Module 1- 26-50 Flashcards
A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?
The data flow is being tracked based on the source port number that is used by each application.
Explanation: The source port number of an application is randomly generated and used to individually keep track of each session connecting out to the Internet. Each application will use a unique source port number to provide simultaneous communication from multiple applications through the Internet.
A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.192
What characteristic describes a DoS attack?
an attack that slows or crashes a device or network service
What service is provided by SMTP?
Allows clients to send email to a mail server and the servers to send email to other servers.
Which scenario describes a function provided by the transport layer?
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
Explain:
The source and destination port numbers are used to identify the correct application and window within that application.
What does the term “attenuation” mean in data communication?
loss of signal strength as distance increases
Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)
POP
DNS
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?
authorization
What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)
message size
message encoding
delivery options
What are two characteristics of IP?
does not require a dedicated end-to-end connection
operates independently of the network media
Explain:
The Internet Protocol (IP) is a connectionless, best effort protocol. This means that IP requires no end-to-end connection nor does it guarantee delivery of packets. IP is also media independent, which means it operates independently of the network media carrying the packets.
An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees.
What three network characteristics are described in this scenario? (Choose three.)
security
quality of service
fault tolerance
What are two common causes of signal degradation when using UTP cabling? (Choose two.)
improper termination
low-quality cable or connectors
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)
-Capture traffic during peak utilization times to get a good representation of the different traffic types.
-Perform the capture on different network segments.
Explanation: Traffic flow patterns should be gathered during peak utilization times to get a good representation of the different traffic types. The capture should also be performed on different network segments because some traffic will be local to a particular segment.
What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?
The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.