Cisco Questions Flashcards

1
Q

What is done to an IP packet before it is transmitted over the physical medium?

It is tagged with information guaranteeing reliable delivery.
It is segmented into smaller individual pieces.
It is encapsulated into a TCP segment.
It is encapsulated in a Layer 2 frame.

A

It is encapsulated in a Layer 2 frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of communication medium is used with a wireless LAN connection?

fibre
radio waves
microwave
UTP

A

radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

crosstalk
bandwidth
size of the network
signal modulation technique
electromagnetic interference

A

crosstalk

electromagnetic interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two sublayers of the OSI model data link layer? (Choose two.)

internet
physical
LLC
transport
MAC
network access

A

LLC & MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

bus
hierarchical
mesh
ring
star

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of communication rule would best describe CSMA/CD?

access method
flow control
message encapsulation
message encoding

A

access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?

Layer 3
data link
physical
Layer 4

A

data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What best describes the destination IPv4 address that is used by multicasting?

*A single IP multicast address that is used by all destinations in a group

*An IP address that is unique for each destination in the group

*A group address that shares the last 23 bits with the source IPv4 address

*A 48 bit address that is determined by the number of members in the multicast group

A

A single IP multicast address that is used by all destinations in a group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do?

-Drop the frame
-Process the frame as it is
-Send an error message to the sending device
-Add random data bytes to make the frame 1518 bytes long and then forward it

A

Process the frame as it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

-Source MAC address
-Source IP address
-Destination MAC address
-Ethernet type
-Destination IP address

A

Destination MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

  1. It initiates an ARP request.
  2. It broadcasts the frame out of all ports on the switch.
  3. It notifies the sending host that the frame cannot be delivered.
  4. It forwards the frame out of all ports except for the port at which the frame was received.
A

It forwards the frame out of all ports except for the port at which the frame was received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two features of ARP? (Choose two.)

A. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.

B. An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and its multicast MAC address.

C. When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses.

D. If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment.
If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

A

A & D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names? (Choose two.)

DNS
WINS
HTTP
DHCP
SMTP

A

DNS & DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a basic characteristic of the IP protocol?

a. connectionless
b. media dependent
c. user data segmentation
d. reliable end-to-end delivery

A

connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?

a. 2001:DB8:0:AB00::1234
b. 2001:DB8:0:AB::1234
c. 2001:DB8::AB00::1234
d. 2001:DB8:0:AB:0:1234

A

2001:DB8:0:AB00::1234

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At a minimum, which address is required on IPv6-enabled interfaces?

a. link-local
b. unique local
c. site local
d. global unicast

A

link-local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?

a. All IPv6 enabled devices across the network

b. All IPv6 enabled devices on the local link

c. All IPv6 DHCP servers

d. All IPv6 configured routers on the local link

A

All IPv6 configured routers on the local link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of ICMP messages?

a. to inform routers about network topology changes
b. to ensure the delivery of an IP packet
c. to provide feedback of IP packet transmissions
d. to monitor the process of a domain name to IP address resolution

A

To provide feedback of IP packet transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which statement describes a characteristic of the traceroute utility?

a. It sends four Echo Request messages.
b. It utilizes the ICMP Source Quench messages.
c. It is primarily used to test connectivity between two hosts.
d. It identifies the routers in the path from a source host to a destination host

A

It identifies the routers in the path from a source host to a destination host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the usable number of host IP addresses on a network that has a /26 mask?

256
254
64
62
32
16

A

62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22?

172.16.16.255
172.16.20.255
172.16.19.255
172.16.23.255
172.16.255.255

A

172.16.19.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?

2001:db8:0:f00::/52
2001:db8:0:8000::/52
2001:db8:0:f::/52
2001:db8:0:f000::/52

A

2001:db8:0:f000::/52

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

A. The data flow is being tracked based on the destination port number utilized by each application.

B. The data flow is being tracked based on the source port number utilized by each application.

C. The data flow is being tracked based on the source IP address used by the PC of the technician.

D. The data flow is being tracked based on the destination IP address used by the PC of the technician.

A

The data flow is being tracked based on the source port number utilized by each application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What three services are provided by the transport layer? (Choose three.)

flow control
encryption of data
path determination
connection establishment
error recovery
bit transmission
data representation

A

flow control, connection establishment & error recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination?

A. A delivery failure message is sent to the source host.

B. The part of the television transmission that was lost is re-sent.

C. The entire transmission is re-sent.

D. The transmission continues without the missing portion.

A

The transmission continues without the missing portion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?

