Soal Ch1 S.D 8
Soal Ch1 S.D 8
computer was secretly collecting data about websites that were visited by users of the computer.
Which type of threat is affecting this computer?
a. spyware
b. zero-day attack
c. DoS attack
d. identity theft
Which term refers to a network that provides secure access to the corporate offices by suppliers,
customers and collaborators?
a. Internet
b. extranet
c. intranet
d. extendednet
A large corporation has modified its network to allow users to access network resources from
their personal laptops and smart phones. Which networking trend does this describe?
a. bring your own device
b. cloud computing
c. online collaboration
d. video conferencing
What is an ISP?
a. It is a protocol that establishes how computers within a local network communicate.
b. It is a networking device that combines the functionality of several different
networking devices in one.
c. It is an organization that enables individuals and businesses to connect to the Internet.
d. It is a standards body that develops cabling and wiring standards for networking.
What characteristic of a network enables it to quickly grow to support new users and
applications without impacting the performance of the service being delivered to existing users?
a. scalability
b. reliability
c. quality of service
d. accessibility
A college is building a new dormitory on its campus. Workers are digging in the ground to
install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable
that connects two of the existing dormitories to the campus data center. Although the cable has
been cut, students in the dormitories only experience a very short interruption of network
services. What characteristic of the network is shown here?
a. quality of service (QoS)
b. scalability
c. security
d. fault tolerance
e. integrity
Which device performs the function of determining the path that messages should take through
internetworks?
a. a web server
b. a firewall
c. a router
d. a DSL modem
Which two Internet connection options do not require that physical cables be run to the
building? (Choose two.)
a. DSL
b. dialup
c. satellite
d. dedicated leased line
e. cellular
What type of network must a home user access in order to do online shopping?
a. the Internet
b. an extranet
c. an intranet
d. a local area network
How does BYOD change the way in which businesses implement networks?
a. BYOD devices are more expensive than devices that are purchased by an organization.
b. BYOD provides flexibility in where and how users can access network resources.
c. BYOD requires organizations to purchase laptops rather than desktops.
d. BYOD users are responsible for their own network security, thus reducing the need for
organizational security policies.
An employee wants to access the network of the organization remotely, in the safest possible
way. What network feature would allow an employee to gain secure remote access to a
company network?
a. IPS
b. ACL
c. VPN
d. BYOD
Which statement is true about the running configuration file in a Cisco IOS device?
It is stored in NVRAM.
Which two statements are true regarding the user EXEC mode? (Choose two.)
Only some aspects of the router configuration can be viewed.
The device prompt for this mode ends with the ">" symbol.
Which type of access is secured on a Cisco router or switch with the enable secret command?
console line
AUX port
privileged EXEC
virtual terminal
VLAN999
VLAN1
VLAN99
When a hostname is configured through the Cisco CLI, which three naming conventions are
part of the guidelines? (Choose three.)
the hostname should contain no spaces
A router with a valid operating system contains a configuration file stored in NVRAM. The
configuration file has an enable secret password but no console password. When the router
boots up, which mode will display?
global configuration mode
privileged EXEC mode
setup mode
An administrator has just changed the IP address of an interface on an IOS device. What else
must be done in order to apply those changes to the device?
Copy the information in the startup configuration file to the running configuration.
Reload the device and type yes when prompted to save the configuration.
Which memory location on a Cisco router or switch will lose all content when the device is
restarted?
ROM
flash
NVRAM
RAM
Which two functions are provided to users by the context-sensitive help feature of the Cisco
IOS CLI? (Choose two.)
displaying a list of all available commands within the current mode
allowing the user to complete the remainder of an abbreviated command with the TAB key
determining which option, keyword, or argument is available for the entered command
Which memory location on a Cisco router or switch stores the startup configuration file?
NVRAM
RAM
flash
ROM
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?
10.1.0.0
10.0.0.0
10.1.100.32
10.1.100.0
What type of communication will send a message to all devices on a local area network?
unicast
allcast
multicast
broadcast
Which message delivery option is used when all devices need to receive the same message simultaneously?
duplex
multicast
unicast
broadcast
What are two benefits of using a layered network model? (Choose two.)
It ensures a device at one layer can function at the next higher layer.
It prevents designers from creating their own model.
It speeds up packet delivery.
It assists in protocol design.
It prevents technology in one layer from affecting other layers.
What is the general term that is used to describe a piece of data at any layer of a networking model?
frame
protocol data unit
packet
segment
Which layer of the OSI model defines services to segment and reassemble data for individual communications
between end devices?
presentation
application
network
session
transport
Which type of communication will send a message to a group of host destinations simultaneously?
broadcast
anycast
unicast
multicast
What process is used to receive transmitted data and convert it into a readable message?
access control
decoding
flow control
encapsulation
What process is used to place one message inside another message for transfer from the source to the destination?
flow control
access control
encapsulation
decoding
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the
correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, IP, TCP, Ethernet
Ethernet, IP, TCP, HTTP
Ethernet, TCP, IP, HTTP
HTTP, TCP, IP, Ethernet
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices
that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error
categorized?
presentation layer
physical layer
network layer
data link layer
What type of cable is used to connect a workstation serial port to a Cisco router console port?
rollover
coaxial
straight-through
crossover
Why are two strands of fiber used for a single fiber optic connection?
