Time limit: 0
Quiz-summary
0 of 52 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
Information
Final-Exam: Network Addressing and Basic Troubleshooting Final Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 52 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- Answered
- Review
-
Question 1 of 52
1. Question
1 pointsMatch each item to the type of topology diagram on which it is typically identified.Correct
Incorrect
Hint
Place the options in the following order:location of a desktop PC in a classroom physical topology diagram path of cables that connect rooms to wiring closets physical topology diagram IP address of a server logical topology diagram -
Question 2 of 52
2. Question
1 pointsRefer to the exhibit. The IP address of which device interface should be used as the default gateway setting of host H1?Correct
Incorrect
Hint
The default gateway for host H1 is the router interface that is attached to the LAN that H1 is a member of. In this case, that is the G0/0 interface of R1. H1 should be configured with the IP address of that interface in its addressing settings. R1 will provide routing services to packets from H1 that need to be forwarded to remote networks. -
Question 3 of 52
3. Question
1 pointsWhat are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.)Correct
Incorrect
Hint
Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed. -
Question 4 of 52
4. Question
1 pointsWhich statement is true about the CSMA/CD access method that is used in Ethernet?Correct
Incorrect
Hint
Legacy bus-topology Ethernet LAN uses CSMA/CD as network media access control protocol. It works by detecting a collision in the medium and backing off (after transmitting a jam signal) as necessary. When one host wants to transmit a frame, it listens on the medium to check if the medium is busy. After it senses that no one else is transmitting, the host starts transmitting the frame, it also monitors the current level to detect a collision. If it detects a collision, it transmits a special jam signal so that all other hosts can know there was a collision. The other host will receive this jam signal and stop transmitting. After this, both hosts enter an exponential backoff phase and retry transmission. -
Question 5 of 52
5. Question
1 pointsWhich two characteristics describe the use of a logical topology? (Choose two.)Correct
Incorrect
Hint
Physical topology refers to the physical connection and how hosts, switches, and routers are physically connected. Logical topology refers to how nodes transfer frames through virtual connections and how the upper layers perceive the network. -
Question 6 of 52
6. Question
1 pointsWhich command can be used on a Windows host to display the routing table?Correct
Incorrect
Hint
On a Windows host, either the route print or netstat -r commands can be used to display the host routing table. The show ip route command is used on a router to display its routing table. The netstat –s command is used to display per-protocol statistics. The tracert command is used to display the path that a packet travels to its destination. -
Question 7 of 52
7. Question
1 pointsRefer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?Correct
Incorrect
Hint
The default gateway is used to route packets destined for remote networks. The default gateway IP address is the address of the first Layer 3 device (the router interface) that connects to the same network. -
Question 8 of 52
8. Question
1 pointsMatch the characteristics to the correct type of fiber.Correct
Incorrect
Hint
Options matched to the correct selection.Multimode Fiber Single-mode Fiber LED as light source only one ray of light into the fiber several paths of light into the fiber generally used with Campus backbone generally used with LANs laser as light source -
Question 9 of 52
9. Question
1 pointsA user can access a file share resource on a server located in the same office but cannot access the internet. What is the possible cause?Correct
Incorrect
Hint
The fact that the user can access a file share resource but not the internet indicates the issue might be caused by default gateway misconfiguration. If no default gateway is configured in the host TCP/IP settings, or if the wrong default gateway is specified, messages addressed to hosts on the internet cannot be delivered. -
Question 10 of 52
10. Question
1 pointsWhich statement describes the operation of devices accessing an Ethernet network?Correct
Incorrect
Hint
Ethernet uses CSMA/CD as the access control method. With CSMA/CD, each end device monitors the media for the presence of a data signal. If the media is free, the device can transmit data immediately. The other options are operations with CSMA/CA and Token passing. -
Question 11 of 52
11. Question
1 pointsA PC has sent an RS message to an IPv6 router attached to the same network. Which two pieces of information will the router send to the client? (Choose two.)Correct
Incorrect
Hint
