practice quiz questions

Ace your homework & exams now with Quizwiz!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption

Which three devices are considered end devices in a network? (Choose three.)

-VoIP phone -Security camera -TelePresence Endpoint

Which statement is true about Cisco IOS ping indicators?​

'U' may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.

Which statement describes a characteristic of a converged network?

A single network that delivers voice, video, and data to a variety of devices.

Refer to the graphic. H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true?

H1 sends a unicast message to H2, and the switch forwards it directly to H2.

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP.

Which statement correctly describes frame encoding?

It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.

Why is DHCP preferred for use on large networks?

It is a more efficient way to manage IP addresses than static address assignment.

What is true about a client-server network?

The network includes a dedicated server.

Why are open standards important in the data communications industry?

They enable interoperability between software and hardware from different vendors.

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN

On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represents the _____ MAC address.

broadcast

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast

Which logical address is used for delivery of data to a remote network?

destination IP address

How should traffic flow be captured in order to best understand traffic patterns in a network?

during peak utilization times

This field checks if the frame has been damaged during the transfer

error detection

Which three acronyms/initialisms represent standards organizations? (Choose three.)

- IANA -IEEE -IETF

Which two types of devices are typically assigned static IP addresses? (Choose two.)

-web servers -printers

a public address

198.133.219.2

The shortest compressed format of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200 is

2001:DB8:0:1470::200

A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?

65536

How does BYOD change the way in which businesses implement networks?​

BYOD provides flexibility in where and how users can access network resources.

When the store-and-forward method of switching is in use, what part of the Ethernet frame is used to perform an error check?

CRC in the trailer

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?

Flow Label

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

What does the IP address 192.168.1.15/29 represent?

broadcast address

What type of delivery uses data link layer addresses?

local and remote delivery

Which portion of the network layer address does a router use to forward packets?

network portion

A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?

peer-to-peer (P2P)

What is the primary purpose of ARP?

resolve IPv4 addresses to MAC addresses

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

transport

True or False? In FTP transactions, an FTP client uses the pull method to download files from an FTP server.

true

This field is used by the LLC to identify the Layer 3 protocol.

type

electrical threats

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

Which key combination allows a user to abort setup mode?

Ctrl-C

True or False? Mobile devices do not require IP addresses to communicate on the Internet.

False Refer to curriculum topic: 2.3.1 All devices that communicate over data networks need unique IP addresses.

This type of media is used for high transmission and can also transfer over long distances

Optical Fiber

Which transport layer feature is used to guarantee session establishment?

TCP 3-way handshake

On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?

a home router

What is a WAN?

a network infrastructure that provides access to other networks over a large geographic area

Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)

-10.18.10.208/28 -10.18.10.224/28

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

-DNS -VoIP

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

-DNS server -default gateway

Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)

-HTTP -MPEG -GIF

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

-It is responsible for Media Access Control. -It adds a header and trailer to form an OSI Layer 2 PDU.

Which three fields are used in a UDP segment header? (Choose three.)

-Length -Source Port -Checksum

Which two statements are true regarding the user EXEC mode? (Choose two.)

-The device prompt for this mode ends with the ">" symbol. -Only some aspects of the router configuration can be viewed.

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

-console ports -vty ports

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

-displaying a list of all available commands within the current mode -determining which option, keyword, or argument is available for the entered command

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

shared memory buffering

The component of the operating software that provides the user interface is called the _______.

shell

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

show file systems

cable

signal carried on the same copper or fiber medium as the television signal

What is the purpose of the TCP sliding window?

to request that a source decrease the rate at which it transmits data

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to test that the host has the capability to reach hosts on other networks

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5

What is the purpose of the OSI physical layer?

transmitting bits across the local media

What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence?

transport

What method is used to manage contention-based access on a wireless network?

CSMA/CA

Traditionally used for television but now can be used in a network to connect to the customer location to the wiring of the customer premises

Coaxial

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

PC's, laptops, servers, printers, VoIP phones, security cameras, and hand-held devices are what type of device type?

