NETI 109

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish?

testing the integrity of the TCP/IP stack on the local machine

subnet 2 network number

192.168.10.16

subnet 2 broadcast address

192.168.10.19

subnet 3 network number

192.168.10.32

subnet 3 broadcast address

192.168.10.39

subnet 1 network number

192.168.10.64

subnet 1 broadcast address

192.168.10.79

Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?

192.168.235.234

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville?

DoS

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?

a user who is trying to guess a password to access the router

What type of IPv6 address is represented by ::1/128?

loopback

refer to the exhibit. What is the maximum possible throughput between the PC and the server?

128 kb/s

Given network 172.18.109.0, which subnet mask would be used if 6 host bits were available?

255.255.255.192

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?

A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer.

A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection?

Add a connection to the Internet via a DSL line to another ISP.

What is a characteristic of a switch virtual interface (SVI)?​

An SVI is created in software and requires a configured IP address and a subnet mask in order to provide remote access to the switch.

Why is NAT not needed in IPv6?​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF

Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)

Fiber-optic cabling does not conduct electricity. Fiber-optic cabling is primarily used as backbone cabling.

Which statement describes network security?

It ensures sensitive corporate data is available for authorized users

which two acronyms represent the data link sublayers that Ethernet relies upon to operate?(choose two)

LLC MAC

Two network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching?

Packets can be relayed with errors when fast-forward switching is used.

Which two issues can cause both runts and giants in Ethernet networks? (Choose two.)

a malfunctioning NIC half-duplex operations

copy running-config startup-config

R1#

service password-encryption

R1(config)#

ip address 192.168.99.2 255.255.255.0

R1(config-if)#

login

R1(config-line)#

enable

R1>

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

RT1 will send an ARP reply with its own Fa0/0 MAC address.

What service is provided by POP3?

Retrieves email from the server by downloading the email to the local mail application of the client.

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?

SSH

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? input: switch> config t error message: % invalid input detected at '^' marker.

The administrator must first enter privileged EXEC mode before issuing the command.

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM.

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

What happens when a switch receives a frame and the calculated CRC value is different than the value that is in the FCS field?

The switch drops the frame.

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

The switch will forward the frame to all ports except port 4.

STP

This type of copper media is used in industrial or similar environments where there is a lot of interference.

optical fiber

This type of media is used for high transmission speed and can also transfer data over long distances

coaxial

Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.

What are two ways to protect a computer from malware? (Choose two.)

Use antivirus software. Keep software up to date.

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

adds Ethernet control information to network protocol data places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

application presentation session

What does the IP address 192.168.1.15/29 represent?

broadcast address

what does a router do when it receives a Layer 2 frame over the network medium

de-encapulates the frame

Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?

destination IPv4 address

GUI

enables the user to interact with the operating system by pointing and clicking

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN

extended star

Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?

fe80::220:b3f:f0e0:29

Refer to the exhibit. A user issues the command netstat -r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?

fe80::30d0:115:3f57:fe4c/128

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

if there is connectivity with the destination device

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)

network transport

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

nslookup cisco.com ping cisco.com

Which command is used to manually query a DNS server to resolve a specific host name?

nslookup command

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

peer-to-peer

What type of address is 198.133.219.162?

public

What routing table entry has a next hop address associated with a destination network?

remote routes

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

route redirection protocol unreachable

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

segment

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task?

show running-config

what characteristic describes spyware?

software that is installed on a user device and collects information about the user

Refer to the exhibit. What does the value of the window size specify?

the amount of data that can be sent before an acknowledgment is required

Kernel

the part of the OS that interacts directly with the device hardware

shell

the part of the operating system that interfaces with applications and the user

Although C SMA/CD is still a feature of Ethernet, why is it no longer necessary?

the use of full-duplex capable Layer 2 switches

wireless

this type of media provides the most mobility options

What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time?

throughput

CLI

users interact with the operating system by typing commands

Network information:* local router LAN interface: 172.19.29.254 / fe80:65ab:dcc1::10* local router WAN interface: 198.133.219.33 / 2001:db8:FACE:39::10* remote server: 192.135.250.103 What task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command?

verifying that there is connectivity to the internet

To which TCP port group does the port 414 belong?

well-known

which two devices would be described as intermediary devices?(Choose Two.)

wireless LAN controller IPS


Set pelajaran terkait

Unit 6 Chapter 57 Ophthalmic drugs

View Set

General Features of Cells and their Organelles

View Set

Lifespan Midterm Review Questions

View Set

Chapter 9 Teaching and Counseling

View Set

Chapter 11, Chapter 12, Chapter 13

View Set

Cuban Revolution and Fidel Castro

View Set

Life-Span Development Psych Ch. 3

View Set

CEE 320 - Midterm II (Past exam questions)

View Set