CISCO Chapter 10 & 11

Description

FH Quiz on CISCO Chapter 10 & 11, created by Leona W. on 01/11/2019.
Leona W.
Quiz by Leona W., updated more than 1 year ago
Leona W.
Created by Leona W. about 5 years ago
378
3

Resource summary

Question 1

Question
Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?
Answer
  • The switch will discard the frame.
  • The switch will forward the frame only to ports 1 and 3.
  • The switch will forward the frame to all ports.
  • The switch will forward the frame to all ports except port 4.
  • The switch will forward the frame only to port 2.

Question 2

Question
Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?
Answer
  • only host D
  • only hosts B, C, and router R1
  • only hosts B and C
  • only hosts A, B, C, and D
  • only hosts A, B, and C
  • only router R1

Question 3

Question
What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?
Answer
  • 1500 bytes
  • 1024 bytes
  • 512 bytes
  • 64 bytes

Question 4

Question
What is a characteristic of port-based memory buffering?
Answer
  • Frames in the memory buffer are dynamically linked to destination ports.
  • All ports on a switch share a single memory buffer.
  • Frames are buffered in queues linked to specific ports.
  • All frames are stored in a common memory buffer.

Question 5

Question
What is the aim of an ARP spoofing attack?
Answer
  • to overwhelm network hosts with ARP requests
  • to associate IP addresses to the wrong MAC address
  • to fill switch MAC address tables with bogus addresses
  • to flood the network with ARP reply broadcasts

Question 6

Question
Which two definitions accurately describe the associated application layer protocol? (Choose two.)
Answer
  • HTTP – enables devices on a network to obtain IP addresses
  • FTP – transfers email messages and attachments
  • SMTP – transfers web pages from web servers to clients
  • Telnet – provides remote access to servers and networking devices
  • DNS – resolves Internet names to IP addresses

Question 7

Question
The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)
Answer
  • application
  • transport
  • data link
  • presentation
  • network
  • session
  • physical

Question 8

Question
Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?
Answer
  • network access
  • application
  • presentation
  • session
  • internetwork

Question 9

Question
What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
Answer
  • the establishing of window size
  • closest to the end user
  • the creation and maintenance of dialogue between source and destination applications
  • responsibility for physical addressing
  • responsibility for logical addressing

Question 10

Question
A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)*
Answer
  • SMTP
  • DHCP
  • SNMP
  • DNS
  • HTTP
  • FTP

Question 11

Question
What is an example of network communication that uses the client-server model?
Answer
  • A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
  • A user prints a document by using a printer that is attached to a workstation of a coworker.
  • A workstation initiates an ARP to find the MAC address of a receiving host.
  • A user uses eMule to download a file that is shared by a friend after the file location is determined.

Question 12

Question
Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?
Answer
  • point-to-point
  • master-slave
  • client-based
  • peer-to-peer

Question 13

Question
What do the client/server and peer-to-peer network models have in common?
Answer
  • Both models are used only in the wired network environment.
  • Both models require the use of TCP/IP-based protocols.
  • Both models support devices in server and client roles.
  • Both models have dedicated servers.

Question 14

Question
What is an advantage for small organizations of adopting IMAP instead of POP?
Answer
  • POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.
  • IMAP sends and retrieves email, but POP only retrieves email.
  • When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
  • Messages are kept in the mail servers until they are manually deleted from the email client.

Question 15

Question
Which application layer protocol uses message types such as GET, PUT, and POST?
Answer
  • POP3
  • HTTP
  • SMTP
  • DHCP
  • DNS

Question 16

Question
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
Answer
  • HTTPS
  • SMTP
  • POP
  • IMAP

Question 17

Question
Which three statements describe a DHCP Discover message? (Choose three.)
Answer
  • Only the DHCP server receives the message.
  • All hosts receive the message, but only a DHCP server replies.
  • The message comes from a client seeking an IP address.
  • The message comes from a server offering an IP address.
  • The destination IP address is 255.255.255.255.
  • The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).

