NETI 105 Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are the three parts of an IPv6 global unicast address?

1. global routing prefix 2. subnet ID 3. interface ID

A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation?

1. notifying other devices when errors occur 2. applying security settings to control the flow of data 3. regenerating data signals

A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?

4

The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create?

4096

Which IPv6 address notation is valid?

A. 2001::ABCD:: B. ABCD:160D::4GAB:FFAB C. 2001:0DB8::ABCD::1234 D. 2001:DB8:0:1111::200 <----

Match copper cables, fiber optic, and wireless:

Copper Cables - horizontal cabling structure and desktop PCs in offices in an enterprise Fiber optic - backbone cabling in an enterprise and long-haul networks Wireless - coffee shops and waiting rooms in a hospital

What is the effect of setting the security mode to WEP on a small wireless router?

It encrypts data between the wireless client and the access point

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It forwards the frame out of all ports except for the port at which the frame was received

Which statement describes a characteristic of the traceroute utility?

It identifies the routers in the path from a source host to a destination host

Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?

Request for Comments

A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 192.168.25.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. The administrator knows immediately that this IP will not work. Why?

This is a private IP address

When applied to a router, which command would help mitigate brute-force password attacks against the router?

login block-for 60 attempts 5 within 60

Which interface configuration mode command puts a layer 3 switch interface into layer 3 mode?

no switchport

Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity?

shows the IP address of the next hop router for each route

What information is added during encapsulation at OSI Layer 3?

source and destination IP address

What is one purpose of the TCP three-way handshake?

synchronizing sequence numbers between source and destination in preparation for data transfer

Which two statements describe the characteristics of fiber-optic cabling?

1. Fiber-optic cabling does not conduct electricity 2. Fiber-optic cabling is primarily used as backbone cabling

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?

1. The Source Address field name from IPv4 is kept in IPv6 2. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6

What are the two main components of Cisco Express Forwarding (CEF)?

1. forwarding information base (FIB) 2. adjacency tables

What makes fiber preferable to copper cabling for interconnecting buildings? Three answers:

1. greater bandwidth potential 2. greater distances per cable run 3. limited susceptibility to EMI/RFI

What are two actions performed by a Cisco switch? (Choose two.)

1. utilizing the MAC address table to forward frames via the destination MAC address 2. using the source MAC addresses of frames to build and maintain a MAC address table

A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks?

192.168.99.0/26 192.168.99.64/27

A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?

DHCPACK

Which devices should be secured to mitigate against MAC address spoofing attacks?

Layer 2 devices

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

Match pop and imap:

Place the options in the following order: [+] does not require a centralized backup solution (POP) [+] mail is deleted as it is downloaded (POP) [+] desirable for an ISP or large business (POP) [#] downloads copies of email messages to the client (IMAP) [#] original messages must be manually deleted (IMAP) [#] requires a larger amount of disk space (IMAP) [+] Order does not matter within this group. [#] Order does not matter within this group.

What information does the loopback test provide?

The TCP/IP stack on the device is working correctly

Refer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?

The administrator will be presented with the R1> prompt

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM

A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says "This connection has limited or no connectivity." The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem?

The workstation is unable to obtain an IP address from a DHCP server

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command prevents someone from viewing the running configuration passwords

What is the purpose of ICMP messages?

to provide feedback of IP packet transmissions


Set pelajaran terkait

Fundamentals Medication Administration Review

View Set

biceps, triceps, and coracobrachialis. quiz

View Set

Texas Promulgated Contract Forms Chapter 2

View Set

Colorado Journeyman practice test 1

View Set

Summer Squash, las calabazas de verano, Winter Squash las calabazas de invierno

View Set

Instructions: Language of the Computer

View Set