Cisco Quarter Final
What service is provided by SMTP?
Allows clients to send email to a mail server and the servers to send email to other servers.
what service is provided by SMTP
Allows clients to send email to a mail server and the servers to send email to other servers.
What method is used to manage contention-based access on a wireless network?
CSMA/CA
Destination Port of 53
DNS
A user is attempting to access http://www.cisco.com/ without success. Which two configuration value must set on the host to allow this access?
DNS server and default gateway
what are three commonly followed standards for constructing and installing cabling?
cable length, pinouts, connector types
What are two functions that are provided by the network layer? (Choose two.)
directing data packets to destination hosts on other networks and providing end devices with a unique network identifier.
What are two characteristics of IP?
does not require a dedicated end-to-end connection operates independently of the network media
Destination port number 53
DNS
Layer 3
TTL, Source IP address
198.133.219.2
Public Address
used to identify missing segments of data
sequence numbers
Layer 4
Acknowledgment number, destination port number
240.2.6.255
Experimental address
An organization is assigned an ipv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? (64-56)
2^8 = 256
Layer 2
802.2 header, FCS, and Destination MAC address
What are three characteristics of the CSMA/CD process?
A device listens and wait until the media is not busy before transmitting After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired All of the devices on a segment see data that passes on the network medium
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?
All IPv6 configured routers on the local link
Which two statements describe features of an IPv4 routing table on a router? (Choose two.)
Directly connected interfaces will have two route source codes in the routing table: C and L If a default static route is configured in the router, an entry will be included in the routing table with source code S.
What service is provided by DHCP?
Dynamically assigns IP addresses to end and intermediary devices.
A client packet received by a server. The packet has a destination port number of 21. What service is the client requesting?
FTP
TCP
HTTP, SMTP, FTP
Application protocols for TCP:
HTTP, SMTP,FTP
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?
IMAP
What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)
IP address and Layer 1 statuses
Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication?
Integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper AND implements CSMA/CD over legacy shared half-duplex media
what mechanism is used by a router to prevent a received IPv4 packet from travelling endlessly on a network?
It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to source host.
What is an advantage to using a protocol that is defined by an open standard?
It encourages competition and promotes choices
A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?
It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network
A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?
It will send an ARP request for the MAC address of the default gateway.
What attribute of a NIC would place it at the data link layer of the OSI model?
MAC address
Benefit of using cloud computing in networking?
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software
What is a benefit of using cloud computing in networking?
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)
POP and DNS
Similarity between TCP and UDP?
Port numbering and use of checksum
What is a function of the data link layer?
Provides for the exchange of frames over a common local media
Destination port number 22
SSH
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?
Source address field name from IPv4 is kept in PIv6 and the TTL field from IPv4 has been replaced by the Hop Limit Field in IPv6.
A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?
TFTP
UDP
TFTP and DHCP
Application protocols for UDP:
TFTP, DHCP
A technician with PC is using multiple applications while connected to the Ethernet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?
The data flow is being tracked based on the source port number that is used by each application
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?
Time-to-Live (TTL)
prevents access to websites
URL filtering
What service is provided by HTTPS?
Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
A user is executing tracert to a remote device. At what point would a router, which in the path to the destination device, stop forwarding the packet?
When the value in the TTL field reaches zero
which wireless technology has low-power and low-data rate requirements making it popular n loT environments?
Zigbee
169.254.0.1 - 169.254.255.254
a link-local address
Characteristic describes a VPN?
a tunneling protocol that provides remote users with secure access into the network of an organization
What are two primary responsibilities of the Ethernet MAC sublayer?(Choose two.)
accessing the media and data encapsulation
Received by a sender before transmitting more segments in a session
acknowledgement
This field helps to direct the frame toward its destination.
addressing
DoS attack (Denial of Service attack)
an attack that slows or crashes a device or network service
What characteristic describes DoS attack?
an attack that slows or crashes a device or network service
prevents access by port number
application filtering
This field checks if the frame has been damaged during the transfer.
error detection
what range of link-local addresses can be assigned to an IPv6-enabled interface?
fe80::/10
This field identifies the beginning of a frame.
frame start
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
interference, security, and coverage area
what command can be used on a Windows PC to see the IP configuration of that computer?
ipconfig
127.0.0.1
loopback address
what does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
What characteristic describes a Trojan horse?
malicious software or code running on an end device
What characteristic describes a virus?
malicious software or code running on an end device
process of placing one message format inside another message formet
message encapsulation
the process of converting info from one format to another acceptable for transmission
message encoding
What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)
message size, message encoding, and delivery options
the process of breaking up a long message into individual pieces before being sent over the network
message sizing
What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)
neighbor solicitations and neighbor advertisements
two command on a Windows host to display the routing table?
netstat -r AND route print
Peer-to-Peer
no dedicated server required AND Client and server roles are set on a per request basis
prevents access based on IP or MAC address
packet filtering
what are two characteristics shared by TCP and UDP?
port numbering and use of checksum
Peer-to-peer applications
requires a specific interface AND a background service is required
method of managing segments of data loss
retransmission
what characteristic describes an IPS? (Intrusion Prevention Software)
software that identifies fast-spreading threats
what characteristic describes adware?
software that is installed on a user device and collects information about the user
prevents unsolicited incoming sessions
stateful packet inspection
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?
store-and-forward
Which switching method drops frames that fil the FCS check?
store-and-forward switching
An administrator is trying to config the switch but receives this error message. What is the problem? (Switch1> config t)
the admin must first enter privileged EXEC mode before issuing the command
Which info does the show startup-config command display
the contents of the saved configuration file in the NVRAM
Which two statements are correct in a comparison of iPv4 and IPv6 packet headers?
the source address field name from IPv4 and IPv6.
Why would a Layer 2 switch need an IP address?
to enable the switch to be managed remotely
What is the purpose of the TCP sliding window?
to request that a source decrease the rate at which it transmits data
What technique is used with UTP cable to help protect against signal interference from crosstalk?
twisting the wires together into pairs
This field is used by the LLC to identify the Layer 3 protocol.
type
service provided by HTTPS?
uses encryption to secure the exchange of text, graphic images, sound, and video on the web
number of bytes a destination device can accept and process at one time
window size