Network Essentials Final Exam Answers 100%
1. QuestionWhat is a disadvantage of deploying a peer-to-peer network model?
Explanation:The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability.
2. QuestionWhat is a purpose of an IP address?
Explanation:Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determine how the packets should be routed from source to destination by intermediate devices.
3. QuestionA consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?
Explanation:NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other.
4. QuestionWhich type of network cable is commonly used to connect office computers to the local network?
Explanation:Twisted-pair is a type of copper cable used to interconnect devices on a local network.
5. QuestionWhat are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.)
Explanation:Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed.
6. QuestionThe functions of which two layers of the OSI model are matched to the network access layer of the TCP/IP model? (Choose two.)
Explanation:The application layer of the TCP/IP model is composed of the application, presentation, and session layers of the OSI model and is used by network applications to complete specific tasks. The network access layer of the TCP/IP model is composed of the physical and data link layers of the OSI model and describes how a device accesses and sends data over the network media.
7. QuestionWhat is the minimum size of a valid Ethernet frame?
Explanation:Ethernet standards define a frame with a minimum of 64 bytes and a maximum of 1518 bytes including fields of destination MAC address, source MAC, Length/Type, data payload, and FCS.
8. QuestionA network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?
Explanation:The IPv4 addressing system is a hierarchical addressing system. An IPv4 address is made up of two parts, the network address and the host address. When the host portion is all “0s” in binary, it is designated as a network address. When the host portion is all “1s” in binary, it is designated as a broadcast address. These two addresses cannot be assigned to individual hosts.
9. QuestionWhich protocol is used to automatically assign IP addresses to hosts?
Explanation:DHCP, or Dynamic Host Configuration Protocol, is used to automatically assign IP addresses to hosts that are configured as DHCP clients.
10. QuestionWhat are three advantages of using private IP addresses and NAT? (Choose three.)
Explanation:Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded.
11. QuestionWhat was the reason for the creation and implementation of IPv6?
Explanation:IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from the 32 bits to 128 bits, which should provide sufficient addresses for future Internet growth needs for many years to come.
12. QuestionWhich three pieces of information are identified by a URL? (Choose three.)
Explanation:URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server.
13. QuestionWhich protocol is used by web servers to serve up a web page?
Explanation:Hypertext Transfer Protocol (HTTP) is a protocol that is used by web servers to serve up a web page.
14. QuestionWhy do streaming audio and video applications use UDP instead of TCP?
Explanation:UDP is a ‘best effort’ delivery system that does not require acknowledgment of receipt and is the preferred transport service for streaming audio and video. UDP provides low overhead and does not implement as much delay as TCP. Streaming audio and video cannot tolerate network traffic congestion and long delays.
15. QuestionAt which layer of the TCP/IP model does TCP operate?
TCP is the Transmission Control Protocol and it operates at the transport layer of the TCP/IP model. TCP ensures that IP packets are delivered reliably.
16. QuestionWhich protocol is used to transfer web pages from a server to a client device?
Explanation:The Hypertext Transfer Protocol (HTTP) provides services between a web browser requesting web pages and a web server responding to the requests. HTML (Hypertext Markup Language) is a markup language to instruct a web browser how to interpret and display a web page.
17. QuestionWhich type of device filtering can be enabled on some wireless access points or wireless routers?
Explanation:On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network.
Which technology is used to uniquely identify a WLAN network?
Explanation:When a wireless AP or router is being set up, an SSID is configured to uniquely identify the WLAN that is managed by the device.
19. QuestionWhat type of Internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity?
Explanation:Satellite Internet service provides the best option for a home user that would otherwise have no Internet connectivity at all. Cellular Internet is only available in areas with mobile phone coverage.
20. QuestionWhich advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?
Explanation:Encryption is used to secure plaintext data that would be viewable traveling over a wireless network.
21. QuestionWhich three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)
In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:
- Enter the network SSID of the wireless network.
- Choose the security type used by the wireless network.
- Input the password to authenticate successfully.
22. QuestionWhich three attacks exploit human behavior? (Choose three.)
Explanation:Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.
23. QuestionWhich address prefix range is reserved for IPv4 multicast?
Explanation:Multicast IPv4 addresses use the reserved class D address range of 188.8.131.52 to 184.108.40.206.
24. QuestionAn intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?
Explanation:In a brute force attack, an unauthorized person will try to gain access to a system by sending as many passwords as possible as rapidly as possible.
25. QuestionWhat type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?
Explanation:SYN flooding is a type of denial of services attack where the attacker sends fake session requests to a target host in an attempt to prevent the host from responding to legitimate session requests.
26. QuestionWhich two ports can be used for the initial configuration of a Cisco router? (Choose two.)
Explanation:The AUX and console ports on a Cisco 1941 router can be used to perform initial setup. The initial setup does not require that the router be connected to a network. A network administrator uses a computer to connect to the console ports directly. A network administrator can also access the router remotely through a dialup phone line and a modem connected to the AUX port. LAN and WAN interfaces are used to connect to networks. The flash slots expand storage capability through the use of a compact flash card.
27. QuestionWhen is an IP address required to be configured on a Cisco LAN switch?
Explanation:A LAN switch uses Layer 2 addresses to determine how to forward packets. An IP address is only necessary if the switch needs to be remotely managed through an in-band connection on the network.
28. QuestionWhat advantage does SSH offer over Telnet?
Explanation:Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted data between devices.
Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
Explanation:In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device used by hosts to communicate with devices on remote networks. The IP address of the host and the default gateway address must be in the same network. With the default subnet mask, valid host IP addresses range from 220.127.116.11 to 18.104.22.168.
30. QuestionWhich three items should be documented after troubleshooting an internal web server crash? (Choose three.)
Proper documentation is a very important step in troubleshooting. The proper documentation can help troubleshoot the same or similar problems in the future. The documentation should include as much information as possible about the following:
- the problem encountered
- steps taken to determine the cause of the problem
- steps to correct the problem and ensure that it will not reoccur
31. QuestionWhich step should be taken next once a problem is resolved during a troubleshooting process?
Explanation:Proper documentation can help troubleshoot the same or similar problems in the future. Proper documentation should include the type of error encountered, the steps taken to determine the cause of the problem, and the steps taken to correct the problem.
32. QuestionWhich three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.)
Explanation:The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the subnet mask and the default gateway addresses. Using the ipconfig /all switch displays additional information like the physical address of the device and the DHCP server address among other things.
Fill in the blank.
A zombie is a computer that is infected with malicious software and instructed to join a botnet.
Explanation:Zombies are computer systems that are infected with bot software which, once activated, instructs infected machines to function as a botnet.
Match the router prompt to the configuration task.
Match the command to the function.