CTS1650 Final

Ace your homework & exams now with Quizwiz!

What is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64?

A9CD:47FF:FE57:FE94

Which device is used by other network devices to authenticate and authorize management access?

AAA server

Which of the following DNS record types is used to resolve IPv6 addresses?

AAAA

Which peer-to-peer application allows users to share pieces of many files with each other at the same time?

BitTorrent

A wireless host needs to request an IPv4 address. What protocol would be used to process the request?

DHCP

This zone is used to house servers that should be accessible to outside users.

DMZ

Which two are protocols that belong in the OSI application layer?

DNS / SMTP

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

DNS / VoIP

What Windows 10 tool is useful to determine which applications are using network services on a host?

Data Usage

Which two types of ICMP messages are common to both ICMPv4 and ICMPv6? (Choose two.)

Destination or Service Unreachable / Time Exceeded

Which type of network threat is intended to prevent authorized users from accessing resources?

DoS attacks

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?

.com

Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)

10.5.4.1, 10.5.4.99

Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. What is the network address of Host-A?

172.16.0.0

Which number or set of numbers represents a socket?

192.168.1.1:80

Which of these ports are used by FTP? (Choose two.)

20 / 21

What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?

2001:DB8:0:AB00::1234

What is the prefix associated with the IPv6 address 2001:DB8:D15:EA:CC44::1/64?

2001:DB8:D15:EA::/64

What is the most compressed representation of the IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001?

2001:db8:0:abcd::1

What subnet mask is represented by the slash notation /20?

255.255.240.0

A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.224. How many usable host addresses will this subnet provide?​

30

How many usable IP addresses are available on the 192.168.1.0/27 network?

30

Given a /32 Global Routing Prefix and a /64 prefix, how many bits would be allocated for the Subnet ID?

32

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

62

Which two statements are correct about public IPv4 addresses? (Choose two.)

To access a device over the internet, the destination IPv4 address must be a public address. / Public IPv4 address exhaustion is a reason why there are private IPv4 address and why organizations are transitioning to IPv6.

What field is used to provide flow control?

Window Size

Which software installed on key hosts can reveal the types of network traffic flowing through the network?

Wireshark

What are three parts of an IPv6 global unicast address? (Choose three.)

a global routing prefix that is used to identify the network portion of the address that has been provided by the ISP / a subnet ID that is used to identify networks inside of the local enterprise site / an interface ID that is used to identify the local host on the network

On a home network, which device is most likely to provide dynamic IPv4 addressing to clients on the home network?

a home router

What does the term vulnerability mean?

a weakness that makes target susceptible to an attack

George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of "file" and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George's workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario?

access attack

Which is appropriate for providing endpoint security?

antivirus software

This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts.

application

Which TCP/IP model layer is closest to the end user?

application

These three OSI layers define the same functions as the TCP/IP model application layer.

application / presentation / session

What are two forms of software programs or processes that provide access to the network? (Choose two.)

application layer service / network applications

What type of applications are best suited for using UDP?

applications that are sensitive to delay

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

IMAP

What is necessary to plan and use when implementing a network?

IP addressing scheme

What is indicated by a successful ping to the ::1 IPv6 address?

IP is properly installed on the host

Why is DHCP for IPv4 preferred for use on large networks?

It is a more efficient way to manage IPv4 addresses than static address assignment is

What is the purpose of the command ping ::1?

It tests the internal configuration of an IPv6 host.

Which dynamic addressing method for GUAs is the one where devices rely solely on a DHCPv6 server for their addressing information?

Method 3 : Stateful DHCPv6

Which of the following DNS resource record types resolves authoritative name servers?

NS

Which protocol can be used to transfer messages from an email server to an email client?

POP3

This message type is used when uploading data files to a web server.

POST

Which two statements are correct about private IPv4 addresses? (Choose two.)

Private IPv4 addresses are assigned to devices within an organization's intranet (internal network). / Any organization (home, school, office, company) can use the 10.0.0.0/8 address.

Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?

RIR's

Which type of ICMPv6 message would a host send to acquire an IPv6 configuration when booting up?

Router Solicitation (RS) message

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?

SMB

This protocol is used by a client to send email to a mail server.

SMTP

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

SYN / ACK

Which control bit flags are used during the three-way handshake?

SYN and ACK

Which two network protocols are used to establish a remote access network connection to a device? (Choose two.)

Secure Shell (SSH) / Telnet

Which field in an IPv6 GUA is used for subnetting?

Subnet ID

What happens when a sending host senses there is congestion?

The sending host reduces the number of bytes it sends before receiving an acknowledgement from the destination host.

Which statement is true about variable-length subnet masking?

The size of each subnet may be different, depending on requirements.