End device type

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? You Answered

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

The acronym _______ is used to define the process that allows multiple devices to share a single routable IP address.

PAT

Which protocol can be used to transfer messages from an email server to an email client?

POP3

Network services use _____ to define a set of rules that govern how devices communicate and the data formats used in a network.

Protocols

Open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which interfaces in each router are active and operational?

R1: G0/0 and S0/0/0 R2: G0/1 and S0/0/0

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

RT1 will send an ARP reply with its own Fa0/0 MAC address.

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10

In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?

SLAAC

What is an advantage of SMB over FTP?​

SMB clients can establish a long-term connection to the server.​

How is SSH different from Telnet?

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

This type of copper media is used in industrial or similar environments where there is a lot of interference.

STP

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

SVI

To save time, IOS commands may be partially entered and then completed by typing which key or key combination?

Tab

How does the network layer use the MTU value?

The MTU is passed to the network layer by the data link layer

What is a characteristic of a WAN hub-and-spoke topology?

The branch sites are connected to a central site through point-to-point links.​

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

The client randomly selects a source port number.

Within a production network, what is the purpose of configuring a switch with a default gateway address?

The default gateway address is used to forward packets originating from the switch to remote networks.

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device needs mobility when connecting to the network.

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.

Which statement describes a characteristic of the frame header fields of the data link layer?

They vary depending on protocols.

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Time-to-Live

What is an advantage of UDP over TCP?

UDP communication requires less overhead.

An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again?

Use DHCP to automatically assign addresses.

This type of media provides the most mobility options.

Wireless

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access

cellular

access via the cell phone network

This field helps to direct the frame towards it destination

addressing

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

all IPv6 enabled devices on the local link​ or network

What type of address is 01-00-5E-0A-00-02?

an address that reaches a specific group of hosts

Which TCP/IP model layer is closest to the end user?

application

What type of applications are best suited for using UDP?

applications that are sensitive to delay

SDSL

business class service that provides the same upload and download speeds over telephone lines

At which layer of the OSI model would a physical address be encapsulated?

data link layer

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

fault tolerance

What is one of the most effective security tools available for protecting users from external threats?

firewalls

During the boot process, where will the router bootstrap program look for the IOS image by default?

flash

This field identifies the beginning of a frame

frame start

Which method of data transfer allows information to be sent and received at the same time?

full duplex

This network portion of the address is assigned by the provider.

global routing prefix

Metro Ethernet

high-speed business class copper or fiber connection

This part of the address is the equivalent to the host portion of an IPv4 address.

interface ID

Routers and Switches are what device type?

intermediary

Typical internal security threats include weak or exposed passwords, lost or stolen devices, and malicious employees

internal security threat to an organization

What layer of the TCP/IP protocol model determines the best path through the network?

internet

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /displaydns

Which type of IPv6 address is not routable and used only for communication on a single subnet?

link-local address

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

local router

A router may have to fragment a packet when forwarding it from one medium to another medium that has a smaller _________.

maximum transmission unit (MTU)

If there are two or more possible routes to the same destination, the _______ is used to determine which route is used in the routing table.

metric

What type of message is sent to a specific group of hosts?

multicast

The MAC address of a PC does not change when the PC is moved to a different network because the MAC address is embedded in the _____ of the PC.

network card or NIC

Which element of scaling a network involves identifying the physical and logical topologies?

network documentation

Which command is used to manually query a DNS server to resolve a specific host name?

nslookup

hardware threats

physical damage to servers, routers, switches, cabling plant, and workstations

In order to test end-to-end connectivity, you would use the ____ command.

ping Refer to curriculum topic: 2.3.3 Connectivity between two end devices can be tested using the ping, tracert, or traceroute commands.

maintenance threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

What is the general term that is used to describe a piece of data at any layer of a networking model?

protocol data unit

What is the purpose of protocols in data communications?

providing the rules required for a specific type of communication to occur

satellite

requires a dish and clear line of sight for service

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

spyware

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

store-and-forward

Refer to the exhibit. One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T568A standard. What type of cable would be created in this manner?

