NWC 204
NWC 204
NWC 204
funnelUUID=8eec7439-
a091-45cf-ac57-52dc4787d022
A. DoS attack
B. identity theft
C. spyware
D. zero-day attack
C. spyware
Which term refers to a network that provides secure access to the corporate offices
by suppliers, customers and collaborators?
A. Internet
B. intranet
C. extranet
D. extendednet
C. extranet
What is an ISP?
A. cloud computing
B. online collaboration
C. bring your own device
D. video conferencing
C. bring your own device
A. an intranet
B. the Internet
C. an extranet
D. a local area network
A. an intranet
A. fault tolerance
B. scalability
C. security
D. Quality of Service (QoS)
E. reliability
C. security
What two criteria are used to help select a network medium from various network
media? (Choose two.)
email
on-line purchasing
video conferencing
wiki
video conferencing
implementing a firewall
installing a wireless network
installing antivirus software
implementing an intrusion detection system
adding a dedicated intrusion prevention device
implementing a firewall
installing antivirus software
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the
modes and interfaces that can be protected with passwords. (Choose three.)
VTY interface
console interface
Ethernet interface
boot IOS mode
privileged EXEC mode
router configuration mode
VTY interface
console interface
privileged EXEC mode
What function does pressing the Tab key have when entering a command in IOS?
Telnet access
SVI
password encryption
physical switchport access
SVI
Which command or key combination allows a user to return to the previous level
in the command hierarchy?
end
exit
Ctrl-Z
Ctrl-C
exit
Branch2!
RM-3-Switch-2A4
Floor(15)
HO Floor 17
SwBranch799
RM-3-Switch-2A4
SwBranch799
SSH makes connections over the network, whereas Telnet is for out-of-band
access.
SSH provides security to remote sessions by encrypting messages and using user
authentication. Telnet is considered insecure and sends messages in plaintext.
SSH requires the use of the PuTTY terminal emulation program. Tera Term must
be used to connect to devices through the use of Telnet.
SSH must be configured over an active network connection, whereas Telnet is used
to connect to a device from a console connection
SSH provides security to remote sessions by encrypting messages and using user
authentication. Telnet is considered insecure and sends messages in plaintext.
ipconfig
ping
traceroute
show ip interface brief
show ip interface brief
the command
a keyword
a variable
a prompt
a keyword
What command will prevent all unencrypted passwords from displaying in plain
text in a configuration file?
This command encrypts passwords as they are transmitted across serial WAN
links.
This command prevents someone from viewing the running configuration
passwords.
This command enables a strong encryption algorithm for the enable secret
password command.
This command automatically encrypts passwords in configuration files that are
currently stored in NVRAM.
This command provides an exclusive encrypted password for external service
personnel who are required to do router maintenance
This command prevents someone from viewing the running configuration
passwords.
encapsulation
flow control
access method
response timeout
flow control
Data is sent from the internet layer to the network access layer.
Packets are sent from the network access layer to the transport layer.
Segments are sent from the transport layer to the internet layer.
Frames are sent from the network access layer to the internet layer
Segments are sent from the transport layer to the internet layer.
What three application layer protocols are part of the TCP/IP protocol suite?
(Choose three.)
ARP
DHCP
DNS
FTP
NAT
PPP
DHCP
DNS
FTP
bits
data
frame
packet
segment
segment
encapsulation
encoding
segmentation
flow control
encapsulation
What layer is responsible for routing messages through an internetwork in the
TCP/IP model?
internet
transport
network access
session
internet
encapsulation
flow control
access method
response timeout
response timeout
45. A web client is receiving a response for a web page from a web server. From
the perspective of the client, what is the correct order of the protocol stack that is
used to decode the received transmission?
Which two OSI model layers have the same functionality as a single layer of the
TCP/IP model? (Choose two.)
data link
network
physical
session
transport
data link
physical
We have an expert-written solution to this problem!
At which layer of the OSI model would a logical address be added during
encapsulation?
physical layer
data link layer
network layer
transport layer
network layer
Network protocols define the type of hardware that is used and how it is mounted
in racks.
They define how messages are exchanged between the source and the destination.
They all function in the network access layer of TCP/IP.
They are only required for exchange of messages between devices on remote
networks.
They define how messages are exchanged between the source and the destination.
Which device performs the function of determining the path that messages should
take through internetworks?
a router
a firewall
a web server
a DSL modem
a router
What term describes a network owned by one organization that provides safe and
secure access to individuals who work for a different organization?
extranet
cloud
BYOD
quality of service
extranet
What term describes storing personal files on servers over the internet to provide
access anywhere, anytime, and on any device?
cloud
BYOD
quality of service
converged network
cloud
What term describes a network where one computer can be both client and server?
peer-to-peer
cloud
BYOD
quality of service
peer-to-peer
What term describes a type of network used by people who work from home or
from a small remote office?
