Module Quiz
Module Quiz
1. How does BYOD change the way in which businesses implement networks?
· BYOD requires organizations to purchase laptops rather than
desktops.
· BYOD users are responsible for their own network security, thus
reducing the need for organizational security policies.
· BYOD devices are more expensive than devices that are
purchased by an organization.
· BYOD provides flexibility in where and how users can access network
resources.
5. Which of the following fiber-optic cable types can help data travel approximately
500 meters?
· multimode
· single-mode
7. A college is building a new dormitory on its campus. Workers are digging in the
ground to install a new water pipe for the dormitory. A worker accidentally
damages a fiber optic cable that connects two of the existing dormitories to the
campus data center. Although the cable has been cut, students in the dormitories
only experience a very short interruption of network services. What characteristic
of the network is shown here?
· quality of service (QoS)
· scalability
· security
· fault tolerance
· integrity
9. Which device performs the function of determining the path that messages should
take through internetworks?
· a router
· a firewall
· a web server
· a DSL modem
10. Which two Internet connection options do not require that physical cables be
run to the building? (Choose two.)
· DSL
· cellular
· satellite
· dialup
· dedicated leased line
11. What type of network must a home user access in order to do online shopping?
· an intranet
· the Internet
· an extranet
· a local area network
12. During a routine inspection, a technician discovered that software that was
installed on a computer was secretly collecting data about websites that were visited
by users of the computer. Which type of threat is affecting this computer?
· DoS attack
· identity theft
· spyware
· zero-day attack
13. Which term refers to a network that provides secure access to the corporate
offices by suppliers, customers and collaborators?
· Internet
· intranet
· extranet
· extendednet
14. A large corporation has modified its network to allow users to access network
resources from their personal laptops and smart phones. Which networking trend
does this describe?
· cloud computing
· online collaboration
· bring your own device
· video conferencing
2. Which two functions are provided to users by the context-sensitive help feature of
the Cisco IOS CLI? (Choose two.)
· providing an error message when a wrong command is submitted
· displaying a list of all available commands within the current mode
· allowing the user to complete the remainder of an abbreviated
command with the TAB key
· determining which option, keyword, or argument is available for the
entered command
· selecting the best command to accomplish a task
5. When a hostname is configured through the Cisco CLI, which three naming
conventions are part of the guidelines? (Choose three.)
· the hostname should be fewer than 64 characters in length
· the hostname should be written in all lower case characters
· the hostname should contain no spaces
· the hostname should end with a special character
· the hostname should begin with a letter
9. Which memory location on a Cisco router or switch will lose all content when the
device is restarted?
· ROM
· flash
· NVRAM
· RAM
10. Why would a technician enter the command copy startup-config running-
config?
· to remove all configurations from the switch
· to save an active configuration to NVRAM
· to copy an existing configuration into RAM
· to make a changed configuration the new startup configuration
11. Which statement is true about the running configuration file in a Cisco IOS
device?
· It affects the operation of the device immediately when modified.
· It is stored in NVRAM.
· It should be deleted using the erase running-config command.
· It is automatically saved when the router reboots.
12. Which two statements are true regarding the user EXEC mode? (Choose two.)
· All router commands are available.
· Global configuration mode can be accessed by entering the enable
command.
· The device prompt for this mode ends with the “>” symbol.
· Interfaces and routing protocols can be configured.
· Only some aspects of the router configuration can be viewed.
13. Which type of access is secured on a Cisco router or switch with the enable
secret command?
· virtual terminal
· privileged EXEC
· AUX port
· console line
1. What process is used to receive transmitted data and convert it into a readable
message?
· access control
· decoding
· encapsulation
· flow control
3. What process is used to place one message inside another message for transfer
from the source to the destination?
· access control
· decoding
· encapsulation
· flow control
4. A web client is sending a request for a webpage to a web server. From the
perspective of the client, what is the correct order of the protocol stack that is used
to prepare the request for transmission?
· HTTP, IP, TCP, Ethernet
· HTTP, TCP, IP, Ethernet
· Ethernet, TCP, IP, HTTP
· Ethernet, IP, TCP, HTTP
5. What are two benefits of using a layered network model? (Choose two.)
· It assists in protocol design.
· It speeds up packet delivery.
· It prevents designers from creating their own model.
· It prevents technology in one layer from affecting other layers.
· It ensures a device at one layer can function at the next higher
layer.
8. What is the general term that is used to describe a piece of data at any layer of a
networking model?
· frame
· packet
· protocol data unit
· segment
10. Which layer of the OSI model defines services to segment and reassemble data
for individual communications between end devices?
· application
· presentation
· session
· transport
· network
11. Which type of communication will send a message to a group of host destinations
simultaneously?
· broadcast
· multicast
· unicast
· anycast
13. What type of communication will send a message to all devices on a local area
network?
· broadcast
· multicast
· unicast
· allcast
15. Which message delivery option is used when all devices need to receive the same
message simultaneously?
· duplex
· unicast
· multicast
· broadcast
16. What three requirements are defined by the protocols used in network
communcations to allow message transmission across a network? (Choose three.)
· connector specifications
· message encoding
· media selection
· message size
· delivery options
· end-device installation
17. What type of delivery uses data link layer addresses?
· remote delivery
· local and remote delivery
· local delivery
· remote delivery using routers
18. What layer of the TCP/IP protocol model determines the best path through the
network?
· application
· transport
· internet
· network access
fullScreen
1. Which standards organization oversees development of wireless LAN standards?
· IANA
· IEEE
· IOS
· TIA
4. What type of cable is used to connect a workstation serial port to a Cisco router
console port?
· crossover
· rollover
· straight-through
· coaxial
9. A wireless LAN is being deployed inside the new one room office that is occupied
by the park ranger. The office is located at the highest part of the national park.
After network testing is complete, the technicians report that the wireless LAN
signal is occasionally affected by some type of interference. What are two possible
causes of the signal distortion? (Choose two.)
· the microwave oven
· the large number of trees that surround the office
· the cellular phones that are used by the employees
· the elevated location where the wireless LAN was installed
· the number of wireless devices that are used in the wireless LAN
11. What is one advantage of using fiber optic cabling rather than copper cabling?
· It is usually cheaper than copper cabling.
· It is able to be installed around sharp bends.
· It is easier to terminate and install than copper cabling.
· It is able to carry signals much farther than copper cabling.
13. Why are two strands of fiber used for a single fiber optic connection?
· The two strands allow the data to travel for longer distances without
degrading.
· They prevent crosstalk from causing interference on the
connection.
· They increase the speed at which the data can travel.
· They allow for full-duplex connectivity.
15. Which procedure is used to reduce the effect of crosstalk in copper cables?
· requiring proper grounding connections
· twisting opposing circuit wire pairs together
· wrapping the bundle of wires with metallic shielding
· designing a cable infrastructure to avoid crosstalk interference
· avoiding sharp bends during installation
16. Which statement describes a characteristic of the frame header fields of the data
link layer?
· They all include the flow control and logical connection fields.
· Ethernet frame header fields contain Layer 3 source and
destination addresses.
· They vary depending on protocols.
· They include information on user applications.
17. Which two factors influence the method that is used for media access control?
(Choose two.)
· how data is generated by end devices applications
· how the connection between nodes appears to the data link layer
· how signals are encoded by the NICs on end devices
· how nodes share the media
· how the IP protocol forwards the packet to the destination
5. Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)
· IPv6 addresses are represented by hexadecimal numbers.
