what does a router use to decide where packets for data is sent?

Networking Essentials ( Version 2) – Networking Essentials 2.0 Practice Final Examination Answers

How to find: Printing "Ctrl + F" in the browser and make full in whatever wording is in the question to observe that question/answer. If the question is not hither, find it in Questions Depository financial institution.

Annotation: If you take the new question on this exam, please annotate Question and Multiple-Choice listing in course below this article. We will update answers for you lot in the shortest time. Cheers! We truly value your contribution to the website.

1. Match the type of malware with the definition.

Networking Essentials (Version 2) - Networking Essentials 2.0 Practice Final Exam Q1

Networking Essentials (Version 2) – Networking Essentials 2.0 Exercise Final Test Q1

two. An intruder tries a large number of possibilities in rapid succession to guess a countersign. Every bit a result, other users on the network are locked out. What type of set on has occurred?

  • brute force
  • ping of death
  • DDoS
  • SYN flooding

3. Which three attacks exploit human beliefs? (Choose three.)

  • zombies
  • vishing
  • phishing
  • brute force
  • malware
  • pretexting

Caption: Attacks aimed at exploiting human beliefs such as pretexting, phishing, and vishing are commonly used by hackers to obtain data directly from authorized users.​​

4. What is the effect of setting the security mode to WEP on a pocket-size wireless router?

  • It translates IP addresses into piece of cake-to-remember domain names.
  • It allows the admission point to inform clients of its presence.
  • Information technology encrypts data between the wireless client and the access betoken.
  • It identifies the wireless LAN.
  • It translates an internal address or grouping of addresses into an exterior, public accost.

Explanation: WEP is used to encrypt data between the wireless customer and the access point. DNS translates IP addresses into piece of cake-to-think domain names. NAT translates an internal address or group of addresses into an outside, public address. An SSID allows the access point to inform clients of its presence.

5. Which solution allows external users to access only an internal FTP server on a private network?

  • dynamic NAT
  • NAT with overload
  • port forwarding
  • static NAT

Explanation: Port forwarding can be used to permit other users to reach devices on an internal network through the Internet. The firewall in the router determines if the traffic should be forwarded to an internal device based on the port number. Port numbers are associated with specific services, such as FTP, HTTP, HTTPS, and POP3.

6. What is an inherent security vulnerability of SSID dissemination?

  • Information technology broadcasts the identity of the network.
  • Information technology allows unauthenticated access to the wireless network.
  • It allows any host to bring together the wireless network.
  • It sends traffic unencrypted betwixt the wireless access signal and the client.

Explanation: By default, wireless routers and access points circulate SSIDs in obviously text to all computers within the wireless range.This represents a security risk because an assaulter can hands intercept the wireless signals and read plain text messages.

vii. Refer to the exhibit. A newly purchased client laptop has just continued to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?

Networking Essentials (Version 2) - Networking Essentials 2.0 Practice Final Exam Q7

Networking Essentials (Version 2) – Networking Essentials two.0 Practise Final Exam Q7

  • 255.255.255.0
  • 192.168.0.1
  • 192.168.0.100
  • 255.255.255.255
  • 192.168.0.255

Caption: When a new client device is installed on a network that uses dynamic IP addressing, the client will send out a DHCP request bulletin with the destination IPv4 address of 255.255.255.255.

8. A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address puddle is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

  • 252
  • 254
  • 253
  • 251

Caption: If the cake of addresses allocated to the pool is 192.168.10.0/24, there are 254 IP addresses to exist assigned to hosts on the network. As in that location are 3 printers which demand to have their addresses assigned statically, then there are 251 IP addresses left for assignment.

ix. Match each DHCP message blazon with its description. (Not all options are used.)