Question 18

Question
What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
Answer
  • index
  • http
  • www
  • .com

Question 19

Question
Which two tasks can be performed by a local DNS server? (Choose two.)
Answer
  • retrieving email messages
  • forwarding name resolution requests between servers
  • mapping name-to-IP addresses for internal hosts
  • allowing data transfer between two network devices
  • providing IP addresses to local hosts

Question 20

Question
Which phrase describes an FTP daemon?
Answer
  • an application that is used to request data from an FTP server
  • a program that is running on an FTP client
  • a program that is running on an FTP server
  • a diagnostic FTP program

Question 21

Question
Which statement is true about FTP?
Answer
  • FTP does not provide reliability during data transmission.
  • FTP is a peer-to-peer application.
  • The client can download data from or upload data to the server.
  • The client can choose if FTP is going to establish one or two connections with the server.

Question 22

Question
What is true about the Server Message Block protocol?
Answer
  • SMB uses the FTP protocol for communication.
  • SMB messages cannot authenticate a session.
  • Clients establish a long term connection to servers.
  • Different SMB message types have a different format.

Question 23

Question
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
Answer
  • SMB
  • DHCP
  • SMTP
  • HTTP

Question 24

Question
What is the acronym for the protocol that is used when securely communicating with a web server? ___ HTTPS____
Answer
  • True
  • False

Question 25

Question
The HTTP message type used by the client to request data from the web server is the ____GET___ message.
Answer
  • True
  • False

Question 26

Question
Refer to the exhibit. What command was used to resolve a given host name by querying the name servers? ___NSLOOKUP___
Answer
  • True
  • False

Question 27

Question
Which PC or PCs are sending FTP packets to the server?
Answer
  • PC_3
  • PC_1 and PC_3
  • PC_2
  • PC_1

Question 28

Question
A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
Answer
  • devices with support for modularity
  • redundant devices
  • devices that have support for network monitoring
  • devices with a fixed number and type of interfaces

Question 29

Question
Which network design consideration would be more important to a large corporation than to a small business?
Answer
  • redundancy
  • low port density switch
  • firewall
  • Internet router

Question 30

Question
Which two traffic types require delay sensitive delivery? (Choose two.)
Answer
  • video
  • voice
  • FTP
  • web
  • email

Question 31

Question
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth. Which three types of information should be used to plan for network growth? (Choose three.)
Answer
  • listing of the current employees and their role in the company
  • inventory of the devices that are currently used on the network
  • history and mission statement of the company
  • analysis of the network traffic based on protocols, applications, and services used on the network
  • documentation of the current physical and logical topologies
  • human resource policies and procedures for all employees in the company

Question 32

Question
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)
Answer
  • Only capture WAN traffic because traffic to the web is responsible for the largest amount of traffic on a network.
  • Perform the capture on different network segments.
  • Capture traffic during peak utilization times to get a good representation of the different traffic types.
  • Only capture traffic in the areas of the network that receive most of the traffic such as the data center.
  • Capture traffic on the weekends when most employees are off work.

Question 33

Question
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
Answer
  • maintenance
  • electrical
  • environmental
  • configuration

Question 34

Question
Which type of network threat is intended to prevent authorized users from accessing resources?
Answer
  • trust exploitation
  • reconnaissance attacks
  • access attacks
  • DoS attacks

Question 35

Question
Which two actions can be taken to prevent a successful network attack on an email server account? (Choose two.)
Answer
  • Limit the number of unsuccessful attempts to log in to the server.
  • Distribute servers throughout the building, placing them close to the stakeholders.
  • Never use passwords that need the Shift key.
  • Use servers from different vendors.
  • Never send the password through the network in a clear text.