· IPv4 addresses are represented by hexadecimal numbers.
· IPv6 addresses are 32 bits in length.
· IPv4 addresses are 32 bits in length.
· IPv4 addresses are 128 bits in length.
· IPv6 addresses are 64 bits in length.
6. Which IPv4 address format was created for ease of use by people and is expressed
as 201.192.1.14?
· binary
· dotted decimal
· hexadecimal
· ASCII
10. What is the dotted decimal representation of the IPv4 address which is
represented as the binary string 00001010.01100100.00010101.00000001?
· 10.100.21.1
· 10.10.20.1
· 100.10.11.1
· 100.21.10.1
11. What is the binary representation for the decimal number 173?
· 10100111
· 10100101
· 10101101
· 10110101
12. Given the binary address of 11101100 00010001 00001100 00001010, which
address does this represent in dotted decimal format?
· 234.17.10.9
· 234.16.12.10
· 236.17.12.6
· 236.17.12.10
1. What are two services performed by the data link layer of the OSI model?
(Choose two.)
· It encrypts data packets.
· It determines the path to forward packets.
· It accepts Layer 3 packets and encapsulates them into frames.
· It provides media access control and performs error detection.
· It monitors the Layer 2 communication by building a MAC address
table.
3. What attribute of a NIC would place it at the data link layer of the OSI model?
· attached Ethernet cable
· IP address
· MAC address
· RJ-45 port
· TCP/IP protocol stack
5. What type of physical topology can be created by connecting all Ethernet cables
to a central device?
· bus
· ring
· star
· mesh
6. A technician has been asked to develop a physical topology for a network that
provides a high level of redundancy. Which physical topology requires that every
node is attached to every other node on the network?
· bus
· hierarchical
· mesh
· ring
· star
10. What are the two sublayers of the OSI model data link layer? (Choose two.)
· internet
· physical
· LLC
· transport
· MAC
· network access
12. What identifier is used at the data link layer to uniquely identify an Ethernet
device?
· IP address
· MAC address
· sequence number
· TCP port number
· UDP port number
13. Which two engineering organizations define open standards and protocols that
apply to the data link layer? (Choose two.)
· International Organization for Standardization (ISO)
· Internet Assigned Numbers Authority (IANA)
· International Telecommunication Union (ITU)
· Electronic Industries Alliance (EIA)
· Internet Society (ISOC)
14. Which layer of the OSI model is responsible for specifying the encapsulation
method used for specific types of media?
· application
· transport
· data link
· physical
2. What is auto-MDIX?
· a type of Cisco switch
· an Ethernet connector type
· a type of port on a Cisco switch
· a feature that detects Ethernet cable type
3. Which two functions or operations are performed by the MAC sublayer? (Choose
two.)
· It is responsible for Media Access Control.
· It performs the function of NIC driver software.
· It adds a header and trailer to form an OSI Layer 2 PDU.
· It handles communication between upper and lower layers.
· It adds control information to network protocol layer data.
6. What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose
two.)
· 56 bytes
· 64 bytes
· 128 bytes
· 1024 bytes
· 1518 bytes
10. What is the special value assigned to the first 24 bits of a multicast MAC
address?
· 01-5E-00
· FF-00-5E
· FF-FF-FF
· 01-00-5E
11. Which network device makes forwarding decisions based on the destination
MAC address that is contained in the frame?
· repeater
· hub
· switch
· router
12. Which network device has the primary function to send data to a specific
destination based on the information found in the MAC address table?
· hub
· router
· switch
· modem
1. Which command can be used on a Windows host to display the routing table?
· netstat -s
· show ip route
· netstat -r
· tracert
5. When a connectionless protocol is in use at a lower layer of the OSI model, how is
missing data detected and retransmitted if necessary?
· Connectionless acknowledgements are used to request
retransmission.
· Upper-layer connection-oriented protocols keep track of the data
received and can request retransmission from the upper-level protocols
on the sending host.
· Network layer IP protocols manage the communication sessions if
connection-oriented transport services are not available.
· The best-effort delivery process guarantees that all packets that are
sent are received.
6. What was the reason for the creation and implementation of IPv6?
· to make reading a 32-bit address easier
· to relieve IPv4 address depletion
· to provide more address space in the Internet Names Registry
· to allow NAT support for private addressing
8. Which field in an IPv4 packet header will typically stay the same during its
transmission?
· Flag
· Time-to-Live
· Packet Length
· Destination Address
9. When a router receives a packet, what information must be examined in order for
the packet to be forwarded to a remote destination?
· destination MAC address
· source IP address
· destination IP address
· source MAC address
10. Which field in an IPv6 packet is used by the router to determine if a packet has
expired and should be dropped?
· TTL
· Hop Limit
· Address Unreachable
· No Route to Destination
11. Which information is used by routers to forward a data packet toward its
destination?
· source IP address
· destination IP address
· source data-link address
· destination data-link address
12. A computer has to send a packet to a destination host in the same LAN. How will
the packet be sent?
· The packet will be sent to the default gateway first, and then,
depending on the response from the gateway, it may be sent to the
destination host.
· The packet will be sent directly to the destination host.
· The packet will first be sent to the default gateway, and then from
the default gateway it will be sent directly to the destination host.
· The packet will be sent only to the default gateway.
13. A router receives a packet from the Gigabit 0/0 interface and determines that
the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router
do next?
· route the packet out the Gigabit 0/1 interface
· create a new Layer 2 Ethernet frame to be sent to the destination
· look into the ARP cache to determine the destination IP address
· look into the routing table to determine if the destination network is
in the routing table
14. Which IPv4 address can a host use to ping the loopback interface?
· 126.0.0.1
· 127.0.0.0
· 126.0.0.0
· 127.0.0.1
3. What will a Layer 2 switch do when the destination MAC address of a received
frame is not in the MAC table?
· It initiates an ARP request.
· It broadcasts the frame out of all ports on the switch.
· It notifies the sending host that the frame cannot be delivered.
· It forwards the frame out of all ports except for the port at which the
frame was received.
4. Which two ICMPv6 messages are used during the Ethernet MAC address
resolution process? (Choose two.)
· router solicitation
· router advertisement
· neighbor solicitation
· neighbor advertisement
· echo request
5. Which router component holds the routing table, ARP cache, and running
configuration file?
· RAM
· Flash
· NVRAM
· ROM
11. Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast
frame?
· It drops the frame.
· It sends the frame to all ports except the port on which it received the
frame.
· It sends the frame to all ports that are registered to forward
broadcasts.
· It sends the frame to all ports.
6. Which command can be used on a Cisco router to display all interfaces, the IPv4
address assigned, and the current status?
· show ip interface brief
· ping
· show ip route
· show interface fa0/1
7. Which CLI mode allows users to access all device commands, such as those used
for configuration, management, and troubleshooting?
· user EXEC mode
· privileged EXEC mode
· global configuration mode
· interface configuration mode
10. A router boots and enters setup mode. What is the reason for this?
· The IOS image is corrupt.
· Cisco IOS is missing from flash memory.
· The configuration file is missing from NVRAM.
· The POST process has detected hardware failure.
