0% found this document useful (0 votes)
367 views34 pages

Networking Essentials 2.0 Practice Final Exam Answers

The document provides a comprehensive set of practice exam questions and answers for the Networking Essentials 2.0 course, covering various modules related to networking concepts, protocols, and security. It includes topics such as DHCP, IP addressing, network design, and troubleshooting techniques. The content is structured to assist learners in preparing for their final exams in networking essentials.

Uploaded by

Escobio Envei
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
367 views34 pages

Networking Essentials 2.0 Practice Final Exam Answers

The document provides a comprehensive set of practice exam questions and answers for the Networking Essentials 2.0 course, covering various modules related to networking concepts, protocols, and security. It includes topics such as DHCP, IP addressing, network design, and troubleshooting techniques. The content is structured to assist learners in preparing for their final exams in networking essentials.

Uploaded by

Escobio Envei
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

 IT Questions Bank  IOS Command List  Ebooks  IP Calculators »  Donations

Search the site 

 Home  CCNA » Security » CyberOps »

 IT Questions Bank  IOS Command List CCNA » CCNA Security v2.0 » Cybersecurity »

Networking Essentials IP Subnet Calculators » Donation Contact

Networking Essentials Exam


Answers

Networking Essentials Exam

Modules 1-4 | Checkpoint


Exam: Build a Small Network

Modules 5-7 | Checkpoint
Exam: Network Access

Modules 8-11 | Checkpoint


Exam: The Internet Protocol

Modules 12-14 | Checkpoint


Exam: Communication
Between Networks

Modules 15-17 | Checkpoint


Exam: Protocols for Specific
Tasks

Modules 18-20 | Checkpoint


Exam: Characteristics of
Network Design
Networking Essentials 2.0 Practice Final Modules 21-23 | Checkpoint

Exam Answers Exam: Network Addressing

 Nov 23, 2023 |  Last Updated: Nov 23, 2023 |  Networking Essentials | Modules 24-26 | Checkpoint
 No Comments Exam: ARP, DNS, DHCP and
the Transport Layer
 Share  Tweet  Share  Pin it

Modules 27-29 | Checkpoint


Exam: Configure Cisco
Networking Essentials (Version 2) – Networking Devices
Essentials 2.0 Practice Final Exam Answers Modules 30-32 | Checkpoint
Exam: Physical, Data Link,
and Network Layers

Modules 33-34 | Checkpoint


Exam: IP Addressing

Modules 35-36 | Checkpoint


Exam: Cisco Devices and
Troubleshooting Network
Issues

Networking Essentials
Course Final Exam Answers

Related Posts
1. Match the type of malware with the definition.

Module 13 – Build a Home Network
Quiz Answers

1.1.17 Lab – Explore Social


Engineering Techniques Answers

5.1.4 Lab – My Protocol Rules Answers

Module 14 – Connect to the Internet


Quiz Answers

19.1.4 Packet Tracer – Implement


Basic Connectivity Answers

Networking Essentials (Version 2.0)


Final Exam SD Answers

Checkpoint Exam: Communication


Between Networks Answers
Networking Essentials (Version 2) – Networking Essentials 2.0
Practice Final Exam Q1
2. An intruder tries a large number of possibilities in rapid 1.4.5 Check Your Understanding –
Clients and Servers Answers
succession to guess a password. As a result, other users on
the network are locked out. What type of attack has occurred? 11.2.6 Check Your Understanding –
TCP and UDP Answers

Networking Essentials: Course Final


Exam Answers

Recent Comments
Girl on 7.2.10 Packet Tracer –
Configure DHCPv4 (Instructions
Answer)

IT Administrator on 12.8.2 Module Quiz


– WLAN Concepts (Answers)

SunnyAlexandria on What destination


MAC address would be included in a
frame sent from a source device to a
brute force
destination device on a remote local
ping of death network?
DDoS
koukou on CCNA 1 v7.0 Final Exam
SYN flooding
Answers Full – Introduction to Networks

PHL on 12.8.2 Module Quiz – WLAN


Explanation: In a brute force attack, an unauthorized person Concepts (Answers)
will try to gain access to a system by sending as many
passwords as possible as rapidly as possible.

3. Which three attacks exploit human behavior? (Choose
three.)

zombies
vishing
phishing
brute force
malware
pretexting

Explanation: Attacks aimed at exploiting human behavior such


as pretexting, phishing, and vishing are commonly used by
hackers to obtain information directly from authorized users.​​
4. What is the effect of setting the security mode to WEP on a
small wireless router?

