Networking Devices and Initial Configuration Exam - Kopya
Networking Devices and Initial Configuration Exam - Kopya
Exam
1. Match the definition to the type of cloud.
intended for exclusive use by multiple organizations with shared functional needs community
made up of two or more distinct cloud infrastructures bound together by technology hybrid cloud
intended for a specific organization or entity, such as the government private cloud
2. A data center has recently updated a physical server to host multiple operating
systems on a single CPU. The data center can now provide each customer with a
separate web server without having to allocate an actual discrete server for each
customer. What is the networking trend that is being implemented by the data
center in this situation?
• maintaining communication integrity
• online collaboration
• virtualization
• BYOD
Explanation: Virtualization technology can run several different operating systems in
parallel on a single CPU.
3. What is an example of cloud computing?
• a service that offers on-demand access to shared resources
• a network infrastructure that spans a large geographic area
• an architectural style of the World Wide Web
• a continuous interaction between people, processes, data, and things
Explanation: Cloud computing provides on-demand access to shared resources. With
minimal management effort, resources can be deployed quickly at data centers.
4. Which two scenarios would benefit the user the most by adding quality of service
(QoS) to the network? (Choose two.)
• Students are updating information about their sport activities on the class
Facebook page.
• A student is sending emails to a friend.
• A student is communicating via Skype with a friend in another country.
• Students are watching a lecture from a YouTube site.
Explanation: Voice and video data need to be transmitted in a continuous stream. If
packets are delayed, the audio and video quality will be poor, sometimes even not
usable. QoS can give voice and video data high priority during the data transmission
so that they would be sent first before other types of traffic, such as email, web
surfing, and web page update.
5. An employee of a large corporation remotely logs into the company using the
appropriate username and password. The employee is attending an important
video conference with a customer concerning a large sale. It is important for the
video quality to be excellent during the meeting. The employee is unaware that
after a successful login, the connection to the company ISP failed. The secondary
connection, however, activated within seconds. The disruption was not noticed by
the employee or other employees.
What three network characteristics are described in this scenario? (Choose three.)
• scalability
• security
• integrity
• fault tolerance
• quality of service
• powerline networking
Explanation: Usernames and passwords relate to network security. Good quality
video, to support video conferencing, relates to prioritizing the video traffic with
quality of service (QoS). The fact that a connection to an ISP failed and was then
restored but went unnoticed by employees relates to the fault tolerant design of the
network.
6. Which three statements describe the functions of the Cisco hierarchical network
design model? (Choose three.)
• The goal of the core layer is maximizing throughput.
• The distribution layer distributes network traffic directly to end users.
• The distribution layer is responsible for traffic filtering and isolating
failures from the core.
• The access layer provides a means of connecting end devices to the
network.
• Route summarization is not necessary at the core and distribution layers.
• The core layer usually employs a star topology.
Explanation: There are three layers of the hierarchical network design model.
– Access: Provides a connection point to end users.
– Distribution: Controls traffic flows between access and core layers.
– Core: Maximizes throughput moving traffic as quickly as possible.
7. What is the key difference between a type 1 hypervisor and a type 2 hypervisor?
• A type 1 hypervisor runs directly on the system hardware and a type 2
hypervisor requires a host OS to run.
• A type 1 hypervisor supports server virtualizations and a type 2 hypervisor
only supports workstation virtualization.
• A type 1 hypervisor supports all server OS virtualization and a type 2
hypervisor supports Linux and Mac virtualization.
• A type 1 hypervisor runs on specialized systems and a type 2 hypervisor
runs on desktop computers.
Explanation: There are two types of hypervisors:
– Type 1 – This type of hypervisor runs directly on the system hardware.
– Type 2 – This type of hypervisor requires a host OS to run.
Both types of hypervisors can run on regular computer systems and support multiple
OS virtualizations.
8. Refer to the exhibit. Host A has sent a packet to host B. What will be the source
MAC and IP addresses on the packet when it arrives at host B?
Traffic Class 8 bit field that is equivalent to the IPv4 Differenciated Services (DS) field.
Next
Header 8 bit field that indicates the data payload type.
20 bit field that maintains the same packet flows through routers and switches to
Flow Label ensure that the packets arrive in the same order.
Payload
Length 16 bit field that stipulates the length of the data portion of the IPv6 packet.
Hop Limit 8 bit field that is decremented by one for each router that fowards the packet.
11. Which three IPv4 header fields have no equivalent in an IPv6 header? (Choose
three.)
• protocol
• fragment offset
• TTL
• version
• identification
• flag
Explanation: Unlike IPv4, IPv6 routers do not perform fragmentation. Therefore, all
three fields supporting fragmentation in the IPv4 header are removed and have no
equivalent in the IPv6 header. These three fields are fragment offset, flag, and
identification. IPv6 does support host packet fragmentation through the use of
extension headers, which are not part of the IPv6 header.
12. Refer to the exhibit. A ping to PC2 is issued from PC0, PC1, and PC3 in this exact
order. Which MAC addresses will be contained in the S1 MAC address table that is
associated with the Fa0/1 port?
IP v4 header IP v6 header
DHCPREQUEST the client accepting the IP address provided by the DHCP server
DHCPACK the DHCP server confirming that the address lease has been accepted
19. Refer to the exhibit. Which protocol was responsible for building the table that
is shown?
• ARP
• DHCP
• ICMP
• DNS
Explanation: The table that is shown corresponds to the output of the arp -a
command, a command that is used on a Windows PC to display the ARP table.
20. Refer to the exhibit. A web designer calls to report that the web server web-
s1.cisco.com is not reachable through a web browser. The technician uses
command line utilities to verify the problem and to begin the troubleshooting
process. Which two things can be determined about the problem? (Choose two.)
• A router is down between the source host and the server web-
s1.cisco.com.
• The web server at 192.168.0.10 is reachable from the source host.
• The default gateway between the source host and the server at
192.168.0.10 is down.
• DNS cannot resolve the IP address for the server web-s1.cisco.com.
• There is a problem with the web server software on web-s1.cisco.com.
Explanation: The successful result of the ping to the IP address indicates that the
network is operational and the web server is online. However, the fact that the ping
to the domain name of the server fails indicates there is a DNS issue, namely that the
host cannot resolve the domain name to its associated IP address.
21. What are two potential network problems that can result from ARP operation?
(Choose two.)
• Multiple ARP replies result in the switch MAC address table containing
entries that match the MAC addresses of hosts that are connected to the
relevant switch port.
• Network attackers could manipulate MAC address and IP address
mappings in ARP messages with the intent of intercepting network
traffic.
• On large networks with low bandwidth, multiple ARP broadcasts could
cause data communication delays.
• Manually configuring static ARP associations could facilitate ARP
poisoning or MAC address spoofing.
• Large numbers of ARP request broadcasts could cause the host MAC
address table to overflow and prevent the host from communicating on
the network.
Explanation: Large numbers of ARP broadcast messages could cause momentary data
communications delays. Network attackers could manipulate MAC address and IP
address mappings in ARP messages with the intent to intercept network traffic. ARP
requests and replies cause entries to be made into the ARP table, not the MAC
address table. ARP table overflows are very unlikely. Manually configuring static ARP
associations is a way to prevent, not facilitate, ARP poisoning and MAC address
spoofing. Multiple ARP replies resulting in the switch MAC address table containing
entries that match the MAC addresses of connected nodes and are associated with
the relevant switch port are required for normal switch frame forwarding operations.
It is not an ARP caused network problem.
22. Match the TCP flag to the correct step in the session establishment sequence.
step 3 ACK
step 1 SYN