Cisco Final Exam practice

Ace your homework & exams now with Quizwiz!

What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234? A: 2001:DB8:0:AB00::1234 B: 2001:DB8:0:AB::1234 C: 2001:DB8::AB00::1234 D: 2001:DB8:0:AB:0:1234

A: 2001:DB8:0:AB00::1234

What is the usable number of host IP addresses on a network that has a /26 mask? A: 256 B: 62 C: 64 D: 32 E: 254 F: 16

B: 62

Which two protocols function at the internet layer? (Choose two.) A: PPP B: IP C: POP D: BOOTP E: ICMP

B: IP E: ICMP

For Cisco IOS, which escape sequence allows terminating a traceroute operation? A: Ctrl+Shift+6 B: Ctrl+Esc C: Ctrl+c D: Ctrl+x

A: Ctrl+Shift+6

What is the objective of a network reconnaissance attack? A: discovery and mapping of systems B: disabling network systems or services C: denying access to resources by legitimate users D: unauthorized manipulation of data

A: discovery and mapping of systems

Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two.) A: presentation B: network C: transport D: session E: internet

A: presentation D: session

Which keys act as a hot key combination that is used to interrupt an IOS process? A: Ctrl-Z B: Ctrl-C C: Ctrl-Shift-X D: Ctrl-Shift-6

D: Ctrl-Shift-6

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model? A: slave B: server C: transient D: client E: master

D: client

Match the phases to the functions during the boot up process of a Cisco router. (Not all options are used.) 'phase 1' 'phase 2' 'phase 3' enter setup mode : locate and load the Cisco IOS software : locate and load the startup configuration file : perform the POST and load the bootstrap program :

enter setup mode : locate and load the Cisco IOS software :phase 2 locate and load the startup configuration file :phase 3 perform the POST and load the bootstrap program :phase 1

Match the functions with the corresponding OSI layer. (Not all options are used.) 'windowing' 'dialog maintenance' 'HTTP and FTP' 'compression' 'common format' 'routing' 'end user program functionality' Application layer : : Presentation layer : : Session layer :

Application layer :HTTP and FTP :end user program functionality Presentation layer :compression :common format Session layer :dialog maintenance

Refer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22? A: 172.16.20.255 B: 172.16.16.255 C: 172.16.19.255 D: 172.16.23.255 E: 172.16.255.255

C: 172.16.19.255

What type of communication rule would best describe CSMA/CD? A: message encoding B: message encapsulation C: access method D: flow control

C: access method

Refer to the exhibit. A user issues the command netstat -r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation? A: ::1/128 B: fe80::/64 C: 2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128 D: fe80::30d0:115:3f57:fe4c/128

D: fe80::30d0:115:3f57:fe4c/128

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode? A: letmein B: secretin C: lineconin D: linevtyin

D: linevtyin

At a minimum, which address is required on IPv6-enabled interfaces? A: global unicast B: unique local C: site local D: link-local

D: link-local

Match the requirements of a reliable network with the supporting network architecture. (Not all options are used.) 'fault tolerance' 'scalability' 'security' Protect the network from unauthorized access. : Provide redundant links and devices. : Match the type of communication with a specific priority. : Expand the network without degrading the service for existing users. : Ensure that streaming data is provided over high speed links. :

Protect the network from unauthorized access. :security Provide redundant links and devices. :fault tolerance Match the type of communication with a specific priority. : Expand the network without degrading the service for existing users. :scalability Ensure that streaming data is provided over high speed links. :

A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts? A: 10.1.1.128/28 10.1.1.144/28 10.1.1.160/29 B: 10.1.1.128/26 10.1.1.140/26 10.1.1.158/28 C: 10.1.1.128/28 10.1.1.144/28 10.1.1.160/28 D: 10.1.1.128/26 10.1.1.144/26 10.1.1.160/26 E: 10.1.1.128/28 10.1.1.140/28 10.1.1.158/26

A: 10.1.1.128/28 10.1.1.144/28 10.1.1.160/29

What will be the result of failed login attempts if the following command is entered into a router? 'login block-for 150 attempts 4 within 90' A: All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds. B: All login attempts will be blocked for 90 seconds if there are 4 failed attempts within 150 seconds. C: All login attempts will be blocked for 1.5 hours if there are 4 failed attempts within 150 seconds. D: All login attempts will be blocked for 4 hours if there are 90 failed attempts within 150 seconds.

