CISCO CCNA introductions FINAL exam

0.0(0)
studied byStudied by 9 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/155

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

156 Terms

1
New cards
Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)
voice; video
2
New cards
Which wireless technology has low-power and data rate requirements making it popular in home automation applications?
ZigBee
3
New cards
Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
internet
internet
4
New cards
Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?
DNS
5
New cards
What are proprietary protocols?
protocols developed by organizations who have control over their definition and operation
6
New cards
What service is provided by DNS?
Resolves domain names into IP addresses.
7
New cards
A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?
POP3
8
New cards
What command can be used on a Windows PC to see the IP configuration of that computer?
ipconfig
9
New cards
A wired printer is shared so others can use it. What networking model is in use?
peer-to-peer (P2P)
10
New cards
What characteristic describes a virus?
malicious software or code running on an end device
11
New cards

sort these QoS priorities from highest to lowest
web page
audio conference,

financial transactions,

audio conference; financial transactions; web page

12
New cards

Match the description to the IPv6 addressing component

subnet ID

global routing

interface ID

This network portion of the address is assigned by the provider.

This part of the address is used by an organization to identify subnets.

This part of the address is the equivalent to the host portion of an IPv4 address.

This network portion of the address is assigned by the provider.

global routing

This part of the address is used by an organization to identify subnets.

subnet ID

This part of the address is the equivalent to the host portion of an IPv4 address.

interface ID

13
New cards
If Host1 transfers a file to a server, what TCP/IP layers are used?
If Host1 transfers a file to a server, what TCP/IP layers are used?
application; transport; internet; network access
14
New cards

Characteristics cut through and store and forward

cut-through: low latency; may forward runt frames; begins forwarding when destination address is received.

store-and-forward: always stores entire frame; checks CRC before forwarding; checks frame length before forwarding.

15
New cards
Which device interface IP should be used as default gateway of host H1?
Which device interface IP should be used as default gateway of host H1?
R1: G0/0
16
New cards
What service is provided by Internet Messenger?
An application that allows real-time chatting among remote users.
17
New cards
<p>match het juiste netwerk bij de juiste ip adressen<br><br><br>192.168.0.0/26; </p><p>192.168.0.128/25; </p><p>192.168.0.80/30</p><p> 192.168.0.96/27;</p><p class="has-focus"></p><p class="has-focus"></p>

match het juiste netwerk bij de juiste ip adressen


192.168.0.0/26;

192.168.0.128/25;

192.168.0.80/30

192.168.0.96/27;

A: 192.168.0.128/25;

B: 192.168.0.0/26;

C: 192.168.0.96/27;

D: 192.168.0.80/30

18
New cards
Which protocol built the shown table (arp -a output)?
Which protocol built the shown table (arp -a output)?
ARP
19
New cards
Which two factors may interfere with copper cabling near fluorescent lights and electrical equipment? (Choose two.)
EMI; RFI
20
New cards

Host sends something to a remote LAN with an empty ARP cache. How to obtain destination MAC?

Send an ARP request for the MAC address of the default gateway.

21
New cards
Destination port 53 received by a server. What service?
DNS
22
New cards

New LAN must support 25 devices. Smallest subnet mask?

255.255.255.224

23
New cards
What characteristic describes a Trojan horse?
malicious software hidden inside legitimate software
24
New cards
What service is provided by HTTPS?
Uses encryption to secure the exchange of web content.
25
New cards
How does a PC keep track of data flows between multiple application sessions to the Internet?
By using unique source port numbers per session.
26
New cards
New LAN must support 61 devices. Smallest network mask?
255.255.255.192
27
New cards

28
New cards
What characteristic describes a DoS attack?
an attack that slows or crashes a device or network service
29
New cards
<p>Match application protocols to transport protocols.(TCP en UDP</p>

Match application protocols to transport protocols.(TCP en UDP

<p></p>
30
New cards
What service is provided by SMTP?
Allows clients to send email to a mail server and servers to send email to other servers.
31
New cards
Which scenario describes a transport layer function?
Two browser windows open; transport layer ensures correct data to correct window (port numbers).
32
New cards
<p>Refer to the exhibit. Host B on subnet Teachers transmits a  packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses  are contained in the PDUs that are transmitted from host B to the  router?</p>

Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?