SOHO network
BYOD
quality of service
converged network
SOHO network
What term describes a computing model where server software runs on dedicated
computers?
client/server
internet
intranet
extranet
client/server
What term describes a type of network used by people who work from home or
from a small remote office?
SOHO network
internet
intranet
extranet
SOHO network
What term describes a technology that allows devices to connect to the LAN using
an electrical outlet?
powerline networking
internet
intranet
extranet
powerline networking
What term describes a policy that allows network devices to manage the flow of
data to give priority to voice and video?
quality of service
internet
intranet
extranet
quality of service
What term describes a private collection of LANs and WANs that belongs to an
organization?
intranet
internet
extranet
peer-to-peer
intranet
What term describes the ability to use personal devices across a business or
campus network?
A. BYOD
B. internet
C. intranet
D. extranet
A. BYOD
At which OSI layer is a source IP address added to a PDU during the encapsulation
process?
network layer
data link layer
transport layer
application layer
network layer
At which OSI layer is a destination port number added to a PDU during the
encapsulation process?
transport layer
data link layer
network layer
application layer
transport layer
At which OSI layer is data added to a PDU during the encapsulation process?
application layer
data link layer
network layer
transport layer
application layer
At which OSI layer is a source IP address added to a PDU during the encapsulation
process?
network layer
data link layer
application layer
presentation layer
network layer
Which of the following is the name for all computers connected to a network that
participate directly in network communication?
Servers
Intermediary device
Host media
Intermediary device
network layer
application layer
transport layer
presentation layer
network layer
At which OSI layer is a source MAC address added to a PDU during the
encapsulation process?
At which OSI layer is a source port number added to a PDU during the
encapsulation process?
transport layer
application layer
network layer
presentation layer
data link layer
transport layer
At which OSI layer is a destination MAC address added to a PDU during the
encapsulation process?
When data is encoded as pulses of light, which media is being used to transmit the
data?
Wireless
Fire optic cable
Copper cable
Fire optic cable
Which two devices are intermediary devices? (Choose two)
Host
Router
Switch
Servers
Router
Switch
Firewall
Virus, worm, or Trojan horse
Zero-day or Zero-hour
Virtual Private Network (VPN)
Denial of Service (DoS)
Denial of Service (DoS)
Firewall
Virus, worm, or Trojan horse
Zero-day or Zero-hour
Virtual Private Network (VPN)
Denial of Service (DoS)
Virtual Private Network (VPN)
Firewall
Virus, worm, or Trojan horse
Zero-day or Zero-hour
Virtual Private Network (VPN)
Denial of Service (DoS)
Firewall
Which option describes a network attack that occurs on the first day that a
vulnerability becomes known?
Firewall
Virus, worm, or Trojan horse
Zero-day or Zero-hour
Virtual Private Network (VPN)
Denial of Service (DoS)
Zero-day or Zero-hour
Firewall
Virus, worm, or Trojan horse
Zero-day or Zero-hour
Virtual Private Network (VPN)
Denial of Service (DoS)
Virus, worm, or Trojan horse
Which feature is a good conferencing tool to use with others who are located
elsewhere in your city, or even in another country?
BYOD
Video communications
Cloud computing
Video communications
BYOD
Video communications
Cloud computing
BYOD
Which feature contains options such as Public, Private, Custom and Hybrid?
BYOD
Video communications
Cloud computing
Cloud computing
Which feature is being used when connecting a device to the network using an
electrical outlet?
When designers follow accepted standards and protocols, which of the four basic
characteristics of network architecture is achieved?
fault tolerance
Scalability
QoS
Security
Scalability
fault tolerance
Scalability
QoS
Security
Security
With which type of policy, a router can manage the flow of data and voice traffic,
giving priority to voice communications if the network experiences congestion?
fault tolerance
Scalability
QoS
Security
QoS
fault tolerance
Scalability
QoS
Security
fault tolerance
Which network infrastructure provides access to users and end devices in a small
geographical area, which is typically a network in a department in an enterprise, a
home, or small business?
Extranet
Intranet
LAN
WAN
LAN
Which network infrastructure might an organization use to provide secure and safe
access to individuals who work for a different organization but require access to
the organization's data?
Extranet
Intranet
LAN
WAN
Extranet
Which network infrastructure provides access to other networks over a large
geographical area, which is often owned and managed by a telecommunications
service provider?
Extranet
Intranet
LAN
WAN
WAN
Blu-ray players
home theaters
cordless phones
microwaves
incandescent light bulbs
external hard drives
cordless phones
microwaves
What are three ways that media access control is used in networking? (Choose
three.)
What three items are contained in an Ethernet header and trailer? (Choose three.)
source IP address
source MAC address
destination IP address
destination MAC address
error-checking information
source MAC address
destination MAC address
error-checking information
Which two functions are performed at the LLC sublayer of the OSI data link layer?
(Choose two.)
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Provides data link layer addressing.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.
