It allows external host to access specific company server
DMZ
Which two criteria are used to help select a network medium for a network?
The distance the selected medium can successfully carry a signal
The environment where the selected medium is to be installed
Convert the following ipv address into the most compressed form
0000:0000.0000.000D:3440:00BD:CADE:55C0
::D:3440:BD:CADE:55C0|
What is required for a network administrator to perform out of band management tasks on a Cisco device?
A computer directly connected to console port
IPv6 addresses that are used for communicating on the same LAN or between a limited number of sires are known as?
Link Local
What would happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with other host in other networks
255.255.255.192 How many usable IP addresses are available?
62
What would a technician require in order to install a hypervisor on a client machine?
Virtualization Software
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?
The status of the switch interface and the address configured on interface vlan 1
A student is uploading a file from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the device?
Internet
What happens when the transport input ssh command is entered on the switch vty lines?
The SSH client on the switch is enabled
Which two files if found are copied into RAM as a router with the default configuration register setting boots up
iOS Image File
Starting configuration
What is the effect of setting the security mode to WEP on a small wireless router?
It encrypts data between the wireless client and the access point
Convert the following hexadecimal into decimal: XBAD
2989
Which network migration technique encapsulates ipv6 packets inside ipv4 packets to carry them over ipv4 network infrastructure?
Tunneling
Custom subnet mask 255.255.255.224. How many usable IP addresses are available?
30
A network administrator notices that newly installed ethernet cables are carrying distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factor may interfere with the copper cabling and result in signal distortion and data corruption?
EMI
RFI
Convert 941 to Hexa
OX3AD
What is a feature that can be used by an admin to prevent unauthorized users from connecting to a wireless access point?
Mac filtering
What is the subnet mask of /17
255.255.128.0
Which two actions improves security on a wireless network?
Enable WEP
Enable MAC filtering
Which interface is the default SVI on a Cisco switch?
VLAN 1
What is the primary means for mitigating virus and trojan horse attacks?
Antivirus Software
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
Phishing
Convert the following to decimal: 1010101
85
An IPv6 address can have a prefix length that ranges from 0 to 128
False
Which two statements are correct about an IPV4 abd IPV6 addresses?
IPv6 are represented by a hexadecimal number
IPv4 32 bits
Three email protocol?
POP3
SMTP
IMAP4
A network admin is designing a layout of a new wireless network. Which three should be accounted for when building a wireless network?
Interface
Coverage area
Security
What are two common physical layer connectivity issues?
Ethernet cable plugged wrong
The cable is faulty
At which layer of the OSI model would logical addresses be added (IP addresses)
Layer 3 (Network Layer)
192.168.15.220 /30 What is my broadcast?
192.168.15.223
A customer places a smartphone near a terminal to pay, what was used?
NFC
If the default gateway was not configured correctly what are the consequences?
You can connect internally with local devices but not with remote devices
Which protocol port allows external users to access an internal FTP server?
Port 21
192.168.15.145 255.255.255.240 What is the Net ID?
Net ID: 192.168.15.144|
When troubleshooting network prob where would you find the configuration info such as the computer name and ip address that are being used?
Logical Topology
What are the 3 types of IPV6 communications?
Unicast
Multicast
Anycast
Which type of device must the user have to provide wireless access to multiple devices?
Wireless router
What type of cable connection is used in package Tracer PC to Switch
Straight through
What is the delay in the amount of time it takes for data to transfer?
Latency
Which two ports can I use to configure my cisco router?
Console
AUX
Analog Voice
VOIP
OXA2F to decimal
2607
Which type of wireless communication is based on 802.11
WiFi
A network admin needs to keep username and password in session private when establishing a remote CLI connectivity?
SSH
What are two features of the TCP and UDP
TCP reliability sends packets in sections and confirms delivery
UDP best effort and unreliable send packets
Define Throughput?
The measure of the bits transferred across the media over a given period of time
What type of access is secured on a Cisco router or switch with the enable secret command?
Privileged EXEC mode
The ARP table in a switch maps which two types of addresses together?
Layer 3 address to a Layer 2 address (IP and MAC addresses)
What is your custom subnet mask of /20
255.255.240.0
A student is attempting to access an 802.11n wireless network. What method is used to manage contention-based access on this wireless network?
CSMA/CA
What command encrypts all plain-text passwords in the device?
service password-encryption
What is an advantage of using standards to develop and implement protocols?
Products from different manufacturers can interoperate successfully
Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model?
Session
Presentation
Application
Which two layers of the OSI model specify protocols that are associated with ethernet standards?
Physical
Data Link
Physical topologies contain IP addresses: True or False
False
What Protocol does Port 53 belong to?
DNS
You just finished completing your network build of 50 host computers, 4 switches, and 2 routers. You wanted to make sure your boss's computer had connectivity. How could you test this without leaving your desk?
Ping command
What is an inherent security vulnerability of SSID broadcasting?
Allows unauthenticated access to a wireless network, broadcasts identity of the network
What is the purpose of a DMZ?
Allows external hosts to access specific company servers
Which two criteria are used to help select a network medium for a network?
Distance and environment
What is required for a network administrator to perform out-of-band management tasks on a Cisco device?
A computer directly connected to the console port of the device IPv6 addresses that are used for communicating on the same LAN Link-local
What will happen if the default gateway address is incorrectly configured on a host?
Host cannot communicate with hosts in other networks
Subnet mask of 255.255.255.192, how many usable IP addresses are available?
62 (64-2)
What would a technician require in order to install a hypervisor on a client machine?
Virtualization software
What does the show ip interface brief command on a switch verify?
Status of the switch interfaces and the address configured on interface vlan 1
A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the device?
Internet
Which interface is the default SVI on a Cisco switch?
VLAN 1
What happens when the transport input ssh command is entered on the switch vty lines?
The SSH client on the switch is enabled
Which two files, if found, are copied into RAM as a router with the default config register settings boots up?
OS, running config(?)
What is the effect of setting the security mode to WEP on a small wireless router?
Encrypts data between the wireless client and the access point
Convert the following hexadecimal into decimal: 0XBAD
2,989
Are created by fluorescent lights and electrical equipment
EMI and RFI
Convert the following decimal into hexadecimal: 941
0X3AD
What is the primary means for mitigating virus and trojan horse attacks?
Antivirus software
Term used when a malicious party sends a fraud email disguised as being from a legitimate, trusted source?
Phishing
Convert the following into decimal notation 1010101
85
An IPv6 can have a prefix length that ranges from 0 to 128
True (IPv6 has 128 bits, IPv4 has 32 bits)
Which three areas of concern should be accounted for when building a wireless network?
Coverage, interference, security
Two common physical layer issues:
Cable faulty, not plugged in
At which layer of the OSI model would logical addresses be added?
Layer 3 (Network)
Smartphone to pay terminal:
NFC
Which protocol allows external users to access only an internal FTP server on a private network
Port Forwarding
Where would an admin find the computer's name and ip addresses used?
Logical Topology
A user is setting up a home wireless network.
Wireless router
What type of cable connection is between switch and fast ethernet on pc?
Straight-through
Need to keep remote connection private on a switch
SSH
Convert this into decimal: 0XA2F
2607