Module Quizzes | Netacad Flashcards

Covers Chapter 1 to Chapter 10

1
Q

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

DoS attack​

Identity theft

Spyware

Zero-day attack

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Internet

Intranet

Extranet

Extendednet

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

Cloud computing

Online collaboration

Bring your own device

Video conferencing

A

Bring your own device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an ISP?

It is a standards body that develops cabling and wiring standards for networking.

It is a protocol that establishes how computers within a local network communicate.

It is an organization that enables individuals and businesses to connect to the Internet.

It is a networking device that combines the functionality of several different networking devices in one.

A

It is an organization that enables individuals and businesses to connect to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In which scenario would the use of a WISP be recommended?

An Internet cafe in a city

A farm in a rural area without wired broadband access

Any home with multiple wireless devices

An apartment in a building with cable access to the Internet

A

A farm in a rural area without wired broadband access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

Reliability

Scalability

Quality of service

Accessibility

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

Quality of service (QoS)

Scalability

Security

Fault tolerance

Integrity

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two characteristics of a scalable network? (Choose two.)

Easily overloaded with increased traffic

Grows in size without impacting existing users

Is not as reliable as a small network

Suitable for modular devices that allow for expansion

Offers limited number of applications

A

Grows in size without impacting existing users
Suitable for modular devices that allow for expansion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which device performs the function of determining the path that messages should take through internetworks?

A router

A firewall

A web server

A DSL modem

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

DSL

Cellular

Satellite

Dialup

Dedicated leased line

A

Cellular
Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of network must a home user access in order to do online shopping?

An intranet

The Internet

An extranet

A local area network

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does BYOD change the way in which businesses implement networks?​

BYOD requires organizations to purchase laptops rather than desktops.

BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.

BYOD devices are more expensive than devices that are purchased by an organization.

BYOD provides flexibility in where and how users can access network resources.

A

BYOD provides flexibility in where and how users can access network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

ACL

IPS

VPN

BYOD

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Internet?

It is a network based on Ethernet technology.

It provides network access for mobile devices.

It provides connections through interconnected global networks.

It is a private network for an organization with LAN and WAN connections.

A

It provides connections through interconnected global networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two functions of end devices on a network? (Choose two.)

They originate the data that flows through the network.

They direct data over alternate paths in the event of link failures.

They filter the flow of data to enhance security.

They are the interface between humans and the communication network.

They provide the channel over which the network message travels.

A

They originate the data that flows through the network.
They are the interface between humans and the communication network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

It is stored in NVRAM.

It should be deleted using the erase running-config command.

It is automatically saved when the router reboots.

A

It affects the operation of the device immediately when modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which two statements are true regarding the user EXEC mode? (Choose two.)

All router commands are available.

Global configuration mode can be accessed by entering the enable command.

The device prompt for this mode ends with the ‘>’ symbol.

Interfaces and routing protocols can be configured.

Only some aspects of the router configuration can be viewed.

A

The device prompt for this mode ends with the ‘>’ symbol.
Only some aspects of the router configuration can be viewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of access is secured on a Cisco router or switch with the enable secret command?

Virtual terminal

Privileged EXEC

AUX port

Console line

A

Privileged EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the default SVI on a Cisco switch?

VLAN1

VLAN99

VLAN100

VLAN999

A

VLAN1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

The hostname should be fewer than 64 characters in length

The hostname should be written in all lower case characters

The hostname should contain no spaces

The hostname should end with a special character

The hostname should begin with a letter

A

-The hostname should be fewer than 64 characters in length
-The hostname should contain no spaces
-The hostname should begin with a letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the function of the shell in an OS?

It interacts with the device hardware.

It interfaces between the users and the kernel.

It provides dedicated firewall services.

It provides the intrusion protection services for the device.

A

It interfaces between the users and the kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

Global configuration mode

Setup mode

Privileged EXEC mode

User EXEC mode

A

User EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Copy the running configuration to the startup configuration file.

Copy the information in the startup configuration file to the running configuration.

Reload the device and type yes when prompted to save the configuration.

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

A

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which memory location on a Cisco router or switch will lose all content when the device is restarted?

