Networking Essentials Test Prep 1

0.0(0)
studied byStudied by 8 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/88

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

89 Terms

1
New cards

It allows external host to access specific company server

DMZ

2
New cards

Which two criteria are used to help select a network medium for a network?

The distance the selected medium can successfully carry a signal

The environment where the selected medium is to be installed

3
New cards

Convert the following ipv address into the most compressed form

0000:0000.0000.000D:3440:00BD:CADE:55C0

::D:3440:BD:CADE:55C0|

4
New cards

What is required for a network administrator to perform out of band management tasks on a Cisco device?

A computer directly connected to console port

5
New cards

IPv6 addresses that are used for communicating on the same LAN or between a limited number of sires are known as?

Link Local

6
New cards

What would happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with other host in other networks

7
New cards

255.255.255.192 How many usable IP addresses are available?

62

8
New cards

What would a technician require in order to install a hypervisor on a client machine?

Virtualization Software

9
New cards

A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?

The status of the switch interface and the address configured on interface vlan 1

10
New cards

A student is uploading a file from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the device?

Internet

11
New cards

What happens when the transport input ssh command is entered on the switch vty lines?

The SSH client on the switch is enabled

12
New cards

Which two files if found are copied into RAM as a router with the default configuration register setting boots up

iOS Image File

Starting configuration

13
New cards

What is the effect of setting the security mode to WEP on a small wireless router?

It encrypts data between the wireless client and the access point

14
New cards

Convert the following hexadecimal into decimal: XBAD

2989

15
New cards

Which network migration technique encapsulates ipv6 packets inside ipv4 packets to carry them over ipv4 network infrastructure?

Tunneling

16
New cards

Custom subnet mask 255.255.255.224. How many usable IP addresses are available?

30

17
New cards

A network administrator notices that newly installed ethernet cables are carrying distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factor may interfere with the copper cabling and result in signal distortion and data corruption?

EMI

RFI

18
New cards

Convert 941 to Hexa

OX3AD

19
New cards

What is a feature that can be used by an admin to prevent unauthorized users from connecting to a wireless access point?

Mac filtering

20
New cards

What is the subnet mask of /17

255.255.128.0

21
New cards

Which two actions improves security on a wireless network?

Enable WEP

Enable MAC filtering

22
New cards

Which interface is the default SVI on a Cisco switch?

VLAN 1

23
New cards

What is the primary means for mitigating virus and trojan horse attacks?

Antivirus Software

24
New cards

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

Phishing

25
New cards

Convert the following to decimal: 1010101

85

26
New cards

An IPv6 address can have a prefix length that ranges from 0 to 128

False

27
New cards

Which two statements are correct about an IPV4 abd IPV6 addresses?

IPv6 are represented by a hexadecimal number

IPv4 32 bits

28
New cards

Three email protocol?

POP3

SMTP

IMAP4

29
New cards

A network admin is designing a layout of a new wireless network. Which three should be accounted for when building a wireless network?

Interface

Coverage area

Security

30
New cards

What are two common physical layer connectivity issues?

Ethernet cable plugged wrong

The cable is faulty

31
New cards

At which layer of the OSI model would logical addresses be added (IP addresses)

Layer 3 (Network Layer)

32
New cards

192.168.15.220 /30 What is my broadcast?

192.168.15.223

33
New cards

A customer places a smartphone near a terminal to pay, what was used?

NFC

34
New cards

If the default gateway was not configured correctly what are the consequences?

You can connect internally with local devices but not with remote devices

35
New cards

Which protocol port allows external users to access an internal FTP server?

Port 21

36
New cards

192.168.15.145 255.255.255.240 What is the Net ID?

Net ID: 192.168.15.144|

37
New cards

When troubleshooting network prob where would you find the configuration info such as the computer name and ip address that are being used?

Logical Topology

38
New cards

What are the 3 types of IPV6 communications?

Unicast

Multicast

Anycast

39
New cards

Which type of device must the user have to provide wireless access to multiple devices?

Wireless router

40
New cards

What type of cable connection is used in package Tracer PC to Switch

Straight through

41
New cards

What is the delay in the amount of time it takes for data to transfer?

Latency

42
New cards

Which two ports can I use to configure my cisco router?

