Course Final Exam Flashcards

1
Q

Which statement describes the use of powerline networking technology?

A

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of device provides an Internet connection through the use of a phone jack?

A

DSL modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

A

Disable SSID broadcast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

A

Enter the network SSID.
Input the authentication password.
Choose the correct security type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At which layer of the OSI model would a logical address be added during encapsulation?

A

network layer

Explanation: Logical addresses, also known as IP addresses, are added at the network layer. Physical addresses are edded at the data link layer. Port addresses are added at the transport layer. No addresses are added at the physical layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two criteria are used to help select a network medium for a network? (Choose two.)

A

the environment where the selected medium is to be installed
&
the distance the selected medium can successfully carry a signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What will a Cisco LAN switch do if it receives an incoming frame and the destination MAC address is not listed in the MAC address table?

A

Forward the frame out all ports except the port where the frame is received.

Explanation: A LAN switch populates the MAC address table based on source MAC addresses. When a switch receives an incoming frame with a destination MAC address that is not listed in the MAC address table, the switch forwards the frame out all ports except for the ingress port of the frame. When the destination device responds, the switch adds the source MAC address and the port on which it was received to the MAC address table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work?

A

reference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What layer is responsible for routing messages through an internetwork in the TCP/IP model?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What information is added to the switch table from incoming frames?

A

source MAC address and incoming port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cable installation company is trying to convince a customer to use fiber-optic cabling instead of copper cables for a particular job. What is one advantage of using fiber-optic cabling compared to copper cabling?

A

Fiber-optic cabling is completely immune to EMI and RFI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which three addresses are valid public addresses? (Choose three.)

A

10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a host sends a packet, how does it determine if the destination of the packet is on the same local network or on a remote network?

A

It uses the subnet mask to compare the source and destination IP address.

Explanation: When a host sends a packet, it uses the subnet mask to compare the source IPv4 address and the destination IPv4 address. If the network bits match, both the source and destination host are on the same local network. Otherwise, the destination host is on a remote network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

A

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation: When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?

Question 25

A

255.255.255.255

Explanation: When a new client device is installed on a network that uses dynamic IP addressing, the client will send out a DHCP request message with the destination IPv4 address of 255.255.255.255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refer to the exhibit. If all devices are using a subnet mask of 255.255.255.0, which laptop would have an IP address with the same network number as the server?

Question 26

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How many bits are in an IPv4 address?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are two characteristics of multicast transmission?

A

Multicast transmission can be used by routers to exchange routing information.

A single packet can be sent to a group of hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

2001:0bd8:0000:1111:2001:0bd8:0000:1111

Refer to the exhibit. How many bits are represented by each group of four hexadecimal values contained between the colons in an IPv6 address?

A

16

Explanation: The four hexadecimal values contained in a hextet represent 16 bits. There are eight hextets in an IPv6 address that make up the total 128 bits of the address. (16 x 8 = 128).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Question 31

Refer to the exhibit. The IP address of which device interface should be used as the default gateway setting of host H1?

A

R1: G0/0

Explanation: The default gateway for host H1 is the router interface that is attached to the LAN that H1 is a member of. In this case, that is the G0/0 interface of R1. H1 should be configured with the IP address of that interface in its addressing settings. R1 will provide routing services to packets from H1 that need to be forwarded to remote networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Q 32

Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B?

A

Source: af:3c:dc:55:66, Incoming Port MAC

Destination: a0:4c:5f:21:33:77, Destination MAC

Source: 172.16.1.10, Source IP Address

Destination: 172.16.2.10, Destination IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network administrator has a multi-floor LAN to monitor and maintain. Through careful monitoring, the administrator has noticed a large amount of broadcast traffic slowing the network. Which device would you use to best solve this problem?

A

router

Explanation: All hosts within a single LAN belong to one broadcast domain. As the number of hosts increase, it could cause more traffic on the segment and may slow network performance. To solve the performance issue, a router would be the device used to segment the single LAN into multiple LANs.

23
Q

A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)?

A

when a host is sending packets to the ISP in order to request a speed increase for Internet services

when a host is sending packets to a remote site owned by the manufacturer of the wireless router in order to request a digital copy of the device manual

Explanation: A wireless router will perform Network Address Translation (NAT) whenever a private (local) source IPv4 address is translated to a public (global) address.