ROM

Flash

NVRAM

RAM

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why would a technician enter the command copy startup-config running-config? To remove all configurations from the switch To save an active configuration to NVRAM To copy an existing configuration into RAM To make a changed configuration the new startup configuration
To copy an existing configuration into RAM
26
Which functionality is provided by DHCP? Automatic assignment of an IP address to each host Remote switch management Translation of IP addresses to domain names End-to-end connectivity test
Automatic assignment of an IP address to each host
27
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.) Providing an error message when a wrong command is submitted Displaying a list of all available commands within the current mode Allowing the user to complete the remainder of an abbreviated command with the TAB key Determining which option, keyword, or argument is available for the entered command Selecting the best command to accomplish a task
-Displaying a list of all available commands within the current mode -Determining which option, keyword, or argument is available for the entered command
28
Which memory location on a Cisco router or switch stores the startup configuration file? RAM ROM NVRAM Flash
NVRAM
29
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used? 10.1.0.0 10.0.0.0 10.1.100.32 10.1.100.0
10.1.0.0
30
Which three acronyms/initialisms represent standards organizations? (Choose three.) a. IANA b. TCP/IP c. IEEE d. IETF e. OSI f. MAC
a. IANA c. IEEE d. IETF
31
What type of communication will send a message to all devices on a local area network? a. Broadcast b. Multicast c. Unicast d. Allcast
a. Broadcast
32
In computer communication, what is the purpose of message encoding? a. To convert information to the appropriate form for transmission b. To interpret information c. To break large messages into smaller frames d. To negotiate correct timing for successful communication
a. To convert information to the appropriate form for transmission
33
Which message delivery option is used when all devices need to receive the same message simultaneously? a. Duplex b. Unicast c. Multicast d. Broadcast
d. Broadcast
34
What are two benefits of using a layered network model? (Choose two.) a. It assists in protocol design. b. It speeds up packet delivery. c. It prevents designers from creating their own model. d. It prevents technology in one layer from affecting other layers. e. It ensures a device at one layer can function at the next higher layer.
a. It assists in protocol design. d. It prevents technology in one layer from affecting other layers.
35
What is the purpose of protocols in data communications? a. Specifying the bandwidth of the channel or medium for each type of communication b. Specifying the device operating systems that will support the communication c. Providing the rules required for a specific type of communication to occur d. Dictating the content of the message sent during communication
c. Providing the rules required for a specific type of communication to occur
36
Which logical address is used for delivery of data to a remote network? a. Destination MAC address b. Destination IP address c. Destination port number d. Source MAC address e. Source IP address
b. Destination IP address
37
What is the general term that is used to describe a piece of data at any layer of a networking model? Frame Packet Protocol data unit Segment
Protocol data unit
38
Which two protocols function at the internet layer? (Choose two.) POP BOOTP ICMP IP PPP
ICMP IP
39
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices? a. Application b. Presentation c. Session d. Transport e. Network
d. Transport
40
Which type of communication will send a message to a group of host destinations simultaneously? a. Broadcast b. Multicast c. Unicast d. Anycast
b. Multicast
41
What process is used to receive transmitted data and convert it into a readable message? Access control Decoding Encapsulation Flow control
Decoding
42
What is done to an IP packet before it is transmitted over the physical medium? a. It is tagged with information guaranteeing reliable delivery. b. It is segmented into smaller individual pieces. c. It is encapsulated into a TCP segment. d. It is encapsulated in a Layer 2 frame.
d. It is encapsulated in a Layer 2 frame.
43
What process is used to place one message inside another message for transfer from the source to the destination? Access control Decoding Encapsulation Flow control
Encapsulation
44
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? a. HTTP, IP, TCP, Ethernet b. HTTP, TCP, IP, Ethernet c. Ethernet, TCP, IP, HTTP d. Ethernet, IP, TCP, HTTP
b. HTTP, TCP, IP, Ethernet
45
What three requirements are defined by the protocols used in network communications to allow message transmission across a network? (Choose three.) a. connector specifications b. message encoding c. media selection d. message size e. delivery options f. end-device installation
b. message encoding d. message size e. delivery options
46
What type of delivery uses data link layer addresses? a. remote delivery b. local and remote delivery c. local delivery d. remote delivery using routers
c. local delivery
47