Console

AUX

43
New cards

Analog Voice

VOIP

44
New cards

OXA2F to decimal

2607

45
New cards

Which type of wireless communication is based on 802.11

WiFi

46
New cards

A network admin needs to keep username and password in session private when establishing a remote CLI connectivity?

SSH

47
New cards

What are two features of the TCP and UDP

TCP reliability sends packets in sections and confirms delivery

UDP best effort and unreliable send packets

48
New cards

Define Throughput?

The measure of the bits transferred across the media over a given period of time

49
New cards

What type of access is secured on a Cisco router or switch with the enable secret command?

Privileged EXEC mode

50
New cards

The ARP table in a switch maps which two types of addresses together?

Layer 3 address to a Layer 2 address (IP and MAC addresses)

51
New cards

What is your custom subnet mask of /20

255.255.240.0

52
New cards

A student is attempting to access an 802.11n wireless network. What method is used to manage contention-based access on this wireless network?

CSMA/CA

53
New cards

What command encrypts all plain-text passwords in the device?

service password-encryption

54
New cards

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully

55
New cards

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model?

Session

Presentation

Application

56
New cards

Which two layers of the OSI model specify protocols that are associated with ethernet standards?

Physical

Data Link

57
New cards

Physical topologies contain IP addresses: True or False

False

58
New cards

What Protocol does Port 53 belong to?

DNS

59
New cards

You just finished completing your network build of 50 host computers, 4 switches, and 2 routers. You wanted to make sure your boss's computer had connectivity. How could you test this without leaving your desk?

Ping command

60
New cards

What is an inherent security vulnerability of SSID broadcasting?

Allows unauthenticated access to a wireless network, broadcasts identity of the network

61
New cards

What is the purpose of a DMZ?

Allows external hosts to access specific company servers

62
New cards

Which two criteria are used to help select a network medium for a network?

Distance and environment

63
New cards

What is required for a network administrator to perform out-of-band management tasks on a Cisco device?

A computer directly connected to the console port of the device IPv6 addresses that are used for communicating on the same LAN Link-local

64
New cards

What will happen if the default gateway address is incorrectly configured on a host?

Host cannot communicate with hosts in other networks

65
New cards

Subnet mask of 255.255.255.192, how many usable IP addresses are available?

62 (64-2)

66
New cards

What would a technician require in order to install a hypervisor on a client machine?

Virtualization software

67
New cards

What does the show ip interface brief command on a switch verify?

Status of the switch interfaces and the address configured on interface vlan 1

68
New cards

A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the device?

Internet

69
New cards

Which interface is the default SVI on a Cisco switch?

VLAN 1

70
New cards

What happens when the transport input ssh command is entered on the switch vty lines?

The SSH client on the switch is enabled

71
New cards

Which two files, if found, are copied into RAM as a router with the default config register settings boots up?

OS, running config(?)

72
New cards

What is the effect of setting the security mode to WEP on a small wireless router?

Encrypts data between the wireless client and the access point

73
New cards

Convert the following hexadecimal into decimal: 0XBAD

2,989

74
New cards

Are created by fluorescent lights and electrical equipment

EMI and RFI

75
New cards

Convert the following decimal into hexadecimal: 941

0X3AD

76
New cards

What is the primary means for mitigating virus and trojan horse attacks?

Antivirus software

77
New cards

Term used when a malicious party sends a fraud email disguised as being from a legitimate, trusted source?

Phishing

78
New cards

Convert the following into decimal notation 1010101

85

79
New cards

An IPv6 can have a prefix length that ranges from 0 to 128

True (IPv6 has 128 bits, IPv4 has 32 bits)

80
New cards

Which three areas of concern should be accounted for when building a wireless network?

Coverage, interference, security

81
New cards

Two common physical layer issues:

Cable faulty, not plugged in

82
New cards

At which layer of the OSI model would logical addresses be added?

Layer 3 (Network)

83
New cards

Smartphone to pay terminal:

NFC

84
New cards

Which protocol allows external users to access only an internal FTP server on a private network

Port Forwarding

85
New cards

Where would an admin find the computer's name and ip addresses used?

Logical Topology

86
New cards

A user is setting up a home wireless network.

Wireless router

87
New cards

What type of cable connection is between switch and fast ethernet on pc?

Straight-through

88
New cards

Need to keep remote connection private on a switch

SSH

89
New cards

Convert this into decimal: 0XA2F

2607