Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely? 1. FastEthernet0/1 2. VLAN 1 3. vty 0 4. console 0

2. VLAN 1

The IPv4 packets and IPv6 packets coexist in the same network.

dual-stack

In fiber optic media, the signals are represented as patterns of ... .

light

Metro Ethernet

high-speed business class copper or fiber connection

Which key combination allows a user to abort setup mode?

Ctrl-C

What field content is used by ICMPv6 to determine that a packet has expired?

Hop Limit field

Which statement describes a characteristic of the frame header fields of the data link layer?

They vary depending on protocols.

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command encrypts passwords as they are transmitted across serial WAN links.

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

destination MAC address

satellite

requires a dish and clear line of sight for service

The component of the operating software that provides the user interface is called the ...

shell

What is a basic characteristic of the IP protocol?

connectionless

What is true concerning physical and logical topologies?

Logical topologies refer to how a network transfers data between devices.

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?

Nothing can be determined for sure at this point.

What source IP address does a router use by default when the traceroute command is issued? 1. the highest configured IP address on the router 2. the lowest configured IP address on the router 3. a loopback IP address 4. the IP address of the outbound interface

4. the IP address of the outbound interface

The minimum Ethernet frame size is ... bytes. Anything smaller than that should be considered a "runt frame."

64 (the maximum as 1518 bytes)

sending from a device on a network to different device in another network

IP address of the destination device on the remote network. A frame that contains the MAC address of the default gateway device on the local network.

What are two features of ARP? (Choose two.)

If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

The Ethernet .... sublayer is responsible for communicating directly with the physical layer.

MAC

What is an advantage for small organizations of adopting IMAP instead of POP?

Messages are kept in the mail servers until they are manually deleted from the email client.

The acronym ... is used to define the process that allows multiple devices to share a single routable IP address.

NAT

Network services use .... to define a set of rules that govern how devices communicate and the data formats used in a network.

PROTOCOLS

coaxial

Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.

A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?

WAN

A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?

With a network prefix of 48, there will be 16 bits available for subnetting because the interface ID starts at bit 64. Sixteen bits will yield 65536 subnets.

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?

application

Hops

based on how many routers and connection in between.

If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?

data link

f

f

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? ipconfig /all. arp -a. ipconfig /displaydns. nslookup.

ipconfig /displaydns

Transport Protocol

managing the individual conversations between web servers and web clients

stateful packet inspection

the ability of a device to track TCP connections and only allow returning data to the inside connection

Which characteristic describes crosstalk?

the distortion of the transmitted messages from signals carried in adjacent wires

IPv6 packets are converted into IPv4 packets, and vice versa.

translation

Which scenario describes a function provided by the transport layer?

3. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

How should traffic flow be captured in order to best understand traffic patterns in a network?

during peak utilization times

When a network administrator is trying to manage network traffic on a growing network, when should traffic flow patterns be analyzed?

during times of peak utilization

What is contained in the trailer of a data-link frame?

error detection

Which three addresses are valid public addresses? (Choose three.) 1. 198.133.219.17 2. 192.168.1.245 3. 10.15.250.5 4. 128.107.12.117 5. 192.15.301.240 6. 64.104.78.227

1. 198.133.219.17 4. 128.107.12.117 6. 64.104.78.227

Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.) 1. DNS 2. Ethernet 3. IP 4. POP 5. TCP 6. UDP

1. DNS 4. POP

What purpose does NAT64 serve in IPv6? 1. It converts IPv6 packets into IPv4 packets. 2. It translates private IPv6 addresses into public IPv6 addresses. 3. It enables companies to use IPv6 unique local addresses in the network. 4. It converts regular IPv6 addresses into 64-bit addresses that can be used on the Internet. 5. It converts the 48-bit MAC address into a 64-bit host address that can be used for automatic host addressing.

1. It converts IPv6 packets into IPv4 packets.

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.) 1. The frame has the broadcast address as the destination address. 2. The destination address is unknown to the switch. 3. The source address in the frame header is the broadcast address. 4. The source address in the frame is a multicast address. 5. The destination address in the frame is a known unicast address.

1. The frame has the broadcast address as the destination address. 2. The destination address is unknown to the switch.

What are two characteristics of Ethernet MAC addresses? (Choose two.) 1. They are globally unique. 2. They are routable on the Internet. 3. They are expressed as 12 hexadecimal digits. 4. MAC addresses use a flexible hierarchical structure. 5. MAC addresses must be unique for both Ethernet and serial interfaces on a device.