Networking Essentials (Version 2) - Networking Essentials 2.0 Practice Final Exam Q9

Networking Essentials (Version two) – Networking Essentials 2.0 Practice Final Exam Q9

Explanation: Identify the options in the following gild:

  • a client initiating a message to find a DHCP server – DHCPDISCOVER
  • a DHCP server responding to the initial request by a client – DHCPOFFER
  • the client accepting the IP accost provided past the DHCP server – DHCPREQUEST
  • the DHCP server confirming that the charter has been accepted – DHCPACK

ten. A client device on an Ethernet segment needs an IP accost in order to communicate on the network. A DHCP server with IP address 192.168.ane.i has been configured and enabled on the network. How will a customer device obtain a usable IP address for this network?

  • Employ a statically configured IP address from the puddle of IP addresses that is offered by the DHCP server.
  • Send a DHCPREQUEST packet to IP accost 255.255.255.255.
  • Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.
  • Send a DHCPACK bundle to the default gateway address.

Caption: Similar IP addressing, there is also a special MAC address for broadcast purposes: FF-FF-FF-FF-FF-FF. When a DHCP client needs to ship a DHCP Discover bulletin in order to seek DHCP servers, the client will apply this MAC address as the destination MAC address in the Ethernet frame. Information technology does this because it has no knowledge of the IP and MAC addresses of DHCP servers.

11. Which two criteria are used to help select a network medium for a network? (Choose two.)

  • the distance the selected medium can successfully acquit a signal
  • the environment where the selected medium is to exist installed
  • the number of intermediate devices that are installed in the network
  • the types of information that need to be prioritized
  • the cost of the cease devices that are used in the network

Explanation: Criteria for choosing a network medium include the following:
The distance the selected medium can successfully comport a signal in the surround in which the selected medium is to be installed
The amount of data and the speed at which the information must be transmitted
The cost of the medium and its installation

12. What is an reward of using standards to develop and implement protocols?

  • Dissimilar manufacturers are free to utilize different requirements when implementing a protocol.
  • Standards provide flexibility for manufacturers to create devices that comply with unique requirements.
  • Products from unlike manufacturers tin can interoperate successfully.
  • A detail protocol can simply be implemented by 1 manufacturer.

Caption: Standards-based protocols enable products from different manufacturers to interoperate successfully. Standards-based protocols enable many manufacturers to implement that protocol. If different manufacturers implement dissimilar requirements within the same protocol, and then their products will not be interoperable.

13. At which layer of the OSI model would a logical accost be added during encapsulation?

  • physical layer
  • network layer
  • data link layer
  • transport layer

Caption: Logical addresses, too known as IP addresses, are added at the network layer. Concrete addresses are edded at the data link layer. Port addresses are added at the send layer. No addresses are added at the physical layer.

xiv. Which wireless RF band do IEEE 802.11b/g devices use?

  • 2.4 GHz
  • 900 MHz
  • 60 GHz
  • v GHz

Explanation: 900 MHz is an FCC wireless technology that was used earlier development of the 802.11 standards. 900 MHz devices have a larger coverage range than the college frequencies accept and do not crave line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/due north/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at 60 GHz.

fifteen. Refer to the exhibit. Which router port connects to the modem provided by the service provider?

Networking Essentials (Version 2) - Networking Essentials 2.0 Practice Final Exam Q15

Networking Essentials (Version 2) – Networking Essentials two.0 Practice Terminal Test Q15

  • A
  • B
  • C
  • D

Explanation: The ports shown in the diagram are used every bit follows: The LAN ports, A and B, are used to connect wired devices on the home network. The Cyberspace port, C, is connected to the modem. The port, labeled D, is the 5V DC power port that supplies power to the router.

xvi. Which type of device filtering can be enabled on some wireless admission points or wireless routers?

  • authentication
  • user ID
  • MAC address
  • IP address

Caption: On wireless admission points, MAC addresses can exist manually entered to filter which devices are immune on the wireless network.

17. Using a systematic troubleshooting approach, a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information, which two questions are associated with Layer 3? (Choose 2.)

  • From the PC, is the default gateway reachable using the ping command?
  • Is at that place a link light on the network menu?
  • Is the PC configured for DHCP?
  • Is the network cable plugged in?
  • Does a browser connection to world wide web.cisco.com piece of work?

