Using the TCP/IP protocol suite, a message is sent from host
A to a destination IP address on the same LAN. How does
host A determine the destination of a MAC address?
A. It uses a proxy APP
B. It uses APP requests
C. It uses PARP requests
D. It uses a router lookup table
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery
What are hold-downs used for? A.) To prevent regular update messages from reinstating a route that has come back up B.) Information received on an interface cannot be sent back out the same interface C.) To prevent regular update messages from reinstating a route that has gone down D.) To hold the routing table from being sent to another router
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000
Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 step handshake
Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? A. 254 B. 510 C. 126 D. 16,372
Which of the following are examples of ICMP? A.) Traceroute B.) Web Browsing C.) Ping D.) Telnet E.) Destination Unreachable message from a router F.) Inverse Tunnels
What is the key advantage of using switches?
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
Explain the major types of networks and explain?
You have powered on a new router and you want to create an initial configuration. Which mode should you use? A. copy mode B. user mode C. setup mode D. startup mode