Module 1- 76-100 Flashcards

1
Q

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

A

Configure the IP domain name on the router.
Generate the SSH keys.
Enable inbound vty SSH sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

A

-implements trailer with frame check sequence for error detection
-implements a process to delimit fields within an Ethernet 2 frame

-responsible for internal structure of Ethernet frame
-implements trailer with frame check sequence for error detection

-integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper
-implements CSMA/CD over legacy shared half-duplex media

-applies delimiting of Ethernet frame fields to synchronize communication between nodes
-implements trailer with frame check sequence for error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​

A

all IPv6 configured routers on the local link​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three parts of an IPv6 global unicast address? (Choose three.)

A

-subnet ID
-global routing prefix
-interface ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

A

-interference
-security
-coverage area

Explanation: The three areas of concern for wireless networks focus on the size of the coverage area, any nearby interference, and providing network security. Extensive cabling is not a concern for wireless networks, as a wireless network will require minimal cabling for providing wireless access to hosts. Mobility options are not a component of the areas of concern for wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

A

Exit privileged EXEC mode and press Enter .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What method is used to manage contention-based access on a wireless network?

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a function of the data link layer?

A

provides for the exchange of frames over a common local media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of the TCP sliding window?

A

to request that a source decrease the rate at which it transmits data

Explanation: The TCP sliding window allows a destination device to inform a source to slow down the rate of transmission. To do this, the destination device reduces the value contained in the window field of the segment. It is acknowledgment numbers that are used to specify retransmission from a specific point forward. It is sequence numbers that are used to ensure segments arrive in order. Finally, it is a FIN control bit that is used to end a communication session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What characteristic describes spyware?

A

software that is installed on a user device and collects information about the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which switching method drops frames that fail the FCS check?

A

store-and-forward switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which range of link-local addresses can be assigned to an IPv6-enabled interface?

A

FE80::/10

Explain:
Link-local addresses are in the range of FE80::/10 to FEBF::/10. The original IPv6 specification defined site-local addresses and used the prefix range FEC0::/10, but these addresses were deprecated by the IETF in favor of unique local addresses. FDEE::/7 is a unique local address because it is in the range of FC00::/7 to FDFF::/7. IPv6 multicast addresses have the prefix FF00::/8.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What service is provided by FTP?

A

Allows for data transfers between a client and a file server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

A

-DNS server
-default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

A

-NAT introduces problems for some applications that require end-to-end connectivity.
-NAT provides a solution to slow down the IPv4 address depletion.

Explanation: Network Address Translation (NAT) is a technology that is implemented within IPv4 networks. One application of NAT is to use private IP addresses inside a network and use NAT to share a few public IP addresses for many internal hosts. In this way it provides a solution to slow down the IPv4 address depletion. However, since NAT hides the actual IP addresses that are used by end devices, it may cause problems for some applications that require end-to-end connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?

A

1E6F:65FF:FEC2:BDF8

Explanation: To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three steps are taken.

Change the seventh bit of the MAC address from a binary 0 to a binary 1 which changes the hex C, into a hex E.
Insert hex digits FFFE into the middle of the address.
Rewrite the address in IPv6 format.
The three steps, when complete, give the interface ID of 1E6F:65FF:FEC2:BDF8.

17
Q
  1. Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?
A

PC2 will send an ARP reply with the PC2 MAC address.

Explain: When a network device wants to communicate with another device on the same network, it sends a broadcast ARP request. In this case, the request will contain the IP address of PC2. The destination device (PC2) sends an ARP reply with its MAC address.

18
Q

What service is provided by BOOTP?

A

Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.

19
Q

What characteristic describes adware?

A

software that is installed on a user device and collects information about the user

20
Q

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

A

store-and-forward

21
Q

Match a statement to the related network model.

A

peer-to-peer network
[+] no dedicated server is required
[+] client and server roles are set on a per request basis
peer-to-peer aplication
[#] requires a specific user interface
[#] a background service is required

Explain:
Peer-to-peer networks do not require the use of a dedicated server, and devices can assume both client and server roles simultaneously on a per request basis. Because they do not require formalized accounts or permissions, they are best used in limited situations. Peer-to-peer applications require a user interface and background service to be running, and can be used in more diverse situations.

22
Q

What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

A

-accessing the media
-data encapsulation

23
Q

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

A

-The switch can be remotely managed.
-One device is attached to a physical interface.
-The default SVI has been configured.

Explain:
Vlan1 is the default SVI. Because an SVI has been configured, the switch can be configured and managed remotely. FastEthernet0/0 is showing up and up, so a device is connected.

24
Q
  1. Match each type of frame field to its function.
A

Check online!!

25
Q

What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?

A

2001:DA48:FC5:A4::/64​