Cisco Network Academy Module Quizzes 14-17
What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
.com
What is the complete range of TCP and UDP well-known ports?
0 to 1023
Which number or set of numbers represents a socket?
192.168.1.1:80
On a home network, which device is most likely to provide dynamic IPv4 addressing to clients on the home network?
A home router
What three configuration steps must be performed to implement SSH access to a router? (Choose three.)
A user account An IP domain name A unique hostname
Which three services are provided by the AAA framework? (Choose three.)
Accounting Authorization Authentication
Which two operations are provided by TCP but not by UDP? (Choose two.)
Acknowledgement received data Retransmitting any unacknowledged data
Which TCP/IP model layer is closest to the end user?
Application
What type of applications are best suited for using UDP?
Application that are sensitive to delay
When should an administrator establish a network baseline?
At regular intervals over a period of time
Which statement is true about CDP on a Cisco device?
CDP can be disabled globally or on specific interfaces
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
Client
What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
Closets to the end user The creation and maintenance of dialogue between source and destination applications
Where are Cisco IOS debug output messages sent by default?
Console line
What factor should be considered in the design of a small network when devices are being chosen?
Cost of devices
A wireless host needs to request an IPv4 address. What protocol would be used to process the request?
DHCP
Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?
DHCP
A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?
DNS
A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
Devices with support for modularity
What is the objective of a network reconnaissance attack?
Discovery and mapping of systems
Which type of network threat is intended to prevent authorized users from accessing resources?
DoS attacks
How does a networked server manage requests from multiple clients for different services?
Each request has a combination of source and destination port numbers, coming from a unique IP address
Which benefit does SSH offer over Telnet for remotely managing a router?
Encryptions
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
Environmental
What is one of the most effective security tools available for protecting users from external threats?
Firewall
Which component is designed to protect against unauthorized communications to and from a computer?
Firewall
For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
Firewall settings
What message type is used by an HTTP client to request data from a web server?
GET
Which protocol uses encryption?
HTTPS
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?
Have a second router that is connected to another ISP
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
IMAP
Why is DHCP for IPv4 preferred for use on large networks?
It is a more efficient way to manage IPv4 addresses than static address assignment is
Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
MPEG HTTP GIF
Which two tasks can be performed by a local DNS server? (Choose two.)
Mapping name-to-IP addresses for internal hosts Forwarding name resolution requests between servers
Which element of scaling a network involves identifying the physical and logical topologies?
Network documentation
Which protocol can be used to transfer messages from an email server to an email client?
POP3
What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?
QoS
What type of attack may involve the use of tools such as nslookup and fping?
Reconnaissance attack
Which network design consideration would be more important to a large corporation than to a small business?
Redundancy
A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
Remote access to a switch where data is encrypted during the session
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 30 attempts 2 within 10
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
SMB
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)
SYN ACK
A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?
Show interfaces
What TCP mechanism is used to enhance performance by allowing a device to continuously send a steady stream of segments as long as the device is also receiving necessary acknowledgements?
Sliding window
Which transport layer feature is used to establish a connection-oriented session?
TCP 3-way handshake
Which statement is true about FTP?
The client can download data from or upload data to the server.
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
The client randomly selects a source port number
What happens if part of an FTP message is not delivered to the destination?
The part of the FTP message that was lost is re-sent
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?
The source decreases that amount of data that it transmits before it receives an acknowledgement from the destination
What is the purpose of using a source port number in a TCP communication?
To keep track of multiple conversations between devices
What is a responsibility of transport layer protocols?
Tracking individual conversations
Which two traffic types require delay sensitive delivery? (Choose two.)
Video Voice
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)
VoIP DNS
What type of traffic would most likely have the highest priority through the network?
Voice
Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?
Worm
What does the term vulnerability mean?
a weakness that makes a target susceptible to an attack
What is a socket?
the combination of a source IP address and port number or a destination IP address and port number
What is the purpose of the network security accounting function?
to keep track of the actions of users
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?
tracert 10.1.1.5