0 of 25 questions completed
CCNA Cyber Ops (Version 1.1) – Chapter 4 Test Online Full
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
0 of 25 questions answered correctly
Time has elapsed
You have reached 0 of 0 points, (0)
1. Question1 pointsHow is a DHCPDISCOVER transmitted on a network to reach a DHCP server?CorrectIncorrect
HintThe DHCPDISCOVER message is sent by a DHCPv4 client and targets a broadcast IP along with the destination port 67. The DHCPv4 server or servers respond to the DHCPv4 clients by targeting port 68.
2. Question1 pointsA high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 220.127.116.11. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?CorrectIncorrect
HintThe IP address 192.168.25.10 is an IPv4 private address. This address will not be routed over the Internet, so school A will not be able to reach school B. Because the address is a private one, it can be used freely on an internal network. As long as no two devices on the internal network are assigned the same private IP, there is no IP conflict issue. Devices that are assigned a private IP will need to use NAT in order to communicate over the Internet.
3. Question1 pointsWhat is a socket?CorrectIncorrect
HintA socket is a combination of the source IP address and source port or the destination IP address and the destination port number.
4. Question1 pointsWhat part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?CorrectIncorrect
5. Question1 pointsThe graphic shows a network diagram as follows: PC A connects to switch S1, which connects to the G0/0 interface of router R1. PC B connects to switch S2, which connects to the G0/1 interface of router R1. A network analyst is connected to switch S2. The address of each device is as follows: PC A: 192.168.1.212 and FE80::1243:FEFE:8A43:2122 and 01-90-C0-E4-55-BB PC B: 192.168.2.101 and FE80::FBB2:E77A:D143 and 08-CB-8A-5C-D5-8A R1 G0/0:192.168.1.1 and FE80::1 and 00-D0-D3-BE-79-26 R1 G0/1: 192.168.2.1 and FE80::1 and 00-60-0F-B1-D1-11 Refer to the exhibit. A cybersecurity analyst is viewing captured ICMP echo request packets sent from host A to host B on switch S2. What is the source MAC address of Ethernet frames carrying the ICMP echo request packets?CorrectIncorrect
HintWhen router R1 receives the ICMP echo requests from host A it will forward the packets out interface G0/1 towards host B. However, before forwarding the packets, R1 will encapsulate them in a new Ethernet frame using the MAC address of interface G0/1 as the source and the MAC address of host B as the destination.
6. Question1 pointsRefer to the exhibit. A cybersecurity analyst is viewing captured packets forwarded on switch S1. Which device has the MAC address 50:6a:03:96:71:22?CorrectIncorrect
7. Question1 pointsWhich term is used to describe the process of placing one message format inside another message format?CorrectIncorrect
8. Question1 pointsWhich PDU format is used when bits are received from the network medium by the NIC of a host?CorrectIncorrect
HintWhen received at the physical layer of a host, the bits are formatted into a frame at the data link layer. A packet is the PDU at the network layer. A segment is the PDU at the transport layer. A file is a data structure that may be used at the application layer.
9. Question1 pointsWhat are two features of ARP? (Choose two.)CorrectIncorrect
HintWhen a node encapsulates a data packet into a frame, it needs the destination MAC address. First it determines if the destination device is on the local network or on a remote network. Then it checks the ARP table (not the MAC table) to see if a pair of IP address and MAC address exists for either the destination IP address (if the destination host is on the local network) or the default gateway IP address (if the destination host is on a remote network). If the match does not exist, it generates an ARP broadcast to seek the IP address to MAC address resolution. Because the destination MAC address is unknown, the ARP request is broadcast with the MAC address FFFF.FFFF.FFFF. Either the destination device or the default gateway will respond with its MAC address, which enables the sending node to assemble the frame. If no device responds to the ARP request, then the originating node will discard the packet because a frame cannot be created.
