Exam Questions &
Answers
Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)
-video
-web
-file transfer
-voice
-peer to peer - ANSWERS-video
-voice
Which wireless technology has low-power and data rate requirements making it popular in
home automation applications?
-ZigBee
-LoRaWAN
-5G
-Wi-Fi - ANSWERSZigBee
Which layer of the TCP/IP model provides a route to forward messages through an
internetwork?
-application
,-network access
-internet
-transport - ANSWERSinternet
Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide
services?
-DNS
-file
-web - ANSWERSDNS
What are proprietary protocols?
-protocols developed by private organizations to operate on any vendor hardware
-protocols that can be freely used by any organization or vendor
-protocols developed by organizations who have control over their definition and operation
-a collection of protocols known as the TCP/IP protocol suite - ANSWERSprotocols developed by
organizations who have control over their definition and operation
What service is provided by DNS?
-Resolves domain names, such as cisco.com, into IP addresses.
-A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia
files on the web.
-Allows for data transfers between a client and a file server.
,-Uses encryption to secure the exchange of text, graphic images, sound, and video on the web. -
ANSWERSResolves domain names, such as cisco.com, into IP addresses.
A client packet is received by a server. The packet has a destination port number of 110. What
service is the client requesting?
-DNS
-DHCP
-SMTP
-POP3 - ANSWERSPOP3
What command can be used on a Windows PC to see the IP configuration of that computer?
-show ip interface brief
-ping
-show interfaces
-ipconfig - ANSWERSipconfig
A wired laser printer is attached to a home computer. That printer has been shared so that
other computers on the home network can also use the printer. What networking model is in
use?
-client-based
-master-slave
-point-to-point
-peer-to-peer (P2P) - ANSWERSpeer-to-peer (P2P)
, What characteristic describes a virus?
-a network device that filters access and traffic coming into a network
-the use of stolen credentials to access private data
-an attack that slows or crashes a device or network service
-malicious software or code running on an end device - ANSWERSmalicious software or code
running on an end device
Three bank employees are using the corporate network. The first employee uses a web browser
to view a company web page in order to read some announcements. The second employee
accesses the corporate database to perform some financial transactions. The third employee
participates in an important live audio conference with other corporate managers in branch
offices. If QoS is implemented on this network, what will be the priorities from highest to lowest
of the different data types?
-financial transactions, web page, audio conference
-audio conference, financial transactions, web page
-financial transactions, audio conference, web page
-audio conference, web page, financial transactions - ANSWERSaudio conference, financial
transactions, web page
Match the description to the IPv6 addressing component. (Not all options are used.) -
ANSWERShttps://i.imgur.com/v9mMmGh.png
Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP
model would be used?
https://i.imgur.com/JRckAas.png
-only application and Internet layers