What layer of the TCP/IP protocol model determines the best path through the network? application transport internet network access
internet
48
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? a. Presentation layer b. Network layer c. Physical layer d. Data link layer
c. Physical layer
49
What type of cable is used to connect a workstation serial port to a Cisco router console port? Crossover Rollover Straight-through Coaxial
Rollover
50
Why are two strands of fiber used for a single fiber optic connection? a. The two strands allow the data to travel for longer distances without degrading. b. They prevent crosstalk from causing interference on the connection. c. They increase the speed at which the data can travel. d. They allow for full-duplex connectivity.
d. They allow for full-duplex connectivity.
51
Which procedure is used to reduce the effect of crosstalk in copper cables? Requiring proper grounding connections Twisting opposing circuit wire pairs together Wrapping the bundle of wires with metallic shielding Designing a cable infrastructure to avoid crosstalk interference Avoiding sharp bends during installation
Twisting opposing circuit wire pairs together
52
What is one advantage of using fiber optic cabling rather than copper cabling? a. It is usually cheaper than copper cabling. b. It is able to be installed around sharp bends. c. It is easier to terminate and install than copper cabling. d. It is able to carry signals much farther than copper cabling.
d. It is able to carry signals much farther than copper cabling.
53
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? a. The end-user device only has an Ethernet NIC. b. The end-user device requires a dedicated connection because of performance requirements. c. The end-user device needs mobility when connecting to the network. d. The end-user device area has a high concentration of RFI.
c. The end-user device needs mobility when connecting to the network.
54
Which type of UTP cable is used to connect a PC to a switch port? a. Console b. Rollover c. Crossover d. Straight-through
d. Straight-through
55
What is the definition of bandwidth? a. The speed of bits across the media over a given period of time b. The speed at which bits travel on the network c. The amount of data that can flow from one place to another in a given amount of time d. The measure of usable data transferred over a given period of time
c. The amount of data that can flow from one place to another in a given amount of time
56
Which statement correctly describes frame encoding? a. It uses the characteristic of one wave to modify another wave. b. It transmits data signals along with a clock signal which occurs at evenly spaced time durations. c. It generates the electrical, optical, or wireless signals that represent the binary numbers of the frame. d. It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
d. It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
57
What is a characteristic of UTP cabling? a. Cancellation b. Cladding c. Immunity to electrical hazards d. Woven copper braid or metallic foil
a. Cancellation
58
A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion? The microwave oven The large number of trees that surround the office The elevated location where the wireless LAN was installed The number of wireless devices that are used in the wireless LAN
The microwave oven another answer: the cellular phones that are used by the employees
59
What is the purpose of the OSI physical layer? a. Controlling access to media b. Transmitting bits across the local media c. Performing error detection on received frames d. Exchanging frames between nodes over physical network media
b. Transmitting bits across the local media
60
Which characteristic describes crosstalk? a. The distortion of the network signal from fluorescent lighting b. The distortion of the transmitted messages from signals carried in adjacent wires c. The weakening of the network signal over long cable lengths d. The loss of wireless signal over excessive distance from the access point
b. The distortion of the transmitted messages from signals carried in adjacent wires
61
What is indicated by the term throughput? a. The guaranteed data transfer rate offered by an ISP b. The capacity of a particular medium to carry data c. The measure of the usable data transferred across the media d. The measure of the bits transferred across the media over a given period of time e. The time it takes for a message to get from sender to receiver
d. The measure of the bits transferred across the media over a given period of time
62
Which standards organization oversees development of wireless LAN standards? IANA IEEE ISO TIA
IEEE
63
What is the binary representation for the decimal number 173? 10100111 10100101 10101101 10110101
10101101
64
Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format? 234.17.10.9 234.16.12.10 236.17.12.6 236.17.12.10
236.17.12.10
65
How many binary bits exist within an IPv6 address? 32 48 64 128 256
128
66
What is the binary equivalent of the decimal number 232? 11101000 11000110 10011000 11110010
11101000
67
Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.) IPv6 addresses are represented by hexadecimal numbers. IPv4 addresses are represented by hexadecimal numbers. IPv6 addresses are 32 bits in length. IPv4 addresses are 32 bits in length. IPv4 addresses are 128 bits in length. IPv6 addresses are 64 bits in length.