It translates IP addresses into easy-to-remember domain


names.
It allows the access point to inform clients of its presence.
It encrypts data between the wireless client and the access
point.
It identifies the wireless LAN.
It translates an internal address or group of addresses into an
outside, public address.

Explanation: WEP is used to encrypt data between the


wireless client and the access point. DNS translates IP
addresses into easy-to-remember domain names. NAT
translates an internal address or group of addresses into an
outside, public address. An SSID allows the access point to
inform clients of its presence.

5. Which solution allows external users to access only an


internal FTP server on a private network?

dynamic NAT
NAT with overload
port forwarding
static NAT

Explanation: Port forwarding can be used to permit other


users to reach devices on an internal network through the
Internet. The firewall in the router determines if the traffic
should be forwarded to an internal device based on the port
number. Port numbers are associated with specific services,
such as FTP, HTTP, HTTPS, and POP3.

6. What is an inherent security vulnerability of SSID


broadcasting?
It broadcasts the identity of the network.
It allows unauthenticated access to the wireless network.
It allows any host to join the wireless network.
It sends traffic unencrypted between the wireless access point
and the client.

Explanation: By default, wireless routers and access points


broadcast SSIDs in plain text to all computers within the
wireless [Link] represents a security risk because an
attacker can easily intercept the wireless signals and read plain
text messages.

7. Refer to the exhibit. A newly purchased client laptop has just


connected to the local area network. The local area network is
using a wireless router that is providing dynamic addressing
as shown. Which IP address does the laptop use as a
destination address when requesting a dynamically assigned

address?

Networking Essentials (Version 2) – Networking Essentials 2.0


Practice Final Exam Q7

[Link]
[Link]
[Link]
[Link]
[Link]

Explanation: When a new client device is installed on a


network that uses dynamic IP addressing, the client will send
out a DHCP request message with the destination IPv4
address of [Link].

8. A DHCP server is used to assign IP addresses dynamically to


the hosts on a network. The address pool is configured with
[Link]/24. There are 3 printers on this network that need
to use reserved static IP addresses from the pool. How many IP
addresses in the pool are left to be assigned to other hosts?

252
254
253
251

Explanation: If the block of addresses allocated to the pool is


[Link]/24, there are 254 IP addresses to be assigned to
hosts on the network. As there are 3 printers which need to
have their addresses assigned statically, then there are 251 IP 
addresses left for assignment.

9. Match each DHCP message type with its description. (Not all
options are used.)
Networking Essentials (Version 2) – Networking Essentials 2.0
Practice Final Exam Q9

Explanation: Place the options in the following order:


a client initiating a message to find a DHCP server –
DHCPDISCOVER
a DHCP server responding to the initial request by a client
– DHCPOFFER
the client accepting the IP address provided by the DHCP
server – DHCPREQUEST
the DHCP server confirming that the lease has been
accepted – DHCPACK

10. A client device on an Ethernet segment needs an IP address


in order to communicate on the network. A DHCP server with IP
address [Link] has been configured and enabled on the
network. How will a client device obtain a usable IP address for
this network?

Use a statically configured IP address from the pool of IP


addresses that is offered by the DHCP server.
Send a DHCPREQUEST packet to IP address
[Link].
Send a DHCPDISCOVER message to physical address FF-
FF-FF-FF-FF-FF.
Send a DHCPACK packet to the default gateway address.

Explanation: Like IP addressing, there is also a special MAC


address for broadcast purposes: FF-FF-FF-FF-FF-FF. When a
DHCP client needs to send a DHCP Discover message in order
to seek DHCP servers, the client will use this MAC address as
the destination MAC address in the Ethernet frame. It does this
because it has no knowledge of the IP and MAC addresses of
DHCP servers.

11. Which two criteria are used to help select a network
medium for a network? (Choose two.)

the distance the selected medium can successfully carry a


signal
the environment where the selected medium is to be
installed
the number of intermediate devices that are installed in the
network
the types of data that need to be prioritized
the cost of the end devices that are used in the network

Explanation: Criteria for choosing a network medium include


the following:
The distance the selected medium can successfully carry a
signal in the environment in which the selected medium is to be
installed
The amount of data and the speed at which the data must be
transmitted
The cost of the medium and its installation

12. What is an advantage of using standards to develop and


implement protocols?