11. Which command is used to encrypt all passwords in a router configuration file?
· Router_A (config)# enable secret <password>
· Router_A (config)# service password-encryption
· Router_A (config)# enable password <password>
· Router_A (config)# encrypt passwor
12. Company policy requires using the most secure method to safeguard access to
the privileged exec and configuration mode on the routers. The privileged exec
password is trustknow1. Which of the following router commands achieves the goal
of providing the highest level of security?
· secret password trustknow1
· enable password trustknow1
· service password-encryption
· enable secret trustknow1
13. What will be the response from the router after the command, “router(config)#
hostname portsmouth” is entered?
· portsmouth#
· portsmouth(config)#
· invalid input detected
· router(config-host)#
· hostname = portsmouth portsmouth#
· ? command not recognized router(config)#
2. If a network device has a mask of /28, how many IP addresses are available for
hosts on this network?
· 256
· 254
· 62
· 32
· 16
· 14
9. Which subnet mask would be used if exactly 4 host bits are available?
· 255.255.255.224
· 255.255.255.128
· 255.255.255.240
· 255.255.255.248
10. Which two parts are components of an IPv4 address? (Choose two.)
· subnet portion
· network portion
· logical portion
· host portion
· physical portion
· broadcast portion
11. If a network device has a mask of /26, how many IP addresses are available for
hosts on this network?
· 64
· 30
· 62
· 32
· 16
· 14
12. What is the prefix length notation for the subnet mask 255.255.255.224?
· /25
· /26
· /27
· /28
13. How many valid host addresses are available on an IPv4 subnet that is
configured with a /26 mask?
· 254
· 190
· 192
· 62
· 64
14. Which subnet mask would be used if 5 host bits are available?
· 255.255.255.0
· 255.255.255.128
· 255.255.255.224
· 255.255.255.240
2. Which type of IPv6 address is not routable and used only for communication on a
single subnet?
· global unicast address
· link-local address
· loopback address
· unique local address
· unspecified address
6. What are three parts of an IPv6 global unicast address? (Choose three.)
· an interface ID that is used to identify the local network for a
particular host
· a global routing prefix that is used to identify the network portion of
the address that has been provided by an ISP
· a subnet ID that is used to identify networks inside of the local
enterprise site
· a global routing prefix that is used to identify the portion of the
network address provided by a local administrator
· an interface ID that is used to identify the local host on the network
7. What is the valid most compressed format possible of the IPv6 address
2001:0DB8:0000:AB00:0000:0000:0000:1234?
· 2001:DB8:0:AB00::1234
· 2001:DB8:0:AB::1234
· 2001:DB8::AB00::1234
· 2001:DB8:0:AB:0:1234
10. Which IPv6 network prefix is only intended for local links and can not be
routed?
· 2001::/3
· FC00::/7
· FE80::/10
· FEC0::/10
1. What is a function of the tracert command that differs from the ping command
when they are used on a workstation?
· The tracert command reaches the destination faster.
· The tracert command shows the information of routers in the path.
· The tracert command sends one ICMP message to each hop in the
path.
· The tracert command is used to test the connectivity between two
devices.
2. Which ICMP message is used by the traceroute utility during the process of
finding the path between two end hosts?
· redirect
· ping
· time exceeded
· destination unreachable
3. Which two things can be determined by using the ping command? (Choose two.)
· the number of routers between the source and destination device
· the IP address of the router nearest the destination device
· the average time it takes a packet to reach the destination and for the
response to return to the source
· the destination device is reachable through the network
· the average time it takes each router in the path between source
and destination to respond
8. What message is sent by a host to check the uniqueness of an IPv6 address before
using that address?
· neighbor solicitation
· ARP request
· echo request
· router solicitation
10. A user who is unable to connect to the file server contacts the help desk. The
helpdesk technician asks the user to ping the IP address of the default gateway that
is configured on the workstation. What is the purpose for this ping command?
· to obtain a dynamic IP address from the server
· to request that gateway forward the connection request to the file
server
· to test that the host has the capability to reach hosts on other
networks
· to resolve the domain name of the file server to its IP address
11. A user calls to report that a PC cannot access the internet. The network
technician asks the user to issue the command ping 127.0.0.1 in a command prompt
window. The user reports that the result is four positive replies. What conclusion
can be drawn based on this connectivity test?
· The PC can access the network. The problem exists beyond the
local network.
· The IP address obtained from the DHCP server is correct.
· The PC can access the Internet. However, the web browser may
not work.
· The TCP/IP implementation is functional.
12. Which command can be used to test connectivity between two devices using echo
request and echo reply messages?
· netstat
· traceroute
· ICMP
· ping
13. What field content is used by ICMPv6 to determine that a packet has expired?
· TTL field
· CRC field
· Hop Limit field
· Time Exceeded field
14. Which protocol provides feedback from the destination host to the source host
about errors in packet delivery?
· ARP
· BOOTP
· DNS
· ICMP
i1.Network congestion has resulted in the source learning of the loss of TCP
segments that were sent to the destination. What is one way that the TCP protocol
addresses this?
· The source decreases the amount of data that it transmits before it
receives an acknowledgement from the destination.
· The source decreases the window size to decrease the rate of
transmission from the destination.
· The destination decreases the window size.
· The destination sends fewer acknowledgement messages in order
to conserve bandwidth.
2. Which two operations are provided by TCP but not by UDP? (Choose two.)
· identifying the applications
· acknowledging received data
· tracking individual conversations
· retransmitting any unacknowledged data
· reconstructing data in the order received
5. How does a networked server manage requests from multiple clients for different
services?
· The server sends all requests through a default gateway.
· Each request is assigned source and destination port numbers.
· The server uses IP addresses to identify different services.
· Each request is tracked through the physical address of the client.
6. Which two services or protocols use the preferred UDP protocol for fast
transmission and low overhead? (Choose two)
· FTP
· DNS
· HTTP
· POP3
· VoIP
9. Which two flags in the TCP header are used in a TCP three-way handshake to
establish connectivity between two network devices? (Choose two.)
· ACK
· FIN
· PSH
· RST
· SYN
· URG
10. What happens if part of an FTP message is not delivered to the destination?
· The message is lost because FTP does not use a reliable delivery
method.
· The FTP source host sends a query to the destination host.
· The part of the FTP message that was lost is re-sent.
· The entire FTP message is re-sent.
11. What type of applications are best suited for using UDP?
· applications that are sensitive to delay
· applications that need reliable delivery
· applications that require retransmission of lost segments
· applications that are sensitive to packet loss
14. What is the complete range of TCP and UDP well-known ports?
· 0 to 255
· 0 to 1023
· 256 – 1023
· 1024 – 49151
3. What are two characteristics of the application layer of the TCP/IP model?
(Choose two.)
· responsibility for logical addressing
· responsibility for physical addressing
· the creation and maintenance of dialogue between source and
destination applications
· closest to the end user
· the establishing of window size
4. What message type is used by an HTTP client to request data from a web server?
· GET
· POST
· PUT
· ACK
8. Which three protocols or standards are used at the application layer of the
TCP/IP model? (Choose three.)
· ТСР
· HTTP
· MPEG
· GIF
· IP
· UDP
11. Which two tasks can be performed by a local DNS server? (Choose two.)
· providing IP addresses to local hosts
· allowing data transfer between two network devices
· mapping name-to-IP addresses for internal hosts
· forwarding name resolution requests between servers
· retrieving email messages
12. Which protocol can be used to transfer messages from an email server to an
email client?
