Which wireless technology uses the low-power and data rate that makes it highly
utilized in home automation applications?
ZigBee
LoRaWAN
5G
Wi-Fi
What layer in the TCP/IP model provides a path to forward messages across an
internetwork?
application
network access
internet
transport
4. Which of the following server types relies on record types such as A, NS, AAAA, and
MX in order to provide its services?
DNS
email
file
web
What is Proprietary protocols?
,• protocols created by private organizations that can run on any vendor hardware
• protocols that no organization or vendor owes and thus can be used freely by any
• protocols that are developed by an organization that has control over their definition
and operation
• a suite of protocols simply known as the TCP/IP protocol suit
What service does DNS provide?
Re-resolves domain names, which are like cisco.com, to IP addresses.
A basic set of rules for exchanging text, graphic images, sound, video, and other
multimedia files on the web.
Allows for the transferring of data between a client and a file server
Uses encryption to secure the exchange of text, graphic images, sound and video on the
web.
A server receives a client packet. The destination port number is 110. Which service
does the client request?
DNS
DHCP
SMTP
POP3
Which of the following commands can be entered on a Windows PC to display the IP
configuration of that computer?
show ip interface brief
ping
show interfaces
ipconfig
A home computer is connected to a wired laser printer. The printer has been shared so
that other home computers can utilize the printer. Which networking model is being
used?
client-based
master-slave
point-to-point
,peer-to-peer (P2P)
What characterizes a virus?
a network device that controls access and traffic to devices on a network
the use of stolen credentials to access private data
an attack that makes a device or network service unavailable or slows down
malicious software or code running on an end device
Three bank employees are connected to the corporate network. First, one employee has
opened a web browser to read some announcements on a company web page. Second,
another employee has opened a connection to the corporate database to conduct some
financial transactions. Third, another employee participates in an important live audio
conference with other corporate managers at branch offices. If QoS is employed on this
network, what would be the priorities from highest to lowest of the various data types?
financial transactions, web page, audio conference
audio conference, financial transactions, web page
financial transactions, audio conference, web page
audio conference, web page, financial transactions
Match the description to the IPv6 addressing concept.
Refer to the exhibit. If Host1 were to transfer a file to the server, which layers of the
TCP/IP model would be utilized?
only application and Internet layers
only Internet and network access layers
only application, Internet, and network access layers
application, transport, Internet, and network access layers
only application, transport, network, data link, and physical layers
application, session, transport, network, data link, and physical layers
Match the characteristic to the forwarding method. (Not all options are used.)
Refer to the exhibit. What is the IP address of the device interface that should be
configured as the default gateway setting of host H1?
R1: S0/0/0
, R2: S0/0/1
R1: G0/0
R2: S0/0/0
Which service is described by Internet Messenger?
Provides an application that enables several remote users to engage in a real-time chat.
Enables remote users to access the networking devices and servers.
Translates domain names such as cisco.com into IP addresses.
Uses encryption to provide secure remote access over the network to devices and
servers.
Refer to the exhibit. Drag the network to the correct IP address and prefix combination
that will satisfy the useable host addressing requirements for each network.
Refer to the exhibit. Which protocol is responsible for populating the table shown?
DHCP
ARP
DNS
ICMP
A network administrator is troubleshooting some newly installed Ethernet cabling that is
producing corrupted and distorted data signals. The new cabling was installed in the
ceiling near fluorescent lights and electrical equipment. Which two causes might
interfere with the copper cabling and cause signal distortion and data corruption?
(Choose two.)
crosstalk
extended length of cabling
RFI
EMI
signal attenuation
A host is trying to send a packet to a device on a different LAN segment. It currently has
no entries in its ARP cache for the destination device. What will that device do?
Send the frame and use itself as the destination.
Send an ARP request for the destination device MAC address.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.