What action will occur if a host receives a frame with a destination MAC address
of FF:FF:FF:FF:FF:FF?
The two strands allow the data to travel for longer distances without degrading.
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.
They allow for full-duplex connectivity.
What is a primary role of the Physical layer in transmitting data on the network?
create the signals that represent the bits in each frame on to the media
provide physical addressing to the devices
determine the path packets take through the network
control data access to the media
create the signals that represent the bits in each frame on to the media
In addition to the cable length, what two factors could interfere with the
communication carried over UTP cables? (Choose two.)
crosstalk
bandwidth
size of the network
signal modulation technique
electromagnetic interference
crosstalk
electromagnetic interference
Which two statements describe the services provided by the data link layer?
(Choose two.)
logical address
physical address
data
error detection
error detection
Which statement describes a characteristic of the frame header fields of the data
link layer?
they all include the flow control and logical connection fields.
Ethernet frame header fields contain Layer 3 source and destination addresses.
They vary depending on protocols.
They include information on user applications.
They vary depending on protocols.
mesh
partial mesh
hub and spoke
point-to-point
partial mesh
auto-MDIX
CEF
Frame Check Sequence
minimum frame size
source MAC address
Frame Check Sequence
minimum frame size
We have an expert-written solution to this problem!
Which media communication type does not require media arbitration in the data
link layer?
deterministic
half-duplex
full-duplex
controlled access
full-duplex
An IP address is added.
The logical address is added.
The physical address is added.
The process port number is added.
The physical address is added.
access method
flow control
message encapsulation
message encoding
access method
Which three basic parts are common to all frame types supported by the data link
layer? (Choose three.)
header
type field
MTU size
data
trailer
CRC value
header
data
trailer
Which statement is true about the CSMA/CD access method that is used in
Ethernet?
When a device hears a carrier signal and transmits, a collision cannot occur.
A jamming signal causes only devices that caused the collision to execute a
backoff algorithm.
All network devices must listen before transmitting.
Devices involved in a collision get priority to transmit after the backoff period.
All network devices must listen before transmitting.
port-based buffering
level 1 cache buffering
shared memory buffering
fixed configuration buffering
shared memory buffering
What are two examples of the cut-through switching method? (Choose two.)
store-and-forward switching
fast-forward switching
CRC switching
fragment-free switching
QOS switching
fast-forward switching
fragment-free switching
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching
store-and-forward switching
cut-through
store-and-forward
fragment-free
fast-forward
fast-forward
The link between the switches will work at the fastest speed that is supported by
both switches.
The link between switches will work as full-duplex.
If both switches support different speeds, they will each work at their own fastest
speed.
The auto-MDIX feature will configure the interfaces eliminating the need for a
crossover cable.
The connection will not be possible unless the administrator changes the cable to a
crossover cable.
The duplex capability has to be manually configured because it cannot be
negotiated.
The link between the switches will work at the fastest speed that is supported by
both switches.
The link between switches will work as full-duplex.
The auto-MDIX feature will configure the interfaces eliminating the need for a
crossover cable.
Which advantage does the store-and-forward switching method have compared
with the cut-through switching method?
collision detecting
frame error checking
faster frame forwarding
frame forwarding using IPv4 Layer 3 and 4 information
frame error checking
cut-through
fast-forward
fragment-free
store-and-forward
store-and-forward
building a routing table that is based on the first IP address in the frame header
using the source MAC addresses of frames to build and maintain a MAC address
table
forwarding frames with unknown destination IP addresses to the default gateway
utilizing the MAC address table to forward frames via the destination MAC
address
examining the destination MAC address to add new entries to the MAC address
table
using the source MAC addresses of frames to build and maintain a MAC address
table
utilizing the MAC address table to forward frames via the destination MAC
address
What is one advantage of using the cut-through switching method instead of the
store-and-forward switching method?
FF-FF-FF-FF-FF-FF
5C-26-0A-4B-19-3E
01-00-5E-00-00-03
00-26-0F-4B-00-3E
01-00-5E-00-00-03
The PC is connected to the console port of the switch. All the other connections are
made through FastEthernet links. Which types of UTP cables can be used to
connect the devices?
modulation
IEEE
EIA/TIA
air
modulation
51. What OSI physical layer term describes the capacity at which a medium can
carry data?
bandwidth
IEEE
EIA/TIA
air
bandwidth
What OSI physical layer term describes the capacity at which a medium can carry
data?
bandwidth
throughput
latency
goodput
bandwidth
What OSI physical layer term describes the measure of the transfer of bits across a
medium over a given period of time?
throughput
bandwidth
latency
goodput
throughput
What OSI physical layer term describes the amount of time, including delays, for
data to travel from one point to another?
latency
bandwidth
throughput
goodput
latency
What OSI physical layer term describes the amount of time, including delays, for
data to travel from one point to another?
latency
fiber-optic cable
air
copper cable
latency
What OSI physical layer term describes the measure of usable data transferred over
a given period of time?
goodput
fiber-optic cable
air
copper cable
goodput
What OSI physical layer term describes the physical medium which uses electrical
pulses?
copper cable
fiber-optic cable
air
goodput
copper cable
What OSI physical layer term describes the physical medium that uses the
propagation of light?
fiber-optic cable
goodput
latency
throughput
fiber-optic cable
What OSI physical layer term describes the physical medium for microwave
transmissions?
air
goodput
latency
throughput
air
Which two functions are performed at the MAC sublayer of the OSI data link
layer? (Choose two.)
