Final exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the prefix length notation for the subnet mask 255.255.255.224? /25 /26 /28 /27

/27

Consider the following range of addresses:2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:00A2:0000::...2001:0DB8:BC15:00AF:0000::The prefix-length for the range of addresses is

/60

Which three statements describe a DHCP Discover message? (Choose three.)

1) All hosts receive the message, but only a DHCP server replies. 2) The message comes from a client seeking an IP address. 3) The destination IP address is 255.255.255.255.

Which three fields are used in a UDP segment header? (Choose three.)

1) Checksum 2) Length 3) Source Port

Which two characteristics are associated with UDP sessions? (Choose two.)

1) Destination devices receive traffic with minimal delay. 2) Received data is unacknowledged.

Which three application layer protocols use TCP? (Choose three.)

1) FTP 2) SMTP 3) DHCP

A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. (Not all options are used.)

1) The client sends FIN. 2) The server sends ACK. 3) The server sends FIN. 4) client sends Ack

Which two types of applications are best suited for UDP? (Choose two.)

1) applications that handle reliability themselves 2) applications that can tolerate some data loss, but require little or no delay

What are two characteristics of peer-to-peer networks? (Choose two.)

1) decentralized resources 2) resource sharing without a dedicated server

Which two fields are included in the TCP header but not in the UDP header? (Choose two.)

1) window 2) sequence number

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

1)session layer 2) application layer 3) presentation layer

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

1022

A client creates a packet to send to a server. The client is requesting SNMP service. What number will be used as the destination port number in the sending packet?

161

What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)

192.168.0.0/16,10.0.0.0/8,172.16.0.0/12

Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network.

192.168.0.192 /27 - Network C 192.168.0.0 /25 - Network A 192.168.0.128 /26 - Network B 192.168.0.224 /30 - Network D

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

Which three addresses are valid public addresses? (Choose three.)

198.133.219.17 128.107.12.117 64.104.78.227

What are the three IPv6 addresses displayed when the route from PC1 to PC2 is traced? (Choose three.)

2001:DB8:1:1::1 2001:DB8:1:2::1 2001:DB8:1:3::2

What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?

2001:DB8:BC15:A

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

2001:db8::a0b0:8:1

Which address prefix range is reserved for IPv4 multicast?

224.0.0.0 - 239.255.255.255

Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?

3FFE:1044:0:0:AB::57

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?

6001

How many host addresses are available on the 192.168.10.128/26 network?

62

What is the usable number of host IP addresses on a network that has a /26 mask?

62

Which scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window

What is an example of network communication that uses the client-server model?

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

ACK

What do the client/server and peer-to-peer network models have in common?

Both models support devices in server and client roles

Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?

DNS

Which address is a valid IPv6 link-local unicast address?

FE80::1:4545:6578:ABC1

Which application layer protocol uses message types such as GET, PUT, and POST?

HTTP

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

ICMP

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?

ICMPv6

How are port numbers used in the TCP/IP encapsulation process?

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

What does a client do when it has UDP datagrams to send?

It just sends the datagrams.

Which applications or services allow hosts to act as client and server at the same time?

P2P applications

Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?

SLAAC

Three methods allow IPv6 and IPv4 to co-exist. Match each method with its description. (Not all options are used.)

The IPv4 packets and IPv6 packets coexist in the same network: dual-stack The IPv6 packet is transported inside an IPv4 packet: tunneling IPv6 packets are converted into IPv4 packets, and vice versa: translation

A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?

This is a private IP address.

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

all IPv6 enabled devices on the local link​ or network

Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?

anycast

Why does HTTP use TCP as the transport layer protocol?

because HTTP requires reliable delivery

Which field in the TCP header indicates the status of the three-way handshake process?

control bits

A message is sent to all hosts on a remote network. Which type of message is it?

directed broadcast

Match each IPv4 address to the appropriate address category. (Not all options are used.)

host address: 192.168.100.161/25 203.0.113.100/24 network address: 10.10.10.128/25 172.110.12.64/28 broadcast address: 192.168.1.191/26 10.0.0.159/27

What type of IPv6 address is FE80::1?

link-local

Match each description with an appropriate IP address. (Not all options are used.)

link-local address --> 5 (169.254.1.5) public address --> 4 (198.133.219.2) experimental address --> 3 (240.2.6.255) loopback address --> 1 (127.0.0.1)

What are two types of IPv6 unicast addresses? (Choose two.)

loop back link-local

A host is transmitting a unicast. Which host or hosts will receive it?

one specific host

In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?

peer-to-peer.

A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 4 . What does this code represent?

port unreachable

What kind of port must be requested from IANA in order to be used with a specific application?

registered port

What information is used by TCP to reassemble and reorder received segments?

sequence numbers.

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?

subnetwork 192.168.1.64 subnet mask 255.255.255.192

What source IP address does a router use by default when the traceroute command is issued?

the IP address of the outbound interface

What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?

the MAC address of the IPv6 enabled interface

What type of information is contained in a DNS MX record?

the domain name mapped to mail exchange servers.

A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?

when the value of the Hop Limit field reaches zero


Set pelajaran terkait

Small Parts: Scrotum (Notes pg. 68 - 81)

View Set

Information Storage and Management v5

View Set

Ap Lit poetic devices and romantic poetry

View Set

Quiz 3: The Constitutional Convention

View Set

Dolgozat 10. évfolyam 36-43. leckék

View Set

SPC 205 - CH 01, 04, 06, 19 + Quiz 1

View Set