A: All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds.

A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? A: DSL B: dial-up C: satellite D: cell modem E: cable modem

A: DSL

What are the two sublayers of the OSI model data link layer? (Choose two.) A: MAC B: LLC C: internet D: physical E: transport F: network access

A: MAC B: LLC

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests? A: Nothing can be determined for sure at this point. B: The NIC in the PC is bad. C: The router that is attached to the same network as the workstation is down. D: The TCP/IP protocol is not enabled.

A: Nothing can be determined for sure at this point.

Which message delivery option is used when all devices need to receive the same message simultaneously? A: broadcast B: duplex C: multicast D: unicast

A: broadcast

What three services are provided by the transport layer? (Choose three.) A: connection establishment B: error recovery C: data representation D: path determination E: flow control F: encryption of data G: bit transmission

A: connection establishment B: error recovery E: flow control

What is a basic characteristic of the IP protocol? A: connectionless B: user data segmentation C: reliable end-to-end delivery D: media dependent

A: connectionless

If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device? A: data link B: physical C: Layer 3 D: Layer 4

A: data link

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52? A: 2001:db8:0:8000::/52 B: 2001:db8:0:f000::/52 C: 2001:db8:0:f::/52 D: 2001:db8:0:f00::/52

B: 2001:db8:0:f000::/52

What is the purpose of the SVI on a Cisco switch? A: The SVI adds Layer 4 connectivity between VLANs. B: The SVI provides a physical interface for remote access to the switch. C: The SVI provides a virtual interface for remote access to the switch. D: The SVI provides a faster method for switching traffic between ports on the switch.

C: The SVI provides a virtual interface for remote access to the switch.

What are two features of ARP? (Choose two.) A: If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment. B: If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. C: When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses. D: An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and its multicast MAC address. E: If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

B: If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. E: If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

Which statement describes a characteristic of the traceroute utility? A: It is primarily used to test connectivity between two hosts. B: It identifies the routers in the path from a source host to a destination host. C: It sends four Echo Request messages. D: It utilizes the ICMP Source Quench messages.

B: It identifies the routers in the path from a source host to a destination host.

What is done to an IP packet before it is transmitted over the physical medium? A: It is encapsulated into a TCP segment. B: It is encapsulated in a Layer 2 frame. C: It is segmented into smaller individual pieces. D: It is tagged with information guaranteeing reliable delivery.

B: It is encapsulated in a Layer 2 frame.

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? A: The administrator must connect via the console port to access global configuration mode. B: The administrator must first enter privileged EXEC mode before issuing the command. C: The entire command, configure terminal , must be used. D: The administrator is already in global configuration mode.

B: The administrator must first enter privileged EXEC mode before issuing the command.

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows? A: The data flow is being tracked based on the destination IP address that is used by the PC of the technician. B: The data flow is being tracked based on the source port number that is used by each application. C: The data flow is being tracked based on the destination MAC address of the technician PC. D: The data flow is being tracked based on the source IP address that is used by the PC of the technician.

B: The data flow is being tracked based on the source port number that is used by each application.

An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination? A: The part of the television transmission that was lost is re-sent. B: The transmission continues without the missing portion. C: A delivery failure message is sent to the source host. D: The entire transmission is re-sent.

B: The transmission continues without the missing portion.

