Practice Final

Ace your homework & exams now with Quizwiz!

What enables user to interact with OS by pointing/ clicking? Telnet CLI GUI Kernel Shell

GUI

What technique is used with UTP cable to help protect against signal interference from crosstalk? wrapping a foil shield around the wire pairs twisting the wires together into pairs terminating the cable with special grounded connectors encasing the cables within a flexible plastic sheath

twisting the wires together into pairs

Network information: * local router LAN interface: 172.19.29.254 / fe80:65ab:dcc1::10 * local router WAN interface: 198.133.219.33 / 2001:db8:FACE:39::10 * remote server: 192.135.250.103 What task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command? verifying that there is connectivity within the local network creating a network performance benchmark to a server on the company intranet determining the path to reach the remote server verifying that there is connectivity to the internet

verifying that there is connectivity to the internet

What are two characteristics of IP? (Choose two.) does not require a dedicated end-to-end connection operates independently of the network media retransmits packets if errors occur re-assembles out of order packets into the correct order at the receiver end guarantees delivery of packets

does not require a dedicated end-to-end connection operates independently of the network media

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? the virtually unlimited availability of IPv6 addresses the use of CSMA/CA the use of full-duplex capable Layer 2 switches the development of half-duplex switch operation the use of Gigabit Ethernet speeds

the use of full-duplex capable Layer 2 switches/ The use of Layer 2 switches operating in full-duplex mode eliminates collisions, thereby eliminating the need for CSMA/CD.

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN? bus extended star ring partial mesh

An extended star topology is an example of a hybrid topology as additional switches are interconnected with other star topologies. A partial mesh topology is a common hybrid WAN topology. The bus and ring are not hybrid topology types.

Part of OS that interacts directly with device hardware. SSH GUI Shell Kernel CLI

The kernel is the part of the operating system that interfaces with the hardware.

Why would a Layer 2 switch need an IP address? to enable the switch to send broadcast frames to attached PCs to enable the switch to function as a default gateway to enable the switch to be managed remotely to enable the switch to receive frames from attached PCs

to enable the switch to be managed remotely

A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network? ping nslookup tracert ipconfig /displaydns

tracert

Which two devices would be described as intermediary devices? (Choose two.) wireless LAN controller server assembly line robots IPS gaming console retail scanner

wireless LAN controller IPS

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) adds Ethernet control information to network protocol data responsible for internal structure of Ethernet frame implements trailer with frame check sequence for error detection enables IPv4 and IPv6 to utilize the same physical medium applies source and destination MAC addresses to Ethernet frame

-adds Ethernet control information to network protocol data -enables IPv4 and IPv6 to utilize the same physical medium

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) implements CSMA/CD over legacy shared half-duplex media adds Ethernet control information to network protocol data places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame applies source and destination MAC addresses to Ethernet frame integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper

-adds Ethernet control information to network protocol data -places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame

Which subnet would include the address 192.168.1.96 as a usable host address? 192.168.1.64/26 192.168.1.32/27 192.168.1.32/28 192.168.1.64/29

192.168.1.64/26

What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process? 0C6F:65FF:FEC2:BDF8 1E6F:65FF:FEC2:BDF8 C16F:65FF:FEC2:BDF8 106F:65FF:FEC2:BDF8

1E6F:65FF:FEC2:BDF8

Given network 172.18.109.0, which subnet mask would be used if 6 host bits were available? 255.255.192.0 255.255.224.0 255.255.255.192 255.255.255.248 255.255.255.252

255.255.255.192

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? 256 512 1024 4096

256

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville? access Trojan horse reconnaissance DoS

A DoS (denial of service) attack prevents authorized users from using one or more computing resources.

What are three characteristics of the CSMA/CD process? (Choose three.) The device with the electronic token is the only one that can transmit after a collision. A device listens and waits until the media is not busy before transmitting. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. All of the devices on a segment see data that passes on the network medium. A jam signal indicates that the collision has cleared and the media is not busy. Devices can be configured with a higher transmission priority.

A device listens and waits until the media is not busy before transmitting. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. All of the devices on a segment see data that passes on the network medium.

Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model? A packet-filtering firewall uses session layer information to track the state of a connection, whereas a stateful firewall uses application layer information to track the state of a connection. Both stateful and packet-filtering firewalls can filter at the application layer. A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer. A stateful firewall can filter application layer information, whereas a packet-filtering firewall cannot filter beyond the network layer.

