Fiszki

neverminder

Test w formie fiszek
Ilość pytań: 124 Rozwiązywany: 4354 razy
What is the purpose of the command ping ::1?
It tests the broadcast capability of all hosts on the subnet.
It tests the multicast connectivity to all hosts on the subnet.
It tests the reachability of the default gateway for the network.
It tests the internal configuration of an IPv6 host.
It tests the internal configuration of an IPv6 host.
How many usable IP addresses are available on the 192.168.1.0/27 network?
254
16
30
30
What is the process of dividing a data stream into smaller pieces before transmission?
encapsulation
encoding
flow control
segmentation
segmentation
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
subnet mask
DNS server address
default gateway
subnet mask
Which two roles can a computer assume in a peer-to-peer network where a file is being shared between two computers? (Choose two.)
slave
master
client
server
client
server
Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)
Ethernet
IP
DNS
UDP
TCP
POP
DNS
POP
What is one difference between the client-server and peer-to-peer network models?
Every device in a peer-to-peer network can function as a client or a server
A data transfer that uses a device serving in a client role requires that a dedicated server be present.
Only in the client-server model can file transfers occur.
A peer-to-peer network transfers data faster than a transfer using a client-server network.
Every device in a peer-to-peer network can function as a client or a server
What is the function of the HTTP GET message?
to retrieve client email from an email server using TCP port 110
to request an HTML page from a web server
to send error information from a web server to a web client
to request an HTML page from a web server
Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?
peer-to-peer
client/server
point-to-point
master-slave
client/server
What network service resolves the URL entered on a PC to the IP address of the destination server?
dhcp
dns
ftp
snmp
dns
A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?
a next-hop timeout from a traceroute an increase in host-to-host ping response times
a change in the bandwidth according to the show interfaces output
a change in the amount of RAM according to the show version output
a next-hop timeout from a traceroute an increase in host-to-host ping response times
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?
application filtering
stateful packet inspection
packet filtering
URL filtering
stateful packet inspection
What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?
The computer cannot ping 127.0.0.1.
The computer receives an IP address that starts with 169.254
The computer cannot ping other devices on the same network with IP addresses in the 169.254.0.0/16 range.
The computer receives an IP address that starts with 169.254
Which command can an administrator issue on a Cisco router to send debug messages to the vty lines? terminal monitor* logging console logging buffered logging synchronous
terminal monitor
logging console
logging buffered
terminal monitor
Fill in the blank. During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a ........ message.
broadcast
multicast
unicast
multicast
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?
leased line
dialup
satellite
cable modem
DSL
leased line
What is the purpose of having a converged network?
to make sure that all types of data packets will be treated equally
to reduce the cost of deploying and maintaining the communication infrastructure
to provide high speed connectivity to all end devices
to achieve fault tolerance and high availability of data network infrastructure devices
to reduce the cost of deploying and maintaining the communication infrastructure
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users? reliability scalability* quality of service accessibility
reliability
scalability
accessibility
scalability
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?
ROM
the configuration register
a TFTP server
flash
NVRAM
NVRAM
Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?
120
What are three characteristics of an SVI? (Choose three.)
It is associated with VLAN1 by default.
It is required to allow connectivity by any device at any location.
It provides a means to remotely manage a switch.
It is a special interface that allows connectivity by different types of media.
It is designed as a security protocol to protect switch ports.
It is not associated with any physical interface on a switch.
It is associated with VLAN1 by default.
It provides a means to remotely manage a switch.
It is not associated with any physical interface on a switch.
A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdownWhat is the technician configuring? Telnet access SVI password encryption physical switchport access
physical switchport access
SVI
password encryption
Telnet access
SVI
In computer communication, what is the purpose of message encoding?
to negotiate correct timing for successful communication
to convert information to the appropriate form for transmission*
to break large messages into smaller frames
to convert information to the appropriate form for transmission*
What is a characteristic of multicast messages?
They are sent to a select group of hosts.
They must be acknowledged.
They are sent to a single destination.
They are sent to a select group of hosts.

Powiązane tematy

Inne tryby