Question
click below
click below
Question
Normal Size Small Size show me how
CCNA1
FINALS pt.1
Question | Answer |
---|---|
Which two traffic types use the Real-Time Transport Protocol (RTP)? | video, voice |
Which wireless technology has low-power and data rate requirements making it popular in home automation applications? | ZigBee |
Which layer of the TCP/IP model provides a route to forward messages through an internetwork? | internet |
Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services? | DNS |
What are proprietary protocols? | protocols developed by organizations who have control over their definition and operation |
What service is provided by DNS? | Resolves domain names, such as cisco.com, into IP addresses. |
A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting? | POP3 |
What command can be used on a Windows PC to see the IP configuration of that computer? | ipconfig |
A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use? | peer-to-peer (P2P) |
What characteristic describes a virus? | malicious software or code running on an end device |
This network portion of the address is assigned by the provider. | global routing |
This part of the address is used by an organization to identify subnets. | subnet ID |
This part of the address is the equivalent to the host portion of an IPv4 address. | interface ID |
What service is provided by Internet Messenger? | An application that allows real-time chatting among remote users. |
A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address? | It will send an ARP request for the MAC address of the default gateway. |
A client packet is received by a server. The packet has a destination port number of 53. What service is the client requesting? | DNS |
A network administrator is adding a new LAN to a branch office. The new LAN must support 25 connected devices. What is the smallest network mask that the network administrator can use for the new network? | 255.255.255.224 |
What characteristic describes a Trojan horse? | malicious software or code running on an end device |
What service is provided by HTTPS? | Uses encryption to secure the exchange of text, graphic images, sound, and video on the web. |
A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows? | The data flow is being tracked based on the source port number that is used by each application. |
A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network? | 255.255.255.192 |
What characteristic describes a DoS attack? | an attack that slows or crashes a device or network service |
What service is provided by SMTP? | Allows clients to send email to a mail server and the servers to send email to other servers. |
Which scenario describes a function provided by the transport layer? | A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window. |
are used to identify the correct application and window within that application. | source and destination port numbers |
What does the term “attenuation” mean in data communication? | loss of signal strength as distance increases |
Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.) | POP, DNS |
What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.) | message size, message encoding, delivery options |
What are two characteristics of IP? (Choose two.) | does not require a dedicated end-to-end connection & operates independently of the network media |
This means that IP requires no end-to-end connection nor does it guarantee delivery of packets. | connectionless |
IP is also media independent, which means it operates independently of the network media carrying the packets. | best effort protocol |
What are two common causes of signal degradation when using UTP cabling? (Choose two.) | improper termination, & low-quality cable or connectors |
Which subnet would include the address 192.168.1.96 as a usable host address? | 192.168.1.64/26 |
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.) | Capture traffic during peak utilization times to get a good representation of the different traffic types.& Perform the capture on different network segments. |
What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command? | The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages. |
Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.) | application, session, presentation |
What will happen if the default gateway address is incorrectly configured on a host? | The host cannot communicate with hosts in other networks. |
features of ARP? | If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. |
features of ARP? | If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply. |
A network administrator is adding a new LAN to a branch office. The new LAN must support 90 connected devices. What is the smallest network mask that the network administrator can use for the new network? | 255.255.255.128 |
What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.) | Neighbor Solicitation & Router Advertisement |
A client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting? | HTTP |
What is an advantage for small organizations of adopting IMAP instead of POP? | Messages are kept in the mail servers until they are manually deleted from the email client. |
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem? | nslookup |
is a utility that generates a list of hops that were successfully reached along the path from source to destination.This list can provide important verification and troubleshooting information. | Traceroute (tracert) |
is used to display the IP configuration settings on a Windows PC. | ipconfig utility |
is used to identify which active TCP connections are open and running on a networked host. | Netstat utility |
is a utility that allows the user to manually query the name servers to resolve a given host name. This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers. | Nslookup |
The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command? | The switch can be remotely managed from a host on another network. |
What happens when the transport input ssh command is entered on the switch vty lines? | Communication between the switch and remote users is encrypted. |
poor handling of key electrical components(electrostatic discharge), lack of critical spare parts poor cabling, and poor labeling | maintenance threats |
temperature extremes(too hot or too cold) or humidity extremes (too wet or too dry) | environmental threats |
physical damage to server, routers, switches, cabling plant, and work workstation | hardware threats |
voltage spikes, insufficient supply voltage(brownouts), unconditioned (noise), and total power loss | electrical issues |
A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this? | reconnaissance |
What service is provided by HTTP? | A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web. |