Networking Essentials -- Final Exam
Quiz-summary
0 of 35 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
Information
Networking Essentials — Final Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 35 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- Answered
- Review
-
Question 1 of 35
1. Question
What is a disadvantage of deploying a peer-to-peer network model?Correct
Incorrect
The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability.Hint
The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability. -
Question 2 of 35
2. Question
What is a purpose of an IP address?Correct
Incorrect
Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determine how the packets should be routed from source to destination by intermediate devices.Hint
Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determine how the packets should be routed from source to destination by intermediate devices. -
Question 3 of 35
3. Question
A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?Correct
Incorrect
NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other.Hint
NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other. -
Question 4 of 35
4. Question
Which type of network cable is commonly used to connect office computers to the local network?Correct
Incorrect
Twisted-pair is a type of copper cable used to interconnect devices on a local network.Hint
Twisted-pair is a type of copper cable used to interconnect devices on a local network. -
Question 5 of 35
5. Question
What are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.)Correct
Incorrect
Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed.Hint
Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed. -
Question 6 of 35
6. Question
The functions of which two layers of the OSI model are matched to the network access layer of the TCP/IP model? (Choose two.)Correct
Incorrect
The application layer of the TCP/IP model is composed of the application, presentation, and session layers of the OSI model and is used by network applications to complete specific tasks. The network access layer of the TCP/IP model is composed of the physical and data link layers of the OSI model and describes how a device accesses and sends data over the network media.Hint
The application layer of the TCP/IP model is composed of the application, presentation, and session layers of the OSI model and is used by network applications to complete specific tasks. The network access layer of the TCP/IP model is composed of the physical and data link layers of the OSI model and describes how a device accesses and sends data over the network media. -
Question 7 of 35
7. Question
What is the minimum size of a valid Ethernet frame?Correct
Incorrect
Ethernet standards define a frame with a minimum of 64 bytes and a maximum of 1518 bytes including fields of destination MAC address, source MAC, Length/Type, data payload, and FCS.Hint
Ethernet standards define a frame with a minimum of 64 bytes and a maximum of 1518 bytes including fields of destination MAC address, source MAC, Length/Type, data payload, and FCS. -
Question 8 of 35
8. Question
A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?Correct
Incorrect
The IPv4 addressing system is a hierarchical addressing system. An IPv4 address is made up of two parts, the network address and the host address. When the host portion is all “0s” in binary, it is designated as a network address. When the host portion is all “1s” in binary, it is designated as a broadcast address. These two addresses cannot be assigned to individual hosts.Hint
The IPv4 addressing system is a hierarchical addressing system. An IPv4 address is made up of two parts, the network address and the host address. When the host portion is all “0s” in binary, it is designated as a network address. When the host portion is all “1s” in binary, it is designated as a broadcast address. These two addresses cannot be assigned to individual hosts. -
Question 9 of 35
9. Question
Which protocol is used to automatically assign IP addresses to hosts?Correct
Incorrect
DHCP, or Dynamic Host Configuration Protocol, is used to automatically assign IP addresses to hosts that are configured as DHCP clients.Hint
DHCP, or Dynamic Host Configuration Protocol, is used to automatically assign IP addresses to hosts that are configured as DHCP clients. -
Question 10 of 35
10. Question
What are three advantages of using private IP addresses and NAT? (Choose three.)Correct
Incorrect
Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded.Hint
Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded. -
Question 11 of 35
11. Question
What was the reason for the creation and implementation of IPv6?Correct
Incorrect
IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from the 32 bits to 128 bits, which should provide sufficient addresses for future Internet growth needs for many years to come.Hint
IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from the 32 bits to 128 bits, which should provide sufficient addresses for future Internet growth needs for many years to come. -
Question 12 of 35
12. Question
Which three pieces of information are identified by a URL? (Choose three.)Correct
Incorrect
URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server.Hint
URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server. -
Question 13 of 35
13. Question
Which protocol is used by web servers to serve up a web page?Correct
Incorrect
Hypertext Transfer Protocol (HTTP) is a protocol that is used by web servers to serve up a web page.Hint
Hypertext Transfer Protocol (HTTP) is a protocol that is used by web servers to serve up a web page. -
Question 14 of 35
14. Question
Why do streaming audio and video applications use UDP instead of TCP?Correct
Incorrect
UDP is a ‘best effort’ delivery system that does not require acknowledgment of receipt and is the preferred transport service for streaming audio and video. UDP provides low overhead and does not implement as much delay as TCP. Streaming audio and video cannot tolerate network traffic congestion and long delays.Hint
UDP is a ‘best effort’ delivery system that does not require acknowledgment of receipt and is the preferred transport service for streaming audio and video. UDP provides low overhead and does not implement as much delay as TCP. Streaming audio and video cannot tolerate network traffic congestion and long delays. -
Question 15 of 35
15. Question
At which layer of the TCP/IP model does TCP operate?Correct
Incorrect
TCP is the Transmission Control Protocol and it operates at the transport layer of the TCP/IP model. TCP ensures that IP packets are delivered reliably.
