NEW version (2023) How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. Please comment below this article with the new question, including both the question itself and the multiple-choice options. We will promptly provide updated answers for you. Your input is greatly appreciated, and we are committed to ensuring the accuracy of the information on our website. Thank you for your valuable contribution!1. Match the type of malware with the definition. Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Q1 2. An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?
3. Which three attacks exploit human behavior? (Choose three.)
4. What is the effect of setting the security mode to WEP on a small wireless router?
5. Which solution allows external users to access only an internal FTP server on a private network?
6. What is an inherent security vulnerability of SSID broadcasting?
7. Refer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address? Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Q7
8. A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?
9. Match each DHCP message type with its description. (Not all options are used.) Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Q9 Explanation: Place the options in the following order:
11. Which two criteria are used to help select a network medium for a network? (Choose two.)
The distance the selected medium can successfully carry a signal in the environment in which the selected medium is to be installed The amount of data and the speed at which the data must be transmitted The cost of the medium and its installation 12. What is an advantage of using standards to develop and implement protocols?
13. At which layer of the OSI model would a logical address be added during encapsulation?
14. Which wireless RF band do IEEE 802.11b/g devices use?
15. Refer to the exhibit. Which router port connects to the modem provided by the service provider? Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Q15
16. Which type of device filtering can be enabled on some wireless access points or wireless routers?
17. Using a systematic troubleshooting approach, a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information, which two questions are associated with Layer 3? (Choose two.)
18. A customer calls the help line to report a computer problem. The help line technician responds and works with the customer for some time. However, the technician cannot identify the root cause of the problem. What should the technician do to help the customer?
19. During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move a few workstations cannot get a valid IP address. What should be checked first to identify the root cause of the problem?
20. A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices?
21. A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?
22. When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?
Device names Device IP addressing Network designations Configuration information 23. Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?
24. A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)? (Choose two.)
25. If the default gateway is configured incorrectly on a host, what is the impact on communications?
26. What are two common media used in networks? (Choose two.)
27. Which two types of interference may affect the data throughput on UTP cables? (Choose two.)
28. What are two wiring schemes defined by the TIA/EIA organization for Ethernet installation in homes and businesses? (Choose two.)
29. A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?
30. Which type of address does a switch use to build the MAC address table?
31. What are two benefits of using a layered network model? (Choose two.)
fosters competition between vendors prevents a technology that functions at one layer from affecting any other layer provides a common language for describing network functionality helps in visualizing the interaction between each layer and protocols between each layer 32. Which two devices are considered end devices? (Choose two.)
33. Which factor does not influence throughput?
34. What is a characteristic of a peer-to-peer application?
35. Using default settings, what is the next step in the switch boot sequence after the IOS loads from flash?
37. What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)
38. A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?
39. Which statement correctly describes data transmission at the transport layer?
40. What type of technology converts analog voice signals into digital data?
41. Match the protocol with the function. (Not all options are used.) Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Q41 42. While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)
43. In software defined network architecture, what function is removed from network devices and performed by an SDN controller?
44. A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?
45. A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
46. A network administrator installs a network device that focuses on interconnecting independent local networks. At which layer of devices does this technology reside?
47. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?
48. If the default gateway is configured incorrectly on the host, what is the impact on communications?
49. Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)
line console 0 password cisco login The interface fastethernet 0/0 command is commonly used to access the configuration mode used to apply specific parameters such as the IP address to the Fa0/0 port. The line vty 0 4 command is used to access the configuration mode for Telnet. The 0 and 4 parameters specify ports 0 through 4, or a maximum of five simultaneous Telnet connections. The enable secret command is used to apply a password used on the router to access the privileged mode. 50. A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
51. Which type of access is secured on a Cisco router or switch with the enable secret command?
52. When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)
53. Match the commands to the correct actions. (Not all options are used.) Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Q53 54. What is the purpose of the subnet mask in conjunction with an IP address?
55. Which two statements describe characteristics of network addresses? (Choose two.)
56. What are three characteristics of multicast transmission? (Choose three.)
57. Match the router prompt to the configuration task. Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Q57 58. A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command on a Cisco switch. Which term is used to describe the “0/1” part in the command?
59. Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.) Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Q59
60. Which command can an administrator execute to determine what interface a router will use to reach remote networks?
Old version (2022)1. What is the difference between the terms bandwidth and throughput?
Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q2
4. When a computer assembles a frame to be sent over the network, what is the maximum size of an Ethernet frame?
5. Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame? Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q5
6. What is the function of ARP?
7. Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is?
8. Match the command to the function. Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q8 9. A medium-sized company uses APs, WLCs, and laptops for employee workstations. An employee reports the inability to connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are two possible reasons for the problem? (Choose two.)
– The client must be within RF range of an AP and requests to authenticate. – The client authenticates. – The client requests and receives an IP address. 10. Match the type of attack with the description. (Not all options are used.) Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q10 11. Which three attacks exploit vulnerabilities in software? (Choose three.)
13. What are two ways to protect a computer from malware? (Choose two.)
14. Which memory location on a Cisco router or switch will lose all content when the device is restarted?
15. Which memory location on a Cisco router or switch stores the startup configuration file?
16. Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?
17. A user is looking for a wireless headphone for listening to songs stored on a smartphone. What wireless technology would the headphone use?
18. Which three features represent benefits of virtualization? (Choose three.)
19. A company has a few employees that are designers. The designers do not have the CAD application loaded on their local computer. Instead, the designers use a CAD application hosted by the application developer. Which type of virtualization is the company using?
20. What is the purpose of the startup configuration file on a Cisco router?
21. Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.)
22. The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?
23. Match the client operation to the network service. Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q23 24. What action does a DNS server take if it does not have an entry for a requested URL?
25. A network security administrator is writing documentation on the firewall requirements for allowing Telnet access to the remote server. Which two pieces of information should be included? (Choose two.)
29. A user is setting up a home wireless network. A global address is to be used in NAT translations for traffic flowing through the wireless router. How is this global address assigned?
30. A network administrator investigates a user problem. The user can reach hosts on the same network, but is unable to communicate to remote networks.The network administrator tries to ping the gateway address configured on the host device and is unsuccessful. What is the most likely cause of the problem?
31. Which switch command would a network administrator use to determine if there are encapsulation or media errors on an interface?
32. Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.) Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q32 The shortcuts with their functions are as follows: – Tab – Completes the remainder of a partially typed command or keyword – Space bar – displays the next screen – ? – provides context-sensitive help – Up Arrow – Allows user to scroll backward through former commands – Ctrl-C – cancels any command currently being entered and returns directly to privileged EXEC mode – Ctrl-Shift-6 – Allows the user to interrupt an IOS process such as ping or traceroute 33. Match the description with the associated IOS mode. (Not all options are used.) Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q33 34. What two default wireless router settings can affect network security? (Choose two.) Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q34
35. Which security function is provided by a firewall?
36. Which wireless security technology is difficult to crack and provides encryption of network traffic?
38. Which type of network is covered by the IEEE 802.11 standards?
40. Match the TCP/IP model layer to the function. Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q40 41. Which three acronyms/initialisms represent standards organizations? (Choose three.)
42. Which statement is correct about network protocols?
43. A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?
44. When designing an IP address scheme, what is a benefit of using DHCP to assign host addresses?
46. What does the IP address 172.17.4.250/24 represent?
47. What is the decimal equivalent to binary 11110000?
49. A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
51. Which two methods are used to directly connect mobile devices such as tablets and smartphones to a data network? (Choose two.)
52. Why does HTTP use TCP as the transport layer protocol?
53. Refer to the exhibit. PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet? Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q53
54. When is UDP preferred to TCP?
55. Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.) Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q55_1 Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q55 Explanation: Packets with a destination of 172.17.6.15 are forwarded through Fa0/0. Packets with a destination of 172.17.10.5 are forwarded through Fa1/1. Packets with a destination of 172.17.12.10 are forwarded through Fa1/0. Packets with a destination of 172.17.14.8 are forwarded through Fa0/1. Because network 172.17.8.0 has no entry in the routing table, it will take the gateway of last resort, which means that packets with a destination of 172.17.8.20 are forwarded through Serial0/0/0. Because a gateway of last resort exists, no packets will be dropped. 56. When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?
