FINAL EXAM

Ace your homework & exams now with Quizwiz!

What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?

2001:DA48:FC5A4::/64

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server...

Authorization

A network admin notices that some newly installed Ethernet cabling is carrying corrupt and distored data signals. The new cabbling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors my interfere with the copper cabling and result in signal distorttion and dtat corruption? Choose Two

RFI EMI

What are two primary responsibiliteis of the Ethernet MAC sublayer?

accesing the media data encapsulawtion

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​

all IPv6 configured routers on the local link.

What are two common causes of signal degradation when using UTP cabling? (Choose two)

improper termination low-quality cable or connectors

What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

in decrements by 1, if the result is 0. It discards the packet

what is a function of the data link layer?

provides for the exchange of frames over a common local media

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directlyh connected routing table entry?

switch the packet to the directly connected interface

What characteristic describes adware?

software that is installed on a user device and collects information about the user

Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit? 25 Hosts, 50 Hosts, 10 Hosts, 100 Hosts.

255.255.255.128

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

256

Which scenario describes a function provided by the transport layer?

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is deliverd to the correct browser window.

Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

A. Application, transport, internet, and network access layers.

Refer to the exhibit. Host B on subnet Teachers transmits a packet to Host D on Subnet students.

A.----ab ------bb -----20.200 -----10.200

Number of bytes a destination device can accept and process at one time Used to identify missing segments of data method of managing segments of data loss received by a sender before transmitting more segments in a session

ACKNOWLEDGEMENT received by a sender before transmitting more segments in session RETRANSMISSION method of managing segments of data loss FCS blanck SEQUENCE NUMBERS used to identify mssing segments of data WINDOW SIZE number of bytes a destination device cna accept and process at one time

What are three characteristics of the CSMA/CD process?

All of the devices on a segment see data that passes on the network medium. A device listens listens and waits until the media is not busy before transmitting After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

What happens when the transport input ssh command is entered on the switch vty lines?

Communication between the switch and remote users is encrypted.

A client packet is received by a server. The packet has a destination port number 67. What service is the client requesting?

DHCP

What are two features of ARP

If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

LAST THREE***** UDP segments are encapsulated within IP packets for transport across the network The source port field identifies the running application or service that will handle data returinging to the PC The UDP destination port number identitfies the application or service on the server which will handle the data.

Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?

Last Answer. Remove the ethernet header and config a new layer 2 header before sending it out S0/0/0

What is a benefit of using cloud computing in networking?

Network capabilites are extended without requiring investment in new infrastructure, personnnel, or software.

Which two functions are performed at the MAC sublayer of the OSI data link layer to facilitate Ethernet communication? Choose Two.

Places information in the Ethernet frame that identifies which network layer protoco0l is being encapsulated by the frame implements trailer with frame check seqUENCE for error detection

Cut-through pick three Store-and-forward pick three

cut through has low latency may forward runt frames begins forwarding when the destination address is received store and forward always stores the entire frame checks the CRC before forwarding checks the framae length before forwarding

what three requirements are definedd by the protocols used in network communications to allow message transmission across a network? CHoose threee

delivery options message size message encoding

What are two characteristics of IP?

does not require a dedicated end-to-end connection operates independently of the network media

Refer to the exhibit. The network admin has assigned the LAN of LBMISS

last answer .38 default gateway .33

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees.What three network characteristics are described in this scenario? (Choose three.)

quality of service security fault tolerence

A disgruntled employee is using some free wireless networking tools to determine info about the enterprise wwireless networks. This person is planning on using the info to hack the wireless network. What type of attack is this?

reconnaissance


Related study sets

Networking & Security - Test 1 (Ch. 1, 2, 3)

View Set

how to make bold text on quizlet by Jason C. Perde

View Set

Naming Binary Ionic Compounds - with transition metals

View Set

Allgemeine Psychologie 1 - 1. Lernen

View Set

Chemistry Final Exam (Chapter 9)

View Set

Frankenstein Chapter 6-8 Questions

View Set