Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CCNA 1 ITN (v5.1 + v6.0) Practice Final Exam Answers 100% Full 2020, Study notes of Very large scale integration (VLSI)

t Explain: The term Internet refers to the worldwide collection of connected networks. Intranet refers to a private connection of LANs and WANS that belong to an organization and is designed to be accessible to the members of the organization, employees, or others with authorization. Extranets provide secure and safe access to suppliers, customers, and collaborators. Extendednet is not a type of network. ⦁ A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? DSL

Typology: Study notes

2023/2024

Available from 08/12/2023

Briantaller
Briantaller 🇺🇸

128 documents

1 / 38

Toggle sidebar

Related documents


Partial preview of the text

Download CCNA 1 ITN (v5.1 + v6.0) Practice Final Exam Answers 100% Full 2020 and more Study notes Very large scale integration (VLSI) in PDF only on Docsity! CCNA 1 ITN (v5.1 + v6.0) Practice Final Exam Answers 100% Full 2020 • Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? Internet intranet extranet extended net Explain: The term Internet refers to the worldwide collection of connected networks. Intranet refers to a private connection of LANs and WANS that belong to an organization and is designed to be accessible to the members of the organization, employees, or others with authorization. Extranets provide secure and safe access to suppliers, customers, and collaborators. Extendednet is not a type of network. • A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? DSL dial-up satellite cell modem cable modem • Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? The entire command, configure terminal, must be used. The administrator is already in global configuration mode. The administrator must first enter privileged EXEC mode before issuing the command. The administrator must connect via the console port to access global configuration mode. Explain: In order to enter global configuration mode, the command configure terminal, or a shortened version such as config t, must be entered from privileged EXEC mode. In this scenario the administrator is in user EXEC mode, as indicated by the > symbol after the hostname. The administrator would need to use the enable command to move into privileged EXEC mode before entering the configure terminal command. • Which keys act as a hot key combination that is used to interrupt an IOS process? Ctrl- Shift-X Ctrl- Shift-6 Ctrl-Z Ctrl-C Explain: The Cisco IOS provides both hot keys and shortcuts for configuring routers and switches. The Ctrl-Shift-6 hot key combination is used to interrupt an IOS process, such as a ping or traceroute. Ctrl-Z is used to exit the configuration mode. Ctrl-C aborts the current command. Ctrl-Shift-X has no IOS function. • Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode? letmei n secreti n lineco nin linevt yin Explain: Telnet accesses a network device through the virtual interface configured with the line VTY command. The password configured under this is required to access the user EXEC mode. The password configured under the line console 0 command is required to gain entry through the console port, and the enable and enable secret passwords are used to allow entry into the privileged EXEC mode. • A network administrator enters the service passwordencryption command into the configuration mode of a router. What does this command accomplish? This command encrypts passwords as they are transmitted across serial WAN links. This command prevents someone from viewing the running configuration passwords. This command enables a strong encryption algorithm for the enable secret password command. This command automatically encrypts passwords in configuration files that are currently stored in NVRAM. electromagnetic interference Explain: Copper media is widely used in network communications. However, copper media is limited by distance and signal interference. Data is transmitted on copper cables as electrical pulses. The electrical pulses are susceptible to interference from two sources: Electromagnetic interference (EMI) or radio frequency interference (RFI) – EMI and RFI signals can distort and corrupt the data signals being carried by copper media. Crosstalk – Crosstalk is a disturbance caused by the electric or magnetic fields of a signal on one wire interfering with the signal in an adjacent wire. • What are the two sublayers of the OSI model data link layer? (Choose two.) inter net physi cal LLC transport MAC network access Explain: The data link layer of the OSI model is divided into two sublayers: the Media Access Control (MAC) sublayer and the Logical Link Control (LLC) sublayer. • A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? bus hierarchi cal mesh ri n g s t a r Explain: The mesh topology provides high availability because every node is connected to all other nodes. Mesh topologies can be found in WANs. A partial mesh topology can also be used where some, but not all, end points connect to one another. • What type of communication rule would best describe CSMA/CD? access method flow control message encapsulation message encoding Explain: Carrier sense multiple access collision detection (CSMA/CD) is the access method used with Ethernet. The access method rule of communication dictates how a network device is able to place a signal on the carrier. CSMA/CD dictates those rules on an Ethernet network and CSMA/CA dictates those rules on an 802.11 wireless LAN. • If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device? Layer 3 data link physi cal Layer 4 Explain: Because each data link layer protocol controls how the device accesses the media, the data link information must be removed and re-attached. Even if a packet is going from one Ethernet network to another Ethernet network, the data link layer information is