A packet-filtering firewall typically can filter up to the transport layer, whereas a stateful firewall can filter up to the session layer. Explanation: Packet filtering firewalls can always filter Layer 3 content and sometimes TCP and UDP-based content. Stateful firewalls monitor connections and thus have to be able to support up to the session layer of the OSI model.

A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection? Add a second NIC to the web server. Add a connection to the Internet via a DSL line to another ISP. Add another web server to prepare failover support. Add multiple connections between the switches and the edge router.

Add a connection to the Internet via a DSL line to another ISP. /With a separate DSL connection to another ISP, the company will have a redundancy solution for the Internet connection, in case the leased line connection fails. The other options provide other aspects of redundancy, but not the Internet connection. The options of adding a second NIC and adding multiple connections between the switches and the edge router will provide redundancy in case one NIC fails or one connection between the switches and the edge router fails. The option of adding another web server provides redundancy if the main web server fails.

What is a characteristic of a switch virtual interface (SVI)?​ -An SVI is created in software and requires a configured IP address and a subnet mask in order to provide remote access to the switch. -Although it is a virtual interface, it needs to have physical hardware on the device associated with it. -SVIs do not require the no shutdown command to become enabled. -SVIs come preconfigured on Cisco switches.

An SVI is created in software and requires a configured IP address and a subnet mask in order to provide remote access to the switch.

Why is NAT not needed in IPv6?​ Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​ The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​ The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Users interact with OS by typing commands Telnet GUI Shell Kernel CLI

CLI - A CLI, or command-line interface, requires users to type commands at a prompt in order to interact with the OS.

What causes CRC errors?

CRC errors can result from using the wrong type of cable or from electrical interference.

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) Destination IP addresses in a packet header remain constant along the entire path to a target host. Destination MAC addresses will never change in a frame that goes across seven routers. Every time a frame is encapsulated with a new destination MAC address, a new destination IP address is needed. Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another. A packet that has crossed four routers has changed the destination IP address four times.

Destination IP addresses in a packet header remain constant along the entire path to a target host. Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another. Hi

Which two statements describe features of an IPv4 routing table on a router? (Choose two.)​ Directly connected interfaces will have two route source codes in the routing table: C and S. If there are two or more possible routes to the same destination, the route associated with the higher metric value is included in the routing table. The netstat -r command can be used to display the routing table of a router.​ The routing table lists the MAC addresses of each active interface. It stores information about routes derived from the active router interfaces. If a default static route is configured in the router, an entry will be included in the routing table with source code S.

Directly connected interfaces will have two route source codes in the routing table: C and S. If a default static route is configured in the router, an entry will be included in the routing table with source code S.

Which destination address is used in an ARP request frame? 0.0.0.0 255.255.255.255 the physical address of the destination host FFFF.FFFF.FFFF AAAA.AAAA.AAAA

FFFF.FFFF.FFFF The purpose of an ARP request is to find the MAC address of the destination host on an Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the Ethernet LAN. The frame contains the IP address of the destination and the broadcast MAC address, FFFF.FFFF.FFFF. The host with the IP address that matches the IP address in the ARP request will reply with a unicast frame that includes the MAC address of the host. Thus the original sending host will obtain the destination IP and MAC address pair to continue the encapsulation process for data transmission.

A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.) Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. Fiber optic cabling requires specific grounding to be immune to EMI. Fiber optic cabling is susceptible to loss of signal due to RFI. Fiber optic cable is able to withstand rough handling. Fiber optic provides higher data capacity but is more expensive than copper cabling.

Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. Fiber optic provides higher data capacity but is more expensive than copper cabling.

Which two statements describe the characteristics of fiber-optic cabling? (Choose two.) Fiber-optic cabling does not conduct electricity. Multimode fiber-optic cabling carries signals from multiple sending devices. Fiber-optic cabling is primarily used as backbone cabling. Fiber-optic cabling uses LEDs for single-mode cab​les and laser technology for multimode cables. Fiber-optic cabling has high signal loss.

Fiber-optic cabling is primarily used for high-traffic backbone cabling and does not conduct electricity.

What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.) IP addresses interface descriptions MAC addresses next-hop addresses Layer 1 statuses speed and duplex settings

IP addresses Layer 1 statuses

How does the service password-encryption command enhance password security on Cisco routers and switches? It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet. It encrypts passwords that are stored in router or switch configuration files. It requires that a user type encrypted passwords to gain console access to a router or switch. It encrypts passwords as they are sent across the network.