-IPv6 addresses are represented by hexadecimal numbers. -IPv4 addresses are 32 bits in length
68
Which IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14? Binary Dotted decimal Hexadecimal ASCII
Dotted decimal
69
What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011? 192.0.2.199 198.51.100.201 203.0.113.211 209.165.201.223
203.0.113.211
70
What is the decimal equivalent of the binary number 10010101? 149 157 168 192
149
71
What is the decimal equivalent of the hex number 0x3F? 63 77 87 93
63
72
What is the dotted decimal representation of the IPv4 address which is represented as the binary string 00001010.01100100.00010101.00000001? 10.100.21.1 10.10.20.1 100.10.11.1 100.21.10.1
10.100.21.1
73
What is the decimal equivalent of 0xC9? 185 200 201 199
201
74
Which is a valid hexadecimal number? F G H J
F
75
What is the binary representation of 0xCA? 10111010 11010101 11001010 11011010
11001010
76
How many bits are in an IPv4 address? 32 64 128 256
32
77
Which statement describes a characteristic of the frame header fields of the data link layer? a. They all include the flow control and logical connection fields. b. Ethernet frame header fields contain Layer 3 source and destination addresses. c. They vary depending on protocols. d. They include information on user applications.
c. They vary depending on protocols.
78
Which two factors influence the method that is used for media access control? (Choose two.) a. How data is generated by end devices applications b. How the connection between nodes appears to the data link layer c. How signals are encoded by the NICs on end devices d. How nodes share the media e. How the IP protocol forwards the packet to the destination
b. How the connection between nodes appears to the data link layer d. How nodes share the media
79
What is a characteristic of a WAN hub-and-spoke topology? a. It requires that some of the branch sites be interconnected through point-to-point links. b. It requires that every site be interconnected to each other through point-to-point links. c. All sites require a hub device that connects to a router. d. The branch sites are connected to a central site through point-to-point links.
d. The branch sites are connected to a central site through point-to-point links.
80
What identifier is used at the data link layer to uniquely identify an Ethernet device? IP address MAC address Sequence number TCP port number UDP port number
MAC address
81
What attribute of a NIC would place it at the data link layer of the OSI model? Attached Ethernet cable IP address MAC address RJ-45 port TCP/IP protocol stack
MAC address
82
Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) Institute of Electrical and Electronics Engineers (IEEE) Internet Assigned Numbers Authority (IANA) International Telecommunication Union (ITU) Electronic Industries Alliance (EIA) Internet Society (ISOC)
Institute of Electrical and Electronics Engineers (IEEE) International Telecommunication Union (ITU)
83
What is true concerning physical and logical topologies? a. The logical topology is always the same as the physical topology. b. Physical topologies are concerned with how a network transfers frames. c. Physical topologies display the IP addressing scheme of each network. d. Logical topologies refer to how a network transfers data between devices.
d. Logical topologies refer to how a network transfers data between devices.
84
What method is used to manage contention-based access on a wireless network? CSMA/CD Priority ordering CSMA/CA Token passing
CSMA/CA
85
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? Bus Hierarchical Mesh Ring Star
Mesh
86
Which statement describes the half-duplex mode of data transmission? a. Data that is transmitted over the network can only flow in one direction. b. Data that is transmitted over the network flows in one direction at a time. c. Data that is transmitted over the network flows in one direction to many different destinations simultaneously. d. Data that is transmitted over the network flows in both directions at the same time.
b. Data that is transmitted over the network flows in one direction at a time.
87
Which is a function of the Logical Link Control (LLC) sublayer? a. To define the media access processes that are performed by the hardware b. To provide data link layer addressing c. To identify which network layer protocol is being used d. To accept segments and package them into data units that are called packets
c. To identify which network layer protocol is being used
88
Which data link layer media access control method does Ethernet use with legacy Ethernet hubs? CSMA/CD Determinism Turn taking Token passing
CSMA/CD
89
What are the two sublayers of the OSI model data link layer? (Choose two.) Internet Physical LLC Transport MAC Network access
LLC MAC
90
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? Application Transport Data link Physical
Data link
91
What type of physical topology can be created by connecting all Ethernet cables to a central device? Bus Ring Star Mesh
Star
92
What are two services performed by the data link layer of the OSI model? (Choose two.) It fragments data packets into the MTU size. It determines the path to forward packets. It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection. It monitors the Layer 2 communication by building a MAC address table.
