ICTN 2150 FINAL

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which domain name would be an example of a top-level domain

.com

What are three ip addresses used for internal private use

10.0.0.0/8 172.16.0.0/12 192.168.0.0/16

Three IP addresses that are for internal private use

10.0.0.0/8 172.16.0.0/12 192.168.0.0/16

Which subnet would inlude the address 192.168.1.96 as a usable host address

192.168.64/26

Which subnet would include the address 192.168.1.96 as a usable host address

192.198.1.64/26

What is the most compressed version of 2001:0000:0000:abcd:0000:0000:0000:0001

2001:0:0:abcd::1

Need to acommodate 126 hosts, whats the subnet mask

255.255.255.128

What subnet mask i sneeded if an ipv4 network has 40 devices that need ip addresses and address space is not to be wasted

255.255.255.192

How many usable ip addresses are available on the 192.168.1.0/27

30

How many valid host addresses are available on an ipv4 subnet that is configured with /26 mask

62

What is a characteristic of a fault tolerant network?

A Network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure

Three characteristics of multicast transmission

A single packet can be sent to a group of hosts, Multicast can be used by routers to exchange routing information, routers will not forward addresses in the range of 224.0.0.0 to 224.0.0.255

Which senerio describes a function provided by the transport layer

A student has two web browser windows open in order to access two web sites

Three bank employees...... What are the priorities from highest to lowest of the different data types?

Audio conference, financial transactions, web page

What method is used to manage contention-based access on a wireless network

CSMA/CA

Which method is used to manage contention-based access on a wireless network

CSMA/CA

A wireless host needs to request an ip address. What protocol would be used to process the request

DHCP

What network service resolves the url entered on a pc to the ip address of the destination server

DNS

Which two protocols operate at the highest layer of the tcp/ip protocol stack

DNS and POP

A home user is looking for an isp connection that provides high speed digital transmission over phone lines. What isp type should be used

DSL

What are three primary functions provided by layer 2 data encapsulation

Data link layer addressing, detection of errors through CRC calculations, delimiting groups of bits into frames

If a device receives an ethernet frame of 60 bytes what will it do

Drop the frame

What is one difference between the client-server and peer to peer network models

Every device in a peer to peer network an function as a client or server

Which range of link-local addresses can be assigned to an ipv6 enabled interface

FE80::/10

What are two benefits of using a layered network model?

It assists in protocol design, it prevents technology in one layer from affecting other layers

What function does pressing the tab key have?

It completes the remainder of the partially typed word in a command

What purpose does NAT64 serve in IPv6

It converts ipv6 packets into ipv4 packets

What purpose does NAT64 serve in ipv6

It converts ipv6 packets into ipv4 packets

What is an advantage to using a protocol that is defined by an open standard

It encourages competition and promotes choices

What is the function of the shell in an OS?

It interfaces between the users and the kernel

What are two characteristics of fiber-optic cable

It is not affected by EMI or RFI, it is more expensive that UTP cabling is

What are three characteristics of an SVI

It is not associated with any physical interface on a switch, it provices a means to remotely manage a switch, it is associated with vlan1 by default

What is a characteristic of the LLC sublayer

It places information in the frame allowing multiple layer 3 protocols to use the same network interface and media

What is the purpose of command ping ::1

It tests the internal configuration of an ipv6 host

What will a host on a ethernet network do if it receives a frame with a destination mac address that doesnt match its own

It will discard the frame

What will a host on an ethernet network o if it recieves a frame with a destination MAC address that doesn't match its own?

It will discard the frame

A medium sized business is researching options for connecting to internet. Theyre looking for high speed, symmetric access. Which should they choose?

Leased line

What unique address is embedded in an ethernet nic and used for communication on an ethernet network

MAC address

The copy running config startup config command is issued, where will the changes be stored

NVRAM

Which two OSI model layers have the same functionality as two layers of the TCP/IP model?

Network and transport

What is a benefit of using cloud computing in networking

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software

Which two functions are primary functions of a router

Packet forwarding and path selection

Which topology provides high availability and connects some, but not all, remote sites

Partial mesh

Which service provides dynamic global ipv6 addressing to end devices without using a server that keeps a record of available ipv6 addresses

SLAAC

Which statement accurately describes tcp/ip dncapsulation process when a pc is sending data to the network

Segments are sent from the transport layer to the internet layer

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

Stateful packet inspection

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

Store and forward switching

What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and web server

TCP

What protocol is responsible for controlling the size of segments at which segments are exchanged between a web client and web server

TCP

A PC obtains its IP address from a DHCP server. If the pc is taken off the network for repair, what happens to the ip address configuration

The address is returned to the pool for reuse when the lease expires

What 3 factors could influence the differences in throughput?