Hint
TCP is the Transmission Control Protocol and it operates at the transport layer of the TCP/IP model. TCP ensures that IP packets are delivered reliably.
-
Question 16 of 35
16. Question
Which protocol is used to transfer web pages from a server to a client device?Correct
Incorrect
The Hypertext Transfer Protocol (HTTP) provides services between a web browser requesting web pages and a web server responding to the requests. HTML (Hypertext Markup Language) is a markup language to instruct a web browser how to interpret and display a web page.Hint
The Hypertext Transfer Protocol (HTTP) provides services between a web browser requesting web pages and a web server responding to the requests. HTML (Hypertext Markup Language) is a markup language to instruct a web browser how to interpret and display a web page. -
Question 17 of 35
17. Question
Which type of device filtering can be enabled on some wireless access points or wireless routers?Correct
Incorrect
On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network.Hint
On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network. -
Question 18 of 35
18. Question
Which technology is used to uniquely identify a WLAN network?
Correct
Incorrect
When a wireless AP or router is being set up, an SSID is configured to uniquely identify the WLAN that is managed by the device.Hint
When a wireless AP or router is being set up, an SSID is configured to uniquely identify the WLAN that is managed by the device. -
Question 19 of 35
19. Question
What type of Internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity?Correct
Incorrect
Satellite Internet service provides the best option for a home user that would otherwise have no Internet connectivity at all. Cellular Internet is only available in areas with mobile phone coverage.Hint
Satellite Internet service provides the best option for a home user that would otherwise have no Internet connectivity at all. Cellular Internet is only available in areas with mobile phone coverage. -
Question 20 of 35
20. Question
Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?Correct
Incorrect
Encryption is used to secure plaintext data that would be viewable traveling over a wireless network.Hint
Encryption is used to secure plaintext data that would be viewable traveling over a wireless network. -
Question 21 of 35
21. Question
Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)Correct
Incorrect
In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:
- Enter the network SSID of the wireless network.
- Choose the security type used by the wireless network.
- Input the password to authenticate successfully.
Hint
In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:
- Enter the network SSID of the wireless network.
- Choose the security type used by the wireless network.
- Input the password to authenticate successfully.
-
Question 22 of 35
22. Question
Which three attacks exploit human behavior? (Choose three.)Correct
Incorrect
Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.Hint
Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users. -
Question 23 of 35
23. Question
Which address prefix range is reserved for IPv4 multicast?Correct
Incorrect
Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.Hint
Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255. -
Question 24 of 35
24. Question
An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?Correct
Incorrect
In a brute force attack, an unauthorized person will try to gain access to a system by sending as many passwords as possible as rapidly as possible.Hint
In a brute force attack, an unauthorized person will try to gain access to a system by sending as many passwords as possible as rapidly as possible. -
Question 25 of 35
25. Question
What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?Correct
Incorrect
SYN flooding is a type of denial of services attack where the attacker sends fake session requests to a target host in an attempt to prevent the host from responding to legitimate session requests.Hint
SYN flooding is a type of denial of services attack where the attacker sends fake session requests to a target host in an attempt to prevent the host from responding to legitimate session requests. -
Question 26 of 35
26. Question
Which two ports can be used for the initial configuration of a Cisco router? (Choose two.)Correct
Incorrect
The AUX and console ports on a Cisco 1941 router can be used to perform initial setup. The initial setup does not require that the router be connected to a network. A network administrator uses a computer to connect to the console ports directly. A network administrator can also access the router remotely through a dialup phone line and a modem connected to the AUX port. LAN and WAN interfaces are used to connect to networks. The flash slots expand storage capability through the use of a compact flash card.Hint
The AUX and console ports on a Cisco 1941 router can be used to perform initial setup. The initial setup does not require that the router be connected to a network. A network administrator uses a computer to connect to the console ports directly. A network administrator can also access the router remotely through a dialup phone line and a modem connected to the AUX port. LAN and WAN interfaces are used to connect to networks. The flash slots expand storage capability through the use of a compact flash card. -
