Part 4 Flashcards

1
Q

Which switching method drops frames that fail the FCS check?

store-and-forward switching
ingress port buffering
cut-through switching
borderless switching

A

store-and-forward switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Match the characteristic to the forwarding method. (Not all options are used.)

always stores the entire frame
check for CRC before forwarding
check the frame length before forwarding
does not forward broadcasts
has low latency
may forward runt frames
begins forwarding when the destination address is
received

cut-through
Store-and-forward

A
cut-through
has low latency
may forward runt frames
begins forwarding when the destination address is
received

Store-and-forward
always stores the entire frame
check for CRC before forwarding
check the frame length before forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an advantage for small organizations of adopting IMAP instead of POP?

IMAP sends and retrieves email, but POP only retrieves email.
POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.
Messages are kept in the mail servers until they are manually deleted from the email client.
When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.

A

Messages are kept in the mail servers until they are manually deleted from the email client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?

point-to-point
client-based
peer-to-peer (P2P)
master-slave

A

peer-to-peer (P2P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

  1. 255.255.224
  2. 255.255.240
  3. 255.255.192
  4. 255.255.0
A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which wireless technology has low-power and data rate requirements making it popular in home automation applications?

ZigBee
5G
Wi-Fi
LoRaWAN

A

ZigBee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two characteristics shared by TCP and UDP? (Choose two.)

ability to to carry digitized voice
3-way handshake
default window size
connectionless communication
port numbering
use of checksum
A

port numbering

use of checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?

DHCP
SMTP
TFTP
DNS

A

TFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What service is provided by Internet Messenger?

An application that allows real-time chatting among remote users.
Resolves domain names, such as cisco.com, into IP addresses.
Uses encryption to provide secure remote access to network devices and servers.
Allows remote access to network devices and servers.

A

An application that allows real-time chatting among remote users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What characteristic describes antispyware?

a tunneling protocol that provides remote users with secure access into the network of an organization
a network device that filters access and traffic coming into a network
applications that protect end devices from becoming infected with malicious software
software on a router that filters traffic based on IP addresses or applications

A

applications that protect end devices from becoming infected with malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices:

Subnetwork A: IP phones – 10 addresses
Subnetwork B: PCs – 8 addresses
Subnetwork C: Printers – 2 addresses
What single subnet mask would be appropriate to use for the three subnetworks?

  1. 255.255.240
  2. 255.255.0
  3. 255.255.248
A

255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)

web
peer to peer
file transfer
video
voice
A

video

voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Differentiated Services
Fragment Offset
Header Length
Time-to-Live

A

Time-to-Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two statements describe features of an IPv4 routing table on a router? (Choose two.)​

Directly connected interfaces will have two route source codes in the routing table: C and S .
The netstat -r command can be used to display the routing table of a router.​
If there are two or more possible routes to the same destination, the route associated with the higher metric value is included in the routing table.
The routing table lists the MAC addresses of each active interface.
If a default static route is configured in the router, an entry will be included in the routing table with source code S .

A

Directly connected interfaces will have two route source codes in the routing table: C and S .
If a default static route is configured in the router, an entry will be included in the routing table with source code S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

financial transactions, web page, audio conference
financial transactions, audio conference, web page
audio conference, financial transactions, web page

A

audio conference, financial transactions, web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​

All router interfaces will be automatically activated.
Each router interface will generate an IPv6 link-local address.​
The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.
It statically creates a global unicast address on this router.​

A

The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.