DCN Final Reviewer
DCN Final Reviewer
● netstat -s
● show ip route
● netstat -r
● tracert
● The network layer depends on the higher level layers to determine the
MTU.
● The network layer depends on the data link layer to set the MTU, and
adjusts the speed of transmission to accommodate it.
● The MTU is passed to the network layer by the data link layer.
● To increase speed of delivery, the network layer ignores the MTU.
Explanation: The data link layer indicates to the network layer the MTU for the
medium that is being used. The network layer uses that information to determine
how large the packet can be when it is forwarded. When packets are received on
one medium and forwarded on a medium with a smaller MTU, the network layer
device can fragment the packet to accommodate the smaller size.
8. Which field in an IPv4 packet header will typically stay the same during
its transmission?
● Flag
● Time-to-Live
● Packet Length
● Destination Address
Explanation: The value in the Destination Address field in an IPv4 header will
stay the same during its transmission. The other options might change during its
transmission.
● TTL
● Hop Limit
● Address Unreachable
● No Route to Destination
Explanation: ICMPv6, like IPv4, sends a Time Exceeded message if the router
cannot forward an IPv6 packet because the packet has expired. However, the
IPv6 packet does not have a TTL field. Instead, it uses the Hop Limit field to
determine if the packet has expired.
● source IP address
● destination IP address
● source data-link address
● destination data-link address
12. A computer has to send a packet to a destination host in the same LAN.
How will the packet be sent?
● The packet will be sent to the default gateway first, and then,
depending on the response from the gateway, it may be sent to the
destination host.
● The packet will be sent directly to the destination host.
● The packet will first be sent to the default gateway, and then from the
default gateway it will be sent directly to the destination host.
● The packet will be sent only to the default gateway.
Explanation: If the destination host is in the same LAN as the source host, there
is no need for a default gateway. A default gateway is needed if a packet needs
to be sent outside the LAN.
13. A router receives a packet from the Gigabit 0/0 interface and determines
that the packet needs to be forwarded out the Gigabit 0/1 interface. What
will the router do next?
Explanation: Once a router receives a packet and looks inside the header to
determine the destination network, the router compares the destination network
to the routing table to determine if the packet is to be routed or dropped. If
routed, the router attaches a new Layer 2 header based on the technology that is
used by the outgoing port that is used. The packet is then routed out the
destination port as designated by the routing table. The ARP cache is used to
match an IP address with a MAC address.
14. Which IPv4 address can a host use to ping the loopback interface?
● 126.0.0.1
● 127.0.0.0
● 126.0.0.0
● 127.0.0.1
Explanation:
The Cisco IOS is stored in flash.
The running configuration file is stored in RAM.
The bootup instructions are stored in ROM.
The startup configuration file is stored in NVRAM.
Explanation: The VTY lines are the Virtual Terminal lines of the router, used
solely to control inbound Telnet connections while console 0 is the physical
console port on the switch/router you plug into. The line vty command is used to
remote configure access into the switch/router via telnet or ssh.
7. Which CLI mode allows users to access all device commands, such as
those used for configuration, management, and troubleshooting?
Explanation: The startup configuration file is stored in NVRAM and contains the
commands needed to initially configure a router. It also creates the running
configuration file that is stored in in RAM.
9. Which characteristic describes the default gateway of a host computer?
10. A router boots and enters setup mode. What is the reason for this?
12. Company policy requires using the most secure method to safeguard
access to the privileged exec and configuration mode on the routers. The
privileged exec password is trustknow1. Which of the following router
commands achieves the goal of providing the highest level of security?
● secret password trustknow1
● enable password trustknow1
● service password-encryption
● enable secret trustknow1
13. What will be the response from the router after the command,
“router(config)# hostname portsmouth” is entered?
● portsmouth#
● portsmouth(config)#
● invalid input detected
● router(config-host)#
● hostname = portsmouth portsmouth#
● ? command not recognized router(config)#
● network address
● multicast address
● host address
● broadcast address
Explanation: The /24 shows that the network address is 172.17.4.0. The
broadcast address for this network would be 172.17.4.255. Useable host
addresses for this network are 172.17.4.1 through 172.17.4.254.
● 256
● 254
● 62
● 32
● 16
● 14
Explanation: With the IPv4 address, a subnet mask is also necessary. A subnet
mask is a special type of IPv4 address that coupled with the IP address
determines the subnet of which the device is a member.
4. A network administrator is variably subnetting a network. The smallest
subnet has a mask of 255.255.255.224. How many usable host addresses
will this subnet provide?
