1.3-1.4 Flashcards

1
Q

A host uses Internet Protocol version 6 (IPv6). The host sends a packet over the Internet. The IPv6 packets insert into Internet Protocol version 4 (IPv4) packets. The packets route over the IPv4 network to their destination. What is providing this function?

Multicast addressing
Tunneling
Unique Local Addressing (ULA)
Dual-stack

A

Tunneling

Tunneling is an alternative to dual-stack routing. Tunneling can be used to deliver Internet Protocol version 6 (IPv6) packets across the Internet Protocol version 4 (IPv4) Internet. The IPv6 packets are inserted into IPv4 packets and routed over the IPv4 network to their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network manager is designing a network for a new company. The company will have over 300 hosts and will interconnect multiple switches to build the network fabric. What will the network manager use to connect the switches?

Virtual Local Area Network (VLAN) tag
Access port
Trunks
Tagged port

A

Trunks

A trunk is used for interconnections between switches on large networks. Each switch will be configured as a trunk port for this purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network manager adds a power injector to a switch that does not support Power over Ethernet (PoE). The only option available to the network manager is to use phantom power for the injector. Evaluate the characteristics of PoE and decide which pairs the network manager will use. (Select two).

3/6
4/5
7/8
1/2

A

3/6
1/2

If a switch does not support Power over Ethernet (PoE), a device called a power injector can be used. There are two modes, Mode A and Mode B, that can be used for this solution. Gigabit Ethernet only uses the Mode A method (also called phantom power). The scenario uses a 10GBASE Ethernet solution which requires the Mode A method. Power runs over pairs 1/2 and 3/6 for the Mode A method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network uses a dynamic routing protocol that requires the administrator to provide weighted elements such as reliability, bandwidth and load. Which routing protocol is in use?

Border Gateway Protocol (BGP)
Enhanced Interior Gateway Routing Protocol (EIGRP)
Open Shortest Path First (OSPF)
Routing Information Protocol (RIP)

A

Enhanced Interior Gateway Routing Protocol (EIGRP)

The Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector-based routing protocol and uses a metric composed of several administrator weighted elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user goes to the website www.shopping.com. A bastion host reviews the request to enter the site to verify the safety of the request. What has the company established to enable clients access to data on the private system without compromising the security of the internal network?

Demilitarized Zone (DMZ)
Port Address Translation (PAT)
Port forwarding
Network Address Translation (NAT)

A

Demilitarized Zone (DMZ)

The company is using a Demilitarized Zone (DMZ), also referred to as a perimeter network. The idea of a DMZ is that traffic cannot pass through it directly.

If communication is required between hosts on either side of a DMZ, a bastion host will take the request and check it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system uses a private address to send a packet within the internal network. The address is ff02::1. Compare private address types and determine what type of address the system is using.

A

A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What application can define policy decisions on the control plane?

Distributed switching
Software Defined Networking (SDN)
Storage Area Network (SAN)
Network Controller

A

A Software Defined Networking (SDN) application, or suite of applications, can be used to define policy decisions on the control plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of these simulates the use of port forwarding on a network?

A network has a 1:1 mapping between private network addresses and public addresses.

A router, configured like a web server, accepts incoming packets and changes the destination address to a designated host.

A firewall allows a host access based on the Internet Protocol (IP) address and the port the host uses.

A company has a single public Internet Protocol (IP) address that forwards packets to private IP addresses within the network.

A

A router, configured like a web server, accepts incoming packets and changes the destination address to a designated host.

Port forwarding uses a router’s public address for something like a web server. The router forwards incoming requests to a different Internet Protocol (IP) address. Port forwarding means that the router takes requests from the Internet for a specific application and changes the destination address to send the packet to a designated host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A host uses Internet Protocol version 6 (IPv6). The host sends a packet to another host and a router informs the host of a better route to take. Which protocol provides this function?

Neighbor Discovery Protocol (ND)
Router Advertisement (RA)
Dual-stack
Dynamic Host Configuration Protocol (DHCP)

A

Neighbor Discovery Protocol (ND)

The Neighbor Discovery Protocol’s (ND) main functions include redirection, which enables a router to inform a host of a better route to a particular destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A system sends a message to all link-local nodes via a multicast address. Compare private address types and conclude which address the system will use.