57. A user can access a file share resource on a server located in the same office but cannot access the internet. What is the possible cause?
58. A network technician is extending the network from the main office building over several hundred meters to a new security station. The security station needs a high speed connection to support video surveillance of the main building. What type of cable is best suited to connect the security station to the rest of the main office network?
59. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
60. Which statement describes the ping and tracert commands?
61. Which three protocols operate at the application layer of the TCP/IP model? (Choose three.)
62. Which network design solution will best extend access layer connectivity to host devices?
63. Which network server is malfunctioning if a user can ping the IP address of a web server but cannot ping the web server host name?
64. A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?
65. What are two benefits of wireless networks over wired networks? (Choose two.)
67. Match the components in the notation 100Base-T to the specification. (Not all options are used.) Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q67 68. Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)
69. Which address is a valid IPv6 address that could be assigned to a host?
71. Which interface allows remote management of a Layer 2 switch?
72. Which two statements correctly describe the components of a router? (Choose two.)
RAM – volatile memory used to store the running IOS, running configuration file, routing table, ARP table, as well as serve as a packet buffer ROM – nonvolatile memory used to hold a limited version of the IOS, bootup instructions, and basic diagnostic software NVRAM – nonvolatile memory used to hold the startup configuration file Flash – nonvolatile memory used to hold the IOS and other system files 73. Which feature is characteristic of MAC filtering in wireless networks?
74. Which two statements about a Service Set Identifier (SSID) are true? (Choose two.)
Several criteria should be considered when selecting network media: The cost of the media and installation The environment in which the media is installed The amount of data and the data transfer rate desired The distance between hosts that the media will connect 77. What is an advantage of the peer-to-peer network model?
78. Which three devices are considered intermediate devices in a network? (Choose three.)
79. Which two devices are shared peripherals? (Choose two.)
80. Which is a characteristic of a Type 2 hypervisor?
81. A network administrator attempted to access the company website and received a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?
83. Which three IP addresses are considered private addresses? (Choose three.)
Explanation:The designated private IP addresses are within the three IP address ranges:
85. Match the port number to the email protocol. 86. Which protocol is used by a server that needs to send an email message to another server in order to support successful delivery of the message?
88. Which statement describes a major characteristic of a local area network?
Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q89
Explanation: The enable command is entered in R1> mode. The login command is entered in R1(config-line)# mode. The copy running-config startup-config command is entered in R1# mode. The ip address 192.168.4.4 255.255.255.0 command is entered in R1(config-if)# mode. The service password-encryption command is entered in global configuration mode.
92. Which three layers of the OSI model make up the application layer of the TCP/IP model? (Choose three.)
93. What are two characteristics of 802.11 wireless networks? (Choose two.)
95. When a LAN is connected to the internet using a wireless router, how do devices on the LAN communicate on the internet using NAT?
96. In what situation would a Layer 2 switch have an IP address configured?
97. When would the Cisco IOS image held in ROM be used to boot the router?
100. Which three features represent benefits of virtualization? (Choose three.)
101. What is a difference between the functions of Cloud computing and virtualization?
102. Which two types of devices provide dynamic IPv4 addressing for internal hosts on a local network? (Choose two.)
105. A technician is tasked with connecting a printer directly to the network and making it accessible to all staff in the general vicinity. What type of network cable is most likely used to connect the printer?
107. What is the first step that a switch performs during the bootup sequence?
110. A student is sending files from a phone to a computer across a network. Which layer of the TCP/IP model is responsible for reassembling these messages as they are received on the computer?
111. Which logical binary operation is used by a network device to determine the network portion of an IPv4 address with a specified subnet mask?
Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Q113
114. What data representation is used when a computer or network device is processing data?
116. Which statement describes the relationship of a physical network and logical IPv4 addressed networks?
117. A DHCP configured PC boots up. What is the order of the messages that are sent and received by this PC in order to obtain an appropriate IP address?
0 Comments
Leave a Reply. |
AuthorFreehostingsites was started in the December 2018 by Prince Shon. The main purpose of starting this blog is to help other bloggers and provide All Types of Articles, Blogger Beginner's Guide, Tips, Tutorials, SEO tips, Categories
All
|