· SMTP
· POP3
· SNMP
· HTTP
13. When retrieving email messages, which protocol allows for easy, centralized
storage and backup of emails that would be desirable for a small- to medium-sized
business?
· IMAP
· РОР
· SMTP
· HTTPS
14. Which application layer protocol is used to provide file-sharing and print
services to Microsoft applications?
· HTTP
· SMTP
· DHCP
· SMB
15. An author is uploading one chapter document from a personal computer to a file
server of a book publisher. What role is the personal computer assuming in this
network model?
· client
· master
· server
· slave
· transient
5. Which benefit does SSH offer over Telnet for remotely managing a router?
· encryption
· TCP usage
· authorization
· connections via multiple VTY lines
6. What is one of the most effective security tools available for protecting users from
external threats?
· firewalls
· router that run AAA services
· patch servers
· password encryption techniques
8. Which three services are provided by the AAA framework? (Choose three.)
· accounting
· automation
· authorization
· authentication
· autobalancing
· autoconfiguration
10. Some routers and switches in a wiring closet malfunctioned after an air
conditioning unit failed. What type of threat does this situation describe?
· configuration
· environmental
· electrical
· maintenance
13. Which command will block login attempts on RouterA for a period of 30 seconds
if there are 2 failed login attempts within 10 seconds?
· RouterA(config)# login block-for 10 attempts 2 within 30
· RouterA(config)# login block-for 30 attempts 2 within 10
· RouterA(config)# login block-for 2 attempts 30 within 10
· RouterA(config)# login block-for 30 attempts 10 within 2
15. What type of attack may involve the use of tools such as nslookup and fping?
· access attack
· reconnaissance attack
· denial of service attack
· worm attack
1. Which two traffic types require delay sensitive delivery? (Choose two.)
· email
· web
· FТР
· voice
· video
4. What factor should be considered in the design of a small network when devices
are being chosen?
· cost of devices
· redundancy
· traffic analysis
· ISP
7. Which element of scaling a network involves identifying the physical and logical
topologies?
· traffic analysis
· network documentation
· device inventory
· cost analysis
9. Which process failed if a computer cannot access the internet and received an IP
address of 169.254.142.5?
· IP
· DNS
· DHCP
· HTTP
10. A small company has only one router as the exit point to its ISP. Which solution
could be adopted to maintain connectivity if the router itself, or its connection to the
ISP, fails?
· Activate another router interface that is connected to the ISP, so the
traffic can flow through it.
· Have a second router that is connected to another ISP.
· Purchase a second least-cost link from another ISP to connect to
this router.
· Add more interfaces to the router that is connected to the internal
network.
13. A newly hired network technician is given the task of ordering new hardware for
a small business with a large growth forecast. Which primary factor should the
technician be concerned with when choosing the new devices?
· devices with a fixed number and type of interfaces
· devices that have support for network monitoring
· redundant devices
· devices with support for modularity
14. What type of traffic would most likely have the highest priority through the
network?
· FTP
· instant messaging
· voice
· SNMP
1. Which of the following is the name for all computers connected to a network that
participate directly in network communication?
· servers
· intermediary devices
· hosts
· media
2. When data is encoded as pulses of light, which media is being used to transmit the
data?
· wireless
· Fiber-optic cable
· copper cable
3. Which type of network topology lets you see which end devices are connected to
which intermediary devices and what media is being used?
· Physical topology
· Logical topology
4. Which type of network topology lets you see the actual location of intermediary
devices and cable installation?
· Physical topology
· Logical topology
1. Which network infrastructure provides access to users and end devices in a small
geographical area, which is typically a network in a department in an enterprise, a
home, or small business?
· Extranet
· Intranet
· LAN
· WAN
1. When designers follow accepted standards and protocols, which of the four basic
characteristics of network architecture is achieved?
· fault tolerance
· Scalability
· QoS
· Security
3. With which type of policy, a router can manage the flow of data and voice traffic,
giving priority to voice communications if the network experiences congestion?
· fault tolerance
· Scalability
· QoS
· Security
l1.Which feature is a good conferencing tool to use with others who are located
elsewhere in your city, or even in another country?
· BYOD
· Video communications
· Cloud computing
4. Which feature is being used when connecting a device to the network using an
electrical outlet?
· Smart home technology
· Powerline
· Wireless broadband
4. Which option describes a network attack that occurs on the first day that a
vulnerability becomes known?
· Firewall
· Virus, worm, or Trojan horse
· Zero-day or Zero-hour
· Virtual Private Network (VPN)
· Denial of Service (DoS)
5. Which option describes malicious code running on user devices?
· Firewall
· Virus, worm, or Trojan horse
· Zero-day or Zero-hour
· Virtual Private Network (VPN)
· Denial of Service (DoS)
1. Which access method would be most appropriate if you were in the equipment
room with a new switch that needs to be configured?
· Console
· Telnet/SSH
· Aux
2. Which access method would be most appropriate if your manager gave you a
special cable and told you to use it to configure the switch?
· Console
· Telnet/SSH
· Aux
3. Which access method would be the most appropriate in-band access to the IOS
over a network connection?
· Console
· Telnet/SSH
· Aux
4. Which access method would be the most appropriate if you call your manager to
tell him you cannot access your router in another city over the internet and he
provides you with the information to access the router through a telephone
connection?
· Console
· Telnet/SSH
· Aux
4. Which two commands would return you to the privileged EXEC prompt
regardless of the configuration mode you are in? (Choose two.)
· CTRL+Z
· disable
· enable
· end
· exit
3. Which command enables password authentication for user EXEC mode access on
a switch?
· enable secret
· login
· secret
· service password-encryption
1. What is the process of converting information into the proper form for
transmission?
dfullScreen
· Formatting
· Encoding
· Encapsulation
· application
· transport
· internet
· network access
3. Which protocol operates at the network access layer of the TCP/IP model?
· HTTP
· IP
· DNS
· Ethernet
4. Which of the following are protocols that provide feedback from the destination
host to the source host regarding errors in packet delivery? (Choose two.)
· IPv4
· TCP
· ICMPv4
· IPv6
· UDP
· ICMPv6
5. A device receives a data link frame with data and processes and removes the
Ethernet information. What information would be the next to be processed by the
receiving device?
· HTTP at the application layer
· HTML at the application layer
· IP at the internet layer
· UDP at the internet layer
· TCP at the transport layer
6. Which services are provided by the internet layer of the TCP/IP protocol suite?
(Choose three.)
· File Transfer
· Address Resolution
· Routing Protocols
· Messaging
· Ethernet
· Internet Protocol
· True
· False
2. This standards organization is concerned with the Request for Comments (RFC)
documents that specify new protocols and update existing ones.
· Internet Society (ISOC)
· Internet Engineering Task Force (IETF)
· Internet Architecture Board (IAB)
· Internet Research Task Force (IRTF)
1. What is the process of dividing a large data stream into smaller pieces prior to
transmission?
een
· sequencing
· duplexing
· multiplexing
· segmentation
· True
· False
4. Which of the following statements are true regarding network layer and data link
layer addresses? (Choose three.)
· Data link layer addresses are logical and network layer addresses
are physical.
· Network layer addresses are expressed as 12 hexadecimal digits
and data link layer addresses are decimal.
· Network layer addresses are logical and data link addresses are
expressed as 12 hexadecimal digits.
