Practice Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

remote access to a switch where data is encrypted during the session

DNS

resolves Internet names to IP addresses

Which command can an administrator execute to determine what interface a router will use to reach remote networks?

show ip route

DHCPACK

the DHCP server confirming that the address lease has been accepted

A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?

the broadcast MAC address

DHCPREQUEST

the client accepting the IP address provided by the DHCP server

Which 2 criteria are used to help select a network medium for a network?

the distance the selected medium can successfully carry a signal, the environment where the selected medium is to be installed

Which factor does not influence throughput?

the operating system that is used by end devices

Which type of address does a switch use to build the MAC address table?

the subnet broadcast IP address

What is the purpose of the subnet mask in conjunction with an IP address?

to determine the subnet to which the host belongs

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

tunneling

When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?

logical topology diagram

At which layer of the OSI model would a logical address be encapsulated?

network layer

Which solution allows external users to access only an internal FTP server on a private network?

port forwarding

Which three attacks exploit human behavior? (Choose three.)

pretexting, Phishing, Vishing

SSH

provides remote access to servers

Router (config-line)# password class

provides security on the console

A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)? (Choose two.) -when a host is sending packets to a local server in order to update the network media settings and music playlists -when a host is sending packets to the ISP in order to request a speed increase for Internet services -when a host is sending a print job to a network printer on the LAN -when a host is sending packets to a remote site owned by the manufacturer of the wireless router in order to request a digital copy of the device manual -when a host is sending HTTP packets to the wireless router in order to update the network addressing of the LAN

-when a host is sending packets to the ISP in order to request a speed increase for Internet services -when a host is sending packets to a remote site owned by the manufacturer of the wireless router in order to request a digital copy of the device manual

Which wireless RF band do IEEE 802.11b/g devices use?

2.4 GHz

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

251

A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?

Internet

Spyware

gathers personal information about a user without permission or knowledge

Which 2 devices are considered end devices?

laptop, printer

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

line console 0 login password cisco

Refer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?

255.255.255.255

Which two statements describe characteristics of network addresses? (Choose two.)

A MAC address is also referred to as a physical address because it is permanently embedded on the NIC. A valid public IPv4 or IPv6 address is needed in order for devices to communicate over the internet.

What are three characteristics of multicast transmission? (Choose three.)

A single packet can be sent to a group of hosts. Multicast transmission can be used by routers to exchange routing information. The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network

Which statement correctly describes data transmission at the transport layer?

Both UDP and TCP use port numbers.

Refer to the exhibit. Which router port connects to the modem provided by the service provider?

C

An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are

DDoS

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

Disable SSID broadcast

Which 2 types of interference may affect the data throughput on UTP cables?

EMI, crosstalk

What is a characteristic of peer-to-peer application?

Each device using the application provides a user interface and runs a background service

When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)

Generate the asymmetric RSA keys. Configure the correct IP domain name. Create a valid local username and password database.

While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)

IMAP4 SMTP POP3

Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)

IOS image file, startup configuration

Using a systematic troubleshooting approach, a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information, which two questions are associated with Layer 3? (Choose two.)

Is the PC configured for DHCP? From the PC, is the default gateway reachable using the ping command?

What are two benefits of using a layered network model?

It assists in protocol design. It prevents technology in one layer from affecting other layers.

What is an inherent security vulnerability of SSID broadcasting?

It broadcasts the identity of the network.

What is the effect of setting the security mode to WEP on a small wireless router?

It encrypts data between the wireless client and the access point.

Using default settings, what is the next step in the switch boot sequence after the IOS loads from flash?

Locate & load the startup-config file from NVRAM

Which type of device filtering can be enabled on some wireless access points or wireless routers?

MAC address

During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move a few workstations cannot get a valid IP address. What should be checked first to identify the root cause of the problem?

Make sure the cables are functional and properly plugged.

A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?

NFC

Which type of access is secured on a Cisco router or switch with the enable secret command?

Privileged EXEC

What is an advantage of using standards to develop & implement protocols?

Products from different manufacturers can interoperate successfully

A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?

Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF

What are 2 wiring schemes defined by the TIA/EIA organization for Ethernet installation in homes and businesses?

T568A, T568B

A customer calls the help line to report a computer problem. The help line technician responds and works with the customer for some time. However, the technician cannot identify the root cause of the problem. What should the technician do to help the customer?

Tell the customer that a ticket is created and another technician will contact the user soon.

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host can communicate with other hosts on the network, but is unable to communicate with hosts on remote networks

If the default gateway is configured incorrectly on a host, what is the impact on communications?

The host is unable to communicate with hosts on remote networks.

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

The packet will be sent directly to the destination host

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

The switch can be remotely managed. One device is attached to a physical interface. The default SVI has been configured.

What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)

UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time.

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

Virtualization

What type of technology converts analog voice signals into digital data?

VoIP

A User is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network & provide access to the internet for multiple home devices?

Wireless router

DHCPOFFER

a DHCP server responding to the initial request by a client

DHCPDISCOVER

a client initiating a message to find a DHCP server

RouterA(config)#

add a password required to access the privileged EXEC mode

pop-ups

advertisement windows that display when visiting a site

Tracking Cookies

allow personalization for visited web sites

A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command on a Cisco switch. Which term is used to describe the "0/1" part in the command?

argument

DHCP

automatically configures hosts with IP addresses

An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?

brute force

RouterA(config-if)#

configure a WAN interface

RouterA(config-line)#

configure vty lines

Router(config)# hostname CL1

configures a name on the router

In software defined network architecture, what function is removed from network devices and performed by an SDN controller?

control plane

What are two common media used in networks?

copper and fiber

Router(config)#banner motd#

displays a message when the router is accessed

A network administrator installs a network device that focuses on interconnecting independent local networks. At which layer of devices does this technology reside?

distribution

RouterA#

enter configuration mode


Set pelajaran terkait

Lesson 02: Introduction to Project Management (Quiz)

View Set

CGS 3175 - Internet Applications Test 1 Study Guide

View Set