Examen C

A detailed and visually engaging illustration representing networking concepts, featuring elements like routers, switches, cables, and virtual networks in a modern digital landscape.

Networking Knowledge Challenge

Test your expertise in networking concepts with our comprehensive quiz! This quiz is designed to assess your understanding of various networking technologies, protocols, and configurations. Perfect for networking professionals or students looking to deepen their knowledge.

  • 29 challenging questions
  • Covers a wide range of networking topics
  • Ideal for preparation for certification exams
29 Questions7 MinutesCreated by ConnectingCloud274
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?
DSL
Dialup
Satellite
Leased line
Cable modem
What is the purpose of having a converged network?
To provide high speed connectivity to all end devices
To make sure that all types of data packets will be treated equally
To achieve fault tolerance and high availability of data network infrastructure devices
To reduce the cost of deploying and maintaining the communication infrastructure
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
Reliability
Scalability
Quality of service
Accessibility
Which connection provides a secure CLI session with encryption to a Cisco switch?
A console connection
An AUX connection
A Telnet connection
An SSH connection
A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?
The command is being entered from the wrong mode of operation.
The command syntax is wrong.
The subnet mask information is incorrect.
The interface is shutdown and must be enabled before the switch will accept the IP address.
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?
Flash
ROM
NVRAM
RAM
The configuration register
A TFTP server
What are three characteristics of an SVI? (Choose three.)
It is designed as a security protocol to protect switch ports.
It is not associated with any physical interface on a switch.
It is a special interface that allows connectivity by different types of media.
It is required to allow connectivity by any device at any location.
It provides a means to remotely manage a switch.
It is associated with VLAN1 by default.
In computer communication, what is the purpose of message encoding?
To convert information to the appropriate form for transmission*
To interpret information
To break large messages into smaller frames
To negotiate correct timing for successful communication
What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?
TCP
IP
HTTP
Ethernet
What are two benefits of using a layered network model? (Choose two.)
It assists in protocol design.
It speeds up packet delivery.
It prevents designers from creating their own model.
It prevents technology in one layer from affecting other layers.
It ensures a device at one layer can function at the next higher layer.
What is the process of dividing a data stream into smaller pieces before transmission?
Segmentation
Encapsulation
Encoding
Flow control
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
DNS server address
Subnet mask
Default gateway
DHCP server address
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
Presentation layer
Network layer
Physical layer
Data link layer
A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)
The amount of traffic that is currently crossing the network
The sophistication of the encapsulation method applied to the data
The type of traffic that is crossing the network
The latency that is created by the number of network devices that the data is crossing
The bandwidth of the WAN connection to the Internet
The reliability of the gigabit Ethernet infrastructure of the backbone
Which type of UTP cable is used to connect a PC to a switch port?
Console
Rollover
Crossover
Straight-through
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?
It will discard the frame.
It will forward the frame to the next host.
It will remove the frame from the media.
It will strip off the data-link frame to check the destination IP address.
What information is added during encapsulation at OSI Layer 3?
Source and destination MAC
Source and destination application protocol
Source and destination port number
Source and destination IP address
Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?
To identify the broadcast address of the destination network
To identify the host address of the destination host
To identify faulty frames
To identify the network address of the destination network
What type of IPv6 address is FE80::1?
Loopback
Multicast
Global
Link-local
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
How many hosts are addressable on a network that has a mask of 255.255.255.248?
2
6
12
8
14
16
254
Which statement is true about variable-length subnet masking?
Each subnet is the same size.
The size of each subnet may be different, depending on requirements.
Subnets may only be subnetted one additional time.
Bits are returned, rather than borrowed, to create additional subnets.
What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?
Timing and synchronization
Destination and source port numbers
Destination and source physical addresses
Destination and source logical network addresses
What is the TCP mechanism used in congestion avoidance?
Three-way handshake
Socket pair
Two-way handshake
Sliding window
What is the function of the HTTP GET message?
To request an HTML page from a web server
To send error information from a web server to a web client
To upload content to a web server from a web client
To retrieve client email from an email server using TCP port 110
A wireless host needs to request an IP address. What protocol would be used to process the request?
FTP
HTTP
DHCP
ICMP
SNMP
When planning for network growth, where in the network should packet captures take place to assess network traffic?
On as many different network segments as possible
Only at the edge of the network
Between hosts and the default gateway
Only on the busiest network segment
When applied to a router, which command would help mitigate brute-force password attacks against the router?
Exec-timeout 30
Service password-encryption
Banner motd $Max failed logins = 5$
Login block-for 60 attempts 5 within 60
A user is unable to reach the web site when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?
Default gateway
DHCP
DNS
TCP/IP protocol stack
{"name":"Examen C", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your expertise in networking concepts with our comprehensive quiz! This quiz is designed to assess your understanding of various networking technologies, protocols, and configurations. Perfect for networking professionals or students looking to deepen their knowledge.29 challenging questionsCovers a wide range of networking topicsIdeal for preparation for certification exams","img":"https:/images/course4.png"}
Powered by: Quiz Maker