Term
What are 2 benefits of collaboration and video-on-demand applications? |
|
Definition
1.providing a richer e-learning environment 2. providing better social media opportunities |
|
|
Term
Which 2 statements correctly define types of network infrastructure? |
|
Definition
1.A WLAN is designed to wirelessly interconnect users and end points in a small graphical area 2. a SAN is designed to support data storage, retrieval, and replication. |
|
|
Term
Which statement describes a network that supports QoS? |
|
Definition
The network provides predictable levels of service to differtn types of traffic |
|
|
Term
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visitied by users of the computer. Which type of threat is affecting this computer? |
|
Definition
|
|
Term
Which type of network design combines voice, video, and data on the same communication channel? |
|
Definition
|
|
Term
What 2 criteria are used to help select network media? |
|
Definition
1. the distance the media can successfully carry a signal 2. the environment where the media is to be installed |
|
|
Term
What are 2 functions of intermediary devices on a network? |
|
Definition
1. they direct data along alternate pathways when there is a link failure 2. they filter the flow of data, based on security settings |
|
|
Term
Which 2 Internet solutions provide an always-on, high-bandwidth connection to commputers on a LAN? |
|
Definition
|
|
Term
Which statement describes a characteristic of cloud computing? |
|
Definition
applications can be accessed over the Internet through a subscription |
|
|
Term
Which 3 network tools provide the minimum required security protection for home users? |
|
Definition
1. antivirus software 2. antispyware software 3. firewall |
|
|
Term
Why would a layer 2 switch need an IP address? |
|
Definition
to enable the switch to be managed remotely |
|
|
Term
What is encrypted with the enable secret command? |
|
Definition
the priveledged executive mode password |
|
|
Term
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? |
|
Definition
|
|
Term
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? |
|
Definition
(config)# service password-encryption |
|
|
Term
Which 2 statements are true regarding the user EXEC mode? |
|
Definition
1. all router commands are available 2. interfaces and routing protocols can be configured |
|
|
Term
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? |
|
Definition
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the enter key has been pressed. |
|
|
Term
What criterion must be followed in the design of an IPv4 addressing scheme for end devices? |
|
Definition
each IP address must be unique within the local network |
|
|
Term
What command can be used on a Windows PC to see the IP configuration of that computer? |
|
Definition
|
|
Term
Which address is defined as a reserved address that routes packets back to the host? |
|
Definition
|
|
Term
What benefit does DHCP provide to a network? |
|
Definition
hosts can connect to the network and get an IP address without manual configuration |
|
|
Term
Which 2 message timing mechanisms are used in data communications? |
|
Definition
1. response timeout 2. flow control |
|
|
Term
What is the purpose of protocols in data communications? |
|
Definition
providing the rules require for a specific type of communication to occur |
|
|
Term
What happens when 2 devices on the same subnet are communicating? |
|
Definition
the host portion of the IP addresses will be different |
|
|
Term
Which 2 components are added to the PDU at the network access layer? |
|
Definition
1. trailer 2. frame header |
|
|
Term
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent to quicly? |
|
Definition
|
|
Term
A user is viewing an HTML document located on a web server. What protocol segments the messages and manages the segments in the individual conversation between the web server and the web client? |
|
Definition
|
|
Term
Which IEEE standard enables a wireless NIC to connect to a wireless AP that is made by a different manufacturer? |
|
Definition
|
|
Term
What is an advantage of network devices using open standard protocols? |
|
Definition
a client host and a server running different operating systems can successfully exchange data |
|
|
Term
Which address does a NIC use when deciding whether to accept a frame? |
|
Definition
|
|
Term
If the default gateway is configured incorrectly on the host, what is the impact on communications? |
|
Definition
the host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks |
|
|
Term
Which 2 factors influence the method that is sued for media access control? |
|
Definition
1. how the connection between nodes appears to the data link layer 2. how nodes share the media |
|
|
Term
Which is a function of the logical link control(LLC) sublayer? |
|
Definition
to identify which network layer protocol is being used |
|
|
Term
Which 2 statements are true of the deterministic access method? |
|
Definition
1. the throughput is predictable 2. devices tale turns transmitting |
|
|
Term
Which layer of the OSI model is responsible for specifying the encapsulation method used for specif types of media? |
|
Definition
|
|
Term
Which statement describes signaling at the physical layer? |
|
Definition
sending the signals asynchronously means that they are transmitted without a clock signal |
|
|
Term
The throughput of a FastEthernet network is 80 mb/s. The traffic overhead for establishing sessions, acknowledgements, and encapsulation is 15 mb/s for the same time period. What is the goodput for this network? |
|
Definition
|
|
Term
What is one advantage of using fiber optic cabling rather than copper cabling? |
|
Definition
it is able to carry signal farther than copper cabling |
|
|
Term
A network admin is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? |
|
Definition
1. security 2. interference 3. coverage area |
|
|
Term
What are 2 characteristics of 802.11 wireless networks? |
