netacad 8-11

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Which command can be used on a Windows host to display the routing table

netstat -r

2
New cards

What information is added during encapsulation at OSI layer 3?

source and destination IP address

3
New cards

Which characteristic describes an IPv6 enhancement over IPv4

The IPv6 header is simpler than the IPv4 header is, which improves packet heading

4
New cards

When a routing receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination

destination IP address

5
New cards

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

The packet will be sent directly to the destination host

6
New cards

Which IPv4 address can a host use to ping the loopback interface

127.0.0.1

7
New cards

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission form the upper-level protocols on the sending host

8
New cards

what was the reason for the creation and implementation of IPv6

to relieve IPv4 address depletion

9
New cards

Which information is used by routers to forward a data packet toward its destination

destination IP address

10
New cards

which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped

Hop limit

11
New cards

what type of information is contained in an ARP table

IPv4 address to MAC address mappings

12
New cards

a cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address s host is using to reach the default gateway

arp -a

13
New cards

What will a layer 2 switch do when the destination MAC address of a received frame is not in the MAC table

it forwards the frame out of all ports except for the port at which the frame was received

14
New cards

What is one function of the ARP protocol

resolving an IPv4 address to a MAC address

15
New cards

When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP

the MAC address of the router interface closest to the sending host

16
New cards

The ARP table in a switch maps which two types of address together

Layer 3 address to a layer 2 address

17
New cards

which destination address is used in an ARP request frame

FFFF.FFFF.FFF

18
New cards

A router boots and enters setup mode. What is the reason for this

The configuration file is missing from NVRAM

19
New cards

Company policy requires using the most secure methos to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following commands achieves the goal of providing the highest level of security

enable secret trustknow1

20
New cards

Which command can be used on a cisco router to display all interfaces, the IPv4 address assigned and the current status

show ip interface brief

21
New cards

Which CLI mode allows users to access all device commands, such as those used for configuration, management. and troubleshooting

privileged EXEC mode

22
New cards

What is the purpose of the startup configuration file on a cisco router

to contain the commands that are used to initially configure a router on startup

23
New cards

Which characteristic describes the default gateway of a host computer

the logical address of the router interface on the same network as the host computer

24
New cards

what is stored in the NVRAM of a cisco router

the startup configuration

25
New cards

which 2 parts are components of an IPv4 address

  • host portion

  • network portion

26
New cards

What is the purpose of the subnet mask in conjunction with an IP address

to determine the subnet to which the host belongs to