Practice Final Exam Answers 100%

Network Essentials Practice Final Exam Answers 100%

  1. 1. Question
    What is the reason that electronic data is represented as bits in computer processing and data communication?
    Explanation:

    In electronic communication, data is represented by 1’s and 0’s. These 1’s and 0’s are referred to as binary digits. This format is identified as digital binary. All electronic data is stored in this binary format because it can be stored more efficiently and can be transmitted over longer distances without the quality becoming degraded.
  2. 2. Question
    Which term is used to describe a network device that relies on another device to obtain information?
    Explanation:

    A client device has software installed which enables it to request the required service from a server device. For instance, a user who uses a web browser is effectively requesting pages from servers all over the web. In this case the browser is considered the client, whereas the device that is responsible for answering the request is considered the server.
  3. 3. Question
    What is a role of an intermediary device on a network?
    Explanation:

    Processes running on the intermediary network devices perform functions like regenerating and re-transmitting data signals, maintaining information about what pathways exist through the network and internetwork, directing data along alternate pathways when there is a link failure, and permitting or denying the flow of data, based on security settings.
  4. 4. Question
    Which type of network component can be used to share an attached printer to the network?
    Explanation:

    A peripheral is a device that is not directly connected to a network. In order to be made available on a network, a host is responsible for sharing the peripheral across the network.
  5. 5. Question
    Which two devices are shared peripherals? (Choose two.)
    Explanation:

    A shared peripheral device does not connect directly to a network. This device is attached to a host (such as a PC) and the host connects to the network to share the peripheral device.
  6. 6. Question
    When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?
    Explanation:

     A logical topology usually contains relevant network configuration information, such as the following:

    • Device names
    • Device IP addressing
    • Network designations
    • Configuration information
  7. 7. Question
    When is a straight-through cable used in a network?
    Explanation:

    When two unlike devices are connected, they require a straight-through cable to exchange data. When two like devices are connected together, they require the use of a crossover cable in order to reverse the transmit and receive functions so they can exchange data.
  8. 8. Question
    Which organization publishes and manages the Request for Comments (RFC) documents?
    Explanation:

    The Internet Engineering Task Force (IETF) organization publishes and manages the Request for Comments (RFC).
  9. 9. Question
    What is indicated by the 100 in the 100BASE-T standard?​
    Explanation:

    100BASE-T is an Ethernet standard that translates to 100 megabits per second, baseband transmission, and twisted pair cable​.​
  10. 10. Question
    What is the default subnet mask for an IP address of 198.133.219.4?
    Explanation:

    In classful IPv4 addressing, a network with the first octet of 198 is a Class C network with the default subnet mask of 255.255.255.0.
  11. 11. Question
    What are three characteristics of multicast transmission? (Choose three.)
    Explanation:

    Broadcast messages consist of single packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses, and map upper layer addresses to lower layer addresses. A multicast transmission is a single packet sent to a group of hosts and is used by routing protocols, such as OSPF and RIPv2, to exchange routes. The address range 224.0.0.0 to 224.0.0.255 is reserved for link-local addresses to reach multicast groups on a local network.
  12. 12. Question
    A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?
    Explanation:

    Like IP addressing, there is also a special MAC address for broadcast purposes: FF-FF-FF-FF-FF-FF. When a DHCP client needs to send a DHCP Discover message in order to seek DHCP servers, the client will use this MAC address as the destination MAC address in the Ethernet frame. It does this because it has no knowledge of the IP and MAC addresses of DHCP servers.
  13. 13. Question
    Which number grouping is a valid IPv6 address?
    Explanation:

    An IPv6 address is made up of 128 bits represented in hexadecimal numbers.There are two rules that help reduce the number of digits needed to represent an IPv6 address.

    • Rule 1 – Omit leading zeros in any 16-bit section.
    • Rule 2 – Replace any single group of consecutive zeros with a double colon (::). This can only be used once within an IPv6 address.
  14. 14. Question
    Which protocol operates at the transport layer of the TCP/IP model and ensures reliable delivery of IP packets?
    Explanation:

    Transmission Control Protocol (TCP) operates at the transport layer of the TCP/IP model. TCP ensures that IP packets are delivered reliably.
  15. 15. Question
    Which term is used to describe transport layer ports in the range of 1 through 1023?
    Explanation:

    Port numbers are addressed at the transport layer of the OSI model by TCP and UDP to identify requested protocols and services. Port numbers in the range of 1 to 1023 are well-known ports.​
  16. 16. Question
    What is a function of a DNS server?
    Explanation:

    Hosts are assigned with IP addresses in order to communicate over the network. Hosts are registered with domain names so people can remember and recognize them easily. However, computers are connected through their IP addresses. DNS provides the service to map the domain name to its IP address.
  17. 17. Question

    What are two benefits of wireless networks over wired networks? (Choose two.)

