Networking basics exam

Ace your homework & exams now with Quizwiz!

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network?

Enter SSId of wireless network Choose the secuirty type used by the wireless network input the password to authenticate succesffuly

Which scenario is suitable for deploying twisted-pair cables?

Ethernet technology generally uses twisted-pair cables to interconnect devices. Because Ethernet is the foundation for most local networks, twisted-pair is the most commonly used type of network cabling for connecting office computers.

When a host sends a packet, how does it determine if the destination of the packet is on the same local network or on a remote network?

It uses the subnet mask to compate the source and destination IP address When a host sends a packet, it uses the subnet mask to compare the source IPv4 address and the destination IPv4 address. If the network bits match, both the source and destination host are on the same local network. Otherwise, the destination host is on a remote network

Which statement describes the use of powerline networking technology?

Powerline networking adds the ability to connect a device to the network using an adapter wherever there is an electrical outlet.​ The network uses existing electrical wiring to send data. It is not a replacement for physical cabling, but it can add functionality in places where wireless access points cannot be used or cannot reach devices.​

Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?

R1 Tracert is used to trace the path a packet takes. The only successful response was from the first device along the path on the same LAN as the sending host. The first device is the default gateway on router R1. The administrator should therefore start troubleshooting at R1.

Refer to the exhibit. The IP address of which device interface should be used as the default gateway setting of host H1?

R1 : G0/0 The default gateway for host H1 is the router interface that is attached to the LAN that H1 is a member of. In this case, that is the G0/0 interface of R1. H1 should be configured with the IP address of that interface in its addressing settings. R1 will provide routing services to packets from H1 that need to be forwarded to remote networks.

Which network design has the fewest broadcast domains?

Routers break networks into separate broadcast domains. Each LAN is a broadcast domain. The correct answer has only one broadcast domain.

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

When a network device has to communicate with a device on another network, it broadcasts an ARP request asking for the default gateway MAC address. The default gateway (RT1) unicasts an ARP reply with the Fa0/0 MAC address.

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?

directly connected route Routing table entries have codes that indicate how a route was entered into the routing table. A code C stands for a directly connected route

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network?

easy to create lacks centralized admin less cost to implement

What data encoding technology is used in copper cables?

electrical pulses Metal wires within cables (copper cable, such as twisted-pair and coaxial cable) - Data is encoded into electrical impulses. Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded into pulses of light. Wireless transmission - Data is encoded via modulation of specific frequencies of electromagnetic waves.

Which type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work?

reference model There are two common types of network communication models: Protocol model - This model closely matches the structure of a particular protocol suite and describes the functions that occur at each layer of protocols within the suite. The TCP/IP model is an example of a protocol model. Reference model - The primary purpose is to aid in a clearer understanding of the functions and processes necessary for network communications.This type of model does not specify exactly how a function should be accomplished. The OSI model is an example of a reference model

Which two TCP header fields are used to confirm receipt of data

sequence number acknowledgement number Together the TCP sequence number and acknowledgment number fields are used by the receiver to inform the sender of the bytes of data that the receiver has accepted

Which three types of nodes should be assigned static IP addresses on a network

servers printer intermediary devices

What information is added to the switch table from incoming frames?

source MAC address and the incoming port number

Which wireless RF band do IEEE 802.11b/g devices use?

2.4 Ghz 900 MHz is an FCC wireless technology that was used before development of the 802.11 standards. 900 MHz devices have a larger coverage range than the higher frequencies have and do not require line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at 60 GHz

Refer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?Í

255.255.255.255 When a new client device is installed on a network that uses dynamic IP addressing, the client will send out a DHCP request message with the destination IPv4 address of 255.255.255.255

Refer to the exhibit. If all devices are using a subnet mask of 255.255.255.0, which laptop would have an IP address with the same network number as the server?

C. 192.168.3.10 The subnet mask shows which part of the IP address is the network number. Because all the devices have a subnet mask of 255.255.255.0, the first three sets of numbers in each IP address indicate the network number. The server and laptop C both have network numbers of 192.168.3.0.

A tourist is traveling through the countryside and needs to connect to the internet from a laptop. However, the laptop only has Wi-Fi and Ethernet connections. The tourist has a smartphone with 3G/4G connectivity. What can the tourist do to allow the laptop to connect to the internet?