24
Q

A user is setting up a home wireless network. A global address is to be used in NAT translations for traffic flowing through the wireless router. How is this global address assigned?

A

The wireless router will act as a DHCP client in order to receive global addressing from the ISP.

Explanation: The public (global) address used in NAT is commonly the public IP address that resides on the external facing interface of the wireless router.This IP address is commonly provided via DHCP from the ISP.

25
Q

Question 36

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

A

RT1 will send an ARP reply with its own Fa0/0 MAC address.

Explanation: When a network device has to communicate with a device on another network, it broadcasts an ARP request asking for the default gateway MAC address. The default gateway (RT1) unicasts an ARP reply with the Fa0/0 MAC address.

26
Q

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?

A

directly connected route

27
Q

Open the PT activity. Perform the tasks in the activity instructions and then answer the question.

Which IP address should be used as the default gateway address on PC0?

A

192.168.2.10

28
Q

Question 39

Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

A

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

29
Q

Question 40

Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?

A

the MAC address of the G0/0 interface on R1

Explanation: PC1 must have a MAC address to use as a destination Layer 2 address. PC1 will send an ARP request as a broadcast and R1 will send back an ARP reply with its G0/0 interface MAC address. PC1 can then forward the packet to the MAC address of the default gateway, R1.

29
Q

Question 42

Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?

A

R1

Explanation: Tracert is used to trace the path a packet takes. The only successful response was from the first device along the path on the same LAN as the sending host. The first device is the default gateway on router R1. The administrator should therefore start troubleshooting at R1.

29
Q

Which command would a technician use to display network connections on a host computer?

A

netstat

30
Q

Question 47

Refer to the exhibit. PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet?​

A

192.168.20.3 port 53

Explanation: To resolve the host name to an IP address a host can send a query to a DNS server. The transport layer port number for DNS is port 53.

30
Q

Open the PT activity. Perform the tasks in the activity instructions and then answer the question.

What is the IP address of this server?

A

209.165.201.4

30
Q

When analog voice signals are converted for use on a computer network, in what format are they encapsulated?

A

IP packets

Explanation: When Voice over iP (VoIP) is being used, analog voice signals are translated into digital data in the form of IP packets. This translation allows the phone call to be carried through a computer network.

31
Q

A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.)

A

The target web server is down.
DNS service is unavailable on the customer network.

32
Q

Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

A

Security rules are applied to the default gateway device, preventing it from processing ping requests.

33
Q

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

A

virtualization

Explanation: Virtualization technology can run several different operating systems in parallel on a single CPU.

34
Q

What are two scenarios would benefit the user the most by adding quality of service (QoS) to the network?

A

A student is communicating via Skype with a friend in another country.

Students are watching a lecture from a YouTube site.

Explanation: Voice and video data need to be transmitted in a continuous stream. If packets are delayed, the audio and video quality will be poor, sometimes even not usable. QoS can give voice and video data high priority during the data transmission so that they would be sent first before other types of traffic, such as email, web surfing, and web page updates.

35
Q

What is an example of cloud computing?

A

a service that offers on-demand access to shared resources

36
Q

What is the key difference between a type 1 hypervisor and a type 2 hypervisor?

A

A type 1 hypervisor runs directly on the system hardware and a type 2 hypervisor requires a host OS to run.

Explanation: There are two types of hypervisors:
– Type 1 – This type of hypervisor runs directly on the system hardware.
– Type 2 – This type of hypervisor requires a host OS to run.
Both types of hypervisors can run on regular computer systems and support multiple OS virtualizations.

37
Q

Which three statements describe the functions of the Cisco hierarchical network design model?
(Choose three.)

  1. The goal of the core layer is maximizing throughput.
  2. The distribution layer distributes network traffic directly to end users.
  3. The distribution layer is responsible for traffic filtering and isolating failures from the core.
  4. The access layer provides a means of connecting end devices to the network.
  5. Route summarization is not necessary at the core and distribution layers.
  6. The core layer usually employs a star topology.
A

The goal of the core layer is maximizing throughput.

The distribution layer is responsible for traffic filtering and isolating failures from the core.