A router interface that has been configured with IPv6 addressing information responds to a router solicitation (RS) message with a router advertisement (RA) message. The RA message is used in the IPv6 stateless address autoconfiguration (SLAAC) process and the message contains the local prefix and prefix length of the local segment such as 2001:db8:acad:1::/64. -
Question 12 of 52
12. Question
1 pointsWhich two types of messages are used in place of ARP for address resolution in IPv6? (Choose two.)Correct
Incorrect
Hint
IPv6 does not use ARP. Instead, ICMPv6 neighbor discovery is used by sending neighbor solicitation and neighbor advertisement messages. -
Question 13 of 52
13. Question
1 pointsA site administrator has been told that a particular network at the site must accommodate 126 hosts. Which subnet mask would be used that contains the required number of host bits?Correct
Incorrect
Hint
The subnet mask of 255.255.255.0 has 8 host bits. The mask of 255.255.255.128 results in 7 host bits. The mask of 255.255.255.224 has 5 host bits. Finally, 255.255.255.240 represents 4 host bits. -
Question 14 of 52
14. Question
1 pointsAn IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?Correct
Incorrect
Hint
This address is one of the assigned IPv6 multicast addresses. Packets addressed to FF02::1 are for all IPv6 enabled devices on the link or network. FF02::2 is for all IPv6 routers that exist on the network. -
Question 15 of 52
15. Question
1 pointsWhat are two services provided by IPv6 neighbor discovery protocol? (Choose two.)Correct
Incorrect
Hint
IPv6 Neighbor Discovery protocol, also referred to as ND or NDP, provides address resolution, router discovery, and redirection services for IPv6 using ICMPv6. -
Question 16 of 52
16. Question
1 pointsMatch the ICMPv6 messages to the description.Correct
Incorrect
Hint
Place the options in the following order:router advertisement message provides network addressing information neighbor advertisement message provides MAC address information of a host router solicitation message requests network addressing information neighbor solicitation message requests MAC address of the destination host -
Question 17 of 52
17. Question
1 pointsA network administrator is assigned the 172.16.0.0/24 block of addresses to use in designing an IP addressing scheme. The administrator submits this design for approval:- 172.16.0.0/26
- 172.16.0.64/27
- 172.16.0.96/26
- 172.16.0.128/27
Correct
Incorrect
Hint
The valid numbers that can be used with a /26 mask include 172.16.0.0/26, 172.16.0.64/26, 172.16.0.128/26, and 172.16.0.192/26. -
Question 18 of 52
18. Question
1 pointsWhat is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?Correct
Incorrect
Hint
The network portion, or prefix, of an IPv6 address is identified through the prefix length. A /64 prefix length indicates that the first 64 bits of the IPv6 address is the network portion. Hence the prefix is 2001:DB8:BC15:A. -
Question 19 of 52
19. Question
1 pointsMatch the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network.Correct
Incorrect
Hint
Place the options in the following order:Network C 192.168.0.96 /27 Network A 192.168.0.128 /25 Network D 192.168.0.80 /30 Network B 192.168.0.0 /26 -
Question 20 of 52
20. Question
1 pointsIPv6 host A is communicating with a remote IPv6 host B. Which device would send ICMPv6 redirect messages to inform that a better next-hop device should be used?Correct
Incorrect
Hint
When a router receives a data packet, it may analyze the best gateway device that the host should use. When there are multiple gateway devices available on a network, an IPv6 router will send ICMPv6 redirect messages to the sending host if it determines that there is a more efficient path for the transmissions. -
Question 21 of 52
21. Question
1 pointsWhich two statements correctly describe the components of a router? (Choose two.)Correct
Incorrect
Hint
A router contains four types of memory: RAM – volatile memory used to store the running IOS, running configuration file, routing table, ARP table, as well as serve as a packet buffer ROM – nonvolatile memory used to hold a limited version of the IOS, bootup instructions, and basic diagnostic software NVRAM – nonvolatile memory used to hold the startup configuration file Flash – nonvolatile memory used to hold the IOS and other system files -
Question 22 of 52
22. Question
1 pointsMatch the phases to the functions during the boot up process of a Cisco router.Correct
Incorrect
Hint
Place the options in the following order:phase 2 locate and load the Cisco IOS software phase 3 locate and load the startup configuration file phase 1 perform the POST and load the bootstrap program -
Question 23 of 52
23. Question
1 pointsA workstation connected to an Ethernet switch port is experiencing connectivity problems. The network technician chooses to use the bottom-up troubleshooting method to identify the issue. What are two possible causes of physical layer network problems that the technician should check? (Choose two.)Correct
Incorrect
Hint
