Final Exam (Test #1.3) Flashcards
SKIPPED
N/A
Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?
syslog records and messages
the network performance baseline
debug output and packet captures
network configuration files
the network performance baseline
How does the service password-encryption command enhance password security on Cisco routers and switches?
- It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet.
- It encrypts passwords that are stored in router or switch configuration files.
- It requires that a user type encrypted passwords to gain console access to a router or switch.
- It encrypts passwords as they are sent across the network.
It encrypts passwords that are stored in router or switch configuration files.
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
- The Source Address field name from IPv4 is kept in IPv6.
- The Version field from IPv4 is not kept in IPv6.
- The Destination Address field is new in IPv6.
- The Header Checksum field name from IPv4 is kept in IPv6.
- The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
- The Source Address field name from IPv4 is kept in IPv6.
- The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed
The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?
255.255.255.192
255.255.255.252
255.255.255.240
255.255.255.248
255.255.255.0
255.255.255.224
255.255.255.224
What characteristic describes identity theft?
- the use of stolen credentials to access private data
- software on a router that filters traffic based on IP addresses or applications
- software that identifies fast-spreading threats
- a tunneling protocol that provides remote users with secure access into the network of an organization
the use of stolen credentials to access private data
What are three commonly followed standards for constructing and installing cabling? (Choose three.)
cost per meter (foot)
cable lengths
connector color
pinouts
connector types
tensile strength of plastic insulator
cable lengths
pinouts
connector types
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.240
255.255.255.0
255.255.255.248
255.255.255.224
255.255.255.0
SKIPPED
N/A
SKIPPED
N/A
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?
IMAP
FTP
SSH
Telnet
IMAP
What are two characteristics shared by TCP and UDP? (Choose two.)
default window size
connectionless communication
port numbering
3-way handshake
ability to to carry digitized voice
use of checksum
port numbering
use of checksum
SKIPPED
N/A
A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?
FTP
LDAP
SLP
SNMP
FTP
What attribute of a NIC would place it at the data link layer of the OSI model?
attached Ethernet cable
IP address
MAC address
RJ-45 port
TCP/IP protocol stack
MAC address
What technique is used with UTP cable to help protect against signal interference from crosstalk?
- wrapping a foil shield around the wire pairs
- twisting the wires together into pairs
- terminating the cable with special grounded connectors
- encasing the cables within a flexible plastic sheath
twisting the wires together into pairs
A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.192
255.255.255.248
255.255.255.224
255.255.255.240
255.255.255.240
A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?
SSH
SMB/CIFS
HTTPS
SLP
SSH
What characteristic describes an IPS?
- a tunneling protocol that provides remote users with secure access into the network of an organization
- a network device that filters access and traffic coming into a network
- software that identifies fast-spreading threats
- software on a router that filters traffic based on IP addresses or applications
a network device that filters access and traffic coming into a network
SKIPPED
N/A
What service is provided by DHCP?
- An application that allows real-time chatting among remote users.
- Allows remote access to network devices and servers.
- Dynamically assigns IP addresses to end and intermediary devices.
- Uses encryption to provide secure remote access to network devices and servers.
Dynamically assigns IP addresses to end and intermediary devices.
SKIPPED
N/A
SKIPPED
N/A