Tampilkan postingan dengan label IP address. Tampilkan semua postingan
Tampilkan postingan dengan label IP address. Tampilkan semua postingan

Sabtu, 10 Februari 2018

quis chapter 10 CCNA

1. What is an advantage of SMB over FTP??
  Only with SMB can data transfers occur in both directions.
  Only SMB establishes two simultaneous connections with the client, making the data transfer faster.
  SMB is more reliable than FTP because SMB uses TCP and FTP uses UDP.
  SMB clients can establish a long-term connection to the server. *
Refer to curriculum topic: 10.2.3
SMB and FTP are client/server protocols that are used for file transfer. SMB allows the connecting device to access resources as if they were on the local client device. SMB and FTP use the TCP protocol for connection establishment and they can transfer data in both directions. FTP requires two connections between the client and the server, one for commands and replies, the other for the actual file transfer.


2. What is true about a client-server network?
  The network includes a dedicated server. *
  Each device can function as a server and a client.
  Workstations access network resources using SAMBA or Gnutella.
  Each peer accesses an index server to get the location of a resource stored on another peer in what is considered a hybrid network system.
Refer to curriculum topic: 10.1.2
In a client-server network, a dedicated server responds to service requests from clients. The roles of client and server are not shared on each host in the network. In a peer-to-peer network, computers are connected via a network and can share resources. Each host can function as a server or a client based on the nature of the transaction and what resources are used or requested. A hybrid network is one in which a server supplies index information that enables a peer to locate resources on other peers. In this case the peers can still have the role of client or server depending on the nature of the network transaction.


3. True or False?

In FTP transactions, an FTP client uses the pull method to download files from an FTP server.
  true *
  false 
Refer to curriculum topic: 10.2.3
The File Transfer Protocol (FTP) is a commonly used application layer protocol. FTP allows for data transfers between a client and a server. During data transfers, the FTP client downloads (pulls) data from the server. The FTP client can also upload (push) data to the server.

 
4. Why is DHCP preferred for use on large networks?
  Large networks send more requests for domain to IP address resolution than do smaller networks.
  DHCP uses a reliable transport layer protocol. 
  It prevents sharing of files that are copyrighted. 
Correct!
  It is a more efficient way to manage IP addresses than static address assignment.
  Hosts on large networks require more IP addressing configuration settings than hosts on small networks.
Refer to curriculum topic: 10.2.2
Static IP address assignment requires personnel to configure each network host  with addresses manually. Large networks can change frequently and have many more hosts to configure than do small networks. DHCP provides a much more efficient means of configuring and managing IP addresses on large networks than does static address assignment.

 
5. What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?
  Ethernet 
  Gnutella * 
  POP 
  SMTP 
Refer to curriculum topic: 10.1.2
The Gnutella protocol is used when one user shares an entire file with another user. A person would load a Gnutella-based application such as gtk-gnutella or WireShare and use that application to locate and access resources shared by others.

 
6. A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
  DNS server *
  source port number 
  HTTP server 
  default gateway * 
  source MAC address 
Refer to curriculum topic: 10.2.2
In order to use a URL such as http://www.cisco.com, the DNS protocol must be used in order to translate the URL into an IP address. Furthermore, the host device requesting this web page must have a default gateway configured in order to communicate with remote networks.

 
7. What type of information is contained in a DNS MX record?
  the FQDN of the alias used to identify a service 
  the IP address for an FQDN entry 
  the domain name mapped to mail exchange servers *
  the IP address of an authoritative name server 
Refer to curriculum topic: 10.2.2
MX, or mail exchange messages, are used to map a domain name to several mail exchange servers that all belong to the same domain.


8. Which TCP/IP model layer is closest to the end user?
  application *
  internet 
  network access 
  transport 
Refer to curriculum topic: 10.1.1
End users use applications to interact with and use the network. The application layer of the TCP/IP model is closest to the end user. Application layer protocols are used to communicate and exchange messages with other network devices and applications. The layers of the TCP/IP model are from top to bottom (memory aid - ATIN): application, transport, internet, network access

 
9. Which command is used to manually query a DNS server to resolve a specific host name?
  nslookup *
  ipconfig /displaydns
  tracert
  ping
Refer to curriculum topic: 10.2.2
The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The ipconfig /displaydns command only displays previously resolved DNS entries. The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The ping command was created to test reachability on a network and can resolve a hostname by automatically querying a DNS server.

 
10. A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?
  peer-to-peer (P2P) * 
  client-based 
  master-slave 
  point-to-point 
Refer to curriculum topic: 10.1.2
Peer-to-peer (P2P) networks have two or more network devices that can share resources such as printers or files without having a dedicated server.


11. Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)
  physical layer 
  session layer *
  transport layer 
  application layer * 
  presentation layer *
  data link layer 
Refer to curriculum topic: 10.1.1
The three upper layers of the OSI model, the session, presentation, and application layers, provide application services similar to those provided by the TCP/IP model application layer. Lower layers of the OSI model are more concerned with data flow.

 
12. On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?
  a home router *
  an ISP DHCP server 
  a DNS server 
Refer to curriculum topic: 10.2.2
On a home network, a home router usually serves as the DHCP server. The home router is responsible for dynamically assigning IP addresses to clients on the home network. ISPs also use DHCP, but it usually assigns an IP address to the Internet interface of the home router, not the clients on the home network. In businesses, it is common to have a file or other dedicated server provide DHCP services to the network. Finally, a DNS server is responsible for finding the IP address for a URL, not for providing dynamic addressing to network clients.

 
13. Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
  TCP 
  HTTP * 
  MPEG *
  GIF *
  IP 
  UDP 
Refer to curriculum topic: 10.1.1
HTTP, MPEG, and GIF operate at the application layer of the TCP/IP model. TCP and UDP operate at the transport layer. IP operates at the internet layer.

 
14. Which protocol can be used to transfer messages from an email server to an email client?
  SMTP 
  POP3 *
  SNMP 
  HTTP 
Refer to curriculum topic: 10.2.1
SMTP is used to send mail from the client to the server but POP3 is used to download mail from the server to the client. HTTP and SNMP are protocols that are unrelated to email.

Kamis, 08 Februari 2018

quis chapter 8 CCNA

1. Three devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.)

Device 1: IP address 192.168.10.77/28 on subnet 1

Device 2: IP address192.168.10.17/30 on subnet 2

Device 3: IP address 192.168.10.35/29 on subnet 3

Subnet 1 network number 
192.168.10.64
Subnet 1 broadcast address 
192.168.10.79
Subnet 2 network number 
192.168.10.16
Subnet 2 broadcast address 
192.168.10.19
Subnet 3 network number 
192.168.10.32

Refer to curriculum topic: 8.1.5
To calculate any of these addresses, write the device IP address in binary. Draw a line showing where the subnet mask 1s end. For example, with Device 1, the final octet (77) is 01001101. The line would be drawn between the 0100 and the 1101 because the subnet mask is /28. Change all the bits to the right of the line to 0s to determine the network number (01000000 or 64). Change all the bits to the right of the line to 1s to determine the broadcast address (01001111 or 79).

 
2. Three methods allow IPv6 and IPv4 to co-exist. Match each method with its description. (Not all options are used.)
The IPv4 packets and IPv6 packets coexist in the same network. 
dual-satck
The IPv6 packet is transported inside an IPv4 packet. 
tunneling
IPv6 packets are converted into IPv4 packets, and vice versa. 
translation
Refer to curriculum topic: 7.2.1
The term for the method that allows for the coexistence of the two types of packets on a single network is dual-stack. Tunneling allows for the IPv6 packet to be transported inside IPv4 packets. An IP packet can also be converted from version 6 to version 4 and vice versa. DHCP is a protocol that is used for allocating  network parameters to hosts on an IP network.


