Pracrtice Final Exam
What are two features of ARP? (Choose two.)
-If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply. -If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.
A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts?
10.1.1.128/28 10.1.1.144/28 10.1.1.160/29
What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)
192.168.0.0/16,10.0.0.0/8,172.16.0.0/12
Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?
2001:db8:0:f000::/52
Which two statements correctly describe a router memory type and its contents? (Choose two.)
RAM is volatile and stores the IP routing table.ROM is nonvolatile and contains basic diagnostic software.
What type of communication rule would best describe CSMA/CD?
access method
If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?
data link
What three services are provided by the transport layer? (Choose three.)
error recovery, flow control, connection establishment
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
extranet
At a minimum, which address is required on IPv6-enabled interfaces?
link-local
Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two.)
presentation, transport
What is the purpose of ICMP messages?
to provide feedback of IP packet transmissions
A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?
The data flow is being tracked based on the source port number utilized by each application.
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
This command prevents someone from viewing the running configuration passwords.