- It accepts Layer 3 packets and encapsulates them into frames. - It provides media access control and performs error detection.
93
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? The virtually unlimited availability of IPv6 addresses The use of CSMA/CA The use of full-duplex capable Layer 2 switches The development of half-duplex switch operation The use of Gigabit Ethernet speeds
The use of full-duplex capable Layer 2 switches
94
Which two characteristics describe Ethernet technology? (Choose two.) a. It is supported by IEEE 802.3 standards. b. It is supported by IEEE 802.5 standards. c. It typically uses an average of 16 Mbps for data transfer rates. d. It uses unique MAC addresses to ensure that data is sent to the appropriate destination. e. It uses a ring topology.
a. It is supported by IEEE 802.3 standards. d. It uses unique MAC addresses to ensure that data is sent to the appropriate destination. Another answer: It uses the CSMA/CD access control method.
95
What statement describes a characteristic of MAC addresses? They must be globally unique. They are only routable within the private network. They are added as part of a Layer 3 PDU. They have a 32-bit binary value.
They must be globally unique.
96
What is the special value assigned to the first 24 bits of a multicast MAC address transporting an IPv4 packet? 01-5E-00 FF-00-5E FF-FF-FF 01-00-5E
01-00-5E
97
What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address? a. It will discard the frame. b. It will forward the frame to the next host. c. It will remove the frame from the media. d. It will strip off the data-link frame to check the destination IP address.
a. It will discard the frame.
98
Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame? Repeater Hub Switch Router
Switch
99
Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table? Hub Router Switch Modem
Switch
100
Which function or operation is performed by the LLC sublayer? It performs data encapsulation. It communicates with upper protocol layers. It is responsible for media access control. It adds a header and trailer to a packet to form an OSI Layer 2 PDU.
It communicates with upper protocol layers.
101
What happens to runt frames received by a Cisco Ethernet switch? The frame is dropped. The frame is returned to the originating network device. The frame is broadcast to all other devices on the same network. The frame is sent to the default gateway.
The frame is dropped.
102
What addressing information is recorded by a switch to build its MAC address table? The destination Layer 3 address of incoming packets The destination Layer 2 address of outgoing frames The source Layer 3 address of outgoing packets The source Layer 2 address of incoming frames
The source Layer 2 address of incoming frames
103
What is auto-MDIX? A type of Cisco switch An Ethernet connector type A feature to automatically determine speed and duplex A feature that detects Ethernet cable typ​e
A feature that detects Ethernet cable typ​e
104
What type of address is 01-00-5E-0A-00-02? An address that reaches every host inside a local subnet An address that reaches one specific host An address that reaches every host in the network An address that reaches a specific group of hosts
An address that reaches a specific group of hosts
105
Which statement is true about MAC addresses? MAC addresses are implemented by software. A NIC only needs a MAC address if connected to a WAN. The first three bytes are used by the vendor assigned OUI. The ISO is responsible for MAC addresses regulations.
The first three bytes are used by the vendor assigned OUI.
106
What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.) 56 bytes 64 bytes 128 bytes 1024 bytes 1518 bytes
-64 bytes -1518 bytes
107
Which two functions or operations are performed by the MAC sublayer? (Choose two.) It is responsible for Media Access Control. It performs the function of NIC driver software. It adds a header and trailer to form an OSI Layer 2 PDU. It handles communication between upper and lower layers. It adds control information to network protocol layer data.
-It is responsible for Media Access Control. -It adds a header and trailer to form an OSI Layer 2 PDU.
108
Which command can be used on a Windows host to display the routing table? netstat -s show ip route netstat -r tracert
netstat -r
109
What information is added during encapsulation at OSI Layer 3? Source and destination MAC Source and destination application protocol Source and destination port number Source and destination IP address
Source and destination IP address
110
How does the network layer use the MTU value? a. The network layer depends on the higher level layers to determine the MTU. b. The network layer depends on the data link layer to set the MTU, and adjusts the speed of transmission to accommodate it. c. The MTU is passed to the network layer by the data link layer. d. To increase speed of delivery, the network layer ignores the MTU.
c. The MTU is passed to the network layer by the data link layer.
111
