Practice FInal Exam questions

Ace your homework & exams now with Quizwiz!

This command prevents someone from viewing the running configuration passwords.

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

10.1.1.128/28 10.1.1.144/28 10.1.1.160/29

A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts?

DSL

A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

Mesh

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

The data flow is being tracked based on the source port number utilized by each application.

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

Nothing can be determined for sure at this point

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?

all IPv6 configured routers on the local link

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​

The transmission continues without the missing portion.

An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination?

client

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

link-local

At a minimum, which address is required on IPv6-enabled interfaces?

Ctrl+Shift+6

For Cisco IOS, which escape sequence allows terminating a traceroute operation?

2001:db8:0:f000::/52

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?

data link

If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?

crosstalk, electromagnetic interference

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables?

process the frame as it is

In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do?

172.16.19.255

Refer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22?

segment

What PDU is associated with the transport layer?

LLC, MAC

What are the two sublayers of the OSI model data link layer?

If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast, If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply

What are two features of ARP?

a single IP multicast address that is used by all destinations in a group

What best describes the destination IPv4 address that is used by multicasting?

destination MAC address

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

connectionless

What is a basic characteristic of the IP protocol?

It is encapsulated in a Layer 2 frame.

What is done to an IP packet before it is transmitted over the physical medium?

discovery and mapping of systems

What is the objective of a network reconnaissance attack?

to provide feedback of IP packet transmissions

What is the purpose of ICMP messages?

The SVI provides a virtual interface for remote access to the switch.

What is the purpose of the SVI on a Cisco switch?

62

What is the usable number of host IP addresses on a network that has a /26 mask?

2001:DB8:0:AB00::1234

What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?

10.0.0.0/8* 172.16.0.0/12* 192.168.0.0/16

What three blocks of addresses are defined by RFC 1918 for private network use?

flow control, connection establishment, error recovery

What three services are provided by the transport layer?

radio waves

What type of communication medium is used with a wireless LAN connection?

access method

What type of communication rule would best describe CSMA/CD?

It forwards the frame out of all ports except for the port at which the frame was received

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds

What will be the result of failed login attempts if the following command is entered into a router? login block-for 150 attempts 4 within 90

during times of peak utilization

When a network administrator is trying to manage network traffic on a growing network, when should traffic flow patterns be analyzed?

Ctrl-Shift-6

Which keys act as a hot key combination that is used to interrupt an IOS process?

broadcast

Which message delivery option is used when all devices need to receive the same message simultaneously?

It identifies the routers in the path from a source host to a destination host

Which statement describes a characteristic of the traceroute utility?

extranet

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

presentation session

Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack?

subnet mask, default gateway address

Which two automatic addressing assignments are supported by DHCP?

ICMP, IP

Which two protocols function at the internet layer?

DNS, DHCP

Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names?

RAM is volatile and stores the IP routing table, ROM is nonvolatile and contains basic diagnostic software

Which two statements correctly describe a router memory type and its contents?


Related study sets

2.5 The Structure and Function of Arteries, Capillaries and Veins

View Set

Питання для підготовки до модульної контрольної роботи з ЦНС (теми 4-7)

View Set

Quiz 10 Unemployment- Macroeconomics

View Set

NRS416 Exam 2 Practice Questions

View Set

Chapter 1 Quiz: Legal Heritage and the Information Age

View Set

ASN Traditional 2015-2017 Adaptive Quizzing for the NCLEX-RN Exam: Psychobiological Disorders

View Set