|
Definition
1. they use CSMA/CA technology 2. collision can exist on the networks |
|
|
Term
What is the purpose of the FCS field in a frame? |
|
Definition
to determine if errors occurred in the transmission and reception |
|
|
Term
What characteristic of a contention-based access nethod? |
|
Definition
it is nondeterministic method |
|
|
Term
Which 2 functions or operations are performed by the MAC sublayer? |
|
Definition
1. it adds control information to network protocol layer data |
|
|
Term
Which term defines the processing capabilities of a switch by rating how much data can be processed per second? |
|
Definition
|
|
Term
Which statement is true about MAC addresses? |
|
Definition
the first three bytes are used by the vendor assigned OUI |
|
|
Term
A host is trying to send a packet to a device on a remote LAN segment, but there are urrently no mappings in its ARP cache, How will the device obtain a destination MAC address? |
|
Definition
it will send an ARP request for the MAC address of the default gateway |
|
|
Term
Which 2 statements describe features of functions of the logical link control sublayer in Thernet standards? |
|
Definition
1. LLC is implemented in software 2. the data link layer uses LLC to communicate with the upper layers of the protocol suite |
|
|
Term
A network administrator is connecting 2 modern switches using a straight-through cable. The switches are new and have never been configured, Which 3 statements are correct about the final result of the connection? |
|
Definition
1. the link between the switches will work at the fastest speed that is supported by both switches 2. the link between switches will work as full-duplex 3. the auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable |
|
|
Term
How does adding an Ethernet line card affect the form factor of a switch? |
|
Definition
by expanding the port density |
|
|
Term
Which address or combination of addresses does a layer 3 switch use to make forwarding decisions? |
|
Definition
|
|
Term
What atatement illustrates a drawback of the CSMA/CD access method? |
|
Definition
collisions can decrease network performance |
|
|
Term
What is the command netstat -r used for? |
|
Definition
to display the host routing table |
|
|
Term
What are 2 functions that are provided by the network layer? |
|
Definition
1. providing end devices with a unique identifier 2. directing data packets to destination host on other networks |
|
|
Term
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet? |
|
Definition
|
|
Term
Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route? |
|
Definition
|
|
Term
When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data? |
|
Definition
upper-layer connection-oriented protocols |
|
|
Term
Why is NAT not needed in IPv6? |
|
Definition
any host or user can get a public IPv6 network address because the number of availble IPv6 addresses is extremely large |
|
|
Term
A technician is configuring a router that is actively running on the network. Suddenly, power to the router is lost. If the techniciam has not saved the configured, which 2 types of information will be lost? |
|
Definition
|
|
Term
Which statement about router interfaces is true? |
|
Definition
A configured and activated router interface must be connected to another device in order to operate |
|
|
Term
A technician is manually configuring a computer with the necessary IP parameters to communicate over the corporate network. The computer already has an IP address, a subnet mask, and a DNS server. What else has to be configured for INternet access? |
|
Definition
the default gateway address |
|
|
Term
A computer has to send a packet to a destination host in the same LAN. How will the packet be sent? |
|
Definition
the packet will be sent directly to the destination host |
|
|
Term
Which 3 fields are used in a UDP segment header? |
|
Definition
1. length 2. source port 3. checksum |
|
|
Term
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? |
|
Definition
the client randomly selects a source port number |
|
|
Term
When a client connects to an HTTP server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response? |
|
Definition
the original source port number that was randomly generated by the client |
|
|
Term
Which 2 applications use UDP as the transport layer protocol? |
|
Definition
|
|
Term
A host device sends a data packet to a web server via the HTTP protocol. What is used by the transport layer to pass the data stream to the proper application on the server? |
|
Definition
|
|
Term
Which scenario describes describes a function provided by the transport layer? |
|
Definition
a student has 2 web browser windows open in order to access 2 web sites. The transport layer ensures the correct web page is delivered to the correct browser window |
|
|
Term
Which transport layer feature is used to guarantee session establishment? |
|
Definition
|
|
Term
Which 2 flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? |
|
Definition
|
|
Term
What does a client do when it has UDP datagrams to send? |
|
Definition
it just sends the datagrams |
|
|
Term
A technician wishes to use TFTP to transfer a large file from a file server to a remote router. Which statement is correct about this scenario? |
|
Definition
the file is segmented and the reassembled in the correct order at the destination, if necessary, by the upper-layer protocol |
|
|
Term
Which statement is true about about an interface that is configured with the IPv6 address command? |
|
Definition
a link-local IPv6 address is automatically configured on the interface |
|
|
Term
A user who is unable to connect to the file server contacts the help desk. The helpdesk tecnician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command |
|
Definition
to test if the workstation can communicate on the network |
|
|
Term
Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnets? |
|
Definition
|
|
Term