Physical problems are concerned mainly with the hardware aspects of computers and networking devices, and the cables that interconnect them. Physical problems do not include the logical (software) configuration of devices. -
Question 24 of 52
24. Question
1 pointsA production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined? (Choose two.)Correct
Incorrect
Hint
A switch booting to the Switch> prompt indicates that the switch booted normally. This means a the switch successfully completed POST full version of the Cisco IOS was loaded. -
Question 25 of 52
25. Question
1 pointsA user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network?Correct
Incorrect
Hint
The Command Prompt command tracert will map the path from the PC to the web server and measure transit delays of packets across the network. -
Question 26 of 52
26. Question
1 pointsWhat are two characteristics of RAM on a Cisco device? (Choose two.)Correct
Incorrect
Hint
RAM stores data that is used by the device to support network operations. The running configuration is stored in RAM. This type of memory is considered volatile memory because data is lost during a power cycle. Flash memory stores the IOS and delivers a copy of the IOS into RAM when a device is powered on. Flash memory is nonvolatile since it retains stored contents during a loss of power. -
Question 27 of 52
27. Question
1 pointsAn ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer’s problem?Correct
Incorrect
Hint
The nslookup command can be used to troubleshoot name resolution issues and to verify the current status of the name servers. The nslookup output identifies the default DNS server that is configured on the host. The utility has many options available for testing and verification of the DNS process. -
Question 28 of 52
28. Question
1 pointsWhich information does the show startup-config command display?Correct
Incorrect
Hint
The show startup-config command displays the saved configuration located in NVRAM. The show running-config command displays the contents of the currently running configuration file located in RAM. -
Question 29 of 52
29. Question
1 pointsWhat is true concerning physical and logical topologies?Correct
Incorrect
Hint
Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes. -
Question 30 of 52
30. Question
1 pointsAfter making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?Correct
Incorrect
Hint
With the copy running-config startup-config command, the content of the current operating configuration replaces the startup configuration file stored in NVRAM. The configuration file saved in NVRAM will be loaded when the device is restarted. -
Question 31 of 52
31. Question
1 pointsIn the OSI model, what three functional areas are addressed by physical layer standards? (Choose three.)Correct
Incorrect
Hint
The physical layer standards address three functional areas: physical components, encoding, and signaling. Frame encapsulation, media access control, and error detection and retransmission are services provided by the data link layer. -
Question 32 of 52
32. Question
1 pointsWhich two types of signal interference are reduced more by STP than by UTP? (Choose two.)Correct
Incorrect
Hint
RFI, EMI, and crosstalk cause interference to the electrical signals that are transmitted through copper cables. Both UTP and STP use twisted pairs of wires that help protect against crosstalk. However, STP provides greater protection against RFI and EMI than UTP provides. -
Question 33 of 52
33. Question
1 pointsAn IPv6 host receives an ICMPv6 message requesting MAC address resolution. Which message should the host return to provide the MAC address?Correct
Incorrect
Hint
When an IPv6 host receives an ICMPv6 neighbor solicitation message for MAC address resolution, the host would return a neighbor advertisement message to provide the MAC address. -
Question 34 of 52
34. Question
1 pointsA technician must accommodate at least 500 subnets from address 172.16.0.0/16. What is an appropriate subnet mask and corresponding number of available host IP addresses per subnet to meet the requirement?Correct
Incorrect
Hint
The network address 172.16.0.0 has a default mask of 255.255.0.0 (/16). This address has 16 bits in the network portion and 16 bits in the host portion. To have at least 500 subnets, you need to borrow 9 bits (subnets) from the host portion (2^9 = 512 subnets), leaving 7 bits to create hosts. Thus the resulting netmask is 255.255.255.128, and the number of hosts per subnet is 2^7 = 128 – 2 = 126 hosts. -
Question 35 of 52
35. Question
1 pointsWhat is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64?Correct
Incorrect
Hint
The interface ID of an IPv6 address is the rightmost 64 bits, or last four hextets, of the address if no interface ID bits have been used for subnets. -
Question 36 of 52
36. Question
1 pointsWhat would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?Correct
Incorrect
Hint
To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three steps are taken.- Change the seventh bit of the MAC address from a binary 0 to a binary 1 which changes the hex C, into a hex E.