· Data link layer addresses are physical and network layer addresses
are logical.
· Network layer addresses are either 32 or 128 bits in length.
· Data link layer addresses are 32 bits in length.
5. What is the order of the two addresses in the data link frame?
· source MAC, destination MAC
· destination MAC, source IP
· destination IP, source IP
· destination MAC, source MAC
· source IP, destination IP
6. True or False? Data Link addresses are physical so they never change in the data
link frame from source to destination.
· True
· False
1. True or false? The physical layer is only concerned with wired network
connections.
· true
· false
2. True or false? When a frame is encoded by the physical layer, all bits are sent
over the media at the same time.
· true
· false
3. The physical layer of the receiving device passes bits up to which higher level
layer?
· application
· presentation
· network
· data link
4. What PDU is received by the physical layer for encoding and transmission?
· frame
· segment
· packet
· copper
· wireless
· fiber-optic
4. Which of these is the name for the capacity of a medium to carry data?
· bandwidth
· throughput
· goodput
· UTP
· STP
· coaxial
2. Which of the following counters EMI and RFI by using shielding techniques and
special connectors?
· UTP
· STP
· coaxial
4. Which of the following terminates with BNC, N type and F type connectors?
· UTP
· STP
· coaxial
· UTP
· STP
· coaxial
2. Which of the following counters EMI and RFI by using shielding techniques and
special connectors?
· UTP
· STP
· coaxial
4. Which of the following terminates with BNC, N type and F type connectors?
· UTP
· STP
· coaxial
· true
· false
2. True or false. Wireless LANs operate in full-duplex allowing all devices to send or
receive data at the same time so the number of users does not impact performance.
· true
· false
3. Which of the following wireless standards is best suited for industrial and IoT
environments?
· Zigbee
· WiMAX
· Wi-Fi
· Bluetooth
4. Which of the following wireless standards is used for Personal Area Networks
(PANs) and allows devices to communicate over distances of 1 to 100 meters?
· Zigbee
· WiMAX
· Wi-Fi
· Bluetooth
· 11000000.11000000.00001011.00001010
· 11000000.10101000.00001011.00001010
· 11000000.10101000.00001010.00001011
· 11000000.10101000.00001011.00010010
2. Which of the following is the binary equivalent to the 172.16.31.30 IP address?
· 11000000.00010000.00011111.00011110
· 10101000.00010000.00011111.00011110
· 10101100.00010000.00011110.00011110
· 10101100.00010000.00011111.00011110
· B10
· BA
· C10
· CA
· Layer 1
· Layer 2
· Layer 3
· Layer 6
2. The IEEE 802 LAN/MAN data link layer consists of which two sublayers?
(Choose two.)
· Network Control Protocol
· Logical Link Control
· Media Access Control
· Link Control Protocol
3. What is the responsibility of the MAC sublayer?
· Adds Layer 3 addresses to the frame
· Communicates with the network layer (Layer 3)
· Provides the method to get the frame on and off the media
· Transmits the bits on the media
5. The media access control method used depends on which two criteria?
· Layer 3 IP protocol
· Media sharing
· Topology
· Transport layer protocol
· Type of data
6. Which organization defines standards for the network access layer (i.e., the OSI
physical and data link layers)?
· Cisco
· IANA
· IEEE
· IETF
· aerial topology
· IP address topology
· logical topology
· physical topology
2. What kind of network would use point-to-point, hub and spoke, or mesh
topologies?
· PAN
· LAN
· WLAN
· WAN
1. What does the data link layer add to a Layer 3 packet to create a frame? (Choose
two.)
· flags
· sequence number
· header
· trailer
2. What is the function of the last field in a data link layer frame?
· To determine whether the frame experienced transmission errors
· To identify special flow control services such as quality of service
(QoS)
· To identify the beginning and end limits of the frame
· To identify the Layer 3 protocol in the data field
3. Which lists the Layer 2 and Layer 3 address fields in the correct order?
· destination NIC address, source NIC address, source IP address,
destination IP address
· source NIC address, destination NIC address, source IP address,
destination IP address
· destination NIC address, source NIC address, destination IP
address, source IP address
· source NIC address, destination NIC address, destination IP
address, source IP address
4. Which of the following are data link layer protocols? (Choose three)
· 802.11
· Ethernet
· IP
· PPP
· UDP
1. Which part of an Ethernet Frame uses a pad to increase the frame field to at least
64 bytes?
· EtherType
· Preamble
· Start of Frame Delimiter
· Data field
4. Which part of an Ethernet Frame notifies the receiver to get ready for a new
frame?
· Start of Frame Delimiter
· Frame Check Sequence
· Preamble
· Data field
5. Which data link sublayer controls the network interface through software
drivers?
· MAC
· LLC
6. Which data link sublayer works with the upper layers to add application
information for delivery of data to higher level protocols?
· MAC
· LLC
1. What are two methods for switching data between ports on a switch? (Choose
two.)
· cut-off switching
· cut-through switching
· store-and-forward switching
· store-and-supply switching
· store-and-restore switching
3. Which two types of memory buffering techniques are used by switches? (Choose
two.)
· long-term memory buffering
· port-based memory buffering
· shared memory buffering
· short-term memory buffering
4. What feature automatically negotiates the best speed and duplex setting between
interconnecting devices?
· auto-MDIX
· autobots
· autonegotiation
· autotune
3. What is the term for splitting up an IP packet when forwarding it from one
medium to another medium with a smaller MTU?
· encapsulation
· fragmentation
· segmentation
· serialization
4. Which delivery method does not guarantee that the packet will be delivered fully
without errors?
· connectionless
· best effort
· media independent
1. What are the two most commonly referenced fields in an IPv4 packet header that
indicate where the packet is coming from and where it is going? (Choose two.)
en
· destination IP address
· protocol
· Time to Live
· source IP address
· Differentiated Services (DS)
4. Which field includes common values such as ICMP (1), TCP (6), and UDP (17)?
· Header Checksum
· Time to Live
· Protocol
· Differentiated Services (DS)
1. Which three options are major issues associated with IPv4? (Choose three.)
· IP address depletion
· increased network complexity and Internet routing table expansion
· always on connections
· lack of end-to-end connectivity
· global and political boundaries
· too many IPv4 addresses available
3. Which two commands could be entered on a Windows host to view its IPv4 and
IPv6 routing table? (Choose two.)
· netroute -l
· netstat -r
· print route
· route print
· print net
1. What is the command used on a Cisco IOS router to view the routing table?
· netstart -r
· route print
· show ip route
· show routing table
2. What does a code of “O” indicate next to a route in the routing table?
· a directly connected route
· a route with an administrative distance of 0
· a gateway of last resort
· a route learned dynamically from OSPF
1. What destination MAC address would be included in a frame sent from a source
device to a destination device on the same local network?
2. What destination MAC address would be included in a frame sent from a source
device to a destination device on a remote local network?
· A broadcast MAC address of FF-FF-FF-FF-FF-FF.
· The MAC address of the destination device.
· The MAC address of the local router interface.
3. What two protocols are used to determine the MAC address of a known
destination device IP address (IPv4 and IPv6)?
· DHCP
· ARP
· DNS
· ND
10. What two criteria are used to help select a network medium from various
network media? (Choose two.)
