CIS230 Presentation Solutions
Which two commands can be used on a Windows host to display the routing table?
route print and netstat -r
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?
2001:DA48:FC5:A4::/64
global routing prefix
This network portion of the address that is assigned by the provider
interface ID
This part of the address is the equivalent to the host portion of an IPv4 address
What are the two most effective ways to defend against malware>
Updating the operating system and other application software Install and update antivirus software
Which traffic types use the Real-Time Transport Protocol (RTP)?
Voice and Video
retransmission
method of managing segments of data loss
window size
number of bytes a destination device can accept and process at one time
Layer 3
Source IP Address, and TTL
Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)
Application, Presentation, and Session
A client packet is received by a server. The packet has a destination port of 67. What service is the client requesting?
DHCP
Which two protocols function at the top layer of the TCP/IP protocol suite?
DNS and POP
Layer 4
Destination Port Number, and Acknowledgment Number
Layer 2
FCS (Frame Check Sequence), 802.2 header, and Destination MAC Address
What are two ARP features?
If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply
What two pieces of information are displayed in the output of the show ip interface brief command?
Layer 1 statuses and IP addresses
What attribute of a NIC would place it at the data link layer of the OSI model?
MAC Address
peer-to-peer application
Requires a specific user interface A background service is required
What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts in other networks
Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)
There are 4 hops between this device and the device at 192.168.100.1 There is connectivity between this device and the device at 192.168.100.1
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?
authorization
MAC Address
contained in the Layer 2 header, separated into OUI and a unique identifier, and 48 bits
IP Address
contained in the Layer 3 header, separated into a network portion and a unique identifier, and 32 or 128 bits
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network?
coverage areas, interference, and security
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
exit privileged EXEC mode and press Enter
240.2.6.255
experimental address
Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?
frame check sequence field
What are the three parts of an IPv6 global unicast address?
global routing prefix, interface ID, and subnet ID
What are the common causes of signal degradation when using UTP cabling?
improper termination, and low-quality cable or connectors
What command can be used on a Windows PC to see the IP configuration of that computer?
ipconfig
198.133.219.2
public address
An user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?
the MAC address of the default gateway
What technique is used with UTP cable to help protect against signal interference from crosstalk?
twisting the wires together into pairs
What is the consequence of configuring a router with an IPv6 unicast-routing global configuration command?
The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages
What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?
255.255.255.192
What single subnet mask would be appropriate to use for the three subnetworks?
255.255.255.240
A network administrator is adding a new LAN to an office branch. The new LAN support 4 connected devices. What is the smallest network mask that can the network administrator can be used for the new network?
255.255.255.248
Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate communication?
handles communication between upper-layer networking software and Ethernet NIC hardware enables IPv4 and IPv6 to utilize the same physical medium
Network B
192.168.0.128/26
Network C
192.168.0.192/27
Network D
192.168.0.224/30
Network A
192.168.0.0/25
Which scenario describes a function provided by the transport layer?
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer?
Capture traffic during peak utilization times to get a good representation of the different traffic types Perform the capture on different network segments
What happens when the transport input ssh command is entered on the switch vty lines>?
Communication between the switch and the remote users is encrypted
How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords that are stored in router or switch configuration files.
A host is trying to send a packet on a remote LAN segment, but there are currently no mappings in the ARP echo. How will the device obtain a destination MAC Address
It will send an ARP request for the MAC Address of the default gateway
What are two decisions that can be caused by a large number of ARP request and reply messages?
The ARP request is sent as a broadcast, and will flood the entire subnet. All ARP request messages must be proceeded by all nodes on the local network
Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?
Layer 2 destination address = 00-00-0c-94-36-ab; Layer 2 source address = 00-00-0c-94-26-bb; Layer 3 destination address = 172.16.20.200; Layer 3 source address = 172.16.10.200
What service is provided by BOOTP?
Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.
What is an advantage for small organizations of adopting IMAP instead of POP3?
Messages are kept in the mail servers until they are manually deleted from the email client
What is a benefit of using cloud computing in networking?
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
peer-to-peer network
No dedicated server is required Client and server roles are set on a per request basis
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?
The Source Address field name from IPv4 is kept in IPV6 The Version field from IPv4 is not kept in IPv6
Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
The administrator must first enter privileged EXEC mode before issuing the command.
subnet ID
This part of the address is used by an organization to identify subnets.
What characteristics describe antispyware?
applications that protect end devices from becoming infected with malicious software
What is one main characteristic of the data link layer?
it shields the upper layer protocol from being aware of the physical medium to be used in the communication
169.254.1.5
link-local address
127.0.0.1
loopback address
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increase
What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)
message encoding, message size, and delivery options
What are two characteristics of IP?
operates independently of the network media does not require a dedicated end-to-end connection
What are propriety protocols?
protocols developed by organizations who have control over their definition and operation
An employee of a large company remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activates within seconds. The disruption is not noticed by the employee of the other employees. What three network characteristics are described in this scenario?
quality of service, fault tolerance, and security
acknowledgement
received by a sender before transmitting more segments in a session
Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?
remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0
During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?
switch the packet to the directly connected interface
What are two characteristics shared by TCP and UDP?
use of checksum and port numbering
sequence numbers
used to identify missing segments of data
Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?
worm