Layer 2 destination address = 00-00-0c-94-36-ab
Layer 2 source address = 00-00-0c-94-36-bb
Layer 3 destination address = 172.16.20.200
Layer 3 source address = 172.16.10.200

33
New cards
What does 'attenuation' mean?
loss of signal strength as distance increases
34
New cards
Switch shows error when entering 'config t'. What is the problem?
The administrator must first enter privileged EXEC mode.
35
New cards
Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)
DNS; POP
36
New cards
AAA component addressed when rights are read-only vs edit to admin group?
authorization
37
New cards
Three requirements defined by protocols for message transmission? (Choose three.)
message size; message encoding; delivery options
38
New cards
Two characteristics of IP? (Choose two.)
does not require a dedicated end-to-end connection; operates independently of the network media
39
New cards
Which three network characteristics are present: credentials used, excellent video during ISP failover? (Choose three.)
security; quality of service; fault tolerance
40
New cards
Two common causes of signal degradation with UTP? (Choose two.)
improper termination; low-quality cable or connectors
41
New cards
Which subnet includes 192.168.1.96 as usable host?
192.168.1.64/26
42
New cards
<p>Ping output shows connectivity to 192.168.100.1. Which two are correct? (Choose two.)<br><br><br></p><ul><li><p><span style="color: rgb(255, 255, 255);">This host does not have a default gateway configured.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">There are 4 hops between this device and the device at 192.168.100.1.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">There is connectivity between this device and the device at 192.168.100.1.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">The connectivity between these two hosts allows for videoconferencing calls.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">The average transmission time between the two hosts is 2 milliseconds.</span></p></li></ul><p class="has-focus"></p>

Ping output shows connectivity to 192.168.100.1. Which two are correct? (Choose two.)


  • This host does not have a default gateway configured.

  • There are 4 hops between this device and the device at 192.168.100.1.

  • There is connectivity between this device and the device at 192.168.100.1.

  • The connectivity between these two hosts allows for videoconferencing calls.

  • The average transmission time between the two hosts is 2 milliseconds.

There are 4 hops between this device and the device at 192.168.100.1.

There is connectivity between this device and the device at 192.168.100.1.

43
New cards
How to assess traffic with protocol analyzer? (Choose two.)
Capture during peak times; Capture on different network segments
44
New cards
Consequence of 'ipv6 unicast-routing' on a router?
Interfaces begin sending ICMPv6 Router Advertisements.
45
New cards
Which three OSI layers map to the TCP/IP application layer? (Choose three.)
application; presentation; session
46
New cards
What will R1 do with Ethernet header from PC1 when forwarding out serial?
What will R1 do with Ethernet header from PC1 when forwarding out serial?
Remove Ethernet header and build new Layer 2 header for outgoing interface.
47
New cards
Effect if default gateway is incorrectly configured on a host?
Host cannot communicate with hosts in other networks.
48
New cards
Two features of ARP? (Choose two.)
Send ARP broadcast if MAC unknown for local IP; Device with target IP sends ARP reply
49
New cards
New LAN must support 90 devices. Smallest mask?
255.255.255.128
50
New cards
Two ICMPv6 messages not in ICMPv4? (Choose two.)
Neighbor Solicitation; Router Advertisement
51
New cards
Destination port 80. What service?
HTTP
52
New cards
Advantage of IMAP over POP?
Messages are kept on the server until manually deleted from client.
53
New cards
Can ping IP but not URL. Which utility?
nslookup
54
New cards
Two LLC sublayer functions? (Choose two.)
Identify Layer 3 protocol in the frame; Enable IPv4 and IPv6 to share the same medium
55
New cards
Effect of 'ip default-gateway ' on a switch?
Allows remote management from another network.
56
New cards
Effect of 'transport input ssh' on vty lines?
Encrypts remote management sessions (SSH only).
57
New cards
<p>Match threat type to cause: electrical, hardware, environmental, maintenance.</p>

Match threat type to cause: electrical, hardware, environmental, maintenance.

electrical: spikes/brownouts/noise/power loss;

hardware: physical damage;

environmental: temp/humidity extremes;

