Networking essentials (version 2) - networking essentials 2.0 final exam

Would love your thoughts, please comment.x

← Networking Essentials (Version 2) – Modules 17 – 20: Introduction to Cisco Networking Group Exam

← Networking Essentials (Version 2.0) Final Exam Answers Full

Last Updated on October 15, 2022 by InfraExam

Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 2021

    • ARP
    • POP3
    • TCP
    • DHCP
    • FTP
    • UDP

      Answers Explanation & Hints:

      FTP, DHCP, and POP3 are application layer protocols. TCP and UDP are transport layer protocols. ARP is a network layer protocol.

    • when a client sends a segment to a server
    • when an application can tolerate some loss of data during transmission
    • when segments must arrive in a very specific sequence to be processed successfully
    • when all the data must be fully received before any part of it is considered useful
    • provides automatic IP address assignments to hosts
    • sends error and operational information messages to hosts
    • maps IPv4 addresses to MAC addresses
    • resolves domain names to IP addresses
  1. Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 02
    • The switch will forward the frame only to port 2.
    • The switch will discard the frame.
    • The switch will forward the frame only to ports 1 and 3.
    • The switch will forward the frame to all ports except port 4.
    • The switch will forward the frame to all ports.

      Answers Explanation & Hints:

      The MAC address of PC3 is not present in the MAC table of the switch. Because the switch does not know where to send the frame that is addressed to PC3, it will forward the frame to all the switch ports, except for port 4, which is the incoming port.

    • implementing EtherChannel
    • implementing redundancy
    • implementing routing protocols
    • implementing wireless connectivity
    • the DHCP server
    • the DNS server
    • the FTP server
    • the HTTP server

      Explanation:

      If pings are successful to an IP address but not to a host name, then the problem may be that a DNS server cannot be accessed.

    • The gateway needs to be fixed.
    • The network cable is faulty.
    • The PC has an incorrect IP address for the DNS server.
    • The network switch is faulty.

      Explanation:

      The network card is working if the loopback address can be pinged. The LED on the network card being off points towards a faulty cable or a bad connection.

    • nslookup
    • ipconfig
    • tracert
    • netstat

      Answers Explanation & Hints:

      The nslookup command can be used to look up information about a particular DNS name in the DNS server. The information includes the IP address of the DNS server being used as well as the IP address associated with the specified DNS name. This command can help verify the DNS that is used and if the domain name to IP address resolution works.

    • Internet
    • Ethernet
    • Wi-Fi
    • WAN
    • increased security
    • anytime, anywhere connectivity
    • immunity to interference
    • speed
    • mobility
    • MAC address table
    • SSID
    • WEP
    • WPA

      Explanation:

      When a wireless AP or router is being set up, an SSID is configured to uniquely identify the WLAN that is managed by the device.

  2. Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 001

  3. Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 002

    • transport
    • physical
    • network
    • data link
    • session

      Answers Explanation & Hints:

      The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI application, presentation, and session layers are functionally equivalent to the application layer within the TCP/IP model.

    • 2001:db8::1111::200/80
    • 2001:db8::1111::200/64​
    • 2001:db8:0:1111::200/44
    • 2001:db8:0:1111::200/120​
    • NAT takes an internal source IP address and translates it to a global IP address.
    • NAT takes a source IP address and translates it to a default gateway address.
    • NAT takes a destination IP address and translates it to a global IP address.
    • NAT takes a local IP address and translates it to an internal source IP address.
    • unique local
    • global unicast
    • link-local
    • loopback

      Explanation:

      When IPv6 is enabled on any interface, that interface will automatically generate an IPv6 link-local address.

    • The IP address of the user is incorrectly configured.
    • The default gateway address is incorrect.
    • The address of the remote device is incorrect.
    • TCP/IP is not installed on the host device.
  4. Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 003

    Explanation:

    The shortcuts with their functions are as follows: – Tab – Completes the remainder of a partially typed command or keyword – Space bar – displays the next screen – ? – provides context-sensitive help – Up Arrow – Allows user to scroll backward through former commands – Ctrl-C – cancels any command currently being entered and returns directly to privileged EXEC mode

    – Ctrl-Shift-6 – Allows the user to interrupt an IOS process such as ping or traceroute

    • It identifies a network that is a static route.
    • It identifies a network that is learned through OSPF.
    • It identifies a network that is learned through EIGRP.
    • It identifies a network that is directly connected to the router.
    • show line
    • show ip interface
    • show interfaces
    • show arp
    • switch
    • hub
    • router
    • repeater

      Explanation:

      Switches are the central connection point for a LAN and they maintain a MAC address table. The MAC address table has a port number associated with a MAC address for each particular device. The switch inspects a frame to look at the destination MAC address. The switch then looks in its MAC address table and if that MAC address is found, the switch forwards the data to the port that is associated with that particular MAC address.

    • the first Ethernet port interface
    • the switch virtual interface
    • the console port interface
    • the AUX interface

      Answers Explanation & Hints:

      In a Layer 2 switch, there is a switch virtual interface (SVI) that provides a means for remotely managing the device.