● 2
● 6
● 14
● 30
● 62
● 255.255.255.248
● 255.255.224.0
● 255.255.240.0
● 255.255.255.0
● 255.255.255.192
Explanation: The slash notation /20 represents a subnet mask with 20 1s. This
would translate to: 11111111.11111111.11110000.0000, which in turn would
convert into 255.255.240.0.
● 256
● 254
● 62
● 30
● 16
● 32
9. Which subnet mask would be used if exactly 4 host bits are available?
● 255.255.255.224
● 255.255.255.128
● 255.255.255.240
● 255.255.255.248
Explanation: The subnet mask of 255.255.255.224 has 5 host bits. The mask of
255.255.255.128 results in 7 host bits. The mask of 255.255.255.240 has 4 host
bits. Finally, 255.255.255.248 represents 3 host bits.
10. Which two parts are components of an IPv4 address? (Choose two.)
● subnet portion
● network portion
● logical portion
● host portion
● physical portion
● broadcast portion
11. If a network device has a mask of /26, how many IP addresses are
available for hosts on this network?
● 64
● 30
● 62
● 32
● 16
● 14
12. What is the prefix length notation for the subnet mask 255.255.255.224?
● /25
● /26
● /27
● /28
13. How many valid host addresses are available on an IPv4 subnet that is
configured with a /26 mask?
● 254
● 190
● 192
● 62
● 64
Explanation: When a /26 mask is used, 6 bits are used as host bits. With 6 bits,
64 addresses are possible, but one address is for the subnet number and one
address is for a broadcast. This leaves 62 addresses that can be assigned to
network devices.
14. Which subnet mask would be used if 5 host bits are available?
● 255.255.255.0
● 255.255.255.128
● 255.255.255.224
● 255.255.255.240
Explanation: The subnet mask of 255.255.255.0 has 8 host bits. The mask of
255.255.255.128 results in 7 host bits. The mask of 255.255.255.224 has 5 host
bits. Finally, 255.255.255.240 represents 4 host bits.
● 1
● 2
● 4
● 8
● 16
● 64
Explanation: The normal mask for 192.168.10.0 is /24. A /26 mask indicates 2
bits have been borrowed for subnetting. With 2 bits, four subnets of equal size
could be created.
IPv6 Addressing
● 2001::/64
● 2001:D12::/64
● 2001:D12:AA04::/64
● 2001:D12:AA04:B5::/64
Explanation: The /64 represents the network and subnet IPv6 fields which are
the first four groups of hexadecimal digits. The first address within that range is
the subnetwork address of 2001: D12:AA04:B5::/64.
2. Which type of IPv6 address is not routable and used only for
communication on a single subnet?
Explanation: Link-local addresses have relevance only on the local link. Routers
will not forward packets that include a link-local address as either the source or
destination address.
● private
● multicast
● unicast
● broadcast
Explanation: IPv6 supports unicast, private, and multicast addresses but does
not support Layer 3 broadcasts.
Explanation: With IPv6, a router interface typically has more than one IPv6
address. The router will at least have a link-local address that can be
automatically generated, but the router commonly has an global unicast address
also configured.
● FE94
● FE57:FE94
● 47FF:FE57:FE94
● A9CD:47FF:FE57:FE94
● 1000:A9CD:47FF:FE57:FE94
6. What are three parts of an IPv6 global unicast address? (Choose three.)
Explanation: There are three elements that make up an IPv6 global unicast
address. A global routing prefix which is provided by an ISP, a subnet ID which is
determined by the organization, and an interface ID which uniquely identifies the
interface interface of a host.
7. What is the valid most compressed format possible of the IPv6 address
2001:0DB8:0000:AB00:0000:0000:0000:1234?
● 2001:DB8:0:AB00::1234
● 2001:DB8:0:AB::1234
● 2001:DB8::AB00::1234
● 2001:DB8:0:AB:0:1234
Explanation: There are two rules defining how an IPv6 address can be
compressed. The first rule states that leading zeros in a hextet can be eliminated.
The second rule states that a single :: can be used to represent one or more
contiguous all zero hextets. There can be one and only one :: in an IPv6 address.
● 2001::/64
● 2001:CA48::/64
● 2001:CA48:D15:EA::/64
● 2001:CA48:D15:EA:CC44::/64
Explanation: The /64 represents the network and subnet IPv6 fields. The fourth
field of hexadecimal digits is referred to as the subnet ID. The subnet ID for this
address is 2001:CA48:D15:EA::0/64.
● global unicast
● link-local
● loopback
● unique local
10. Which IPv6 network prefix is only intended for local links and can not
be routed?