replaced. • What best describes the destination IPv4 address that is used by multicasting? a single IP multicast address that is used by all destinations in a group an IP address that is unique for each destination in the group a group address that shares the last 23 bits with the source IPv4 address a 48 bit address that is determined by the number of members in the multicast group Explain: The destination multicast IPv4 address is a group address, which is a single IP multicast address within the Class D range. • In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do? drop the frame process the frame as it is send an error message to the sending device add random data bytes to make the frame 1518 bytes long and then forward it Explain: Ethernet standards define the minimum frame as 64 bytes and a maximum of 1518 bytes. A frame less than 64 bytes is considered a “collision fragment” or “runt frame” and is automatically discarded by receiving devices. A frame greater than 1500 is considered a “baby giant”. A 1200 byte frame is within the normal range so it would be processed as is. • What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? source MAC address source IP address destination MAC address Ethernet type destination IP address Explain: The Layer 2 device, such as a switch, uses the destination MAC address to determine which path (interface or port) should be used to send the data onward to the destination device. • What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? It initiates an ARP request. It broadcasts the frame out of all ports on the switch. It notifies the sending host that the frame cannot be delivered. It forwards the frame out of all ports except for the port at which the frame was received. Explain: A Layer 2 switch determines how to handle incoming frames by using its MAC address table. When an incoming frame contains a destination MAC address that is not in the table, the switch forwards the frame out all ports, except for the port on which it was received. • What are two features of ARP? (Choose two.) If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. Explain: All IPv6 enabled interfaces must at minimum have a link-local address. Other IPv6 addresses can be assigned to the interface as required. • An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet? all IPv6 enabled devices across the network all IPv6 enabled devices on the local link all IPv6 DHCP servers all IPv6 configured routers on the local link Explain: FF02::2 identifies all IPv6 routers that exist on the link or network. FF02::1 is the target for all IPv6 enabled devices on the link or network. • What is the purpose of ICMP messages? to inform routers about network topology changes to ensure the delivery of an IP packet to provide feedback of IP packet transmissions to monitor the process of a domain name to IP address resolution Explain: The purpose of ICMP messages is to provide feedback about issues that are related to the processing of IP packets. • Which statement describes a characteristic of the traceroute utility? It sends four Echo Request messages. It utilizes the ICMP Source Quench messages. It is primarily used to test connectivity between two hosts. It identifies the routers in the path from a source host to a destination host. Explain: Traceroute is a utility that generates a list of hops (or routers) along the path from a source host to the destination host. • What is the usable number of host IP addresses on a network that has a /26 mask? 256 254 64 62 32 16 Explain: A /26 mask is the same as 255.255.255.192. The mask leaves 6 host bits. With 6 host bits, 64 IP addresses are possible. One address represents the subnet number and one address represents the broadcast address, which means that 62 addresses can then be used to assign to network devices. • Refer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22? 172.16.16.255 172.16.20.255 172.16.19.255 172.16.23.255 172.16.255.255 Explain: The 172.16.16.0/22 network has 22 bits in the network portion and 10 bits in the host portion. Converting the network address to binary yields a subnet mask of 255.255.252.0. The range of addresses in this network will end with the last address available before 172.16.20.0. Valid host addresses for this network range from 172.16.16.1- 172.16.19.254, making 172.16.19.255 the broadcast address. • Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52? 2001:db8:0:f00::/52 2001:db8:0:8000::/52 2001:db8:0:f::/52 2001:db8:0:f000::/52 Explain: Prefix 2001:db8::/48 has 48 network bits. If we subnet to a /52, we are moving the network boundary four bits to the right and creating 16 subnets. The first subnet is 2001:db8::/52 the last subnet is 2001:db8:0:f000::/52. • A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows? The data flow is being tracked based on the destination port number utilized by each application. The data flow is being tracked based on the source port number utilized by each application. The data flow is being tracked based on the source IP address used by the PC of the technician. The data flow is being tracked based on the destination IP address used by the PC of the technician. Explain: The source port number of an application is randomly generated and used to individually keep track of each session connecting out to the Internet. Each application will use a unique source port number to provide simultaneous communication from multiple applications through the Internet. • What three services are provided by the transport layer? (Choose three.) flow control encryption of data path determination connection establishment error recovery bit transmission data representation Explain: The transport layer is responsible for tracking digital conversations between a source application and a destination application through the use of port numbers. Two protocols that operate at the transport layer are TCP