Enable tethering and create a hotspot Many cell phones have the ability to connect to other devices through a feature called tethering. The connection can be made using Wi-Fi, Bluetooth, or a USB cable. Once a device is connected, it is able to use the cellular connection of the phone to access the internet. When a cellular phone allows Wi-Fi devices to connect and use the mobile data network, this is called a hotspot

A cable installation company is trying to convince a customer to use fiber-optic cabling instead of copper cables for a particular job. What is one advantage of using fiber-optic cabling compared to copper cabling?

Fiber optic cabling is completely immune to EMI and RFI When comparing UTP cabling with fiber-optic cabling, note the following: fiber-optic connectors have higher costs, technician installation skills required are higher, fiber bandwidth supported is higher, and fiber-optic cabling is immune to RFI and EMI, and can transmit signals with less attenuation.

When analog voice signals are converted for use on a computer network, in what format are they encapsulated?

IP Packets When Voice over iP (VoIP) is being used, analog voice signals are translated into digital data in the form of IP packets. This translation allows the phone call to be carried through a computer network

Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

Security rules are applied to that default gateway device, preventing it from processinng ping requests If the ping from one host to another host on a remote network is successful, this indicates that the default gateway is operational. In this scenario, if a ping from one host to the default gateway failed, it is possible that some security features are applied to the router interface, preventing it from responding to ping requests

What information does an Ethernet switch examine and use to build its address table?

Source MAC address

Which two criteria are used to help select a network medium for a network

The distance the selected medium can successfully carry a signal the environment where the selected medium is to be installed The distance the selected medium can successfully carry a signal in the environment in which the selected medium is to be installed The amount of data and the speed at which the data must be transmitted The cost of the medium and its installation

Refer to the exhibit. Which term correctly identifies the device type that is included in the area B?

intermediary

What is a disadvantage of deploying a peer-to-peer network model

lack of centralized admin

At which layer of the OSI model would a logical address be added during encapsulation?

network layer Logical addresses, also known as IP addresses, are added at the network layer. Physical addresses are edded at the data link layer. Port addresses are added at the transport layer. No addresses are added at the physical layer.

Refer to the exhibit. Host H2 sends a unicast message to host H6. Which destination IP address is contained in the header of the packet when it reaches host H6?

the IP address assinged to the network adapter on host H6 When host H2 sends the packet to host H6, the source IP address is the address assigned to the network adapter on host H2. The destination address of the packet is the IP address assigned to the network adapter on host H6. The source and destination IP addresses do not change as the packet is forwarded through the routers. When the packet arrives at H6 the destination address of the packet is the address assigned to the network adapter on H6.

Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?

the MAC address of the G0/0 interface on R1 PC1 must have a MAC address to use as a destination Layer 2 address. PC1 will send an ARP request as a broadcast and R1 will send back an ARP reply with its G0/0 interface MAC address. PC1 can then forward the packet to the MAC address of the default gateway, R1

An employee is having connectivity issues. Why might a network technician try to ping the default gateway from the employee laptop?

to verify connectivety with the device that provides access to remote networks The default gateway address is usually the address of the router interface. The router provides access to remote networks, so a successful ping to the default gateway would mean that the laptop is able to communicate with the router.

A technician is troubleshooting a network connectivity problem. Pings to the local wireless router are successful but pings to a server on the Internet are unsuccessful. Which CLI command could assist the technician to find the location of the networking problem?

tracert The tracert utlility (also known as the tracert command or tracert tool) will enable the technician to locate the link to the server that is down. The ipconfig command displays the computer network configuration details. The ipconfig/renew command requests an IP address from a DHCP server. Msconfig is not a network troubleshooting command.

A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)

when a host is sending packets to the ISP in order to request a speed increase for internet services when a host is sending packets to a remote site owner by the manufacturer of the wireless router in order to request a digital copy of the device manual


Related study sets

Spanish 1 VHL Central Combined Lesson 1 Hola, ¿qué tal?

View Set

Infant, Toddler, Preschooler, Schooler, & Adolenscence

View Set

Chapter 2: Our System of Government

View Set

Types of Individual Life Insurance

View Set