Which 2 parts are components of an IPv4 address? |
|
Definition
1. network portion 2. host portion |
|
|
Term
What is the prefix length notation for the subnet mask 255.255.255.224? |
|
Definition
|
|
Term
Which IPv6 address is most compressed for the full FE80:0:0:0:2AA:FF:FE9A:4CA3 address? |
|
Definition
|
|
Term
What are 3 parts of an IPv6 global unicast address? |
|
Definition
1. a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP 2. a subnet ID that is used to identify networks inside of the local enterprise site 3. an interface ID that is used to identify the local host on the network |
|
|
Term
Which 2 ICMP messages are used by both IPv4 and IPv6 protocols? |
|
Definition
1. route redirection 2. protocol unreachable |
|
|
Term
When an IPv6 enabled host needs to discover the MAC address of an intended IPv6 destination, which destination address is used by the source host in the NS message? |
|
Definition
solicited-node multicast address |
|
|
Term
What is indicated by a succeeful ping to the ::1 IPv6 address? |
|
Definition
IP is properly installed on the host |
|
|
Term
An administrator wants to create eight subnetworks from the netwrok address 192.168.1.0/24. What is the network address and subnet mask of the second usable subnet? |
|
Definition
subnet 192.168.1.32 subnet mask 255.255.255.224 |
|
|
Term
What is an advantage of subnetting a network? |
|
Definition
it contains broadcast traffic within its subnet |
|
|
Term
How many host addresses are available on the 192.168.10.128/27 network? |
|
Definition
|
|
Term
How many host addresses are available on the network 172.16.128.0? |
|
Definition
|
|
Term
How many bits must be borrowed from the host portion of an address to accomodate a router with five connected networks? |
|
Definition
|
|
Term
A company has a network address of 182.168.1.64 with a subnet mask of 255.255.255.192. The compnay wants to create two subnets that would contain 10 hosts and 18 host respectively. Which 2 networks would achive that? |
|
Definition
1. 192.168.1.64/27 2. 192.168.1.96/28 |
|
|
Term
In a network that uses IPv4, what prefix would best fit a subnet containing 100 hosts? |
|
Definition
|
|
Term
Which 2 reasons generally make DHCP the preferred method of assigning IP addresses to host on large networks? |
|
Definition
1. it eliminates most address configuration errors 2. it reduces the burden on network support staff |
|
|
Term
What is the subnet address for the address 2001:DB8:BC15:A:12AB::1/64 |
|
Definition
|
|
Term
Which two notations are useable nibble boundaries when subnetting in IPv6? |
|
Definition
|
|
Term
Which domain name would be an example of a top-level domain? |
|
Definition
|
|
Term
Which 2 tasks are the responsibility of the local DNS server? |
|
Definition
1. mapping name-to-IP addresses for internal hosts 2.forwarding name resolution requests between server |
|
|
Term
A user reboots a pc which has been configured to dynamically receive an IPv4 address from a DHCP server. In which order do the DHCP message transactions between the client and server occur? |
|
Definition
DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK |
|
|
Term
Whic h 3 layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? |
|
Definition
1. session layer 2. application layer 3. presentation layer |
|
|
Term
A manufacturing company subscribes to certain hosted services from their ISP. The services required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? |
|
Definition
|
|
Term
What are two characteristic of peer-to-peer networks? |
|
Definition
1. decentralized resources 2. resource sharing without a dedicated server |
|
|
Term
A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? |
|
Definition
1. DHCPDISCOVER 2. DHCPREQUEST |
|
|
Term
Which 3 statements describe a DHCP Discover message? |
|
Definition
1. the destination IP address is 255.255.255.255 2. the message comes from a client seeking an IP address |
|
|
Term
What is true about the Server Message Block protocol? |
|
Definition
clients establish a long term conection to servers |
|
|
Term
When would it be more effivcient to use SMB to transfer files instead of FTP? |
|
Definition
when downloadinf large numbers of files from the same server |
|
|
Term
Which type of malware will disguise itself as a legitimate program and execute its malicious code one the program is run? |
|
Definition
|
|
Term
A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is xonnected between them. Which two troubleshooting steps could help to diagnos this problem? |
|
Definition
1. ensure the correct cable is used 2. ensure the link status LED on the integrated router is lit |
|
|
Term
Which network design consideration would be more important to a large corporation? |
|
Definition
|
|
Term
A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the sompany. What kind of threat is represented in this scenario? |
|
Definition
|
|
Term
Which 2 actions can be taken to prevent a successful attack on an email server account? |
|
Definition
1. never send the passowrd through the network in a clear text 2. limit the number of unsuccessful attempts to log in to the server |
|
|
Term
Which type of network attack involves the disabling or corruption of networks, systems, or services? |
|
Definition
denial of service attacks |
|
|
Term
When should an administrator establish a network baseline? |
|
Definition
at regular intervals over a period of time |
|
|
Term
What do WLANs that conform to IEEE 802.11 standards allow wireless users to do? |
|
Definition
connect wireless hosts to hosts or services on a wired Ethernet network |
|
|
Term
Which WLAN security protocol generates a new dynamic key each time a client establishes a connection with the AP? |
|
Definition
|
|
Term
Which 2 statements chracterize wireless network security? |
|
Definition
1. with SSID broadcast disabled, an attacker must know the SSID to connect 2. using the default IP address on an access point makes hacking easier |
|
|