00: 5a:3b:08:5c:02
192. 152.160.120
ff: ff:ff:ff:ff:ff
ff02: 11

A

ff02:11

A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network manager cannot communicate with a system on the network that has an Internet Protocol (IP) address of 192.150.060.024. The manager uses the ping command and can reach the IP address. Recommend a command the network manager can use for troubleshooting the issue.

arp 192.150.060.024
arp -a 192.150.060.024
arp -d 192.150.060.024
arp -s 192.150.060.024

A

arp -a 192.150.060.024

It is possible that two systems on the network have the same Internet Protocol (IP) address and the Address Resolution Protocol (ARP) table has the other system stored in the cache. This can be verified by using the command arp -a 192.150.060.024 and reviewing the returned Media Access Control (MAC) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compare and differentiate the features of tagged and untagged ports. (Select two)

A frame will get tagged if it goes over a trunk port.

A switch receiving a tagged frame on an access port will block the frame.

A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged.

An untagged port will normally be one that is operating as a trunk.

A

A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged.

A frame will get tagged if it goes over a trunk port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The same hub has Host A1 and Host B1 connected. Host A1 sends a request to communicate with Host C2. Host B1 is communicating with Host C3. There is a delay in communications between Hosts A1 and C2, until the media is clear. Which Ethernet Protocol is providing this function?

Virtual Local Area Network (VLAN)
Broadcast Domain
Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

A

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol uses schemes such as “request to send” to gain access to the media. Nodes listen to the media before transmitting, and transmit when the media is clear. A node wanting to transmit, but detecting activity, must wait and try later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify the function that copies packets sent to one or more source ports to a destination port.

Switching loops
Bridge Protocol Data Unit (BPDU)
Port mirroring
Spanning tree

A

Port mirroring

Port mirroring copies all of the packets sent to one or more source ports to a mirror (or destination) port. On a Cisco switch, this is referred to as a Switched Port Analyzer (SPAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What will cause a switch to act like a hub and transmit a frame out of all ports, except the source port?

When the bridges in a network organize themselves into a hierarchy
When the MAC address table cannot find the MAC address
When frames begin to circulate the network perpetually.
When capturing and analyzing network traffic occurs

A

When the MAC address table cannot find the MAC address

If a Media Access Control (MAC) address cannot be found in the MAC address table, then the switch acts like a hub and transmits the frame out of all of the ports, except for the source port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What technology uses a router to rewrite an Internet Protocol version 6 (IPv6) packet to an Internet Protocol version 4 (IPv4) packet within the same network?

IPv6 Tunneling
Neighbor Discovery (ND)
Dual-stack
Router Advertisement (RA)

A

Dual-stack

Dual-stack hosts can run both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) simultaneously and communicate with devices configured with either type of address. One technology is Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) which uses a dual-stack router to rewrite an IPv6 packet to an IPv4 packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A packet passes through a router and the router classifies the packet using the Type of Service field. The classification prioritizes delivery. What framework provides this service?

Traffic shaping
Quality of Service (QoS)
Class of Service (CoS)
Differentiated Services (DiffServ)

A

Differentiated Services (DiffServ)

The Differentiated Services (DiffServ) framework classifies each packet passing through a device. DiffServ is a service tagging mechanism. It uses the Type of Service field in the Internet Protocol version 4 (IPv4) header and renames it the Differentiated Services field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A network manager configures a Routing Information Protocol (RIP) on the network. Consider the types of dynamic routing protocols to determine what features the protocol will provide.

The protocol will use a metric composed of several administrator weighted elements.
The protocol will perform routing between domains and is the routing protocol Internet Service Providers (ISPs) use.
The protocol will consider only one route to a given destination network.
The protocol will group networks, their connected hosts and routers within an autonomous system.

A

The protocol will consider only one route to a given destination network.

Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network. To help prevent looping, the maximum hop count allowed is 15.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What implementation will provide the ability for one host to forward information to another using any available path?

Distributed switching
Circuit-switched
Packet switching
Network nodes

A

Packet switching

Packet switching provides the ability for one host to forward information to another using any available path.

20
Q

A system uses a private address to send a packet within the internal network. The address is ff02::1. Compare private address types and determine what type of address the system is using.

Multicast
Broadcast
Internet Protocol (IP)
Unicast

A

Multicast

A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.

21
Q

What allows fine-grained control over traffic parameters?

Class of Service (CoS)
Traffic Shaping
Quality of Service (QoS)
DiffServ

A

Quality of Service (QoS)

Quality of Service (QoS) allows fine-grained control over traffic parameters. Protocols, such as Multiprotocol Label Switching (MPLS), provides QoS. MPLS can reserve the required bandwidth and pre-determine statistics when configuring the link.