and UDP. TCP can provide reliability by establishing a connection, maintaining flow control, and error recovery. • An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination? A delivery failure message is sent to the source host. The part of the television transmission that was lost is re-sent. The entire transmission is re-sent. The transmission continues without the missing portion. Explain: Most streaming services, such as Internet television, use UDP as the transport layer protocol. These transmissions can tolerate some transmission failures, and no failure messages or retransmissions are required. Such control measures would create noticeable disruption to the flow of data. • Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two.) internet The expression attempts 4 is the number of failed attempts that will trigger the blocking of login requests. The expression within 90 is the time in seconds in which the 4 failed attempts must occur. • Which two statements correctly describe a router memory type and its contents? (Choose two.) ROM is nonvolatile and stores the running IOS. FLASH is nonvolatile and contains a limited portion of the IOS. RAM is volatile and stores the IP routing table. NVRAM is nonvolatile and stores a full version of the IOS. ROM is nonvolatile and contains basic diagnostic software. Explain: ROM is a nonvolatile memory and stores bootup instructions, basic diagnostic software, and a limited IOS. Flash is a nonvolatile memory used as permanent storage for the IOS and other system-related files. RAM is volatile memory and stores the IP routing table, IPv4 to MAC address mappings in the ARP cache, packets that are buffered or temporarily stored, the running configuration, and the currently running IOS. NVRAM is a nonvolatile memory that stores the startup configuration file. • A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests? The NIC in the PC is bad. The TCP/IP protocol is not enabled. The router that is attached to the same network as the workstation is down. Nothing can be determined for sure at this point. Explain: In networks today, a failed ping could mean that the other devices on the network are blocking pings. Further investigation such as checking network connectivity from other devices on the same network is warranted. • For Cisco IOS, which escape sequence allows terminating a traceroute operation? Ctrl+Shift+6 Ctrl+ Esc Ctrl+ x Ctrl+c Explain: Once a traceroute is initiated in the Cisco IOS, it can be stopped by issuing the Ctrl+Shift+6 escape sequence. • Match the phases to the functions during the boot up process of a Cisco router. (Not all options are used.) Place the options in the following order. • not scored — locale and load the Cisco IOS software -> phase 2 locate and load the startup configuration file -> phase 3 perform the POST and load the bootstrap program -> phase 1 Explain: There are three major phases to the bootup process of a Cisco router: Perform the POST and load the bootstrap program. Locate and load the Cisco IOS software. Locate and load the startup configuration file If a startup configuration file cannot be located, the router will enter setup mode by displaying the setup mode prompt. • What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.) 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 100.64.0.0/14 169.254.0.0/16 239.0.0.0/8 Explain:RFC 1918, Address Allocation for Private Internets, defines three blocks of IPv4 address for private networks that should not be routable on the public Internet. 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 • A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts? 10.1.1.128/28 10.1.1.144/28 10.1.1.160/29 10.1.1.128/28 10.1.1.144/28 10.1.1.160/2810.1.1.128/28 10.1.1.140/28 10.1.1.158/26 10.1.1.128/26 10.1.1.144/26 10.1.1.160/26 10.1.1.128/26 10.1.1.140/26 10.1.1.158/28 Explain: Prefix lengths of /28 and /29 are the most efficient to create subnets of 16 addresses (to support 10 hosts) and 8 addresses (to support 6 hosts), respectively. Addresses in one subnet must also not overlap into the range of another subnet. • Match the descriptions to the terms. (Not all options are used.) Question Answer Place the options in the following order. • not scored — CLI -> users interact with the operating system by typing commands GUI -> enables the user to interact with the operating system by pointing and clicking kernel -> the part of the OS that interacts directly with the device hardware shell -> the part of the operating system that interfaces with applications and the user Explain: A GUI, or graphical user interface, allows the user to interact with the operating system by pointing and clicking at elements on the screen. A CLI, or command-line interface, requires users to type commands at a prompt in order to interact with the OS. The shell is the part of the operating system that is closest to the user. The kernel is the part of the operating system that interfaces with the hardware. • Match the requirements of a reliable network with the supporting network architecture. (Not all options are used.) Question Answer Place the options in the following order. Protect the network from unauthorized access. -> security Provide redundant links and devices. -> fault tolerance satellite leased line cable modem • What is an ISP? It is a standards body that develops cabling and wiring standards for networking. It is a protocol that establishes how computers within a local network communicate. It is an organization that enables individuals and businesses to connect to the Internet. It is a networking device that combines the functionality of several different networking devices in one. • Refer to the exhibit. A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem? CCNA 1 Practice Final Answer 001 (v5.02, 2015) Connect to the Ethernet port on the PC. Change connection settings to even parity. Move the cable