Final Review C1

Ace your homework & exams now with Quizwiz!

What 3 application layer protocols are part of the TCP/IP protocol suite? (choose three.)

*DHCP *DNS *FTP

What are the 3 primary functions provided by Layer 2 data encapsulation? (Choose Three.)

*Data Link Layer Addressing * Detection Of Errors Through CRC Calculations *Delimiting Groups Of Bits Into Frames

Refer to the exhibit. What is the maximum TTL value that is used to reach the destination www.cisco.com?

11

What is the binary representation of 0xCA?

11001010

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192 The company wants to create two sub-network that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that?

192.168.1.9920 162.169.1824

12. On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

VLAN 1

4. A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement

WAN (wide area network)

Match the phases to their correct stage in the router in the router bootup process.(Not all options are used)

What are the boot for the router. Step1:Locate and load the configuration file Step2: Format the Flash Step3: Format Flash Step4: Locate and load the Cisco IOS Perform the POST

7. Which connection provides a secure CLI session with encryption to a Cisco network device?

An SSH connection.

9. Which keys act as a hot key combination that is used to interrupt an IOS process?

Ctrl-Shift-6

WHICH KEYS ACT AS A HOT KEY COMBINATION THAT IS USED TO INTERRUPT AN IOS PROCESS?

Ctrl-Shift-6

Which keys act as a hot key combination that is used to interrupt an IOS process?

Ctrl-Shift-6

2. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

DSL

A home user us looking for an ISP connection that provides high speed digital transmission over regular phone lines.

DSL

Which type of wireless security makes use of dynamic encryption keys each time a client associates with an AP?

EAP PSK WEP WPA

Which two statements correctly describe a router memory type and its contents?

RAM is volatile and stores IP routing table ROM is nonvolatile and contains basic diagnostic

WHAT IS THE PURPOSE OF THE NETWORK SECURITY ACCOUNTING FUNCTION?

To keep track of the actions of the user.

Fill in the blank To prevent faulty network devices from carrying dangerous voltage level, equipment must be ______ Correctly.

grounded

A particular website does not appear to be responding on Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig all arp-a ipconfig/ displaydns nslookup

24. Which statement describes the sequence of process executed by a router when it receives a packet from a host to be delivered to a host on another network

it de-encapsulates the packet, selects the appropriate path, and encapsulates the packet to forward it toward the destination host.

Which MAC adresses will be contained in the S1 MAC addess that is associated with the Fa0/1 port?

just PC0 and PC1 MAC addresses

1. What is the purpose of the routing process?

to encapsulate data that is used to communicate across a network.

What is the purpose of the routing process?

to encapsulate data that is used to communitcate across a network

What is the purpose of the network security accounting function?

to keep track of the actions of a user

What is the purpose pf adjacency tables used in Cisco Express Forwarding (CEF)?

to maintain Layer 2 next-hop addresses

3. What is the purpose of having a converged network?

to reduce the cost of deploying and maintaining the communication infrastructure.

48.A network is investigating network connectivity from a PC to a remote hosts with the address 10.1.1.5. which command issued on the PC will return to the technician the complete path to the remote host?

trace 10.1.1.5 trace route 10.1.1.5 tracert 10.1.1.5 ping 10.1.1.5

A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?

*WAN* - Wide Area Network

15. What three application layer protocols are part of the TCP/IP protocol suite? (choose three)

-DHCP -DNS -FTP

16. What are the three primary functions provided by Layer 2 data encapsulation? (choose three)

-Data link layer addressing -Detection of errors through CRC Calculations -Delimiting groups of bits into frames

Which three IP addresses are private?

10.1.1.1 172.16.4.4 192.168.5.5

What is the most compressed formal possible of the IPv8 address 2001.0D88:0000.AB00:0000:0000:0000

2001.0B1.P00.1200

WHAT IS THE VALID MOST COMPRESSED FORMAT POSSIBLE OF THE IPv6 ADDRESS 2001:0DB8:0000:AB00:0000:0000:0000:1234?

2001:DB8:0:AB:0:1234

WHAT IS THE DOTTED DECIMAL REPRESENTATION OF THE IPv4 ADDRESS 11001011.00000000.01110001.11010011?

203.0.113.211

What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011

203.0.113.211

Which connection provides a secure CLI session with encryption to a CISCO network device?