· the types of data that need to be prioritized
· the cost of the end devices utilized in the network
· the distance the selected medium can successfully carry a signal
· the number of intermediate devices installed in the network
· the environment where the selected medium is to be installed
4. Which command could be used on a Cisco router to view its ARP table?
· arp -a
· arp -d
· show arp table
· show ip arp
· Neighbor Advertisement
· Neighbor Solicitation
· Router Advertisement
· Router Solicitation
2. Which two ICMPv6 messages are used in to determine the MAC address of a
known IPv6 address?
· Neighbor Advertisement
· Neighbor Solicitation
· Router Advertisement
· Router Solicitation
1. Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. What is
the network address of Host-A?
· 10.0.0.0
· 10.5.0.0
· 10.5.4.0
· 10.5.4.100
2. Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. What is
the network address of Host-A?
· 172.0.0.0
· 172.16.0.0
· 172.16.4.0
· 172.16.4.100
3. Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. Which of
the following IPv4 addresses would be on the same network as Host-A? (Choose all
that apply)
· 10.5.4.1
· 10.5.0.1
· 10.5.4.99
· 10.0.0.98
· 10.5.100.4
4. Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. Which of
the following IPv4 addresses would be on the same network as Host-A? (Choose all
that apply)
· 172.16.4.99
· 172.16.0.1
· 172.17.4.99
· 172.17.4.1
· 172.18.4.1
5. Host-A has the IPv4 address and subnet mask 192.168.1.50 255.255.255.0. Which
of the following IPv4 addresses would be on the same network as Host-A? (Choose
all that apply)
· 192.168.0.1
· 192.168.0.100
· 192.168.1.1
· 192.168.1.100
· 192.168.2.1
1. Which two statements are correct about private IPv4 addresses? (Choose two.)
2. Which two statements are correct about public IPv4 addresses? (Choose two.)
· Public IPv4 addresses are allowed to be assigned to devices within
an organization’s intranet (internal network).
· To access a device over the internet, the destination IPv4 address must
be a public address.
· 192.168.1.10 is a public IPv4 address.
· Public IPv4 address exhaustion is a reason why there are private IPv4
addresses and why organizations are transitioning to IPv6.
· Ethernet switch
· router
· Windows PC
· None of the above. All devices forward IPv4 broadcast packets by
default.
2. Which two situations are the result of excessive broadcast traffic? (Choose two)
· slow network operations
· slow device operations
· when devices on all adjacent networks are affected
· when the router has to forward an excessive number of packets
· /32
· /48
· /64
· /128
4. True or False: The Subnet ID field in an GUA must borrow bits from the
interface ID.
· True
· False
1. True or False. RA messages are sent to all IPv6 routers by hosts requesting
addressing information.
· True
· False
2. Which dynamic addressing method for GUAs is the one where devices rely solely
on the contents of the RA message for their addressing information?
· Method 1: SLAAC
· Method 2: SLAAC and Stateless DHCPv6
· Method 3: Stateful DHCPv6
3. Which dynamic addressing method for GUAs is the one where devices rely solely
on a DHCPv6 server for their addressing information?
· Method 1: SLAAC
· Method 2: SLAAC and Stateless DHCPv6
· Method 3: Stateful DHCPv6
4. Which dynamic addressing method for GUAs is the one where devices get their
IPv6 configuration in a RA message and request DNS information from a DHCPv6
server?
· Method 1: SLAAC
· Method 2: SLAAC and Stateless DHCPv6
· Method 3: Stateful DHCPv6
5. What are the two methods a device can use to generate its own IPv6 interface ID?
· SLAAC
· stateless DHCPv6
· stateful DHCPv6
· EUI-64
· randomly generated
· True
· False
3. Given a /48 Global Routing Prefix and a /64 prefix, what is the subnet portion of
the following address: 2001:db8:cafe:1111:2222:3333:4444:5555
· café
· 1111
· 2222
· 3333
· 4444
4. Given a /32 Global Routing Prefix and a /64 prefix, how many bits would be
allocated for the Subnet ID?
· 8
· 16
· 32
· 48
· 64
26. Which two types of IPv6 messages are used in place of ARP for address
resolution?
· anycast
· broadcast
· echo reply
· echo request
· neighbor solicitation
· neighbor advertisement
1. Which two types of ICMP messages are common to both ICMPv4 and ICMPv6?
(Choose two.)
· application layer
· data link layer
· network layer
· physical layer
· transport layer
· ICMP
· IP
· TCP
· UDP
2. Which TCP header statement is true?
· It consists of 4 fields in an 8-byte header.
· It consists of 8 fields in a 10-byte header.
· It consists of 10 fields in a 20-byte header.
· It consists of 20 fields in a 40-byte header.
3. Which two applications would use the TCP transport layer protocol? (Choose
two.)
· FTP
· HTTP
· ICMP
· TFTP
· VoIP
· ICMP
· IP
· TCP
· UDP
3. Which two applications would use the UDP transport layer protocol? (Choose
two.)
· FTP
· HTTP
· ICMP
· TFTP
· VoIP
4. Which two fields are the same in a TCP and UDP header? (Choose two.)
· Control bits
· Destination port number
· Sequence number
· Source port number
· Well-known port number
1. Assume a host with IP address 10.1.1.10 wants to request web services from a
server at 10.1.1.254. Which of the following would display the correct socket pair?
· 1099:10.1.1.10, 80:10.1.1.254
· 10.1.1.10:80, 10.1.1.254:1099
· 10.1.1.10:1099, 10.1.1.254:80
· 80:10.1.1.10, 1099:10.1.1.254
2. Which port group includes port numbers for FTP, HTTP, and TFTP
applications?
· dynamic ports
· private ports
· registered ports
· well-known ports
3. Which Windows command would display the protocols in use, the local address
and port numbers, the foreign address and port numbers, and the connection state?
· ipconfig /all
· ping
· netstat
· traceroute
1. Which of the following would be valid source and destination ports for a host
connecting to an email server?
2. Which control bit flags are used during the three-way handshake?
· ACK and FIN
· FIN and RESET
· RESET and SYN
· SYN and ACK
3. How many exchanges are needed to end both sessions between two hosts?
· one exchange
· two exchanges
· three exchanges
· four exchanges
· five exchanges
1. What field is used by the destination host to reassemble segments into the original
order?
· Control Bits
· Destination Port
· Sequence Number
· Source Port
· Window Size
1. Why is UDP desirable for protocols that make a simple request and reply
transactions?
P
· Flow Control
· Low overhead
· Reliability
· Same-order delivery
3. Which of the following would be valid source and destination ports for a host
connecting to a DNS server?
· Source: 53, Destination: 49152
· Source: 1812, Destination: 49152
· Source: 49152, Destination: 53
· Source: 49152, Destination: 1812
1. This layer of the OSI model is concerned with the protocols that exchange data
between programs running on hosts.
· application
· transport
· network
· physical
2. MKV, GIF, and JPG standards are associated with which OSI layer?
· application
· presentation
· session
· transport
3. These three OSI layers define the same functions as the TCP/IP model application
layer.
· application
· presentation
· session
· transport
· network
· data link
4. Which two are protocols that belong in the OSI application layer?
· PNG
· DNS
· SMTP
· QuickTime
· True
· False
3. Which peer-to-peer application allows users to share pieces of many files with
each other at the same time?
