Networking Hardware Review 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By 1ghosttechno
1
1ghosttechno
Community Contributor
Quizzes Created: 2 | Total Attempts: 417
| Attempts: 160 | Questions: 26
Please wait...
Question 1 / 26
0 %
0/100
Score 0/100
1. How does TCP handle data sequencing?

Explanation

TCP handles data sequencing by breaking user data into segments, numbering each segment, placing them into the correct sequence, and sending each one in order. It waits for an acknowledgement before sending the next segment. This ensures that the data is sent and received in the correct order, preventing any data loss or corruption.

Submit
Please wait...
About This Quiz
Networking Hardware Review 3 - Quiz

Networking is a complex yet understandable concept of Computer Science and Networking Hardware Review 3 queries on the different protocols within the study not to mention the critical thinking comprehensions. All the best and enjoy.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. While working at the console of a Cisco devvice, you need use the same command repeatedly.Given that the command is quite long, what can you do to avoid having to retype it over and over?

Explanation

Pressing the Up-arrow key allows you to access the command history on the Cisco device's console. This means that you can scroll through and reuse previously entered commands without having to retype them. This saves time and effort, especially when dealing with long and complex commands.

Submit
3. What problem does the Spanning Tree Protocol prevent?

Explanation

The Spanning Tree Protocol prevents message loops from developing when a switch or bridge is connected to the same location more than once. By using the protocol, redundant paths in the network are identified and blocked, ensuring that there is only one active path between any two network devices. This prevents the occurrence of loops, which can cause network congestion, broadcast storms, and inefficient packet forwarding.

Submit
4. You are asked to design a LAN segmentation solution for Company AGH. They have three workgroups, Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department.Which segmentation device meets the needs while providing the most economical and simplest administration?

Explanation

A router is the best segmentation device for Company AGH because it can separate the three workgroups into different network segments, allowing for localized traffic within each group and controlling the traffic that crosses between them. Routers also provide security features such as firewall capabilities, which would address the company's concern about the security of information within the Accounting department. Additionally, routers offer more advanced administration options compared to other devices like bridges, switches, hubs, or gateways.

Submit
5. You have been put in charge of connecting two company networks that were previously separated. You need to connect a 100BastTx Ethernet network with an older token ring network. Most traffic will be localized within each network, with only a little traffic crossing between networks. Both networks are using the TCP/IP protocol suite.Which connectivity device would be the best choice in this situation?

Explanation

A router would be the best choice in this situation because it can connect networks using different protocols, such as the Ethernet network and the token ring network. It can also route traffic between the networks based on IP addresses, allowing for efficient communication between the two networks.

Submit
6. At which layer of the OSI model do network switches operate?

Explanation

Network switches operate at the Data Link layer of the OSI model. This layer is responsible for the reliable transfer of data between adjacent network nodes. Network switches use MAC addresses to forward data packets within a local area network (LAN). They examine the data link layer header of incoming packets and make decisions on where to forward them based on the destination MAC address. Therefore, the correct answer is Data Link.

Submit
7. A Cisco router boots but cannot locate the startup-config file. Assuming the default configuration what will the router do next?

Explanation

When a Cisco router boots up but cannot locate the startup-config file, it will enter setup mode. In this mode, the router will prompt the user to configure basic settings such as hostname, IP addresses, and passwords. This allows the user to manually set up the router's configuration from scratch or restore a backup configuration file if available.

Submit
8. You've just enabled port security on an interface of a Catalyst 2950 switch. You want to generate an SNMP trap whenever a violation occurs. Which feature should you enable?

Explanation

To generate an SNMP trap whenever a violation occurs after enabling port security on a Catalyst 2950 switch, the feature that should be enabled is "restrict." This feature restricts the number of MAC addresses allowed on the interface and generates an SNMP trap when a violation, such as exceeding the allowed number of MAC addresses, occurs.

Submit
9. While working at the console of a Cisco device, you need to view a list of commands that are available in the current mode.Which command should you use?

Explanation

To view a list of commands available in the current mode while working at the console of a Cisco device, you should use the "show history" command. This command will display a list of previously entered commands, allowing you to see what commands are available in the current mode.

Submit
10. Which IPv6 address type is only valid within a subnet?

Explanation

The link-local IPv6 address type is only valid within a subnet. These addresses are automatically assigned to interfaces on a network without the need for any external configuration or intervention. Link-local addresses are used for communication within a single subnet and are not routable outside of that subnet. They are primarily used for neighbor discovery and automatic address configuration within a local network.

Submit
11. What is the correct binary form of the decimal IP address 192.168.1.1?