- Insert hex digits FFFE into the middle of the address.
- Rewrite the address in IPv6 format.
-
Question 37 of 52
37. Question
1 pointsWhich troubleshooting tool can be used to determine the current TCP open connections on a PC?Correct
Incorrect
Hint
The netstat command displays active TCP connections that are open and running on a networked host. The netstat command lists the protocol in use, the local address and port number, the foreign address and port number, and the state of the connection. -
Question 38 of 52
38. Question
1 pointsA group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)Correct
Incorrect
Hint
The ipconfig and nslookup commands will provide initial IP address and DNS configuration information to the technicians and determine if DHCP is assigning correct information to the PCs. The ping utility would be used to verify, or not, connectivity to the default gateway (router) using the configured default gateway address, or using the known correct default gateway address if these are found to be different. The arp -a or netsh interface ipv6 show neighbor commands could be used if the problem is then suspected to be an IP address to MAC address mapping issue. The telnet and tracert utilities could be used to determine where the problem was located in the network if the default gateway configuration was found to be correct. -
Question 39 of 52
39. Question
1 pointsRefer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?Correct
Incorrect
Hint
A successful ping to the default gateway assigned to a PC is an indicator that the PC can communicate across the network. The default gateway must be on the same IP network as the PC, and is usually the IP address of the router interface connected to the same physical network as the PC. -
Question 40 of 52
40. Question
1 pointsRefer to the exhibit. An IT consulting firm is helping a mid-sized marketing and advertising company for updating the campus network. Which three network design features are covered in the diagram? (Choose three.)Correct
Incorrect
Hint
The exhibit shows a logical topology diagram for the network design. The network design features shown in this diagram includes flow of information in the network including addressing, network devices that might be needed, and network segmentation provisioned through a router. The suggested IP address blocks are with the default subnet mask, no subnetting is required. While network devices are grouped logically in the diagram, the locations are not determined or indicated. Routing will be required, but there is no indication of which routing protocol should be used. -
Question 41 of 52
41. Question
1 pointsRefer to the exhibit. Using VLSM, what is the largest and smallest subnet mask required on this network, including the links between routers, in order to minimize address waste?Correct
Incorrect
Hint
The largest subnet requires 500 hosts addresses, so the most efficient subnet would be a /23 with the mask 255.255.254.0. The smallest subnet, the links between the routers, requires two addresses each, so a /30 subnet with the mask 255.255.255.252 is required. -
Question 42 of 52
42. Question
1 pointsIPv6 host A is sending a neighbor solicitation message to IPv6 host B on the same Ethernet network. Which statement describes the destination MAC address host A uses to build the Ethernet frame of the neighbor solicitation message?Correct
Incorrect
Hint
When an IPv6 host sends a neighbor solicitation message to another IPv6 host on the same Ethernet network, the sending host creates an Ethernet frame and add a multicast MAC address in the Destination MAC address field. This multicast MAC address maps the special solicited-node multicast address derived from the destination IPv6 address. -
Question 43 of 52
43. Question
1 pointsRefer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 25 hosts?Correct
Incorrect
Hint
Addresses 10.16.10.0 through 10.16.10.63 are taken for the leftmost network. Addresses 10.16.10.192 through 10.16.10.207 are used by the center network.The address space from 208-255 assumes a /28 mask, which does not allow enough host bits to accommodate 25 host addresses.The address ranges that are available include 10.16.10.64/26 and10.16.10.128/26. To accommodate 25 hosts, 5 host bits are needed, so a /27 mask is necessary. Four possible /27 subnets could be created from the available addresses between 10.16.10.64 and 10.16.10.191: 10.16.10.64/27 10.16.10.96/27 10.16.10.128/27 10.16.10.160/27 -
Question 44 of 52
44. Question
1 pointsWhich IPv6 prefix is reserved for communication between devices on the same link?Correct
Incorrect
Hint
