Part 4 Flashcards
Which switching method drops frames that fail the FCS check?
store-and-forward switching
ingress port buffering
cut-through switching
borderless switching
store-and-forward switching
Match the characteristic to the forwarding method. (Not all options are used.)
always stores the entire frame check for CRC before forwarding check the frame length before forwarding does not forward broadcasts has low latency may forward runt frames begins forwarding when the destination address is received
cut-through
Store-and-forward
cut-through has low latency may forward runt frames begins forwarding when the destination address is received
Store-and-forward
always stores the entire frame
check for CRC before forwarding
check the frame length before forwarding
What is an advantage for small organizations of adopting IMAP instead of POP?
IMAP sends and retrieves email, but POP only retrieves email.
POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.
Messages are kept in the mail servers until they are manually deleted from the email client.
When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
Messages are kept in the mail servers until they are manually deleted from the email client.
A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?
point-to-point
client-based
peer-to-peer (P2P)
master-slave
peer-to-peer (P2P)
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?
- 255.255.224
- 255.255.240
- 255.255.192
- 255.255.0
255.255.255.0
Which wireless technology has low-power and data rate requirements making it popular in home automation applications?
ZigBee
5G
Wi-Fi
LoRaWAN
ZigBee
What are two characteristics shared by TCP and UDP? (Choose two.)
ability to to carry digitized voice 3-way handshake default window size connectionless communication port numbering use of checksum
port numbering
use of checksum
A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?
DHCP
SMTP
TFTP
DNS
TFTP
What service is provided by Internet Messenger?
An application that allows real-time chatting among remote users.
Resolves domain names, such as cisco.com, into IP addresses.
Uses encryption to provide secure remote access to network devices and servers.
Allows remote access to network devices and servers.
An application that allows real-time chatting among remote users.
What characteristic describes antispyware?
a tunneling protocol that provides remote users with secure access into the network of an organization
a network device that filters access and traffic coming into a network
applications that protect end devices from becoming infected with malicious software
software on a router that filters traffic based on IP addresses or applications
applications that protect end devices from becoming infected with malicious software
A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices:
Subnetwork A: IP phones – 10 addresses
Subnetwork B: PCs – 8 addresses
Subnetwork C: Printers – 2 addresses
What single subnet mask would be appropriate to use for the three subnetworks?
- 255.255.240
- 255.255.0
- 255.255.248
255.255.255.240
Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)
web peer to peer file transfer video voice
video
voice
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?
Differentiated Services
Fragment Offset
Header Length
Time-to-Live
Time-to-Live
Which two statements describe features of an IPv4 routing table on a router? (Choose two.)
Directly connected interfaces will have two route source codes in the routing table: C and S .
The netstat -r command can be used to display the routing table of a router.
If there are two or more possible routes to the same destination, the route associated with the higher metric value is included in the routing table.
The routing table lists the MAC addresses of each active interface.
If a default static route is configured in the router, an entry will be included in the routing table with source code S .
Directly connected interfaces will have two route source codes in the routing table: C and S .
If a default static route is configured in the router, an entry will be included in the routing table with source code S
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?
financial transactions, web page, audio conference
financial transactions, audio conference, web page
audio conference, financial transactions, web page
audio conference, financial transactions, web page