CISCO Chapter 10 & 11

Descrição

FH Quiz sobre CISCO Chapter 10 & 11, criado por Leona W. em 01-11-2019.
Leona W.
Quiz por Leona W., atualizado more than 1 year ago
Leona W.
Criado por Leona W. mais de 4 anos atrás
363
3

Resumo de Recurso

Questão 1

Questão
Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?
Responda
  • The switch will discard the frame.
  • The switch will forward the frame only to ports 1 and 3.
  • The switch will forward the frame to all ports.
  • The switch will forward the frame to all ports except port 4.
  • The switch will forward the frame only to port 2.

Questão 2

Questão
Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?
Responda
  • only host D
  • only hosts B, C, and router R1
  • only hosts B and C
  • only hosts A, B, C, and D
  • only hosts A, B, and C
  • only router R1

Questão 3

Questão
What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?
Responda
  • 1500 bytes
  • 1024 bytes
  • 512 bytes
  • 64 bytes

Questão 4

Questão
What is a characteristic of port-based memory buffering?
Responda
  • Frames in the memory buffer are dynamically linked to destination ports.
  • All ports on a switch share a single memory buffer.
  • Frames are buffered in queues linked to specific ports.
  • All frames are stored in a common memory buffer.

Questão 5

Questão
What is the aim of an ARP spoofing attack?
Responda
  • to overwhelm network hosts with ARP requests
  • to associate IP addresses to the wrong MAC address
  • to fill switch MAC address tables with bogus addresses
  • to flood the network with ARP reply broadcasts

Questão 6

Questão
Which two definitions accurately describe the associated application layer protocol? (Choose two.)
Responda
  • HTTP – enables devices on a network to obtain IP addresses
  • FTP – transfers email messages and attachments
  • SMTP – transfers web pages from web servers to clients
  • Telnet – provides remote access to servers and networking devices
  • DNS – resolves Internet names to IP addresses

Questão 7

Questão
The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)
Responda
  • application
  • transport
  • data link
  • presentation
  • network
  • session
  • physical

Questão 8

Questão
Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?
Responda
  • network access
  • application
  • presentation
  • session
  • internetwork

Questão 9

Questão
What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
Responda
  • the establishing of window size
  • closest to the end user
  • the creation and maintenance of dialogue between source and destination applications
  • responsibility for physical addressing
  • responsibility for logical addressing

Questão 10

Questão
A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)*
Responda
  • SMTP
  • DHCP
  • SNMP
  • DNS
  • HTTP
  • FTP

Questão 11

Questão
What is an example of network communication that uses the client-server model?
Responda
  • A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
  • A user prints a document by using a printer that is attached to a workstation of a coworker.
  • A workstation initiates an ARP to find the MAC address of a receiving host.
  • A user uses eMule to download a file that is shared by a friend after the file location is determined.

Questão 12

Questão
Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?
Responda
  • point-to-point
  • master-slave
  • client-based
  • peer-to-peer

Questão 13

Questão
What do the client/server and peer-to-peer network models have in common?
Responda
  • Both models are used only in the wired network environment.
  • Both models require the use of TCP/IP-based protocols.
  • Both models support devices in server and client roles.
  • Both models have dedicated servers.

Questão 14

Questão
What is an advantage for small organizations of adopting IMAP instead of POP?
Responda
  • POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.
  • IMAP sends and retrieves email, but POP only retrieves email.
  • When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
  • Messages are kept in the mail servers until they are manually deleted from the email client.

Questão 15

Questão
Which application layer protocol uses message types such as GET, PUT, and POST?
Responda
  • POP3
  • HTTP
  • SMTP
  • DHCP
  • DNS

Questão 16

Questão
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
Responda
  • HTTPS
  • SMTP
  • POP
  • IMAP

Questão 17

Questão
Which three statements describe a DHCP Discover message? (Choose three.)
Responda
  • Only the DHCP server receives the message.
  • All hosts receive the message, but only a DHCP server replies.
  • The message comes from a client seeking an IP address.
  • The message comes from a server offering an IP address.
  • The destination IP address is 255.255.255.255.
  • The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).

