Time limit: 0
Quiz-summary
0 of 64 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
Information
Networking Basics Course Final Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 64 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- Answered
- Review
-
Question 1 of 64
1. Question
1 pointsWhich statement describes the use of powerline networking technology?Correct
Incorrect
Hint
Powerline networking adds the ability to connect a device to the network using an adapter wherever there is an electrical outlet. The network uses existing electrical wiring to send data. It is not a replacement for physical cabling, but it can add functionality in places where wireless access points cannot be used or cannot reach devices. -
Question 2 of 64
2. Question
1 pointsWhich wireless RF band do IEEE 802.11b/g devices use?Correct
Incorrect
Hint
900 MHz is an FCC wireless technology that was used before development of the 802.11 standards. 900 MHz devices have a larger coverage range than the higher frequencies have and do not require line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at 60 GHz. -
Question 3 of 64
3. Question
1 pointsRefer to the exhibit. Which term correctly identifies the device type that is included in the area B?Correct
Incorrect
Hint
Routers and switches are intermediary devices. End devices consist of PCs, laptops, and servers. They also include printers, VoIP phones, security cameras, and hand-held devices. -
Question 4 of 64
4. Question
1 pointsWhat is a disadvantage of deploying a peer-to-peer network model?Correct
Incorrect
Hint
The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability. -
Question 5 of 64
5. Question
1 pointsWhich three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)Correct
Incorrect
Hint
In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps: Enter the network SSID of the wireless network. Choose the security type used by the wireless network. Input the password to authenticate successfully. -
Question 6 of 64
6. Question
1 pointsA company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)Correct
Incorrect
Hint
Because network devices and dedicated servers are not required, peer-to-peer networks are easy to create, less complex, and have lower costs. Peer-to-peer networks also have no centralized administration. They are less secure, not scalable, and those devices acting as both client and server may perform slower. -
Question 7 of 64
7. Question
1 pointsWhich type of device provides an Internet connection through the use of a phone jack?Correct
Incorrect
Hint
SL technology uses the existing telephone network. For that reason, a DSL modem commonly has an RJ-11 phone -
Question 8 of 64
8. Question
1 pointsA traveling sales representative uses a cell phone to interact with the home office and customers, track samples, make sales calls, log mileage, and upload/download data while at a hotel. Which internet connectivity method would be a preferred method to use on the mobile device due to the low cost?Correct
Incorrect
Hint
Mobile devices typically use either the cellular network or a Wi-Fi network to connect to the internet. The Wi-Fi connection is preferred because it uses less battery power and is free in many places. -
Question 9 of 64
9. Question
1 pointsA user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?Correct
Incorrect
Hint
Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced. -
Question 10 of 64
10. Question
1 pointsA tourist is traveling through the countryside and needs to connect to the internet from a laptop. However, the laptop only has Wi-Fi and Ethernet connections. The tourist has a smartphone with 3G/4G connectivity. What can the tourist do to allow the laptop to connect to the internet?Correct
Incorrect
Hint
Many cell phones have the ability to connect to other devices through a feature called tethering. The connection can be made using Wi-Fi, Bluetooth, or a USB cable. Once a device is connected, it is able to use the cellular connection of the phone to access the internet. When a cellular phone allows Wi-Fi devices to connect and use the mobile data network, this is called a hotspot. -
Question 11 of 64
11. Question
1 pointsWhat layer is responsible for routing messages through an internetwork in the TCP/IP model?Correct
Incorrect
Hint
The TCP/IP model consists of four layers: application, transport, internet, and network access. Of these four layers, it is the internet layer that is responsible for routing messages. The session layer is not part of the TCP/IP model but is rather part of the OSI model. -
Question 12 of 64
12. Question
1 pointsWhat will a Cisco LAN switch do if it receives an incoming frame and the destination MAC address is not listed in the MAC address table?Correct
Incorrect
Hint
A LAN switch populates the MAC address table based on source MAC addresses. When a switch receives an incoming frame with a destination MAC address that is not listed in the MAC address table, the switch forwards the frame out all ports except for the ingress port of the frame. When the destination device responds, the switch adds the source MAC address and the port on which it was received to the MAC address table. -
Question 13 of 64
13. Question
1 pointsWhat process involves placing one message format inside of another message format?Correct
Incorrect
Hint
When a message is placed inside of another message, this is known as encapsulation. On networks, encapsulation takes place when one protocol data unit is carried inside of the data field of the next lower protocol data unit. -
Question 14 of 64
14. Question
1 pointsA cable installation company is trying to convince a customer to use fiber-optic cabling instead of copper cables for a particular job. What is one advantage of using fiber-optic cabling compared to copper cabling?Correct
Incorrect
Hint
When comparing UTP cabling with fiber-optic cabling, note the following: fiber-optic connectors have higher costs, technician installation skills required are higher, fiber bandwidth supported is higher, and fiber-optic cabling is immune to RFI and EMI, and can transmit signals with less attenuation. -
Question 15 of 64
15. Question
1 pointsWhat data encoding technology is used in copper cables?Correct
Incorrect
Hint
Data is transmitted across a network on media. Modern networks primarily use three types of media to interconnect devices:- Metal wires within cables (copper cable, such as twisted-pair and coaxial cable) – Data is encoded into electrical impulses.
