Networking Essentials 2.0 Final Exam Study

5.0(2)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/115

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:13 PM on 10/16/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

116 Terms

1
New cards

Which three protocols operate at the application layer of the TCP/IP model? (Choose three.)

POP3, DHCP, FTP

2
New cards

When is UDP preferred to TCP?

when segments must arrive in a very specific sequence to be processed successfully

3
New cards

What is the function of ARP?

maps IPv4 Addresses to MAC Addresses

4
New cards

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

The switch will forward the frame to all ports except port 4

<p>The switch will forward the frame to all ports except port 4</p>
5
New cards

Which network design solution will best extend access layer connectivity to host devices?

Implementing wireless connectivity

6
New cards

Which network server is malfunctioning if a user can ping the IP address of a web server but cannot ping the web server host name?

the DNS server

7
New cards

A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?

The network cable is faulty

8
New cards

Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is?

nslookup

9
New cards

Which type of network is covered by the IEEE 802.11 standards?

Wi-Fi

10
New cards

What are two benefits of wireless networks over wired networks? (Choose two.)

anytime, anywhere connectivity

mobility

11
New cards

Which technology is used to uniquely identify a WLAN network?

SSID

12
New cards

Match the components in the notation 100Base-T to the specification. (Not all options are used.)

Answer in Image

<p><b>Answer in Image</b></p>
13
New cards

Match the TCP/IP model layer to the function.

Answer in Image

<p><b>Answer in Image</b></p>
14
New cards

Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)

Physical

Data link

15
New cards

Which address is a valid IPv6 address that could be assigned to a host?

2001:db8:0:1111::200/120​

16
New cards

Which function does NAT perform in a wireless router?

NAT takes an internal source IP address and translates it to a global IP address

17
New cards

What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?

link-local

18
New cards

A network administrator investigates a user problem. The user can reach hosts on the same network, but is unable to communicate to remote networks.The network administrator tries to ping the gateway address configured on the host device and is unsuccessful. What is the most likely cause of the problem?

The default gateway address is incorrect.

19
New cards

Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.)

Answer in Image

<p><b>Answer in Image</b></p>
20
New cards

What does the letter C mean next to an entry in the output of the show ip route command?

It identifies a network that is directly connected to the router.

21
New cards

Which switch command would a network administrator use to determine if there are encapsulation or media errors on an interface?

show interfaces

22
New cards

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

switch

23
New cards

Which interface allows remote management of a Layer 2 switch?

the switch virtual interface

24
New cards

Which two statements correctly describe the components of a router? (Choose two.)

ROM contains diagnostics executed on hardware modules

Flash memory does not lose its contents during a reboot

25
New cards

Which feature is characteristic of MAC filtering in wireless networks?

it restricts computer access to a wireless network

26
New cards

Which wireless security technology is difficult to crack and provides encryption of network traffic?

WPA2

27
New cards

Which two statements about a Service Set Identifier (SSID) are true? (Choose two.)

It tells a wireless device to which WLAN it belongs

All wireless devices on the same WLAN must have the same SSID.

28
New cards

What are three characteristics of UTP cabling? (Choose three.)

susceptible to EMI and RFI

easiest type of networking cable to install

most commonly used networking cable

29
New cards

Which three factors should be considered when choosing the appropriate network media? (Choose three.)

the environment in which the media is installed

the amount of data and the data transfer rate desired

the distance between hosts that the media will connect

30
New cards

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater distances per cable run

limited susceptibility to EMI/RFI

greater bandwidth potential

31
New cards

Refer to the exhibit. Which set of devices contains only end devices?

E, F, H, I, J

<p>E, F, H, I, J</p>
32
New cards

What is an advantage of the peer-to-peer network model?

ease of setup

33
New cards

Which three devices are considered intermediate devices in a network? (Choose three.)

wireless access point

switch

router

34
New cards

Which two methods are used to directly connect mobile devices such as tablets and smartphones to a data network? (Choose two.)

Wi-Fi

WiMax

35
New cards

Which two devices are shared peripherals? (Choose two.)

