test 2 Flashcards

1
Q
  1. Which information is used by routers to forward a data packet toward its destination?
A

destination IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?
A

The packet will be sent directly to the destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?
A

create a new Layer 2 Ethernet frame to be sent to the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which IPv4 address can a host use to ping the loopback interface?
A

127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?
A

IP relies on upper layer services to handle situations of missing or out-of-order packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Why is NAT not needed in IPv6?​
A

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which statement describes a feature of the IP protocol?
A

IP relies on upper layer services to handle situations of missing or out-of-order packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which parameter does the router use to choose the path to the destination when there are multiple routes available?
A

the lower metric value that is associated with the destination network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Within a production network, what is the purpose of configuring a switch with a default gateway address?
A

The default gateway address is used to forward packets originating from the switch to remote networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is a basic characteristic of the IP protocol?
A

connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?
A

Time-to-Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is one advantage that the IPv6 simplified header offers over IPv4?
A

efficient packet handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What IPv4 header field identifies the upper layer protocol carried in the packet?
A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What information does the loopback test provide?
A

The TCP/IP stack on the device is working correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What routing table entry has a next hop address associated with a destination network?
A

remote routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. How do hosts ensure that their packets are directed to the correct network destination?
A

They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?
A

Flow Label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. What statement describes the function of the Address Resolution Protocol?
A

ARP is used to discover the MAC address of any host on the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Which statement describes the treatment of ARP requests on the local link?
A

They are received and processed by every device on the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Which destination address is used in an ARP request frame?
A

FFFF.FFFF.FFFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?
A

The ARP cache is cleared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. What is the aim of an ARP spoofing attack?
A

to associate IP addresses to the wrong MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer?
A

