CISCO Chapter 10 & 11

Descripción

FH Test sobre CISCO Chapter 10 & 11, creado por Leona W. el 01/11/2019.
Leona W.
Test por Leona W., actualizado hace más de 1 año
Leona W.
Creado por Leona W. hace más de 4 años
363
3

Resumen del Recurso

Pregunta 1

Pregunta
Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?
Respuesta
  • The switch will discard the frame.
  • The switch will forward the frame only to ports 1 and 3.
  • The switch will forward the frame to all ports.
  • The switch will forward the frame to all ports except port 4.
  • The switch will forward the frame only to port 2.

Pregunta 2

Pregunta
Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?
Respuesta
  • only host D
  • only hosts B, C, and router R1
  • only hosts B and C
  • only hosts A, B, C, and D
  • only hosts A, B, and C
  • only router R1

Pregunta 3

Pregunta
What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?
Respuesta
  • 1500 bytes
  • 1024 bytes
  • 512 bytes
  • 64 bytes

Pregunta 4

Pregunta
What is a characteristic of port-based memory buffering?
Respuesta
  • Frames in the memory buffer are dynamically linked to destination ports.
  • All ports on a switch share a single memory buffer.
  • Frames are buffered in queues linked to specific ports.
  • All frames are stored in a common memory buffer.

Pregunta 5

Pregunta
What is the aim of an ARP spoofing attack?
Respuesta
  • to overwhelm network hosts with ARP requests
  • to associate IP addresses to the wrong MAC address
  • to fill switch MAC address tables with bogus addresses
  • to flood the network with ARP reply broadcasts

Pregunta 6

Pregunta
Which two definitions accurately describe the associated application layer protocol? (Choose two.)
Respuesta
  • HTTP – enables devices on a network to obtain IP addresses
  • FTP – transfers email messages and attachments
  • SMTP – transfers web pages from web servers to clients
  • Telnet – provides remote access to servers and networking devices
  • DNS – resolves Internet names to IP addresses

Pregunta 7

Pregunta
The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)
Respuesta
  • application
  • transport
  • data link
  • presentation
  • network
  • session
  • physical

Pregunta 8

Pregunta
Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?
Respuesta
  • network access
  • application
  • presentation
  • session
  • internetwork

Pregunta 9

Pregunta
What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
Respuesta
  • the establishing of window size
  • closest to the end user
  • the creation and maintenance of dialogue between source and destination applications
  • responsibility for physical addressing
  • responsibility for logical addressing

Pregunta 10

Pregunta
A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)*
Respuesta
  • SMTP
  • DHCP
  • SNMP
  • DNS
  • HTTP
  • FTP

Pregunta 11

Pregunta
What is an example of network communication that uses the client-server model?
Respuesta
  • A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
  • A user prints a document by using a printer that is attached to a workstation of a coworker.
  • A workstation initiates an ARP to find the MAC address of a receiving host.
  • A user uses eMule to download a file that is shared by a friend after the file location is determined.

Pregunta 12

Pregunta
Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?
Respuesta
  • point-to-point
  • master-slave
  • client-based
  • peer-to-peer

Pregunta 13

Pregunta
What do the client/server and peer-to-peer network models have in common?
Respuesta
  • Both models are used only in the wired network environment.
  • Both models require the use of TCP/IP-based protocols.
  • Both models support devices in server and client roles.
  • Both models have dedicated servers.

Pregunta 14

Pregunta
What is an advantage for small organizations of adopting IMAP instead of POP?
Respuesta
  • POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.
  • IMAP sends and retrieves email, but POP only retrieves email.
  • When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
  • Messages are kept in the mail servers until they are manually deleted from the email client.

Pregunta 15

Pregunta
Which application layer protocol uses message types such as GET, PUT, and POST?
Respuesta
  • POP3
  • HTTP
  • SMTP
  • DHCP
  • DNS

Pregunta 16

Pregunta
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
Respuesta
  • HTTPS
  • SMTP
  • POP
  • IMAP

Pregunta 17

Pregunta
Which three statements describe a DHCP Discover message? (Choose three.)
Respuesta
  • Only the DHCP server receives the message.
  • All hosts receive the message, but only a DHCP server replies.
  • The message comes from a client seeking an IP address.
  • The message comes from a server offering an IP address.
  • The destination IP address is 255.255.255.255.
  • The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).