to the router console port. Use a crossover cable instead of a rollover cable. • Which connection provides a secure CLI session with encryption to a Cisco router? a console connection an AUX connection a Telnet connection an SSH connection • Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message- of- the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem? CCNA 1 Practice Final Answer 003 (v5.02, 2015) The banner message is too long. The delimiting character appears in the banner message. The symbol “!” signals the end of a banner message. Message-of-the-day banners will only appear when a user logs in through the console port. • What will happen if the default gateway address is incorrectly configured on a host? The host cannot communicate with other hosts in the local network. The switch will not forward packets initiated by the host. The host will have to use ARP to determine the correct address of the default gateway. The host cannot communicate with hosts in other networks. A ping from the host to 127.0.0.1 would not be successful. • A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device only has an Ethernet NIC. The end-user device requires a dedicated connection because of performance requirements. The end-user device needs mobility when connecting to the network. The end-user device area has a high concentration of RFI. • A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? presentation layer network layer physical layer data link layer • Refer to the exhibit. Which layer of the OSI model would format data in this way? CCNA 1 Practice Final Answer 005 (v5.02, 2015) physical network data link transpor t applicati on • On a point-to-point network, which communication type is used when two devices can both transmit and receive but not at the same time? controlled access deterministic full-duplex half-duplex • A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame? to determine the physical address of the sending device to verify the network layer protocol information to compare the interface media type between the sending and receiving ends to check the frame for possible transmission errors to verify that the frame destination matches the MAC address of the receiving device • The ARP table in a switch maps which two types of address together? Layer 3 address to a Layer 2 address Layer 3 address to a Layer 4 address Layer 4 address to a Layer 2 address Layer 2 address to a Layer 4 address • What are two actions performed by a Cisco switch? (Choose two.) building a routing table that is based on the first IP address in the frame header using the source MAC addresses of frames to build and maintain a MAC address table forwarding frames with unknown destination IP addresses to the default gateway utilizing the MAC address table to forward frames via the destination MAC address examining the destination MAC address to add new entries to the MAC address table global routing prefix subnet mask subnet ID interface ID • A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix? 3 4 6 8 14 16 • A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks? 192.168.99.0/26 192.168.99.64/27 192.168.99.0/27 192.168.99.32/26 192.168.99.0/27 192.168.99.32/28 192.168.99.0/28 192.168.99.16/28 192.168.99.0/28 192.168.99.64/26 • The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create? 1024 2048 4096 8192 65536 • A user is attempting to do an http://www.cisco.com/ HYPERLINK "http://www.cisco.com/" without success. Which two configuration values must be set on the host to allow this access? (Choose two.) DNS server WINS server HTTP server default gateway Netbios • Which devices should be secured to mitigate against MAC address spoofing attacks? Layer 7 devices Layer 4 devices Layer 2 devices Layer 3 devices • Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access? line router global interfa ce privileged EXEC • Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate? CCNA 1 Practice Final Answer 007 (v5.02, 2015) Connectivity to the remote device was successful. A router along the path did not have a route to the destination. A ping packet is being blocked by a security device along the path. The connection timed out while waiting for a reply from the remote device. • Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity? indicates the point of failure in the connection shows the IP address of the next hop router for each route lists the IP addresses of all hops the traffic will pass through to reach the destination network shows the incoming and outgoing interfaces the traffic will go through in order to reach the destination network • A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says “This connection has limited or no connectivity.” The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem? The workstation NIC has malfunctioned. The subnet mask was configured incorrectly. The DNS server IP address needs to be configured. The workstation is unable to obtain an IP address from a DHCP server. • A particular email site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? ipconfig / all arp -a ipconfig /displaydns nslookup • To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged? The command should have been copy startup-config tftp. The configuration should have been copied to the running configuration instead. The configuration changes were copied into RAM and require a reboot to take What is the secret keyword that is displayed on the web page? cisc o swit ch fra me pac ket rout er • Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.) email voice file transfer instant messaging video • Fill in the blank. In dotted decimal notation, the IP address “172.25.0.126” is the last host address for the network 172.25.0.64/26. • What are two characteristics of a scalable network? (Choose two.) is not as reliable as a small network grows in size without impacting existing users easily overloaded with