1. They are globally unique. 3. They are expressed as 12 hexadecimal digits.

What addresses are mapped by ARP? 1. destination MAC address to a destination IPv4 address 2. destination IPv4 address to the source MAC address 3. destination IPv4 address to the destination host name 4. destination MAC address to the source IPv4 address

1. destination MAC address to a destination IPv4 address

If a device receives an Ethernet frame of 60 bytes, what will it do? 1. drop the frame 2. process the frame as it is 3. send an error message to the sending device 4. add random data bytes to make it 64 bytes long and then forward it

1. drop the frame

Which example of malicious code would be classified as a Trojan horse? 1. malware that was written to look like a video game 2. malware that requires manual user intervention to spread between systems 3. malware that attaches itself to a legitimate program and spreads to other programs when launched 4. malware that can automatically spread from one system to another by exploiting a vulnerability in the target

1. malware that was written to look like a video game

Which command can an administrator issue on a Cisco router to send debug messages to the vty lines? 1. terminal monitor 2. logging console 3. logging buffered 4. logging synchronous

1. terminal monitor

The private IP addresses are within these three ranges:

10.0.0.0 - 10.255.255.255. 172.16.0.0 - 172.31.255.255. 192.168.0.0 - 192.168.255.255.

Private Network addresses:

10.0.0.0/8. 172.16.0.0/12. 192.168.0.0/16.

A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts?

10.1.1.128/28. 10.1.1.144/28. 10.1.1.160/29. Prefix lengths of /28 and /29 are the most efficient to create subnets of 16 addresses (to support 10 hosts) and 8 addresses (to support 6 hosts), respectively. Addresses in one subnet must also not overlap into the range of another subnet.

Consider the IP address of 192.168.10.0/24 that has been assigned to a high school building. The largest network in this building has 100 devices. If 192.168.10.0 is the network number for the largest network, what would be the network number for the next largest network, which has 40 devices? 1. 192.168.10.0 2. 192.168.10.128 3. 192.168.10.192 4. 192.168.10.224 5. 192.168.10.240

2. 192.168.10.128

What are three characteristics of multicast transmission? (Choose three.) 1. The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255. 2. A single packet can be sent to a group of hosts. * 3. Multicast transmission can be used by routers to exchange routing information. 4. Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255. 5. Computers use multicast transmission to request IPv4 addresses. 6. Multicast messages map lower layer addresses to upper layer addresses.

2. A single packet can be sent to a group of hosts. 3. Multicast transmission can be used by routers to exchange routing information. 4. Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255.

What are three characteristics of an SVI? (Choose three.) 1. It is designed as a security protocol to protect switch ports. 2. It is not associated with any physical interface on a switch. 3. It is a special interface that allows connectivity by different types of media. 4. It is required to allow connectivity by any device at any location. 5. It provides a means to remotely manage a switch. 6. It is associated with VLAN1 by default.

2. It is not associated with any physical interface on a switch. 5. It provides a means to remotely manage a switch. 6. It is associated with VLAN1 by default.

Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses? 1. stateful DHCPv6 2. SLAAC 3. static IPv6 addressing 4. stateless DHCPv6

2. SLAAC

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command? 1. The new configuration will be stored in flash memory. 2. The new configuration will be loaded if the switch is restarted. 3. The current IOS file will be replaced with the newly configured file. 4. The configuration changes will be removed and the original configuration will be restored.

2. The new configuration will be loaded if the switch is restarted.

Where are Cisco IOS debug output messages sent by default? 1. Syslog server 2. console line 3. memory buffers 4. vty lines

2. console line

What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?

2. destination and source port numbers

What type of IPv6 address is FE80::1?

2. link-local

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address? 1. DNS server address 2. subnet mask 3. default gateway 4. DHCP server address

2. subnet mask

A user opens three browsers on the same PC to access http://www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply? 1. the destination IP address 2. the destination port number 3. the source IP address 4. the source port number

2. the destination port number

What are two functions of NVRAM? (Choose two.) 1. to store the routing table 2. to retain contents when power is removed 3. to store the startup configuration file 4. to contain the running configuration file 5. to store the ARP table

2. to retain contents when power is removed 3. to store the startup configuration file

What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?

2001:D12:AA04:B5::/64​ The /64 represents the network and subnet IPv6 fields which are the first four groups of hexadecimal digits. The first address within that range is the subnetwork address of 2001: D12:AA04:B5::/64.​ Previous Next

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?