Select 2 of the correct answers in red font
Enables IPv4 and IPv6 to utilize the same network interface and media
Adds Layer 2 control information to network protocol data.
Integrates various physical technologies.
Communicates between the networking software at the upper layers and the device
hardware at the lower layers.
Provides synchronization between source and target nodes.
Places information in the frame that identifies which network layer protocol is
being used for the frame.
Controls the NIC responsible for sending and receiving data on the physical
medium.
Implements a trailer to detect transmission errors.
Provides a mechanism to allow multiple devices to communicate over a shared
medium.
Controls the NIC responsible for sending and receiving data on the physical
medium.
Implements a trailer to detect transmission errors.
Provides a mechanism to allow multiple devices to communicate over a shared
medium.
Which two functions are performed at the LLC sublayer of the OSI data link layer?
(Choose two.)
Enables IPv4 and IPv6 to utilize the same network interface and media.
Places information in the frame that identifies which network layer protocol is
being used for the frame.
Integrates various physical technologies.
Implements a process to delimit fields within a Layer 2 frame.
Controls the NIC responsible for sending and receiving data on the physical
medium.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Places information in the frame that identifies which network layer protocol is
being used for the frame.
Which two functions are performed at the LLC sublayer of the OSI data link layer?
(Choose two.)
Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.
Integrates various physical technologies.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.
What action will occur if a switch receives a frame and does have the source MAC
address in the MAC table?
What action will occur if a switch receives a frame with the destination MAC
address FF:FF:FF:FF:FF:FF?
The switch forwards it out all ports except the ingress port.
The switch shares the MAC address table entry with any connected switches.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC
address is not local.
The switch forwards it out all ports except the ingress port.
What action will occur if a switch receives a frame with the destination MAC
address 01:00:5E:00:00:D9?
The switch forwards it out all ports except the ingress port.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC
address is not local.
The switch shares the MAC address table entry with any connected switches
The switch forwards it out all ports except the ingress port.
What action will occur if a host receives a frame with a destination MAC address it
does not recognize?
79. What action will occur if a switch receives a frame with the destination MAC
address FF:FF:FF:FF:FF:FF?
The switch forwards it out all ports except the ingress port.
The switch refreshes the timer on that entry.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC
address is not local.
The switch forwards it out all ports except the ingress port.
console
rollover
crossover
straight-through
straight-through
1. Which information is used by routers to forward a data packet toward its
destination?
source IP address
destination IP address
source data-link address
destination data-link address
destination IP address
A computer has to send a packet to a destination host in the same LAN. How will
the packet be sent?
The packet will be sent to the default gateway first, and then, depending on the
response from the gateway, it may be sent to the destination host.
The packet will be sent directly to the destination host.
The packet will first be sent to the default gateway, and then from the default
gateway it will be sent directly to the destination host.
The packet will be sent only to the default gateway.
The packet will be sent directly to the destination host.
A router receives a packet from the Gigabit 0/0 interface and determines that the
packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do
next?
Which IPv4 address can a host use to ping the loopback interface?
126.0.0.1
127.0.0.0
126.0.0.0
127.0.0.1
127.0.0.1
Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of
internal networks.
Any host or user can get a public IPv6 network address because the number of
available IPv6 addresses is extremely large.
The problems that are induced by NAT applications are solved because the IPv6
header improves packet handling by intermediate routers.
The end-to-end connectivity problems that are caused by NAT are solved because
the number of routes increases with the number of nodes that are connected to the
Internet.
Any host or user can get a public IPv6 network address because the number of
available IPv6 addresses is extremely large.
Which parameter does the router use to choose the path to the destination when
there are multiple routes available?
the lower metric value that is associated with the destination network
the lower gateway IP address to get to the destination network
the higher metric value that is associated with the destination network
the higher gateway IP address to get to the destination network
the lower metric value that is associated with the destination network
Hosts that are connected to the switch can use the switch default gateway address
to forward packets to a remote destination.
A switch must have a default gateway to be accessible by Telnet and SSH.
The default gateway address is used to forward packets originating from the switch
to remote networks.
It provides a next-hop address for all traffic that flows through the switch
The default gateway address is used to forward packets originating from the switch
to remote networks
connectionless
media dependent
user data segmentation
reliable end-to-end delivery
connectionless
Time-to-Live
Sequence Number
Acknowledgment Number
Differentiated Services
Time-to-Live
What is one advantage that the IPv6 simplified header offers over IPv4?
smaller-sized header
little requirement for processing checksums
smaller-sized source and destination IP addresses
efficient packet handling
efficient packet handling
What IPv4 header field identifies the upper layer protocol carried in the packet?
