ICTN 2150 FINAL
Which domain name would be an example of a top-level domain
.com
What are three ip addresses used for internal private use
10.0.0.0/8 172.16.0.0/12 192.168.0.0/16
Three IP addresses that are for internal private use
10.0.0.0/8 172.16.0.0/12 192.168.0.0/16
Which subnet would inlude the address 192.168.1.96 as a usable host address
192.168.64/26
Which subnet would include the address 192.168.1.96 as a usable host address
192.198.1.64/26
What is the most compressed version of 2001:0000:0000:abcd:0000:0000:0000:0001
2001:0:0:abcd::1
Need to acommodate 126 hosts, whats the subnet mask
255.255.255.128
What subnet mask i sneeded if an ipv4 network has 40 devices that need ip addresses and address space is not to be wasted
255.255.255.192
How many usable ip addresses are available on the 192.168.1.0/27
30
How many valid host addresses are available on an ipv4 subnet that is configured with /26 mask
62
What is a characteristic of a fault tolerant network?
A Network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure
Three characteristics of multicast transmission
A single packet can be sent to a group of hosts, Multicast can be used by routers to exchange routing information, routers will not forward addresses in the range of 224.0.0.0 to 224.0.0.255
Which senerio describes a function provided by the transport layer
A student has two web browser windows open in order to access two web sites
Three bank employees...... What are the priorities from highest to lowest of the different data types?
Audio conference, financial transactions, web page
What method is used to manage contention-based access on a wireless network
CSMA/CA
Which method is used to manage contention-based access on a wireless network
CSMA/CA
A wireless host needs to request an ip address. What protocol would be used to process the request
DHCP
What network service resolves the url entered on a pc to the ip address of the destination server
DNS
Which two protocols operate at the highest layer of the tcp/ip protocol stack
DNS and POP
A home user is looking for an isp connection that provides high speed digital transmission over phone lines. What isp type should be used
DSL
What are three primary functions provided by layer 2 data encapsulation
Data link layer addressing, detection of errors through CRC calculations, delimiting groups of bits into frames
If a device receives an ethernet frame of 60 bytes what will it do
Drop the frame
What is one difference between the client-server and peer to peer network models
Every device in a peer to peer network an function as a client or server
Which range of link-local addresses can be assigned to an ipv6 enabled interface
FE80::/10
What are two benefits of using a layered network model?
It assists in protocol design, it prevents technology in one layer from affecting other layers
What function does pressing the tab key have?
It completes the remainder of the partially typed word in a command
What purpose does NAT64 serve in IPv6
It converts ipv6 packets into ipv4 packets
What purpose does NAT64 serve in ipv6
It converts ipv6 packets into ipv4 packets
What is an advantage to using a protocol that is defined by an open standard
It encourages competition and promotes choices
What is the function of the shell in an OS?
It interfaces between the users and the kernel
What are two characteristics of fiber-optic cable
It is not affected by EMI or RFI, it is more expensive that UTP cabling is
What are three characteristics of an SVI
It is not associated with any physical interface on a switch, it provices a means to remotely manage a switch, it is associated with vlan1 by default
What is a characteristic of the LLC sublayer
It places information in the frame allowing multiple layer 3 protocols to use the same network interface and media
What is the purpose of command ping ::1
It tests the internal configuration of an ipv6 host
What will a host on a ethernet network do if it receives a frame with a destination mac address that doesnt match its own
It will discard the frame
What will a host on an ethernet network o if it recieves a frame with a destination MAC address that doesn't match its own?
It will discard the frame
A medium sized business is researching options for connecting to internet. Theyre looking for high speed, symmetric access. Which should they choose?
Leased line
What unique address is embedded in an ethernet nic and used for communication on an ethernet network
MAC address
The copy running config startup config command is issued, where will the changes be stored
NVRAM
Which two OSI model layers have the same functionality as two layers of the TCP/IP model?
Network and transport
What is a benefit of using cloud computing in networking
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software
Which two functions are primary functions of a router
Packet forwarding and path selection
Which topology provides high availability and connects some, but not all, remote sites
Partial mesh
Which service provides dynamic global ipv6 addressing to end devices without using a server that keeps a record of available ipv6 addresses
SLAAC
Which statement accurately describes tcp/ip dncapsulation process when a pc is sending data to the network
Segments are sent from the transport layer to the internet layer
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?