- Glass or plastic fibers within cables (fiber-optic cable) – Data is encoded into pulses of light.
- Wireless transmission – Data is encoded via modulation of specific frequencies of electromagnetic waves.
-
Question 16 of 64
16. Question
1 pointsWhat information is added to the switch table from incoming frames?Correct
Incorrect
Hint
A switch “learns” or builds the MAC address table based on the source MAC address as a frame comes into the switch. A switch forwards the frame onward based on the destination MAC address. -
Question 17 of 64
17. Question
1 pointsAt which layer of the OSI model would a logical address be added during encapsulation?Correct
Incorrect
Hint
Logical addresses, also known as IP addresses, are added at the network layer. Physical addresses are edded at the data link layer. Port addresses are added at the transport layer. No addresses are added at the physical layer. -
Question 18 of 64
18. Question
1 pointsWhich type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work?Correct
Incorrect
Hint
There are two common types of network communication models: Protocol model – This model closely matches the structure of a particular protocol suite and describes the functions that occur at each layer of protocols within the suite. The TCP/IP model is an example of a protocol model. Reference model – The primary purpose is to aid in a clearer understanding of the functions and processes necessary for network communications.This type of model does not specify exactly how a function should be accomplished. The OSI model is an example of a reference model. -
Question 19 of 64
19. Question
1 pointsWhich two criteria are used to help select a network medium for a network? (Choose two.)Correct
Incorrect
Hint
Criteria for choosing a network medium include the following: The distance the selected medium can successfully carry a signal in the environment in which the selected medium is to be installed The amount of data and the speed at which the data must be transmitted The cost of the medium and its installation -
Question 20 of 64
20. Question
1 pointsWhich scenario is suitable for deploying twisted-pair cables?Correct
Incorrect
Hint
Ethernet technology generally uses twisted-pair cables to interconnect devices. Because Ethernet is the foundation for most local networks, twisted-pair is the most commonly used type of network cabling for connecting office computers. -
Question 21 of 64
21. Question
1 pointsRefer to the exhibit. How many bits are represented by each group of four hexadecimal values contained between the colons in an IPv6 address?Correct
Incorrect
Hint
The four hexadecimal values contained in a hextet represent 16 bits. There are eight hextets in an IPv6 address that make up the total 128 bits of the address. (16 x 8 = 128). -
Question 22 of 64
22. Question
1 pointsWhich network design has the fewest broadcast domains?Correct
Incorrect
Hint
Routers break networks into separate broadcast domains. Each LAN is a broadcast domain. The correct answer has only one broadcast domain. All other answers have two broadcast domains. -
Question 23 of 64
23. Question
1 pointsA company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?Correct
Incorrect
Hint
When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255. -
Question 24 of 64
24. Question
1 pointsWhat are two characteristics of multicast transmission? (Choose two.)Correct
Incorrect
Hint
Broadcast messages consist of single packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses, and map upper layer addresses to lower layer addresses. A multicast transmission is a single packet sent to a group of hosts and is used by routing protocols, such as OSPF and RIPv2, to exchange routes. The address range 224.0.0.0 to 224.0.0.255 is reserved for link-local addresses to reach multicast groups on a local network. -
Question 25 of 64
25. Question
1 pointsWhich three types of nodes should be assigned static IP addresses on a network? (Choose three.)Correct
Incorrect
Hint
Servers, printers, and intermediary devices, such as routers, switches, and access points should have statically assigned IP addresses so that they are accessible to users and available for remote management. -
Question 26 of 64
26. Question
1 pointsWhat benefit does DHCP provide to a network?Correct
Incorrect
Hint
DHCP provides automatic IP address configuration to hosts on a network. Hosts will be dynamically assigned an address when they connect to the network, although not necessarily the same address each time they connect. If there are static and dynamic addresses used together on the network there could still be the possibility of address conflicts. DNS can be used in conjunction with DHCP to allow users to communicate using names rather than IP addresses. -
Question 27 of 64
27. Question
1 pointsWhich three addresses are valid public addresses? (Choose three.)Correct
Incorrect
Hint
The ranges of private IPv4 addresses are as folllows: 10.0.0.0 – 10.255.255.255 172.16.0.0 – 172.31.255.255 192.168.0.0 – 192.168.255.255 -
Question 28 of 64
28. Question
1 pointsWhich number grouping is a valid IPv6 address?Correct
Incorrect
Hint
An IPv6 address is made up of 128 bits represented in hexadecimal numbers.There are two rules that help reduce the number of digits needed to represent an IPv6 address.- Rule 1 – Omit leading zeros in any 16-bit section.