Protocol
Identification
Version
Differentiated Services
Protocol
directly-connected routes
local routes
remote routes
C and L source routes
remote routes
How do hosts ensure that their packets are directed to the correct network
destination?
They have to keep their own local routing table that contains a route to the
loopback interface, a local network route, and a remote default route.
They always direct their packets to the default gateway, which will be responsible
for the packet delivery.
They search in their own local routing table for a route to the network destination
address and pass this information to the default gateway.
They send a query packet to the default gateway asking for the best route.
They have to keep their own local routing table that contains a route to the
loopback interface, a local network route, and a remote default route.
Next Header
Flow Label
Traffic Class
Differentiated Services
Flow Label
0.0.0.0
255.255.255.255
FFFF.FFFF.FFFF
AAAA.AAAA.AAAA
the physical address of the destination host
FFFF.FFFF.FFFF
A network technician issues the arp -d * command on a PC after the router that is
connected to the LAN is reconfigured. What is the result after this command is
issued?
The ARP cache is cleared.
The current content of the ARP cache is displayed.
The detailed information of the ARP cache is displayed.
The ARP cache is synchronized with the router interface.
The ARP cache is cleared.
anycast
broadcast
echo reply
echo request
neighbor solicitation
neighbor advertisement
neighbor solicitation
neighbor advertisement
neighbor table
ARP cache
routing table
MAC address table
ARP cache
A new network administrator has been asked to enter a banner message on a Cisco
device. What is the fastest way a network administrator could test whether the
banner is properly configured?
The switch will have a management interface with the address 172.16.100.1.
The switch can be remotely managed from a host on another network.
The switch can communicate with other hosts on the 172.16.100.0 network.
The switch is limited to sending and receiving frames to and from the gateway
172.16.100.1.
The switch can be remotely managed from a host on another network.
packet forwarding
microsegmentation
domain name resolution
path selection
flow control
packet forwarding
path selection
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default
gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
The host cannot communicate with hosts in other networks.
What are two potential network problems that can result from ARP operation?
(Choose two.)
Which term describes a field in the IPv4 packet header used to identify the next
level protocol?
protocol
destination IPv4 address
source IPv4 address
TTL
protocol
Which term describes a field in the IPv4 packet header that contains an 8-bit binary
value used to determine the priority of each packet?
differentiated services
destination IPv4 address
source IPv4 address
protocol
differentiated services
Which term describes a field in the IPv4 packet header that contains a 32-bit binary
value associated with an interface on the sending device?
Which term describes a field in the IPv4 packet header used to detect corruption in
the IPv4 header?
header checksum
source IPv4 address
protocol
TTL
header checksum
A network administrator is connecting a new host to the Payroll LAN. The host
needs to communicate with remote networks. What IP address would be
configured as the default gateway on the new host?
10.27.14.148
10.27.14.1
10.14.15.254
203.0.113.39
10.27.15.17
10.27.14.148
Which term describes a field in the IPv4 packet header that contains a unicast,
multicast, or broadcast address?
Which term describes a field in the IPv4 packet header used to limit the lifetime of
a packet?
TTL
source IPv4 address
protocol
header checksum
TTL
Which term describes a field in the IPv4 packet header that contains a 4-bit binary
value set to 0100?
version
source IPv4 address
protocol
TTL
version
Which term describes a field in the IPv4 packet header used to identify the next
level protocol?
protocol
version
differentiated services
header checksum
protocol
Which term describes a field in the IPv4 packet header that contains a 4-bit binary
value set to 0100?
version
differentiated services
header checksum
TTL
version
Entries in an ARP table are time-stamped and are purged after the timeout expires.
A static IP-to-MAC address entry can be entered manually into an ARP table.
The type field 0x806 appears in the header of the Ethernet frame.
The port-to-MAC address table on a switch has the same entries as the ARP table
on the switch.
Entries in an ARP table are time-stamped and are purged after the timeout expires.
A static IP-to-MAC address entry can be entered manually into an ARP table.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the
Ethernet frame.
The source MAC address appears in the header of the Ethernet frame.
The port-to-MAC address table on a switch has the same entries as the ARP table
on the switch.
A static IP-to-MAC address entry can be entered manually into an ARP table.
What property of ARP allows hosts on a LAN to send traffic to remote networks?
A network administrator is connecting a new host to the Registrar LAN. The host
needs to communicate with remote networks. What IP address would be
configured as the default gateway on the new host?
192.168.235.234
192.168.235.1
10.234.235.254
203.0.113.3
192.168.234.114
192.168.235.234
What property of ARP forces all Ethernet NICs to process an ARP request?
What property of ARP causes a reply only to the source sending an ARP request?
