CSCO 120 Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?

2001:db8:0:f000::/52*

What are three characteristics of multicast transmission?

A single packet can be sent to a group of hosts. Multicast transmission can be used by routers to exchange routing information. Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255.

What method is used to manage contention-based access on a wireless network?

CSMA/CA

What purpose does NAT64 serve in IPv6?

It converts IPv6 packets into IPv4 packets.

What is a characteristic of the traceroute utility?

It identifies the routers in the path from a source host to a destination host.

What is a characteristic of the LLC sublayer?

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

Which two statements correctly describe a router memory type and its contents?

RAM is volatile and stores the IP routing table. ROM is nonvolatile and contains basic diagnostic software.

What is the purpose of the SVI on a Cisco switch?

The SVI provides a virtual interface for remote access to the switch.

How is a PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

The data flow is being tracked based on the source port number utilized by each application.

What addresses are mapped by ARP?

destination MAC address to a destination IPv4 address

Which domain name would be an example of a top-level domain?

.com

What three blocks of addresses are defined by RFC 1918 for private network use?

10.0.0.0/8 172.16.0.0/12 192.168.0.0/16

What will be the result of failed login attempts if the following command is entered into a router? login block-for 150 attempts 4 within 90

All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds.

For Cisco IOS, which escape sequence allows terminating a traceroute operation?

Ctrl+Shift+6

Which keys act as a hot key combination that is used to interrupt an IOS process?

Ctrl-Shift-6

Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names?

DNS, DHCP

A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

DSL

Which range of link-local addresses can be assigned to an IPv6-enabled interface?​

FE80::/10

Name two protocols that function at the internet layer?

ICMP, IP

What are two features of ARP?

If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.*

What are two benefits of using a layered network model? (Choose two.)

It assists in protocol design.* It prevents technology in one layer from affecting other layers.

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It forwards the frame out of all ports except for the port at which the frame was received.

What is a characteristic of the LLC sublayer?

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.*

What are the two sublayers of the OSI model data link layer?

LLC, MAC

Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?

SLAAC

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

Segments are sent from the transport layer to the internet layer.

What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

TCP

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on?

The frame has the broadcast address as the destination address. The destination address is unknown to the switch.

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

The new configuration will be loaded if the switch is restarted.

An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination?

The transmission continues without the missing portion.

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command prevents someone from viewing the running configuration passwords.

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

VLAN 1

What is a characteristic of a fault tolerant network?

a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure

What best describes the destination IPv4 address that is used by multicasting?

a single IP multicast address that is used by all destinations in a group

What type of communication rule would best describe CSMA/CD?

access method

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?

all IPv6 configured routers on the local link

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast

Which two tasks are functions of the presentation layer?

compression encryption

What is a basic characteristic of the IP protocol?

connectionless*

Where are Cisco IOS debug output messages sent by default?

console line

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables?

crosstalk, electromagnetic interference

If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?

data link

What are the three primary functions provided by Layer 2 data encapsulation?

data link layer addressing detection of errors through CRC calculations delimiting groups of bits into frames

What are the three primary functions provided by Layer 2 data encapsulation?

detection of errors through CRC calculations delimiting groups of bits into frames data link layer addressing

What is the objective of a network reconnaissance attack?

discovery and mapping of systems

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

extranet*

Which switching method has the lowest level of latency?

fast-forward

What three services are provided by the transport layer?

flow control connection establishment error recovery

What is done to an IP packet before it is transmitted over the physical medium?

it is encapsulated in a Layer 2 frame

At a minimum, which address is required on IPv6-enabled interfaces?

link-local

When applied to a router, which command would help mitigate brute-force password attacks against the router?

login block-for 60 attempts 5 within 60

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

mesh

Which two functions are primary functions of a router?

netstat -r, route print

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)

network, transport

Which two functions are primary functions of a router?

packet forwarding, path selection

What are two characteristics shared by TCP and UDP?

port numbering, use of checksum

Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack?

presentation session

In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do?

process the frame as it is

What type of communication medium is used with a wireless LAN connection?

radio waves

What are two services provided by the OSI network layer?

routing packets toward the destination encapsulating PDUs from the transport layer

What PDU is associated with the transport layer?

segment

Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?

show interfaces

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

stateful packet inspection

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

store-and-forward switching

Name two automatic addressing assignments are supported by DHCP?

subnet mask* default gateway address*

A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput?

the amount of traffic that is currently crossing the network the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing

What are two ways that TCP uses the sequence numbers in a segment?

to identify missing segments at the destination to reassemble the segments at the remote location

What is the purpose of ICMP messages?

to provide feedback of IP packet transmissions

What are two functions of NVRAM?

to retain contents when power is removed to store the startup configuration file


Set pelajaran terkait

Anthropogenic Causes of Climate Change

View Set

Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol

View Set

What is a partnership and how does it work

View Set

Quiz 20 Fundamentals of organizational structure

View Set