Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

DsmbISP Practice Fin

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
What is used by a routing protocol to determine the best path to include in the routing table?   Metric  
🗑
How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?   2046  
🗑
What is one purpose of the TCP three-way handshake?   synchronizing sequence numbers between source and destination in preparation for data transfer  
🗑
Which two protocols allow network devices to report their status and events to a centralized network management device? (Choose two.)   Syslog SNMP  
🗑
Which two subnet masks could be used when subnetting a Class B IP address? (Choose two.)   255.255.255.240 255.255.192.0  
🗑
A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs?   DSL  
🗑
A Catalyst switch is used as a temp replacement for another switch that needs repairs. A minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?   The switch has failed POST and must be sent for service.  
🗑
Which statement describes a route that has been learned dynamically?   It is automatically updated and maintained by routing protocols.  
🗑
Which two statements are correct about the UDP protocol? (Choose two.)   It does not provide acknowledgment of receipt of data. It is a connectionless protocol.  
🗑
Which statement is true about FTP implementations?   FTP requires two connections, one for control and one for data.  
🗑
What is the function of the forward lookup DNS zone in the DNS name resolution process?   It resolves fully qualified domain names into IP addresses.  
🗑
Which statement correctly describes the difference between HTTP and HTTPS?   HTTPS authenticates and encrypts the data being transferred between the client and the web server.  
🗑
While troubleshooting a connectivity issue between two directly connected routers, the network administrator checks the encapsulation settings on the serial interfaces of both routers. Which layer of the OSI model is the administrator troubleshooting?   data link layer  
🗑
A host has been properly cabled and configured with a unique hostname and valid IP address. Which two additional components should be configured to enable the host to access remote resources? (Choose two.)   the subnet mask the default gateway  
🗑
When does a router enter the setup mode?   when the configuration is missing in NVRAM  
🗑
What routing protocol would be appropriate to use for exchanging routes between ISPs?   BGP  
🗑
Which application can be delivered using UDP?   DNS  
🗑
Which question provides troubleshooting information about a problem at Layer 1 or Layer 2 of the OSI model?   Is there a link light on the network card?  
🗑
Which routing algorithm does EIGRP use to calculate the best path to a destination within a network?   DUAL  
🗑
What is the function of the service password-encryption command in the Cisco IOS?   prevents passwords in configuration files from being easily read  
🗑
What happens when a segment is encapsulated into a packet?   A header with logical addresses is added.  
🗑
What is the purpose of the debug ip rip command?   displays routing update activity in real time  
🗑
Which action would a network security administrator take under the principle of least privilege?   Provide users with access to only necessary resources.  
🗑
An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem. What is an advantage to this approach?   targets the problem layer more quickly than other methods do  
🗑
What is the maximum unrepeated distance set by industry standards for UTP cable?   100 meters  
🗑
Wireless radio waves are associated with which layer of the OSI model?   Layer 1  
🗑
At which layer of the OSI model is the Ethernet family of technologies defined?   Layer 2  
🗑
Which transport layer protocol will allow segments to be exchanged between two hosts with low overhead and no mechanism for retransmission?   UDP  
🗑
Which storage media type is most commonly selected if cost effectiveness, large capacity, and transportability are the key factors being considered during implementation of a backup scheme?   digital tape  
🗑
When would TFTP in ROM monitor mode be used to restore a Cisco IOS image to a router?   when the router is set to boot from flash, but the Cisco IOS image in flash is corrupt or has been erased  
🗑
Which statement correctly describes the operation of DNS?   It uses a distributed hierarchy of servers to resolve hostnames to IP addresses.  
🗑
A computer is configured to receive an IP address dynamically. However, computer can't communicate w/other hosts on network. A network tech then determines that the computer has an IP address of 169.254.0.2/16. What is a possible cause for this problem?   The DHCP server pool is exhausted.  
🗑
A switch with 10/100/1000 Gigabit Ethernet ports is configured for autonegotiation. It is connected to a device with a 100 Mb/s port that is set to full-duplex. What speed and duplex setting will the switch use?   100 Mb/s and half-duplex  
🗑
A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task?   port-based Network Address Translation  
🗑
Which commands will configure a management interface on a LAN switch?   Switch(config)# interface vlan 1 Switch(config-if)# ip address 192.168.1.2 255.255.255.0  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: mpulse
Popular Computers sets