10. Question1 pointsIn NAT translation for internal hosts, what address would be used by external users to reach internal hosts?CorrectIncorrect
11. Question1 pointsThe exhibit shows a network topology. PC1 and PC2 are connected to the Fa0/1 and Fa0/2 ports of the SW1 switch, respectively. SW1 is connected through its Fa0/3 port to the Fa0/0 interface of the RT1 router. RT1 is connected through its Fa0/1 to the Fa0/2 port of SW2 switch. SW2 is connected through its Fa0/1 port to the PC3. Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?CorrectIncorrect
HintWhen a network device wants to communicate with another device on the same network, it sends a broadcast ARP request. In this case, the request will contain the IP address of PC2. The destination device (PC2) sends an ARP reply with its MAC address.
12. Question1 pointsWhich two characteristics are associated with UDP sessions? (Choose two.)CorrectIncorrect
13. Question1 pointsRefer to the exhibit. What is the global IPv6 address of the host in uncompressed format?CorrectIncorrect
HintIn the compressed format, the :: represents two contiguous hextets of all zeros. Leading zeros in the second, fifth, and sixth hextets have also been removed.
14. Question1 pointsWhat is the purpose of the routing process?CorrectIncorrect
15. Question1 pointsWhich application layer protocol uses message types such as GET, PUT, and POST?CorrectIncorrect
HintThe GET command is a client request for data from a web server. A PUT command uploads resources and content, such as images, to a web server. A POST command uploads data files to a web server.
16. Question1 pointsWhich transport layer feature is used to guarantee session establishment?CorrectIncorrect
HintTCP uses the 3-way handshake. UDP does not use this feature. The 3-way handshake ensures there is connectivity between the source and destination devices before transmission occurs.
17. Question1 pointsWhat is the prefix length notation for the subnet mask 255.255.255.224?CorrectIncorrect
HintThe binary format for 255.255.255.224 is 11111111.11111111.11111111.11100000. The prefix length is the number of consecutive 1s in the subnet mask. Therefore, the prefix length is /27.
18. Question1 pointsWhat are two potential network problems that can result from ARP operation? (Choose two.)CorrectIncorrect
HintLarge numbers of ARP broadcast messages could cause momentary data communications delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent to intercept network traffic. ARP requests and replies cause entries to be made into the ARP table, not the MAC address table. ARP table overflows are very unlikely. Manually configuring static ARP associations is a way to prevent, not facilitate, ARP poisoning and MAC address spoofing. Multiple ARP replies resulting in the switch MAC address table containing entries that match the MAC addresses of connected nodes and are associated with the relevant switch port are required for normal switch frame forwarding operations. It is not an ARP caused network problem.
19. Question1 pointsWhich TCP mechanism is used to identify missing segments?CorrectIncorrect
HintTCP segments are acknowledged by the receiver as they arrive. The receiver keeps track of the sequence number of received segments and uses the sequence number to reorder the segments and to identify any missing segments that need to be retransmitted.
20. Question1 pointsWhat is the purpose of ICMP messages?CorrectIncorrect
HintThe purpose of ICMP messages is to provide feedback about issues that are related to the processing of IP packets.
21. Question1 pointsWhat happens if part of an FTP message is not delivered to the destination?CorrectIncorrect
22. Question1 pointsWhat is the primary purpose of NAT?CorrectIncorrect
HintNAT was developed to conserve IPv4 addresses. A side benefit is that NAT adds a small level of security by hiding the internal network addressing scheme. However, there are some drawbacks of using NAT. It does not allow true peer-to-peer communication and it adds latency to outbound connections.
23. Question1 pointsWhy does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?CorrectIncorrect
24. Question1 pointsRefer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 18.104.22.168 network?CorrectIncorrect
25. Question1 pointsWhich three IP addresses are private ? (Choose three.)CorrectIncorrect
HintThe private IP addresses are within these three ranges: 10.0.0.0 – 10.255.255.255 172.16.0.0 – 172.31.255.255 192.168.0.0 – 192.168.255.255