FINAL EXAM PART 2 GOOD LUCK

A digital illustration of a computer network with various devices connected, overlaying quiz symbols and a modern design, suitable for a networking exam quiz.

Final Exam Networking Quiz

Test your knowledge with our comprehensive networking quiz, featuring 41 challenging questions that cover various aspects of computer networking. Whether you're a student, a professional, or just a networking enthusiast, this quiz is designed to engage and enhance your understanding.

Topics include:

  • Network Layers
  • IP Addressing
  • Network Security
  • Protocols and Services
41 Questions10 MinutesCreated by AnalyzingData42
What are two functions that are provided by the network layer? (Choose two.)
Carrying data between processes that are running on source and destination hosts
Directing data packets to destination hosts on other networks
Providing dedicated end-to-end connections
Placing data on the network medium
Providing end devices with a unique network identifier
A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.224
255.255.255.240
255.255.255.192
255.255.255.128
What characteristic describes spyware?
A network device that filters access and traffic coming into a network
Software that is installed on a user device and collects information about the user
An attack that slows or crashes a device or network service
The use of stolen credentials to access private data
What are three commonly followed standards for constructing and installing cabling? (Choose three.)
Pinouts
Tensile strength of plastic insulator
Cable lengths
Connector types
Cost per meter (foot)
Connector color
Which connector is used with twisted-pair cabling in an Ethernet LAN? (SHOWS 4 PICS ITS THE ETHERNET ONE ITS CLEAR)
RJ45
What attribute of a NIC would place it at the data link layer of the OSI model?
Attached Ethernet cable
TCP/IP protocol stack
IP address
RJ-45 port
MAC address
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
AUX
Telnet
SSH
Console
A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?
The network domain of the destination host
The MAC address of the default gateway
The IP address of the default gateway
The MAC address of the destination host
Which two commands can be used on a Windows host to display the routing table? (Choose two.)
Route print
Show ip route
Netstat -r
Netstat -s
Tracert
A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?
The data flow is being tracked based on the source port number that is used by each application.
The data flow is being tracked based on the destination IP address that is used by the PC of the technician.
The data flow is being tracked based on the source IP address that is used by the PC of the technician.
The data flow is being tracked based on the destination MAC address of the technician PC.
A client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting?
DNS
HTTP
DHCP
SMTP
A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
Source port number
HTTP server
Source MAC address
DNS server
Default gateway
What method is used to manage contention-based access on a wireless network?
CSMA/CD
Priority ordering
CSMA/CA
Token passing
What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)
Router Advertisement
Destination Unreachable
Neighbor Solicitation
Route Redirection
Host Confirmation
Time Exceeded
An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?
4096
256
512
1024
What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?
255.255.255.224
255.255.255.128
255.255.255.240
255.255.255.192
255.255.255.0
A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device obtain a destination MAC address?
It will send an ARP request for the MAC address of the destination device.
It will send the frame with a broadcast MAC address.
It will send the frame and use the device MAC address as the destination.
It will send an ARP request for the MAC address of the default gateway.
It will send an ARP request to the DNS server for the destination MAC address.
What characteristic describes a virus?
The use of stolen credentials to access private data
A network device that filters access and traffic coming into a network
Malicious software or code running on an end device
An attack that slows or crashes a device or network service
A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?
Access
DoS
Trojan horse
Reconnaissance
What service is provided by POP3?
Uses encryption to provide secure remote access to network devices and servers.
Retrieves email from the server by downloading the email to the local mail application of the client.
Allows remote access to network devices and servers.
An application that allows real-time chatting among remote users.
What command can be used on a Windows PC to see the IP configuration of that computer?
Ipconfig
Show interfaces
Ping
Show ip interface brief
Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)
10.18.10.224/27
10.18.10.208/28
10.18.10.200/27
10.18.10.200/28
10.18.10.224/28
A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?
DNS
DHCP
POP3
SMTP
Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
Transport
Application
Network access
Internet
What characteristic describes identity theft?
A tunneling protocol that provides remote users with secure access into the network of an organization
The use of stolen credentials to access private data
Software that identifies fast-spreading threats
Software on a router that filters traffic based on IP addresses or applications
What two security solutions are most likely to be used only in a corporate environment? (Choose two.)
Intrusion prevention systems
Antivirus software
Antispyware
Strong passwords
Virtual private networks
What service is provided by DNS?
Allows for data transfers between a client and a file server.
Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
Resolves domain names, such as cisco.com, into IP addresses.
Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments?
Bluetooth
Zigbee
WiMAX
Wi-Fi
What characteristic describes a VPN?
Software on a router that filters traffic based on IP addresses or applications
A tunneling protocol that provides remote users with secure access into the network of an organization
A network device that filters access and traffic coming into a network
Software that identifies fast-spreading threats
A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.192
255.255.255.248
255.255.255.240
255.255.255.224
During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?
Switch the packet to the directly connected interface
Discard the traffic after consulting the route table
Look up the next-hop address for the packet
Analyze the destination IP address
What service is provided by BOOTP?
Allows for data transfers between a client and a file server.
Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.
Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?
DHCP
FTP
TFTP
DNS
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?
Tracert
Netstat
Nslookup
Ipconfig
What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)
Echo requests
Router solicitations
Router advertisements
Neighbor advertisements
Echo replies
Neighbor solicitations
Refer to the exhibit. The switches have a default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for the default gateway. Which network devices will receive the ARP request sent by host A?
Only hosts A, B, C, and D
Only hosts A, B, and C
Only host D
Only hosts B, C, and router R1
Only router R1
Only hosts B and C
Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)
Integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper
Places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame
Implements trailer with frame check sequence for error detection
Applies source and destination MAC addresses to Ethernet frame
Enables IPv4 and IPv6 to utilize the same physical medium
Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?
The default gateway is not operational.
The default gateway device is configured with the wrong IP address.
The TCP/IP stack on the default gateway is not working properly.
Security rules are applied to the default gateway device, preventing it from processing ping requests.
What is a benefit of using cloud computing in networking?
Technology is integrated into every-day appliances allowing them to interconnect with other devices, making them more ‘smart’ or automated.
Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
Home networking uses existing electrical wiring to connect devices to the network wherever there is an electrical outlet, saving the cost of installing data cables.
End users have the freedom to use personal tools to access information and communicate across a business network.
What service is provided by SMTP?
Allows remote access to network devices and servers.
Uses encryption to provide secure remote access to network devices and servers.
Allows clients to send email to a mail server and the servers to send email to other servers.
An application that allows real-time chatting among remote users.
A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?
SSH
SSH
DHCP
TFTP
{"name":"FINAL EXAM PART 2 GOOD LUCK", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge with our comprehensive networking quiz, featuring 41 challenging questions that cover various aspects of computer networking. Whether you're a student, a professional, or just a networking enthusiast, this quiz is designed to engage and enhance your understanding.Topics include:Network LayersIP AddressingNetwork SecurityProtocols and Services","img":"https:/images/course5.png"}
Powered by: Quiz Maker