Different manufacturers are free to apply different requirements


when implementing a protocol.
Standards provide flexibility for manufacturers to create devices
that comply with unique requirements.
Products from different manufacturers can interoperate
successfully.
A particular protocol can only be implemented by one
manufacturer.

Explanation: Standards-based protocols enable products from


different manufacturers to interoperate successfully. Standards-
based protocols enable many manufacturers to implement that
protocol. If different manufacturers implement different
requirements within the same protocol, then their products will
not be interoperable.

13. At which layer of the OSI model would a logical address be
added during encapsulation?
physical layer
network layer
data link layer
transport layer

Explanation: Logical addresses, also known as IP addresses,


are added at the network layer. Physical addresses are edded
at the data link layer. Port addresses are added at the transport
layer. No addresses are added at the physical layer.

14. Which wireless RF band do IEEE 802.11b/g devices use?

2.4 GHz
900 MHz
60 GHz
5 GHz

Explanation: 900 MHz is an FCC wireless technology that was


used before development of the 802.11 standards. 900 MHz
devices have a larger coverage range than the higher
frequencies have and do not require line of sight between
devices. 802.11b/g/n/ad devices all operate at 2.4 GHz.
802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad
devices operate at 60 GHz.

15. Refer to the exhibit. Which router port connects to the
modem provided by the service provider?

Networking Essentials (Version 2) – Networking Essentials 2.0


Practice Final Exam Q15

A
B
C
D

Explanation: The ports shown in the diagram are used as


follows: The LAN ports, A and B, are used to connect wired
devices on the home network. The Internet port, C, is
connected to the modem. The port, labeled D, is the 5V DC
power port that supplies power to the router.

16. Which type of device filtering can be enabled on some


wireless access points or wireless routers?

authentication
user ID
MAC address
IP address

Explanation: On wireless access points, MAC addresses can


be manually entered to filter which devices are allowed on the
wireless network.

17. Using a systematic troubleshooting approach, a help desk


technician suspects a problem at Layer 3 of the OSI model. In

gathering information, which two questions are associated with
Layer 3? (Choose two.)
From the PC, is the default gateway reachable using the
ping command?
Is there a link light on the network card?
Is the PC configured for DHCP?
Is the network cable plugged in?
Does a browser connection to [Link] work?

Explanation: IP address configuration and the ping command


are associated with Layer 3 protocols. Visiting a web server is
associated with the application layer. An Ethernet cable
connection and NIC are associated with Layer 1 functions.

18. A customer calls the help line to report a computer problem.


The help line technician responds and works with the customer
for some time. However, the technician cannot identify the root
cause of the problem. What should the technician do to help
the customer?

Tell the customer that a ticket is created and another


technician will contact the user soon.
Tell the customer that a replacement computer will be shipped
immediately.
Suggest that the customer visit the support website for more
detailed information.
Ask for the email address of the customer in order to send all 
the support documents for the computer.

Explanation: When the first line technician cannot identify the


cause of the problem, the technician should create a ticket and
initiate the escalation process. Because the cause of the
problem is not identified, the technician should not authorize
the replacement process. The customer should not be sent to
explore further troubleshooting.

19. During a move, employee workstations were disconnected


from the network and reconnected in new offices. However,
after the move a few workstations cannot get a valid IP
address. What should be checked first to identify the root
cause of the problem?
Test if these workstations can ping the default gateway.
Install all software updates.
Check the operation status of the DHCP server.
Make sure the cables are functional and properly plugged.

Explanation: Because the workstations have just been moved


from one location to another, the internal OS and applications
have not changed. The first thing to check should be the
Ethernet cable, including the type of cable used and whether
the cables are properly plugged into both the workstation and
the jack on the wall.

20. A user is setting up a home wireless network. Which type of


device must the user have in order to establish the wireless
network and provide access to the internet for multiple home
devices?

switch
hub
wireless router
patch panel

Explanation: A wireless router connects multiple wireless


devices to the network. It will then aggregate the internet
access requests from home devices to the internet. 

21. A consumer places a smartphone close to a pay terminal at


a store and the shopping charge is successfully paid. Which
type of wireless technology was used?
NFC
Wi-Fi
3G
Bluetooth

Explanation: NFC is a wireless technology that allows data to


be exchanged between devices that are in very close proximity
to each other.