The source MAC address appears in the header of the Ethernet frame.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the
Ethernet frame.
The type field 0x806 appears in the header of the Ethernet frame.
ARP replies are broadcast on the network when a host receives an ARP request.
The source MAC address appears in the header of the Ethernet frame.
What property of ARP causes the request to be flooded out all ports of a switch
except for the port receiving the ARP request?
What property of ARP causes the NICs receiving an ARP request to pass the data
portion of the Ethernet frame to the ARP process?
The type field 0x806 appears in the header of the Ethernet frame.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the
Ethernet frame.
Entries in an ARP table are time-stamped and are purged after the timeout expires.
ARP replies are broadcast on the network when a host receives an ARP request.
The type field 0x806 appears in the header of the Ethernet frame.
What property of ARP causes the NICs receiving an ARP request to pass the data
portion of the Ethernet frame to the ARP process?
The type field 0x806 appears in the header of the Ethernet frame.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the
Ethernet frame.
Entries in an ARP table are time-stamped and are purged after the timeout expires.
The port-to-MAC address table on a switch has the same entries as the ARP table
on the switch.
The type field 0x806 appears in the header of the Ethernet frame.
A network administrator is connecting a new host to the Service LAN. The host
needs to communicate with remote networks. What IP address would be
configured as the default gateway on the new host?
172.29.157.156
172.29.157.1
10.156.157.254
198.51.100.177
172.29.156.36
172.29.157.156
What is the prefix length notation for the subnet mask 255.255.255.224?
/25
/26
/27
/28
/27
How many valid host addresses are available on an IPv4 subnet that is configured
with a /26 mask?
254
190
192
62
64
62
255.255.255.0
255.255.255.128
255.255.255.224
255.255.255.240
255.255.255.224
192.168.1.32/27
192.168.1.48
192.1681.64/27
192.168.1.68
How many bits must be borrowed from the host portion of an address to
accommodate a router with five connected networks?
two
three
four
five
three
30
32
60
62
64
62
How many host addresses are available on the network 172.16.128.0 with a subnet
mask of 255.255.252.0?
510
512
1022
1024
2046
2048
1022
What three blocks of addresses are defined by RFC 1918 for private network use?
(Choose three.)
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
100.64.0.0/14
169.254.0.0/16
239.0.0.0/8
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
172.16.16.255
172.16.20.255
172.16.19.255
172.16.23.255
172.16.255.255
172.16.19.255
A site administrator has been told that a particular network at the site must
accommodate 126 hosts. Which subnet mask would be used that contains the
required number of host bits?
255.255.255.0
255.255.255.128
255.255.255.224
255.255.255.240
255.255.255.128
10.16.10.160/26
10.16.10.128/28
10.16.10.64/27
10.16.10.224/26
10.16.10.240/27
10.16.10.240/28
10.16.10.64/27
What is the usable number of host IP addresses on a network that has a /26 mask?
256
254
64
62
32
16
62
240.0.0.0 - 254.255.255.255
224.0.0.0 - 239.255.255.255
169.254.0.0 - 169.254.255.255
127.0.0.0 - 127.255.255.255
224.0.0.0 - 239.255.255.255
198.133.219.17
192.168.1.245
10.15.250.5
128.107.12.117
172.31.1.25
64.104.78.227
198.133.219.17
128.107.12.117
64.104.78.227
A message is sent to all hosts on a remote network. Which type of message is it?
limited broadcast
multicast
directed broadcast
unicast
directed broadcast
192.168.1.16/28
192.168.1.64/27
192.168.1.128/27
192.168.1.96/28
192.168.1.192/28
192.168.1.64/27
192.168.1.96/28
FEC8:1::FFFF
FD80::1:1234
FE80::1:4545:6578:ABC1
FE0A::100:7788:998F
FC90:5678:4251:FFFF
FE80::1:4545:6578:ABC1
3FFE:1044::AB::57
3FFE:1044::00AB::0057
3FFE:1044:0:0:AB::57
3FFE:1044:0:0:00AB::0057
3FFE:1044:0000:0000:00AB::57
3FFE:1044:0000:0000:00AB::0057
3FFE:1044:0:0:AB::57
16
256
4096
65536
65536
Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is
created if the subnet prefix is changed to /52?