2001:DB8:0:AB00::1234

2001:DB8:0:AB::1234

2001:DB8::AB00::1234

2001:DB8:0:AB:0:1234

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?

all IPv6 enabled devices across the network
all IPv6 enabled devices on the local link
all IPv6 DHCP servers
all IPv6 configured routers on the local link

A

all IPv6 configured routers on the local link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two.)

internet
network
presentation
session
transport

A

presentation & session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

client
master
server
slave
transient

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which two automatic addressing assignments are supported by DHCPv4? (Choose two.)

ocal server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender

A

subnet mask & default gateway address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When a network administrator is trying to manage network traffic on a growing network, when should traffic flow patterns be analyzed?

during times of peak utilization
during off-peak hours
during employee holidays and weekends
during randomly selected times

A

During times of peak utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the objective of a network reconnaissance attack?

a. discovery and mapping of systems
b. unauthorized manipulation of data
c. disabling network systems or services
d. denying access to resources by legitimate users

A

discovery and mapping of systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command encrypts passwords as they are transmitted across serial WAN links.

This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.

This command enables a strong encryption algorithm for the enable secret password command.

This command prevents someone from viewing the running configuration passwords

A

This command prevents someone from viewing the running configuration passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What will be the result of failed login attempts if the following command is entered into a router?

A

All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which two statements correctly describe a router memory type and its contents? (Choose two.)

ROM is non-volatile and stores the running IOS.

FLASH is non-volatile and contains a limited portion of the IOS​.

RAM is volatile and stores the IP routing table.

NVRAM is non-volatile and stores a full version of the IOS.

ROM is non-volatile and contains basic diagnostic software.

A

RAM is volatile and stores the IP routing table & ROM is non-volatile and contains basic diagnostic software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?

A. The NIC in the PC is bad.

B. The TCP/IP protocol is not enabled.

C. The router that is attached to the same network as the workstation is down.

D. Nothing can be determined for sure at this point.

A

Nothing can be determined for sure at this point.

37
Q

For Cisco IOS, which escape sequence allows terminating a traceroute operation?

Ctrl+Shift+6
Ctrl+Esc
Ctrl+x
Ctrl+c

A

Ctrl+Shift+6

38
Q

What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)

10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
100.64.0.0/14
169.254.0.0/16
239.0.0.0/8

A

10.0.0.0/8
172.16.0.0/12
192.168.0.0/16

39
Q

What subnet mask is required to support 512 subnets on networks 172.28.0.0/16?

255.255.240.0
255.255.255.224
255.255.255.240
255.255.255.128
255.255.252.0

A

255.255.255.128

40
Q

A DHCP server is used to IP addresses dynamically to the hosts on a network. The address pool is configured with 10.29.244.0/25. There are 19 printers on this network that need to use reserve static IP addresses from the pool. How many IP address in the pool are left to be assign to other hosts?

A

107

41
Q

. What is an advantage of storing configuration files to a USB flash drive instead of to a TFTP server?

A. The files can be saved without using terminal emulation software.

B. The transfer of the files does not rely on network connectivity.

C. The USB flash drive is more secure.

D. The configuration files can be stored to a flash drive that uses any file system format.

A

The transfer of the files does not rely on network connectivity.

42
Q

A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

A. Regenerating data signals

B. acting as a client or a server

C. providing a channel over which messages travel

D. applying security settings to control the flow of data
notifying other devices when errors occur

E. notifying other devices when errors occur

F. serving as the source or destination of the messages

A

Regenerating data signals, applying security settings to control the flow of data and notifying other devices when errors occur.

43
Q

A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

A. DSL
B. dialup
C. satellite
D. leased line
E. cable modem

A

Leased line

44
Q

What is an ISP?

A

It is an organization that enables individuals and businesses to connect to the Internet.

45
Q

Which connection provides a secure CLI session with encryption to a Cisco router?

A

An SSH connection

46
Q

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.

A

The end-user device needs mobility when connecting to the network.

47
Q

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

presentation layer
network layer
physical layer
data link layer

A

physical layer

48
Q

On a point-to-point network, which communication type is used when two devices can both transmit and receive but not at the same time?

A

Half-duplex

49
Q

A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?

-To determine the physical address of the sending device
-To verify the network layer protocol information
-To compare the interface media type between the sending and receiving ends
-To check the frame for possible transmission errors
-To verify that the frame destination matches the MAC address of the receiving device

A

To check the frame for possible transmission errors

50
Q

The ARP table in a switch maps which two types of address together?

