Final Flashcards

1
Q

Given network 172.18.109.0, which subnet mask would be used if 6 host bits were available?

a. 255.255.255.252
b. 255.255.255.248
c. 255.255.255.192
d. 255.255.192.0
e. 255.255.224.0

A

c. 255.255.255.192

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the IP address 192.168.1.15/29 represent?

a. multicast address
b. broadcast address
c. subnetwork address
d. unicast address

A

d. unicast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of address is 198.133.219.162?

a. link-local
b. public
c. loopback
d. multicast

A

b. public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?

a. partial mesh
b. extended star
c. ring
d. bus

A

b. extended star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?

a. the virtually unlimited availability of IPv6 addresses
b. the use of Gigabit Ethernet speeds
c. the development of half-duplex switch operation
d. the use of CSMA/CA
e. the use of full-duplex capable Layer 2 switches

A

e. the use of full-duplex capable Layer 2 switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a router do when it receives a Layer 2 frame over the network medium?

a. de-encapsulates the frame
b. re-encapsulates the packet into a new frame
c. forwards the new frame appropriate to the medium of that segment of the physical network
d. determines the best path

A

a. de-encapsulates the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two acronyms represent the data link sublayers that Ethernet relies upon to operate? (Choose two.)

SFD
MAC
LLC
CSMA
FCS

A

MAC (Media Access Control)
LLC (Logical Link Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time?

a. latency
b. bandwidth
c. goodput
d. throughput

A

b. bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)

a. Fiber-optic cabling has high signal loss.
b. Fiber-optic cabling does not conduct electricity.
c. Fiber-optic cabling is primarily used as backbone cabling.
d. Multimode fiber-optic cabling carries signals from multiple sending devices.
e. Fiber-optic cabling uses LEDs for single-mode cab​les and laser technology for multimode cables.

A

b. Fiber-optic cabling does not conduct electricity.c. Fiber-optic cabling is primarily used as backbone cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A router boots and enters setup mode. What is the reason for this?

a. Cisco IOS is missing from flash memory.
b. The POST process has detected hardware failure.
c. The configuration file is missing from NVRAM.
d. The IOS image is corrupt.

A

c. The configuration file is missing from NVRAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)

Fiber-optic cabling has high signal loss.

Fiber-optic cabling does not conduct electricity.

Fiber-optic cabling is primarily used as backbone cabling.

Multimode fiber-optic cabling carries signals from multiple sending devices.

Fiber-optic cabling uses LEDs for single-mode cab​les and laser technology for multimode cables.

A

Fiber-optic cabling does not conduct electricity.

Fiber-optic cabling is primarily used as backbone cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This type of copper media is used in industrial or similar environments where there is a lot of interference.

a. STP
b. Wireless
c. optical fiber
d. coaxil

A

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.

a. STP
b. Wireless
c. optical fiber
d. coaxil

A

coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This type of media is used in wired office environments.

a. STP
b. Wireless
c. optical fiber
d. coaxil

A

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of media is used for high transmission speed and can also transfer data over long distances.

a. STP
b. Wireless
c. optical fiber
d. coaxil

A

optical fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This type of media provides the most mobility options.

a. STP
b. Wireless
c. optical fiber
d. coaxil

A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A router boots and enters setup mode. What is the reason for this?

a. Cisco IOS is missing from flash memory.

b. The POST process has detected hardware failure.

c. The configuration file is missing from NVRAM.

d. The IOS image is corrupt.

A

The configuration file is missing from NVRAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Floor(config)# interface gi0/1
Floor(config-if)# description Connects to the Registrar LAN
Floor(config-if)# ip address 192.168.235.234 255.255.255.0
Floor(config-if)# no shutdown
Floor(config-if)# interface gi0/0
Floor(config-if)# description Connects to the Manager LAN
Floor(config-if)# ip address 192.168.234.114 255.255.255.0
Floor(config-if)# no shutdown
Floor(config-if)# interface s0/0/0
Floor(config-if)# description Connects to the ISP
Floor(config-if)# ip address 10.234.235.254 255.255.255.0
Floor(config-if)# no shutdown
Floor(config-if)# interface s0/0/1
Floor(config-if)# description Connects to the Head Office WAN
Floor(config-if)# ip address 203.0.113.3 255.255.255.0
Floor(config-if)# no shutdown
Floor(config-if)# end

Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?

a. 192.168.234.114
b. 192.168.235.1
c. 10.234.235.254
d. 203.0.113.3
e. 192.168.235.234

A

192.168.235.234

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What characteristic describes spyware?

a. an attack that slows or crashes a device or network service
b. software that is installed on a user device and collects information about the user
c. the use of stolen credentials to access private data
d. a network device that filters access and traffic coming into a network

A

software that is installed on a user device and collects information about the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which statement describes network security?

a. It supports growth over time in accordance with approved network design procedures.
b. It ensures sensitive corporate data is available for authorized users.
c. It prioritizes data flows in order to give priority to delay-sensitive traffic.
d. It synchronizes traffic flows using timestamps.

A

It ensures sensitive corporate data is available for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which two devices would be described as intermediary devices? (Choose two.)

server

retail scanner

wireless LAN controller

assembly line robots

gaming console

IPS

A

wireless LAN controller
IPS (Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To which TCP port group does the port 414 belong?

a. registered
b. private or dynamic
c. well-known
d. public

A

private or dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?

TFTP

DNS

DHCP

SSH

A

SSH

24
Q

What routing table entry has a next hop address associated with a destination network?

a. C and L source routes
b. remote routes
c. local routes
d. directly-connected routes

A

remote routes

25
Q

Why is NAT not needed in IPv6?​

The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.

The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​

Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

A

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

26
Q

Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?

TTL

destination IPv4 address

protocol

header checksum

A

destination IPv4 address

27
Q

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.

There is no impact on communications.

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

The host is unable to communicate on the local network.

A

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

28
Q

Which destination address is used in an ARP request frame?

the physical address of the destination host

255.255.255.255

AAAA.AAAA.AAAA

0.0.0.0

FFFF.FFFF.FFFF

A

FFFF.FFFF.FFFF

29
Q

The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville?

Trojan horse

reconnaissance

access

DoS

A

DoS

30
Q

What are two ways to protect a computer from malware? (Choose two.)

Delete unused software.

Keep software up to date.

Defragment the hard disk.

Use antivirus software.

Empty the browser cache.

A

Keep software up to date.
Use antivirus software.

31
Q

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?

a worm that is attempting to access another part of the network

a device that is trying to inspect the traffic on a link

a user who is trying to guess a password to access the router

an unidentified individual who is trying to access the network equipment room

A

a user who is trying to guess a password to access the router

32
Q

Which command is used to manually query a DNS server to resolve a specific host name?

tracert

nslookup

net

ipconfig /displaydns

A

nslookup

33
Q

What service is provided by POP3?

Allows remote access to network devices and servers.

Uses encryption to provide secure remote access to network devices and servers.

An application that allows real-time chatting among remote users.

Retrieves email from the server by downloading the email to the local mail application of the client.

A

Retrieves email from the server by downloading the email to the local mail application of the client.

34
Q

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

master-slave

point-to-point

client-based

peer-to-peer

A

peer-to-peer

35
Q

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)

transport

physical

network

data link

session

A

network
transport

36
Q

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

application

session

data link

network

transport

presentation

physical

A

application
presentation
session

37
Q

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

segment

packet

bits

frame

A

segment

38
Q

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

the path that traffic will take to reach the destination

if the TCP/IP stack is functioning on the PC without putting traffic on the wire

what type of device is at the destination

if there is connectivity with the destination device

A

if there is connectivity with the destination device

39
Q

What is a characteristic of a switch virtual interface (SVI)?​

An SVI is created in software and requires a configured IP address and a subnet mask in order to provide remote access to the switch.

Although it is a virtual interface, it needs to have physical hardware on the device associated with it.

SVIs come preconfigured on Cisco switches.

SVIs do not require the no shutdown command to become enabled.

A

An SVI is created in software and requires a configured IP address and a subnet mask in order to provide remote access to the switch.

