click below
click below
Normal Size Small Size show me how
Cisco Final
Final Exam Study Guide
Question | Answer |
---|---|
What is the correct order for PDU encapsulation? | Frame Header, Network Header, Transport Header, Data, Frame Trailer |
A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp -a command an notices n entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry? | This is a static map entry |
Which two notations are usable nibble boundaries when subnetting in IPv6? | /64 /68 |
What will a layer 2 switch do when the destination MAC address of a received frame is not in the in the MAC table? | It forwards the frame out of all ports except for the port at which the frame was received. |
Which two statements correctly describe a router memory type and its contents? | RAM is volatile and stores the IP routing table. ROM is nonvolatile and contains basic diagnostics software. |
What is the auto-MDIX feature on a switch? | the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection. |
What is the purpose of the routing process? | to select the paths that are used to direct traffic to destination networks. |
What is the purpose of ICMP messages? | to provide feedback of IP packet transmissions |
Which subnet would include the address 192.168.1.96 as a usable host address? | 192.168.1.64/26 |
Which subnet would include the address 192.168.1.192 as a usable host address? | 192.168.1.128/25 |
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? | to interrupt the ping process |
When applied to a router, which command would help mitigate brute-force password attacks against the router? | login block-for 60 attempts 5 within 60 |
A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? | 192.168.1.64/27 192.168.1.96/28 |
which field in an IPv4 packet header will typically stay the same during its transmission? | Destination Address |
What is the effect of configuring the IPv6 unicast-routing command on a router? | to enable the router as an IPv6 router |
which procedure is used to reduce the effect of crosstalk in copper cables? | twisting opposing circuit wire pairs together |
What happens when part of an Internet Radio transmission is not delivered to the destination? | the transmission continues without the missing portion. |
Which address on a PC does not change, even if the PC is moved to a different network? | MAC address |
Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details? | Request for Comments |
Which three IP addresses are private ? | 172.16.4.4 10.1.1.1 192.168.5.5 |
What is the purpose of the network security accounting function? | to keep track of the actions of a user |
How does a Layer 3 switch differ from a Layer 2 switch? | An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches. |
Which connection provides a secure CLI session with encryption to a Cisco switch? | an SSH connection |
The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? | the amount of traffic that is currently crossing the network the type of traffic that is crossing the network number of network devices that the data is crossing |
A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network? | DHCPREQUEST DHCPDISCOVER |
A host PC has just booted and is attempting to lease an address through DHCP. Which message will the client broadcast first on the network? | DHCPDISCOVER |
What are the three primary functions provided by Layer 2 data encapsulation? | data link layer addressing detection of errors through CRC calculations delimiting groups of bits into frames |
Which type of wireless security generates dynamic encryption keys each time a client associates with an AP? | WPA |
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? | ipconfig /displaydns |
What is an important function of the physical layer of the OSI model? | It encodes frames into electrical, optical, or radio wave signals. |
What is a characteristic of the LLC sublayer? | It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media. |
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely? | VLAN 1 |
During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a _____ message | multicast |
Which function is provided by TCP? | detection of missing packets |
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? | regenerating data signals providing a channel over which messages travel notifying other devices when errors occur |
In which default order will a router search for startup configuration information? | NVRAM, TFTP, setup mode |
What two preconfigured settings that affect security are found on most new wireless routers? | broadcast SSID default administrator password |
What will happen if the default gateway address is incorrectly configured on a host? | The host cannot communicate with hosts in other networks. |
What is the purpose of having a converged network? | to reduce the cost of deploying and maintaining the communication infrastructure |
After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command? | The new configuration will be loaded if the switch is restarted. |
Which parameter does the router use to choose the path to the destination when there are multiple routes available? | the lower metric value that is associated with the destination network |
During normal operation, from which location do most Cisco switches and routers run the IOS? | RAM |
Which two components are necessary for a wireless client to be installed on a WLAN? | wireless NIC wireless client software |
A technician uses the ping 127.0.0.1 command. What is the technician testing? | the TCP/IP stack on a network host |
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address? | NAT |
A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame? | to check the frame for possible transmission errors |
What method is used to manage contention-based access on a wireless network? | CSMA/CA |
Which three statements characterize the transport layer protocols? | TCP and UDP port numbers are used by application layer protocols. TCP uses windowing and sequencing to provide reliable transfer of data. TCP is a connection-oriented protocol. UDP is a connectionless protocol. |
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? | DSL |