10.7 Flashcards

1
Q

Which three statements characterize UDP? (Choose three.)
 UDP provides basic connectionless transport layer functions.
 UDP provides connection-oriented, fast transport of data at Layer 3.
 UDP relies on application layer protocols for error detection.
 UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
 UDP relies on IP for error detection and recovery.
 UDP provides sophisticated flow control mechanisms.

A

 UDP provides basic connectionless transport layer functions.*
 UDP relies on application layer protocols for error detection. *
 UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a key characteristic of the peer-to-peer networking model?
 wireless networking
 social networking without the Internet
 network printing using a print server
 resource sharing without a dedicated server

A

 resource sharing without a dedicated server*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?
	tracert
	ipconfig
	netstat
	nslookup
A

 nslookup*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which domain name would be an example of a top-level domain?
	www.cisco.com
	cisco.com
	.com
	root.cisco.com
A

 .com*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
 The configuration is permanent and nothing changes.
 The address lease is automatically renewed until the PC is returned.
 The address is returned to the pool for reuse when the lease expires.
 The configuration is held by the server to be reissued when the PC is returned.

A

 The address is returned to the pool for reuse when the lease expires.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When planning for network growth, where in the network should packet captures take place to assess network traffic?
 on as many different network segments as possible
 only at the edge of the network
 between hosts and the default gateway
 only on the busiest network segment

A

 on as many different network segments as possible*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A wireless host needs to request an IP address. What protocol would be used to process the request?
	FTP
	HTTP
	DHCP
	ICMP
	SNMP
A

 DHCP*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which example of malicious code would be classified as a Trojan horse?
 malware that was written to look like a video game
 malware that requires manual user intervention to spread between systems
 malware that attaches itself to a legitimate program and spreads to other programs when launched
 malware that can automatically spread from one system to another by exploiting a vulnerability in the target

A

 malware that was written to look like a video game*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When applied to a router, which command would help mitigate brute-force password attacks against the router?
 exec-timeout 30
 service password-encryption
 banner motd $Max failed logins = 5$
 login block-for 60 attempts 5 within 60

A

 login block-for 60 attempts 5 within 60*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
61.	Which two tasks are functions of the presentation layer? (Choose two.)
	compression
	addressing
	encryption
	session control
	authentication
A

 encryption*

 compression*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly