Given network 172.18.109.0, which subnet mask would be used if 6 host bits were available?
Last Updated on May 20, 2021 by Answers Explanation & Hints: The ping destination command can be used to test connectivity. Answers Explanation & Hints: Cisco IOS switches have physical ports for devices to connect to, but also have one or more switch virtual interfaces (SVIs). These are virtual interfaces, because there is no
physical hardware on the device associated with them, rather they are created in software. The virtual interface provides a means to remotely manage a switch over a network that is using IP. Each switch comes with one SVI appearing in the default configuration “out-of-the-box.” The default SVI is interface VLAN1. The no shutdown command needs to be issued to activate this interface. Answers Explanation & Hints: A GUI, or graphical user interface, allows the user to interact with the
operating system by pointing and clicking at elements on the screen. A CLI, or command-line interface, requires users to type commands at a prompt in order to interact with the OS. The shell is the part of the operating system that is closest to the user. The kernel is the part of the operating system that interfaces with the hardware. Answers Explanation & Hints: In order to enter global configuration mode, the command configure terminal , or a shortened version such as config t , must be entered from privileged EXEC mode. In this
scenario the administrator is in user EXEC mode, as indicated by the > symbol after the hostname. The administrator would need to use the enable command to move into privileged EXEC mode before entering the configure terminal command. Answers
Explanation & Hints: At the transport layer, a host computer will de-encapsulate a segment to reassemble data to an acceptable format by the application layer protocol of the TCP/IP model. Answers Explanation & Hints: The TCP/IP model consists of four layers: application, transport, internet, and network access. The OSI model consists of seven layers: application, presentation, session, transport, network, data link, and physical. The top three layers of the OSI model: application, presentation, and session map to the application layer of the TCP/IP model. Answers Explanation & Hints: The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI session layer (with the
presentation layer) is included within the TCP/IP application layer. Answers Explanation & Hints: The maximum throughput between any two nodes on a
network is determined by the slowest link between those nodes. Answers Explanation & Hints: Fiber-optic cabling is primarily used for high-traffic backbone cabling and does not conduct electricity. Multimode fiber uses LEDs for signaling and single-mode fiber uses laser technology. FIber-optic cabling carries signals from only one device to another. Answers Explanation & Hints: UTP cables are used in wired office environments. Coaxial cables are
used to connect cable modems and televisions. Fiber optics are used for high transmission speeds and to transfer data over long distances. STP cables are used in environments where there is a lot of interference. Which two acronyms represent the data link sublayers that Ethernet relies upon to operate? (Choose two.)
A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?
What does a router do when it receives a Layer 2 frame over the network medium?
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?
Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)
Two network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching?
Which two issues can cause both runts and giants in Ethernet networks? (Choose two.)
What happens when a switch receives a frame and the calculated CRC value is different than the value that is in the FCS field?
Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?
If the default gateway is configured incorrectly on the host, what is the impact on communications?
Why is NAT not needed in IPv6?
What routing table entry has a next hop address associated with a destination network?
Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?
Which destination address is used in an ARP request frame?
Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?
Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?
Match the command with the device mode at which the command is entered. (Not all options are used.)Answers Explanation & Hints: The enable command is entered in R1> mode. The login command is entered in R1(config-line)# mode. The copy running-config startup-config command is entered in R1# mode. The ip address 192.168.4.4 255.255.255.0 command is entered in R1(config-if)# mode. The service password-encryption command is entered in global configuration mode. A router boots and enters setup mode. What is the reason for this?
What type of address is 198.133.219.162?
Given network 172.18.109.0, which subnet mask would be used if 6 host bits were available?
Three devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.)Device 1: IP address 192.168.10.77/28 on subnet 1Device 2: IP address192.168.10.17/30 on subnet 2Device 3: IP address 192.168.10.35/29 on subnet 3Answers Explanation & Hints: To calculate any of these addresses, write the device IP address in binary. Draw a line showing where the subnet mask 1s end. For example, with Device 1, the final octet (77) is 01001101. The line would be drawn between the 0100 and the 1101 because the subnet mask is /28. Change all the bits to the right of the line to 0s to determine the network number (01000000 or 64). Change all the bits to the right of the line to 1s to determine the broadcast address (01001111 or 79). What does the IP address 192.168.1.15/29 represent?
What type of IPv6 address is represented by ::1/128?
Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?
Refer to the exhibit. A user issues the command netstat –r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?
Network information: * local router LAN interface: 172.19.29.254 / fe80:65ab:dcc1::10 * local router WAN interface: 198.133.219.33 / 2001:db8:FACE:39::10 * remote server: 192.135.250.103What task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command?
A network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish?
Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)
To which TCP port group does the port 414 belong?
A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?
Refer to the exhibit. What does the value of the window size specify?
What service is provided by POP3?
Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?
Which command is used to manually query a DNS server to resolve a specific host name?
The employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville?
A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?
Which statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?
What are two ways to protect a computer from malware? (Choose two.)
Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task?
Which two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)
A small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection?
Which subnet mask would be used if 11 host bits are available?Class A. What subnet mask if 5 bit host is available?The mask of 255.255. 255.224 has 5 host bits.
What is the first valid host on the subnetwork that the node belongs to?Subnetting Questions. |