Networking Essentials Test Prep 1

studied byStudied by 8 people
0.0(0)
Get a hint
Hint

It allows external host to access specific company server

1 / 88

89 Terms

1

It allows external host to access specific company server

DMZ

New cards
2

Which two criteria are used to help select a network medium for a network?

The distance the selected medium can successfully carry a signal

The environment where the selected medium is to be installed

New cards
3

Convert the following ipv address into the most compressed form

0000:0000.0000.000D:3440:00BD:CADE:55C0

::D:3440:BD:CADE:55C0|

New cards
4

What is required for a network administrator to perform out of band management tasks on a Cisco device?

A computer directly connected to console port

New cards
5

IPv6 addresses that are used for communicating on the same LAN or between a limited number of sires are known as?

Link Local

New cards
6

What would happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with other host in other networks

New cards
7

255.255.255.192 How many usable IP addresses are available?

62

New cards
8

What would a technician require in order to install a hypervisor on a client machine?

Virtualization Software

New cards
9

A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?

The status of the switch interface and the address configured on interface vlan 1

New cards
10

A student is uploading a file from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the device?

Internet

New cards
11

What happens when the transport input ssh command is entered on the switch vty lines?

The SSH client on the switch is enabled

New cards
12

Which two files if found are copied into RAM as a router with the default configuration register setting boots up

iOS Image File

Starting configuration

New cards
13

What is the effect of setting the security mode to WEP on a small wireless router?

It encrypts data between the wireless client and the access point

New cards
14

Convert the following hexadecimal into decimal: XBAD

2989

New cards
15

Which network migration technique encapsulates ipv6 packets inside ipv4 packets to carry them over ipv4 network infrastructure?

Tunneling

New cards
16

Custom subnet mask 255.255.255.224. How many usable IP addresses are available?

30

New cards
17

A network administrator notices that newly installed ethernet cables are carrying distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factor may interfere with the copper cabling and result in signal distortion and data corruption?

EMI

RFI

New cards
18

Convert 941 to Hexa

OX3AD

New cards
19

What is a feature that can be used by an admin to prevent unauthorized users from connecting to a wireless access point?

Mac filtering

New cards
20

What is the subnet mask of /17

255.255.128.0

New cards
21

Which two actions improves security on a wireless network?

Enable WEP

Enable MAC filtering

New cards
22

Which interface is the default SVI on a Cisco switch?

VLAN 1

New cards
23

What is the primary means for mitigating virus and trojan horse attacks?

Antivirus Software

New cards
24

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

Phishing

New cards
25

Convert the following to decimal: 1010101

85

New cards
26

An IPv6 address can have a prefix length that ranges from 0 to 128

False

New cards
27

Which two statements are correct about an IPV4 abd IPV6 addresses?

IPv6 are represented by a hexadecimal number

IPv4 32 bits

New cards
28

Three email protocol?

POP3

SMTP

IMAP4

New cards
29

A network admin is designing a layout of a new wireless network. Which three should be accounted for when building a wireless network?

Interface

Coverage area

Security

New cards
30

What are two common physical layer connectivity issues?

Ethernet cable plugged wrong

The cable is faulty

New cards
31

At which layer of the OSI model would logical addresses be added (IP addresses)

Layer 3 (Network Layer)

New cards
32

192.168.15.220 /30 What is my broadcast?

192.168.15.223

New cards
33

A customer places a smartphone near a terminal to pay, what was used?

NFC

New cards
34

If the default gateway was not configured correctly what are the consequences?

You can connect internally with local devices but not with remote devices

New cards
35

Which protocol port allows external users to access an internal FTP server?

Port 21

New cards
36

192.168.15.145 255.255.255.240 What is the Net ID?

Net ID: 192.168.15.144|

New cards
37

When troubleshooting network prob where would you find the configuration info such as the computer name and ip address that are being used?

Logical Topology

New cards
38

What are the 3 types of IPV6 communications?

Unicast

Multicast

Anycast

New cards
39

Which type of device must the user have to provide wireless access to multiple devices?

Wireless router

New cards
40

What type of cable connection is used in package Tracer PC to Switch

Straight through

New cards
41

What is the delay in the amount of time it takes for data to transfer?

Latency

New cards
42

Which two ports can I use to configure my cisco router?

Console

AUX

New cards
43

Analog Voice

VOIP

New cards
44

OXA2F to decimal

2607

New cards
45

Which type of wireless communication is based on 802.11

WiFi

New cards
46

A network admin needs to keep username and password in session private when establishing a remote CLI connectivity?