It encrypts passwords that are stored in router or switch configuration files.

Which statement describes network security? It supports growth over time in accordance with approved network design procedures. It synchronizes traffic flows using timestamps. It ensures sensitive corporate data is available for authorized users. It prioritizes data flows in order to give priority to delay-sensitive traffic.

It ensures sensitive corporate data is available for authorized users.

What is one main characteristic of the data link layer? It generates the electrical or optical signals that represent the 1 and 0 on the media. It converts a stream of data bits into a predefined code. It shields the upper layer protocol from being aware of the physical medium to be used in the communication. It accepts Layer 3 packets and decides the path by which to forward the packet to a remote network.

It shields the upper layer protocol from being aware of the physical medium to be used in the communication.

Which two acronyms represent the data link sublayers that Ethernet relies upon to operate? (Choose two.) SFD LLC CSMA MAC FCS

LLC, MAC

Which range of link-local addresses can be assigned to an IPv6-enabled interface? FEC0::/10 FDEE::/7 FE80::/10 FF00::/8

Link-local addresses are in the range of FE80::/10 to FEBF::/10. The original IPv6 specification defined site-local addresses and used the prefix range FEC0::/10, but these addresses were deprecated by the IETF in favor of unique local addresses. FDEE::/7 is a unique local address because it is in the range of FC00::/7 to FDFF::/7. IPv6 multicast addresses have the prefix FF00::/8.

Data Link Layer: LLC syblayet

Logical Link Control- This upper sublayer defines the software processes that provide services to the network layer protocols. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media.

Data Link Layer: MAC sublayer

Media Access Control (MAC): This lower sublayer defines the media access processes performed by the hardware. It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use.

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.) data link network physical session transport

Network Transport The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI session layer (with the presentation layer) is included within the TCP/IP application layer.

Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.) TCP IP UDP POP DNS Ethernet

POP DNS

Two network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching? The fragment-free switching offers the lowest level of latency. Fast-forward switching can be viewed as a compromise between store-and-forward switching and fragment-free switching. Fragment-free switching is the typical cut-through method of switching. Packets can be relayed with errors when fast-forward switching is used

Packets can be relayed with errors when fast-forward switching is used explain: Fast-forward switching offers the lowest level of latency and it is the typical cut-through method of switching. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors.

What type of address is 198.133.219.162? link-local public loopback multicast

Public

What service is provided by POP3? Retrieves email from the server by downloading the email to the local mail application of the client. An application that allows real-time chatting among remote users. Allows remote access to network devices and servers. Uses encryption to provide secure remote access to network devices and servers.

Retrieves email from the server by downloading the email to the local mail application of the client.

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting? SSH TFTP DHCP DNS

SSH

Part of OS that interfaces with applications and the user? Telnet GUI Shell Kernel CLI

Shell- The shell is the part of the operating system that is closest to the user.

An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? Switch >config t Invalid command at marker -The entire command, configure terminal, must be used. -The administrator is already in global configuration mode. The administrator must first enter privileged EXEC mode before issuing the command. -The administrator must connect via the console port to access global configuration mode.

The administrator must first enter privileged EXEC mode before issuing the command: In order to enter global configuration mode, the command configure terminal, or a shortened version such as config t, must be entered from privileged EXEC mode. In this scenario the administrator is in user EXEC mode, as indicated by the > symbol after the hostname. The administrator would need to use the enable command to move into privileged EXEC mode before entering the configure terminal command.

A router boots and enters setup mode. What is the reason for this? The IOS image is corrupt. Cisco IOS is missing from flash memory. The configuration file is missing from NVRAM. The POST process has detected hardware failure.

The configuration file is missing from NVRAM./ The startup configuration file is stored in NVRAM and contains the commands needed to initially configure a router. It also creates the running configuration file that is stored in in RAM.

If the default gateway is configured incorrectly on the host, what is the impact on communications? There is no impact on communications. The host is unable to communicate on the local network. The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. Explanation: A default gateway is only required to communicate with devices on another network. The absence of a default gateway does not affect connectivity between devices on the same local network.

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The source port field identifies the running application or service that will handle data returning to the PC. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. TCP is the preferred protocol when a function requires lower network overhead. The TCP source port number identifies the sending host on the network.