Question 27 of 35
27. Question
When is an IP address required to be configured on a Cisco LAN switch?Correct
Incorrect
A LAN switch uses Layer 2 addresses to determine how to forward packets. An IP address is only necessary if the switch needs to be remotely managed through an in-band connection on the network.Hint
A LAN switch uses Layer 2 addresses to determine how to forward packets. An IP address is only necessary if the switch needs to be remotely managed through an in-band connection on the network. -
Question 28 of 35
28. Question
What advantage does SSH offer over Telnet?Correct
Incorrect
Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted data between devices.Hint
Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted data between devices. -
Question 29 of 35
29. Question
Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
Network Essentials Final Exam Answers 001
Correct
Incorrect
In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device used by hosts to communicate with devices on remote networks. The IP address of the host and the default gateway address must be in the same network. With the default subnet mask, valid host IP addresses range from 128.107.0.1 to 128.107.255.254.Hint
In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device used by hosts to communicate with devices on remote networks. The IP address of the host and the default gateway address must be in the same network. With the default subnet mask, valid host IP addresses range from 128.107.0.1 to 128.107.255.254. -
Question 30 of 35
30. Question
Which three items should be documented after troubleshooting an internal web server crash? (Choose three.)Correct
Incorrect
Proper documentation is a very important step in troubleshooting. The proper documentation can help troubleshoot the same or similar problems in the future. The documentation should include as much information as possible about the following:
- the problem encountered
- steps taken to determine the cause of the problem
- steps to correct the problem and ensure that it will not reoccur
Hint
Proper documentation is a very important step in troubleshooting. The proper documentation can help troubleshoot the same or similar problems in the future. The documentation should include as much information as possible about the following:
- the problem encountered
- steps taken to determine the cause of the problem
- steps to correct the problem and ensure that it will not reoccur
-
Question 31 of 35
31. Question
Which step should be taken next once a problem is resolved during a troubleshooting process?Correct
Incorrect
Proper documentation can help troubleshoot the same or similar problems in the future. Proper documentation should include the type of error encountered, the steps taken to determine the cause of the problem, and the steps taken to correct the problem.Hint
Proper documentation can help troubleshoot the same or similar problems in the future. Proper documentation should include the type of error encountered, the steps taken to determine the cause of the problem, and the steps taken to correct the problem. -
Question 32 of 35
32. Question
Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.)Correct
Incorrect
The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the subnet mask and the default gateway addresses. Using the ipconfig /all switch displays additional information like the physical address of the device and the DHCP server address among other things.Hint
The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the subnet mask and the default gateway addresses. Using the ipconfig /all switch displays additional information like the physical address of the device and the DHCP server address among other things. -
Question 33 of 35
33. Question
Fill in the blank.
A …………………………… is a computer that is infected with malicious software and instructed to join a botnet.
Correct
Incorrect
Zombies are computer systems that are infected with bot software which, once activated, instructs infected machines to function as a botnet.Hint
Zombies are computer systems that are infected with bot software which, once activated, instructs infected machines to function as a botnet. -
Question 34 of 35
34. Question
Match the router prompt to the configuration task.
Sort elements
- RouterA(config-line)#
- RouterA(config-if)#
- RouterA#
- RouterA(config)#
-
configure vty lines
-
configure a WAN interface
-
enter configuration mode
-
add a password required to access the privileged EXEC mode
Correct
Incorrect
-
Question 35 of 35
35. Question
Match the command to the function.
Sort elements
- ipconfig
- netstat
- ping
- tracert
- nslookup
-
displays IP settings on host
-
displays network connections
-
tests end-to-end connectivity between hosts
-
displays the route that is taken to the destination
-
asks the name server for information on the destination domain
Correct
Incorrect