● 2001::/3
● FC00::/7
● FE80::/10
● FEC0::/10
● 8
● 16
● 80
● 128
Explanation: The global routing prefix that is assigned to the organization has
48 bits. The next 16 bits are used for the subnet ID. This makes up the first 64
bits of the address, which is typically the network portion of the address. The
remaining 64 bits of the 128-bit IPv6 address are for the interface ID (or host)
portion of the address.
Explanation: The IPv6 address ::1 is the loopback address. A successful ping to
this address means that the TCP/IP stack is correctly installed. It does not mean
that any addresses are correctly configured.
● 2001:0:abcd::1
● 2001:0:0:abcd::1
● 2001::abcd::1
● 2001:0000:abcd::1
● 2001::abcd:0:1
Explanation: The address ::1 is an IPv6 loopback address. Using the command
ping ::1 tests the internal IP stack to ensure that it is configured and functioning
correctly. It does not test reachability to any external device, nor does it confirm
that IPv6 addresses are properly configured on the host.
● link-local
● unique local
● site local
● global unicast
● 2001:0db8:abcd::1
● 2001:db8:0:abcd::1
● 2001:0db8:abcd::0001
● 2001:0db8:0000:abcd::1
● 2001:db8::abcd:0:1
Explanation: The IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001 in
its most compressed format would be 2001:db8:0:abcd::1. The one leading zero
in the second hextet can be removed. The first hextet of zeros would be
compressed to a single zero. The three consecutive hextets of zeros can be
compressed to a double colon ::. The three leading zeros in the last hextet can
be removed. The double colon :: can only be used once in an address.
● 2001::/64
● 2001:DB8::/64
● 2001:DB8:D15:EA::/64
● 2001:DB8:D15:EA:CC44::/64
Explanation: The /64 represents the network and subnet IPv6 fields. The fourth
field of hexadecimal digits is referred to as the subnet ID. The subnet ID for this
address is 2001:DB8:D15:EA::0/64.
● 2001::/64
● 2001:DB8::/64
● 2001:DB8:AA04::/64
● 2001:DB8:AA04:B5::/64
Explanation: The /64 represents the network and subnet IPv6 fields which are
the first four groups of hexadecimal digits. The first address within that range is
the subnetwork address of 2001:DB8:AA04:B5::/64.
● 8
● 16
● 80
● 128
Explanation: The global routing prefix that is assigned to the organization has
48 bits. The next 16 bits are used for the subnet ID. This makes up the first 64
bits of the address, which is typically the network portion of the address. The
remaining 64 bits of the 128-bit IPv6 address are for the interface ID (or host)
portion of the address.
Transport Layer
Explanation: If the source determines that the TCP segments are either not
being acknowledged or are not acknowledged in a timely manner, then it can
reduce the number of bytes it sends before receiving an acknowledgment. This
does not involve changing the window in the segment header. The source does
not decrease the window that is sent in the segment header. The window in the
segment header is adjusted by the destination host when it is receiving data
faster than it can process it, not when network congestion is encountered.
2. Which two operations are provided by TCP but not by UDP? (Choose
two.)
Explanation: There are three main responsibilities for transport layer protocols
TCP and UDP:
5. How does a networked server manage requests from multiple clients for
different services?
● FTP
● DNS
● HTTP
● POP3
● VoIP
Explanation: Both DNS and VoIP use UDP to provide low overhead services
within a network implementation.
Explanation: The source port number in a segment header is used to keep track
of multiple conversations between devices. It is also used to keep an open entry
for the response from the server. The incorrect options are more related to flow
control and guaranteed delivery.
● 01-23-45-67-89-AB
● 21
● 192.168.1.1:80
● 10.1.1.15
9. Which two flags in the TCP header are used in a TCP three-way
handshake to establish connectivity between two network devices?
(Choose two.)
● ACK
● FIN
● PSH
● RST
● SYN
● URG
Explanation: TCP uses the SYN and ACK flags in order to establish connectivity
between two network devices.
● The message is lost because FTP does not use a reliable delivery
method.
● The FTP source host sends a query to the destination host.
● The part of the FTP message that was lost is re-sent.
● The entire FTP message is re-sent.
Explanation: Because FTP uses TCP as its transport layer protocol, sequence
and acknowledgment numbers will identify the missing segments, which will be
re-sent to complete the message.
11. What type of applications are best suited for using UDP?
Explanation: TCP uses the 3-way handshake. UDP does not use this feature.
The 3-way handshake ensures there is connectivity between the source and
destination devices before transmission occurs.