increased traffic suitable for modular devices that allow for expansion offers limited number of applications • Match the subnetwork to a host address that would be included within the subnetwork (Not all optons are used.) Subnet 192.168.1.32/27 will have a valid host range from 192.168.1.33 – 192.168.1.62 with the broadcast address as 192.168.1.63 Subnet 192.168.1.64/27 will have a valid host range from 192.168.1.65 – 192.168.1.94 with the broadcast address as 192.168.1.95 Subnet 192.168.1.96/27 will have a valid host range from 192.168.1.97 – 192.168.1.126 with the broadcast address as 192.168.1.127 • What information is added during encapsulation at OSI Layer 3? source and destination port number source and destination MAC source and destination IP address source and destination application protocol • Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.) A packet with the destination IP address of RouterA. A frame with the destination MAC address of SwitchA. A frame with the destination MAC address of RouterA. A packet with the destination IP address of RouterB. A packet with the destination IP address of ServerB. A frame with the destination MAC address of ServerB. • What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? It will remove the frame from the media. It will discard the frame. It will forward the frame to the next host. It will strip off the data-link frame to check the destination IP address. • A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC? 1,500 5 6,001 1,501 6,000 • What three primary functions does data link layer encapsulation provide? (Choose three.) error detection port identification addressing path determination IP address resolution frame delimiting • Fill in the blank using a number. The minimum Ethernet frame size is “64” bytes. Anything smaller than that should be considered a “runt frame.” • What three statements describe features or functions of media access control? (Choose three.) Ethernet utilizes CSMA/CD. 802.11 utilizes CSMA/CD. It uses contention-based access also known as deterministic access. Data link layer protocols define the rules for access to different media. Controlled media access involves collision handling. It is responsible for detecting transmission errors in transmitted data. • Open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which information is obtained from this command output? 10.20.20.3, non-authoritative answer 10.20.20.4, non-authoritative answer • , authoritative answer • , authoritative answer • What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) greater bandwidth potential limited susceptibility to EMI/RFI durable connections WEP WPA • An administrator needs to upgrade the IOS in a router to a version that supports new features. Which factor should the administrator consider before performing the upgrade? NVRAM must be erased before the new IOS can be installed. The old IOS should be backed up to NVRAM so that it is not lost during a power failure. The new IOS might require more RAM to function properly. The old IOS must be removed first. • Which two statements describe the characteristics of fiber-optic cabling? (Choose two.) Fiber-optic cabling does not conduct electricity. Fiber-optic cabling has high signal loss. Fiber-optic cabling is primarily used as backbone cabling. Multimode fiber-optic cabling carries signals from multiple sending devices. Fiber-optic cabling uses LEDs for single-mode cables and laser technology for multimode cables. • A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information? DHCPDISCOV ER DHCPOFFER DHCPREQUE ST DHCPACK* DHCPNACK • What part of the URL, http://www.cisco.com/index.html HYPERLINK "http://www.cisco.com/index.html", HYPERLINK "http://www.cisco.com/index.html" represents the top-level DNS domain? www .co m htt p ind ex • A user issues the ipconfig /displaydns command on the workstation. What is the function of this command? to show all of the cached DNS entries to show the local DNS server parameters to show the result of last name resolution request to show the DNS configuration for the workstation • Consider the following range of addresses: 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: … 2001:0DB8:BC15:00AF:000 0:: The prefix-length for the range of addresses is 60 • Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details? protocol models Request for Comments IRTF research papers IEEE standards • What information does the loopback test provide? The device has the correct IP address on the network. The Ethernet cable is working correctly. The device has end-to-end connectivity. DHCP is working correctly. The TCP/IP stack on the device is working correctly. • What are the two main components of Cisco Express Forwarding (CEF)? (Choose two.) adjacency tables ARP tables routing tables forwarding information base (FIB) MAC-address tables • Which subnet would include the address 192.168.1.96 as a usable host address? 192.168.1.64/26 192.168.1.32/27 192.168.1.32/28 192.168.1.64/29 • When applied to a router, which command would help mitigate brute-force password attacks against the router? exec-timeout 30 banner motd $Max failed logins = 5$ login block-for 60 attempts 5 within 60 service password-encryption • Which statement best describes the operation of the File Transfer Protocol? An FTP client uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP Server. An FTP client uses a source port number of 20 and a randomly generated destination port number during the establishment of data traffic with an FTP Server. An FTP server uses a source port number of 20 and a randomly generated destination port number during the establishment of control traffic with an FTP client. An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client. • What is a characteristic of multicast messages? They are sent to a select group of hosts. They are sent to all hosts on a network. They must be