CIS230 Presentation Solutions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which two commands can be used on a Windows host to display the routing table?

route print and netstat -r

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?

2001:DA48:FC5:A4::/64

global routing prefix

This network portion of the address that is assigned by the provider

interface ID

This part of the address is the equivalent to the host portion of an IPv4 address

What are the two most effective ways to defend against malware>

Updating the operating system and other application software Install and update antivirus software

Which traffic types use the Real-Time Transport Protocol (RTP)?

Voice and Video

retransmission

method of managing segments of data loss

window size

number of bytes a destination device can accept and process at one time

Layer 3

Source IP Address, and TTL

Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)

Application, Presentation, and Session

A client packet is received by a server. The packet has a destination port of 67. What service is the client requesting?

DHCP

Which two protocols function at the top layer of the TCP/IP protocol suite?

DNS and POP

Layer 4

Destination Port Number, and Acknowledgment Number

Layer 2

FCS (Frame Check Sequence), 802.2 header, and Destination MAC Address

What are two ARP features?

If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply

What two pieces of information are displayed in the output of the show ip interface brief command?

Layer 1 statuses and IP addresses

What attribute of a NIC would place it at the data link layer of the OSI model?

MAC Address

peer-to-peer application

Requires a specific user interface A background service is required

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts in other networks

Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)

There are 4 hops between this device and the device at 192.168.100.1 There is connectivity between this device and the device at 192.168.100.1

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?

authorization

MAC Address

contained in the Layer 2 header, separated into OUI and a unique identifier, and 48 bits

IP Address

contained in the Layer 3 header, separated into a network portion and a unique identifier, and 32 or 128 bits

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network?

coverage areas, interference, and security

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

exit privileged EXEC mode and press Enter

240.2.6.255

experimental address

Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?

frame check sequence field

What are the three parts of an IPv6 global unicast address?

global routing prefix, interface ID, and subnet ID

What are the common causes of signal degradation when using UTP cabling?

improper termination, and low-quality cable or connectors

What command can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

198.133.219.2

public address

An user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

the MAC address of the default gateway

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs

What is the consequence of configuring a router with an IPv6 unicast-routing global configuration command?

The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages

What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?

255.255.255.192

What single subnet mask would be appropriate to use for the three subnetworks?

255.255.255.240

A network administrator is adding a new LAN to an office branch. The new LAN support 4 connected devices. What is the smallest network mask that can the network administrator can be used for the new network?

255.255.255.248

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate communication?

handles communication between upper-layer networking software and Ethernet NIC hardware enables IPv4 and IPv6 to utilize the same physical medium

Network B

192.168.0.128/26

Network C

192.168.0.192/27

Network D

192.168.0.224/30

Network A

192.168.0.0/25

Which scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window

Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer?

Capture traffic during peak utilization times to get a good representation of the different traffic types Perform the capture on different network segments

What happens when the transport input ssh command is entered on the switch vty lines>?

Communication between the switch and the remote users is encrypted

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

A host is trying to send a packet on a remote LAN segment, but there are currently no mappings in the ARP echo. How will the device obtain a destination MAC Address

It will send an ARP request for the MAC Address of the default gateway

What are two decisions that can be caused by a large number of ARP request and reply messages?

The ARP request is sent as a broadcast, and will flood the entire subnet. All ARP request messages must be proceeded by all nodes on the local network

Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?

Layer 2 destination address = 00-00-0c-94-36-ab; Layer 2 source address = 00-00-0c-94-26-bb; Layer 3 destination address = 172.16.20.200; Layer 3 source address = 172.16.10.200

What service is provided by BOOTP?

Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.

What is an advantage for small organizations of adopting IMAP instead of POP3?

Messages are kept in the mail servers until they are manually deleted from the email client

What is a benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

peer-to-peer network

No dedicated server is required Client and server roles are set on a per request basis

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?

The Source Address field name from IPv4 is kept in IPV6 The Version field from IPv4 is not kept in IPv6

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

The administrator must first enter privileged EXEC mode before issuing the command.

subnet ID

This part of the address is used by an organization to identify subnets.

What characteristics describe antispyware?

applications that protect end devices from becoming infected with malicious software

What is one main characteristic of the data link layer?

it shields the upper layer protocol from being aware of the physical medium to be used in the communication

169.254.1.5

link-local address

127.0.0.1

loopback address

What does the term "attenuation" mean in data communication?

loss of signal strength as distance increase

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)

message encoding, message size, and delivery options

What are two characteristics of IP?

operates independently of the network media does not require a dedicated end-to-end connection

What are propriety protocols?

protocols developed by organizations who have control over their definition and operation

An employee of a large company remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activates within seconds. The disruption is not noticed by the employee of the other employees. What three network characteristics are described in this scenario?

quality of service, fault tolerance, and security

acknowledgement

received by a sender before transmitting more segments in a session

Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?

remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

switch the packet to the directly connected interface

What are two characteristics shared by TCP and UDP?

use of checksum and port numbering

sequence numbers

used to identify missing segments of data

Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?

worm


Set pelajaran terkait

PrepU Comprehensive Exam Questions and Areas to Study

View Set

Biology: Content Knowledge (5235) — ***

View Set

NCSBON Practice Questions 91-105

View Set

The Iroquois Creation Myth: "The World on Turtle's Back"

View Set

Art 100: Chapter 18, 19, and 20 Quiz

View Set

chapter 39- oxygenation and perfusion

View Set

Lewis 9th Edition Chapter 47 Pre-test, Bridge to NCLEX and Evolve NCLEX Review Questions

View Set