They allow for full-duplex connectivity.
They prevent crosstalk from causing interference on the connection.
The two strands allow the data to travel for longer distances without degrading.
They increase the speed at which the data can travel.
What is one advantage of using fiber optic cabling rather than copper cabling?
It is easier to terminate and install than copper cabling.
It is able to be installed around sharp bends.
It is able to carry signals much farther than copper cabling.
It is usually cheaper than copper cabling.
A network administrator is designing a new network infrastructure that includes both wired and wireless
connectivity. Under which situation would a wireless connection be recommended?
The end-user device requires a dedicated connection because of performance requirements.
The end-user device needs mobility when connecting to the network.
The end-user device only has an Ethernet NIC.
The end-user device area has a high concentration of RFI.
A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is
located at the highest part of the national park. After network testing is complete, the technicians report that the
wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal
distortion?
the number of wireless devices that are used in the wireless LAN
the microwave oven
the elevated location where the wireless LAN was installed
the large number of trees that surround the office
Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted
decimal format?
236.17.12.10
236.17.12.6
234.17.10.9
234.16.12.10
Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)
IPv4 addresses are 32 bits in length.
Which IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14?
dotted decimal
hexadecimal
ASCII
binary
What is the dotted decimal representation of the IPv4 address which is represented as the binary string
00001010.01100100.00010101.00000001?
100.21.10.1
10.10.20.1
100.10.11.1
10.100.21.1
What attribute of a NIC would place it at the data link layer of the OSI model?
MAC address
IP address
TCP/IP protocol stack
RJ-45 port
attached Ethernet cable
Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose
two.)
Electronic Industries Alliance (EIA)
Internet Society (ISOC)
Institute of Electrical and Electronics Engineers (IEEE)
International Telecommunication Union (ITU)
Internet Assigned Numbers Authority (IANA)
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy.
Which physical topology requires that every node is attached to every other node on the network?
ring
star
mesh
hierarchical
bus
Which data link layer media access control method does Ethernet use with legacy Ethernet hubs?
determinism
turn taking
token passing
CSMA/CD
What are the two sublayers of the OSI model data link layer? (Choose two.)
physical
MAC
transport
network access
internet
LLC
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of
media?
physical
transport
application
data link
What type of physical topology can be created by connecting all Ethernet cables to a central device?
ring
bus
star
mesh
What are two services performed by the data link layer of the OSI model? (Choose two.)
It provides media access control and performs error detection.
It fragments data packets into the MTU size.
It determines the path to forward packets.
It accepts Layer 3 packets and encapsulates them into frames.
It monitors the Layer 2 communication by building a MAC address table.
What is the special value assigned to the first 24 bits of a multicast MAC address transporting an IPv4 packet?
01-5E-00
FF-FF-FF
FF-00-5E
01-00-5E
What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does
not match its own MAC address?
It will discard the frame.
It will forward the frame to the next host.
It will strip off the data-link frame to check the destination IP address.
It will remove the frame from the media.
Which network device makes forwarding decisions based on the destination MAC address that is contained in the
frame?
repeater
router
hub
switch
Which network device has the primary function to send data to a specific destination based on the information found
in the MAC address table?
switch
hub
modem
router
What addressing information is recorded by a switch to build its MAC address table?
the source Layer 3 address of outgoing packets
the destination Layer 3 address of incoming packets
the source Layer 2 address of incoming frames
the destination Layer 2 address of outgoing frames
What is auto-MDIX?
a type of Cisco switch
a feature to automatically determine speed and duplex
an Ethernet connector type
a feature that detects Ethernet cable type
What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)
56 bytes
128 bytes
1024 bytes
1518 bytes
64 bytes
Which two functions or operations are performed by the MAC sublayer? (Choose two.)
It adds a header and trailer to form an OSI Layer 2 PDU.
Which command can be used on a Windows host to display the routing table?
show ip route
netstat –s
netstat –r
tracert
When a router receives a packet, what information must be examined in order for the packet to be forwarded to a
remote destination?
source MAC address
destination MAC address
destination IP address
source IP address
A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?
The packet will be sent directly to the destination host.
The packet will be sent to the default gateway first, and then, depending on the response from the gateway,
it may be sent to the destination host.
The packet will first be sent to the default gateway, and then from the default gateway it will be sent
directly to the destination host.
The packet will be sent only to the default gateway.
Which IPv4 address can a host use to ping the loopback interface?
126.0.0.1
127.0.0.0
127.0.0.1
126.0.0.0
When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and
retransmitted if necessary?
Connectionless acknowledgements are used to request retransmission.
Upper-layer connection-oriented protocols keep track of the data received and can request retransmission
from the upper-level protocols on the sending host.
The best-effort delivery process guarantees that all packets that are sent are received.
Network layer IP protocols manage the communication sessions if connection-oriented transport services
are not available.
What was the reason for the creation and implementation of IPv6?
to relieve IPv4 address depletion
to make reading a 32-bit address easier
to allow NAT support for private addressing
to provide more address space in the Internet Names Registry
Which information is used by routers to forward a data packet toward its destination?
destination data-link address
destination IP address
source IP address
source data-link address
Which field in an IPv4 packet header will typically stay the same during its transmission?
Time-to-Live
Packet Length
Flag
Destination Address
Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?
Address Unreachable
No Route to Destination
Hop Limit
TTL