Explanation: IP address configuration and the ping command are associated with Layer 3 protocols. Visiting a web server is associated with the application layer. An Ethernet cablevision connection and NIC are associated with Layer ane functions.

18. A client calls the help line to report a computer trouble. The help line technician responds and works with the customer for some fourth dimension. Withal, the technician cannot identify the root crusade of the problem. What should the technician do to help the customer?

  • Tell the customer that a ticket is created and some other technician volition contact the user before long.
  • Tell the client that a replacement calculator volition exist shipped immediately.
  • Suggest that the customer visit the back up website for more detailed information.
  • Ask for the email address of the customer in order to transport all the support documents for the computer.

Explanation: When the beginning line technician cannot place the cause of the problem, the technician should create a ticket and initiate the escalation process. Because the cause of the problem is non identified, the technician should not qualify the replacement process. The customer should non exist sent to explore further troubleshooting.

19. During a motion, employee workstations were disconnected from the network and reconnected in new offices. However, after the movement a few workstations cannot become a valid IP address. What should be checked first to identify the root cause of the problem?

  • Examination if these workstations can ping the default gateway.
  • Install all software updates.
  • Bank check the operation status of the DHCP server.
  • Brand sure the cables are functional and properly plugged.

Explanation: Because the workstations have just been moved from ane location to another, the internal OS and applications take non changed. The first matter to check should be the Ethernet cable, including the type of cable used and whether the cables are properly plugged into both the workstation and the jack on the wall.

20. A user is setting upwardly a home wireless network. Which blazon of device must the user take in social club to constitute the wireless network and provide admission to the internet for multiple home devices?

  • switch
  • hub
  • wireless router
  • patch panel

Explanation: A wireless router connects multiple wireless devices to the network. It will so aggregate the internet access requests from home devices to the internet.

21. A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which blazon of wireless engineering science was used?

  • NFC
  • Wi-Fi
  • 3G
  • Bluetooth

Explanation: NFC is a wireless engineering science that allows data to exist exchanged between devices that are in very close proximity to each other.

22. When troubleshooting network bug, where would a network administrator find the configuration information, such every bit the computer names and the IP addresses that are used?

  • DNS server
  • logical topology diagram
  • concrete topology diagram
  • DHCP server

Explanation: A logical topology usually contains relevant network configuration information, such equally the following:
Device names
Device IP addressing
Network designations
Configuration information

23. Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

  • tunneling
  • encapsulation
  • dual-stack
  • translation

Explanation: The tunneling migration technique encapsulates an IPv6 package within an IPv4 packet. Encapsulation assembles a message and adds data to each layer in order to transmit the data over the network. Translation is a migration technique that allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. The dual-stack migration technique allows IPv4 and IPv6 protocol stacks to coexist on the aforementioned network simultaneously.

24. A small-scale bookkeeping function is setting up a wireless network to connect end devices and to provide internet access. In which 2 scenarios does a wireless router perform Network Accost Translation (NAT)? (Choose two.)

  • when a host is sending packets to a remote site owned past the manufacturer of the wireless router in social club to request a digital copy of the device manual
  • when a host is sending HTTP packets to the wireless router in order to update the network addressing of the LAN
  • when a host is sending packets to the ISP in lodge to request a speed increase for Net services==
  • when a host is sending a print job to a network printer on the LAN
  • when a host is sending packets to a local server in society to update the network media settings and music playlists

Explanation: A wireless router volition perform Network Address Translation (NAT) whenever a private (local) source IPv4 address is translated to a public (global) accost.

25. If the default gateway is configured incorrectly on a host, what is the impact on communications?

  • The host is unable to communicate with hosts on both the local and remote networks.
  • The host is unable to communicate on the local network.
  • The host is unable to communicate with hosts on remote networks.
  • The host cannot get an IP address from the DHCP server.

Caption: In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on some other network. The default gateway address identifies a network device that a host device uses to communicate with devices on other networks. The default gateway device is not used when a host communicates with other hosts on the same network.