Explanation

The correct binary form of the decimal IP address 192.168.1.1 is 11000000.10101000.00000001.00000001.

Submit
12. A workstation has been assigned the following IP addressing information:* IP address: 192.168.1.26* Subnet mask: 255.255.255.0* Default gateway: 192.168.1.254* DNS server: 192.168.1.1Given this information, what is the IP address of the network where this host resides?

Explanation

The correct answer is 192.168.1.0. This is because the IP address of the network where the host resides is obtained by performing a logical AND operation between the IP address and the subnet mask. In this case, 192.168.1.26 AND 255.255.255.0 results in 192.168.1.0, which is the network address.

Submit
13. Which of the following IPv6 addressses is equivalent to the IPv4 loopback address of 127.0.0.1?

Explanation

The IPv6 address "::1" is equivalent to the IPv4 loopback address of 127.0.0.1. In IPv6, the "::1" address is reserved for the loopback interface, just like 127.0.0.1 is in IPv4. Both addresses are used to test network connectivity on a local machine without involving any external network devices.

Submit
14. Your network has been assigned 200.55.6.0 as the network address. You have determined that you need four subnets.Which subnet mask should you use to provide four subnets?

Explanation

To provide four subnets, the subnet mask should have enough bits to accommodate the number of subnets required. In this case, four subnets are needed, which can be represented by 2 bits (2^2 = 4). The subnet mask 255.255.255.192 has 26 bits turned on, which allows for 64 possible subnets (2^6 = 64). Therefore, it is the appropriate subnet mask to provide four subnets.

Submit
15. You have configured NAT on your router to connect your small company network to the Internet. Shown below is a partial configuration for the router:hostname RouterA!ip address 192.168.11.1 255.255.255.0speed autoduplex autoip nat inside!interface FastEthernet0/1ip address 192.168.12.1 255.255.0speed autoduplex autoip nat inside!interface Serial0/1/0ip address 116.12.11.155 255.255.255.248ip nat outside!ip nat pool ovrloadd 116.12.11.151 116.12.11.156 netmask 255.255.255.248!ip nat inside source list 7 pool overloadd!Following the configuration, you must find that no hosts on Fa0/0 or Fa0/1 can connect to the Internet. What should you do so that hosts can connect to the Internet?

Explanation

The correct answer is to create an access list 7 that permits networks 192.168.11.0/24 and 192.168.12.0/24. By creating this access list, the router will allow traffic from these networks to be translated and forwarded to the Internet using NAT. Without the access list, the router will not know which traffic should be translated and forwarded, resulting in the hosts being unable to connect to the Internet.

Submit
16. Which of the following is true of the systom ROM on a Cisco device?

Explanation

The system ROM on a Cisco device holds a limited version of the IOS software to be used if the full IOS image cannot be found. This means that if the device is unable to find the full IOS image during startup, it can still boot up using the limited version stored in the system ROM. This provides a fail-safe mechanism to ensure that the device can still function even if the full IOS image is not available.

Submit
17. You have an office network connected to the Internet as shown in the Exhibit. The network has three subnets, all with client computers.The Web1 server on Subnet1 hosts a small website used for treveling employees. Employees must be able to contact the Web server from the Internet. All other hosts on the private network need to have full Internet connectivity for browsing the Web and sending e-mail.On which routers should you configure NAT?

Explanation

not-available-via-ai

Submit
18. You would like to use crypto key command to generate a key pair for use with SSH. Which parameters must be set prior to running this command? (Select two.)

Explanation

Prior to running the crypto key command to generate a key pair for use with SSH, the parameters that must be set are the hostname and the IP domain-name. The hostname parameter is required to identify the device, while the IP domain-name parameter is necessary for generating the SSH key pair.

Submit
19. You have configured access lists on your router. A partial configuration for the router is shown below:hostname RouterA!interface FastEthernet0/0ip address 192.168.1.1 255.255.255.0speed autoduplex auto!interface FastEthernet0/1ip address 192.168.2.1 255.255.255.0speed autoduplex auto!interface Serial0/1/0ip address 192.168.3.1 255.255.255.248encapsulationn pppip access-group 7 in!access-list 7 deny 192.168.1.55 0.0.0.0access-list 7 permit ip any any!You want to block any traffic received on S0/1/0 that is sent to the host with address 192.168.1.55. However, you find that traffic sent to this host through that interface is still being allowed.What should you do?

Explanation

not-available-via-ai

Submit
20. You are deploying a new 10GB Ethernet network using Cat6 cabling.Which of the following are true concerning this media? (Select two.)

