Cisco Final Exam 105-130

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What technique is used with UTP cable to help protect against signal interference from crosstalk? wrapping a foil shield around the wire pairs twisting the wires together into pairs terminating the cable with special grounded connectors encasing the cables within a flexible plastic sheath

twisting the wires together into pairs

Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.) 10.18.10.200/28 10.18.10.208/28 10.18.10.240/27 10.18.10.200/27 10.18.10.224/27 10.18.10.224/28

10.18.10.208/28 10.18.10.224/28

Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets? 88 200 72 224 158

200

A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.192 255.255.255.248 255.255.255.224 255.255.255.240

255.255.255.240

A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting? A. IMAP B. FTP C. SSH D. Telnet

A. IMAP

What characteristic describes identity theft? A. the use of stolen credentials to access private data B. software on a router that filters C. traffic based on IP addresses or applications software that identifies fast-spreading threats D. a tunneling protocol that provides remote users with secure access into the network of an organization

A. the use of stolen credentials to access private data

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network? A. 255.255.255.240 B. 255.255.255.0 C. 255.255.255.248 D. 255.255.255.224

B. 255.255.255.0

What are three commonly followed standards for constructing and installing cabling? (Choose three.) A. cost per meter (foot) B. cable lengths C. connector color D. pinouts E. connector types F. tensile strength of plastic insulator

B. cable lengths D. pinouts E. connector types

Refer to the exhibit. What is wrong with the displayed termination? A. The woven copper braid should not have been removed. B. The wrong type of connector is being used. C. The untwisted length of each wire is too long. D. The wires are too thick for the connector that is used.

C. The untwisted length of each wire is too long.

What are two characteristics shared by TCP and UDP? (Choose two.) A. default window size B. connectionless communication C. port numbering D. 3-way handshake E. ability to to carry digitized voice F. use of checksum

C. port numbering F. use of checksum

What service is provided by DHCP? An application that allows real-time chatting among remote users. Allows remote access to network devices and servers. Dynamically assigns IP addresses to end and intermediary devices. Uses encryption to provide secure remote access to network devices and servers.

Dynamically assigns IP addresses to end and intermediary devices.

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addresses PCs - 20 addresses needed Printers - 2 addresses needed Scanners - 2 addresses needed The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks? A.255.255.255.192 B.255.255.255.252 C.255.255.255.240 D.255.255.255.248 E.255.255.255.0 F.255.255.255.224

F. 255.255.255.224

A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting? FTP LDAP SLP SNMP

FTP

Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet? IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76 IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33 IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33 IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46 IP address: 192.168.10.254 subnet mask: 255.255.255.0, default gateway: 192.168.10.1

IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33

What attribute of a NIC would place it at the data link layer of the OSI model? attached Ethernet cable IP address MAC address RJ-45 port TCP/IP protocol stack

MAC Address

Which connector is used with twisted-pair cabling in an Ethernet LAN?

RJ45

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting? SSH SMB/CIFS HTTPS SLP

SSH

Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments? Bluetooth Zigbee WiMAX Wi-Fi

Zigbee

What characteristic describes an IPS? a tunneling protocol that provides remote users with secure access into the network of an organization a network device that filters access and traffic coming into a network software that identifies fast-spreading threats software on a router that filters traffic based on IP addresses or applications

a network device that filters access and traffic coming into a network

What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.) neighbor solicitations echo requests neighbor advertisements echo replies router solicitations router advertisements

neighbor solicitations neighbor advertisements

Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A? only host D only router R1 only hosts A, B, and C only hosts A, B, C, and D only hosts B and C only hosts B, C, and router R1

only hosts B, C, and router R1

Refer to the exhibit. The switches have a default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for the default gateway. Which network devices will receive the ARP request sent by host A? only host D only hosts A, B, C, and D only hosts B and C only hosts B, C, and router R1 only hosts A, B, and C only router R1

only hosts B, C, and router R1


Set pelajaran terkait

Quickbooks Online 2018 - Chapter 3 - study guide

View Set

Perry/Hockenberry chapter 43. Hematologic and Immunologic Dysfunction

View Set

Chapter 39-Assessment of Musculoskeletal Function

View Set

Chapter 4.5 Proofreading to Catch Errors Aplia Assignment

View Set

MTA Networking Fundamentals, MTA Networking Fundamentals-Final, MTA Network Fundamentals- OSI/TCP, MTA Networking Fundamentals Test 1, MTA Networking Fundamentals Test 2, MTA Networking Fundamentals Test 3, MTA Networking Fundamentals, MTA Networking...

View Set

LEGL-2064 - Chapter 8: Intellectual property rights

View Set

Chapter 30 Biology Homework and Readings

View Set