10.7 Flashcards
Which three statements characterize UDP? (Choose three.)
UDP provides basic connectionless transport layer functions.
UDP provides connection-oriented, fast transport of data at Layer 3.
UDP relies on application layer protocols for error detection.
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
UDP relies on IP for error detection and recovery.
UDP provides sophisticated flow control mechanisms.
UDP provides basic connectionless transport layer functions.*
UDP relies on application layer protocols for error detection. *
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms
What is a key characteristic of the peer-to-peer networking model?
wireless networking
social networking without the Internet
network printing using a print server
resource sharing without a dedicated server
resource sharing without a dedicated server*
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem? tracert ipconfig netstat nslookup
nslookup*
Which domain name would be an example of a top-level domain? www.cisco.com cisco.com .com root.cisco.com
.com*
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
The configuration is permanent and nothing changes.
The address lease is automatically renewed until the PC is returned.
The address is returned to the pool for reuse when the lease expires.
The configuration is held by the server to be reissued when the PC is returned.
The address is returned to the pool for reuse when the lease expires.*
When planning for network growth, where in the network should packet captures take place to assess network traffic?
on as many different network segments as possible
only at the edge of the network
between hosts and the default gateway
only on the busiest network segment
on as many different network segments as possible*
A wireless host needs to request an IP address. What protocol would be used to process the request? FTP HTTP DHCP ICMP SNMP
DHCP*
Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
malware that requires manual user intervention to spread between systems
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that can automatically spread from one system to another by exploiting a vulnerability in the target
malware that was written to look like a video game*
When applied to a router, which command would help mitigate brute-force password attacks against the router?
exec-timeout 30
service password-encryption
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60
login block-for 60 attempts 5 within 60*
61. Which two tasks are functions of the presentation layer? (Choose two.) compression addressing encryption session control authentication
encryption*
compression*