SSH

New cards
47

What are two features of the TCP and UDP

TCP reliability sends packets in sections and confirms delivery

UDP best effort and unreliable send packets

New cards
48

Define Throughput?

The measure of the bits transferred across the media over a given period of time

New cards
49

What type of access is secured on a Cisco router or switch with the enable secret command?

Privileged EXEC mode

New cards
50

The ARP table in a switch maps which two types of addresses together?

Layer 3 address to a Layer 2 address (IP and MAC addresses)

New cards
51

What is your custom subnet mask of /20

255.255.240.0

New cards
52

A student is attempting to access an 802.11n wireless network. What method is used to manage contention-based access on this wireless network?

CSMA/CA

New cards
53

What command encrypts all plain-text passwords in the device?

service password-encryption

New cards
54

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully

New cards
55

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model?

Session

Presentation

Application

New cards
56

Which two layers of the OSI model specify protocols that are associated with ethernet standards?

Physical

Data Link

New cards
57

Physical topologies contain IP addresses: True or False

False

New cards
58

What Protocol does Port 53 belong to?

DNS

New cards
59

You just finished completing your network build of 50 host computers, 4 switches, and 2 routers. You wanted to make sure your boss's computer had connectivity. How could you test this without leaving your desk?

Ping command

New cards
60

What is an inherent security vulnerability of SSID broadcasting?

Allows unauthenticated access to a wireless network, broadcasts identity of the network

New cards
61

What is the purpose of a DMZ?

Allows external hosts to access specific company servers

New cards
62

Which two criteria are used to help select a network medium for a network?

Distance and environment

New cards
63

What is required for a network administrator to perform out-of-band management tasks on a Cisco device?

A computer directly connected to the console port of the device IPv6 addresses that are used for communicating on the same LAN Link-local

New cards
64

What will happen if the default gateway address is incorrectly configured on a host?

Host cannot communicate with hosts in other networks

New cards
65

Subnet mask of 255.255.255.192, how many usable IP addresses are available?

62 (64-2)

New cards
66

What would a technician require in order to install a hypervisor on a client machine?

Virtualization software

New cards
67

What does the show ip interface brief command on a switch verify?

Status of the switch interfaces and the address configured on interface vlan 1

New cards
68

A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the device?

Internet

New cards
69

Which interface is the default SVI on a Cisco switch?

VLAN 1

New cards
70

What happens when the transport input ssh command is entered on the switch vty lines?

The SSH client on the switch is enabled

New cards
71

Which two files, if found, are copied into RAM as a router with the default config register settings boots up?

OS, running config(?)

New cards
72

What is the effect of setting the security mode to WEP on a small wireless router?

Encrypts data between the wireless client and the access point

New cards
73

Convert the following hexadecimal into decimal: 0XBAD

2,989

New cards
74

Are created by fluorescent lights and electrical equipment

EMI and RFI

New cards
75

Convert the following decimal into hexadecimal: 941

0X3AD

New cards
76

What is the primary means for mitigating virus and trojan horse attacks?

Antivirus software

New cards
77

Term used when a malicious party sends a fraud email disguised as being from a legitimate, trusted source?

Phishing

New cards
78

Convert the following into decimal notation 1010101

85

New cards
79

An IPv6 can have a prefix length that ranges from 0 to 128

True (IPv6 has 128 bits, IPv4 has 32 bits)

New cards
80

Which three areas of concern should be accounted for when building a wireless network?

Coverage, interference, security

New cards
81

Two common physical layer issues:

Cable faulty, not plugged in

New cards
82

At which layer of the OSI model would logical addresses be added?

Layer 3 (Network)

New cards
83

Smartphone to pay terminal:

NFC

New cards
84

Which protocol allows external users to access only an internal FTP server on a private network

Port Forwarding

New cards
85

Where would an admin find the computer's name and ip addresses used?

Logical Topology

New cards
86

A user is setting up a home wireless network.

Wireless router

New cards
87

What type of cable connection is between switch and fast ethernet on pc?

Straight-through

New cards
88

Need to keep remote connection private on a switch

SSH

New cards
89

Convert this into decimal: 0XA2F

2607

New cards

Explore top notes

note Note
studied byStudied by 338 people
... ago
5.0(1)
note Note
studied byStudied by 33 people
... ago
4.7(3)
note Note
studied byStudied by 32 people
... ago
5.0(1)
note Note
studied byStudied by 24 people
... ago
5.0(3)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 203 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (43)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (203)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (62)
studied byStudied by 15 people
... ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 81 people
... ago
5.0(1)
flashcards Flashcard (43)
studied byStudied by 105 people
... ago
4.0(1)
robot