Networking Basics Course

Ace your homework & exams now with Quizwiz!

31. What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?

directly connected route

15. What data encoding technology is used in copper cables?

electrical pulses

13. What process involves placing one message format inside of another message format?

encapsulation

11. What layer is responsible for routing messages through an internetwork in the TCP/IP model?

internet

4. What is a disadvantage of deploying a peer-to-peer network model?

lack of centralized administration

41. Which command would a technician use to display network connections on a host computer?

netstat

17. At which layer of the OSI model would a logical address be added during encapsulation?

network layer

18. Which type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work?

reference model

36. A network administrator has a multi-floor LAN to monitor and maintain. Through careful monitoring, the administrator has noticed a large amount of broadcast traffic slowing the network. Which device would you use to best solve this problem?

router

20. Which scenario is suitable for deploying twisted-pair cables?

to connect PC workstations in an office

37. An employee is having connectivity issues. Why might a network technician try to ping the default gateway from the employee laptop?

to verify connectivity with the device that provides access to remote networks

45. A technician is troubleshooting a network connectivity problem. Pings to the local wireless router are successful but pings to a server on the Internet are unsuccessful. Which CLI command could assist the technician to find the location of the networking problem?

tracert

44. Open the PT activity. Perform the tasks in the activity instructions and then answer the question. What is the code displayed on the web page?

Welldone

53. What information does an Ethernet switch examine and use to build its address table?

source MAC address

16. What information is added to the switch table from incoming frames?

source MAC address and incoming port number

8. A traveling sales representative uses a cell phone to interact with the home office and customers, track samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet connectivity method would be a preferred method to use on the mobile device due to the low cost?

Wi-Fi

27. Which three addresses are valid public addresses? (Choose three.)

1. 198.133.219.17 2. 128.107.12.117 3. 64.104.78.227

52. What are two methods typically used on a mobile device to provide internet connectivity? (Choose two.)

1. Cellular 2. Wi-Fi

5. Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

1. Enter the network SSID. 2. Input the authentication password. 3. Choose the correct security type.

24. What are two characteristics of multicast transmission? (Choose two.)

1. Multicast transmission can be used by routers to exchange routing information. 2. A single packet can be sent to a group of hosts.

25. Which three types of nodes should be assigned static IP addresses on a network? (Choose three.)

1. Printers 2. Gateways 3. Servers

49. A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.)

1. The target web server is down. 2. DNS service is unavailable on the customer network.

46. Which two TCP header fields are used to confirm receipt of data? (Choose two.)

1. acknowledgment number 2. sequence number

56. A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.)

1. device type 2. geographic location

6. A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

1. easy to create 2. less cost to implement 3. lacks centralized administration

19. Which two criteria are used to help select a network medium for a network? (Choose two.)

1. the environment where the selected medium is to be installed 2. the distance the selected medium can successfully carry a signal

54. Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)

1. transport 2. network

32. A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)? (Choose two.)

1. when a host is sending packets to the ISP in order to request a speed increase for Internet services 2. when a host is sending packets to a remote site owned by the manufacturer of the wireless router in order to request a digital copy of the device manual

2. Which wireless RF band do IEEE 802.11b/g devices use?

2.4 GHz

28. Which number grouping is a valid IPv6 address?

2001:0db8:3c55:0015:1010:0000:abcd:ff13

55. What is the shortest valid representation of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200?

2001:DB8:0:1470::200

29. Refer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?

255.255.255.255

62. How many bits are in an IPv4 address?

32

1. Which statement describes the use of powerline networking technology?

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

58. For what purpose are IPv4 addresses utilized?

An IPv4 address is used to uniquely identify a device on an IP network.

7. Which type of device provides an Internet connection through the use of a phone jack?

DSL modem

9. A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

Disable SSID broadcast.

10. A tourist is traveling through the countryside and needs to connect to the internet from a laptop. However, the laptop only has Wi-Fi and Ethernet connections. The tourist has a smartphone with 3G/4G connectivity. What can the tourist do to allow the laptop to connect to the internet?

Enable tethering and create a hotspot.

23. A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

FF-FF-FF-FF-FF-FF and 255.255.255.255

14. A cable installation company is trying to convince a customer to use fiber-optic cabling instead of copper cables for a particular job. What is one advantage of using fiber-optic cabling compared to copper cabling?

Fiber-optic cabling is completely immune to EMI and RFI.

12. What will a Cisco LAN switch do if it receives an incoming frame and the destination MAC address is not listed in the MAC address table?

Forward the frame out all ports except the port where the frame is received.

26. What benefit does DHCP provide to a network?

Hosts can connect to the network and get an IP address without manual configuration.

47. When analog voice signals are converted for use on a computer network, in what format are they encapsulated?

IP packets

42. How are port numbers used in the TCP/IP encapsulation process?

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

63. When a host sends a packet, how does it determine if the destination of the packet is on the same local network or on a remote network?

It uses the subnet mask to compare the source and destination IP address.

51. Which wireless technology allows a customer to connect to a payment terminal in the store with a smartphone?

NFC

43. Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

Security rules are applied to the default gateway device, preventing it from processing ping requests.

59. A user is setting up a home wireless network. A global address is to be used in NAT translations for traffic flowing through the wireless router. How is this global address assigned?

The wireless router will act as a DHCP client in order to receive global addressing from the ISP.

A user is setting up a home wireless network. A global address is to be used in NAT translations for traffic flowing through the wireless router. How is this global address assigned?

The wireless router will act as a DHCP client in order to receive global addressing from the ISP.


Related study sets

A&P chap 7 - bone structure and function hmwk

View Set

Reading main idea, theme, plot and setting, Main Idea and Plot/combined

View Set

Physics Final Conceptual Questions

View Set

American Social Welfare System Midterm: CH.2

View Set

AP Government (Unit 1) - United States v. Lopez (Required Supreme Court Case)

View Set

Ch 20 - Family Health, Chapter 15: Health in the Global Community, Chapter 14: Environmental Health, Chapter 13: Cultural Diversity and Community Health Nursing

View Set