· Hybrid
· Gnutella
· BitTorrent
1. This message type is used when uploading data files to a web server.
· GET
· POST
· PUT
1. Which of the following DNS record types is used to resolve IPv6 addresses?
· A
· NS
· AAAA
· MX
2. True or false? A DNS server that receives a request for a name resolution that is
not within its DNS zone will send a failure message to the requesting client.
· True
· False
4. Which of the following DNS resource record types resolves authoritative name
servers?
· NS
· A
· MX
· AAAA
1. How many connections are required by FTP between client and server?
· 1
· 2
· 3
· 4
2. True or false? FTP data transfers take place from client to server (push) and
from server to client (pull).
· True
· False
2. What kind of threat is described when a threat actor makes illegal online
purchases using stolen credit information?
· data loss or manipulation
· disruption of service
· identify theft
· information theft
3. What kind of threat is described when a threat actor prevents legal users from
accessing data services?
· data loss or manipulation
· disruption of service
· identify theft
· information theft
4. What kind of threat is described when a threat actor steals scientific research
data?
· data loss or manipulation
· disruption of service
· identify theft
· information theft
5. What kind of threat is described when a threat actor overloads a network to deny
other users network access?
· data loss or manipulation
· disruption of service
· identify theft
· information theft
6. What kind of threat is described when a threat actor alters data records?
· data loss or manipulation
· disruption of service
· identify theft
· information theft
7. What kind of threat is described when a threat actor is stealing the user database
of a company?
· data loss or manipulation
· disruption of service
· identify theft
· information theft
1. Angela, an IT staff member at ACME Inc., notices that communication with the
company’s web server is very slow. After investigating, she determines that the
cause of the slow response is a computer on the internet sending a very large
number of malformed web requests to ACME’S web server. What type of attack is
described in this scenario?
· access attack
· denial of service (DoS) attack
· malware attack
· reconnaissance attack
2. George needed to share a video with a co-worker. Because of the large size of the
video file, he decided to run a simple FTP server on his workstation to serve the
video file to his co-worker. To make things easier, George created an account with
the simple password of “file” and provided it to his co-worker on Friday. Without
the proper security measures or a strong password, the IT staff was not surprised to
learn on Monday that George’s workstation had been compromised and was trying
to upload work related documents to the internet. What type of attack is described
in this scenario?
· access attack
· denial of service (DoS) attack
· malware attack
· reconnaissance attack
3. Jeremiah was browsing the internet from his personal computer when a random
website offered a free program to clean his system. After the executable was
downloaded and running, the operating system crashed. Crucial operating system
related files had been corrupted and Jeremiah’s computer required a full disk
format and operating system re-installation. What type of attack is described in this
scenario?
· access attack
· denial of service (DoS) attack
· malware attack
· reconnaissance attack
4. Arianna found a flash drive lying on the pavement of a mall parking lot. She
asked around but could not find the owner. She decided to keep it and plugged it
into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few
photos before formatting the flash drive for her own use. Afterwards, Arianna
noticed that her laptop camera was active. What type of attack is described in this
scenario?
· access attack
· denial of service (DoS) attack
· malware attack
· reconnaissance attack
5. A computer is used as a print server for ACME Inc. The IT staff failed to apply
security updates to this computer for over 60 days. Now the print server is operating
slowly, and sending a high number of malicious packets to its NIC. What type of
attack is described in this scenario?
· access attack
· denial of service (DoS) attack
· malware attack
· reconnaissance attack
6. Sharon, an IT intern at ACME Inc., noticed some strange packets while revising
the security logs generated by the firewall. A handful of IP addresses on the internet
were sending malformed packets to several different IP addresses, at several
different random port numbers inside ACME Inc. What type of attack is described
in this scenario?
· access attack
· denial of service (DoS) attack
· malware attack
· reconnaissance attack
1. Which device controls traffic between two or more networks to help prevent
unauthorized access?
· AAA Server
· firewall
· ESA/WSA
· IPS
4. This zone is used to house servers that should be accessible to outside users.
· inside
· outside
· internet
· DMZ
1. What are two forms of software programs or processes that provide access to the
network? (Choose two.)
· antivirus software
· application layer services
· gaming software
· network applications
· productivity software
· virtual machine software
2. Which two network protocols are used to establish a remote access network
connection to a device? (Choose two.)
· File Transfer Protocol (FTP)
· Hypertext Transfer Protocol (HTTP).
· Remote Connect (RC)
· Secure Shell (SSH)
· Simple Mail Transfer Protocol (SMTP)
· Telnet
2. Which software installed on key hosts can reveal the types of network traffic
flowing through the network?
· Linux
· MacOS
· SSH
· Windows
· Wireshark
1. A client packet is received by a server. The packet has a destination port number
of 22. What service is the client requesting?
· SSH
· TFTP
· DHCP
· DNS
2. Refer to the exhibit. What does the value of the window size specify?
7. Match the descriptions to the terms. (Not all options are used.)
8. What happens when a switch receives a frame and the calculated CRC value is
different than the value that is in the FCS field?
· The switch notifies the source of the bad frame.
· The switch places the new CRC value in the FCS field and forwards
the frame.
· The switch drops the frame.
· The switch floods the frame to all ports except the port through
which the frame arrived to notify the hosts of the error.
9. Two network engineers are discussing the methods used to forward frames
through a switch. What is an important concept related to the cut-through method
of switching?
· The fragment-free switching offers the lowest level of latency.
· Fast-forward switching can be viewed as a compromise between
store-and-forward switching and fragment-free switching.
· Fragment-free switching is the typical cut-through method of
switching.
· Packets can be relayed with errors when fast-forward switching is
used.
10. Which two issues can cause both runts and giants in Ethernet networks?
(Choose two.)
· using the incorrect cable type
· half-duplex operations
· a malfunctioning NIC
· electrical interference on serial interfaces
· CRC errors
11. Which two functions are performed at the LLC sublayer of the OSI Data
Link Layer to facilitate Ethernet communication? (Choose two.)
· implements CSMA/CD over legacy shared half-duplex media
· enables IPv4 and IPv6 to utilize the same physical medium
· integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and
1 Gigabit Ethernet over copper
· implements a process to delimit fields within an Ethernet 2 frame
· places information in the Ethernet frame that identifies which
network layer protocol is being encapsulated by the frame
Other case
· responsible for internal structure of Ethernet frame
· applies source and destination MAC addresses to Ethernet frame
· integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and
1 Gigabit Ethernet over copper
· enables IPv4 and IPv6 to utilize the same physical medium
· handles communication between upper layer networking software and
Ethernet NIC hardware
Other case
· adds Ethernet control information to network protocol data
· responsible for internal structure of Ethernet frame
· implements trailer with frame check sequence for error detection
· enables IPv4 and IPv6 to utilize the same physical medium
· applies source and destination MAC addresses to Ethernet frame
Other case
· implements CSMA/CD over legacy shared half-duplex media
· adds Ethernet control information to network protocol data
· places information in the Ethernet frame that identifies which
network layer protocol is being encapsulated by the frame
· applies source and destination MAC addresses to Ethernet frame
· integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and
1 Gigabit Ethernet over copper
12. Which two commands could be used to check if DNS name resolution is working
properly on a Windows PC? (Choose two.)
· nslookup cisco.com
· ping cisco.com
· ipconfig /flushdns
· net cisco.com
· nbtstat cisco.com
13. A small advertising company has a web server that provides critical business
service. The company connects to the Internet through a leased line service to an
ISP. Which approach best provides cost effective redundancy for the Internet
connection?
