CNNA Final Exam part 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The address is returned to the pool for reuse when the lease expires.

A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?

leased line

A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

an increase in host-to-host ping response times

A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?

Show interfaces

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?

SVI

A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdownWhat is the technician configuring?

the destination port number

A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?

DHCP

A wireless host needs to request an IP address. What protocol would be used to process the request?

NVRAM

After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored

The physical address is added.

During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?

30

How many usable IP addresses are available on the 192.168.1.0/27 network?

to convert information to the appropriate form for transmission

In computer communication, what is the purpose of message encoding?

when a faster delivery mechanism is needed when applications do not need to guarantee delivery of the data

In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)

192.168.10.128

Refer to the exhibit. Consider the IP address of 192.168.10.0/24 that has been assigned to a high school building. The largest network in this building has 100 devices. If 192.168.10.0 is the network number for the largest network, what would be the network number for the next largest network, which has 40 devices?

The frame has the broadcast address as the destination address. The destination address is unknown to the switch.

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)

It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.

What are three characteristics of an SVI? (Choose three.)

They are globally unique. They are expressed as 12 hexadecimal digits.

What are two characteristics of Ethernet MAC addresses?

to identify missing segments at the destination to reassemble the segments at the remote location

What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

Scalability

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

It completes the remainder of a partially typed word in a command.

What function does pressing the Tab key have when entering a command in IOS?

destination and source port numbers

What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?

They are sent to a select group of hosts

What is a characteristic of multicast messages?

They are sent to a select group of hosts.

What is a characteristic of multicast messages?

resource sharing without a dedicated server

What is a key characteristic of the peer-to-peer networking model?

The computer receives an IP address that starts with 169.254

What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?

Sliding window

What is the TCP mechanism used in congestion avoidance?

Segmentation

What is the process of dividing a data stream into smaller pieces before transmission?

to reduce the cost of deploying and maintaining the communication infrastructure

What is the purpose of having a converged network?

It tests the internal configuration of an IPv6 host

What is the purpose of the command ping ::1?

Internet

What layer is responsible for routing messages through an internetwork in the TCP/IP model?

DNS

What network service resolves the URL entered on a PC to the IP address of the destination server?

login block-for 60 attempts 5 within 60

When applied to a router, which command would help mitigate brute-force password attacks against the router?

on as many different network segments as possible

When planning for network growth, where in the network should packet captures take place to assess network traffic?

Console line

Where are Cisco IOS debug output messages sent by default?

terminal monitor

Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?

an SSH connection

Which connection provides a secure CLI session with encryption to a Cisco network device?

.com

Which domain name would be an example of a top-level domain?

malware that was written to look like a video game

Which example of malicious code would be classified as a Trojan horse?

stateful packet inspection

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

client/server

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

twisting opposing circuit wire pairs together

Which procedure is used to reduce the effect of crosstalk in copper cables?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

Which scenario describes a function provided by the transport layer?

SLAAC

Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?

Segments are sent from the transport layer to the internet layer.

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

UDP provides basic connectionless transport layer functions. UDP relies on application layer protocols for error detection. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms

Which three statements characterize UDP? (Choose three.)

route print netstat -r

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

packet forwarding path selection

Which two functions are primary functions of a router? (Choose two.)

POP DNS

Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)

Compression Encryption

Which two tasks are functions of the presentation layer? (Choose two.)


Set pelajaran terkait

Give Me Liberty Chapter 14: A New Chapter of Freedom; The Civil War 1861-1865

View Set

Entrepreneurship and Starting a Small Business - Chapter 6

View Set

Computer Sci C# Chapters 9,10,11,12,13,14,15,16

View Set

Introduction to Clinical Nursing Final Exam

View Set

APUSH Midterm: Important People, Terms, & Events

View Set

Hoofdstuk 7 Nederlands in gang (7): personaal pronomen A0-A1

View Set