Questão 18

Questão
What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
Responda
  • index
  • http
  • www
  • .com

Questão 19

Questão
Which two tasks can be performed by a local DNS server? (Choose two.)
Responda
  • retrieving email messages
  • forwarding name resolution requests between servers
  • mapping name-to-IP addresses for internal hosts
  • allowing data transfer between two network devices
  • providing IP addresses to local hosts

Questão 20

Questão
Which phrase describes an FTP daemon?
Responda
  • an application that is used to request data from an FTP server
  • a program that is running on an FTP client
  • a program that is running on an FTP server
  • a diagnostic FTP program

Questão 21

Questão
Which statement is true about FTP?
Responda
  • FTP does not provide reliability during data transmission.
  • FTP is a peer-to-peer application.
  • The client can download data from or upload data to the server.
  • The client can choose if FTP is going to establish one or two connections with the server.

Questão 22

Questão
What is true about the Server Message Block protocol?
Responda
  • SMB uses the FTP protocol for communication.
  • SMB messages cannot authenticate a session.
  • Clients establish a long term connection to servers.
  • Different SMB message types have a different format.

Questão 23

Questão
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
Responda
  • SMB
  • DHCP
  • SMTP
  • HTTP

Questão 24

Questão
What is the acronym for the protocol that is used when securely communicating with a web server? ___ HTTPS____
Responda
  • True
  • False

Questão 25

Questão
The HTTP message type used by the client to request data from the web server is the ____GET___ message.
Responda
  • True
  • False

Questão 26

Questão
Refer to the exhibit. What command was used to resolve a given host name by querying the name servers? ___NSLOOKUP___
Responda
  • True
  • False

Questão 27

Questão
Which PC or PCs are sending FTP packets to the server?
Responda
  • PC_3
  • PC_1 and PC_3
  • PC_2
  • PC_1

Questão 28

Questão
A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
Responda
  • devices with support for modularity
  • redundant devices
  • devices that have support for network monitoring
  • devices with a fixed number and type of interfaces

Questão 29

Questão
Which network design consideration would be more important to a large corporation than to a small business?
Responda
  • redundancy
  • low port density switch
  • firewall
  • Internet router

Questão 30

Questão
Which two traffic types require delay sensitive delivery? (Choose two.)
Responda
  • video
  • voice
  • FTP
  • web
  • email

Questão 31

Questão
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth? (Choose three.)
Responda
  • listing of the current employees and their role in the company
  • inventory of the devices that are currently used on the network
  • history and mission statement of the company
  • analysis of the network traffic based on protocols, applications, and services used on the network
  • documentation of the current physical and logical topologies
  • human resource policies and procedures for all employees in the company

Questão 32

Questão
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)
Responda
  • Only capture WAN traffic because traffic to the web is responsible for the largest amount of traffic on a network.
  • Perform the capture on different network segments.
  • Capture traffic during peak utilization times to get a good representation of the different traffic types.
  • Only capture traffic in the areas of the network that receive most of the traffic such as the data center.
  • Capture traffic on the weekends when most employees are off work.

Questão 33

Questão
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
Responda
  • maintenance
  • electrical
  • environmental
  • configuration

Questão 34

Questão
Which type of network threat is intended to prevent authorized users from accessing resources?
Responda
  • trust exploitation
  • reconnaissance attacks
  • access attacks
  • DoS attacks

Questão 35

Questão
Which two actions can be taken to prevent a successful network attack on an email server account? (Choose two.)
Responda
  • Limit the number of unsuccessful attempts to log in to the server.
  • Distribute servers throughout the building, placing them close to the stakeholders.
  • Never use passwords that need the Shift key.
  • Use servers from different vendors.
  • Never send the password through the network in a clear text.