22
Q

An Ethernet frame is transmitting across the network. A network manager uses the Wireshark packet capture application to view the Maximum Transmission Unit (MTU). What information will the network manager gain?

The Start Frame Delimiter (SFD) for clock synchronization.
The Media Access Control (MAC) addresses of the sending and receiving nodes.
The upper limit of the payload in the frame.
Verification that the contents of the frame matches at the sending and receiving node.

A

The upper limit of the payload in the frame.

The Maximum Transmission Unit (MTU) is the upper limit of the payload in an Ethernet frame. The official 802.3 standard defines a 2-byte field to specify the size of the data field or payload. The payload can normally be between 46 and 1500 bytes.

23
Q

Host A communicates with Host B via a web application. A router on Host B’s network is configured to accept incoming requests for this application. The router takes the request over port 80 and changes the destination address to route the packet to Host B. What does this scenario simulate?

Network Address Translation (NAT)
Access Control List (ACL)
Port forwarding
Port Address Translation (PAT)

A

Port forwarding

Port forwarding uses a router’s public address for something like a web server. The router forwards incoming requests to a different Internet Protocol (IP) address. Port forwarding means that the router takes requests from the Internet for a specific application and changes the destination address to send the packet to a designated host.

24
Q

What is the first range for Class A IP addresses?

A

1-126

25
Q

What is the first range for Class B IP addresses?

A

128-191

26
Q

What is the first range for Class C IP addresses?

A

192-223

27
Q

The hosts on a company’s network all use a public Internet Protocol (IP) address. The first octet in the IP range is 132. Determine which class the network belongs to after comparing the octet ranges of the following classes of addresses.

Class A
Class B
Class C
Class D

A

Class B

28
Q

A host with a Media Access Control (MAC) of 00:72:8b:31:8b:cb uses a global scope addressing scheme. Compose the MAC-derived address for the Extended Unique Identifier (EUI) 64.

0272: 8bff:fe31:8bcb
0272: 8bff:ee31:8bcb
0072: 8bff:ee31:8bcb
0072: 8bff:fe31:8bcb

A

0272:8bff:fe31:8bcb

Globally scoped unicast addresses are routable over the Internet and are the equivalent of public Internet Protocol version 4 (IPv4) addresses. A MAC address is 48 bits and an Extended Unique Identifier (EUI)-64 creates a 64-bit interface. The digits fffe are added in the middle of the address and the Universally Administered (U)/Locally Administered (L) bit is flipped. The proper EUI-64 in this scenario is 0272:8bff:fe31:8bcb.

29
Q

What provides additional option settings, rather than leases for host Internet Protocol (IP) addresses?

Automatic Private IP Addressing (APIPA)
Static IP addressing
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol version 6 (DHCPv6)

A

Dynamic Host Configuration Protocol version 6 (DHCPv6)

Internet Protocol version 6 (IPv6) can locate routers and generate a host address with a suitable network prefix. In this context, the role of a Dynamic Host Configuration Protocol (DHCP) server in IPv6 is different. DHCPv6 is used to provide additional option settings, rather than leases for host IP addresses.

30
Q

What is the Internet Protocol (IP) address of a router on the same IP network as the host?

Subnet mask
Default gateway
Virtual IP
Loopback address

A

Default gateway

The default gateway is the Internet Protocol (IP) address of a router on the same IP network as the host.

31
Q

What is the Internet Protocol (IP) address of a router on the same IP network as the host?

Subnet mask
Default gateway
Virtual IP
Loopback address

A

Default gateway

The default gateway is the Internet Protocol (IP) address of a router on the same IP network as the host.

32
Q

What provides mapping of a Media Access Control (MAC) address to a specific Internet Protocol (IP) address within the Dynamic Host Configuration Protocol (DHCP) server’s address pool?

IP reservation
DHCP relay agent
Static IP addressing
Dynamic allocation

A

IP reservation

An Internet Protocol (IP) reservation is a mapping of a Media Access Control (MAC) address to a specific IP address within the Dynamic Host Configuration Protocol (DHCP) server’s address pool.

33
Q

A company has 725 hosts on the network that utilize public Internet Protocol (IP) addresses. The company has three contiguous class C addresses for the hosts. The company implemented Classless Inter-Domain Routing (CIDR) to assist with the maintenance of the three networks. What will CIDR provide to the network?

CIDR will provide groups of address ranges reserved for special use and are not publicly routable.
CIDR will allow a network designer to allocate ranges of IP addresses to subnets that match the predicted need for numbers of subnets and hosts.
CIDR will provide translation between the private and public addresses.
CIDR will use bits normally assigned to the network ID to mask the complexity of the subnet and host address scheme.

