Intro to networks final exam study guide
When applied to a router, which command would help mitigate brute-force password attacks
against the router? - ANS-Login block-for 60 attempts 5 within 60
Which example of malicious, code would be classified as a Trojan horse? - ANS-Malware that
written to look like a video game.
A wireless host needs to request an IP address what protocol would be used to process the
request? - ANS-DHCP
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair
what happens to the IP address configuration? - ANS-The address is returned to the pool for
reuse when the lease expires
Which domain name would be an example of a top-level domain? - ANS-.com
A technician can ping the IP address of a remote company but cannot successfully ping three
URL address of the same web server. Which software utility can the technician use to diagnose
the problem? - ANS-nslookup
What is a key characteristic of the peer-to-peer networking model? - ANS-Resource sharing
without A dedicated server
Which two tasks functions of the presentation layer?
2 answers - ANS--Compression
-encryption
What are two ways that TCP uses the sequence numbers in a segment? - ANS--To identify
missing segments at the destination
-to reassemble the segments at the remote location
A user opened free browsers on the same PC to access WWW. Cisco.com to search for
certification course information. The Cisco web server sends a datagram as a reply to the
request from one of the web browsers. which information is used by the tcp/ip protocol stack in
the PC to identify which of the three web browsers should receive the reply? - ANS-The
destination port number.
Which scenario describes a function provided by the transport layer? - ANS-A student has two
web browser windows open in order to access two websites. The transport layer ensures the
correct web page is delivered to the correct browser window.
When applied to a router, which command would help mitigate brute-force password attacks
against the router? - ANS-Login block-for 60 attempts 5 within 60
Which example of malicious, code would be classified as a Trojan horse? - ANS-Malware that
written to look like a video game.
A wireless host needs to request an IP address what protocol would be used to process the
request? - ANS-DHCP
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair
what happens to the IP address configuration? - ANS-The address is returned to the pool for
reuse when the lease expires
Which domain name would be an example of a top-level domain? - ANS-.com
A technician can ping the IP address of a remote company but cannot successfully ping three
URL address of the same web server. Which software utility can the technician use to diagnose
the problem? - ANS-nslookup
What is a key characteristic of the peer-to-peer networking model? - ANS-Resource sharing
without A dedicated server
Which two tasks functions of the presentation layer?
2 answers - ANS--Compression
-encryption
What are two ways that TCP uses the sequence numbers in a segment? - ANS--To identify
missing segments at the destination
-to reassemble the segments at the remote location
A user opened free browsers on the same PC to access WWW. Cisco.com to search for
certification course information. The Cisco web server sends a datagram as a reply to the
request from one of the web browsers. which information is used by the tcp/ip protocol stack in
the PC to identify which of the three web browsers should receive the reply? - ANS-The
destination port number.
Which scenario describes a function provided by the transport layer? - ANS-A student has two
web browser windows open in order to access two websites. The transport layer ensures the
correct web page is delivered to the correct browser window.