Printer

Scanner

36
New cards

Which three configuration components are required to allow a host to communicate with other hosts on remote networks? (Choose three.)

subnet mask

IP address

default gateway

37
New cards

A user is looking for a wireless headphone for listening to songs stored on a smartphone. What wireless technology would the headphone use?

Bluetooth

38
New cards

Which is a characteristic of a Type 2 hypervisor?​

does not require management console software

39
New cards

A company has a few employees that are designers. The designers do not have the CAD application loaded on their local computer. Instead, the designers use a CAD application hosted by the application developer. Which type of virtualization is the company using?

SaaS

40
New cards

A network administrator attempted to access the company website and received a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?

It is likely someone attempted a DoS attack

41
New cards

Which three attacks exploit vulnerabilities in software? (Choose three.)

Worms

Trojan Horses

Viruses

42
New cards

What technique is used in social engineering attacks?

phishing

43
New cards

A file is downloaded from the Internet. After the user opens the downloaded file, the hard drive crashes and all information on the computer is lost. What type of attack occurred?

virus

44
New cards

What is the decimal equivalent to binary 11110000?

240

45
New cards

What does the IP address 172.17.4.250/24 represent?

host address

46
New cards

Which three IP addresses are considered private addresses? (Choose three.)

192.168.5.29

172.17.254.4

10.234.2.1

47
New cards

A network security administrator is writing documentation on the firewall requirements for allowing Telnet access to the remote server. Which two pieces of information should be included? (Choose two.)

port 23

TCP

48
New cards

Which two application layer protocols manage the exchange of messages between a client with a web browser and a remote web server? (Choose two.)

HTTPS

HTTP

49
New cards

Match the port number to the email protocol.

Answer in Image

<p><b>Answer in Image</b></p>
50
New cards

Which protocol is used by a server that needs to send an email message to another server in order to support successful delivery of the message?

SMTP

51
New cards

What are two functions of a router? (Choose two.)

A router connects multiple IP networks

It determines the best path to send packets

52
New cards

Which statement describes a major characteristic of a local area network?

A LAN is under one administrative control

53
New cards

A user can access a file share resource on a server located in the same office but cannot access the internet. What is the possible cause?

The default gateway address is misconfigured on the PC

54
New cards

Refer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company web server. However, the web server cannot access the Internet. The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and the web server is able to ping local workstations. Which component is incorrectly configured?

default gateway address

<p>default gateway address</p>
55
New cards

A law firm uses DHCPv4 to dynamically assign IPv4 addresses for staff workstations. The DHCP policy specifies that the lease period is 7 days. A staff member returns to the office after 2 weeks of vacation. When the employee turns on the workstation, which DHCPv4 message is sent by the workstation to obtain a valid IPv4 address?

DHCPREQUEST unicast message

56
New cards

A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

FF-FF-FF-FF-FF-FF and 255.255.255.255

57
New cards

The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?

The switch can be remotely managed from a host on another network.

58
New cards

Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.)

Give the router a host name and domain name.

Generate a set of secret keys to be used for encryption and decryption.

59
New cards

Match the command with the device mode at which the command is entered. (Not all options are used.)

Answer in Image

<p><b>Answer in Image</b></p>
60
New cards

Which three acronyms/initialisms represent standards organizations? (Choose three.)

IEEE

IANA

IETF

61
New cards

Which three layers of the OSI model make up the application layer of the TCP/IP model? (Choose three.)

presentation

application

session

62
New cards

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server

default gateway

63
New cards

What are two characteristics of 802.11 wireless networks? (Choose two.)

They use CSMA/CA technology

Collisions can exist in the networks

64
New cards

A message is sent to all hosts on a remote network. Which type of message is it?

directed broadcast

65
New cards

When a computer assembles a frame to be sent over the network, what is the maximum size of an Ethernet frame?

1518 bytes

66
New cards

Which function is supplied by the access layer in a three-layer network design?

network access

67
New cards

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)

Answers in Image

<p><b>Answers in Image</b></p>
68
New cards

When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?

destination IP address

69
New cards

A user is setting up a home wireless network. A global address is to be used in NAT translations for traffic flowing through the wireless router. How is this global address assigned?

The wireless router will act as a DHCP client in order to receive global addressing from the ISP.