2001:db8:0:f00::/52
2001:db8:0:8000::/52
2001:db8:0:f::/52
2001:db8:0:f000::/52
2001:db8:0:f000::/52
2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:0
0A2:0000::...2001:0DB8:BC15:00AF:0000::
/60 .
loopback
link-local
multicast
global unicast
link-local
0
4
16
256
16
2001:DB8:BC15
2001:DB8:BC15:A
2001:DB8:BC15:A:1
2001:DB8:BC15:A:12
2001:DB8:BC15:A
An IPv6 enabled device sends a data packet with the destination address of
FF02::1. What is the target of this packet?
the one IPv6 device on the link that has been uniquely configured with this address
all IPv6 enabled devices on the local link or network
only IPv6 DHCP servers
only IPv6 configured routers
all IPv6 enabled devices on the local link or network
FC00::/7
2001::/32
FE80::/10
FDFF::/7
FE80::/10
Which type of IPv6 address refers to any unicast address that is assigned to
multiple hosts?
unique local
global unicast
link-local
anycast
anycast
multicast
loopback
link-local
anycast
broadcast
loopback
link-local
Which service provides dynamic global IPv6 addressing to end devices without
using a server that keeps a record of available IPv6 addresses?
stateful DHCPv6
SLAAC
static IPv6 addressing
stateless DHCPv6
SLAAC
ARPv6
DHCPv6
ICMPv6
UDP
ICMPv6
A technician uses the ping 127.0.0.1 command. What is the technician testing?
Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is
decremented to zero and the packet cannot be forwarded?
network unreachable
time exceeded
protocol unreachable
port unreachable
time exceeded
A user executes a traceroute over IPv6. At what point would a router in the path to
the destination device drop the packet?
host unreachable
protocol unreachable
port unreachable
network unreachable
host unreachable
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
192.168.1.64/26
2001:DB8:1:1::1
2001:DB8:1:1::A
2001:DB8:1:2::2
2001:DB8:1:2::1
2001:DB8:1:3::1
2001:DB8:1:3::2
2001:DB8:1:4::1
2001:DB8:1:1::1
2001:DB8:1:2::1
2001:DB8:1:3::2
address unreachable
network unreachable
host unreachable
protocol unreachable
address unreachable
2001:db8::a0b0:8:1
2001:db8::ab8:1:0:1000
2001:db80:0:1::80:1
2001:db80:::1::80:1
2001:db8::a0b0:8:1
fe80:9ea:0:2200::fe0:290
fe80:9:20::b000:290
fe80:9ea0::2020:0:bf:e0:9290
fe80:9ea0::2020::bf:e0:9290
fe80:9ea:0:2200::fe0:290
2002:42:10:c400::909
200:420:110:c4b::910:0:90
2002:4200::25:1090:0:99
2002:42::25:1090:0:99
2002:42:10:c400::909
2001:db8::ab8:1:0:1000
2001:db8::a0b0:8:1
2001:db8:1::ab8:0:1
2001:db8:0:1::8:1
2001:db8::ab8:1:0:1000
2002:420:c4:1008:25:190::990
2002:42:10:c400::909
2002:4200::25:1090:0:99
2002:42::25:1090:0:99
2002:420:c4:1008:25:190::990
2001:db8::a0b0:8:1
2001:db8:1::ab8:0:1
2001:db8::ab8:1:0:1000
2001:db8:0:1::8:1
2001:db8::a0b0:8:1
fe80::220:b3f:f0e0:29
fe80:9ea:0:2200::fe0:290
fe80:9ea0::2020:0:bf:e0:9290
fe80:9ea0::2020::bf:e0:9290
fe80::220:b3f:f0e0:29
2001:db8::a0b0:8:1
2001:db8::ab8:1:0:1000
2001:db80:0:1::80:1
2001:db8:0:1::8:1
2001:db8::a0b0:8:1
2002:42:10:c400::909
2002:4200::25:1090:0:99
2002:420:c4:1008:25:190::990
2002:42::25:1090:0:99
2002:42:10:c400::909
fe80:9ea:0:2200::fe0:290
fe80:9ea0::2020:0:bf:e0:9290
fe80::220:b3f:f0e0:29
fe80::0220:0b3f:f0e0:0029
fe80:9ea:0:2200::fe0:290
host unreachable
beyond scope of the source address
address unreachable
communication with the destination administratively prohibited
host unreachable
address unreachable
communication with the destination administratively prohibited
beyond scope of the source address
no route to destination
address unreachable
A user issues a ping 10.10.14.67 command and receives a response that includes a
code of 0. What does this code represent?
network unreachable
protocol unreachable
port unreachable
host unreachable
network unreachable
port unreachable
host unreachable
protocol unreachable
network unreachable
port unreachable
Which action is performed by a client when establishing communication with a
server via the use of UDP at the transport layer?
The client sets the window size for the session.
The client sends an ISN to the server to start the 3-way handshake.
The client randomly selects a source port number.
The client sends a synchronization segment to begin the session.
The client randomly selects a source port number.
What is a socket?
the combination of the source and destination IP address and source and
destination Ethernet address
the combination of a source IP address and port number or a destination IP address
and port number
the combination of the source and destination sequence and acknowledgment
numbers
the combination of the source and destination sequence numbers and port numbers
the combination of a source IP address and port number or a destination IP address
and port number
A PC is downloading a large file from a server. The TCP window is 1000 bytes.
The server is sending the file using 100-byte segments. How many segments will
the server send before it requires an acknowledgment from the PC?
