Revision Questions-part 2.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Revision Questions 1. What will happen if the default gateway address is incorrectly configured on a host? a) The host cannot communicate with other hosts in the local network. b) The switch will not forward packets initiated by the host. c) The host will have to use ARP to determine the correct...

Revision Questions 1. What will happen if the default gateway address is incorrectly configured on a host? a) The host cannot communicate with other hosts in the local network. b) The switch will not forward packets initiated by the host. c) The host will have to use ARP to determine the correct address of the default gateway. d) The host cannot communicate with hosts in other networks. e) A ping from the host to 127.0.0.1 would not be successful. 2. Which characteristic describes the default gateway of a host computer? a) the logical address of the router interface on the same network as the host computer b) the physical address of the switch interface connected to the host computer c) the physical address of the router interface on the same network as the host computer d) the logical address assigned to the switch interface connected to the router 3. A computer in a given network is communicating with a specific group of computers. What type of communication is this? a) broadcast b) multicast c) unicast d) ARP e) HTTP 4. How many bits are in an IPv4 address? a) 32 b) 64 c) 128 d) 256 5. Which two parts are components of an IPv4 address? (Choose two.) a) subnet portion b) network portion c) logical portion d) host portion e) physical portion f) broadcast portion 6. What does the IP address 172.17.4.250/24 represent? a) network address b) multicast address c) host address d) broadcast address 7. What is the purpose of the subnet mask in conjunction with an IP address? a) to uniquely identify a host on a network b) to identify whether the address is public or private c) to determine the subnet to which the host belongs d) to mask the IP address to outsiders 8. What subnet mask is represented by the slash notation /20? a) 255.255.255.248 b) 255.255.224.0 c) 255.255.240.0 d) 255.255.255.0 e) 255.255.255.192 9. What are two characteristics of multicast transmission? (Choose two.) a) The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255. b) A single packet can be sent to a group of hosts. c) The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network. d) Computers use multicast transmission to request IPv4 addresses. e) Multicast messages map lower layer addresses to upper layer addresses 10. Which three IP addresses are private ? (Choose three.) a) 10.1.1.1 b) 172.32.5.2 c) 192.167.10.10 d) 172.16.4.4 e) 192.168.5.5 f) 224.6.6.6 11. Which two things can be determined by using the ping command? (Choose two.) a) the number of routers between the source and destination device b) the IP address of the router nearest the destination device c) the average time it takes a packet to reach the destination and for the response to return to the source d) the destination device is reachable through the network e) the average time it takes each router in the path between source and destination to respond 12. What is the binary equivalent of the decimal number 232? a) 11101000 b) 11000110 c) 10011000 d) 11110010 13. What is the decimal equivalent of the binary number 10010101? a) 149 b) 157 c) 168 d) 192 14. A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth? a) window size b) multiplexing c) port numbers d) acknowledgments 15. A host device sends a data packet to a web server via the HTTP protocol. What is used by the transport layer at the receiver to pass the data stream to the proper application on the server? a) sequence number b) acknowledgment c) source port number d) destination port number 16. What is a beneficial feature of the UDP transport protocol? a) acknowledgment of received data b) fewer delays in transmission c) tracking of data segments using sequence numbers d) the ability to retransmit lost data 17. Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly? a) Time-to-Live b) Sequence Number c) Acknowledgment Number d) Differentiated Services 18. What IPv4 header field identifies the upper layer protocol carried in the packet? a) Protocol b) Identification c) Version d) Differentiated Services 19. Refer to the exhibit. Which route from the PC1 routing table will be used to reach PC2?  A. The graphic contains a table that has five columns. The column headings and values are as follows. The column one heading is Network Destination and the value is 192.168.10.0. The column two heading is Netmask and the value is 255.255.255.0. The column three heading is Gateway and the value is On-link. The column four heading is Interface and the value is 192.168.10.10. The column five heading is Metric and the value is 281.  