ccnA FINAL

Ace your homework & exams now with Quizwiz!

Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)

*Capture traffic during peak utilization times to get a good representation of the different traffic types. *Perform the capture on different network segments.

The new LAN must support 90 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.128

A network administrator wants to have the same subnet mask for three subnetworks at a small site. whats the subnet mask

255.255.255.240

The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.248

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

256

What service is provided by POP3?

Retrieves email from the server by downloading the email to the local mail application of the client.

What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)

The ARP request is sent as a broadcast, and will flood the entire subnet. All ARP request messages must be processed by all nodes on the local network.

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​

The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages

The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?

The switch can be remotely managed from a host on another network.

On the basis of the output, which two statements about network connectivity are correct?

There are 4 hops between this device and the device at 192.168.100.1. There is connectivity between this device and the device at 192.168.100.1.

What are the two most effective ways to defend against malware? (Choose two.)

Update the operating system and other application software. Install and update antivirus software.

What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

accessing the media data encapsulation

What characteristic describes antispyware?

applications that protect end devices from becoming infected with malicious software

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

interference security coverage area

What does the term "attenuation" mean in data communication

loss of signal strength as distance increases

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)

message size message encoding delivery options

What are two functions that are provided by the network layer? (Choose two.)

providing end devices with a unique network identifier directing data packets to destination hosts on other networks

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

route print netstat -r

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

store-and-forward

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

switch the packet to the directly connected interface

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

the MAC address of the default gateway

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs

What two security solutions are most likely to be used only in a corporate environment? (Choose two.)

virtual private networks intrusion prevention systems

Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)

POP DNS

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?

authorization

What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)

1 Neighbor Solicitation 2 Router Advertisement

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

1 The source port field identifies the running application or service that will handle data returning to the PC. 2 UDP segments are encapsulated within IP packets for transport across the network. 3 The UDP destination port number identifies the application or service on the server which will handle the data.

What are two characteristics of IP? (Choose two.)

does not require a dedicated end-to-end connection operates independently of the network media

What are two common causes of signal degradation when using UTP cabling? (Choose two.)

improper termination low-quality cable or connectors

What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)

neighbor solicitations neighbor advertisements

A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

nslookup

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)

Destination IP addresses in a packet header remain constant along the entire path to a target host. It shields the upper layer protocol from being aware of the physical medium to be used in the communication.

What are three characteristics of the CSMA/CD process? (Choose three.)

1 A device listens and waits until the media is not busy before transmitting. 2 After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. 3 All of the devices on a segment see data that passes on the network medium.

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?

1E6F:65FF:FEC2:BDF8

Which scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

It encrypts passwords that are stored in router or switch configuration files.

It encrypts passwords that are stored in router or switch configuration files.

A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.)

Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. Fiber optic provides higher data capacity but is more expensive than copper cabling.

A client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting?

HTTP

What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)

IP addresses Layer 1 statuses

What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

enables IPv4 and IPv6 to utilize the same physical medium places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame

Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?

frame check sequence field

A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network?

tracert

What service is provided by HTTP?

A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.

What happens when the transport input ssh command is entered on the switch vty lines?

Communication between the switch and remote users is encrypted.

A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting?

DHCP

Which range of link-local addresses can be assigned to an IPv6-enabled interface?

FE80::/10


Related study sets

~Module 2, Topic 1: The Highway Transportation System~

View Set