Which characteristic describes an IPv6 enhancement over IPv4? a. IPv6 addresses are based on 128-bit flat addressing as opposed to IPv4 which is based on 32-bit hierarchical addressing. b. The IPv6 header is simpler than the IPv4 header is, which improves packet handling. c. Both IPv4 and IPv6 support authentication, but only IPv6 supports privacy capabilities. d. The IPv6 address space is four times bigger than the IPv4 address space.
b. The IPv6 header is simpler than the IPv4 header is, which improves packet handling.
112
Which statement accurately describes a characteristic of IPv4? All IPv4 addresses are assignable to hosts.​ IPv4 has a 32-bit address space.​ An IPv4 header has fewer fields than an IPv6 header has.​ IPv4 natively supports IPsec.​
IPv4 has a 32-bit address space.​
113
When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination? Destination MAC address Source IP address Destination IP address Source MAC address
Destination IP address
114
A computer has to send a packet to a destination host in the same LAN. How will the packet be sent? The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host. The packet will be sent directly to the destination host. The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host. The packet will be sent only to the default gateway.
The packet will be sent directly to the destination host.
115
Which IPv4 address can a host use to ping the loopback interface? 126.0.0.1 127.0.0.0 126.0.0.0 127.0.0.1
127.0.0.1
116
When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary? a. Connectionless acknowledgements are used to request retransmission. b. Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host. c. Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available d. The best-effort delivery process guarantees that all packets that are sent are received.
b. Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.
117
What was the reason for the creation and implementation of IPv6? To make reading a 32-bit address easier To relieve IPv4 address depletion To provide more address space in the Internet Names Registry To allow NAT support for private addressing
To relieve IPv4 address depletion
118
Which information is used by routers to forward a data packet toward its destination? Source IP address Destination IP address Source data-link address Destination data-link address
Destination IP address
119
Which field in an IPv4 packet header will typically stay the same during its transmission? Flag Time-to-Live Packet Length Destination Address
Destination Address
120
Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped? TTL Hop Limit Address Unreachable No Route to Destination
Hop Limit
121
Which router component holds the routing table, ARP cache, and running configuration file? RAM Flash NVRAM ROM
RAM
122
What type of information is contained in an ARP table? Switch ports associated with destination MAC addresses Domain name to IPv4 address mappings Routes to reach destination networks IPv4 address to MAC address mappings
IPv4 address to MAC address mappings
123
A PC is configured to obtain an IPv4 address automatically from network 192.168.1.0/24. The network administrator issues the arp -a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry? This is a static map entry. This is a dynamic map entry. This entry refers to the PC itself. This entry maps to the default gateway.
This is a static map entry.
124
A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway? ipconfig /all route print netstat -r arp -a
arp -a
125
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? It initiates an ARP request. It broadcasts the frame out of all ports on the switch. It notifies the sending host that the frame cannot be delivered. It forwards the frame out of all ports except for the port at which the frame was received.
It forwards the frame out of all ports except for the port at which the frame was received.
126
Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.) Router solicitation Router advertisement Neighbor solicitation Neighbor advertisement Echo request
Based on netacad: - Router solicitation - Neighbor advertisement Based on online sources: - Neighbor solicitation - Neighbor advertisement
127
How does the ARP process use an IPv4 address? To determine the MAC address of the remote destination host To determine the MAC address of a device on the same network To determine the amount of time a packet takes when traveling from source to destination To determine the network number based on the number of bits in the IPv4 address
To determine the MAC address of a device on the same network
128
What is one function of the ARP protocol? Obtaining an IPv4 address automatically Mapping a domain name to its IP address Resolving an IPv4 address to a MAC address Maintaining a table of domain names with their resolved IP addresses
Resolving an IPv4 address to a MAC address
129
Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame? It drops the frame. It sends the frame to all ports except the port on which it received the frame. It sends the frame to all ports that are registered to forward broadcasts. It sends the frame to all ports.
It sends the frame to all ports except the port on which it received the frame.
130
What addresses are mapped by ARP? IPv4 address to a destination MAC address Destination IPv4 address to the source MAC address Destination IPv4 address to the destination host name Destination MAC address to the source IPv4 address