3. An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?
  subnetwork 192.168.1.64
subnet mask 255.255.255.192
Refer to curriculum topic: 8.1.4
The number of bits that are borrowed would be two, thus giving a total of 4 useable subnets:
192.168.1.0
192.168.1.64
192.168.1.128
192.168.1.192
Because 2 bits are borrowed, the new subnet mask would be /26 or 255.255.255.192

4. Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)

  10.18.10.208/28 *
  10.18.10.224/28  *

Refer to curriculum topic: 8.1.5
Addresses 10.18.10.0 through 10.18.10.63 are taken for the leftmost network. Addresses 192 through 199 are used by the center network. Because 4 host bits are needed to accommodate 10 hosts, a /28 mask is needed. 10.18.10.200/28 is not a valid network number. Two subnets that can be used are 10.18.10.208/28 and 10.18.10.224/28.

5. A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?
  255.255.255.224 
Refer to curriculum topic: 8.1.4
For each new subnet to contain between 20 and 30 hosts, 5 host bits are required. When 5 host bits are being used, 27 network bits are remaining. A /27 prefix provides the subnet mask of 255.255.255.224.


6. A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?
  4 
Refer to curriculum topic: 8.1.2
The normal mask for 192.168.10.0 is /24. A /26 mask indicates 2 bits have been borrowed for subnetting. With 2 bits, four subnets of equal size could be created.?


7. Fill in the blank.
The last host address on the 10.15.25.0/24 network is  .........................
Answer :
10.15.25.254
Refer to curriculum topic: 7.1.2
The host portion of the last host address will contain all 1 bits with a 0 bit for the lowest order or rightmost bit. This address is always one less than the broadcast address. The range of addresses for the network 10.15.25.0/24 is 10.15.25.0 (network address) through 10.15.25.255 (broadcast address). So the last host address for this network is 10.15.25.254.

8. The network portion of the address 172.16.30.5/16 is  ..............................
Answer :
 172.16
Refer to curriculum topic: 7.1.2
A prefix of /16 means that 16 bits are used for the network part of the address. The network portion of the address is therefore 172.16.


9. What are two benefits of subnetting networks? (Choose two.)
  combining multiple smaller networks into larger networks 
  reducing the size of broadcast domains  *
grouping devices to improve management and security *
Refer to curriculum topic: 8.1.1
When a single network is subnetted into multiple networks the following occurs:
A new broadcast domain is created for every network that is created through subnetting.
The amount of network traffic that crosses the entire network decreases.
Devices can be grouped together to improve network management and security.
More IP addresses are usable because each network will have a network address and broadcast address.


10. A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?
65536 * 
Refer to curriculum topic: 8.3.1
With a network prefix of 48, there will be 16 bits available for subnetting because the interface ID starts at bit 64. Sixteen bits will yield 65536 subnets.


11. What does the IP address 192.168.1.15/29 represent?
broadcast address  *
Refer to curriculum topic: 8.1.2
A broadcast address is the last address of any given network. This address cannot be assigned to a host, and it is used to communicate with all hosts on that network.


12. What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?
2001:D12:AA04:B5::/64? 
Refer to curriculum topic: 8.3.1
The /64 represents the network and subnet IPv6 fields which are the first four groups of hexadecimal digits. The first address within that range is the subnetwork address of 2001: D12:AA04:B5::/64.?


13. How many host addresses are available on the 192.168.10.128/26 network?
62 *
Refer to curriculum topic: 8.1.2
A /26 prefix gives 6 host bits, which provides a total of 64 addresses, because 26 = 64. Subtracting the network and broadcast addresses leaves 62 usable host addresses.



14. A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.)
  geographic location *
  device type  *
Refer to curriculum topic: 8.1.1
The IP address design being used is by geographic location (for example, one campus is 10.1, another campus 10.2, another campus 10.3). The other design criterion is that the next octet number designates IP phones, or a specific device type, with numbers starting with 4, but which can include other numbers. Other devices that might get a designation inside this octet could be printers, PCs, and access points. 

Rabu, 07 Februari 2018

quis chapter 6 CCNA

1. When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?
  Flow Label *
Refer to curriculum topic: 6.1.4
The Flow Label in IPv6 header is a 20-bit field that provides a special service for real-time applications. This field can be used to inform routers and switches to maintain the same path for the packet flow so that packets will not be reordered.


