Networking Essentials Study Guide

Ace your homework & exams now with Quizwiz!

A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host? Subnet mask: 255.255.0.0 Default gateway: 128.107.255.254

128.107.255.1

Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?

Encryption

What is a purpose of an IP address?

It identifies the source and destination of data packets.

Which type of device filtering can be enabled on some wireless access points or wireless routers?

MAC Address Filtering

What advantage does SSH offer over Telnet?

More secure method for server access. Provides secure remote login & other secure network services as well as provide stronger authentication.

A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?

NFC

Which three attacks exploit human behavior? (looking for three.)

Pretexting, Phising, and vishing

What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​

SYN (synchronous) flooding

A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?

They are the network (192.168.30.0/24) and broadcast IP addresses (192.168.30.255/24).

Which two ports can be used for the initial configuration of a Cisco router? (looking for two ports.)

Two console ports- RJ-45 port & new USB type-B (mini-B USB) connector

Why do streaming audio and video applications use UDP instead of TCP?

UDP constantly sends the audio and video application rather than delaying due to TCP checking if the data packets are sent.

What type of Internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity?

WiFi

Which technology is used to uniquely identify a WLAN network?

WiFi

RouterA#

add a password required to access the priviledged EXEC mode

ping

asks the name server for information on the destination domain

RouterA(config-if)#

configure a WAN interface

RouterA(config-line)#

configure vty lines

ipconfig

displays IP settings on host

netstat

displays network connections

tracert

displays the route that is taken to the destination

RouterA(config)#

enter configuration mode

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (looking for three steps.)

1. Go to settings, Connections, WiFi 2. Input SSID 3. Input Password

Which three items should be documented after troubleshooting an internal web server crash? (Choose three.)

1. The Solution to the problem 2.The Successful troubleshooting steps 3.The Unsuccessful troubleshooting steps

Which address prefix range is reserved for IPv4 multicast?

224.0.0.0 to 239.255.255.255

What is the minimum size of a valid Ethernet frame?

64 bytes

An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?

Brute Force attack

Which protocol is used to automatically assign IP addresses to hosts?

DHCP

Which step should be taken next once a problem is resolved during a troubleshooting process?

Document the steps used to solve the problem

What are two advantages of using fiber-optic cabling to interconnect devices? ( looking for two advantages.)

Fiber-optic cable is immune from EMI and RFI.

Which protocol is used by web servers to serve up a web page?

HTTP

Which protocol is used to transfer web pages from a server to a client device?

HTTP or HTTPS

Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three pieces of info.)

IP Address, Subnet mask, Default gateway

When is an IP address required to be configured on a Cisco LAN switch?

IP Addresses allow for the Switch to be managed & configured over a network

What was the reason for the creation and implementation of IPv6?

IPv6 allows us to have more address space due to the increase in demand

At which layer of the TCP/IP model does TCP operate?

The Transport Layer

What are three advantages of using private IP addresses and NAT? (looking for three advantages.)

hides private LAN addressing from outside devices that are connected to the Internet, permits LAN expansion without additional public IP addresses

What is a disadvantage of deploying a peer-to-peer network model?

lack of centralized administration, not as secure and scalable

The functions of which two layers of the OSI model are matched to the network access layer of the TCP/IP model? (looking for two layers.)

physical, data link

nslookup

tests end-to-end connectivity between hosts

Which three pieces of information are identified by a URL? (looking for three pieces of info)

the protocol that is being used, the domain name that is being accessed, the location of the resource

Which type of network cable is commonly used to connect office computers to the local network?

twisted-pair cable


Related study sets

@ LangoSpot (FBC24)....part 2 📒

View Set

Analysis and interpretation of financial statements

View Set

Chapter 14 Warm-Up and Flexibility Training

View Set

Athletic Injuries Chapter 9 Review Questions

View Set