straight-through

This part of the address is used by an organization to identify subnets.

subnet ID

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?

subnetwork 192.168.1.64 subnet mask 255.255.255.192

environmental threats

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)

What type of information is contained in a DNS MX record?

the domain name mapped to mail exchange servers

Why would a technician enter the command copy startup-config running-config?

to copy an existing configuration into RAM

Which is a function of the Logical Link Control (LLC) sublayer?

to identify which network layer protocol is being used

What is the purpose of using a source port number in a TCP communication?

to keep track of multiple conversations between devices

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

tunneling

What type of traffic would most likely have the highest priority through the network?

voice

The minimum Ethernet frame size is _______ bytes. Anything smaller than that should be considered a "runt frame."

64

What type of cable is used to connect a workstation serial port to a Cisco router console port?

rollover

What is the prefix length notation for the subnet mask 255.255.255.224?

/27

A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.)

-geographic location -device type

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

-greater distances per cable run -limited susceptibility to EMI/RFI -greater bandwidth potential

What are two characteristics of a scalable network? (Choose two.)

-grows in size without impacting existing users -suitable for modular devices that allow for expansion

Which two factors influence the method that is used for media access control? (Choose two.)

-how the connection between nodes appears to the data link layer -how nodes share the media

What are three responsibilities of the transport layer? (Choose three.)

-meeting the reliability requirements of applications, if any -multiplexing multiple communication streams from many users or applications on the same network -identifying the applications and services on the client and server that should handle transmitted data

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)

-message encoding -message size -delivery options

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

-privileged EXEC mode -console interface -VTY interface

What are two functions that are provided by the network layer? (Choose two.)

-providing end devices with a unique network identifier -directing data packets to destination hosts on other networks

What are two benefits of subnetting networks? (Choose two.)

-reducing the size of broadcast domains -grouping devices to improve management and security

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

-session layer -application layer -presentation layer

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

-the hostname should contain no spaces -the hostname should be fewer than 64 characters in length -the hostname should begin with a letter

Refer to the exhibit. What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1?

00-60-2F-3A-07-CC

The 8-digit binary value of the last octet of the IPv4 address 172.17.10.7 is?

00000111

The binary number 0000 1010 can be expressed as _______ in hexadecimal.

0A

A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. (Not all options are used.) 1) Step 1 2) Step 2 3) Step 3 4) Step 4

1) Client sends FIN 2) Server sends ACK 3) Server sends FIN 4) Client send ACK

Match the IPv6 address with the IPv6 address type. (Not all options are used.) 1.) 2001:DB8::BAF:3F57:FE94 2.) FF02::1 3.) ::1 4.) FF02::1:FFAE:F85F

1.) global unicast 2.) all node multicast 3.) loopback 4.) solicited node multicast

Which IPv4 address can a host use to ping the loopback interface?

127.0.0.1

a loopback address

127.0.0.1

Refer to the exhibit. What is the maximum possible throughput between the PC and the server?

128 kb/s Refer to curriculum topic: 4.1.3 The maximum throughput between any two nodes on a network is determined by the slowest link between those nodes.

a link-local address

169.254.1.5

The network portion of the address 172.16.30.5/16 is?

172.16

Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?

192.133.219.1

Which number or set of numbers represents a socket?

192.168.1.1:80

What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?

2001:D12:AA04:B5::/64​

an experimental address

240.2.6.255

The last host address on the 10.15.25.0/24 network is?

254

A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?

255.255.255.224

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?

4

How many host addresses are available on the 192.168.10.128/26 network?

62

What is the decimal equivalent of the hexadecimal value of 3F?

63

What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?

Gnutella

An ____ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.

Intranet

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

It sends the frame to all ports except the port on which it received the frame.

In fiber optic media, the signals are represented as patterns of _______?

Light

The Ethernet ________ sublayer is responsible for communicating directly with the physical layer.

MAC


Related study sets

POSI 2310: Topic 3.2 Ch.7 Political Participation

View Set

ECON210 Chapter 3—Supply & Demand

View Set