploying and maintaining the communication infrastructure

*What are two actions performed by a Cisco switch? (Choose two.)* building a routing table that is based on the first IP address in the frame header using the source MAC addresses of frames to build and maintain a MAC address table forwarding frames with unknown destination IP addresses to the default gateway utilizing the MAC address table to forward frames via the destination MAC address examining the destination MAC address to add new entries to the MAC address table

using the source MAC addresses of frames to build and maintain a MAC address table utilizing the MAC address table to forward frames via the destination MAC address


Set pelajaran terkait

FIN3403- Chapter 5: Q.1, 2, 3, 4, 7 and Key Terms

View Set

CSP 031A C++ Programming I Midterm

View Set

Slope Formula, Missing Coordinate, Zeros

View Set

Lesson 10: Combining SAS Data Sets

View Set