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​ A: all IPv6 enabled devices across the network​ B: all IPv6 configured routers on the local link​ C: all IPv6 DHCP servers​ D: all IPv6 enabled devices on the local link​

B: all IPv6 configured routers on the local link​

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.) A: size of the network B: electromagnetic interference C: crosstalk D: signal modulation technique E: bandwidth

B: electromagnetic interference C: crosstalk

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? A: extendednet B: extranet C: Internet D: intranet

B: extranet

What type of communication medium is used with a wireless LAN connection? A: fiber B: radio waves C: microwave D: UTP

B: radio waves

What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.) A: 239.0.0.0/8 B: 169.254.0.0/16 C: 172.16.0.0/12 D: 192.168.0.0/16 E: 10.0.0.0/8 F: 100.64.0.0/14

C: 172.16.0.0/12 D: 192.168.0.0/16 E: 10.0.0.0/8

Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names? (Choose two.) A: SMTP B: WINS C: DNS D: DHCP E: HTTP

C: DNS D: DHCP

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? A: It initiates an ARP request. B: It broadcasts the frame out of all ports on the switch. C: It forwards the frame out of all ports except for the port at which the frame was received. D: It notifies the sending host that the frame cannot be delivered.

C: It forwards the frame out of all ports except for the port at which the frame was received.

Which two statements correctly describe a router memory type and its contents? (Choose two.) A: ROM is nonvolatile and stores the running IOS. B: FLASH is nonvolatile and contains a limited portion of the IOS​. C: RAM is volatile and stores the IP routing table. D: NVRAM is nonvolatile and stores a full version of the IOS. E: ROM is nonvolatile and contains basic diagnostic software.

C: RAM is volatile and stores the IP routing table. E: ROM is nonvolatile and contains basic diagnostic software.

What best describes the destination IPv4 address that is used by multicasting? A: a 48 bit address that is determined by the number of members in the multicast group B: an IP address that is unique for each destination in the group C: a single IP multicast address that is used by all destinations in a group D: a group address that shares the last 23 bits with the source IPv4 address

C: a single IP multicast address that is used by all destinations in a group

When a network administrator is trying to manage network traffic on a growing network, when should traffic flow patterns be analyzed? A: during randomly selected times B: during off-peak hours C: during times of peak utilization D: during employee holidays and weekends

C: during times of peak utilization

In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do? A: send an error message to the sending device B: add random data bytes to make the frame 1518 bytes long and then forward it C: process the frame as it is D: drop the frame

C: process the frame as it is

Which two automatic addressing assignments are supported by DHCPv4? (Choose two.) A: physical address of the sender B: physical address of the recipient C: subnet mask D: local server address E: default gateway address

C: subnet mask E: default gateway address

What is the purpose of ICMP messages? A: to inform routers about network topology changes B: to ensure the delivery of an IP packet C: to provide feedback of IP packet transmissions D: to monitor the process of a domain name to IP address resolution

C: to provide feedback of IP packet transmissions

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? A: destination IP address B: Ethernet type C: source IP address D: destination MAC address E: source MAC address

D: destination MAC address

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? A: ring B: bus C: star D: mesh E: hierarchical

D: mesh

What PDU is associated with the transport layer? A: bits B: packet C: frame D: segment

D: segment

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? A: This command automatically encrypts passwords in configuration files that are currently stored in NVRAM. B: This command enables a strong encryption algorithm for the enable secret password command. C: This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance. D: This command encrypts passwords as they are transmitted across serial WAN links. E: This command prevents someone from viewing the running configuration passwords.

E: This command prevents someone from viewing the running configuration passwords.

Match the descriptions to the terms. (Not all options are used.) 'users interact with the operating system by typing commands' 'enables the user to interact with the operating system by pointing and clicking' 'the part of the operating system that interfaces with applications and the user' 'the part of the OS that interacts directly with the device hardware' Telnet : CLI : GUI : kernel : shell :

Telnet : CLI :users interact with the operating system by typing commands GUI :enables the user to interact with the operating system by pointing and clicking kernel :the part of the OS that interacts directly with the device hardware shell :the part of the operating system that interfaces with applications and the user


Related study sets

Financial Markets Chapter 14 The Mortgage Markets

View Set

Unit 3 Final Exam (Study Guide 3)

View Set

Native Americans - True or false?

View Set

2.7 Visual Communication Design (PART OF FINAL)

View Set

Chapter 6 Anatomy Reading Objectives

View Set

3. Corporate Social Responsibility and Citizenship

View Set