2. Fill in the blank.
The acronym............ is used to define the process that allows multiple devices to share a single routable IP address.
Answer 1:
NAT
Refer to curriculum topic: 6.1.4
NAT or Network Address Translation is the process of modifying the IP packet header information on packets going outside the corporate network. Corporate networks typically use private addresses on the inside LAN and need a public address to be able to communicate through the WAN.


3. During the boot process, where will the router bootstrap program look for the IOS image by default?
  flash *
Refer to curriculum topic: 6.3.2
The IOS image is typically stored in flash memory. If the image is not in flash memory when the router boots, the router bootstrap program can look for it on a TFTP server.


4. What are two functions that are provided by the network layer? (Choose two.)
  carrying data between processes that are running on source and destination hosts
  providing end devices with a unique network identifier
  directing data packets to destination hosts on other networks
Refer to curriculum topic: 6.1.1
The network layer is primarily concerned with passing data from a source to a destination on another network. IP addresses supply unique identifiers for the source and destination. The network layer provides connectionless, best-effort delivery. Devices rely on higher layers to supply services to processes.


5. Which key combination allows a user to abort setup mode?
  Ctrl-C *
Refer to curriculum topic: 6.3.2
The setup mode can be interrupted at any time using the Ctrl-C key combination.


6. A router may have to fragment a packet when forwarding it from one medium to another medium that has a smaller ..............
Answer 1:
 MTU
Refer to curriculum topic: 6.1.3


 7. If there are two or more possible routes to the same destination, the.......... is used to determine which route is used in the routing table.
Answer 1:
 metric
Refer to curriculum topic: 6.2.2
If there are two or more possible routes to the same destination, the metric is used to decide which route appears in the routing table.


8. Within a production network, what is the purpose of configuring a switch with a default gateway address?
  The default gateway address is used to forward packets originating from the switch to remote networks. *
Refer to curriculum topic: 6.4.3
A default gateway address allows a switch to forward packets that originate on the switch to remote networks. A default gateway address on a switch does not provide Layer 3 routing for PCs that are connected on that switch. A switch can still be accessible from Telnet as long as the source of the Telnet connection is on the local network.


9. Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?
  Time-to-Live. *
Refer to curriculum topic: 6.1.3
When a router receives a packet, the router will decrement the Time-to-Live (TTL) field by one. When the field reaches zero, the receiving router will discard the packet and will send an ICMP Time Exceeded message to the sender.


10. Which IPv4 address can a host use to ping the loopback interface?
  127.0.0.1  *
Refer to curriculum topic: 6.2.1
A host can ping the loopback interface by sending a packet to a special IPv4 address within the network 127.0.0.0/8.


11. Which portion of the network layer address does a router use to forward packets?
  network portion *
Refer to curriculum topic: 6.2.2


12. Here is a link to the PT ActivityView in a new window.

Open the PT activity. Perform the tasks in the activity instructions and then answer the question.
Which interfaces in each router are active and operational?
  R1: G0/0 and S0/0/0
R2: G0/1 and S0/0/0 *
Refer to curriculum topic: 6.4.2
The command to use for this activity is show ip interface brief in each router. The active and operational interfaces are represented by the value "up" in the "Status" and "Protocol" columns. The interfaces in R1 with these characteristics are G0/0 and S0/0/0. In R2 they are G0/1 and S0/0/0.


13. How does the network layer use the MTU value?
  The MTU is passed to the network layer by the data link layer.
Refer to curriculum topic: 6.1.2
The data link layer indicates to the network layer the MTU for the medium that is being used. The network layer uses that information to determine how large the packet can be when it is forwarded. When packets are received on one medium and forwarded on a medium with a smaller MTU, the network layer device can fragment the packet to accommodate the smaller size.

14. Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?
  192.133.219.1  *
Refer to curriculum topic: 6.4.3


15. Refer to the exhibit. Fill in the blank.
A packet leaving PC-1 has to traverse........... hops to reach PC-4.?

Answer 1:
3
Refer to curriculum topic: 6.1.1
A hop is an intermediary Layer 3 device that a packet has to traverse to reach its destination. In this case, the number of hops a packet has to traverse from PC-1 to PC-4 is three, as there are three routers from source to destination.