Part 3 Flashcards

1
Q

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

  • The Destination Address field is new in IPv6.
  • The Source Address field name from IPv4 is kept in IPv6.
  • The Version field from IPv4 is not kept in IPv6.
  • The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
  • The Header Checksum field name from IPv4 is kept in IPv6.
A

The Source Address field name from IPv4 is kept in IPv6.

The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Match each item to the type of topology diagram on which it is typically identified.

IP address of a server =
location of a desktop PC in a classroom =
USB port on a desktop PC in a classroom =
path of cables that connect rooms to wiring closets =

logical topology diagram

physical topology diagram

A

IP address of a server = logical topology diagram
location of a desktop PC in a classroom = physical topology diagram
path of cables that connect rooms to wiring closets = physical topology diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What service is provided by HTTP?

  • An application that allows real-time chatting among remote users.
  • Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
  • Allows for data transfers between a client and a file server.
  • A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
A

A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting?

Telnet
FTP
SSH
DHCP

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two most effective ways to defend against malware? (Choose two.)

Implement strong passwords.
Update the operating system and other application software.
Install and update antivirus software.
Implement RAID.
Implement a VPN.
Implement network firewalls.
A

Update the operating system and other application software.

Install and update antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

Configure the IP domain name on the router.
Enable inbound vty Telnet sessions.
Configure DNS on the router.
Generate the SSH keys.
Generate two-way pre-shared keys.
Enable inbound vty SSH sessions
A

Configure the IP domain name on the router.
Generate the SSH keys.
Enable inbound vty SSH sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?

It will send the frame and use its own MAC address as the destination.
It will send the frame with a broadcast MAC address.
It will send an ARP request for the MAC address of the destination device.
It will send a request to the DNS server for the destination MAC address.
It will send an ARP request for the MAC address of the default gateway.

A

It will send an ARP request for the MAC address of the default gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Match the header field with the appropriate layer of the OSI model. (Not all options are used.)

Source IP Address
Destination Port Number
802.2 header
Destination Options
FCS (Frame Check Sequence)
Destination MAC Address
TTL
Acknowledgment Number

Layer 2
Layer 3
Layer 4

A

Layer 2
802.2 header
FCS (Frame Check Sequence)
Destination MAC Address

Layer 3
TTL
Source IP Address

Layer 4
Acknowledgment Number
Destination Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

fast-forward
cut-through
store-and-forward
fragment-free

A

store-and-forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are proprietary protocols?

protocols that can be freely used by any organization or vendor
protocols developed by private organizations to operate on any vendor hardware
a collection of protocols known as the TCP/IP protocol suite
protocols developed by organizations who have control over their definition and operation

A

protocols developed by organizations who have control over their definition and operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an advantage to using a protocol that is defined by an open standard?

An open standard protocol is not controlled or regulated by standards organizations.
A company can monopolize the market.
It encourages competition and promotes choices.
The protocol can only be run on equipment from a specific vendor.

A

It encourages competition and promotes choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?

email
file
web
DNS

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Match a statement to the related network model. (Not all options are used.)

requires a specific user interface
no dedicated server is required
a background service is required
Client and server roles are set on a request basis
devices can only function in one role at a time

peer-to-peer network
peer-to-peer application

A

peer-to-peer network
no dedicated server is required
Client and server roles are set on a request basis

peer-to-peer application
requires a specific user interface
a background service is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:

IP phones – 22 addresses
PCs – 20 addresses needed
Printers – 2 addresses needed
Scanners – 2 addresses needed

The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

  1. 255.255.240
  2. 255.255.0
  3. 255.255.192
  4. 255.255.224
  5. 255.255.248
  6. 255.255.252
A

255.255.255.224

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?

IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33
IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33
IP address: 192.168.10.254 subnet mask: 255.255.255.0, default gateway: 192.168.10.1
IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46

A

IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets?

158
200
224
88

A

200

17
Q

What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?

1E6F:65FF:FEC2:BDF8
C16F:65FF:FEC2:BDF8
0C6F:65FF:FEC2:BDF8
106F:65FF:FEC2:BDF8

A

1E6F:65FF:FEC2:BDF8

18
Q

Which information does the show startup-config command display?​

the IOS image copied into RAM
the bootstrap program in the ROM
the contents of the saved configuration file in the NVRAM
the contents of the current running configuration file in the RAM

A

the contents of the saved configuration file in the NVRAM

19
Q
Match each type of frame field to its function. (Not all options are used.)
Addressing
Error detetion
type
frame start 

This field checks if the frame has been damaged during the transfer.
This field identifies special flow control services.
This field helps to direct the frame toward its destination.
This feild helps identifies the begining of the frame
This field is used by the LLC to identify the Layer 3 protocol.

A

Addressing
This field helps to direct the frame toward its destination.

Error detetion
This field checks if the frame has been damaged during the transfer.

type
This field is used by the LLC to identify the Layer 3 protocol.

frame start
This feild helps identifies the begining of the frame

20
Q

What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

accessing the media
data encapsulation
logical addressing
error detection
frame delimiting
A

accessing the media

data encapsulation