22. When troubleshooting network problems, where would a


network administrator find the configuration information, such
as the computer names and the IP addresses that are used?

DNS server
logical topology diagram
physical topology diagram
DHCP server

Explanation: A logical topology usually contains relevant


network configuration information, such as the following:
Device names
Device IP addressing
Network designations
Configuration information

23. Which network migration technique encapsulates IPv6
packets inside IPv4 packets to carry them over IPv4 network
infrastructures?

tunneling
encapsulation
dual-stack
translation

Explanation: The tunneling migration technique encapsulates


an IPv6 packet inside an IPv4 packet. Encapsulation
assembles a message and adds information to each layer in
order to transmit the data over the network. Translation is a
migration technique that allows IPv6-enabled devices to
communicate with IPv4-enabled devices using a translation
technique similar to NAT for IPv4. The dual-stack migration
technique allows IPv4 and IPv6 protocol stacks to coexist on
the same network simultaneously.

24. A small accounting office is setting up a wireless network to


connect end devices and to provide internet access. In which
two scenarios does a wireless router perform Network Address
Translation (NAT)? (Choose two.)

when a host is sending packets to a remote site owned by


the manufacturer of the wireless router in order to request
a digital copy of the device manual
when a host is sending HTTP packets to the wireless router in
order to update the network addressing of the LAN
when a host is sending packets to the ISP in order to
request a speed increase for Internet services
when a host is sending a print job to a network printer on the
LAN
when a host is sending packets to a local server in order to
update the network media settings and music playlists

Explanation: A wireless router will perform Network Address


Translation (NAT) whenever a private (local) source IPv4
address is translated to a public (global) address.

25. If the default gateway is configured incorrectly on a host,
what is the impact on communications?
The host is unable to communicate with hosts on both the local
and remote networks.
The host is unable to communicate on the local network.
The host is unable to communicate with hosts on remote
networks.
The host cannot get an IP address from the DHCP server.

Explanation: In data communication, the default gateway


device is involved only when a host needs to communicate with
other hosts on another network. The default gateway address
identifies a network device that a host device uses to
communicate with devices on other networks. The default
gateway device is not used when a host communicates with
other hosts on the same network.

26. What are two common media used in networks? (Choose


two.)

wood
fiber
water
copper
nylon

Explanation: Common media used in networks include copper, 


glass or plastic optical fiber, and wireless.

27. Which two types of interference may affect the data


throughput on UTP cables? (Choose two.)

temperature
crosstalk
noise
EMI
moisture

Explanation: Unshielded twisted-pair (UTP) cabling is


sensitive to the interference introduced by electromagnetic
interference (EMI) and crosstalk.
28. What are two wiring schemes defined by the TIA/EIA
organization for Ethernet installation in homes and
businesses? (Choose two.)

T568B
T568A
STP
UTP
RJ-45

Explanation: The TIA/EIA organization defines the wiring


schemes T568A and T568B for typical Ethernet installations.
Each wiring scheme defines a specific order of wire
connections on the end of the cable.

29. A host needs to reach another host on a remote network,


but the ARP cache has no mapping entries. To what destination
address will the host send an ARP request?

the unicast MAC address of the remote host


the unicast IP address of the remote host
the broadcast MAC address
the subnet broadcast IP address

Explanation: ARP requests are sent when a host does not


have an IP to MAC mapping for a destination in the ARP cache.
ARP requests are sent to the Ethernet broadcast of
[Link]. In this example because the address of
the remote host is unknown, an ARP request is sent to the
Ethernet broadcast to resolve the MAC address of the default
gateway that is used to reach the remote host.

30. Which type of address does a switch use to build the MAC
address table?

source MAC address


destination MAC address
destination IP address
source IP address

Explanation: When a switch receives a frame with a source


MAC address that is not in the MAC address table, the switch
will add that MAC address to the table and map that address to
a specific port. Switches do not use IP addressing in the MAC
address table.

31. What are two benefits of using a layered network model?


(Choose two.)

It prevents technology in one layer from affecting other


layers.
It assists in protocol design.
It prevents designers from creating their own model.

It ensures a device at one layer can function at the next higher
layer.
It speeds up packet delivery.