Question 36

Question
Which firewall feature is used to ensure that packets coming into a network are legitimate responses initiated from internal hosts?
Answer
  • packet filtering
  • URL filtering
  • stateful packet inspection
  • application filtering

Question 37

Question
What is the purpose of the network security authentication function?
Answer
  • to provide challenge and response questions
  • to keep track of the actions of a user
  • to determine which resources a user can access
  • to require users to prove who they are

Question 38

Question
A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?
Answer
  • a device that is trying to inspect the traffic on a link
  • an unidentified individual who is trying to access the network equipment room
  • a worm that is attempting to access another part of the network
  • a user who is trying to guess a password to access the router

Question 39

Question
What is the purpose of using SSH to connect to a router?
Answer
  • It allows secure transfer of the IOS software image from an unsecure workstation or server.
  • It allows the router to be monitored through a network management application.
  • It allows a secure remote connection to the router command line interface.
  • It allows a router to be configured using a graphical interface.

Question 40

Question
Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.)
Answer
  • Give the router a host name and domain name.
  • Create a banner that will be displayed to users when they connect.
  • Generate a set of secret keys to be used for encryption and decryption.
  • Set up an authentication server to handle incoming connection requests.
  • Enable SSH on the physical interfaces where the incoming connection requests will be received.

Question 41

Question
What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?
Answer
  • to copy the directories from the NVRAM
  • to list the content of the NVRAM
  • to direct all new files to the NVRAM
  • to clear the content of the NVRAM

Question 42

Question
Which command will backup the configuration that is stored in NVRAM to a TFTP server?
Answer
  • copy running-config tftp
  • copy tftp running-config
  • copy startup-config tftp
  • copy tftp startup-config

Question 43

Question
Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?
Answer
  • Connectivity between H1 and H3 is fine.
  • Something is causing a time delay between the networks.
  • Performance between the networks is within expected parameters.
  • Something is causing interference between H1 and R1.
  • H3 is not connected properly to the network.

Question 44

Question
When should an administrator establish a network baseline?
Answer
  • at regular intervals over a period of time
  • at the lowest point of traffic in the network
  • when there is a sudden drop in traffic
  • when the traffic is at peak in the network

Question 45

Question
Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?
Answer
  • PC2
  • SW1
  • R2
  • SW2
  • R1

Question 46

Question
Which statement is true about CDP on a Cisco device?
Answer
  • Because it runs at the data link layer, the CDP protocol can only be implemented in switches.
  • CDP can be disabled globally or on a specific interface.
  • To disable CDP globally, the no cdp enable command in interface configuration mode must be used.
  • The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity.

Question 47

Question
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?
Answer
  • the default gateway that is used by the switch
  • the path that is used to reach a specific host on another network
  • that a specific host on another network can be reached
  • the status of the switch interfaces and the address configured on interface vlan 1

Question 48

Question
A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?
Answer
  • The ARP cache is synchronized with the router interface.
  • The detailed information of the ARP cache is displayed.
  • The current content of the ARP cache is displayed.
  • The ARP cache is cleared.

Question 49

Question
A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option?
Answer
  • It sends 6 probes within each TTL time period.
  • It sets a 6 milliseconds timeout for each replay.
  • It limits the trace to only 6 hops.
  • It forces the trace to use IPv6.

Question 50

Question
Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH?
Answer
  • show running-config​
  • terminal monitor
  • logging synchronous
  • debug all

Question 51

Question
___VoIP____ defines the protocols and technologies that implement the transmission of voice data over an IP network
Answer
  • True
  • False

Question 52

Question
The show ___file systems___ command provides information about the amount of free nvram and flash memory with the permissions for reading or writing data.
Answer
  • True
  • False

Question 53

Question
The ___show version___ command that is issued on a router is used to verify the value of the software configuration register.
Answer
  • True
  • False
Show full summary Hide full summary

Similar

Arbeitsrecht I
bram_kerschi_14
The Heart
annalieharrison
Economic Growth
Kati Christova
MCAT Chemistry Review: Chemical Bonds
HappyOwl
B5 - Growth and Deveolopment
blairzy123
BYU English 11 B Speedback
Becky Kopplin
B2, C2, P2
George Moores
Primary School Mathematics
lara.greenberg
Coastal Development and physical processess
Corey Meehan
Study timetables importance
elena navarro