· Add a second NIC to the web server.
· Add a connection to the Internet via a DSL line to another ISP.
· Add another web server to prepare failover support.
· Add multiple connections between the switches and the edge
router.
14. Only employees connected to IPv6 interfaces are having difficulty connecting to
remote networks. The analyst wants to verify that IPv6 routing has been enabled.
What is the best command to use to accomplish the task?
· copy running-config startup-config
· show interfaces
· show ip nat translations
· show running-config
15. Refer to the exhibit. A network administrator is connecting a new host to the
Registrar LAN. The host needs to communicate with remote networks. What IP
address would be configured as the default gateway on the new host?
Floor(config)# interface gi0/1
Floor(config-if)# description Connects to the Registrar LAN
Floor(config-if)# ip address 192.168.235.234 255.255.255.0
Floor(config-if)# no shutdown
Floor(config-if)# interface gi0/0
Floor(config-if)# description Connects to the Manager LAN
Floor(config-if)# ip address 192.168.234.114 255.255.255.0
Floor(config-if)# no shutdown
Floor(config-if)# interface s0/0/0
Floor(config-if)# description Connects to the ISP
Floor(config-if)# ip address 10.234.235.254 255.255.255.0
Floor(config-if)# no shutdown
Floor(config-if)# interface s0/0/1
Floor(config-if)# description Connects to the Head Office
WAN
Floor(config-if)# ip address 203.0.113.3 255.255.255.0
Floor(config-if)# no shutdown
Floor(config-if)# end
· 192.168.235.234
· 203.0.113.3
· 192.168.235.1
· 10.234.235.254
· 192.168.234.114
16. Match the command with the device mode at which the command is entered.
(Not all options are used.)
17. A router boots and enters setup mode. What is the reason for this?
· The IOS image is corrupt.
· Cisco IOS is missing from flash memory.
· The configuration file is missing from NVRAM.
· The POST process has detected hardware failure.
19. Two students are working on a network design project. One student is doing the
drawing, while the other student is writing the proposal. The drawing is finished
and the student wants to share the folder that contains the drawing so that the other
student can access the file and copy it to a USB drive. Which networking model is
being used?
· peer-to-peer
· client-based
· master-slave
· point-to-point
22. Which two OSI model layers have the same functionality as two layers
of the TCP/IP model? (Choose two.)
· data link
· network
· physical
· session
· transport
23. Which three layers of the OSI model are comparable in function to the
application layer of the TCP/IP model? (Choose three.)
· presentation
· physical
· network
· data link
· transport
· application
· session
25. Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose
two.)
· neighbor solicitation
· router advertisement
· router solicitation
· protocol unreachable
· route redirection
26. A network technician types the command ping 127.0.0.1 at the command prompt
on a computer. What is the technician trying to accomplish?
· pinging a host computer that has the IP address 127.0.0.1 on the
network
· tracing the path to a host computer on the network and the network
has the IP address 127.0.0.1
· checking the IP address on the network card
· testing the integrity of the TCP/IP stack on the local machine
28. What does a router do when it receives a Layer 2 frame over the
network medium?
· re-encapsulates the packet into a new frame
· forwards the new frame appropriate to the medium of that segment
of the physical network
· determines the best path
· de-encapsulates the frame
29. Which two acronyms represent the data link sublayers that Ethernet relies upon
to operate? (Choose two.)
· SFD
· LLC
· CSMA
· MAC
· FCS
32. Three devices are on three different subnets. Match the network address and the
broadcast address with each subnet where these devices are located. (Not all options
are used.)
Device 1: IP address 192.168.10.77/28 on subnet 1
Device 2: IP address192.168.10.17/30 on subnet 2
Device 3: IP address 192.168.10.35/29 on subnet 3
33. What type of address is 198.133.219.162?
· link-local
· public
· loopback
· multicast
36. What routing table entry has a next hop address associated with a destination
network?
· directly-connected routes
· local routes
· remote routes
· C and L source routes
37. Which term describes a field in the IPv4 packet header that contains a
unicast, multicast, or broadcast address?
· destination IPv4 address
· protocol
· TTL
· header checksum
38. If the default gateway is configured incorrectly on the host, what is the impact
on communications?
· There is no impact on communications.
· The host is unable to communicate on the local network.
· The host can communicate with other hosts on the local network, but
is unable to communicate with hosts on remote networks.
· The host can communicate with other hosts on remote networks,
but is unable to communicate with hosts on the local network.
40. Refer to the exhibit. A user issues the command netstat –r on a workstation.
Which IPv6 address is one of the link-local addresses of the workstation?
· ::1/128
· fe80::30d0:115:3f57:fe4c/128
· fe80::/64
· 2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128
43. Which two devices would be described as intermediary devices? (Choose two.)
· wireless LAN controller
· server
· assembly line robots
· IPS
· gaming console
· retail scanner
44. What characteristic describes spyware?
· software that is installed on a user device and collects information
about the user
· the use of stolen credentials to access private data
· an attack that slows or crashes a device or network service
· a network device that filters access and traffic coming into a
network
45. Refer to the exhibit. The exhibit shows a small switched network and the
contents of the MAC address table of the switch. PC1 has sent a frame addressed to
PC3. What will the switch do with the frame?
47. Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet
to PC3. In this scenario, what will happen next?
· SW1 will send an ARP reply with its Fa0/1 MAC address.
· RT1 will send an ARP reply with its own Fa0/0 MAC address.
· RT1 will forward the ARP request to PC3.
· RT1 will send an ARP reply with the PC3 MAC address.
· RT1 will send an ARP reply with its own Fa0/1 MAC address.
48. A network administrator is issuing the login block-for 180 attempts 2 within 30
command on a router. Which threat is the network administrator trying to prevent?
· a user who is trying to guess a password to access the router
· a worm that is attempting to access another part of the network
· an unidentified individual who is trying to access the network
equipment room
· a device that is trying to inspect the traffic on a link
49. Which statement describes the characteristics of packet-filtering and
stateful firewalls as they relate to the OSI model?
· A packet-filtering firewall uses session layer information to track the
state of a connection, whereas a stateful firewall uses application layer
information to track the state of a connection.
· Both stateful and packet-filtering firewalls can filter at the
application layer.
· A packet-filtering firewall typically can filter up to the transport
layer, whereas a stateful firewall can filter up to the session layer.
· A stateful firewall can filter application layer information, whereas a
packet-filtering firewall cannot filter beyond the network layer.
50. What are two ways to protect a computer from malware? (Choose two.)
· Empty the browser cache.
· Use antivirus software.
· Delete unused software.
· Keep software up to date.
· Defragment the hard disk.
51. The employees and residents of Ciscoville cannot access the Internet
or any remote web-based services. IT workers quickly determine that the
city firewall is being flooded with so much traffic that a breakdown of
connectivity to the Internet is occurring. Which type of attack is being
launched at Ciscoville?
· access
· Trojan horse
· reconnaissance
· DoS
53. What OSI physical layer term describes the measure of the transfer of bits
across a medium over a given period of time?
· latency
· goodput
· throughput
· bandwidth
54. Refer to the exhibit. What is the maximum possible throughput between the PC
and the server?
· 10 Mb/s
· 1000 Mb/s
· 128 kb/s
· 100 Mb/s