40
Q

Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?

fe80:9ea:0:2200::fe0:290

fe80:9ea0::2020::bf:e0:9290

fe80:9ea0::2020:0:bf:e0:9290

fe80::220:b3f:f0e0:29

A

fe80::220:b3f:f0e0:29

41
Q

What type of IPv6 address is represented by ::1/128?

global unicast

EUI-64 generated link-local

unspecified

loopback

A

loopback

42
Q

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame

integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper

implements CSMA/CD over legacy shared half-duplex media

applies source and destination MAC addresses to Ethernet frame

adds Ethernet control information to network protocol data

A

places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame

adds Ethernet control information to network protocol data

43
Q

Two network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching?

Fast-forward switching can be viewed as a compromise between store-and-forward switching and fragment-free switching.

Packets can be relayed with errors when fast-forward switching is used.

The fragment-free switching offers the lowest level of latency.

Fragment-free switching is the typical cut-through method of switching.

A

Fragment-free switching is the typical cut-through method of switching.

44
Q

Which two issues can cause both runts and giants in Ethernet networks? (Choose two.)

using the incorrect cable type

a malfunctioning NIC

half-duplex operations

CRC errors

electrical interference on serial interfaces

A

a malfunctioning NIC

electrical interference on serial interfaces

45
Q

What happens when a switch receives a frame and the calculated CRC value is different than the value that is in the FCS field?

The switch notifies the source of the bad frame.

The switch floods the frame to all ports except the port through which the frame arrived to notify the hosts of the error.

The switch places the new CRC value in the FCS field and forwards the frame.

The switch drops the frame.

A

The switch drops the frame.

46
Q

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

router advertisement

protocol unreachable

neighbor solicitation

router solicitation

route redirection

A

router advertisement

router solicitation

47
Q

A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish?

a. pinging a host computer that has the IP address 127.0.0.1 on the network

b. testing the integrity of the TCP/IP stack on the local machine

c. tracing the path to a host computer on the network and the network has the IP address 127.0.0.1

d. checking the IP address on the network card

A

testing the integrity of the TCP/IP stack on the local machine

48
Q

Network information:
* local router LAN interface: 172.19.29.254 / fe80:65ab:dcc1::10
* local router WAN interface: 198.133.219.33 / 2001:db8:FACE:39::10
* remote server: 192.135.250.103

What task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command?

a. verifying that there is connectivity within the local network

b. determining the path to reach the remote server

c. verifying that there is connectivity to the internet

d. creating a network performance benchmark to a server on the company intranet

A

verifying that there is connectivity to the internet

49
Q

A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection?

a. Add a second NIC to the web server.
b. Add a connection to the Internet via a DSL line to another ISP.
c. Add another web server to prepare failover support.
d. Add multiple connections between the switches and the edge router.

A

Add a connection to the Internet via a DSL line to another ISP.

50
Q

Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task?

a. show interfaces
b. show ip nat translations
c. copy running-config startup-config
d. show running-config

A

show running-config

51
Q

Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)

ipconfig /flushdns

net cisco.com

nslookup cisco.com

nbtstat cisco.com

ping cisco.com

A

nslookup cisco.com
ping cisco.com

52
Q

Match the following command with the device mode at which the command is entered: Login

a. R1(config)#
b. R1>
c. R1(config-router)#
d. R1#
e. R1(config-line)#
f. R1(config-if)#

A

R1(config-line)#

53
Q

Match the following command with the device mode at which the command is entered: service password-encryption

a. R1(config)#
b. R1>
c. R1(config-router)#
d. R1#
e. R1(config-line)#
f. R1(config-if)#

A

R1(config)#

54
Q

Match the following command with the device mode at which the command is entered: ip address 192.168.4.4 255.255.255.0

a. R1(config)#
b. R1>
c. R1(config-router)#
d. R1#
e. R1(config-line)#
f. R1(config-if)#

A

R1(config-if)#

55
Q

Match the following command with the device mode at which the command is entered: copy running-config startup-config

a. R1(config)#
b. R1>
c. R1(config-router)#
d. R1#
e. R1(config-line)#
f. R1(config-if)#

A

R1#

56
Q

Match the following command with the device mode at which the command is entered: enable

a. R1(config)#
b. R1>
c. R1(config-router)#
d. R1#
e. R1(config-line)#
f. R1(config-if)#

A

R1>