26. What are two common media used in networks? (Choose two.)

  • forest
  • fiber
  • h2o
  • copper
  • nylon

Explanation: Common media used in networks include copper, drinking glass or plastic optical fiber, and wireless.

27. Which 2 types of interference may impact the information throughput on UTP cables? (Choose two.)

  • temperature
  • crosstalk
  • noise
  • EMI
  • moisture

Caption: Unshielded twisted-pair (UTP) cabling is sensitive to the interference introduced by electromagnetic interference (EMI) and crosstalk.

28. What are ii wiring schemes divers past the TIA/Eia organization for Ethernet installation in homes and businesses? (Choose 2.)

  • T568B
  • T568A
  • STP
  • UTP
  • RJ-45

Explanation: The TIA/Eia organization defines the wiring schemes T568A and T568B for typical Ethernet installations. Each wiring scheme defines a specific order of wire connections on the end of the cable.

29. A host needs to reach another host on a remote network, but the ARP enshroud has no mapping entries. To what destination accost volition the host send an ARP request?

  • the unicast MAC address of the remote host
  • the unicast IP accost of the remote host
  • the broadcast MAC address
  • the subnet broadcast IP address

30. Which type of address does a switch use to build the MAC address table?

  • source MAC address
  • destination MAC address
  • destination IP address
  • source IP address

Explanation: When a switch receives a frame with a source MAC address that is not in the MAC address tabular array, the switch will add that MAC address to the table and map that address to a specific port. Switches practise not use IP addressing in the MAC address table.

31. What are ii benefits of using a layered network model? (Choose two.)

  • Information technology prevents applied science in one layer from affecting other layers.
  • Information technology assists in protocol design.
  • It prevents designers from creating their own model.
  • It ensures a device at one layer can role at the next higher layer.
  • It speeds up package delivery.

Explanation: Some vendors take adult their own reference models and protocols. Today, if a device is to communicate on the Internet, the device must utilise the TCP/IP model. The benefits of using a layered model are as follows:assists in protocol design
fosters contest between vendors
prevents a technology that functions at one layer from affecting any other layer
provides a common language for describing network functionality
helps in visualizing the interaction between each layer and protocols between each layer

32. Which ii devices are considered end devices? (Cull two.)

  • router
  • laptop
  • hub
  • switch
  • printer

Caption: A device that forms the interface between users and the underlying communication network is known as an cease device. Stop devices are either the source or destination of a message.

33. Which cistron does non influence throughput?

  • the operating organisation that is used past terminate devices
  • the amount of data that is being sent and received on the connection
  • the latency that is created by the number of network devices encountered between source and destination
  • the type of data that is being transmitted

Explanation: Throughput is the amount of data that has successfully moved from ane place to another in a given time period. Several factors could influence throughput, including the amount and blazon of data being transmitted and latency.

34. What is a characteristic of a peer-to-peer awarding?

  • The resources required for the awarding are centralized.
  • Each device can human activity both as a client and a server, just non simultaneously.
  • Each device using the application provides a user interface and runs a background service.
  • Both devices initiate a 3-manner handshake to determine who is initiating the communication.

Explanation: Peer-to-peer networks exist directly between client devices, with no centralized resources or authentication. Hybrid peer-to-peer systems as well exist that decentralize resource sharing but can use centralized indexes to point to the resource locations.

35. Using default settings, what is the next pace in the switch kicking sequence later on the IOS loads from flash?

  • Search for a backup IOS in ROM.
  • Load the bootstrap program from ROM.
  • Load the running-config file from RAM.
  • Locate and load the startup-config file from NVRAM.
  • Perform the POST routine.

36. Which two files, if found, are copied into RAM as a router with the default configuration annals setting boots up? (Choose two.)

  • running configuration
  • startup configuration
  • POST diagnostics
  • IOS prototype file

Explanation: The two chief files needed for bootup are the IOS image file and startup configuration, which are copied into RAM to maximize functioning. If a router configuration register is set up to 0x2102, the router will attempt to load the IOS image from flash memory and the startup configuration file from NVRAM.