Pregunta 18

Pregunta
What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
Respuesta
  • index
  • http
  • www
  • .com

Pregunta 19

Pregunta
Which two tasks can be performed by a local DNS server? (Choose two.)
Respuesta
  • retrieving email messages
  • forwarding name resolution requests between servers
  • mapping name-to-IP addresses for internal hosts
  • allowing data transfer between two network devices
  • providing IP addresses to local hosts

Pregunta 20

Pregunta
Which phrase describes an FTP daemon?
Respuesta
  • an application that is used to request data from an FTP server
  • a program that is running on an FTP client
  • a program that is running on an FTP server
  • a diagnostic FTP program

Pregunta 21

Pregunta
Which statement is true about FTP?
Respuesta
  • FTP does not provide reliability during data transmission.
  • FTP is a peer-to-peer application.
  • The client can download data from or upload data to the server.
  • The client can choose if FTP is going to establish one or two connections with the server.

Pregunta 22

Pregunta
What is true about the Server Message Block protocol?
Respuesta
  • SMB uses the FTP protocol for communication.
  • SMB messages cannot authenticate a session.
  • Clients establish a long term connection to servers.
  • Different SMB message types have a different format.

Pregunta 23

Pregunta
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
Respuesta
  • SMB
  • DHCP
  • SMTP
  • HTTP

Pregunta 24

Pregunta
What is the acronym for the protocol that is used when securely communicating with a web server? ___ HTTPS____
Respuesta
  • True
  • False

Pregunta 25

Pregunta
The HTTP message type used by the client to request data from the web server is the ____GET___ message.
Respuesta
  • True
  • False

Pregunta 26

Pregunta
Refer to the exhibit. What command was used to resolve a given host name by querying the name servers? ___NSLOOKUP___
Respuesta
  • True
  • False

Pregunta 27

Pregunta
Which PC or PCs are sending FTP packets to the server?
Respuesta
  • PC_3
  • PC_1 and PC_3
  • PC_2
  • PC_1

Pregunta 28

Pregunta
A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
Respuesta
  • devices with support for modularity
  • redundant devices
  • devices that have support for network monitoring
  • devices with a fixed number and type of interfaces

Pregunta 29

Pregunta
Which network design consideration would be more important to a large corporation than to a small business?
Respuesta
  • redundancy
  • low port density switch
  • firewall
  • Internet router

Pregunta 30

Pregunta
Which two traffic types require delay sensitive delivery? (Choose two.)
Respuesta
  • video
  • voice
  • FTP
  • web
  • email

Pregunta 31

Pregunta
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth? (Choose three.)
Respuesta
  • listing of the current employees and their role in the company
  • inventory of the devices that are currently used on the network
  • history and mission statement of the company
  • analysis of the network traffic based on protocols, applications, and services used on the network
  • documentation of the current physical and logical topologies
  • human resource policies and procedures for all employees in the company

Pregunta 32

Pregunta
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)
Respuesta
  • Only capture WAN traffic because traffic to the web is responsible for the largest amount of traffic on a network.
  • Perform the capture on different network segments.
  • Capture traffic during peak utilization times to get a good representation of the different traffic types.
  • Only capture traffic in the areas of the network that receive most of the traffic such as the data center.
  • Capture traffic on the weekends when most employees are off work.

Pregunta 33

Pregunta
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
Respuesta
  • maintenance
  • electrical
  • environmental
  • configuration

Pregunta 34

Pregunta
Which type of network threat is intended to prevent authorized users from accessing resources?
Respuesta
  • trust exploitation
  • reconnaissance attacks
  • access attacks
  • DoS attacks

Pregunta 35

Pregunta
Which two actions can be taken to prevent a successful network attack on an email server account? (Choose two.)
Respuesta
  • Limit the number of unsuccessful attempts to log in to the server.
  • Distribute servers throughout the building, placing them close to the stakeholders.
  • Never use passwords that need the Shift key.
  • Use servers from different vendors.
  • Never send the password through the network in a clear text.

