CCNA 121 - 160 Flashcards
A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?
SSH
SMB/CIFS
HTTPS
SLP
SSH
What characteristic describes an IPS?
A. a tunneling protocol that provides remote users with secure access into the network of an organization
B. a network device that filters access and traffic coming into a network
C. software that identifies fast-spreading threats
D. software on a router that filters traffic based on IP addresses or applications
a network device that filters access and traffic coming into a network
What service is provided by DHCP?
A. An application that allows real-time chatting among remote users.
B. Allows remote access to network devices and servers.
C. Dynamically assigns IP addresses to end and intermediary devices.
D. Uses encryption to provide secure remote access to network devices and servers.
Dynamically assigns IP addresses to end and intermediary devices.
Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments?
Bluetooth
Zigbee
WiMAX
Wi-Fi
Zigbee
What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)
neighbor solicitations
echo requests
neighbor advertisements
echo replies
router solicitations
router advertisements
Neighbor solicitations
Neighbor advertisements
A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?
A. It must send a DHCPv6 INFORMATION-REQUEST message to request the address of the DNS server.
B. It must send a DHCPv6 REQUEST message to the DHCPv6 server to request permission to use this address.
C. It must send an ICMPv6 Router Solicitation message to determine what default gateway it should use.
D. It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.
It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.
Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?
A. The default gateway is not operational.
B. The default gateway device is configured with the wrong IP address.
C. Security rules are applied to the default gateway device, preventing it from processing ping requests.
D. The TCP/IP stack on the default gateway is not working properly.
Security rules are applied to the default gateway device, preventing it from processing ping requests.
An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?
256
512
1024
4096
256
What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?
255.255.255.0
255.255.255.240
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.192
What is a benefit of using cloud computing in networking?
A. Technology is integrated into every-day appliances allowing them to interconnect with other devices, making them more ‘smart’ or automated.
B. Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
C. End users have the freedom to use personal tools to access information and communicate across a business network.
D. Home networking uses existing electrical wiring to connect devices to the network wherever there is an electrical outlet, saving the cost of installing data
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)
A. Destination IP addresses in a packet header remain constant along the entire path to a target host.
B. Destination MAC addresses will never change in a frame that goes across seven routers.
C. Every time a frame is encapsulated with a new destination MAC address, a new destination IP address is needed.
D. Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.
E. A packet that has crossed four routers has changed the destination IP address four times.
A. Destination IP addresses in a packet header remain constant along the entire path to a target host.
D. Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.
What is one main characteristic of the data link layer?
A. It generates the electrical or optical signals that represent the 1 and 0 on the media.
B. It converts a stream of data bits into a predefined code.
C. It shields the upper layer protocol from being aware of the physical medium to be used in the communication.
D. It accepts Layer 3 packets and decides the path by which to forward the packet to a remote network.
It shields the upper layer protocol from being aware of the physical medium to be used in the communication.
What are three characteristics of the CSMA/CD process? (Choose three.)
A. The device with the electronic token is the only one that can transmit after a collision.
B. A device listens and waits until the media is not busy before transmitting.
C. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
D. All of the devices on a segment see data that passes on the network medium.
E. A jam signal indicates that the collision has cleared and the media is not busy.
Devices can be configured with a higher transmission priority.
B. A device listens and waits until the media is not busy before transmitting.
C. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
D. All of the devices on a segment see data that passes on the network medium.
Which information does the show startup-config command display?
A. the IOS image copied into RAM
B. the bootstrap program in the ROM
C. the contents of the current running configuration file in the RAM
D. the contents of the saved configuration file in the NVRAM
the contents of the saved configuration file in the NVRAM
Which two commands can be used on a Windows host to display the routing table? (Choose two.)
netstat -s
route print
show ip route
netstat -r
tracert
Route print
Netstat -r