- IPv4 address to a destination MAC address Another answer: - Destination MAC address to a destination IPv4 address
131
When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP? The IPv4 address of the destination host The IPv4 address of the default gateway The MAC address of the router interface closest to the sending host The MAC address of the switch port that connects to the sending host
The MAC address of the router interface closest to the sending host
132
The ARP table in a switch maps which two types of address together? Layer 3 address to a Layer 2 address Layer 3 address to a Layer 4 address Layer 4 address to a Layer 2 address Layer 2 address to a Layer 4 address
Layer 3 address to a Layer 2 address
133
What is the purpose of ARP in an IPv4 network? To forward data onward based on the destination IP address To obtain a specific MAC address when an IP address is known To forward data onward based on the destination MAC address. To build the MAC address table in a switch from the information that is gathered
To obtain a specific MAC address when an IP address is known
134
Which destination address is used in an ARP request frame? 0.0.0.0 255.255.255.255 FFFF.FFFF.FFFF 127.0.0.1 01-00-5E-00-AA-23
FFFF.FFFF.FFFF
135
A router boots and enters setup mode. What is the reason for this? The IOS image is corrupt. Cisco IOS is missing from flash memory. The configuration file is missing from NVRAM. The POST process has detected hardware failure.
The configuration file is missing from NVRAM.
136
Which command is used to encrypt all passwords in a router configuration file? Router_A (config) # enable secret Router_A (config) # service password-encryption Router_A (config) # enable password Router_A (config) # encrypt password
Router_A (config) # service password-encryption
137
Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security? secret password trustknow1 enable password trustknow1 service password-encryption enable secret trustknow1
enable secret trustknow1
138
What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered? portsmouth# portsmouth(config)# invalid input detected router(config-host)# hostname = portsmouth portsmouth# ? command not recognized router(config)#
portsmouth(config)#
139
An administrator is configuring a new router to permit out-of-band management access. Which set of commands will allow the required login using a password of cisco? Router(config)# line vty 0 4 Router(config-line)# password manage Router(config-line)# exit Router(config)# enable password cisco Router(config)# line vty 0 4 Router(config-line)# password cisco Router(config-line)# login Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# exit Router(config)# service password-encryption
Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login
140
Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status? show ip interface brief ping show ip route show interface fa0/1
show ip interface brief
141
Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting? User EXEC mode Privileged EXEC mode Global configuration mode Interface configuration mode
Privileged EXEC mode
142
Which characteristic describes the default gateway of a host computer? a. The logical address of the router interface on the same network as the host computer b. The physical address of the switch interface connected to the host computer c. The physical address of the router interface on the same network as the host computer d. The logical address assigned to the switch interface connected to the router
a. The logical address of the router interface on the same network as the host computer
142
What is the purpose of the startup configuration file on a Cisco router? a. To facilitate the basic operation of the hardware components of a device b. To contain the commands that are used to initially configure a router on startup c. To contain the configuration commands that the router IOS is currently using d. To provide a limited backup version of the IOS, in case the router cannot load the full featured IOS
b. To contain the commands that are used to initially configure a router on startup
143
What is the purpose of the banner motd command? a. It configures a message that will identify printed documents to LAN users. b. It is a way that routers communicate the status of their links with one another. c. It provides an easy way of communicating with any user attached to a router's LANs. d. It provides a way to make announcements to those who log in to a router.
d. It provides a way to make announcements to those who log in to a router.
144
A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task? a. User executive mode b. Global configuration mode c. Any line configuration mode d. Privileged EXEC mode
c. Any line configuration mode
145
What is stored in the NVRAM of a Cisco router? a. The Cisco IOS b. The running configuration c. The bootup instructions d. The startup configuration
d. The startup configuration
146
Which statement regarding the service password-encryption command is true? It is configured in privileged EXEC mode. It encrypts only line mode passwords. As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted. To see the passwords encrypted by the service password-encryption command in plain text, issue the no service password-encryption command.
As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.