2001:db8:0:f000::/52

What method is used to manage contention-based access on a wireless network? 1. CSMA/CD 2. priority ordering 3. CSMA/CA 4. token passing

3. CSMA/CA

A wireless host needs to request an IP address. What protocol would be used to process the request? 1. FTP 2. HTTP 3. DHCP 4. ICMP 5. SNMP

3. DHCP

What is a characteristic of the LLC sublayer? 1. It provides the logical addressing required that identifies the device. 2. It provides delimitation of data according to the physical signaling requirements of the medium. 3. It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media. 4. It defines software processes that provide services to the physical layer.

3. It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server? 1. The computer cannot ping 127.0.0.1. 2. Windows displays a DHCP timeout message. 3. The computer receives an IP address that starts with 169.254 4. The computer cannot ping other devices on the same network with IP addresses in the 169.254.0.0/16 range.

3. The computer receives an IP address that starts with 169.254

A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue? 1. a change in the bandwidth according to the show interfaces output 2. a next-hop timeout from a traceroute 3. an increase in host-to-host ping response times 4. a change in the amount of RAM according to the show version output

3. an increase in host-to-host ping response times

How does quality of service help a network support a wide range of applications and services? 1. by limiting the impact of a network failure 2. by allowing quick recovery from network failures 3. by providing mechanisms to manage congested network traffic 4. by providing the ability for the network to grow to accommodate new users

3. by providing mechanisms to manage congested network traffic

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher? 1. peer-to-peer 2. master-slave 3. client/server 4. point-to-point

3. client/server

What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.) 1. error correction through a collision detection method 2. session control using port numbers 3. data link layer addressing 4. placement and removal of frames from the media 5. detection of errors through CRC calculations 6. delimiting groups of bits into frames 7. conversion of bits into data signals

3. data link layer addressing 5. detection of errors through CRC calculations 6. delimiting groups of bits into frames

What are two characteristics shared by TCP and UDP? (Choose two.) 1. default window size 2. connectionless communication 3. port numbering 4. 3-way handshake 5. ability to to carry digitized voice 6. use of checksum

3. port numbering 6. use of checksum

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port? 1. show mac-address-table 2. show ip interface brief 3. show interfaces 4. show running-config

3. show interfaces

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host? 1. trace 10.1.1.5 2. traceroute 10.1.1.5 3. tracert 10.1.1.5 4. ping 10.1.1.5

3. tracert 10.1.1.5

What function does pressing the Tab key have when entering a command in IOS? 1. It aborts the current command and returns to configuration mode. 2. It exits configuration mode and returns to user EXEC mode. 3. It moves the cursor to the beginning of the next line. 4. It completes the remainder of a partially typed word in a command.

4. It completes the remainder of a partially typed word in a command.

Which switching method has the lowest level of latency? 1. cut-through 2. store-and-forward 3. fragment-free 4. fast-forward

4. fast-forward

A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose? 1. DSL 2. dialup 3. satellite 4. leased line 5. cable modem

4. leased line

A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem? 1. tracert 2. ipconfig 3. netstat 4. nslookup

4. nslookup

What is the TCP mechanism used in congestion avoidance?

4. sliding window

Which type of UTP cable is used to connect a PC to a switch port? 1. console 2. rollover 3. crossover 4. straight-through

4. straight-through

Why are port numbers included in the TCP header of a segment?

4. to enable a receiving host to forward the data to the appropriate application

A user is unable to reach the web site when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?

DNS

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

Data Link

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

Which two protocols function at the internet layer? (Choose two.)

ICMP, IP

What are two services performed by the data link layer of the OSI model? (Choose two.) It determines the path to forward packets. It monitors the Layer 2 communication by building a MAC address table. It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection. It encrypts data packets.

It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection.

Which protocol can be used to transfer messages from an email server to an email client?

POP3

What is an advantage of SMB over FTP?​

SMB clients can establish a long-term connection to the server.​

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

The client randomly selects a source port number.

destination MAC address

The destination MAC address is used for local delivery of Ethernet frames. The MAC (Layer 2) address changes at each network segment along the path. As the frame leaves the web server, it will be delivered by using the MAC address of the DEFAULT GATEWAY.

Which two statements are true regarding the user EXEC mode? (Choose two.) 1. All router commands are available. 2. Global configuration mode can be accessed by entering the enable command. 3. The device prompt for this mode ends with the ">" symbol. 4. Interfaces and routing protocols can be configured. 5. Only some aspects of the router configuration can be viewed.