A. Layer 3 address to a Layer 2 address
B. Layer 3 address to a Layer 4 address
C. Layer 4 address to a Layer 2 address
D. Layer 2 address to a Layer 4 address

A

Layer 3 address to a Layer 2 address

51
Q

What are two actions performed by a Cisco switch? (Choose two.)

A. Building a routing table that is based on the first IP address in the frame header

B. Using the source MAC addresses of frames to build and maintain a MAC address table

C. Forwarding frames with unknown destination IP addresses to the default gateway

D. Utilizing the MAC address table to forward frames via the destination MAC address

E. Examining the destination MAC address to add new entries to the MAC address table

A

Using the source MAC addresses of frames to build and maintain a MAC address table

Utilizing the MAC address table to forward frames via the destination MAC address

52
Q

Which two functions are primary functions of a router? (Choose two.)

packet switching
microsegmentation
domain name resolution
path selection
flow control

A

packet switching & path selection

53
Q

A router boots and enters setup mode. What is the reason for this?

The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure.

A

The configuration file is missing from NVRAM.

54
Q

Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Perform the POST routine.
Search for a backup IOS in ROM.
Load the bootstrap program from ROM.
Load the running-config file from RAM.
Locate and load the startup-config file from NVRAM.

A

Locate and load the startup-config file from NVRAM.

55
Q

What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

A. to identify missing segments at the destination
B. to reassemble the segments at the remote location
C. to specify the order in which the segments travel from source to destination
D. to limit the number of segments that can be sent out of an interface at one time
E. to determine if the packet changed during transit

A

A. To identify missing segments at the destination
B. To reassemble the segments at the remote location

56
Q

Which service will translate private internal IP addresses into Internet routable public IP addresses?

ARP
DHCP
DNS
NAT

A

NAT

57
Q

Which IPv6 address notation is valid?

2001:0DB8::ABCD::1234
ABCD:160D::4GAB:FFAB
2001:DB8:0:1111::200
2001::ABCD::

A

2001:DB8:0:1111::200

58
Q

Which range of link-local addresses can be assigned to an IPv6-enabled interface??

FEC0::/10?
FDEE::/7?
FEBF::/10
FF00::/8?

A

FEBF::/10

59
Q

What are the three parts of an IPv6 global unicast address? (Choose three.)

broadcast address
global routing prefix
subnet mask
subnet ID
interface ID

A

global routing prefix
subnet ID
interface ID

60
Q

A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?

3
4
6
8
14
16

A

4

61
Q

A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server
WINS server
HTTP server
default gateway
Netbios

A

DNS server & default gateway

62
Q

Which devices should be secured to mitigate against MAC address spoofing attacks?

Layer 7 devices
Layer 4 devices
Layer 2 devices
Layer 3 devices

A

Layer 2 devices

63
Q

Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

line
router
global
interface
privileged EXEC

A

Line

64
Q

To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?

The command should have been copy startup-config tftp.

The configuration should have been copied to the running configuration instead.

The configuration changes were copied into RAM and require a reboot to take effect.

A TFTP server can only be used to restore the Cisco IOS, not the router configuration.

A

The configuration should have been copied to the running configuration instead.

65
Q

Which type of wireless security is easily compromised?

EAP
PSK
WEP
WPA

A

WEP

66
Q

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

A. The Source Address field name from IPv4 is kept in IPv6.
B. The Version field from IPv4 is not kept in IPv6.
C. The Destination Address field is new in IPv6.
D. The Header Checksum field name from IPv4 is kept in IPv6.
E. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

A

The Source Address field name from IPv4 is kept in IPv6.

The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

67
Q

Why are port numbers included in the TCP header of a segment?

to allow the receiving host to assemble the packet in the proper order

to enable a receiving host to forward the data to the appropriate application

to determine which Layer 3 protocol should be used to encapsulate the data

to identify which switch ports should receive or forward the segment

to indicate the correct router interface that should be used to forward a segment

A

To enable a receiving host to forward the data to the appropriate application

68
Q

Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.)

email
voice
file transfer
instant messaging
video

A

Voice & video

69
Q

What are two characteristics of a scalable network? (Choose two.)

A. is not as reliable as a small network
B. Grows in size without impacting existing users
C. easily overloaded with increased traffic
D. Suitable for modular devices that allow for expansion
E. offers limited number of applications

A

Grows in size without impacting existing users & Suitable for modular devices that allow for expansion

70
Q

What information is added during encapsulation at OSI Layer 3?

source and destination port number
source and destination MAC
source and destination IP address
source and destination application protocol

A

source and destination IP address

71
Q

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

It will remove the frame from the media.
It will discard the frame.
It will forward the frame to the next host.
It will strip off the data-link frame to check the destination IP address.