    Explanation:

     Benefits of wireless technology include the following:

    • Mobility – easy device connectivity
    • Flexibility – anytime, anywhere connectivity
    • Scalability – easily expanded
    • Cost savings – equipment costs continue to drop
    • Quick installation – does not take long to install and provides connectivity for quite a range
    • Reliability – even in harsh environments, wireless can be easy to install in emergency or hostile environments
  18. 18. Question
    Which type of network is covered by the IEEE 802.11 standards?
    Explanation:

    IEEE 802.11 wireless standards use the 2.4 and 5 GHz unregulated frequency ranges.
  19. 19. Question
    When a wireless router is being configured for the first time, what type of wired connection is used?
    Explanation:

    A straight-through Ethernet cable, or patch cable, is commonly used to connect to a wireless router for initial configuration.
  20. 20. Question
    Which is an example of social engineering?
    Explanation:

    A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering.
  21. 21. Question
    Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?​
    Explanation:

    A Trojan horse is a malicious program that appears legitimate but actually carries code which can damage computer systems or install backdoors if the program is initiated.
  22. 22. Question
    A file is downloaded from the Internet. After the user opens the downloaded file, the hard drive crashes and all information on the computer is lost. What type of attack occurred?
    Explanation:

    Viruses are malicious programs that are spread by modifying other programs and files and can cause hard drives to crash and files to be lost.
  23. 23. Question
    What is required for a network administrator to perform out-of-band management tasks on a Cisco device?
    Explanation:

    With out-of-band management, the only requirement is to have a computer directly connected to the console port of the device. This is the primary method to configure a new device because no network connection or prior configurations on the device is required.
  24. 24. Question
    What are two options for expanding storage space on a Cisco router? (Choose two.)
    Explanation:

    ROM and RAM are memory modules built into a Cisco device and their capacity does not change. In a Cisco 1941 router, two flash slots and two USB ports are included that expand the storage capability and flexibility. NVRAM is a type of memory that is used to store a backup of the configuration file.
  25. 25. Question
    If the default gateway is configured incorrectly on a host, what is the impact on communications?
    Explanation:

    In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device that a host device uses to communicate with devices on other networks. The default gateway device is not used when a host communicates with other hosts on the same network.
  26. 26. Question
    A user calls the help desk to report a workstation problem. Which three questions would produce the most helpful information for troubleshooting? (Choose three.)
    Explanation:

    In troubleshooting, the first step is to gather information related to the problem. One way to gather information is to ask questions of the individual who reported the problem as well as any other affected users. Questions should include end user experiences, observed symptoms, error messages, and information about recent configuration changes to devices or applications.
  27. 27. Question
    Which command can be used to verify connectivity between two host devices?
    Explanation:

    The ping command can be used to test end-to-end connectivity between two host devices. It measures the round-trip time for a message to get from source to destination.
  28. 28. Question
    Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is?
    Explanation:

    The nslookup command can be used to look up information about a particular DNS name in the DNS server. The information includes the IP address of the DNS server being used as well as the IP address associated with the specified DNS name. This command can help verify the DNS that is used and if the domain name to IP address resolution works.
  29. 29. Question
    Which utility can be used to view a list of open TCP connections on Linux or Windows systems?
    Explanation:

    Netstat is a utility that is available for both Linux and Windows systems. It is a utility that can be used to indicate that something or someone is connected to the local host. It lists the protocol in use, the local address and port numbers, the foreign address and port numbers, and the state of the connection.
  30. 30. Question

    Refer to the exhibit. The command output is from a wireless DHCP host connected to a Linksys integrated router. What can be determined from the output?

    Network Essentials Practice Final Exam Answers 001

    Network Essentials Practice Final Exam Answers 001

    Explanation:

    The default gateway IP address must be in the same network as the host in order for the host and router to communicate with each other. Because this is a DHCP client, the IP configuration is provided by the DHCP. Thus the DHCP configuration should be checked and corrected.
  31. 31. Question

    Fill in the blank.
    When a Cisco device is powered on, the               POST  begins to test the device and determine if it is functioning properly.

  32. 32. Question

    Match the protocol with the function. (Not all options are used.)

    Network Essentials Practice Final Exam Answers 001

    Network Essentials Practice Final Exam Answers 001

  33. 33. Question

    Match the term to the category.

    Network Essentials Practice Final Exam Answers 002

    Network Essentials Practice Final Exam Answers 002

  34. 34. Question

    Match the type of attack with the description. (Not all options are used.)

    Network Essentials Practice Final Exam Answers 003

    Network Essentials Practice Final Exam Answers 003

  35. 35. Question

    Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

    What is the phrase displayed on the webpage?

    Explanation:

    In order for the wireless clients in the internal network to reach the Internet, the border router and the wireless router must be configured according to the network design parameters.