Major Exam
Fill in the blank. The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7 is _________.
00000111
Fill in the blank. The last host address on the 10.15.25.0/24 network is ___________.
10.15.25.254
The last host address on the 10.15.25.0/24 network is ___________.
10.15.25.254
Fill in the blank. The network portion of the address 172.16.30.5/16 is ___________.
172.16
A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements? 255.255.224.0 255.255.240.0 255.255.255.224 255.255.255.240
255.255.255.224
How many host addresses are available on the 192.168.10.128/26 network? 30 32 60 62 64
62
1. Fill in the blank using a number. The minimum Ethernet frame size is ______ bytes. Anything smaller than that should be considered a "runt frame."
64
IPv6 packets are converted into IPv4 packets, and vice versa.
transalation
The IPv6 packet is transported inside an IPv4 packet.
tunneling
This field is used by the LLC to identify the Layer 3 protocol.
type
This type of media provides the most mobility options.
wireless
7. Fill in the blank. In fiber optic media, the signals are represented as patterns of ________.
LIGHT
Following default settings, what is the next step in the router boot sequence after the IOS loads from flash?
Locate and load the startup-config file from NVRAM.*
high-speed business class copper or fiber connection
Metro Ethernet
Fill in the blank. The MAC address of a PC does not change when the PC is moved to a different network because the MAC address is embedded in the ________ of the PC.
NIC
Fill in the blank. The acronym _________ is used to define the process that allows multiple devices to share a single routable IP address.
PAT
business class service that provides the same upload and download speeds over telephone lines
SDSL
This type of copper media is used in industrial or similar environments where there is a lot of interference.
STP
What is the function of the kernel of an operating software?
The kernel provisions hardware resources to meet software requirements.
Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?
Time-to-live
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
a) ACL b) IPS c) VPN* d) BYOD
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) a) VTY interface b) console interface c) Ethernet interface d) boot IOS mode e) privileged EXEC mode f) router configuration mode
a) VTY interface b) console interface e) privileged EXEC mode
1. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) a) greater distances per cable run b) lower installation cost c) limited susceptibility to EMI/RFI d) durable connections e) greater bandwidth potential f) easily terminated
a) greater distances per cable run c) limited susceptibility to EMI/RFI e) greater bandwidth potential
This field helps to direct the frame toward its destination.
addressing
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation? a) Next Header b) Flow Label c) Traffic Class d) Differentiated Services
b) Flow Label
1. At which layer of the OSI model would a physical address be encapsulated? a) physical layer b) data link layer c) network layer d) transport layer
b) data link layer
Which logical address is used for delivery of data to a remote network? a) destination MAC address b) destination IP address c) destination port number d) source MAC address e) source IP address
b) destination IP address
What are two characteristics of a scalable network? (Choose two.) a) easily overloaded with increased traffic b) grows in size without impacting existing users c) is not as reliable as a small network d) suitable for modular devices that allow for expansion e) offers limited number of applications
b) grows in size without impacting existing users* d) suitable for modular devices that allow for expansion*
What are two functions that are provided by the network layer? (Choose two.) a) carrying data between processes that are running on source and destination hosts b) providing end devices with a unique network identifier c) placing data on the network medium d) directing data packets to destination hosts on other networks e) providing dedicated end-to-end connections
b) providing end devices with a unique network identifier. d) directing data packets to destination hosts on other networks.
6. What type of cable is used to connect a workstation serial port to a Cisco router console port? a) crossover b) rollover c) straight-through d) coaxial
b) rollover
3. What method is used to manage contention-based access on a wireless network? a) CSMA/CD b) priority ordering c) CSMA/CA d) token passing
c) CSMA/CA
Which portion of the network layer address does a router use to forward packets? a) host portion b) broadcast address c) network portion d) gateway address
c) network portion
signal carried on the same copper or fiber medium as the television signal
cable
access via the cell phone network
cellular
Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.
coaxial
Which IPv4 address can a host use to ping the loopback interface? a) 126.0.0.1 b) 127.0.0.0 c) 126.0.0.0 d) 127.0.0.1
d) 127.0.0.1
8. Which statement correctly describes frame encoding? a) It uses the characteristic of one wave to modify another wave. b) It transmits data signals along with a clock signal which occurs at evenly spaced time durations. c) It generates the electrical, optical, or wireless signals that represent the binary numbers of the frame. d) It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
d) It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet? a) Differentiated Services b) Fragment Offset c) Header Length d) Time-to-Live
d) Time-to-Live
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
data link
The IPv4 packets and IPv6 packets coexist in the same network.
dual-stack
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.) a) the hostname should be fewer than 64 characters in length b) the hostname should be written in all lower case characters c) the hostname should contain no spaces d) the hostname should end with a special character e) the hostname should begin with a letter
e) the hostname should begin with a letter c) the hostname should contain no spaces a) the hostname should be fewer than 64 characters in length
This field checks if the frame has been damaged during the transfer.
error detection
This field identifies the beginning of a frame.
frame start
A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.) geographic location device type department personnel type support model
geographic location device type
Fill in the blank. An ___________ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization
intranet
Fill in the blank. If there are two or more possible routes to the same destination, the __________ is used to determine which route is used in the routing table.
metric
At which layer of the OSI model would a logical address be encapsulated?
network layer
This type of media is used for high transmission speed and can also transfer data over long distances.
optical fiber
requires a dish and clear line of sight for service
satellite
The component of the operating software that provides the user interface is called the _________.
shell