The source port field identifies the running application or service that will handle data returning to the PC UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data.

What happens when a switch receives a frame and the calculated CRC value is different than the value that is in the FCS field? The switch notifies the source of the bad frame. The switch places the new CRC value in the FCS field and forwards the frame. The switch drops the frame. The switch floods the frame to all ports except the port through which the frame arrived to notify the hosts of the error.

The switch drops the frame. -The purpose of the CRC value in the FCS field is to determine if the frame has errors. If the frame does have errors, then the frame is dropped by the switch.

What does the value of the window size specify? -the amount of data that can be sent at one time the amount of data that can be sent before an acknowledgment is required -the total number of bits received during this TCP session -a random number that is used in establishing a connection with the 3-way handshake

The window size determines the number of bytes that can be sent before expecting an acknowledgment. The acknowledgment number is the number of the next expected byte.

What are two ways to protect a computer from malware? (Choose two.) Empty the browser cache. Use antivirus software. Delete unused software. Keep software up to date. Defragment the hard disk.

Use antivirus software. Keep software up to date.

To which TCP port group does the port 414 belong? well-known private or dynamic public registered

Well Known Ports: 0 through 1023.

Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? virus worm phishing spam

Worm

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? a user who is trying to guess a password to access the router a worm that is attempting to access another part of the network an unidentified individual who is trying to access the network equipment room a device that is trying to inspect the traffic on a link

a user who is trying to guess a password to access the router Explanation: The login block-for 180 attempts 2 within 30 command will cause the device to block authentication after 2 unsuccessful attempts within 30 seconds for a duration of 180 seconds. A device inspecting the traffic on a link has nothing to do with the router. The router configuration cannot prevent unauthorized access to the equipment room. A worm would not attempt to access the router to propagate to another part of the network.

What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) error detection frame delimiting accessing the media data encapsulation logical addressing

accessing the media data encapsulation

What does the IP address 192.168.1.15/29 represent? subnetwork address unicast address multicast address broadcast address

broadcast address Explanation: A broadcast address is the last address of any given network. This address cannot be assigned to a host, and it is used to communicate with all hosts on that network.

What does a router do when it receives a Layer 2 frame over the network medium? re-encapsulates the packet into a new frame forwards the new frame appropriate to the medium of that segment of the physical network determines the best path de-encapsulates the frame

de-encapsulates the frame/ Routers are responsible for encapsulating a frame with the proper format for the physical network media they connect. At each hop along the path, a router does the following:Accepts a frame from a medium De-encapsulates the frame Determines the best path to forward the packet Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network

Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address? destination IPv4 address protocol TTL header checksum

destination IPv4 address

What are two functions that are provided by the network layer? (Choose two.) directing data packets to destination hosts on other networks placing data on the network medium carrying data between processes that are running on source and destination hosts providing dedicated end-to-end connections providing end devices with a unique network identifier

directing data packets to destination hosts on other networks providing end devices with a unique network identifier

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) responsible for internal structure of Ethernet frame applies source and destination MAC addresses to Ethernet frame integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper enables IPv4 and IPv6 to utilize the same physical medium handles communication between upper layer networking software and Ethernet NIC hardware

enables IPv4 and IPv6 to utilize the same physical medium handles communication between upper layer networking software and Ethernet NIC hardware

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) implements CSMA/CD over legacy shared half-duplex media enables IPv4 and IPv6 to utilize the same physical medium integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper implements a process to delimit fields within an Ethernet 2 frame places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame

enables IPv4 and IPv6 to utilize the same physical medium places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame

Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029? fe80:9ea:0:2200::fe0:290 fe80:9ea0::2020::bf:e0:9290 fe80::220:b3f:f0e0:29 fe80:9ea0::2020:0:bf:e0:9290

fe80::220:b3f:f0e0:29

Which two issues can cause both runts and giants in Ethernet networks? (Choose two.) using the incorrect cable type half-duplex operations a malfunctioning NIC electrical interference on serial interfaces CRC errors

half-duplex operations a malfunctioning NIC - Because collisions are a normal aspect of half-duplex communications, runt and giant frames are common by-products of those operations. A malfunctioning NIC can also place frames on the network that are either too short or longer than the maximum allowed length.