37. What are two features of protocols used inside the TCP/IP protocol stack? (Choose two.)

  • The Net Layer IP protocol has congenital in mechanisms for ensuring the reliable manual and receipt of data.
  • TCP mechanisms retransmit information when an acknowledgment is not received from the destination organization within a set period of time.
  • The same Transport Layer source port is used for all of the tabs opened at the same time inside a web browser.
  • TCP and UDP destination port numbers are dynamically generated by the sending device in order to track the responses to requests.
  • UDP is used when an application must be delivered as apace as possible and some loss of data tin can be tolerated.

Caption: Application programmers make decisions almost which protocols to utilise to transport the data to and from their applications based on whether the application tin tolerate whatsoever lost data. Live streaming and voice transmissions tin can utilise UDP considering if a few data packets are lost, the quality of the video and sound is non seriously impacted. TCP is used when all data must be complete and accurate.

38. A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?

  • transport
  • application
  • network access
  • internet

Explanation: The cyberspace layer provides addresses for the purpose of connecting stop devices on different networks.

39. Which statement correctly describes information transmission at the transport layer?

  • A unmarried datagram can include both a TCP and a UDP header.
  • Both UDP and TCP use port numbers.
  • Sectionalization is provided by sequence numbers when UDP is used.
  • Segmentation is provided by the window size field when the TCP protocol is used.
  • Retransmission of lost packets is provided by both TCP and UDP.

Explanation: Sectionalization is handled at Layer 4 by TCP sequence numbers. UDP does not accept sequence numbers in the header, but instead, lets the awarding handle reordering if it is necessary. But TCP provides reliable deliver and retransmits data. Each segment has either a TCP header or a UDP header; information technology cannot comprise both.

forty. What type of technology converts analog phonation signals into digital data?

  • SNMP
  • POP3
  • VoIP
  • SMTP

Caption: Vox over IP (VoIP) is a engineering that is used with making telephone calls across a network or net and information technology converts analog voice signals into digital data.

41. Match the protocol with the function. (Not all options are used.)

Networking Essentials (Version 2) - Networking Essentials 2.0 Practice Final Exam Q41

Networking Essentials (Version 2) – Networking Essentials 2.0 Practise Final Exam Q41

42. While a network security product is being deployed, a customizable list of commanded protocols is shown. Which three protocols should exist immune to provide for the use of email on a network? (Choose three.)

  • SMTP
  • IMAP4
  • Telnet
  • DNS
  • POP3
  • HTTP
  • TFTP

Explanation: The email protocols used on a network are SMTP, POP3, and IMAP4. SMTP is used to send messages to a local electronic mail server, whereas POP and IMAP are used to receive email.

43. In software defined network architecture, what office is removed from network devices and performed by an SDN controller?

  • application policies
  • control aeroplane
  • security
  • information airplane

Explanation: In network virtualization, the control plane function of each network device is removed and is performed past a centralized controller. The controller and so can communicate control plane functions to each of the network devices. This allows the network devices to focus all resources on forwarding airplane functions.

44. A user is configuring a wireless access point and wants to prevent whatsoever neighbors from discovering the network. What activeness does the user demand to take?

  • Enable WPA encryption.
  • Configure a DNS server.
  • Configure DMZ settings.
  • Disable SSID broadcast.

Explanation: Disabling SSID broadcast prevents the access point from announcing the proper noun of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will attain different tasks, but the name of the network will still be announced.

45. A information center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a split up spider web server without having to allocate an actual discrete server for each client. What is the networking trend that is being implemented by the data heart in this situation?

  • maintaining communication integrity
  • online collaboration
  • virtualization
  • BYOD

Explanation: Virtualization engineering science can run several different operating systems in parallel on a unmarried CPU.

46. A network ambassador installs a network device that focuses on interconnecting independent local networks. At which layer of devices does this applied science reside?

  • admission
  • internet
  • core
  • distribution

Explanation: The distribution layer connects local networks and controls the traffic flowing between them. Networking devices that make upward the distribution layer are designed to interconnect networks, not individual hosts.