maintenance: poor handling/ESD, lack of spares, poor cabling/labeling

58
New cards
Planning to hack by gathering wireless info. Type of attack?
reconnaissance
59
New cards
What service is provided by HTTP?
Basic rules for exchanging web content.
60
New cards
Destination port 67. What service?
DHCP
61
New cards
Two ARP-related problems when many ARP messages occur? (Choose two.)
All nodes must process ARP requests; Switch floods ARP broadcasts across the subnet
62
New cards
Windows commands/utilities to confirm IP/DNS and gateway connectivity? (Choose three.)
ipconfig; ping; nslookup
63
New cards
Forwarding traffic: after matching to directly connected network, router will…
switch the packet to the directly connected interface
64
New cards
What describes antispyware?
applications that protect devices from spyware
65
New cards
Which access method keeps credentials and session private for remote CLI?
SSH
66
New cards
Two most effective defenses against malware? (Choose two.)
Install and update antivirus; Keep OS and apps updated
67
New cards
Security threat where add-on disables firewall?
Trojan horse
68
New cards
Frame field used to ensure data not altered?
FCS (frame check sequence)
69
New cards
New LAN must support 4 devices. Smallest mask?
255.255.255.248
70
New cards
What service is provided by POP3?
Retrieves email by downloading to the client.
71
New cards
Two security solutions mostly corporate-only? (Choose two.)
intrusion prevention systems; virtual private networks
72
New cards
What describes antivirus software?
applications that protect devices from malware infections
73
New cards
Mechanism to prevent endless travel of IPv4 packet?
Decrement TTL; if 0, drop and send ICMP Time Exceeded
74
New cards
Destination port 69. What service?
TFTP
75
New cards
Steps to accept only SSH on R1? (Choose three.)
Configure IP domain name; Generate SSH keys; Enable inbound vty SSH
76
New cards
Two MAC sublayer functions? (Choose two.)
media access control; FCS error detection
77
New cards
IPv6 destination FF02::2. Target?
all IPv6 routers on the local link
78
New cards
Three parts of IPv6 GUA? (Choose three.)
global routing prefix; subnet ID; interface ID
79
New cards
Three concerns when building wireless network? (Choose three.)
coverage area; interference; security
80
New cards
Fastest way to test banner configuration?
Exit to login and observe banner upon new session.
81
New cards
Contention-based access method on wireless?
CSMA/CA
82
New cards
Function of data link layer?
exchange of frames over common local media
83
New cards
Purpose of TCP sliding window?
request source to decrease transmission rate (flow control)
84
New cards
What describes spyware?
software that collects user information on a device
85
New cards
Which switching method drops frames failing FCS?
store-and-forward switching
86
New cards
Range of IPv6 link-local addresses?
FE80::/10
87
New cards
What service is provided by FTP?
Data transfers between a client and a file server.
88
New cards
Two host settings required to access http site? (Choose two.)
DNS server; default gateway
89
New cards
Two statements about NAT for IPv4? (Choose two.)
Introduces problems for end-to-end apps; Slows IPv4 address depletion
90
New cards
EUI-64 interface ID for MAC 1C-6F-65-C2-BD-F8?
1E6F:65FF:FEC2:BDF8
91
New cards
<p>PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?</p>

PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?

PC2 will send an ARP reply with the PC2 MAC address

92
New cards
What service is provided by BOOTP?
Legacy discovery of IP for diskless workstation and BOOTP server location.
93
New cards
What describes adware?
software installed on a device that displays ads and collects info
94
New cards
If per-port error threshold reached, revert to which switching method?
store-and-forward
95
New cards
<p>Match a statement to the related network model. P2P network vs P2P application . (Not all options are used.)</p>

Match a statement to the related network model. P2P network vs P2P application . (Not all options are used.)

Network: no dedicated server; client and server roles are set on a per request basis.

Application: requires a specific user interface + background service required.

96
New cards
Two primary responsibilities of Ethernet MAC sublayer? (Choose two.)
data encapsulation; accessing the media
97
New cards
<p>Refer to the exhibit. What three facts can be determined from  the viewable output of the show ip interface brief command? (Choose  three.)</p><p></p><ul><li><p><span style="color: rgb(255, 255, 255);">Two physical interfaces have been configured.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">The switch can be remotely managed.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">One device is attached to a physical interface.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">Passwords have been configured on the switch.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">Two devices are attached to the switch.</span></p></li><li><p><span style="color: rgb(255, 255, 255);">The default SVI has been configured.</span></p></li></ul><p></p>

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

  • Two physical interfaces have been configured.

  • The switch can be remotely managed.

  • One device is attached to a physical interface.

  • Passwords have been configured on the switch.

  • Two devices are attached to the switch.

  • The default SVI has been configured.

  • The switch can be remotely managed.

  • One device is attached to a physical interface.

  • The default SVI has been configured.

98
New cards

Match frame fields: to the correct functions

This field checks if the frame has been damaged during the transfer.

This field helps to direct the frame toward its destination.

This field is used by the LLC to identify the Layer 3 protocol.

This field identifies the beginning of a frame.

addressing

error detection

type

frame start

addressing

This field helps to direct the frame toward its destination.

error detection

This field checks if the frame has been damaged during the transfer.

type

This field is used by the LLC to identify the Layer 3 protocol.

frame start

This field identifies the beginning of a frame.

99
New cards
IPv6 subnet ID for 2001:DA48:FC5:A4:3D1B::1/64?
2001:DA48:FC5:A4::/64
100
New cards

Match the firewall function to the type of threat protection
packet filtering, URL filtering, application filtering, stateful packet inspection,

prevents access by port number

prevents access based on IP or MAC address

prevents unsolicited incoming sessions

prevents access to websites

prevents access by port number

application filtering

prevents access based on IP or MAC address

packet filtering

prevents unsolicited incoming sessions

stateful packet inspection

prevents access to websites

URL filtering