Networking final
In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?
SLAAC
What is an advantage of SMB over FTP?
SMB clients can establish a long-term connection to the server
Three devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.) Device 1: IP address 192.168.10.77/28 on subnet 1 Device 2: IP address192.168.10.17/30 on subnet 2 Device 3: IP address 192.168.10.35/29 on subnet 3
subnet 1 network= 192.168.10.64 broad= 192.168.10.79 subnet 2 network = 192.168.10.16 broad = 192.168.10.19 subnet 3 network = 192.168.10.32 broad = 192.168.10.39
What type of information is contained in a DNS MX record?
the domain name mapped to mail exchange servers
What is the prefix length notation for the subnet mask 255.255.255.224?
/27
Consider the following range of addresses: 2001:0DB8:BC15:0600:: to 2001:0DB8:BC15:0FFF:: The prefix length for the range of addresses is
/52
Fill in the blank. The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7
00000111
Fill in the blank. The last host address on the 10.15.25.0/24 network is
10.15.25.254
fill in the blank. The last host address on the 10.15.25.0/24 network is
10.15.25.254
Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)
10.18.10.208/28 10.18.10.224/28
The network portion of the address 172.16.30.5/16 is
172.16
Which number or set of numbers represents a socket?
192.168.1.1:80
Refer to the exhibit. What is the global IPv6 address of the host in uncompressed format?
2001:0DB8:0000:0000:0BAF:0000:3F57:FE94
Match the IPv6 address with the IPv6 address type. (Not all options are used.)
2001:DB8:BAF:3F57 = Global Unicast FF02::1 = all node Multicast ::1 = loopback FF02::1:FFAE:F85F = solicited node
What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?
2001:d12:aa04:b5::/64
The shortest compressed format of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200 is
2001:db8:0:1470::200
A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?
255.255.255.224
A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?
4
How many host addresses are available on the 192.168.10.128/26 network?
62
A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?
65536
What is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64?
A9CD:47FF:FE57:FE94
What does the IP address 192.168.1.15/29 represent?
Broadcast
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)
DNS VoiP
A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
DNS server Default gateway
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?
Have a second router that is connected to another ISP.
Which IPv6 network prefix is only intended for local links and can not be routed?
FE80::/10
What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?
Gnutella
Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
HTTP MPEG GIF
Why is DHCP preferred for use on large networks?
It is a more efficient way to manage IP addresses than static address assignment.
Match each description with an appropriate IP address. (Not all options are used.)
Link-local = 169.254.1.5 public address = 198.133.219.2 experimental = 240.2.6.255 loopback - 127.0.0.1
Which transport layer feature is used to guarantee session establishment?
TCP 3-way handshake
How does the network layer use the MTU value?
The MTU is passed to the network layer by the data link layer
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
The client randomly selects a source port number.
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?
The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.
Match the description to the IPv6 addressing component. (Not all options are used.)
This part of the address is used by an organization to identify subnets. = SUBNET ID This network portion of the address is assigned by the provider. = GLOBAL ROUTING This part of the address is the equivalent to the host portion of an IPv4 address. = INTERFACE ID
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures
Tunneling
Which statement is true about Cisco IOS ping indicators?
U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful
Which two types of devices are typically assigned static IP addresses? (Choose two.)
Web servers Printers
An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?
all IPv6 enabled devices on the local link or network
Which TCP/IP model layer is closest to the end user?
application
A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. (Not all options are used.)
client sends fin servers sends ack server sends fin client sends ack
On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)
console port vty ports
What is considered the most effective way to mitigate a worm attack?
download security updates
How should traffic flow be captured in order to best understand traffic patterns in a network?
during peek utilization times
What is one of the most effective security tools available for protecting users from external threats?
firewalls
On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?
home router
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?
ipconfig/displaydns
Which three fields are used in a UDP segment header? (Choose three.)
length source port checksum
What is an advantage of UDP over TCP?
less overhead
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?
link-local
Which type of IPv6 address is not routable and used only for communication on a single subnet?
link-local address
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
login block for 30 attempts 2 within 10
Which element of scaling a network involves identifying the physical and logical topologies?
network documentation
What is true about a client-server network?
network includes dedicated server
Which command is used to manually query a DNS server to resolve a specific host name?
nslookup
What are two benefits of subnetting networks? (Choose two.)
reducing size of broadcast grouping devices to improve management and security
Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)
session application presentation
An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?
show file systems
What is the purpose of using a source port number in a TCP communication?
to keep track of multiple conversations between devices
What is the purpose of the TCP sliding window?
to request that a source decrease the rate at which it transmits data
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?
to test that the host has the capability to reach hosts on other networks
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?
tracert 10.1.1.5
What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence?
transport
True or False? In FTP transactions, an FTP client uses the pull method to download files from an FTP server.
true
What type of traffic would most likely have the highest priority through the network?
voice
Refer to the exhibit. The exhibited configuration is entered by a network administrator into a new router. Sometime later a network technician proceeds to log in to the router via a console connection. The technician enters techadmin as the user name and tries a password of 63t0ut0fh3r3!. What will be the result of this action?
will display the DT_ATC_RS3> promt
A router may have to fragment a packet when forwarding it from one medium to another medium that has a smaller
MTU
What type of applications are best suited for using UDP?
applications that are sensitive to delay
A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.)
geographical location Device type
Match the type of threat with the cause. (Not all options are
hardware threat= physical damage environmental threats: temperature changes electical threats: voltage spikes Maintenance threats: poor handeling
What are three responsibilities of the transport layer? (Choose three.)
meeting the reliability requirements of applications, if any multiplexing multiple communication streams from many users or applications on the same network identifying the applications and services on the client and server that should handle transmitted data
A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?
peer to peer
Which protocol can be used to transfer messages from an email server to an email client?
pop3
Network services use ___________to define a set of rules that govern how devices communicate and the data formats used in a network.
protocols
An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?
subnet add = 192.168.1.64 subnet mask= 255.255.255.192
Refer to the exhibit. What does the value of the window size specify?
the amount of data that can be sent before an acknowledgment is required