Networking Essentials Test Practice

5.0(1)
studied byStudied by 88 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

59 Terms

1
New cards

Which network technology allows devices to communicate using both ipv4 and ipv6 addressing at the same time?

Dual Stack

2
New cards

A device needs an IP address in order to communicate on the network. A DHCP server has been configured and enabled on the network. How will the device obtain an IP address from the DHCP Server?

DHCPDISCOVER MAC: FF-FF-FF-FF (Broadcast)

3
New cards

You are configuring a wireless device and want to prevent any neighbors from discovering your network. What action does the user need to take?

Disable SSID broadcast

4
New cards

What is the purpose of using SSH?

Remote connection to device

5
New cards

Subnet mask of 255.255.255.240. How many useable IP addresses are available?

14

6
New cards

When a router is powered on, where will the router search for a valid IOS image to load by default?

Flash Memory

7
New cards

What is the difference between a keyword and argument?

Key is a specific parameter

Argument is not a predefined

8
New cards

What radio frequency bands are used in home wireless LANs?

2.5Ghz and 5Ghz

9
New cards

A method of transporting an IPv6 packet over an IPv4 network?

Tunneling

10
New cards

Allows Ipv4 and Ipv6 to coexist on the same network segment?

Dual Stacking

11
New cards

Uses a method like NAT64

Translation

12
New cards

A network administrator issues the switch(config)# interface FastEthernet 0/1 command on a Cisco Switch. Which term is used to describe the ‘0/1’ part of the command?

Argument

13
New cards

What does the service password-encryption command do on Cisco routers and switches?

It encrypts all passwords that are stored in the router or switch running configuration files

14
New cards

What are two benefits of using a layered network model?

It prevents technology in one layer from affecting other layers.

It assists in protocol design

15
New cards

Which three IP addresses are private?

192.168.

10.

172.16.

16
New cards

Which type of wireless communication is based on 802.11 standards?

Wi-Fi

17
New cards

A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?

The broadcast Mac address

18
New cards

What does a switch uses to build the MAC address table?

Source MAC Address

19
New cards

Explain DORA?

DHCP Discover

Offer(Unicast)

Request

Acknowledge(Unicast)

20
New cards

How many bits are there in each hextet of an IPv6 address?

16

21
New cards

What type of attack is the ping of death?

Denial of Service

22
New cards

What is the purpose of a subnet mask?

To determine the subnet to which the host belongs

23
New cards

A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?

255.255.255.255

24
New cards

What port secures http requests to a web browser?

443

25
New cards

What is the purpose of a DMZ?

It allows external hosts to login into the external server

26
New cards

What two criteria are used to help select a network medium from a network?

Distancing the selected medium can successfully carry a signal

The environment where the selected medium is to be installed

27
New cards

What is required for a network administrator to perform out-of-band management tasks on a cisco device?

A computer directly connected to the console port of the device

28
New cards

Ipv6 addresses that are used for communicating on the same LAN or between a limited number of sites are known as?

Link-Local addresses

29
New cards

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts on other networks

30
New cards

What would a technician require in order to install a hypervisor on a client machine?

Virtualization software

31
New cards

A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?

The status of the switch interfaces and the address configured on interface vlan 1

32
New cards

A student is uploading files from a phone to a server on another network. Which layer of the TCP.IP model is responsible for providing an addressing scheme to transmit the data between the devices?

Internet

33
New cards

What happens when the transport input ssh command is entered on the switch vty lines?

The SSH client on the switch is enabled

34
New cards

What two fields. if found, are copied into RAM as a router with the default configuration register setting look up?

IOS image file

Starting Configuration

35
New cards

What is the effect of setting the security mode to WEP on a small wireless router?

It encrypts data between the wireless client and the access point

36
New cards

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures

Tunneling

37
New cards

A network administrator notices that some newly installed Ethernet cabin is carrying corrupt and distorted data signals. The new cabling was stalled in the ceiling close to fluorescent lights and electrical equipment. Which 2 factors may interfere with the copper cabling and result in signal distortion and data corruption(choose two)

EMI

RFI

38
New cards

What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

MAC Filtering

39
New cards

What two actions improve security on a wireless network?

Enabling MAC filtering

Enable WEP

40
New cards

Which interface is the fault SVI on a Cisco Switch

Vlan 1

41
New cards

What is the primary means for mitigating virus and Trojan horse attacks?

Antivirus software

42
New cards

What is the term used when a malicious part sends a fraudulent email disguised as being from a legitimate trusted source?

Phishing

43
New cards

An IPv6 address can have a prefix length that ranges from 0 to 128?

True

44
New cards

Which two statements are correct about IPv4 and IPv6 addresses

IPv4 addresses are 32 bits in length.
IPv6 addresses are represented by hexadecimal numbers.

45
New cards

While a network security products is being deployed a customizable list of allowable protocols is shown. Which 3 protocols should be allowed to provide for the use of email on a network?(Choose three.)

IMAP4

SMTP

POP3

46
New cards

A network administrator is designing the layout of a new wireless network. Which 3 areas of concern should be accounted for when building a wireless network?(Choose three.)

Security

Coverage area

Interference

47
New cards

What are two common physical layer connectivity issues

Ethernet cable plugged wrong

The cable is faulty

48
New cards

At which layer of the OSI model would logical addresses be added

Network (layer 3)

49
New cards

A customer places smartphone near a terminal to pay, What is being used?

NFC

50
New cards

If the default gateway was not configured correctly what are the consequences?

The device can connect internally with local devices but not with remote devices

51
New cards

Which protocol port allows external users to access an internal FTP server

Port 40

52
New cards

When troubleshooting a network where would you find the configuration information such as the computer name and ip address that are being used?

Logical Topology

53
New cards

What are the 3 types of IPv6 communications?

Unicast

Multicast

Anycast

54
New cards

Which type of device must the user have to provide wireless access to multiple devices?

Wireless router

55
New cards

What type of cable connections is used in package Tracker PC to Switch

Straight-through

56
New cards

What is the delay in the amount of time it takes for data to transfer?

Latency

57
New cards

Which two ports can be used to configure cisco router?

Console

AUX

58
New cards

A network admin needs to keep username and password in session private when establishing a remote client connectivity?

SSH

59
New cards

What are two features of the TCP and UDP?

TCP reliability sends packets in sections and confirms delivery

UDP best effort and unreliable send packets