- Rule 2 – Replace any single group of consecutive zeros with a double colon (::). This can only be used once within an IPv6 address.
-
Question 29 of 64
29. Question
1 pointsRefer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?Correct
Incorrect
Hint
When a new client device is installed on a network that uses dynamic IP addressing, the client will send out a DHCP request message with the destination IPv4 address of 255.255.255.255. -
Question 30 of 64
30. Question
1 pointsRefer to the exhibit. A technician is attempting to configure the IPv6 address 2001:db8::1111::0200 on a device. Why does the device return an error message that indicates the address is not valid?Correct
Incorrect
Hint
The IP address entered by the technician is in an invalid notation format because it contains two instances of the double colon (::). When using a shortened IPv6 notation, a double colon can only be used once. -
Question 31 of 64
31. Question
1 pointsWhat type of route is indicated by the code C in an IPv4 routing table on a Cisco router?Correct
Incorrect
Hint
Some of the IPv4 routing table codes include the following: C – directly connected S – static D – EIGRP * – candidate default -
Question 32 of 64
32. Question
1 pointsA small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)? (Choose two.)Correct
Incorrect
Hint
A wireless router will perform Network Address Translation (NAT) whenever a private (local) source IPv4 address is translated to a public (global) address. -
Question 33 of 64
33. Question
1 pointsRefer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?Correct
Incorrect
Hint
Whenever the destination MAC address is not contained within the ARP table of the originating host, the host (host A in this example) will send a Layer 2 broadcast that has a destination MAC address of FF:FF:FF:FF:FF:FF. All devices on the same network receive this broadcast. Host D will respond to this broadcast. -
Question 34 of 64
34. Question
1 pointsOpen the PT activity. Perform the tasks in the activity instructions and then answer the question. Which IP address should be used as the default gateway address on PC0?Correct
Incorrect
Hint
The default gateway address identifies a network device through which end user devices on the LAN can communicate with hosts on remote networks. The default gateway is usually the router interface attached to the LAN. -
Question 35 of 64
35. Question
1 pointsRefer to the exhibit. The IP address of which device interface should be used as the default gateway setting of host H1?Correct
Incorrect
Hint
The default gateway for host H1 is the router interface that is attached to the LAN that H1 is a member of. In this case, that is the G0/0 interface of R1. H1 should be configured with the IP address of that interface in its addressing settings. R1 will provide routing services to packets from H1 that need to be forwarded to remote networks. -
Question 36 of 64
36. Question
1 pointsA network administrator has a multi-floor LAN to monitor and maintain. Through careful monitoring, the administrator has noticed a large amount of broadcast traffic slowing the network. Which device would you use to best solve this problem?Correct
Incorrect
Hint
All hosts within a single LAN belong to one broadcast domain. As the number of hosts increase, it could cause more traffic on the segment and may slow network performance. To solve the performance issue, a router would be the device used to segment the single LAN into multiple LANs. -
Question 37 of 64
37. Question
1 pointsAn employee is having connectivity issues. Why might a network technician try to ping the default gateway from the employee laptop?Correct
Incorrect
Hint
The default gateway address is usually the address of the router interface. The router provides access to remote networks, so a successful ping to the default gateway would mean that the laptop is able to communicate with the router. -
Question 38 of 64
38. Question
1 pointsRefer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?Correct
Incorrect
Hint
When a network device has to communicate with a device on another network, it broadcasts an ARP request asking for the default gateway MAC address. The default gateway (RT1) unicasts an ARP reply with the Fa0/0 MAC address. -
Question 39 of 64
39. Question
1 pointsRefer to the exhibit. Host H2 sends a unicast message to host H6. Which destination IP address is contained in the header of the packet when it reaches host H6?Correct
Incorrect
Hint
When host H2 sends the packet to host H6, the source IP address is the address assigned to the network adapter on host H2. The destination address of the packet is the IP address assigned to the network adapter on host H6. The source and destination IP addresses do not change as the packet is forwarded through the routers. When the packet arrives at H6 the destination address of the packet is the address assigned to the network adapter on H6. -
Question 40 of 64
40. Question
