Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

Which two traffic types use the Real-Time Transport Protocol (RTP)?
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

Which wireless technology has low-power and data rate requirements making it popular in home automation applications?
Remaining cards (55)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CCNA1

FINALS pt.1

QuestionAnswer
Which two traffic types use the Real-Time Transport Protocol (RTP)? video, voice
Which wireless technology has low-power and data rate requirements making it popular in home automation applications? ZigBee
Which layer of the TCP/IP model provides a route to forward messages through an internetwork? internet
Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services? DNS
What are proprietary protocols? protocols developed by organizations who have control over their definition and operation
What service is provided by DNS? Resolves domain names, such as cisco.com, into IP addresses.
A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting? POP3
What command can be used on a Windows PC to see the IP configuration of that computer? ipconfig
A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use? peer-to-peer (P2P)
What characteristic describes a virus? malicious software or code running on an end device
This network portion of the address is assigned by the provider. global routing
This part of the address is used by an organization to identify subnets. subnet ID
This part of the address is the equivalent to the host portion of an IPv4 address. interface ID
What service is provided by Internet Messenger? An application that allows real-time chatting among remote users.
A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address? It will send an ARP request for the MAC address of the default gateway.
A client packet is received by a server. The packet has a destination port number of 53. What service is the client requesting? DNS
A network administrator is adding a new LAN to a branch office. The new LAN must support 25 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.224
What characteristic describes a Trojan horse? malicious software or code running on an end device
What service is provided by HTTPS? Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows? The data flow is being tracked based on the source port number that is used by each application.
A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.192
What characteristic describes a DoS attack? an attack that slows or crashes a device or network service
What service is provided by SMTP? Allows clients to send email to a mail server and the servers to send email to other servers.
Which scenario describes a function provided by the transport layer? A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
are used to identify the correct application and window within that application. source and destination port numbers
What does the term “attenuation” mean in data communication? loss of signal strength as distance increases
Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.) POP, DNS
What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.) message size, message encoding, delivery options
What are two characteristics of IP? (Choose two.) does not require a dedicated end-to-end connection & operates independently of the network media
This means that IP requires no end-to-end connection nor does it guarantee delivery of packets. connectionless
IP is also media independent, which means it operates independently of the network media carrying the packets. best effort protocol
What are two common causes of signal degradation when using UTP cabling? (Choose two.) improper termination, & low-quality cable or connectors
Which subnet would include the address 192.168.1.96 as a usable host address? 192.168.1.64/26
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.) Capture traffic during peak utilization times to get a good representation of the different traffic types.& Perform the capture on different network segments.
What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​ The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.
Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.) application, session, presentation
What will happen if the default gateway address is incorrectly configured on a host? The host cannot communicate with hosts in other networks.
features of ARP? If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.
features of ARP? If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.
A network administrator is adding a new LAN to a branch office. The new LAN must support 90 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.128
What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.) Neighbor Solicitation & Router Advertisement
A client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting? HTTP
What is an advantage for small organizations of adopting IMAP instead of POP? Messages are kept in the mail servers until they are manually deleted from the email client.
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem? nslookup
is a utility that generates a list of hops that were successfully reached along the path from source to destination.This list can provide important verification and troubleshooting information. Traceroute (tracert)
is used to display the IP configuration settings on a Windows PC. ipconfig utility
is used to identify which active TCP connections are open and running on a networked host. Netstat utility
is a utility that allows the user to manually query the name servers to resolve a given host name. This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers. Nslookup
The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command? The switch can be remotely managed from a host on another network.
What happens when the transport input ssh command is entered on the switch vty lines? Communication between the switch and remote users is encrypted.
poor handling of key electrical components(electrostatic discharge), lack of critical spare parts poor cabling, and poor labeling maintenance threats
temperature extremes(too hot or too cold) or humidity extremes (too wet or too dry) environmental threats
physical damage to server, routers, switches, cabling plant, and work workstation hardware threats
voltage spikes, insufficient supply voltage(brownouts), unconditioned (noise), and total power loss electrical issues
A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this? reconnaissance
What service is provided by HTTP? A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
Created by: cessy_comscie
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards