Looks like no one added any tags here yet for you.
Which destination IPv4 address does a DHCPv4 client use to send the initial DHCP Discover packet when the client is looking for a DHCP server?
A. the IP address of the default gateway
B. 244.0.0.1
C. 255.255.255.255
D. 127.0.0.1
C. 255.255.255.255
Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited lease period?
A. dynamic allocation
B. automatic allocation
C. manual allocation
D. pre-allocation
A. dynamic allocation
Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?
A. broadcast DHCPACK
B. unicast DHCPREQUEST
C. broadcast DHCPREQUEST
D. unicast DHCPACK
C. broadcast DHCPREQUEST
Refer to the exhibit. A user is configuring a PC with the IP settings as displayed, but the operating system will not accept them. What is the problem?
A. The subnet mask is wrong.
B. The DNS settings are not configured.
C. The IP address is not a usable host address.
D. The gateway address is not configured.
C. The IP address is not a usable host address.
Which two types of devices are typically assigned static IP addresses? (Choose two.)
A. laptops
B. hubs
C. printers
D. workstations
E. web servers
C. printers
E. web servers
A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)
A. DHCPACK
B. DHCPOFFER
C. DHCPNAK
D. DHCPDISCOVER
E. DHCPREQUEST
D. DHCPDISCOVER
E. DHCPREQUEST
Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)
A. It reduces the burden on network support staff.
B. It guarantees that every device that needs an address will get one.
C. It provides an address only to devices that are authorized to be connected to the network.
D. It ensures that addresses are only applied to devices that require a permanent address.
E. It eliminates most address configuration errors.
A. It reduces the burden on network support staff.
E. It eliminates most address configuration errors.
If more than one DHCP server is available on the local network, in which order will DHCP messages be sent between a host and a DHCP server?
A. request, acknowledgement, discover, offer
B. acknowledgement, request, offer, discover
C. request, discover, offer, acknowledgement
D. discover, offer, request, acknowledgement
D. discover, offer, request, acknowledgement
A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?
A. 252
B. 254
C. 251
D. 253
C. 251
Which statement is true about DHCP operation?
A. The DHCPDISCOVER message contains the IP address and subnet mask to be assigned, the IP address of the DNS server, and the IP address of the default gateway.
B. If the client receives several DHCPOFFER messages from different servers, it sends a unicast DHCPREQUEST message to the server from which it chooses to obtain the IP information.
C. When a device is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.
D. A client must wait for lease expiration before it sends another DHCPREQUEST message.
C. When a device is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.
Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)
A. IPv4 addresses are 32 bits in length.
B. IPv6 addresses are 64 bits in length.
C. IPv4 addresses are 128 bits in length.
D. IPv6 addresses are 32 bits in length.
E. IPv4 addresses are represented by hexadecimal numbers.
F. IPv6 addresses are represented by hexadecimal numbers.
A. IPv4 addresses are 32 bits in length.
F. IPv6 addresses are represented by hexadecimal numbers.
Which network technology allows devices to communicate using both IPv4 and IPv6 addressing at the same time?
A. NAT64
B. SLAAC
C. dual stack
D. tunneling
C. dual stack
What is an advantage of using IPv6 ?
A. faster connectivity
B. higher bandwidth
C. more frequencies
D. more addresses for networks and hosts
D. more addresses for networks and hosts
Which characteristic describes the default gateway of a host computer?
A. the logical address assigned to the switch interface connected to the router
B. the physical address of the router interface on the same network as the host computer
C. the physical address of the switch interface connected to the host computer
D. the logical address of the router interface on the same network as the host computer
D. the logical address of the router interface on the same network as the host computer
Which number grouping is a valid IPv6 address?
A. 12aa::1298:1200::129b
B. 1b10::1100::2001::2900::ab11::1102::0000::2900
C. 1234:1230::1238::1299:1000::
D. 2001:0db8:3c55:0015:1010:0000:abcd:ff13
D. 2001:0db8:3c55:0015:1010:0000:abcd:ff13
Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?
A. EUI-64
B. SLAAC
C. static
D. stateful DHCPv6
B. SLAAC
Which IPv6 address notation is valid?
A. 2001:DB8:0:1111::200
B. 2001::ABCD::
C. ABCD:160D::4GAB:FFAB
D. 2001:0DB8::ABCD::1234
A. 2001:DB8:0:1111::200
Typically, which network device would be used to perform NAT for a corporate environment?
A. server
B. DHCP server
C. router
D. host device
E. switch
C. router
What type of IPv6 address is FE80::1?
A. link-local
B. loopback
C. global unicast
D. multicast
A. link-local
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?
A. tunneling
B. translation
C. encapsulation
D. dual-stack
A. tunneling
Why is UDP well suited as the transport layer protocol for video applications?
