CIST 2451 - Final Exam Study Guide - Part 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.0

What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?

255.255.255.192

A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.240

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

256

What are three characteristics of the CSMA/CD process? (Choose three.)

A device listens and waits until the media is not busy before transmitting. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. All of the devices on a segment see data that passes on the network medium.

What characteristic describes an IPS?

A network device that filters access and traffic coming into a network

What characteristic describes a VPN?

A tunneling protocol that provides remote users with secure access into the network of an organization

What are three commonly followed standards for constructing and installing cabling? (Choose three.)

Cable Lengths Pinouts Connector Types

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)

Destination IP addresses in a packet header remain constant along the entire path to a target host. Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.

What are two functions that are provided by the network layer? (Choose two.)

Directing data packets to destination hosts on other networks Providing end devices with a unique network identifier

What service is provided by DHCP?

Dynamically assigns IP addresses to end and intermediary devices.

A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?

FTP

A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.)

Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. Fiber optic provides higher data capacity but is more expensive than copper cabling.

A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?

IMAP

What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)

IP addresses Layer 1 Statuses

What is an advantage to using a protocol that is defined by an open standard?

It encourages competition and promotes choices.

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?

It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.

What is one main characteristic of the data link layer?

It shields the upper layer protocol from being aware of the physical medium to be used in the communication.

Which two statements describe features of an IPv4 routing table on a router? (Choose two.)​

It stores information about routes derived from the active router interfaces. If a default static route is configured in the router, an entry will be included in the routing table with source code S .

What attribute of a NIC would place it at the data link layer of the OSI model?

MAC address

What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)

Neighbor Solicitations Neighbor Advertisements

What is a benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

What are two characteristics shared by TCP and UDP? (Choose two.)

Port Numbering Use of Checksum

Which connector is used with twisted-pair cabling in an Ethernet LAN?

RJ 45

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

Route Print Netstat -r

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?

SSH

Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

Security rules are applied to the default gateway device, preventing it from processing ping requests.

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

The MAC address of the default gateway

Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

The Network Performance Baseline

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

Which information does the show startup-config command display?

The contents of the saved configuration file in the NVRAM

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

The source port field identifies the running application or service that will handle data returning to the PC. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data.

What characteristic describes identity theft?

The use of stolen credentials to access private data

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Time-to-Live

Why would a Layer 2 switch need an IP address?

To enable the switch to be managed remotely

A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network?

Tracert

What technique is used with UTP cable to help protect against signal interference from crosstalk?

Twisting the Wires Together Into Pairs

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

When the value in the TTL field reaches zero

Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?

Worm

Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments?

ZIgBee


Set pelajaran terkait

Toxicology Chapter 12 (Sugar Substitutes)

View Set

Ethics in Public Health (PHSC 7)

View Set

CH. 7 QUIZ, Chapter 7, Chapter 10, Chapter 11, Chapter 9, Chapter 8

View Set

therapeutic communication/relationship

View Set

Chapter 2 Quiz - Technology for Success (The Web)

View Set