The access layer provides a means of connecting end devices to the network.

Explanation: There are three layers of the hierarchical network design model.
– Access: Provides a connection point to end users.
– Distribution: Controls traffic flows between access and core layers.
– Core: Maximizes throughput moving traffic as quickly as possible.

38
Q

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees.

What three network characteristics are described in this scenario? (Choose three.)

scalability
security
integrity
fault tolerance
quality of service
powerl

A

security, fault-tolerance, & quality of service

Explanation: Usernames and passwords relate to network security. Good quality video, to support video conferencing, relates to prioritizing the video traffic with quality of service (QoS). The fact that a connection to an ISP failed and was then restored but went unnoticed by employees relates to the fault-tolerant design of the network.

39
Q

Q 48

Refer to the exhibit. A ping to PC2 is issued from PC0, PC1, and PC3 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

A

just PC0 and PC1 MAC addresses

40
Q

Q 49

Refer to the exhibit. PC1 sends a frame with the destination MAC address 3c97.0e07.a1b2. Switch S1 looks up the destination MAC address in its CAM table but the address is not there. What will the switch do?

A

It will forward the frame out all ports except Fa0/1.

41
Q

What two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network?

A

destination IP address & subnet mask

Explanation: The result of ANDing any IP address with a subnet mask is a network number. If the source network number is the same as the destination network number, the data stays on the local network. If the destination network number is different, the packet is sent to the default gateway (the router that will send the packet onward toward the destination network).

42
Q

Which three IPv4 header fields have no equivalent in an IPv6 header?

flag
identification
TTL
fragment offset
version
protocol

A

fragment offset, identification, & flag

Explanation: Unlike IPv4, IPv6 routers do not perform fragmentation. Therefore, all three fields supporting fragmentation in the IPv4 header are removed and have no equivalent in the IPv6 header. These three fields are fragment offset, flag, and identification. IPv6 does support host packet fragmentation through the use of extension headers, which are not part of the IPv6 header.

43
Q

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?

The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
The Version field from IPv4 is not kept in IPv6.
The Destination Address field is new in IPv6.
The Source Address field name from IPv4 is kept in IPv6.
The Header Checksum field name from IPv4 is kept in IPv6.

A

The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

The Source Address field name from IPv4 is kept in IPv6.

Explanation: The IPv6 packet header fields are as follows: Version, Traffic Class, Flow Label, Payload Length, Next Header, Hop Limit, Source Address, and Destination Address. The IPv4 packet header fields include the following: Version, Differentiated Services, Time-to-Live, Protocol, Source IP Address, and Destination IP Address. Both versions have a 4-bit Version field. Both versions have a Source (IP) Address field. IPv4 addresses are 32 bits; IPv6 addresses are 128 bits. The Time-to-Live or TTL field in IPv4 is now called Hop Limit in IPv6, but this field serves the same purpose in both versions. The value in this 8-bit field decrements each time a packet passes through any router. When this value is 0, the packet is discarded and is not forwarded to any other router.

44
Q

Q 50

Refer to the exhibit. Which protocol was responsible for building the table that is shown?

A

ARP

Explanation: The table that is shown corresponds to the output of the arp -a command, a command that is used on a Windows PC to display the ARP table.

45
Q

What is the order of TCP flag steps in the session establishment sequence?

A

Step 1 - SYN
Step 2 - ACK
Step 3 - SYN + ACK

46
Q

What is the difference between the terms keyword and argument in the IOS command structure?

A

A keyword is a specific parameter. An argument is not a predefined variable.

Explanation: Keywords are specific parameters that are defined in IOS. Arguments are not predefined; they are the variables defined by the user when completing a command. Although most keywords appear directly after commands, they can appear in other locations, depending on a command structure. A keyword can be entered in its whole length or in a shortened format.

47
Q

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

A

password cisco, line console 0, & login

48
Q

What three configuration steps must be performed to implement SSH access to a router?

A

a unique hostname, an IP domain name, & a user account

49
Q

Q 51

Refer to the exhibit. An administrator is troubleshooting connectivity on the office network. PC1 is able to send print jobs to Printer1, but is unable to access File Server1. Which action would correct the problem?

A

Change the R1 Fa0/1 interface IP address to 10.231.64.1.