1 segment
10 segments
100 segments
1000 segments
10 segments
Which flag in the TCP header is used in response to a received FIN in order to
terminate connectivity between two network devices?
FIN
ACK
SYN
RST
ACK
Which protocol or service uses UDP for a client-to-server communication and TCP
for server-to-server communication?
HTTP
FTP
DNS
SMTP
DNS
What kind of port must be requested from IANA in order to be used with a specific
application?
registered port
private port
dynamic port
source port
registered port
Which three application layer protocols use TCP? (Choose three.)
SMTP
FTP
SNMP
HTTP
TFTP
DHCP
SMTP
FTP
HTTP
window
checksum
source port
destination port
sequence number
window
sequence number
Which field in the TCP header indicates the status of the three-way handshake
process?
window
reserved
checksum
control bits
control bits
Which two types of applications are best suited for UDP? (Choose two.)
Which two protocols may devices use in the application process that sends email?
(Choose two.)
HTTP
SMTP
POP
IMAP
DNS
POP3
SMTP
DNS
Which networking model is being used when an author uploads one chapter
document to a file server of a book publisher?
peer-to-peer
master-slave
client/server
point-to-point
client/server
What do the client/server and peer-to-peer network models have in common?
Both models have dedicated servers.
Both models support devices in server and client roles.
Both models require the use of TCP/IP-based protocols.
Both models are used only in the wired network environment.
Both models support devices in server and client roles.
wireless networking
social networking without the Internet
network printing using a print server
resource sharing without a dedicated server
resource sharing without a dedicated server
Which application layer protocol uses message types such as GET, PUT, and
POST?
DNS
DHCP
SMTP
HTTP
POP3
HTTP
Which three protocols operate at the application layer of the TCP/IP model?
(Choose three.)
ARP
TCP
UDP
FTP
POP3
DHCP
FTP
POP3
DHCP
Which applications or services allow hosts to act as client and server at the same
time?
client/server applications
email applications
P2P applications
authentication services
P2P applications
scalability
one way data flow
decentralized resources
centralized user accounts
resource sharing without a dedicated server
decentralized resources
resource sharing without a dedicated server
A PC that is communicating with a web server has a TCP window size of 6,000
bytes when sending data and a packet size of 1,500 bytes. Which byte of
information will the web server acknowledge after it has received two packets of
data from the PC?
3001
6001
4500
6000
3001
A PC that is communicating with a web server has a TCP window size of 6,000
bytes when sending data and a packet size of 1,500 bytes. Which byte of
information will the web server acknowledge after it has received three packets of
data from the PC?
4501
6001
6000
4500
4501
A PC that is communicating with a web server has a TCP window size of 6,000
bytes when sending data and a packet size of 1,500 bytes. Which byte of
information will the web server acknowledge after it has received four packets of
data from the PC?
6001
3001
1501
1500
6001
A client creates a packet to send to a server. The client is requesting TFTP service.
What number will be used as the destination port number in the sending packet?
69
67
53
80
69
Which attack involves a compromise of data that occurs between two end points?
denial-of-service
man-in-the-middle attack
extraction of security parameters
username enumeration
man-in-the-middle attack
A user is redesigning a network for a small company and wants to ensure security
at a reasonable price. The user deploys a new application-aware firewall with
intrusion detection capabilities on the ISP connection. The user installs a second
firewall to separate the company network from the public network. Additionally,
the user installs an IPS on the internal network of the company. What approach is
the user implementing?
attack based
risk based
structured
layered
layered
What is the purpose of a small company using a protocol analyzer utility to capture
network traffic on the network segments where the company is considering a
network upgrade?
to identify the source and destination of local network traffic
to capture the Internet connection bandwidth requirement
to document and analyze network traffic requirements on each network segment
to establish a baseline for security analysis after the network is upgraded
to document and analyze network traffic requirements on each network segment
Which method is used to send a ping message specifying the source address for the
ping?
Issue the ping command from within interface configuration mode.
Issue the ping command without specifying a destination IP address.
Issue the ping command without extended commands.
Issue the ping command after shutting down un-needed interfaces.
Issue the ping command without specifying a destination IP address.
What information about a Cisco router can be verified using the show version
command?
the routing protocol version that is enabled
the value of the configuration register
the operational status of serial interfaces
the administrative distance used to reach networks
the value of the configuration register
Which command should be used on a Cisco router or switch to allow log messages
to be displayed on remotely connected sessions using Telnet or SSH?
debug all
logging synchronous
show running-config
terminal monitor
terminal monitor
Students who are connected to the same switch are having slower than normal
response times. The administrator suspects a duplex setting issue. What is the best
command to use to accomplish the task?
show interfaces
ipconfig getifaddr en0
copy running-config startup-config
show ip nat translations
show interfaces
A user wants to know the IP address of the PC. What is the best command to use to
accomplish the task?
ipconfig
copy running-config startup-config
show interfaces
show ip nat translations
ipconfig