47. A reckoner has to send a packet to a destination host in the same LAN. How volition the packet be sent?

  • The packet will be sent to the default gateway first, and and then, depending on the response from the gateway, it may be sent to the destination host.
  • The packet will be sent directly to the destination host.
  • The package volition first be sent to the default gateway, and and so from the default gateway it will be sent directly to the destination host.
  • The parcel will be sent simply to the default gateway.

Explanation: If the destination host is in the same LAN as the source host, there is no demand for a default gateway. A default gateway is needed if a parcel needs to exist sent exterior the LAN.

48. If the default gateway is configured incorrectly on the host, what is the touch on communications?

  • There is no impact on communications.
  • The host is unable to communicate on the local network.
  • The host tin communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
  • The host can communicate with other hosts on remote networks, just is unable to communicate with hosts on the local network.

Explanation: A default gateway is only required to communicate with devices on another network. The absence of a default gateway does not bear upon connectivity between devices on the aforementioned local network.

49. Which 3 commands are used to prepare secure access to a router through a connection to the panel interface? (Choose three.)

  • interface fastethernet 0/0
  • line console 0
  • line vty 0 iv
  • password cisco
  • login
  • enable undercover cisco

Explanation: The 3 commands needed to password protect the console port are as follows:
line panel 0
password cisco
login
The interface fastethernet 0/0 command is ordinarily used to access the configuration mode used to utilize specific parameters such as the IP address to the Fa0/0 port. The line vty 0 4 command is used to access the configuration way for Telnet. The 0 and four parameters specify ports 0 through iv, or a maximum of v simultaneous Telnet connections. The enable secret command is used to use a password used on the router to access the privileged style.

50. A network ambassador establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connectedness?

  • direct access to the switch through the employ of a concluding emulation plan
  • remote admission to the switch through the apply of a telephone dialup connexion
  • on-site access to a switch through the utilize of a straight connected PC and a console cable
  • remote access to a switch where data is encrypted during the session
  • out-of-band access to a switch through the use of a virtual terminal with password authentication

Explanation: SSH provides a secure remote login through a virtual interface. SSH provides a stronger countersign authentication than Telnet. SSH also encrypts the data during the session.

51. Which blazon of access is secured on a Cisco router or switch with the enable hush-hush command?

  • privileged EXEC
  • panel line
  • AUX port
  • virtual final

Explanation: The enable secret command secures admission to the privileged EXEC mode of a Cisco router or switch.

52. When configuring SSH on a router to implement secure network direction, a network engineer has issued the login local and transport input ssh line vty commands. What 3 additional configuration deportment take to be performed to complete the SSH configuration? (Choose three.)

  • Configure role-based CLI access.
  • Create a valid local username and password database.
  • Ready the user privilege levels.
  • Configure the correct IP domain name.
  • Generate the asymmetric RSA keys.
  • Manually enable SSH subsequently the RSA keys are generated.

Explanation: SSH is automatically enabled after the RSA keys are generated. Setting user privilege levels and configuring part-based CLI access are good security practices but are not a requirement of implementing SSH.

53. Friction match the commands to the correct actions. (Non all options are used.)

Networking Essentials (Version 2) - Networking Essentials 2.0 Practice Final Exam Q53

Networking Essentials (Version 2) – Networking Essentials 2.0 Practise Final Exam Q53

54. What is the purpose of the subnet mask in conjunction with an IP address?

  • to uniquely identify a host on a network
  • to decide the subnet to which the host belongs
  • to mask the IP accost to outsiders
  • to identify whether the address is public or private

Explanation: With the IPv4 address, a subnet mask is also necessary. A subnet mask is a special type of IPv4 accost that coupled with the IP accost determines the subnet of which the device is a member.

55. Which 2 statements describe characteristics of network addresses? (Cull ii.)

  • A valid public IPv4 or IPv6 accost is needed in social club for devices to communicate over the cyberspace.
  • DHCP is used to dynamically assign both MAC and IP addresses to devices connected to the network.
  • A statically assigned IP accost will be valid on any network to which the device connects.
  • The MAC address of a device will change when that device moves from one Ethernet network to another.
  • A MAC address is also referred to as a concrete address because it is permanently embedded on the NIC.