A. UDP prvides a reliable session.
B. UDP provides acknowledgement of received data.
C. UDP provides flow control using windows.
D. UDP has low overhead.
D. UDP has low overhead.
Which transport layer information is added to both the TCP and UDP headers?
A. acknowledgement flag
B. IP addresses
C. port numbers
D. window size
C. port numbers
What type of applications are best suited for using UDP?
A. applications that require retransmission of lost segments
B. applications that are sensitive to packet loss
C. applications that need reliable delivery
D. applications that are sensitive to delay
D. applications that are sensitive to delay
What protocol header information is used at the transport layer to identify a target application?
A. sequence number
B. port number
C. IP address
D. MAC address
B. port number
A client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?
A. 443
B. 110
C. 80
D. 404
A. 443
Which number or set of numbers represents a socket?
A. 01-23-45-67-89-AB
B. 10.1.1.15
C. 21
D. 192.168.1.1:80
D. 192.168.1.1:80
What information is used by TCP to reassemble and reorder received segments?
A. sequence numbers
B. acknowledgment numbers
C. fragment numbers
D. port numbers
A. sequence numbers
What type of port number is assigned by IANA to commonly used services and applications?
A. registered port
B. dynamic port
C. private port
D. well-known port
D. well-known port
Which protocol operates at the transport layer of the TCP/IP model and ensures reliable delivery of IP packets?
A. HTTP
B. UDP
C. TCP
D. IP
C. TCP
What is a characteristic of UDP?
A. It uses sequence numbers to reassemble segments.
B. It provides unreliable delivery of segments.
C. It established sessions with a three-way handshake.
D. It adds 20 bytes of overhead to application layer data.
B. It provides unreliable delivery of segments.
What is the well-known port address number used by DNS to serve requests?
A. 53
B. 60
C. 110
D. 25
A. 53
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
A. The client randomly selects a source port number.
B. The clients sets the window size for the session.
C. The client sends a synchronization segment to begin the session.
D. The client sends an ISN to the server to start the 3-way handshake.
A. The client randomly selects a source port number.
A new employee is attempting to configure a cell phone to connect to the email server of the company. Which port number should be selected when using the POP3 protocol to access messages stored on the email server?
A. 110
B. 69
C. 143
D. 25
A. 110
What is the advantage of using SSH over Telnet?
A. SSH supports authentication for a connection request.
B. SSH operates faster than Telnet.
C. SSH is easier to use.
D. SSH provides secure communication to access hosts.
D. SSH provides secure communication to access hosts.
Which protocol retains a message in a mailbox on a server, even after the message is accessed by a user on a local client device?
A. POP3
B. DNS
C. SMTP
D. IMAP4
A new employee is attempting to configure a cell phone to connect to the email server of the company. Which port number should be selected when using the IMAP4 protocol to access email messages stored on the local server?
A. 143
B. 110
C. 69
D. 25
A. 143
Which protocol is used to transfer web pages from a server to a client device?
A. HTTP
B. SSH
C. HTML
D. POP
E. SMTP
A. HTTP
A new employee is configuring a cell phone for company email. Once configured, what is the destination port number used when the employee sends an email from the phone?
A. 25
B. 143
C. 23
D. 110
A. 25
Refer to the exhibit. Which protocol allows a user to type www.cisco.cominstead of an IP address to access the web server?
A. HTTP
B. FTP
C. DNS
D. HTML
E. SNMP
C. DNS
Which communication tool allows multiple users to communicate with each other in real time by using a smartphone application or social media site?
A. email
B. blog
C. instant messaging
D. web mail
C. instant messaging
An employee of a company is attempting to remotely access a computer system using a virtual terminal (vty) session via Telnet. Which destination port number should the employee put in the remote access software being used?
A. 69
B. 23
C. 110
D. 20
B. 23
What two characteristics describe an FTP connection? (Choose two.)
A. The server established the first connection with the client to control traffic that consists of server commands and client replies.
B. Files can be downloaded from or uploaded to the server.
C. The first connection established is for traffic control and the second connection is created to transfer a file.
D. A large file required more than two connection between the client and the server to successfully download it.
E. The client needs to run a daemon program to establish an FTP connection with a server.
B. Files can be downloaded from or uploaded to the server.
C. The first connection established is for traffic control and the second connection is created to transfer a file.
Which protocol is used by web servers to serve up a web page?
A. HTTP
B. FTP
C. POP
D. IMAP
A. HTTP
Which protocol removes messaged from the server after they have been accessed by a client?
A. SMTP
B. DNS
C. IMAP4
D. POP3
D. POP3
When analog voice signals are converted for use on a computer network, in what format are they encapsulated?
A. IP packets
B. bits
C. segments
D. frames
A. IP packets