Networking Essentials Test Practice

studied byStudied by 88 people
5.0(1)
Get a hint
Hint

Which network technology allows devices to communicate using both ipv4 and ipv6 addressing at the same time?

1 / 58

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

59 Terms

1

Which network technology allows devices to communicate using both ipv4 and ipv6 addressing at the same time?

Dual Stack

New cards
2

A device needs an IP address in order to communicate on the network. A DHCP server has been configured and enabled on the network. How will the device obtain an IP address from the DHCP Server?

DHCPDISCOVER MAC: FF-FF-FF-FF (Broadcast)

New cards
3

You are configuring a wireless device and want to prevent any neighbors from discovering your network. What action does the user need to take?

Disable SSID broadcast

New cards
4

What is the purpose of using SSH?

Remote connection to device

New cards
5

Subnet mask of 255.255.255.240. How many useable IP addresses are available?

14

New cards
6

When a router is powered on, where will the router search for a valid IOS image to load by default?

Flash Memory

New cards
7

What is the difference between a keyword and argument?

Key is a specific parameter

Argument is not a predefined

New cards
8

What radio frequency bands are used in home wireless LANs?

2.5Ghz and 5Ghz

New cards
9

A method of transporting an IPv6 packet over an IPv4 network?

Tunneling

New cards
10

Allows Ipv4 and Ipv6 to coexist on the same network segment?

Dual Stacking

New cards
11

Uses a method like NAT64

Translation

New cards
12

A network administrator issues the switch(config)# interface FastEthernet 0/1 command on a Cisco Switch. Which term is used to describe the ‘0/1’ part of the command?

Argument

New cards
13

What does the service password-encryption command do on Cisco routers and switches?

It encrypts all passwords that are stored in the router or switch running configuration files

New cards
14

What are two benefits of using a layered network model?

It prevents technology in one layer from affecting other layers.

It assists in protocol design

New cards
15

Which three IP addresses are private?

192.168.

10.

172.16.

New cards
16

Which type of wireless communication is based on 802.11 standards?

Wi-Fi

New cards
17

A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?

The broadcast Mac address

New cards
18

What does a switch uses to build the MAC address table?

Source MAC Address

New cards
19

Explain DORA?

DHCP Discover

Offer(Unicast)

Request

Acknowledge(Unicast)

New cards
20

How many bits are there in each hextet of an IPv6 address?

16

New cards
21

What type of attack is the ping of death?

Denial of Service

New cards
22

What is the purpose of a subnet mask?

To determine the subnet to which the host belongs

New cards
23

A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?

255.255.255.255

New cards
24

What port secures http requests to a web browser?

443

New cards
25

What is the purpose of a DMZ?

It allows external hosts to login into the external server

New cards
26

What two criteria are used to help select a network medium from a network?

Distancing the selected medium can successfully carry a signal

The environment where the selected medium is to be installed

New cards
27

What is required for a network administrator to perform out-of-band management tasks on a cisco device?

A computer directly connected to the console port of the device

New cards
28

Ipv6 addresses that are used for communicating on the same LAN or between a limited number of sites are known as?

Link-Local addresses

New cards
29

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts on other networks

New cards
30

What would a technician require in order to install a hypervisor on a client machine?

Virtualization software

New cards
31

A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?

The status of the switch interfaces and the address configured on interface vlan 1

New cards
32

A student is uploading files from a phone to a server on another network. Which layer of the TCP.IP model is responsible for providing an addressing scheme to transmit the data between the devices?

Internet

New cards
33

What happens when the transport input ssh command is entered on the switch vty lines?

The SSH client on the switch is enabled

New cards
34

What two fields. if found, are copied into RAM as a router with the default configuration register setting look up?

IOS image file

Starting Configuration

New cards
35

What is the effect of setting the security mode to WEP on a small wireless router?

It encrypts data between the wireless client and the access point

New cards
36

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures

Tunneling

New cards
37

A network administrator notices that some newly installed Ethernet cabin is carrying corrupt and distorted data signals. The new cabling was stalled in the ceiling close to fluorescent lights and electrical equipment. Which 2 factors may interfere with the copper cabling and result in signal distortion and data corruption(choose two)

EMI

RFI

New cards
38

What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

MAC Filtering

New cards
39

What two actions improve security on a wireless network?

Enabling MAC filtering

Enable WEP

New cards
40

Which interface is the fault SVI on a Cisco Switch

Vlan 1

New cards
41

What is the primary means for mitigating virus and Trojan horse attacks?

Antivirus software

New cards
42

What is the term used when a malicious part sends a fraudulent email disguised as being from a legitimate trusted source?

Phishing

New cards
43

An IPv6 address can have a prefix length that ranges from 0 to 128?

True

New cards
44

Which two statements are correct about IPv4 and IPv6 addresses

IPv4 addresses are 32 bits in length.
IPv6 addresses are represented by hexadecimal numbers.

New cards
45

While a network security products is being deployed a customizable list of allowable protocols is shown. Which 3 protocols should be allowed to provide for the use of email on a network?(Choose three.)

IMAP4

SMTP

POP3

New cards
46

A network administrator is designing the layout of a new wireless network. Which 3 areas of concern should be accounted for when building a wireless network?(Choose three.)

Security

Coverage area

Interference

New cards
47

What are two common physical layer connectivity issues

Ethernet cable plugged wrong

The cable is faulty

New cards
48

At which layer of the OSI model would logical addresses be added

Network (layer 3)

New cards
49

A customer places smartphone near a terminal to pay, What is being used?

NFC

New cards
50

If the default gateway was not configured correctly what are the consequences?

The device can connect internally with local devices but not with remote devices

New cards
51

Which protocol port allows external users to access an internal FTP server

Port 40

New cards
52

When troubleshooting a network where would you find the configuration information such as the computer name and ip address that are being used?

Logical Topology

New cards
53

What are the 3 types of IPv6 communications?

Unicast

Multicast

Anycast

New cards
54

Which type of device must the user have to provide wireless access to multiple devices?

Wireless router

New cards
55

What type of cable connections is used in package Tracker PC to Switch

Straight-through

New cards
56

What is the delay in the amount of time it takes for data to transfer?

Latency

New cards
57

Which two ports can be used to configure cisco router?

Console

AUX

New cards
58

A network admin needs to keep username and password in session private when establishing a remote client connectivity?

SSH

New cards
59

What are two features of the TCP and UDP?

TCP reliability sends packets in sections and confirms delivery

UDP best effort and unreliable send packets

New cards

Explore top notes

note Note
studied byStudied by 32 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 56 people
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
4.0(1)
note Note
studied byStudied by 120 people
... ago
5.0(3)
note Note
studied byStudied by 19 people
... ago
5.0(1)
note Note
studied byStudied by 7 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (26)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 128 people
... ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 56 people
... ago
5.0(1)
flashcards Flashcard (65)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (90)
studied byStudied by 36 people
... ago
5.0(1)
flashcards Flashcard (71)
studied byStudied by 29 people
... ago
5.0(2)
robot