A SSH connection (CLI -

6. [Router# show version Cisco IOS Software 1841 software (C1841- ADVIPSSERVICESK9-M) , Version 12.4(15)Tl , RELEASE SOFTWARE (fc2)] Refer to the exhibit. From which location did this router load the IOS?

Flash Memory

Which two components are configured via software in order for a PC to participate in a network environment?

IP address Subnet Mask

WHICH TWO COMPONENTS ARE CONFIGURED VIA SOFTWARE IN ORDER FOR A PC TO PARTICIPATE IN A NETWORK ENVIRONMENT? (Choose two)

IP address and Subnet mask

A USER GET SAN IP ADDRESS OF 192.168.0.1 FROM THE COMPANY NETWORK ADMINISTRATOR. A FRIEND OF THE USER AT A DIFFERENT COMPANY GETS THE SAME IP ADDRESS ON ANOTHER PC. HOW CAN TWO PCs USE THE SAME IP ADDRESS AND STILL REACH THE INTERNET, SEND AND RECEIVE EMAIL, AND SEARCH THE WEB?

ISPs use Network Address Translation to change a user IP address into an address that can used on the internet.

23. Which statement describes a characteristic of the network layer in the OSI model?

Its protocols specify the packet structure and processing used to carry the data from one host to another

54.Match the IPv6 address to the IPv6 address type?

Link-Local FE80:0:56BA FE80::1 MULTICAST FF02::2 FF02::1FF3A:25C9 GLOBAL UNICAST 2001:DB8 2001

AT A MINIMUM, WHICH ADDRESS IS REQUIRED ON IPv6-enables INTERFACES?

Link-local

WHICH TECHNOLOGY PROVIDES A SOLUTIONS TO IPv4 ADDRESS DEPLETION BY ALLOWING MULTIPLE DEVICES TO SHARE ONE PUBLIC IP ADDRESS?

NAT

Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

NAT

25. Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

NAT (Network Address Translation)

In which default order will a router search for startup configuration information?

NVRAM, TFTP, setup mode

In which default order will a router search for startup configuration information?

NvRAM, RAM, TFTP

10. [Switch (config) # host name My Switch] Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the host name command as shown. What prompt will display after the command is issued?

Switch(config)#

14. A technician uses the ping 127.0.0.1 command. What is the technician testing?

The TCP/IP stack on a network host

13. What information does the loopback test provide?

The TCP/IP stack on the device is working correctly

What information does the loopback test provide?

The TCP/IP stack on the device is working correctly.

8. [Switch> config t ] [ ^ ] [ invalid input detected at '^' marker.] Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

The administrator must first enter privilege EXEC mode before issuing the command.

Switch1> config t %Invalid input detected at '^' marker |What is the problem?|

The administrator must first enter privileged EXEC mode before issuing the command.

Switch> config t $ Invalid input detected at '^' marker. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

The administrator must first enter privileged EXEC mode before issuing the command.

18. What is the auto-MDIX feature on a switch?

The automatic configuration of an interface for a straight-through or a crossover Ethernet cable connections.

WHAT IS THE PURPOSE OF THE ROUTING PROCESS?

The purpose of the routing process is to encapsulate data that is used to communicate across a network.

5. Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. if QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

audio conference, financial transactions, web pages.

When applied to a router. Which command would help mitigate brute-force password attacks against the router?

exec timeout 30 service -password encryption banner motd $Max failed logins login block for 50 attemps within 50

19. Which switching method has the lowest level of latency?

fast-forward

At a minimum, which address is required on IPv6-enabled interfaces?

link-local

52.which two components are necessary for a wireless client to be installed on a WLAN?

media wireless nic custom adapter crossover cable wireless bridge wireless client software

Which password is needed to access privileged EXEC mode?

secretin

Which firewall technique blocks incoming packets unless they are responses to internal requests?

stateful package inspection (SPI)

A technician uses the ping 127.0.0.1 command. What is the technician testing?

the TCP/IP stack on a network host

50.Refer to the exhibit. What is the significance of the asterisk (*) in the exhibited output?

the asterisk shows which file system was used to boot the system the asterisk designates which file system is the default file systems an asterisk indicates that the file is bootable an asterisk designates that the file system has at least one file that uses that file system.

What is the auto-MDIX feature on a switch?

the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection


Related study sets

REGION 1, CAR, REGION 2, REGION 3, NCR

View Set

Unit 1 - Individual Securities - Equities

View Set