Cisco Questions Flashcards
What is done to an IP packet before it is transmitted over the physical medium?
It is tagged with information guaranteeing reliable delivery.
It is segmented into smaller individual pieces.
It is encapsulated into a TCP segment.
It is encapsulated in a Layer 2 frame.
It is encapsulated in a Layer 2 frame
What type of communication medium is used with a wireless LAN connection?
fibre
radio waves
microwave
UTP
radio waves
In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)
crosstalk
bandwidth
size of the network
signal modulation technique
electromagnetic interference
crosstalk
electromagnetic interference
What are the two sublayers of the OSI model data link layer? (Choose two.)
internet
physical
LLC
transport
MAC
network access
LLC & MAC
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
bus
hierarchical
mesh
ring
star
Mesh
What type of communication rule would best describe CSMA/CD?
access method
flow control
message encapsulation
message encoding
access method
If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?
Layer 3
data link
physical
Layer 4
data link
What best describes the destination IPv4 address that is used by multicasting?
*A single IP multicast address that is used by all destinations in a group
*An IP address that is unique for each destination in the group
*A group address that shares the last 23 bits with the source IPv4 address
*A 48 bit address that is determined by the number of members in the multicast group
A single IP multicast address that is used by all destinations in a group
In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do?
-Drop the frame
-Process the frame as it is
-Send an error message to the sending device
-Add random data bytes to make the frame 1518 bytes long and then forward it
Process the frame as it is
What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?
-Source MAC address
-Source IP address
-Destination MAC address
-Ethernet type
-Destination IP address
Destination MAC address
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
- It initiates an ARP request.
- It broadcasts the frame out of all ports on the switch.
- It notifies the sending host that the frame cannot be delivered.
- It forwards the frame out of all ports except for the port at which the frame was received.
It forwards the frame out of all ports except for the port at which the frame was received.
What are two features of ARP? (Choose two.)
A. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.
B. An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and its multicast MAC address.
C. When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses.
D. If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment.
If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.
A & D
Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names? (Choose two.)
DNS
WINS
HTTP
DHCP
SMTP
DNS & DHCP
What is a basic characteristic of the IP protocol?
a. connectionless
b. media dependent
c. user data segmentation
d. reliable end-to-end delivery
connectionless
What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?
a. 2001:DB8:0:AB00::1234
b. 2001:DB8:0:AB::1234
c. 2001:DB8::AB00::1234
d. 2001:DB8:0:AB:0:1234
2001:DB8:0:AB00::1234
At a minimum, which address is required on IPv6-enabled interfaces?
a. link-local
b. unique local
c. site local
d. global unicast
link-local
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?
a. All IPv6 enabled devices across the network
b. All IPv6 enabled devices on the local link
c. All IPv6 DHCP servers
d. All IPv6 configured routers on the local link
All IPv6 configured routers on the local link
What is the purpose of ICMP messages?
a. to inform routers about network topology changes
b. to ensure the delivery of an IP packet
c. to provide feedback of IP packet transmissions
d. to monitor the process of a domain name to IP address resolution
To provide feedback of IP packet transmissions
Which statement describes a characteristic of the traceroute utility?
a. It sends four Echo Request messages.
b. It utilizes the ICMP Source Quench messages.
c. It is primarily used to test connectivity between two hosts.
d. It identifies the routers in the path from a source host to a destination host
It identifies the routers in the path from a source host to a destination host
What is the usable number of host IP addresses on a network that has a /26 mask?
256
254
64
62
32
16
62
An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22?
172.16.16.255
172.16.20.255
172.16.19.255
172.16.23.255
172.16.255.255
172.16.19.255
Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?
2001:db8:0:f00::/52
2001:db8:0:8000::/52
2001:db8:0:f::/52
2001:db8:0:f000::/52
2001:db8:0:f000::/52
A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?
A. The data flow is being tracked based on the destination port number utilized by each application.
B. The data flow is being tracked based on the source port number utilized by each application.
C. The data flow is being tracked based on the source IP address used by the PC of the technician.
D. The data flow is being tracked based on the destination IP address used by the PC of the technician.
The data flow is being tracked based on the source port number utilized by each application.
What three services are provided by the transport layer? (Choose three.)
flow control
encryption of data
path determination
connection establishment
error recovery
bit transmission
data representation
flow control, connection establishment & error recovery
An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination?
A. A delivery failure message is sent to the source host.
B. The part of the television transmission that was lost is re-sent.
C. The entire transmission is re-sent.
D. The transmission continues without the missing portion.
The transmission continues without the missing portion.
What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?
2001:DB8:0:AB00::1234
2001:DB8:0:AB::1234
2001:DB8::AB00::1234
2001:DB8:0:AB:0:1234
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?
all IPv6 enabled devices across the network
all IPv6 enabled devices on the local link
all IPv6 DHCP servers
all IPv6 configured routers on the local link
all IPv6 configured routers on the local link
Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two.)
internet
network
presentation
session
transport
presentation & session
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
client
master
server
slave
transient
Client
Which two automatic addressing assignments are supported by DHCPv4? (Choose two.)
ocal server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender
subnet mask & default gateway address
When a network administrator is trying to manage network traffic on a growing network, when should traffic flow patterns be analyzed?
during times of peak utilization
during off-peak hours
during employee holidays and weekends
during randomly selected times
During times of peak utilization
What is the objective of a network reconnaissance attack?
a. discovery and mapping of systems
b. unauthorized manipulation of data
c. disabling network systems or services
d. denying access to resources by legitimate users
discovery and mapping of systems
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
This command encrypts passwords as they are transmitted across serial WAN links.
This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.
This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.
This command enables a strong encryption algorithm for the enable secret password command.
This command prevents someone from viewing the running configuration passwords
This command prevents someone from viewing the running configuration passwords
What will be the result of failed login attempts if the following command is entered into a router?
All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds
Which two statements correctly describe a router memory type and its contents? (Choose two.)
ROM is non-volatile and stores the running IOS.
FLASH is non-volatile and contains a limited portion of the IOS.
RAM is volatile and stores the IP routing table.
NVRAM is non-volatile and stores a full version of the IOS.
ROM is non-volatile and contains basic diagnostic software.
RAM is volatile and stores the IP routing table & ROM is non-volatile and contains basic diagnostic software.