Explanation

Cat6 cabling includes a solid plastic core, which provides structural support and helps maintain the shape of the cable. It also supports 10 Mbps Ethernet connections, which means it is capable of transmitting data at speeds of up to 10 megabits per second.

Submit
21. You have a small network connected to the Internet as shown in the exhibit.Both Srv1 and Srv2 need to be contacted by Internet hosts. Which of the folllowing tasks are required parts of the solution? (Select two.)

Explanation

The correct answer is to define S0/1/0 as an inside NAT interface. This is necessary because S0/1/0 is the interface that connects the small network to the Internet. By defining it as an inside NAT interface, it allows for the translation of private IP addresses used in the small network to public IP addresses that can be recognized by hosts on the Internet. This ensures that Srv1 and Srv2 can be contacted by Internet hosts.

Submit
22. Which of the following measures can you take to increase the security of remote connections to your router?

Explanation

not-available-via-ai

Submit
23. You want to implement an Ethernet network using the 100Base-FX standard using the minimum hardware specifications possible. You need to support distances of up to 1,000 meters.Which of the following should you include in your plan? (Select two.)

Explanation

To implement an Ethernet network using the 100Base-FX standard and support distances of up to 1,000 meters, you should include SC connectors and single-mode fiber optic cable in your plan. SC connectors are commonly used with fiber optic cables and provide a secure and reliable connection. Single-mode fiber optic cable is designed for long-distance transmissions and can support the required distance of 1,000 meters. This combination of SC connectors and single-mode fiber optic cable will ensure optimal performance and connectivity for your Ethernet network.

Submit
24. Which of the following statements about access lists are true? (Select two.)

Explanation

Inbound access lists are applied before the routing process. This means that when a packet arrives at a router, the inbound access list is checked first to determine if the packet should be allowed or denied before the routing process is initiated.

An access list without a permit traffic will not allow any traffic. This means that if an access list does not have any permit statements, it will deny all traffic by default.

Submit
25. Consider the following IPv6 addresss:FE80:0000:0000:0055:0000:0000:000A:AB00Which of the following are valid shortened forms of this address? (Select two.)

Explanation

The given IPv6 address can be shortened by omitting leading zeros in each 16-bit block. Therefore, the valid shortened forms of the address are "FE80::55:0000:A:AB00" and "FE80::55::A:AB00".

Submit
26. You use the show ip route command on your router and see the information shown below:Gateway of last resort is not set172.16.0.0/28 is subnetted, 4 subnetsC 172.16.0.0 is directly connected, FastEthernet0/0C 172.16.0.32 is directly connected, FastEthernet0/1R 172.16.0.96 [120/1] via 172.16.0.1, 00:00:25, FastEthernet0/0R 172.16.0.128 [120/1] via 172.16.0.33, 00:00:25, FastEthernet0/1The router receives a packet addressed to 172.16.0.19 and one addressed to 172.16.0.109. What will the router do with each packet? (Select two.)

Explanation

The router will forward the packet addressed to 172.16.0.109 to router 172.16.0.1 because there is a routing entry for this destination with a next hop of 172.16.0.1. However, the router will drop the packet addressed to 172.16.0.19 because there is no specific routing entry for this destination.

Submit
View My Results

Quiz Review Timeline (Updated): Apr 16, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 16, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 24, 2015
    Quiz Created by
    1ghosttechno
Cancel
  • All
    All (26)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
How does TCP handle data sequencing?
While working at the console of a Cisco devvice, you need use the same...
What problem does the Spanning Tree Protocol prevent?
You are asked to design a LAN segmentation solution for Company AGH....
You have been put in charge of connecting two company networks that...
At which layer of the OSI model do network switches operate?
A Cisco router boots but cannot locate the startup-config file....
You've just enabled port security on an interface of a Catalyst...
While working at the console of a Cisco device, you need to view a...
Which IPv6 address type is only valid within a subnet?
What is the correct binary form of the decimal IP address 192.168.1.1?
A workstation has been assigned the following IP addressing...
Which of the following IPv6 addressses is equivalent to the IPv4...
Your network has been assigned 200.55.6.0 as the network address. You...
You have configured NAT on your router to connect your small company...
Which of the following is true of the systom ROM on a Cisco device?
You have an office network connected to the Internet as shown in the...
You would like to use crypto key command to generate a key...
You have configured access lists on your router. A partial...
You are deploying a new 10GB Ethernet network using Cat6 cabling.Which...
You have a small network connected to the Internet as shown in the...
Which of the following measures can you take to increase the security...
You want to implement an Ethernet network using the 100Base-FX...
Which of the following statements about access lists are true? (Select...
Consider the following IPv6...
You use the show ip route command on your router and see the...
Alert!

Advertisement