Network Essentials Study Guide (Ver B)

Ace your homework & exams now with Quizwiz!

What is the primary means for mitigating virus and Trojan horse attacks?

Antivirus Software

What happens when the transport input ssh command is entered on the switch vty lines?

Communication between the switch and remote users is encrypted

Which two ports can be used for the initial configuration of a Cisco router? (Choose two.)

Console Aux

Match the protocol with the function.

DNS- resolves Internet names to IP addresses SSH- provides remote access to servers DHCP- automatically configures hosts with IP addresses

When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?

Logical Topology

What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

MAC filtering

A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?

NFC

While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)

POP3 SMTP IMAP4

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

Phishing

Which solution allows external users to access only an internal FTP server on a private network?

Port Forwarding

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

- Interface - Coverage area - Security

Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)

- Ipv6 are represented by a hexadecimal number - Ipv4 32 bits in length

Which two criteria are used to help select a network medium for a network? (Choose two.)

- The distance the selected medium can successfully carry a signal - The environment where the selected medium is to be installed

What are three types of IPv6 communication methods?

- Unicast - Multicast - Anycast

What are two common causes of a physical layer network connectivity problem? (Choose two.)

- an Ethernet cable plugged into a wrong port - a faulty Ethernet cable

What is the broadcast address for the network 192.168.15.220 /30

192.168.15.223

You have a prefix length of /17. What is your custom subnet mask?

255.255.128.0

You have a network with a custom subnet mask of 255.255.255.224. How many usable IP addresses are available?

30

What is required for a network administrator to perform out-of-band management tasks on a Cisco device?

A computer directly connected to console port

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

EMI RFI

Which two actions improve security on a wireless network? (Choose two.)

Enable WEP Enable MAC Filtering

Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)

IOS imagine file Startup Configuration

A network administrator needs to keep the user name, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

SSH

Which type of cable connection would be used in Packet Tracer to connect a FastEthernet port on a PC to a switch port?

Straight through

If the default gateway is configured incorrectly on a host, what is the impact on communications?

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts in other networks.

A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?

The status of the switch interface and the address configured on interface vlan1

An IPv6 address can have a prefix length that ranges from 0 to 128.

True

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

Tunneling

What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)

UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time.

What would a technician require in order to install a hypervisor on a client machine?

Virtualization Software

Which interface is the default SVI on a Cisco switch?

Vlan 1

What type of technology converts analog voice signals into digital data?

VoIP

Which type of wireless communication is based on 802.11 standards?

WIFI

A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices?

Wireless Router

A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?

Internet

What is the purpose of a DMZ?

It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network

What is an inherent security vulnerability of SSID broadcasting?

It broadcasts the identity of the network.

What is the effect of setting the security mode to WEP on a small wireless router?

It encrypts data between the wireless client and the access point.

What is the delay in the amount of time for data to travel between two points on a network?

Latency

At which layer of the OSI model would a logical address be added during encapsulation?

Layer 3 (Network Layer)

IPv6 addresses that are used for communicating on the same LAN or between a limited number of sites are known as?

Link-Local Addresses


Related study sets

Chapter Three - THEORIES OF ACCIDENT CAUSATION

View Set

Entrepreneurial Small Business 5th Edition; Chapter 8

View Set

A/P 2 Chapter 18—The Circulatory System: Blood

View Set

EC- 6 Social Studies Instruction

View Set