IPv6 link-local unicast addresses are in the FE80::/10 prefix range and are not routable. They are used only for communications between devices on the same link. -
Question 45 of 52
45. Question
1 pointsRefer to the exhibit. A user has configured a NIC on the PC as shown but finds that the PC is unable to access the Internet. What is the problem?Correct
Incorrect
Hint
In order for a computer to communicate outside its network, it must have a valid default gateway configured.This address cannot be the same as the IP address of the computer. -
Question 46 of 52
46. Question
1 pointsWhich type of static route creates a gateway of last resort?Correct
Incorrect
Hint
There are four basic types of static routes. Floating static routes are backup routes that are placed into the routing table if a primary route is lost. A summary static route aggregates several routes into one, reducing the size of the routing table. Standard static routes are entered manually into the routing table. Default static routes create a gateway of last resort. -
Question 47 of 52
47. Question
1 pointsRefer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?Correct
Incorrect
Hint
A straight-through cable is commonly used to interconnect a host to a switch and a switch to a router. A crossover cable is used to interconnect similar devices together like switch to a switch, a host to a host, or a router to a router. If a switch has the MDIX capability, a crossover could be used to connect the switch to the router; however, that option is not available. A rollover cable is used to connect to a router or switch console port. -
Question 48 of 52
48. Question
1 pointsConsider the following command: ip route 192.168.10.0 255.255.255.0 10.10.10.2 5 Which route would have to go down in order for this static route to appear in the routing table?Correct
Incorrect
Hint
The administrative distance of 5 added to the end of the static route creates a floating static situation for a static route that goes down. Static routes have a default administrative distance of 1. This route that has an administrative distance of 5 will not be placed into the routing table unless the previously entered static route to the 192.168.10.0/24 goes down or was never entered. The administrative distance of 5 added to the end of the static route configuration creates a floating static route that will be placed in the routing table when the primary route to the same destination network goes down. By default, a static route to the 192.168.10.0/24 network has an administrative distance of 1. Therefore, the floating route with an administrative distance of 5 will not be placed into the routing table unless the previously entered static route to the 192.168.10.0/24 goes down or was never entered. Because the floating route has an administrative distance of 5, the route is preferred to an OSPF-learned route (with the administrative distance of 110) or an EIGRP-learned route (with the administrative distance of 110) to the same destination network. -
Question 49 of 52
49. Question
1 pointsA technician has been asked to develop a physical topology for a network that provides a high level of availability. Which physical topology requires that every node is attached to every other node on the network?Correct
Incorrect
Hint
The mesh topology provides high availability because every node is connected to all other nodes. Mesh topologies can be found in WANs. A partial mesh topology can also be used where some, but not all, end points connect to one another. -
Question 50 of 52
50. Question
1 pointsWhat type of communication rule would best describe CSMA/CD?Correct
Incorrect
Hint
Carrier sense multiple access collision detection (CSMA/CD) is the access method used with Ethernet. The access method rule of communication dictates how a network device is able to place a signal on the carrier. CSMA/CD dictates those rules on an Ethernet network and CSMA/CA dictates those rules on an 802.11 wireless LAN. -
Question 51 of 52
51. Question
1 pointsWhat are three parts of an IPv6 global unicast address? (Choose three.)Correct
Incorrect
Hint
There are three elements that make up an IPv6 global unicast address. A global routing prefix which is provided by an ISP, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host. -
Question 52 of 52
52. Question
1 pointsMatch the characteristic with the appropriate copper media.Correct
Incorrect
Hint
Options matched to the correct selection.coaxial UTP STP 2 conductors 4 pairs of wire without shielding 4 pairs of wire with shielding used in cable TV less expensive than similar used in areas with high electromagnetic activity shielding acts as the second wire most commonly used more difficult to install than similar