Final Exam Flashcards
(91 cards)
What is the maximum TTL for this destination?
A) 11
B) 12
C) 13
D) 14

C) 13
Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?
A) 192.168.1.1
B) 0.0.0.0
C) 0.0.1
D) 255.255.255.255
E) 127.0.0.1
E) 127.0.0.1
A host is accessing a Telnet server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)
- regenerating data signals
- acting as a client or a server
- providing a channel over which messages travel
- applying security settings to control the ftow of data
- notifying other devices when errors occur
- serving as the source or destination of the messages
regenerating data signals
applying security settings to control the ftow of data
notifying other devices when errors occur
Which statement is true about DHCP operation?
- When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.
- A client must wait for lease expiration before it sends another DHCPREOUEST message.
- The DHCPDISCOVER message contains the IP address and sub net masK to be assigned, the IP address of the DNS server, and the IP address of the default gateway.
- If the client receives several DHCPOFFER messages from different servers, it sends a unicast DHCPREOUEST message to the server from which it chooses to obtain the IP information.
When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network.
Which type of wireless security is easily compromised?
- EAP
- PSK
- WEP
- WPA
WEP
What types of addresses make up the majority of addresses within the /8 block 1Pv4 bit space?
- multicast addresses
- private addresses
- public addresses
- experimental addresses
public addresses
Which protocol supports rapid delivery of streaming media?
- Video over Internet Protocol
- Real-Time Transport Protocol
- Transmission Control Protocol
- Secure File Transfer Protocol
Real-Time Transport Protocol
A network administrator notices that the throughput on the network appears lower than expected when compared to the end-to-end network bandwidth. Which three factors can
explain this difference? (Choose three.)
- the amount of traffic
- the type of data encapsulation in use
- the type of traffic
- the number and type of network devices that the data is crossing
- the bandwidth of the connection to the ISP
- the reliability of the network backbone
the amount of traffic
the type of traffic
the number and type of network devices that the data is crossing
Which group of IPv6 addresses cannot be allocated as a host source address?
FECO::/10
FEBF::/10
FF00::/8
FDFF::/7
FF00::/8
A host PC is attempting to lease an address through DHCP. What message is sent by the server to the client know it is able to use the provided IP information?
DHCPDISCOVER
DHCPOFFER
DHCPPREQUEST
DHCPACK
DHCPNACK
DHCPOFFER
The network administrator enters these commands into the R1 router:
R1# copy running-config tftp
Address or name of remote host []?
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?
- 168.9.254
- 168.10.1
- 168.10.2
- 168.11.254
- 168.11.252

192.168.11.252
Which three statements characterize the transport layer protocols? (Choose three.)
TCP uses port numbers to provide reliable transportation of IP packets.
TCP and UDP port numbers are used by application layer protocols.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP and UDP port numbers are used by application layer protocols.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
What is the purpose of ICMP messages?
to inform routers about network topology changes
to ensure the delivery of an IP packet
to monitor the process of a domain name to IP address resolution
to provide feedback of IP packet transmissions
to provide feedback of IP packet transmissions
A technician uses the ping 127.0.0.1 command. What is the technician testing?
connectivity between a PC and the default gateway
connectivity between two adjacent Cisco devices
physical connectivity of a particular PC and the network
the TCP/IP stack on a network host
connectivity between two PCs on the same network
the TCP/IP stack on a network host
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
It notifies the sending host that the frame cannot be delivered.
It initiates an ARP request.
It forwards the frame out of all ports except for the port at which the frame was received.
It broadcasts the frame out of all ports on the switch.
It forwards the frame out of all ports except for the port at which the frame was received.
What is a characteristic of the LLC sublayer?
It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media.
It provides delimitation of data according to the physical signaling requirements of the medium.
It defines software processes that provide services to the physical layer.
It provides the logical addressing required that identifies the device.
It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media.
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?
VLAN 1
console 0
vty 0
FastEthernet0/1
VLAN 1
A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)
the reliability of the gigabit Ethernet infrastructure of the backbone
the amount of traffic that is currently crossing the network
the type of traffic that is crossing the network
the sophistication of the encapsulation method applied to the data
the bandwidth of the WAN connection to the Internet
the latency that is created by the number of network devices that the data is crossing
the amount of traffic that is currently crossing the network
the type of traffic that is crossing the network
the latency that is created by the number of network devices that the data is crossing
When applied to a router, which command would help mitigate brute-force password attacks against the router?
service password-encryption
login block-for 60 attempts 5 within 60
banner motd $Max failed logins = 5$
exec-timeout 30
login block-for 60 attempts 5 within 60
Which two statements correctly describe a router memory type and its contents? (Choose two.)
ROM is nonvolatile and contains basic diagnostic software.
FLASH is nonvolatile and contains a limited portion of the IOS.
ROM is nonvolatile and stores the running IOS.
RAM is volatile and stores the IP routing table.
NVRAM is nonvolatile and stores other system files.
ROM is nonvolatile and contains basic diagnostic software.
RAM is volatile and stores the IP routing table.
Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)
custom adapter
wireless bridge
media
wireless NIC
crossover cable
wireless client software
wireless NIC
wireless client software
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)
applying security settings to control the flow of data
notifying other devices when errors occur
regenerating data signals
acting as a client or a server
serving as the source or destination of the messages
providing a channel over which messages travel
applying security settings to control the flow of data
notifying other devices when errors occur
regenerating data signals
Match the things to the things


Which is the correct order for PDU Encapsulation?

Frame Header > Network Header > Transport Header > Data > Frame Trailer




