Stateful packet inspection
Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?
Store and forward switching
What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and web server
TCP
What protocol is responsible for controlling the size of segments at which segments are exchanged between a web client and web server
TCP
A PC obtains its IP address from a DHCP server. If the pc is taken off the network for repair, what happens to the ip address configuration
The address is returned to the pool for reuse when the lease expires
What 3 factors could influence the differences in throughput?
The amount of traffic, the type of traffic, the latency
SanJose(config)# ip address 192....... 255...... Why is it being rejected?
The command is being entered from the wrong mode of operation
SanJose(Config)# ip...... Why is it rejected?
The command is being entered from the wrong mode of opperation
Banner of the day question
The delimiting character appears in the banner message
Under what two circumstances will a switch flood a frame out of every port except the port that the frame was recieved on
The frame has the broadcast address as the destination address, the destination address is unknown to the switch
After making onfiguration changes on a switch, a network administrator issues a copy running-config startup config command. What is the result of issuing this command
The new configuration will be loaded if the switch is restarted
What password is needed to access user EXEC mode?
The one under line console 0
During the encapsulation process, what occurs at the data link layer for a pc connected to an ethernet networok
The physical layer is added
What password is needed to acces privileged EXEC mode?
The second password... Enable secret _______
Which statement is true about variable-length subnet masking
The size of each subnet may be different
Which statement is true about variable length subnet masking
The size of each subnet may be different depending on requirements
What are two characteristics of ethernet mac addresses
They are globally unique, they are expressed as 12 hexidecimal digits
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely
VLAN 1
On which switch interface would an administrator configure an ip address so that the switch can be managed remotely
VLAN 1
A company is expanding its business to other countries. Which network technology is required to support this requirement?
WAN
SanJose(Config)# ip...... Why is it rejected?
an SSH connection
Which connection provides a secure CLI session with encryption to a Cisco switch
an SSH connection
Which connection provides a secure CLI session with encryption to a cisco switch
an SSH connection
A network engineer is analazying reports from network baseline. what could be the latency issue
an increase in host to host ping reponse times
Which connection provides a secure CLI session with encryption to a cisco switch
an ssh connection
How does quality of service help a network support a wide range of applications and services
by providing mechanisms to manage congested network traffic
What is a characteristic of UTP cabling
cancellation
Which networking model is being used when an author uploads one chapter document to a file server of a book publisher
client/server
Which two tasks are functions of the presentation layer
compression and encryption
What are 3 primary functions provided by layer 2 data encapsulation
data link layer addressing, detection of errors through CRC calculations, delimiting groups of bits into frames
What addresses are mapped by ARP
destination MAC address to a destination IPv4 address
Which switching method has the lowest level of latency
fast- forward
What layer is responsible for routing messages through an internetwork in the tcp/ip model
internet
When applied to a router, which command would help mitigate bruce force password attacks against the router
login block-for 60 attempts 5 within 60
Which example of malicious code would be classified as a trojan horse
malware that was written to look like a video game
A single message to a specific group of hosts.. This message is in the form of a ____Message
multicast
A technician an ping the ip address of a web server but not the URL address. Which software utility can diagnose the problem
nslookup
What are two characteristics shared by tcp and udp
port numbering and use of checksum
What is a key characteristic of the peer to peer networking mode
resource sharing without a dedicated server
Which two commands can be used on a windows host to display the routing table
route print, nestat -r
What are two services provided by the OSI network layer
routing packets toward the destination, encapsulating PDUs from the transport layer
What characteristic of a network enables it to quickly grow and support new users
scalability
Which name is assigned to the transport layer PDU
segment
A network admin is measuring bits accross company. What could influence differences in throughput?
the amount of traffic crossing the network, the type of traffic, the latency
A user opens three browsers. what information would the web browsers recieve
the destination port number
What are port numbers included in the tcp header of a segment
to enable a receiving host to forward the data to the appropriate application
What are two ways that TCP uses the sequence numbers in a segment
to identify missing segments at the destination, to reassemble the segments at the remote location
What is the purpose of Ctrl-Shift-6
to interrupt the ping process
What is the purpose of having a converged network
to reduce the cost of deploying and maintaing the communicatin infrastructure
What are two functions of NVRAM
to retain contents when power is removed, to store the startup config fiile
Which procedure is used to reduce the effect of crosstalk in copper cables
twisting opposing circuit wire pairs together