ARP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?
A

destination MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
32. A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
Exit privileged EXEC mode and press Enter.
26
37. A router boots and enters setup mode. What is the reason for this?
The configuration file is missing from NVRAM.
27
38. The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?
The switch can be remotely managed from a host on another network.
28
39. What happens when the transport input ssh command is entered on the switch vty lines?
Communication between the switch and remote users is encrypted.
29
45. What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of NVRAM will change.
30
46. What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts in other networks.
31
49. Which term describes a field in the IPv4 packet header used to identify the next level protocol?
protocol
32
50. Which term describes a field in the IPv4 packet header that contains an 8-bit binary value used to determine the priority of each packet?
differentiated services
33
51. Which term describes a field in the IPv4 packet header that contains a 32-bit binary value associated with an interface on the sending device?
source IPv4 address
34
52. Which term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header?
header checksum
35
54. Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?
destination IPv4 address
36
55. Which term describes a field in the IPv4 packet header used to limit the lifetime of a packet?
TTL
37
56. Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?
version
38
57. Which term describes a field in the IPv4 packet header used to identify the next level protocol?
protocol
39
58. Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?
version
40
59. What property of ARP causes cached IP-to-MAC mappings to remain in memory longer?
Entries in an ARP table are time-stamped and are purged after the timeout expires.
41
60. What property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table?
A static IP-to-MAC address entry can be entered manually into an ARP table.
42
62. What property of ARP allows hosts on a LAN to send traffic to remote networks?
Local hosts learn the MAC address of the default gateway.
43
Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?
192.168.235.234
44
64. What property of ARP forces all Ethernet NICs to process an ARP request?
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
45
65. What property of ARP causes a reply only to the source sending an ARP request?
The source MAC address appears in the header of the Ethernet frame.
46
66. What property of ARP causes the request to be flooded out all ports of a switch except for the port receiving the ARP request?
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
47
67. What property of ARP causes the NICs receiving an ARP request to pass the data portion of the Ethernet frame to the ARP process?
The type field 0x806 appears in the header of the Ethernet frame.
48
68. What property of ARP causes the NICs receiving an ARP request to pass the data portion of the Ethernet frame to the ARP process?
The type field 0x806 appears in the header of the Ethernet frame.
49
1. What is the prefix length notation for the subnet mask 255.255.255.224?
/27
50
2. How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?
62
51
3. Which subnet mask would be used if 5 host bits are available?
255.255.255.224​
52
4. A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?
4
53
6. An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?
subnetwork 192.168.1.64 subnet mask 255.255.255.192
54
7. How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?
three
55
8. How many host addresses are available on the 192.168.10.128/26 network?
62
56
9. How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?
1022
57
13. A site administrator has been told that a particular network at the site must accommodate 126 hosts. Which subnet mask would be used that contains the required number of host bits?
255.255.255.128
58
15. What is the usable number of host IP addresses on a network that has a /26 mask?
62
59
16. Which address prefix range is reserved for IPv4 multicast?
224.0.0.0 – 239.255.255.255
60
18. A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?
This is a private IP address.
61
20. A message is sent to all hosts on a remote network. Which type of message is it?
directed broadcast
62
22. Which address is a valid IPv6 link-local unicast address?
FE80::1:4545:6578:ABC1
63
23. Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?
3FFE:1044:0:0:AB::57
64
24. A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?
65536
65
25. Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?
2001:db8:0:f000::/52
66
27. What type of IPv6 address is FE80::1?
link-local
67
29. What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?
the MAC address of the IPv6 enabled interface
68
30. What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?
2001:DB8:BC15:A
69
31. An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​
all IPv6 enabled devices on the local link​ or network
70
33. Which IPv6 prefix is reserved for communication between devices on the same link?
FE80::/10
71
34. Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?
anycast
72
36. Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?
SLAAC
73
37. Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?
ICMPv6
74
39. A technician uses the ping 127.0.0.1 command. What is the technician testing?
the TCP/IP stack on a network host
75
41. Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?
ICMP
76
42. Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?
time exceeded
77
43. A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?
when the value of the Hop Limit field reaches zero
78
44. What is the purpose of ICMP messages?
to provide feedback of IP packet transmissions
79
45. What source IP address does a router use by default when the traceroute command is issued?
the IP address of the outbound interface
80
47. A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1. What does this code represent?
host unreachable
81
48. Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
82
50. A host is transmitting a broadcast. Which host or hosts will receive it?
all hosts in the same subnet
83
51. A host is transmitting a unicast. Which host or hosts will receive it?
one specific host
84
52. A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 3. What does this code represent?
address unreachable
85
53. A host is transmitting a multicast. Which host or hosts will receive it?
a specially defined group of hosts
86
60. Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?
2001:db8::a0b0:8:1
87
61. Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?
fe80:9ea:0:2200::fe0:290
88
62. Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?
2002:42:10:c400::909
89
63. Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0ab8:0001:0000:1000?
2001:db8::ab8:1:0:1000
90
64. Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?
2002:420:c4:1008:25:190::990
91
65. Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?
2001:db8::a0b0:8:1
92
66. Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?
fe80::220:b3f:f0e0:29
93
67. Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?
2001:db8::a0b0:8:1
94
68. Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?
2002:42:10:c400::909
95
69. Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?
fe80:9ea:0:2200::fe0:290
96
70. A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?
beyond scope of the source address
97
71. A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1 . What does this code represent?
host unreachable
98
72. A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 3 . What does this code represent?
address unreachable
99
73. A user issues a ping 10.10.14.67 command and receives a response that includes a code of 0 . What does this code represent?
network unreachable
100
A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 4. What does this code represent? A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 4 . What does this code represent?
port unreachable
101
75. A user issues a ping 198.133.219.8 command and receives a response that includes a code of 0 . What does this code represent?
network unreachable
102
77. A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2. What does this code represent?
beyond scope of the source address
102
76. A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 4 . What does this code represent?
port unreachable
103
1. Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
The client randomly selects a source port number.
104
2. Which transport layer feature is used to guarantee session establishment?
TCP 3-way handshake
105
3. What is the complete range of TCP and UDP well-known ports?
0 to 1023
106
4. What is a socket?
the combination of a source IP address and port number or a destination IP address and port number
107
5. A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?
10 segments
108
6. Which factor determines TCP window size?
the amount of data the destination can process at one time
109
7. What does a client do when it has UDP datagrams to send?
It just sends the datagrams.
110
10. What information is used by TCP to reassemble and reorder received segments?
sequence numbers
111
11. What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?
destination and source port numbers
112
14. Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?
ACK
113
15. Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?
DNS
114
16. What is a characteristic of UDP?
UDP reassembles the received datagrams in the order they were received.
115
17. What kind of port must be requested from IANA in order to be used with a specific application?
registered port
116
21. Which field in the TCP header indicates the status of the three-way handshake process?
control bits
117
22. Why does HTTP use TCP as the transport layer protocol?
because HTTP requires reliable delivery
118
24. How are port numbers used in the TCP/IP encapsulation process?
If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.
119
29. What is true about the Server Message Block protocol?
Clients establish a long term connection to servers.
120
30. What is the function of the HTTP GET message?
to request an HTML page from a web server
121
31. Which OSI layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted?
application
122
32. Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?
client/server
123
33. What do the client/server and peer-to-peer network models have in common?
Both models support devices in server and client roles.
124
34. In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?
peer-to-peer
125
35. What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?
Gnutella
126
36. What is a key characteristic of the peer-to-peer networking model?
resource sharing without a dedicated server
127
38. What is an example of network communication that uses the client-server model?
A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
128
39. Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?
application
129
40. What is an advantage of SMB over FTP?​
SMB clients can establish a long-term connection to the server.​
130
42. Which application layer protocol uses message types such as GET, PUT, and POST?
HTTP
131
43. What type of information is contained in a DNS MX record?
the domain name mapped to mail exchange servers
132
45. Which protocol is used by a client to communicate securely with a web server?
HTTPS
133
46. Which applications or services allow hosts to act as client and server at the same time?
P2P applications
134
48. Which scenario describes a function provided by the transport layer?
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
135
50. A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?
3001
136
51. A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?
4501
137
52. A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received four packets of data from the PC?
6001
138
53. A client creates a packet to send to a server. The client is requesting TFTP service. What number will be used as the destination port number in the sending packet?
69
139
54. A client creates a packet to send to a server. The client is requesting FTP service. What number will be used as the destination port number in the sending packet?
21
140
55. A client creates a packet to send to a server. The client is requesting SSH service. What number will be used as the destination port number in the sending packet?
22
141
56. A client creates a packet to send to a server. The client is requesting HTTP service. What number will be used as the destination port number in the sending packet?
80
142
57. A client creates a packet to send to a server. The client is requesting POP3 service. What number will be used as the destination port number in the sending packet?
110
143
58. A client creates a packet to send to a server. The client is requesting telnet service. What number will be used as the destination port number in the sending packet?
23
144
59. A client creates a packet to send to a server. The client is requesting SNMP service. What number will be used as the destination port number in the sending packet?
161
144
145
60. A client creates a packet to send to a server. The client is requesting SMTP service. What number will be used as the destination port number in the sending packet?
25
146
61. A client creates a packet to send to a server. The client is requesting HTTPS service. What number will be used as the destination port number in the sending packet?
443