The device prompt for this mode ends with the ">" symbol. Only some aspects of the router configuration can be viewed.

maximum throughput is determined by ...

The maximum throughput between any two nodes on a network is determined by the slowest link between those nodes. Previous Next

An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination?

The transmission continues without the missing portion.

15. As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame??

The transmitting node inserts start and stop bits into the frame.

Pv6 global unicast address.

There are three elements that make up an IPv6 global unicast address. A global routing prefix which is provided by an ISP, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host.

STP

This type of copper media is used in industrial or similar environments where there is a lot of interference.

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access

What type of communication rule would best describe CSMA/CD?

access method

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​

all IPv6 configured routers on the local link​

What does the IP address 192.168.1.15/29 represent?

broadcast address

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

client

What three services are provided by the transport layer? (Choose three.)

connection establishment, error recovery, flow control

Which address does a NIC use when deciding whether to accept a frame?

destination MAC address

What is the objective of a network reconnaissance attack?

discovery and mapping of systems

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?

extended star

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

fault tolerance

During the boot process, where will the router bootstrap program look for the IOS image by default?

flash

2001:DB8::BAF:3F57:FE94

global unicast

information that is added before the data field in a frame

header

Which two factors influence the method that is used for media access control? (Choose two.) how data is generated by end devices applications how the connection between nodes appears to the data link layer how signals are encoded by the NICs on end devices​ how nodes share the media how the IP protocol forwards the packet to the destination

how the connection between nodes appears to the data link layer. how nodes share the media

Which application layer protocol uses message types such as GET, PUT, and POST?

http

An ... is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.

intranet

What type of delivery uses data link layer addresses? remote delivery local and remote delivery local delivery remote delivery using routers

local delivery

What are three responsibilities of the transport layer? (Choose three.) meeting the reliability requirements of applications, if any . multiplexing multiple communication streams from many users or applications on the same network. identifying the applications and services on the client and server that should handle transmitted data. directing packets towards the destination network . formatting data into a compatible form for receipt by the destination devices . conducting error detection of the contents in frames .

meeting the reliability requirements of applications, if any. multiplexing multiple communication streams from many users or applications on the same network. identifying the applications and services on the client and server that should handle transmitted data

Which portion of the network layer address does a router use to forward packets?

network portion

Which command is used to manually query a DNS server to resolve a specific host name?

nslookup

the ability to perform packet inspection at Layer 3 based on the source and destination IP addresses and source and destination port numbers

packet filtering

Which two types of devices are typically assigned static IP addresses?

printers, web servers

encoding

process of modifying data to an acceptable format for transmission

In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do?

process the frame as it is

What are two benefits of subnetting networks? (Choose two.)

reducing the size of broadcast domains . grouping devices to improve management and security

proprietary

refers to protocols that are developed by companies and are available to the public for purchase

What type of cable is used to connect a workstation serial port to a Cisco router console port?

rollover

SMTP

sends email messages

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

shared memory buffering

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

ARP

the process that is used to find a Layer 2 address when a Layer 3 address is known

Why would a technician enter the command copy startup-config running-config?

to copy an existing configuration into RAM

Which is a function of the Logical Link Control (LLC) sublayer?

to identify which network layer protocol is being used

What is the purpose of the TCP sliding window?

to request that a source decrease the rate at which it transmits data

What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame

FTP

transfers files between systems. The client can download data from or upload data to the server.

The IPv6 packet is transported inside an IPv4 packet.

tunneling

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

tunneling

Single-mode fiber

uses a laser as the light source. Its small core produces a single straight path for light and it is commonly used with campus backbones. Multimode fiber uses LEDs as the light source. Its larger core allows for multiple paths for the light. It is commonly used with LANs.


Set pelajaran terkait

Chapter 7: Thinking and Intelligence Study Guide Psychology Part 1

View Set

Chapter 0, Linux Ch. 7&8, Linux Chapter 2, Linux Chapter 1, Linux Test chapters 4-9

View Set

Ch. 6: Differentiation, Cost Leadership, Blue Oceans

View Set

Chapter 9: Communication and the Clinical Interview Evolve Questions

View Set

Managerial Accounting Long Problems Review

View Set

Developmental Psychology (Life Span) Part 1

View Set

PrepU Chapter 36: Management of Patients with Musculoskeletal Disorders

View Set

Principles & Practices: Module 7 (Chapter 12, Overview Real Estate Finance)

View Set

Health Assessment: Rashid Ahmed Pre-Simulation Quiz

View Set