The amount of traffic, the type of traffic, the latency

SanJose(config)# ip address 192....... 255...... Why is it being rejected?

The command is being entered from the wrong mode of operation

SanJose(Config)# ip...... Why is it rejected?

The command is being entered from the wrong mode of opperation

Banner of the day question

The delimiting character appears in the banner message

Under what two circumstances will a switch flood a frame out of every port except the port that the frame was recieved on

The frame has the broadcast address as the destination address, the destination address is unknown to the switch

After making onfiguration changes on a switch, a network administrator issues a copy running-config startup config command. What is the result of issuing this command

The new configuration will be loaded if the switch is restarted

What password is needed to access user EXEC mode?

The one under line console 0

During the encapsulation process, what occurs at the data link layer for a pc connected to an ethernet networok

The physical layer is added

What password is needed to acces privileged EXEC mode?

The second password... Enable secret _______

Which statement is true about variable-length subnet masking

The size of each subnet may be different

Which statement is true about variable length subnet masking

The size of each subnet may be different depending on requirements

What are two characteristics of ethernet mac addresses

They are globally unique, they are expressed as 12 hexidecimal digits

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely

VLAN 1

On which switch interface would an administrator configure an ip address so that the switch can be managed remotely

VLAN 1

A company is expanding its business to other countries. Which network technology is required to support this requirement?

WAN

SanJose(Config)# ip...... Why is it rejected?

an SSH connection

Which connection provides a secure CLI session with encryption to a Cisco switch

an SSH connection

Which connection provides a secure CLI session with encryption to a cisco switch

an SSH connection

A network engineer is analazying reports from network baseline. what could be the latency issue

an increase in host to host ping reponse times

Which connection provides a secure CLI session with encryption to a cisco switch

an ssh connection

How does quality of service help a network support a wide range of applications and services

by providing mechanisms to manage congested network traffic

What is a characteristic of UTP cabling

cancellation

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher

client/server

Which two tasks are functions of the presentation layer

compression and encryption

What are 3 primary functions provided by layer 2 data encapsulation

data link layer addressing, detection of errors through CRC calculations, delimiting groups of bits into frames

What addresses are mapped by ARP

destination MAC address to a destination IPv4 address

Which switching method has the lowest level of latency

fast- forward

What layer is responsible for routing messages through an internetwork in the tcp/ip model

internet

When applied to a router, which command would help mitigate bruce force password attacks against the router

login block-for 60 attempts 5 within 60

Which example of malicious code would be classified as a trojan horse

malware that was written to look like a video game

A single message to a specific group of hosts.. This message is in the form of a ____Message

multicast

A technician an ping the ip address of a web server but not the URL address. Which software utility can diagnose the problem

nslookup

What are two characteristics shared by tcp and udp

port numbering and use of checksum

What is a key characteristic of the peer to peer networking mode

resource sharing without a dedicated server

Which two commands can be used on a windows host to display the routing table

route print, nestat -r

What are two services provided by the OSI network layer

routing packets toward the destination, encapsulating PDUs from the transport layer

What characteristic of a network enables it to quickly grow and support new users

scalability

Which name is assigned to the transport layer PDU

segment

A network admin is measuring bits accross company. What could influence differences in throughput?

the amount of traffic crossing the network, the type of traffic, the latency

A user opens three browsers. what information would the web browsers recieve

the destination port number

What are port numbers included in the tcp header of a segment

to enable a receiving host to forward the data to the appropriate application

What are two ways that TCP uses the sequence numbers in a segment

to identify missing segments at the destination, to reassemble the segments at the remote location

What is the purpose of Ctrl-Shift-6

to interrupt the ping process

What is the purpose of having a converged network

to reduce the cost of deploying and maintaing the communicatin infrastructure

What are two functions of NVRAM

to retain contents when power is removed, to store the startup config fiile

Which procedure is used to reduce the effect of crosstalk in copper cables

twisting opposing circuit wire pairs together


Set pelajaran terkait

Chapter 5: Competitors and Competition

View Set

AUD 6: Code of Professional Conduct (AICPA)

View Set

Topic 2: The purchasing Process: Strategic and Transactional Issues

View Set

Chapter 21: The Respiratory System

View Set

Prioritizing Client Care: Leadership, Delegation, and Emergency Response Planning

View Set