Part 3 Flashcards
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
- The Destination Address field is new in IPv6.
- The Source Address field name from IPv4 is kept in IPv6.
- The Version field from IPv4 is not kept in IPv6.
- The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
- The Header Checksum field name from IPv4 is kept in IPv6.
The Source Address field name from IPv4 is kept in IPv6.
The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
Match each item to the type of topology diagram on which it is typically identified.
IP address of a server =
location of a desktop PC in a classroom =
USB port on a desktop PC in a classroom =
path of cables that connect rooms to wiring closets =
logical topology diagram
physical topology diagram
IP address of a server = logical topology diagram
location of a desktop PC in a classroom = physical topology diagram
path of cables that connect rooms to wiring closets = physical topology diagram
What service is provided by HTTP?
- An application that allows real-time chatting among remote users.
- Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
- Allows for data transfers between a client and a file server.
- A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting?
Telnet
FTP
SSH
DHCP
DHCP
What are the two most effective ways to defend against malware? (Choose two.)
Implement strong passwords. Update the operating system and other application software. Install and update antivirus software. Implement RAID. Implement a VPN. Implement network firewalls.
Update the operating system and other application software.
Install and update antivirus software.
An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)
Configure the IP domain name on the router. Enable inbound vty Telnet sessions. Configure DNS on the router. Generate the SSH keys. Generate two-way pre-shared keys. Enable inbound vty SSH sessions
Configure the IP domain name on the router.
Generate the SSH keys.
Enable inbound vty SSH sessions.
A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?
It will send the frame and use its own MAC address as the destination.
It will send the frame with a broadcast MAC address.
It will send an ARP request for the MAC address of the destination device.
It will send a request to the DNS server for the destination MAC address.
It will send an ARP request for the MAC address of the default gateway.
It will send an ARP request for the MAC address of the default gateway.
Match the header field with the appropriate layer of the OSI model. (Not all options are used.)
Source IP Address Destination Port Number 802.2 header Destination Options FCS (Frame Check Sequence) Destination MAC Address TTL Acknowledgment Number
Layer 2
Layer 3
Layer 4
Layer 2
802.2 header
FCS (Frame Check Sequence)
Destination MAC Address
Layer 3
TTL
Source IP Address
Layer 4
Acknowledgment Number
Destination Port Number
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?
fast-forward
cut-through
store-and-forward
fragment-free
store-and-forward
What are proprietary protocols?
protocols that can be freely used by any organization or vendor
protocols developed by private organizations to operate on any vendor hardware
a collection of protocols known as the TCP/IP protocol suite
protocols developed by organizations who have control over their definition and operation
protocols developed by organizations who have control over their definition and operation
What is an advantage to using a protocol that is defined by an open standard?
An open standard protocol is not controlled or regulated by standards organizations.
A company can monopolize the market.
It encourages competition and promotes choices.
The protocol can only be run on equipment from a specific vendor.
It encourages competition and promotes choices.
Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?
email
file
web
DNS
DNS
Match a statement to the related network model. (Not all options are used.)
requires a specific user interface
no dedicated server is required
a background service is required
Client and server roles are set on a request basis
devices can only function in one role at a time
peer-to-peer network
peer-to-peer application
peer-to-peer network
no dedicated server is required
Client and server roles are set on a request basis
peer-to-peer application
requires a specific user interface
a background service is required
A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:
IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed
The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?
- 255.255.240
- 255.255.0
- 255.255.192
- 255.255.224
- 255.255.248
- 255.255.252
255.255.255.224
Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?
IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33
IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33
IP address: 192.168.10.254 subnet mask: 255.255.255.0, default gateway: 192.168.10.1
IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46
IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33