A

CIDR will use bits normally assigned to the network ID to mask the complexity of the subnet and host address scheme.

The company is using Classless Inter-Domain Routing (CIDR). CIDR uses bits normally assigned to the network ID to mask the complexity of the subnet and host addressing scheme within the network. CIDR collapses the three routing entries into one single entry.

34
Q

What allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for the number of subnets and hosts per subnet?

Public addressing
Private addressing
Variable Length Subnet Masks (VLSMs)
Classless Inter-Domain Routing (CIDR)

A

Variable Length Subnet Masks (VLSMs)

Variable Length Subnet Masks (VLSMs) allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for numbers of subnets and hosts per subnet.

35
Q

What is the first range for Class D IP address?

A

224-239, remember this is the reserved class for private

36
Q

What is the range and mask for Class D Private IP addresses?

A

224-239, remember this is the reserved class for private

37
Q

What is the range and mask for Class A Private IP addresses?

A
class a private ip address range 
10.0.0.0-10.255.255.255

dsm 255.0.0.0

38
Q

What is the range and mask for Class B Private IP addresses?

A
class b private ip address range 
172.16.0.0 - 172.31.255.255

dsm 255.255.0.0

39
Q

What is the range and mask for Class C Private IP addresses?

A
class c private ip address range 
192.168.0.0 - 192.168.255.255

dsm 255.255.255.0

40
Q

What is special about APIPA?

A

Within the B range, IPs are carve out for Automatic Private IP Addressing or APIPA. With APIPA, the OS will dynamically assign an IP address to a device when the DHCP server is unavailable or the device is not manually addressed. The range of IPs carved out for APIPA within class B is 169.254.0.0-169.254.255.255. The DSM is 255.255.0.0

41
Q

What is special about Loopback?

A

Loopback refers the device to itself and is used for testing. Loopback is has a designated range within Class A, 127.0.01-127.255.255.255. DSM 255.0.0.0

42
Q

A consumer troubleshoots a security system that ties into a garage door opener. Which of the following protocols does the system likely use?

ANT+
RFID
Z-Wave
802.11

A

Z-Wave

Z-Wave creates a mesh network topology, using low-energy radio waves to communicate from one appliance to another for home automation purposes.

43
Q

An IT engineer troubleshoots a small network. Previously, IT wired all nodes to a central closet. In the closet, the engineer discovers a hub believed to be a switch. Of the choices given, which represents the current physical topology and the current logical topology?

Mesh, star
Star, bus
Star, star
Star, ring

A

Star, bus

A physical star network can be used to implement a logical bus topology. When a device, such as a hub, is used at the center of the star, logically, the topology works like a single cable bus.

44
Q

An engineer for a large firm documents the internal computer network. A diagram the engineer creates shows a top-down view of the Ethernet infrastructure in a hub and spoke layout. While considering the physical and logical topologies of the network, determine which choices qualify. (Choose two)

Ring
LAN
Star
Bus

A

Star
Bus

A star topology is a physical network design in which each node is connected to a central point. A star network is also referred to as a hub and spoke network.

A logical bus topology is one in which nodes receive the data transmitted all at the same time, regardless of the physical wiring layout of the network. A star network operates as a logical bus network.

45
Q

A consumer configures a new fitness device to communicate with a mobile phone by using very low power consumption. Which protocol does the consumer use with the devices?

IR
NFC
Bluetooth
ANT+

A

ANT+

ANT+ has seen widespread use in communicating health and fitness sensor data between devices. It uses a similar radio frequency range to Bluetooth, but has a very low power consumption.

46
Q

Which of the following network types may use an ad hoc topology?

WLAN
WAN
MAN
CAN

A

WLAN

In a wireless LAN (WLAN), an ad hoc topology occurs when wireless adapters allow connections to and from other devices. In 802.11 documentation, this is referred to as an Independent Basic Service Set (IBSS).

47
Q

Users at a medium sized business utilize an ad hoc approach when connecting wireless devices. Review the following properties and determine which applies to an ad hoc topology.

It uses an independent basic service set (IBSS).
Stations can perform path discovery.
It connects in hub and spoke fashion.
It uses a basic service set (BSS).

A

It uses an independent basic service set (IBSS).

In an ad hoc topology, the wireless adapter allows connections to and from other devices. In 802.11 documentation, this is referred to as an independent basic service set (IBSS).