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? -if the TCP/IP stack is functioning on the PC without putting traffic on the wire -if there is connectivity with the destination device the path that traffic will take to reach the destination -what type of device is at the destination

if there is connectivity with the destination device

What are two common causes of signal degradation when using UTP cabling? (Choose two.) improper termination low-quality shielding in cable installing cables in conduit low-quality cable or connectors loss of light over long distances

improper termination low-quality cable or connectors

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.) extensive cabling mobility options packet collision interference security coverage area

interference security coverage area

What type of IPv6 address is represented by ::1/128? EUI-64 generated link-local global unicast unspecified loopback

loopback

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.) message size message encoding connector specifications media selection delivery options end-device installation

message size message encoding delivery options

What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.) neighbor solicitations echo requests neighbor advertisements echo replies router solicitations router advertisements 2. Which range of link-local addre

neighbor solicitations neighbor advertisements

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.) nslookup cisco.com ping cisco.com ipconfig /flushdns net cisco.com nbtstat cisco.com

nslookup cisco.com ping cisco.com The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result. Nslookup is a tool for testing and troubleshooting DNS servers.

Which command is used to manually query a DNS server to resolve a specific host name? tracert ipconfig /displaydns nslookup net

nslookup/ The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The ipconfig /displaydns command only displays previously resolved DNS entries. The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used? peer-to-peer client-based master-slave point-to-point

peer-to-peer/ In a peer-to-peer (P2P) networking model, data is exchanged between two network devices without the use of a dedicated server. ​

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.) presentation physical network data link transport application session

presentation application session

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​ neighbor solicitation router advertisement router solicitation protocol unreachable route redirection

protocol unreachable route redirection The ICMP messages common to both ICMPv4 and ICMPv6 include: host confirmation, destination (net, host, protocol, port) or service unreachable, time exceeded, and route redirection. Router solicitation, neighbor solicitation, and router advertisement are new protocols implemented in ICMPv6.

What routing table entry has a next hop address associated with a destination network? directly-connected routes local routes remote routes C and L source routes

remote routes Explanation: Routing table entries for remote routes will have a next hop IP address. The next hop IP address is the address of the router interface of the next device to be used to reach the destination network. Directly-connected and local routes have no next hop, because they do not require going through another router to be reached.

Which two commands can be used on a Windows host to display the routing table? (Choose two.) netstat -s route print show ip route netstat -r tracert

route print netstat -r

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model? bits frame packet segment

segment/ At the transport layer, a host computer will de-encapsulate a segment to reassemble data to an acceptable format by the application layer protocol of the TCP/IP model.

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task? copy running-config startup-config show interfaces show ip nat translations show running-config

show running-config

What characteristic describes spyware? software that is installed on a user device and collects information about the user the use of stolen credentials to access private data an attack that slows or crashes a device or network service a network device that filters access and traffic coming into a network

software that is installed on a user device and collects information about the user

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached? cut-through store-and-forward fast-forward fragment-free

store-and-forward

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish? pinging a host computer that has the IP address 127.0.0.1 on the network tracing the path to a host computer on the network and the network has the IP address 127.0.0.1 checking the IP address on the network card testing the integrity of the TCP/IP stack on the local machine

testing the integrity of the TCP/IP stack on the local machine/ 127.0.0.1 is an address reserved by TCP/IP to test the NIC, drivers and TCP/IP implementation of the device.

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination? the network domain of the destination host the IP address of the default gateway the MAC address of the destination host the MAC address of the default gateway

the MAC address of the default gateway

What characteristic describes identity theft? the use of stolen credentials to access private data software on a router that filters traffic based on IP addresses or applications software that identifies fast-spreading threats a tunneling protocol that provides remote users with secure access into the network of an organization

the use of stolen credentials to access private data

What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time? latency goodput throughput bandwidth

throughput


Related study sets

LESSON 4 PHILOSOPHY ( THE HUMAN PERSON IN THE ENVIRONMENT )

View Set

Chapter 11 NY Licensing: Medicare Supplement Insurance

View Set

Ch. 16 The Oceans, Coastal Processes, and Landforms -- GEOG 1710

View Set

Psych Exam #4 (Ch 11-19, 21-24, 32-35)

View Set

Financial Literacy Lesson 1- Banking Basics

View Set

Strategic Management: Chapter Nine

View Set

Managerial Accounting- Chapter 18

View Set

Reproductive System - Preparation for Lecture Exam

View Set