B. The graphic contains a table that has five columns. The column headings and values are as follows. The column one heading is Network Destination and the value is 192.168.10.10. The column two heading is Netmask and the value is 255.255.255.255. The column three heading is Gateway and the value is On-link. The column four heading is Interface and the value is 192.168.10.10. The column five heading is Metric and the value is 281.  C. The graphic contains a table that has five columns. The column headings and values are as follows. The column one heading is Network Destination and the value is 127.0.0.1. The column two heading is Netmask and the value is 255.255.255.255. The column three heading is Gateway and the value is On-link. The column four heading is Interface and the value is 127.0.0.1. The column five heading is Metric and the value is 306.  D. The graphic contains a table that has five columns. The column headings and values are as follows. The column one heading is Network Destination and the value is 0.0.0.0. The column two heading is Netmask and the value is 0.0.0.0. The column three heading is Gateway and the value is 192.168.10.1. The column four heading is Interface and the value is 192.168.10.10. The column five heading is Metric and the value is 25. 20. Refer to the exhibit. R1 receives a packet destined for the IP address 192.168.2.10. Out which interface will R1 forward the packet? a) FastEthernet0/0 b) FastEthernet0/1 c) Serial0/0/0 d) Serial0/0/1 21. What type of route is indicated by the code C in an IPv4 routing table on a Cisco router? a) static route b) default route c) directly connected route d) dynamic route that is learned through EIGRP 22. Following default settings, what is the next step in the router boot sequence after the IOS loads from flash? a) Perform the POST routine. b) Locate and load the startup-config file from NVRAM. c) Load the bootstrap program from ROM. d) Load the running-config file from RAM. 23. Which two pieces of information are in the RAM of a Cisco router during normal operation? (Choose two.) a) Cisco IOS b) backup IOS file c) IP routing table d) basic diagnostic software e) startup configuration file 24. What is the purpose of the startup configuration file on a Cisco router? a) to facilitate the basic operation of the hardware components of a device b) to contain the commands that are used to initially configure a router on startup c) to contain the configuration commands that the router IOS is currently using d) to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS 25. Which characteristic describes an IPv6 enhancement over IPv4? a) IPv6 addresses are based on 128-bit flat addressing as opposed to IPv4 which is based on 32-bit hierarchical addressing. b) The IPv6 header is simpler than the IPv4 header is, which improves packet handling. c) Both IPv4 and IPv6 support authentication, but only IPv6 supports privacy capabilities. d) The IPv6 address space is four times bigger than the IPv4 address space. 26. Which IPv4 header field is responsible for defining the priority of the packet? a) flow label b) flags c) differentiated services d) traffic class 27. Why is NAT not needed in IPv6? a) Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.? b) Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large. c) The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.? d) The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet. 28. What is a service provided by the Flow Label field of the IPv6 header? a) It limits the lifetime of a packet. b) It identifies the total length of the IPv6 packet. c) It classifies packets for traffic congestion control. d) It informs network devices to maintain the same path for real-time application packets. 29. Which two commands can be used on a Windows host to display the routing table? (Choose two.) a) netstat -s b) route print c) show ip route d) netstat -r e) tracert 30. During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry? a) discard the traffic after consulting the route table b) look up the next-hop address for the packet c) switch the packet to the directly connected interface d) analyze the destination IP address 31. After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router reboots. What command should be issued? a) copy running-config flash b) copy startup-config flash c) copy running-config startup-config d) reload e) copy startup-config running-config 32. A technician is manually configuring a computer with the necessary IP parameters to communicate over the corporate network. The computer already has an IP address, a subnet mask, and a DNS server. What else has to be configured for Internet access? a) the WINS server address b) the default gateway address c) the MAC address d) the domain name of the organization 33. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent? a) The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host. b) The packet will be sent directly to the destination host. c) The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host. d) The packet will be sent only to the default gateway. 34. Refer to the exhibit. Fill in the blank. A packet leaving PC-1 has to traverse …….hops to reach PC-4.? a) 5 b) 4 c) 3 d) 2

Use Quizgecko on...
Browser
Browser