Network Essentials Study Guide (Ver B)
What is the primary means for mitigating virus and Trojan horse attacks?
Antivirus Software
What happens when the transport input ssh command is entered on the switch vty lines?
Communication between the switch and remote users is encrypted
Which two ports can be used for the initial configuration of a Cisco router? (Choose two.)
Console Aux
Match the protocol with the function.
DNS- resolves Internet names to IP addresses SSH- provides remote access to servers DHCP- automatically configures hosts with IP addresses
When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?
Logical Topology
What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?
MAC filtering
A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?
NFC
While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)
POP3 SMTP IMAP4
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
Phishing
Which solution allows external users to access only an internal FTP server on a private network?
Port Forwarding
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
- Interface - Coverage area - Security
Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)
- Ipv6 are represented by a hexadecimal number - Ipv4 32 bits in length
Which two criteria are used to help select a network medium for a network? (Choose two.)
- The distance the selected medium can successfully carry a signal - The environment where the selected medium is to be installed
What are three types of IPv6 communication methods?
- Unicast - Multicast - Anycast
What are two common causes of a physical layer network connectivity problem? (Choose two.)
- an Ethernet cable plugged into a wrong port - a faulty Ethernet cable
What is the broadcast address for the network 192.168.15.220 /30
192.168.15.223
You have a prefix length of /17. What is your custom subnet mask?
255.255.128.0
You have a network with a custom subnet mask of 255.255.255.224. How many usable IP addresses are available?
30
What is required for a network administrator to perform out-of-band management tasks on a Cisco device?
A computer directly connected to console port
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
EMI RFI
Which two actions improve security on a wireless network? (Choose two.)
Enable WEP Enable MAC Filtering
Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)
IOS imagine file Startup Configuration
A network administrator needs to keep the user name, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
SSH
Which type of cable connection would be used in Packet Tracer to connect a FastEthernet port on a PC to a switch port?
Straight through
If the default gateway is configured incorrectly on a host, what is the impact on communications?
The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts in other networks.
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?
The status of the switch interface and the address configured on interface vlan1
An IPv6 address can have a prefix length that ranges from 0 to 128.
True
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?
Tunneling
What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)
UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time.
What would a technician require in order to install a hypervisor on a client machine?
Virtualization Software
Which interface is the default SVI on a Cisco switch?
Vlan 1
What type of technology converts analog voice signals into digital data?
VoIP
Which type of wireless communication is based on 802.11 standards?
WIFI
A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices?
Wireless Router
A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?
Internet
What is the purpose of a DMZ?
It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network
What is an inherent security vulnerability of SSID broadcasting?
It broadcasts the identity of the network.
What is the effect of setting the security mode to WEP on a small wireless router?
It encrypts data between the wireless client and the access point.
What is the delay in the amount of time for data to travel between two points on a network?
Latency
At which layer of the OSI model would a logical address be added during encapsulation?
Layer 3 (Network Layer)
IPv6 addresses that are used for communicating on the same LAN or between a limited number of sites are known as?
Link-Local Addresses