Explanation: Knowing how network addressing works can speed configuration and troubleshooting tasks. MAC addresses are assigned by the NIC manufacturer and remain the same equally long as the NIC is not replaced. MAC addresses are used to communicate between devices connected to the same local Ethernet network. Valid IPv4 and IPv6 addresses are necessary for communications to exist routed over the internet. All IP addresses are valid but on a network that has the same network prefix bits and the same subnet mask.

56. What are 3 characteristics of multicast transmission? (Cull 3.)

  • Computers use multicast transmission to request IPv4 addresses.
  • The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.
  • The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.
  • A single packet can be sent to a grouping of hosts.
  • Multicast manual tin can be used by routers to exchange routing information.
  • Multicast messages map lower layer addresses to upper layer addresses.

Caption: Broadcast messages consist of single packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses, and map upper layer addresses to lower layer addresses. A multicast transmission is a single package sent to a group of hosts and is used past routing protocols, such as OSPF and RIPv2, to exchange routes. The address range 224.0.0.0 to 224.0.0.255 is reserved for link-local addresses to attain multicast groups on a local network.

57. Match the router prompt to the configuration task.

Networking Essentials (Version 2) - Networking Essentials 2.0 Practice Final Exam Q57

Networking Essentials (Version two) – Networking Essentials ii.0 Do Final Examination Q57

58. A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command on a Cisco switch. Which term is used to describe the "0/one" part in the control?

  • statement
  • keyword
  • hot key
  • command

Explanation: In this command construction, the Interface function is the command, the FastEthernet part is a keyword, and the 0/1 part is an statement.

59. Refer to the exhibit. What 3 facts can be determined from the viewable output of the prove ip interface brief command? (Choose three.)

Networking Essentials (Version 2) - Networking Essentials 2.0 Practice Final Exam Q59

Networking Essentials (Version 2) – Networking Essentials two.0 Practice Final Test Q59

  • Passwords have been configured on the switch.
  • I device is attached to a physical interface.
  • The switch tin exist remotely managed.
  • Ii physical interfaces accept been configured.
  • The default SVI has been configured.
  • 2 devices are fastened to the switch.

Explanation: Vlan1 is the default SVI. Because an SVI has been configured, the switch can be configured and managed remotely. FastEthernet0/0 is showing up and up, so a device is connected.

sixty. Which command can an administrator execute to make up one's mind what interface a router will use to reach remote networks?

  • show ip route
  • show arp
  • show protocols
  • show interfaces

Explanation: The show ip route control is used to brandish the IP routing table of the router. The IP routing table will show a list of known local and remote networks and the interfaces that the router will apply to achieve those networks.

61. A host needs to achieve another host on a remote network, simply the ARP enshroud has no mapping entries. To what destination address volition

  • the host transport an ARP request?
  • the unicast IP address of the remote host
  • the unicast MAC address of the remote host
  • the subnet broadcast IP address
  • the broadcast MAC address

Explanation: ARP requests are sent when a host does non have an IP to MAC mapping for a destination in the ARP cache. ARP requests are sent to the Ethernet broadcast of FF:FF:FF:FF:FF:FF. In this example because the address of the remote host is unknown, an ARP request is sent to the Ethernet broadcast to resolve the MAC address of the default gateway that is used to attain the remote host.

62. An intruder tries a large number of possibilities in rapid succession to estimate a password. Every bit a result, other users on the network are

  • locked out. What type of assail has occurred?
  • brute force
  • ping of decease
  • DDoS
  • SYN flooding

Caption: In a brute strength assail, an unauthorized person will endeavour to gain access to a system by sending as many passwords as possible as chop-chop as possible.

dobsonalienighted.blogspot.com

Source: https://itexamanswers.net/networking-essentials-version-2-0-practice-final-exam-answers.html

0 Response to "what does a router use to decide where packets for data is sent?"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel