Network Final

Ace your homework & exams now with Quizwiz!

a link-local address

169.254.1.5

a public address

198.133.219.2

The shortest compressed format of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200 is

2001:DB8:0:1470::200

an experimental adress

240.2.6.255

The last host address on the 10.15.25.0/24 network is

254

Why is DHCP preferred for use on large networks?

It is a more efficient way to manage IP addresses than static address assignment.

Which protocol can be used to transfer messages from an email server to an email client?

POP3

hardware threats

Physical damage to server, routers, switches, cabling plant and workstations

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?

SLAAC

What does the IP address 192.168.1.15/29 represent?

broadcast address

The IPv4 packets and IPv6 packets coexist in the same network.

dual-stack

Fill in the blank. Network services use ______________ to define a set of rules that govern how devices communicate and the data formats used in a network.

protocols

What are two benefits of subnetting networks? (Choose two.)

reducing the size of broadcast domains grouping devices to improve management and security

What type of information is contained in a DNS MX record?

the domain name mapped to mail exchange servers

What is the purpose of using a source port number in a TCP communication?

to keep track of multiple conversations between devices

IPv6 packets are converted into IPv4 packets, and vice versa.

translation

True or False? In FTP transactions, an FTP client uses the pull method to download files from an FTP server.

true

The IPv6 packet is transported inside an IPv4 packet.

tunneling

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

tunneling

What is the prefix length notation for the subnet mask 255.255.255.224?

/27

The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7 is

00000111

a loopback address

127.0.0.1

Which statement is true about Cisco IOS ping indicators?​

'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.

Consider the following range of addresses: 2001:0DB8:BC15:0600:: to 2001:0DB8:BC15:0FFF:: The prefix length for the range of addresses is

/52

i274518v1n1_247518.PNG Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)

10.18.10.208/28 10.18.10.224/28

The network portion of the address 172.16.30.5/16 is

172.16

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?

192.168.1.192 255.255.255.192

Which number or set of numbers represents a socket?

192.168.1.1:80

What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?

2001:D12:AA04:B5::/64​

A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?

255.255.255.224

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?

4

How many host addresses are available on the 192.168.10.128/26 network?

62

A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?

65536

What is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64?

A9CD:47FF:FE57:FE94

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

DNS VoIP

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server default gateway

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

Which IPv6 network prefix is only intended for local links and can not be routed?

FE80::/10

Match the IPv6 address with the IPv6 address type. (Not all options are used.) 2001:DB8::BAF:3F57:FE94 FF02::1 ::1 FF02::1:FFAE:F85F

Global Unicast (2001:DB8::BAF:3F57:FE94) All node multicast (FF02::1) Loopback (::1) Solicited node multicast (FF02::1:FFAE:F85F)

What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?

Gnutella

Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)

HTTP MPEG GIF

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

Which three fields are used in a UDP segment header? (Choose three.)

Length Source Port Checksum

What is an advantage of SMB over FTP?​

SMB clients can establish a long-term connection to the server.​

A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. (Not all options are used.)

Step 1: Client sends FIN Step 2: Server sends Ack Step 3:Server sends FIN Step 4:Client sends Ack

Which transport layer feature is used to guarantee session establishment?

TCP 3-way handshake

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

The client randomly selects a source port number.

What is true about a client-server network?

The network includes a dedicated server.

Refer to the exhibit. The exhibited configuration is entered by a network administrator into a new router. Sometime later a network technician proceeds to log in to the router via a console connection. The technician enters techadmin as the user name and tries a password of 63t0ut0fh3r3!. What will be the result of this action?

The router will display the DT_ATC_RS3> prompt.

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.

What is an advantage of UDP over TCP?

UDP communication requires less overhead

On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?

a home router

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

all IPv6 enabled devices on the local link​ or network

Which TCP/IP model layer is closest to the end user?

application

What type of applications are best suited for using UDP?

applications that are sensitive to delay

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

console ports vty ports

How should traffic flow be captured in order to best understand traffic patterns in a network?

during peak utilization times

What is one of the most effective security tools available for protecting users from external threats?

firewalls

A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.)

geographic location device type

This network portion of the address is assigned by the provider.

global routing

This part of the address is the equivalent to the host portion of an IPv4 address.

interface ID

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /displaydns

What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?

link-local

Which type of IPv6 address is not routable and used only for communication on a single subnet?

link-local address

What are three responsibilities of the transport layer? (Choose three.)

meeting the reliability requirements of applications, if any multiplexing multiple communication streams from many users or applications on the same network identifying the applications and services on the client and server that should handle transmitted data

Which element of scaling a network involves identifying the physical and logical topologies?

network documentation

Which command is used to manually query a DNS server to resolve a specific host name?

nslookup

A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?

peer-to-peer (P2P)

maintenance threats

poor handling of key electrical components (electrostatic discharge) lack of critical spare parts, poor cabling and poor labeling

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

session layer application layer presentation layer

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

show file systems

This part of the address is used by an organization to identify subnets.

subnet ID

environmental threats

temperature extremes (too hot, or too cold) or humidity extremes (too wet or too dry)

Window size: 9017 What does this represent?

the amount of data that can be sent before an acknowledgment is required

What is the purpose of the TCP sliding window?

to request that a source decrease the rate at which it transmits data

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to test that the host has the capability to reach hosts on other networks

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5

What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence?

transport

What type of traffic would most likely have the highest priority through the network?

voice

electrical threats

voltage spikes, insufficient supply voltage (brownouts) unconditioned power (noise) and total power loss

Which two types of devices are typically assigned static IP addresses? (Choose two.)

web servers printer


Related study sets

Chapter 35 Nursing Diagnosis and Planning

View Set

PSY 3341 (Exam #1 material), PSY 3341 Exam 2 Memory, PSY 3341 - Exam 2

View Set

SIE Mastery Exam 1 Review Questions

View Set

ohio life insurance exam missed questions and answers part 10

View Set