14. What is the complete range of TCP and UDP well-known ports?
● 0 to 255
● 0 to 1023
● 256 – 1023
● 1024 – 49151
Explanation: There are three ranges of TCP and UDP ports. The well-know
range of port numbers is from 0 – 1023.
Explanation: TCP uses the 3-way handshake. UDP does not use this feature.
The 3-way handshake ensures there is connectivity between the source and
destination devices before transmission occurs.
● Three-way handshake
● Socket pair
● Two-way handshake
● Sliding window
● .com
● www
● http
● index
● http = protocol
● www = part of the server name
● cisco = part of the domain name
● index = file name
● com = the top-level domain
Explanation: The application layer of the TCP/IP model is the layer that is
closest to the end user, providing the interface between the applications. It is
responsible for formatting, compressing, and encrypting data, and is used to
create and maintain dialog between source and destination applications.
4. What message type is used by an HTTP client to request data from a web
server?
● GET
● POST
● PUT
● ACK
Explanation: HTTP clients send GET messages to request data from web
servers.
● FTP
● HTTP
● DHCP
● ICMP
● SNMP
● application
● internet
● network access
● transport
Explanation: End users use applications to interact with and use the network.
The application layer of the TCP/IP model is closest to the end user. Application
layer protocols are used to communicate and exchange messages with other
network devices and applications. The layers of the TCP/IP model are from top to
bottom (memory aid – ATIN): application, transport, internet, network access
● ТСР
● HTTP
● MPEG
● GIF
● IP
● UDP
Explanation: HTTP, MPEG, and GIF operate at the application layer of the
TCP/IP model. TCP and UDP operate at the transport layer. IP operates at the
internet layer.
● DHCP
● DNS
● FTP
● HTTPS
Explanation: HTTPS uses Secure Socket Layer (SSL) to encrypt traffic
accessed from a web server.
11. Which two tasks can be performed by a local DNS server? (Choose
two.)
Explanation: Two important functions of DNS are to (1) provide IP addresses for
domain names such as www.cisco.com, and (2) forward requests that cannot be
resolved to other servers in order to provide domain name to IP address
translation. DHCP provides IP addressing information to local devices. A file
transfer protocol such as FTP, SFTP, or TFTP provides file sharing services.
IMAP or POP can be used to retrieve an email message from a server.
12. Which protocol can be used to transfer messages from an email server
to an email client?
● SMTP
● POP3
● SNMP
● HTTP
Explanation: SMTP is used to send mail from the client to the server but POP3
is used to download mail from the server to the client. HTTP and SNMP are
protocols that are unrelated to email.
13. When retrieving email messages, which protocol allows for easy,
centralized storage and backup of emails that would be desirable for a
small- to medium-sized business?
● IMAP
● РОР
● SMTP
● HTTPS
● HTTP
● SMTP
● DHCP
● SMB
● client
● master
● server
● slave
● transient
● smartcard settings
● firewall settings
● MAC address settings
● file system settings
Explanation: Smartcard and file system settings do not affect network operation.
MAC address settings and filtering may be used to control device network access
but cannot be used to filter different data traffic types.
5. Which benefit does SSH offer over Telnet for remotely managing a
router?
● encryption
● TCP usage
● authorization
● connections via multiple VTY lines
6. What is one of the most effective security tools available for protecting
users from external threats?
● firewalls
● router that run AAA services
● patch servers
● password encryption techniques
Explanation: A firewall is one of the most effective security tools for protecting
internal network users from external threats. A firewall resides between two or
more networks, controls the traffic between them, and helps prevent
unauthorized access. A host intrusion prevention system can help prevent
outside intruders and should be used on all systems.
● DoS attacks
● access attacks
● reconnaissance attacks
● trust exploitation
● accounting
● automation
● authorization
● authentication
● autobalancing
● autoconfiguration
● virus
● worm
● Trojan horse
● social engineering
Explanation: A worm is a computer program that is self replicated with the
intention of attacking a system and trying to exploit a specific vulnerability in the
target. Both virus and Trojan horse rely on a delivery mechanism to carry them
from one host to another. Social engineering is not a type of malicious code
attack.
10. Some routers and switches in a wiring closet malfunctioned after an air
conditioning unit failed. What type of threat does this situation describe?
● configuration
● environmental
● electrical
● maintenance
● security center
● port scanner
● antimalware
● antivirus
● firewall
13. Which command will block login attempts on RouterA for a period of 30
seconds if there are 2 failed login attempts within 10 seconds?
15. What type of attack may involve the use of tools such as nslookup and
fping?
● access attack
● reconnaissance attack
● denial of service attack
● worm attack