Explanation: Some vendors have developed their own


reference models and protocols. Today, if a device is to
communicate on the Internet, the device must use the TCP/IP
model. The benefits of using a layered model are as
follows:assists in protocol design
fosters competition between vendors
prevents a technology that functions at one layer from affecting
any other layer
provides a common language for describing network
functionality
helps in visualizing the interaction between each layer and
protocols between each layer

32. Which two devices are considered end devices? (Choose


two.)

router
laptop
hub
switch
printer

Explanation: A device that forms the interface between users


and the underlying communication network is known as an end
device. End devices are either the source or destination of a
message.

33. Which factor does not influence throughput?

the operating system that is used by end devices


the amount of data that is being sent and received on the
connection
the latency that is created by the number of network devices
encountered between source and destination
the type of data that is being transmitted

Explanation: Throughput is the amount of data that has


successfully moved from one place to another in a given time
period. Several factors could influence throughput, including
the amount and type of data being transmitted and latency.

34. What is a characteristic of a peer-to-peer application?

The resources required for the application are centralized.


Each device can act both as a client and a server, but not
simultaneously.
Each device using the application provides a user interface
and runs a background service.
Both devices initiate a three-way handshake to determine who
is initiating the communication.

Explanation: Peer-to-peer networks exist directly between


client devices, with no centralized resources or authentication.
Hybrid peer-to-peer systems also exist that decentralize
resource sharing but can use centralized indexes to point to the
resource locations.

35. Using default settings, what is the next step in the switch
boot sequence after the IOS loads from flash?

Search for a backup IOS in ROM.


Load the bootstrap program from ROM.
Load the running-config file from RAM.

Locate and load the startup-config file from NVRAM.
Perform the POST routine.

36. Which two files, if found, are copied into RAM as a router
with the default configuration register setting boots up?
(Choose two.)

running configuration
startup configuration
POST diagnostics
IOS image file

Explanation: The two primary files needed for bootup are the
IOS image file and startup configuration, which are copied into
RAM to maximize performance. If a router configuration
register is set to 0x2102, the router will attempt to load the IOS
image from flash memory and the startup configuration file from
NVRAM.

37. What are two features of protocols used within the TCP/IP
protocol stack? (Choose two.)

The Internet Layer IP protocol has built in mechanisms for


ensuring the reliable transmission and receipt of data.
TCP mechanisms retransmit data when an
acknowledgment is not received from the destination
system within a set period of time.
The same Transport Layer source port is used for all of the tabs
opened at the same time within a web browser. 
TCP and UDP destination port numbers are dynamically
generated by the sending device in order to track the responses
to requests.
UDP is used when an application must be delivered as
quickly as possible and some loss of data can be tolerated.

Explanation: Application programmers make decisions about


which protocols to use to transport the data to and from their
applications based on whether the application can tolerate any
lost data. Live streaming and voice transmissions can use UDP
because if a few data packets are lost, the quality of the video
and audio is not seriously impacted. TCP is used when all data
must be complete and accurate.
38. A student is uploading files from a phone to a server on
another network. Which layer of the TCP/IP model is
responsible for providing an addressing scheme to transmit
the data between the devices?

transport
application
network access
internet

Explanation: The internet layer provides addresses for the


purpose of connecting end devices on different networks.

39. Which statement correctly describes data transmission at


the transport layer?

A single datagram can include both a TCP and a UDP header.


Both UDP and TCP use port numbers.
Segmentation is provided by sequence numbers when UDP is
used.
Segmentation is provided by the window size field when the
TCP protocol is used.
Retransmission of lost packets is provided by both TCP and
UDP.


Explanation: Segmentation is handled at Layer 4 by TCP
sequence numbers. UDP does not have sequence numbers in
the header, but instead, lets the application handle reordering if
it is necessary. Only TCP provides reliable deliver and
retransmits data. Each segment has either a TCP header or a
UDP header; it cannot contain both.

40. What type of technology converts analog voice signals into


digital data?

SNMP
POP3
VoIP
SMTP
Explanation: Voice over IP (VoIP) is a technology that is used
with making telephone calls across a network or internet and it
converts analog voice signals into digital data.

41. Match the protocol with the function. (Not all options are
used.)

Networking Essentials (Version 2) – Networking Essentials 2.0


Practice Final Exam Q41

42. While a network security product is being deployed, a


customizable list of allowable protocols is shown. Which three
protocols should be allowed to provide for the use of email on
a network? (Choose three.)