1 pointsRefer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B?Correct
Incorrect
-
Question 41 of 64
41. Question
1 pointsWhich command would a technician use to display network connections on a host computer?Correct
Incorrect
Hint
The netstat command is a network utility that can be used to display active TCP connections that are open and running on a networked host. -
Question 42 of 64
42. Question
1 pointsHow are port numbers used in the TCP/IP encapsulation process?Correct
Incorrect
Hint
Both UDP and TCP use port numbers to provide a unique identifier for each conversation. Source port numbers are randomly generated and are used to track different conversations. Destination port numbers identify specific services by using either a default port number for the service or a port number that is assigned manually by a system administrator. -
Question 43 of 64
43. Question
1 pointsTwo pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?Correct
Incorrect
Hint
If the ping from one host to another host on a remote network is successful, this indicates that the default gateway is operational. In this scenario, if a ping from one host to the default gateway failed, it is possible that some security features are applied to the router interface, preventing it from responding to ping requests. -
Question 44 of 64
44. Question
1 pointsOpen the PT activity. Perform the tasks in the activity instructions and then answer the question. What is the code displayed on the web page?Correct
Incorrect
Hint
The IP address configuration on PC0 requires the following:- IP address – any valid host address on the LAN, except for .254
- Subnet mask – default value for the network
- Gateway – the nearest router interface
- DNS – the DNS server on the ISP network
-
Question 45 of 64
45. Question
1 pointsA technician is troubleshooting a network connectivity problem. Pings to the local wireless router are successful but pings to a server on the Internet are unsuccessful. Which CLI command could assist the technician to find the location of the networking problem?Correct
Incorrect
Hint
The tracert utlility (also known as the tracert command or tracert tool) will enable the technician to locate the link to the server that is down. The ipconfig command displays the computer network configuration details. The ipconfig/renew command requests an IP address from a DHCP server. Msconfig is not a network troubleshooting command. -
Question 46 of 64
46. Question
1 pointsWhich two TCP header fields are used to confirm receipt of data? (Choose two.)Correct
Incorrect
Hint
Together the TCP sequence number and acknowledgment number fields are used by the receiver to inform the sender of the bytes of data that the receiver has accepted. -
Question 47 of 64
47. Question
1 pointsWhen analog voice signals are converted for use on a computer network, in what format are they encapsulated?Correct
Incorrect
Hint
When Voice over iP (VoIP) is being used, analog voice signals are translated into digital data in the form of IP packets. This translation allows the phone call to be carried through a computer network. -
Question 48 of 64
48. Question
1 pointsRefer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?Correct
Incorrect
Hint
Tracert is used to trace the path a packet takes. The only successful response was from the first device along the path on the same LAN as the sending host. The first device is the default gateway on router R1. The administrator should therefore start troubleshooting at R1. -
Question 49 of 64
49. Question
1 pointsA network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.)Correct
Incorrect
Hint
A ping would fail if the destination device was not operational. It would also fail if the DNS server was unavailable to convert the URL to an IP address. The fact that a computer had a static IP address is not a factor. Even if the target protocol (HTTP) is not functioning, the server would still respond to a ping. -
Question 50 of 64
50. Question
1 pointsOpen the PT activity. Perform the tasks in the activity instructions and then answer the question. What is the IP address of this server?Correct
Incorrect
Hint
The DNS server resolves Internet names to associated IP addresses. -
Question 51 of 64
51. Question
1 pointsWhich wireless technology allows a customer to connect to a payment terminal in the store with a smartphone?Correct
Incorrect
Hint
NFC, or Near Field Communications, is a wireless technology for communication between devices at extremenly short distances and is used in contactless payment systems. -
Question 52 of 64
52. Question
1 pointsWhat are two methods typically used on a mobile device to provide internet connectivity? (Choose two.)Correct
Incorrect
Hint
Mobile devices commonly use Wi-Fi and cellular to connect to the internet. The cellular connection uses the cellular data network for a fee. The Wi-Fi connection uses an 802.11 wireless network in the area to connect to the internet. -