A

It will discard the frame.

72
Q

PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?

1,500
5
6,001
1,501
6,000

A

6001

73
Q

What three primary functions does data link layer encapsulation provide? (Choose three.)

A. error detection
B. port identification
C. addressing
D. path determination
E. IP address resolution
F. frame delimiting

A

A. error detection
C. addressing
F. frame delimiting

74
Q

What three statements describe features or functions of media access control? (Choose three.)

A. Ethernet utilizes CSMA/CD.

B. 802.11 utilizes CSMA/CD.

C. It uses contention-based access also known as deterministic access.

D. Data link layer protocols define the rules for access to different media.

E. Controlled media access involves collision handling.

F. It is responsible for detecting transmission errors in transmitted data.

A

A. Ethernet utilizes CSMA/CD.
D. Data link layer protocols define the rules for access to different media.
F. It is responsible for detecting transmission errors in transmitted data.

75
Q

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater bandwidth potential
limited susceptibility to EMI/RFI
durable connections
easily terminated
greater distances per cable run
lower installation cost

A

greater bandwidth potential
limited susceptibility to EMI/RFI
greater distances per cable run

76
Q

A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

point-to-point
mesh
partial mesh
hub and spoke

A

Partial Mesh

77
Q

What is the function of CSMA/CA in a WLAN?

It assures that clients are connected to the correct WLAN.
It describes the smallest building block of the WLAN.
It provides the mechanism for media access.
It allows a host to move between cells without loss of signal.

A

It provides the mechanism for media access.

78
Q

What is one purpose of the TCP three-way handshake?

A. Synchronizing sequence numbers between source and destination in preparation for data transfer

B. Determining the IP address of the destination host in preparation for data transfer

C. Sending echo requests from the source to the destination host to establish the presence of the destination

D. Requesting the destination to transfer a binary file to the source

A

A. Synchronizing sequence numbers between source and destination in preparation for data transfer

79
Q

An administrator needs to upgrade the IOS in a router to a version that supports new features. Which factor should the administrator consider before performing the upgrade?

NVRAM must be erased before the new IOS can be installed.
The old IOS should be backed up to NVRAM so that it is not lost during a power failure.
The new IOS might require more RAM to function properly.
The old IOS must be removed first.

A

The new IOS might require more RAM to function properly.

80
Q

Which two statements describe the characteristics of fibre-optic cabling? (Choose two.)

A. Fibre-optic cabling does not conduct electricity.

B. Fibre-optic cabling has high signal loss.

C. Fibre-optic cabling is primarily used as backbone cabling.

D. Multimode fibre-optic cabling carries signals from multiple sending devices.

E. Fibre-optic cabling uses LEDs for single-mode cab​les and laser technology for multimode cables.

A

A. Fibre-optic cabling does not conduct electricity.

C. Fibre-optic cabling is primarily used as backbone cabling.

81
Q

What information does the loopback test provide?

The device has the correct IP address on the network.
The Ethernet cable is working correctly.
The device has end-to-end connectivity.
DHCP is working correctly.
The TCP/IP stack on the device is working correctly.

A

The TCP/IP stack on the device is working correctly.

82
Q

When applied to a router, which command would help mitigate brute-force password attacks against the router?

exec-timeout 30
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60
service password-encryption

A

login block-for 60 attempts 5 within 60

83
Q

Which statement best describes the operation of the File Transfer Protocol?

A. An FTP client uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP Server.

B. An FTP client uses a source port number of 20 and a randomly generated destination port number during the establishment of data traffic with an FTP Server.

C. An FTP server uses a source port number of 20 and a randomly generated destination port number during the establishment of control traffic with an FTP client.

D. An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client.

A

D. An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client.

84
Q

What is a characteristic of multicast messages?

They are sent to a select group of hosts.
They are sent to all hosts on a network.
They must be acknowledged.
They are sent to a single destination.

A

They are sent to a select group of hosts.

85
Q

Two network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching?

A. The fragment-free switching offers the lowest level of latency.

B. Fast-forward switching can be viewed as a compromise between store-and-forward switching and fragment-free switching.

C. Fragment-free switching is the typical cut-through method of switching.

D. Packets can be relayed with errors when fast-forward switching is used.

A

D. Packets can be relayed with errors when fast-forward switching is used.

86
Q

Which two protocols function at the internet layer? (Choose two.)

POP
BOOTP
ICMP
IP
PPP

A

ICMP & IP

87
Q

What PDU is associated with the transport layer?

segment
packet
frame
bits

A

Segment

88
Q

Jug

A

Bhj