Questão 36

Questão
Which firewall feature is used to ensure that packets coming into a network are legitimate responses initiated from internal hosts?
Responda
  • packet filtering
  • URL filtering
  • stateful packet inspection
  • application filtering

Questão 37

Questão
What is the purpose of the network security authentication function?
Responda
  • to provide challenge and response questions
  • to keep track of the actions of a user
  • to determine which resources a user can access
  • to require users to prove who they are

Questão 38

Questão
A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?
Responda
  • a device that is trying to inspect the traffic on a link
  • an unidentified individual who is trying to access the network equipment room
  • a worm that is attempting to access another part of the network
  • a user who is trying to guess a password to access the router

Questão 39

Questão
What is the purpose of using SSH to connect to a router?
Responda
  • It allows secure transfer of the IOS software image from an unsecure workstation or server.
  • It allows the router to be monitored through a network management application.
  • It allows a secure remote connection to the router command line interface.
  • It allows a router to be configured using a graphical interface.

Questão 40

Questão
Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.)
Responda
  • Give the router a host name and domain name.
  • Create a banner that will be displayed to users when they connect.
  • Generate a set of secret keys to be used for encryption and decryption.
  • Set up an authentication server to handle incoming connection requests.
  • Enable SSH on the physical interfaces where the incoming connection requests will be received.

Questão 41

Questão
What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?
Responda
  • to copy the directories from the NVRAM
  • to list the content of the NVRAM
  • to direct all new files to the NVRAM
  • to clear the content of the NVRAM

Questão 42

Questão
Which command will backup the configuration that is stored in NVRAM to a TFTP server?
Responda
  • copy running-config tftp
  • copy tftp running-config
  • copy startup-config tftp
  • copy tftp startup-config

Questão 43

Questão
Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?
Responda
  • Connectivity between H1 and H3 is fine.
  • Something is causing a time delay between the networks.
  • Performance between the networks is within expected parameters.
  • Something is causing interference between H1 and R1.
  • H3 is not connected properly to the network.

Questão 44

Questão
When should an administrator establish a network baseline?
Responda
  • at regular intervals over a period of time
  • at the lowest point of traffic in the network
  • when there is a sudden drop in traffic
  • when the traffic is at peak in the network

Questão 45

Questão
Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?
Responda
  • PC2
  • SW1
  • R2
  • SW2
  • R1

Questão 46

Questão
Which statement is true about CDP on a Cisco device?
Responda
  • Because it runs at the data link layer, the CDP protocol can only be implemented in switches.
  • CDP can be disabled globally or on a specific interface.
  • To disable CDP globally, the no cdp enable command in interface configuration mode must be used.
  • The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity.

Questão 47

Questão
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?
Responda
  • the default gateway that is used by the switch
  • the path that is used to reach a specific host on another network
  • that a specific host on another network can be reached
  • the status of the switch interfaces and the address configured on interface vlan 1

Questão 48

Questão
A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?
Responda
  • The ARP cache is synchronized with the router interface.
  • The detailed information of the ARP cache is displayed.
  • The current content of the ARP cache is displayed.
  • The ARP cache is cleared.

Questão 49

Questão
A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option?
Responda
  • It sends 6 probes within each TTL time period.
  • It sets a 6 milliseconds timeout for each replay.
  • It limits the trace to only 6 hops.
  • It forces the trace to use IPv6.

Questão 50

Questão
Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH?
Responda
  • show running-config​
  • terminal monitor
  • logging synchronous
  • debug all

Questão 51

Questão
___VoIP____ defines the protocols and technologies that implement the transmission of voice data over an IP network
Responda
  • True
  • False

Questão 52

Questão
The show ___file systems___ command provides information about the amount of free nvram and flash memory with the permissions for reading or writing data.
Responda
  • True
  • False

Questão 53

Questão
The ___show version___ command that is issued on a router is used to verify the value of the software configuration register.
Responda
  • True
  • False

Semelhante

Arbeitsrecht I
bram_kerschi_14
GEOMETRIA MOLECULAR
Yani
Introdução ao Microsoft Word
Roberto Becker
Projeto Med 2015: História e Geografia_2
Gleisson Bissoli
Geografia- ENERGIA
jpedrohenriques
Psicologia Social Contemporânea
ANDERSON NUNES
Fisiologia Humana
Felipe Penha
Dos Direitos da Personalidade (Arts. 11º ao 21º)
Luiz Concursos
Nutrição para o Cérebro e a Memória
Joana Meira
Lei nº 8.666/1993
Lavs Agah