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination

Which three services are provided by the AAA framework? (Choose three.)

authorization / accounting / authentication

Which address type is not supported in IPv6?

broadcast

Which elements are required to scale to a larger network? (Choose two.)

budget / network documentation

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

client

What are two characteristics of the application layer of the TCP/IP model? (Choose two.)

closest to the end user / the creation and maintenance dialogue between source and destination applications

Which three are transport layer responsibilities? (Choose three.)

conversation multiplexing / segmenting data and reassembling segments / tracking individual conversations

Which factor must be considered when selecting network devices?

cost

What kind of threat is described when a threat actor alters data records?

data loss or manipulation

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

data loss or manipulation

A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario?

denial of service (DoS) attack

Angela, an IT staff member at ACME Inc., notices that communication with the company's web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME'S web server. What type of attack is described in this scenario?

denial of service (DoS) attack

What is the most important motivating factor for moving to IPv6?

depletion of IPv4 addresses

At a minimum, which address is required on IPv6-enabled interfaces?

link-local

What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?

link-local

Which type of IPv6 address is not routable and used only for communication on a single subnet?

link-local address

What TCP mechanism is used to enhance performance by allowing a device to continuously send a steady stream of segments as long as the device is also receiving necessary acknowledgements?

sliding window

Which two situations are the result of excessive broadcast traffic? (Choose two)

slow network operation / slow device operations

A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection?

terminal monitor

A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?

test the theory to determine the cause

Which IPv6 network prefix is only intended for local links and can not be routed?

FE80::/10

Which two applications would use the TCP transport layer protocol? (Choose two.)

FTP / HTTP

True or False. RA messages are sent to all IPv6 routers by hosts requesting addressing information.

False

True or false? A DNS server that receives a request for a name resolution that is not within its DNS zone will send a failure message to the requesting client.

False

True or false? HTTP is a secure protocol.

False

True or false? Resource sharing over SMB is only supported on Microsoft operating systems.

False

True or false? The peer-to-peer networking model requires the implementation of a dedicated server for data access.

False

What message type is used by an HTTP client to request data from a web server?

GET

Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)

GIF / MPEG / HTTP

This protocol is used by a web browser to establish a connection to a web server.

HTTP

Which protocol uses encryption?

HTTPS

A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies. What conclusion can be drawn based on this connectivity test?

The TCP/IP implementation is functional

Which statement is true about FTP?

The client can download data from or upload data to the server

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

The client randomly selects a source port number

True or false? FTP data transfers take place from client to server (push) and from server to client (pull).

True

True or false? In a peer-to-peer network environment every peer can function as both a client and a server.

True

How many connections are required by FTP between client and server?

Two (over ports 20 and 21)

Which of the following is a feature of the Gnutella protocol?

Users can share whole files with other users

What is the objective of a network reconnaissance attack?

discovery and mapping of systems

What kind of threat is described when a threat actor overloads a network to deny other users network access?

disruption of service

What kind of threat is described when a threat actor prevents legal users from accessing data services?

disruption of service

Which of the following techniques use native IPv6 connectivity?

dual stack

Which benefit does SSH offer over Telnet for remotely managing a router?

encryption

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?

environmental

A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next?

escalate the trouble ticket to the manager to approve the change

This is a function of the OSI session layer.

exchange of information to initiate dialog between peers

Which component is designed to protect against unauthorized communications to and from a computer?

firewall

Which device controls traffic between two or more networks to help prevent unauthorized access?

firewall

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?

firewall settings

What is one of the most effective security tools available for protecting users from external threats?

firewalls

What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?

identity theft

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

identity theft

What kind of threat is described when a threat actor is stealing the user database of a company?

information theft

What kind of threat is described when a threat actor steals scientific research data?

information theft

Which is a feature of IMAP?

it downloads a copy of email messages leaving the original on the server

Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario?

malware attack

Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah's computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?

malware attack

Which two tasks can be performed by a local DNS server? (Choose two.)

mapping name-to-IP addresses for internal hosts / forwarding name resolution requests between servers

What message is sent by a host to check the uniqueness of an IPv6 address before using that address?

neighbor solicitation

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.)

no debug ip icmp / undebug all

MKV, GIF, and JPG standards are associated with which OSI layer?

presentation

What is required to classify traffic according to priority?

quality of service (QoS)

What type of attack may involve the use of tools such as nslookup and fping?

reconnaissance

Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario?

reconnaissance attack

What is required to maintain a high degree of reliability and eliminate single points of failure?

redundancy

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

remote access to a switch where data is encrypted during the session

Which two operations are provided by TCP but not by UDP? (Choose two.)

retransmitting any unacknowledged data / acknowledging received data

What is a socket?

the combination of a source IP address and port number or a destination IP address and port number

Which of the following is displayed by the nslookup utility?

the configured default DNS server

Which statement correctly relates to a small network?

the majority of businesses are small

What happens if part of an FTP message is not delivered to the destination?

the part of the FTP message that was lost is re-sent.

What is the purpose of using a source port number in a TCP communication?

to keep track of multiple conversations between devices

What is the purpose of the network security accounting function?

to keep track of the action of a user

What is a responsibility of transport layer protocols?

tracking individual conversations

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)

user account / unique hostname / IP domain name

Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?

validation

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?

worm

What is the recommended prefix length for most IPv6 subnets?

/64

Host-A has the IPv4 address and subnet mask 192.168.1.50 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)

192.168.1.1, 192.168.1.100

Which subnet mask would be used if 5 host bits are available?