SMTP
IMAP4
Telnet
DNS
POP3
HTTP
TFTP

Explanation: The email protocols used on a network are


SMTP, POP3, and IMAP4. SMTP is used to send messages to
a local email server, whereas POP and IMAP are used to
receive email.

43. In software defined network architecture, what function is


removed from network devices and performed by an SDN
controller?

application policies
control plane
security
data plane


Explanation: In network virtualization, the control plane
function of each network device is removed and is performed
by a centralized controller. The controller then can
communicate control plane functions to each of the network
devices. This allows the network devices to focus all resources
on forwarding plane functions.

44. A user is configuring a wireless access point and wants to


prevent any neighbors from discovering the network. What
action does the user need to take?

Enable WPA encryption.


Configure a DNS server.
Configure DMZ settings.
Disable SSID broadcast.
Explanation: Disabling SSID broadcast prevents the access
point from announcing the name of the network. Enabling WPA
encryption, configuring DMZ settings, and configuring a DNS
server will accomplish different tasks, but the name of the
network will still be announced.

45. A data center has recently updated a physical server to host


multiple operating systems on a single CPU. The data center
can now provide each customer with a separate web server
without having to allocate an actual discrete server for each
customer. What is the networking trend that is being
implemented by the data center in this situation?


maintaining communication integrity
online collaboration
virtualization
BYOD

Explanation: Virtualization technology can run several different


operating systems in parallel on a single CPU.

46. A network administrator installs a network device that


focuses on interconnecting independent local networks. At
which layer of devices does this technology reside?

access
internet
core
distribution

Explanation: The distribution layer connects local networks


and controls the traffic flowing between them. Networking
devices that make up the distribution layer are designed to
interconnect networks, not individual hosts.

47. A computer has to send a packet to a destination host in the


same LAN. How will the packet be sent?

The packet will be sent to the default gateway first, and then,
depending on the response from the gateway, it may be sent to
the destination host.
The packet will be sent directly to the destination host.
The packet will first be sent to the default gateway, and then
from the default gateway it will be sent directly to the
destination host.
The packet will be sent only to the default gateway.

Explanation: If the destination host is in the same LAN as the


source host, there is no need for a default gateway. A default
gateway is needed if a packet needs to be sent outside the
LAN.


48. If the default gateway is configured incorrectly on the host,
what is the impact on communications?

There is no impact on communications.


The host is unable to communicate on the local network.
The host can communicate with other hosts on the local
network, but is unable to communicate with hosts on
remote networks.
The host can communicate with other hosts on remote
networks, but is unable to communicate with hosts on the local
network.

Explanation: A default gateway is only required to


communicate with devices on another network. The absence of
a default gateway does not affect connectivity between devices
on the same local network.

49. Which three commands are used to set up secure access to


a router through a connection to the console interface?
(Choose three.)

interface fastethernet 0/0


line console 0
line vty 0 4
password cisco
login
enable secret cisco 

Explanation: The three commands needed to password


protect the console port are as follows:
line console 0
password cisco
login
The interface fastethernet 0/0 command is commonly used to
access the configuration mode used to apply specific
parameters such as the IP address to the Fa0/0 port. The line
vty 0 4 command is used to access the configuration mode for
Telnet. The 0 and 4 parameters specify ports 0 through 4, or a
maximum of five simultaneous Telnet connections. The enable
secret command is used to apply a password used on the
router to access the privileged mode.
50. A network administrator establishes a connection to a
switch via SSH. What characteristic uniquely describes the
SSH connection?

direct access to the switch through the use of a terminal


emulation program
remote access to the switch through the use of a telephone
dialup connection
on-site access to a switch through the use of a directly
connected PC and a console cable
remote access to a switch where data is encrypted during
the session
out-of-band access to a switch through the use of a virtual
terminal with password authentication

Explanation: SSH provides a secure remote login through a


virtual interface. SSH provides a stronger password
authentication than Telnet. SSH also encrypts the data during
the session.

51. Which type of access is secured on a Cisco router or switch


with the enable secret command?

privileged EXEC
console line
AUX port

virtual terminal

Explanation: The enable secret command secures access to


the privileged EXEC mode of a Cisco router or switch.

52. When configuring SSH on a router to implement secure


network management, a network engineer has issued the login
local and transport input ssh line vty commands. What three
additional configuration actions have to be performed to
complete the SSH configuration? (Choose three.)