Pregunta 36

Pregunta
Which firewall feature is used to ensure that packets coming into a network are legitimate responses initiated from internal hosts?
Respuesta
  • packet filtering
  • URL filtering
  • stateful packet inspection
  • application filtering

Pregunta 37

Pregunta
What is the purpose of the network security authentication function?
Respuesta
  • to provide challenge and response questions
  • to keep track of the actions of a user
  • to determine which resources a user can access
  • to require users to prove who they are

Pregunta 38

Pregunta
A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?
Respuesta
  • a device that is trying to inspect the traffic on a link
  • an unidentified individual who is trying to access the network equipment room
  • a worm that is attempting to access another part of the network
  • a user who is trying to guess a password to access the router

Pregunta 39

Pregunta
What is the purpose of using SSH to connect to a router?
Respuesta
  • It allows secure transfer of the IOS software image from an unsecure workstation or server.
  • It allows the router to be monitored through a network management application.
  • It allows a secure remote connection to the router command line interface.
  • It allows a router to be configured using a graphical interface.

Pregunta 40

Pregunta
Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.)
Respuesta
  • Give the router a host name and domain name.
  • Create a banner that will be displayed to users when they connect.
  • Generate a set of secret keys to be used for encryption and decryption.
  • Set up an authentication server to handle incoming connection requests.
  • Enable SSH on the physical interfaces where the incoming connection requests will be received.

Pregunta 41

Pregunta
What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?
Respuesta
  • to copy the directories from the NVRAM
  • to list the content of the NVRAM
  • to direct all new files to the NVRAM
  • to clear the content of the NVRAM

Pregunta 42

Pregunta
Which command will backup the configuration that is stored in NVRAM to a TFTP server?
Respuesta
  • copy running-config tftp
  • copy tftp running-config
  • copy startup-config tftp
  • copy tftp startup-config

Pregunta 43

Pregunta
Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?
Respuesta
  • Connectivity between H1 and H3 is fine.
  • Something is causing a time delay between the networks.
  • Performance between the networks is within expected parameters.
  • Something is causing interference between H1 and R1.
  • H3 is not connected properly to the network.

Pregunta 44

Pregunta
When should an administrator establish a network baseline?
Respuesta
  • at regular intervals over a period of time
  • at the lowest point of traffic in the network
  • when there is a sudden drop in traffic
  • when the traffic is at peak in the network

Pregunta 45

Pregunta
Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?
Respuesta
  • PC2
  • SW1
  • R2
  • SW2
  • R1

Pregunta 46

Pregunta
Which statement is true about CDP on a Cisco device?
Respuesta
  • Because it runs at the data link layer, the CDP protocol can only be implemented in switches.
  • CDP can be disabled globally or on a specific interface.
  • To disable CDP globally, the no cdp enable command in interface configuration mode must be used.
  • The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity.

Pregunta 47

Pregunta
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?
Respuesta
  • the default gateway that is used by the switch
  • the path that is used to reach a specific host on another network
  • that a specific host on another network can be reached
  • the status of the switch interfaces and the address configured on interface vlan 1

Pregunta 48

Pregunta
A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?
Respuesta
  • The ARP cache is synchronized with the router interface.
  • The detailed information of the ARP cache is displayed.
  • The current content of the ARP cache is displayed.
  • The ARP cache is cleared.

Pregunta 49

Pregunta
A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option?
Respuesta
  • It sends 6 probes within each TTL time period.
  • It sets a 6 milliseconds timeout for each replay.
  • It limits the trace to only 6 hops.
  • It forces the trace to use IPv6.

Pregunta 50

Pregunta
Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH?
Respuesta
  • show running-config​
  • terminal monitor
  • logging synchronous
  • debug all

Pregunta 51

Pregunta
___VoIP____ defines the protocols and technologies that implement the transmission of voice data over an IP network
Respuesta
  • True
  • False

Pregunta 52

Pregunta
The show ___file systems___ command provides information about the amount of free nvram and flash memory with the permissions for reading or writing data.
Respuesta
  • True
  • False

Pregunta 53

Pregunta
The ___show version___ command that is issued on a router is used to verify the value of the software configuration register.
Respuesta
  • True
  • False
Mostrar resumen completo Ocultar resumen completo

Similar

Arbeitsrecht I
bram_kerschi_14
Ecuaciones (Primer Grado)
Diego Santos
Práctica de Biología para la Prepa 1
Raúl Fox
Formas de una función cuadrática
HECTOR ESPINOZA HERNANDEZ
Los Reyes Católicos - Resumen
maya velasquez
AMÉRICA: PAÍSES~CAPITALES...
Ulises Yo
LA REVOLUCIÓN FRANCESA
ROSA MARIA ARRIAGA
OPERACIONES CON POLINOMIOS
Leticia Pérez Nicolás
HUESOS DEL CRÁNEO
Emilia Vargas
Medicina Forense
Alfonso Tester