70
New cards

When a LAN is connected to the internet using a wireless router, how do devices on the LAN communicate on the internet using NAT?

All devices must share the single public IPv4 address assigned to the wireless router in order to communicate to the internet via NAT.

71
New cards

What two default wireless router settings can affect network security? (Choose two.)

The SSID is broadcast.

A well-known administrator password is set.

72
New cards

Which security function is provided by a firewall?

allows or blocks traffic based on IP address, port number, or application

73
New cards

In what situation would a Layer 2 switch have an IP address configured?

when the Layer 2 switch needs to be remotely managed

74
New cards

When would the Cisco IOS image held in ROM be used to boot the router?

when the full IOS cannot be found

75
New cards

A technician has been asked to troubleshoot a simple network problem that seems to be caused by software. Which troubleshooting approach should be used?

top-down

76
New cards

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode

77
New cards

What action does a DNS server take if it does not have an entry for a requested URL?

The server checks with another DNS server to see if it has an entry.

78
New cards

A new employee is attempting to configure a cell phone to connect to the email server of the company. What is the source port number when sending an email from a mobile device?

The source port number is 25.

79
New cards

What is the purpose of the startup configuration file on a Cisco router?

to contain the commands that are used to initially configure a router on startup

80
New cards

Which statement describes the ping and tracert commands?

Tracert shows each hop, while ping shows a destination reply only.

81
New cards

Which three features represent benefits of virtualization? (Choose three.)

less power consumption

improved disaster recovery

less equipment

82
New cards

What is a difference between the functions of Cloud computing and virtualization?

Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

83
New cards

Why does HTTP use TCP as the transport layer protocol?

because HTTP requires reliable delivery

84
New cards

Which two types of devices provide dynamic IPv4 addressing for internal hosts on a local network? (Choose two.)

wireless router

PC-based DHCP server

85
New cards

When designing an IP address scheme, what is a benefit of using DHCP to assign host addresses?

Hosts are permanently assigned an address by the DHCP server so that they are easier to manage

86
New cards

A technician uses an application to capture packets on the network. One such capture reveals the password that is used by a person in the classroom to initiate a Telnet session with a school network device. What recommendation could the technician make to the person who is using Telnet?

If possible, enable the network device to use SSH instead of Telnet.

87
New cards

What is a benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

88
New cards

A technician is tasked with connecting a printer directly to the network and making it accessible to all staff in the general vicinity. What type of network cable is most likely used to connect the printer?

twisted-pair

89
New cards

What benefit does DHCP provide to a network?

Hosts can connect to the network and get an IP address without manual configuration.

90
New cards

A medium-sized company uses APs, WLCs, and laptops for employee workstations. An employee reports the inability to connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are two possible reasons for the problem? (Choose two.)

The workstation is out of range.

The wireless client is not configured for DHCP.

91
New cards

What is the first step that a switch performs during the bootup sequence?

POST is initiated.

92
New cards

Which scenario describes a peer-to-peer network?

A user has shared a printer attached to the workstation.

93
New cards

What is the difference between the terms bandwidth and throughput?

Bandwidth is the capacity of data transfer in a network and throughput is the actual data transfer rate.

94
New cards

A network engineer working at a community building that provides free WiFi is holding an IT conference tomorrow evening. A previous conference with over 100 attendees just ended less than 24 hours ago and the network engineer is concerned about the availability of dynamic addressing. How will the network engineer ensure that there are enough IP addresses for the attendees arriving at the IT conference tomorrow?

The network engineer will verify that the DHCP leasing time is set for a couple of hours.

95
New cards

How are port numbers used in the TCP/IP encapsulation process?

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

96
New cards

A student is sending files from a phone to a computer across a network. Which layer of the TCP/IP model is responsible for reassembling these messages as they are received on the computer?

transport

97
New cards

When a wireless router is being configured for the first time, what type of wired connection is used?

Ethernet patch cable

98
New cards

Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?

encryption

99
New cards

Which logical binary operation is used by a network device to determine the network portion of an IPv4 address with a specified subnet mask?

AND

100
New cards

Match the type of attack with the description. (Not all options are used.)

Answer in Image

<p><b>Answer in Image</b></p>