Question 53 of 64
53. Question
1 pointsWhat information does an Ethernet switch examine and use to build its address table?Correct
Incorrect
Hint
An Ethernet switch examines the source MAC address of an incoming frame. If the source MAC address is not in the MAC address table, the switch will add it to the table with the associated ingress Ethernet port. -
Question 54 of 64
54. Question
1 pointsWhich two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)Correct
Incorrect
Hint
The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI session layer (with the presentation layer) is included within the TCP/IP application layer. -
Question 55 of 64
55. Question
1 pointsWhat is the shortest valid representation of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200?Correct
Incorrect
Hint
A double colon (::) can replace any single, contiguous string of one or more 16-bit segments (hextets) consisting of all 0s, and can only be used once per IPv6 address. Any leading 0s (zeros) in any 16-bit section or hextet can be omitted. -
Question 56 of 64
56. Question
1 pointsA college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.)Correct
Incorrect
Hint
The IP address design being used is by geographic location (for example, one campus is 10.1, another campus 10.2, another campus 10.3). The other design criterion is that the next octet number designates IP phones, or a specific device type, with numbers starting with 4, but which can include other numbers. Other devices that might get a designation inside this octet could be printers, PCs, and access points. -
Question 57 of 64
57. Question
1 pointsRefer to the exhibit. If all devices are using a subnet mask of 255.255.255.0, which laptop would have an IP address with the same network number as the server?Correct
Incorrect
Hint
The subnet mask shows which part of the IP address is the network number. Because all the devices have a subnet mask of 255.255.255.0, the first three sets of numbers in each IP address indicate the network number. The server and laptop C both have network numbers of 192.168.3.0. -
Question 58 of 64
58. Question
1 pointsFor what purpose are IPv4 addresses utilized?Correct
Incorrect
Hint
A MAC address is burned into a NIC to uniquely identify a device. A port number is used to uniquely identify the application that requested information. The subnet mask identifies how many hosts can be on a network and the network number. There is not really any parameter that identifies the number of free IP networks. -
Question 59 of 64
59. Question
1 pointsA user is setting up a home wireless network. A global address is to be used in NAT translations for traffic flowing through the wireless router. How is this global address assigned?Correct
Incorrect
Hint
The public (global) address used in NAT is commonly the public IP address that resides on the external facing interface of the wireless router.This IP address is commonly provided via DHCP from the ISP. -
Question 60 of 64
60. Question
1 pointsMatch the protocol function to the description while taking into consideration that a network client is visiting a web site.Correct
Incorrect
Hint
Place the options in the following order:A user requests a website by typing in its name. Domain Name System A service that allows workers to send messages to each other over the Internet. email A user uploads new files to his or her website. file transfer A workstation gets its IP address automatically. Dynamic Host Configuration A user types in a URL and a page loads in the client browser. web service A network technician accesses a network device securely from a remote site. SSH -
Question 61 of 64
61. Question
1 pointsRefer to the exhibit. PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet?Correct
Incorrect
Hint
To resolve the host name to an IP address a host can send a query to a DNS server. The transport layer port number for DNS is port 53. -
Question 62 of 64
62. Question
1 pointsHow many bits are in an IPv4 address?Correct
Incorrect
Hint
An IPv4 address is comprised of 4 octets of binary digits, each containing 8 bits, resulting in a 32-bit address. -
Question 63 of 64
63. Question
1 pointsWhen a host sends a packet, how does it determine if the destination of the packet is on the same local network or on a remote network?Correct
Incorrect
Hint
When a host sends a packet, it uses the subnet mask to compare the source IPv4 address and the destination IPv4 address. If the network bits match, both the source and destination host are on the same local network. Otherwise, the destination host is on a remote network. -
Question 64 of 64
64. Question
1 pointsRefer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?Correct
Incorrect
Hint
PC1 must have a MAC address to use as a destination Layer 2 address. PC1 will send an ARP request as a broadcast and R1 will send back an ARP reply with its G0/0 interface MAC address. PC1 can then forward the packet to the MAC address of the default gateway, R1.