Configure role-based CLI access.


Create a valid local username and password database.
Set the user privilege levels.
Configure the correct IP domain name.
Generate the asymmetric RSA keys.
Manually enable SSH after the RSA keys are generated.

Explanation: SSH is automatically enabled after the RSA keys


are generated. Setting user privilege levels and configuring
role-based CLI access are good security practices but are not a
requirement of implementing SSH.

53. Match the commands to the correct actions. (Not all options
are used.)


Networking Essentials (Version 2) – Networking Essentials 2.0
Practice Final Exam Q53

54. What is the purpose of the subnet mask in conjunction with


an IP address?

to uniquely identify a host on a network


to determine the subnet to which the host belongs 
to mask the IP address to outsiders
to identify whether the address is public or private

Explanation: With the IPv4 address, a subnet mask is also


necessary. A subnet mask is a special type of IPv4 address that
coupled with the IP address determines the subnet of which the
device is a member.

55. Which two statements describe characteristics of network


addresses? (Choose two.)

A valid public IPv4 or IPv6 address is needed in order for


devices to communicate over the internet.
DHCP is used to dynamically assign both MAC and IP
addresses to devices connected to the network.
A statically assigned IP address will be valid on any network to
which the device connects.
The MAC address of a device will change when that device
moves from one Ethernet network to another.
A MAC address is also referred to as a physical address
because it is permanently embedded on the NIC.

Explanation: Knowing how network addressing works can


speed configuration and troubleshooting tasks. MAC addresses
are assigned by the NIC manufacturer and remain the same as
long as the NIC is not replaced. MAC addresses are used to
communicate between devices connected to the same local
Ethernet network. Valid IPv4 and IPv6 addresses are
necessary for communications to be routed over the internet.
All IP addresses are valid only on a network that has the same
network prefix bits and the same subnet mask.

56. What are three characteristics of multicast transmission?


(Choose three.)

Computers use multicast transmission to request IPv4


addresses.
The source address of a multicast transmission is in the range
of [Link] to [Link].
The range of [Link] to [Link] is reserved to reach 
multicast groups on a local network.
A single packet can be sent to a group of hosts.
Multicast transmission can be used by routers to exchange
routing information.
Multicast messages map lower layer addresses to upper layer
addresses.

Explanation: Broadcast messages consist of single packets


that are sent to all hosts on a network segment. These types of
messages are used to request IPv4 addresses, and map upper
layer addresses to lower layer addresses. A multicast
transmission is a single packet sent to a group of hosts and is
used by routing protocols, such as OSPF and RIPv2, to
exchange routes. The address range [Link] to [Link]
is reserved for link-local addresses to reach multicast groups
on a local network.

57. Match the router prompt to the configuration task.

Networking Essentials (Version 2) – Networking Essentials 2.0


Practice Final Exam Q57

58. A network administrator issues the Switch(config)#


Interface FastEthernet 0/1 command on a Cisco switch. Which
term is used to describe the “0/1” part in the command?

argument
keyword
hot key
command

Explanation: In this command structure, the Interface part is


the command, the FastEthernet part is a keyword, and the 0/1
part is an argument.

59. Refer to the exhibit. What three facts can be determined


from the viewable output of the show ip interface brief
command? (Choose three.)

Networking Essentials (Version 2) – Networking Essentials 2.0


Practice Final Exam Q59

Passwords have been configured on the switch.
One device is attached to a physical interface.
The switch can be remotely managed.
Two physical interfaces have been configured.
The default SVI has been configured.
Two devices are attached to the switch.

Explanation: Vlan1 is the default SVI. Because an SVI has


been configured, the switch can be configured and managed
remotely. FastEthernet0/0 is showing up and up, so a device is
connected.

60. Which command can an administrator execute to determine


what interface a router will use to reach remote networks?
show ip route
show arp
show protocols
show interfaces

Explanation: The show ip route command is used to display


the IP routing table of the router. The IP routing table will show
a list of known local and remote networks and the interfaces
that the router will use to reach those networks.

← Previous Article Next Article →


Networking Essentials: 4.4.4 Packet Tracer –
Course Final Exam Answers Configure a Wireless Router
and Client Answers

 Subscribe 

Be the First to Comment!



{} [+] 

0 COMMENTS

[Link] Copyright © 2024. Privacy Policy


Contact

You might also like