255.255.255.224

How does a networked server manage requests from multiple clients for different services?

each request has a combination of source and destination port numbers, coming from a unique IP address

Which Windows command would display the protocols in use, the local address and port numbers, the foreign address and port numbers, and the connection state?

netstat

What is a function of the tracert command that differs from the ping command when they are used on a workstation?

the tracert command shows the information of routers in the path

Which port group includes port numbers for FTP, HTTP, and TFTP applications?

well-known ports

Which two fields are the same in a TCP and UDP header? (Choose two.)

Destination Port Number / Source Port Number

What are the two methods a device can use to generate its own IPv6 interface ID?

EUI-64 / Randomly Generated

True or False: The Subnet ID field in an GUA must borrow bits from the interface ID.

False

Which protocol is used by IPv4 and IPv6 to provide error messaging?

ICMP

Which protocol provides feedback from the destination host to the source host about errors in packet delivery?

ICMP

Which TCP header statement is true?

It consists of 10 fields in a 20-byte header

Which UDP header statement is true?

It consists of 4 fields in an 8-byte header

What type of IPv6 address begins with fe80?

LLA

Which type of IPv6 unicast address is not routable between networks?

LLA

What field is used by the destination host to reassemble segments into the original order?

Sequence Number

Which transport layer feature is used to establish a connection-oriented session?

TCP 3-way handshake

True or False: 4 out of 5 RIRs no longer have enough IPv4 addresses to allocate to customers on a regular basis.

True

True or False? IPv6 was designed with subnetting in mind.

True

Which of the following is a stateless best-effort delivery transport layer protocol?

UDP

Which transport layer protocol statement is true?

UDP is a best-effort delivery protocol

Which UDP datagram reassembly statement is true?

UDP reassembles the data in the order that it was received.

Which transport layer protocol would be used for VoIP applications?

User Datagram Protocol (UDP)

How many exchanges are needed to end both sessions between two hosts?

four exchanges

What does the IP address 172.17.4.250/24 represent?

host address

Which two parts are components of an IPv4 address? (Choose two.)

network portion, host portion

Which command can be used to test connectivity between two devices using echo request and echo reply messages?

ping

Which utility uses the Internet Control Messaging Protocol (ICMP)?

ping

Which devices will not forward an IPv4 broadcast packet by default?

router

Which two things can be determined by using the ping command? (Choose two.)

the destination device is reachable through the network / the average time it takes a packet to reach the destination and for the response to return to the source

Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?

time exceeded

What is the purpose of the subnet mask in conjunction with an IP address?

to determine the subnet to which the host belongs

What is the minimum configuration for a router interface that is enabled for IPv6?

to have a link-local IPv6 address

Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?

to identify the network address of the destination network

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to test that the host has the capability to reach hosts on other networks

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?

traceroute

A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?

tracert

Which layer is responsible for establishing a temporary communication session between the source and destination host applications?

transport layer

A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?

"."

What is the prefix length notation for the subnet mask 255.255.255.224?

/27

What is the complete range of TCP and UDP well-known ports?

0 to 1023

Assume a host with IP address 10.1.1.10 wants to request web services from a server at 10.1.1.254. Which of the following would display the correct socket pair?

10.1.1.10:1099, 10.1.1.254:80

Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. What is the network address of Host-A?

10.5.4.0

Given a /48 Global Routing Prefix and a /64 prefix, what is the subnet portion of the following address: 2001:db8:cafe:1111:2222:3333:4444:5555

1111

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

14

Your organization is issued the IPv6 prefix of 2001:db8:130f::/48 by your service provider. With this prefix, how many bits are available for your organization to create /64 subnetworks if interface ID bits are not borrowed?

16

Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)

172.16.4.99, 172.16.0.1

What is the network address for the IPv6 address 2001:DB8:AA04:B5::1/64?

2001:DB8:AA04:B5::/64

Which subnet mask would be used if exactly 4 host bits are available?

255.255.255.240

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?

4

If a network device has a mask of /26, how many IP addresses are available for hosts on this network?

62

Why is UDP desirable for protocols that make a simple request and reply transactions?

Low Overhead

Which dynamic addressing method for GUAs is the one where devices rely solely on the contents of the RA message for their addressing information?

Method 1 : SLAAC

Which dynamic addressing method for GUAs is the one where devices get their IPv6 configuration in a RA message and request DNS information from a DHCPv6 server?

Method 2: SLAAC and Stateless DHCPv6

Which of the following would be valid source and destination ports for a host connecting to an email server?

Source : 49152, Destination : 25

Which of the following would be valid source and destination ports for a host connecting to a DNS server?

Source : 49152, Destination : 53

Which transport layer protocol ensures reliable same-order delivery?

TCP

Which two applications would use the UDP transport layer protocol? (Choose two.)

TFTP / VoIP

Which part of a GUA is assigned by the ISP?

Global Routing Prefix

What field content is used by ICMPv6 to determine that a packet has expired?

Hop Limit field


Related study sets

Lesson 7 - Winning the War in Europe (100%)

View Set

Chapter 7 Arrays and Vectors Review Questions.

View Set

The Family: Chapter 2 the Family in History

View Set