    • ROM contains diagnostics executed on hardware modules.
    • Flash memory does not lose its contents during a reboot.
    • RAM permanently stores the configuration file used during the boot sequence.
    • ROM contains the most current and most complete version of the IOS.
    • Flash contains boot system commands to identify the location of the IOS.
    • NVRAM stores a backup copy of the IOS used during the boot sequence.
    • It restricts computer access to a wireless network.
    • It encrypts data that is transmitted on a wireless network.
    • It allows only authorized users to detect the network.
    • It is configured on the computer rather than on the router.

      Answers Explanation & Hints:

      MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network.

    • MAC address filtering
    • WEP
    • WPA2
    • EAP
    • It is responsible for determining the signal strength.
    • It tells a wireless device to which WLAN it belongs.
    • All wireless devices on the same WLAN must have the same SSID.
    • It provides strong wireless security.
    • It is used to encrypt data sent across the wireless network.
    • susceptible to EMI and RFI
    • commonly used for Internet connectivity by a cable TV provider
    • easiest type of networking cable to install
    • commonly used between buildings
    • uses light to transmit data
    • most commonly used networking cable
    • the data security and fault tolerance requirement
    • the environment in which the media is installed
    • the amount of data and the data transfer rate desired
    • the operating systems used on network devices in the network
    • the distance between hosts that the media will connect
    • the speed of the CPU and amount of memory in servers

      Explanation:

      Several criteria should be considered when selecting network media: The cost of the media and installation

      The environment in which the media is installed The amount of data and the data transfer rate desired

      The distance between hosts that the media will connect

    • easily terminated
    • greater distances per cable run
    • lower installation cost
    • limited susceptibility to EMI/RFI
    • greater bandwidth potential
    • durable connections

      Answers Explanation & Hints:

      Optical fiber cable transmits data over longer distances and at higher bandwidths than any other networking media. Unlike copper wires, fiber-optic cable can transmit signals with less attenuation and is completely immune to EMI and RFI.

  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 04
    • D, E, F, H, I, J
    • A, C, D
    • B, E, G, H
    • C, D, G, H, I, J
    • E, F, H, I, J
    • high level of security
    • scalability
    • ease of setup
    • centralized administration
    • wireless access point
    • network printer
    • server
    • switch
    • workstation
    • router

      Explanation:

      Intermediate devices in a network provide network connectivity to end devices and transfer user data packets during data communications.

    • Wi-Fi
    • Bluetooth
    • wired Ethernet
    • cellular communications
    • WiMax
    • touch-pad with digital stylus
    • printer
    • scanner
    • tablet
    • laptop

      Explanation:

      A shared peripheral device does not connect directly to a network. This device is attached to a host (such as a PC) and the host connects to the network to share the peripheral device.

    • DHCP server address
    • subnet mask
    • IP address
    • default gateway
    • DNS server
    • domain name

      Explanation:

      An IP address, a subnet mask, and a default gateway are required on a host that must communicate with another host in a remote network. DNS server information is needed if mapping a domain name to an associated IP address. DHCP server information is dynamically learned and is not a required configuration for remote network reachability.

    • Wi-Fi
    • Bluetooth
    • infrared
    • 3G/4G

      Answers Explanation & Hints:

      Bluetooth is a wireless technology for data exchange over a short distance. It is suitable for connecting devices with simple tasks, such as headsets, keyboards, mice, and printers. Wi-Fi is suitable for variety of applications with high speed wireless connectivity required or preferred. Infrared requires a direct line of sight between the transmitter and the receiver. 3G/4G are cellular network technologies to manage voice calls and data transmission between clients and service providers.

    • does not require management console software
    • has direct access to server hardware resources
    • best suited for enterprise environments
    • installs directly on hardware
    • The web server was turned off and was not able to service requests.
    • It is normal web surfing activity.
    • It is likely that someone attempted a DoS attack.
    • The link to the website does not have enough capacity and needs to be increased.
    • pretexting
    • worms
    • phishing
    • Trojan horses
    • vishing
    • viruses
    • sending junk email
    • man-in-the-middle
    • phishing
    • buffer overflow
    • denial of service
    • virus
    • worm
    • Trojan horse

      Explanation:

      Viruses are malicious programs that are spread by modifying other programs and files and can cause hard drives to crash and files to be lost.

    • multicast address
    • network address
    • host address
    • broadcast address

      Explanation:

      The /24 shows that the network address is 172.17.4.0. The broadcast address for this network would be 172.17.4.255. Useable host addresses for this network are 172.17.4.1 through 172.17.4.254.

    • 192.168.5.29
    • 172.17.254.4
    • 128.37.255.6
    • 198.168.6.18
    • 172.68.83.35
    • 10.234.2.1

      Explanation:

       The designated private IP addresses are within the three IP address ranges:

      • 10.0.0.0 – 10.255.255.255
      • 172.16.0.0 – 172.31.255.255
      • 192.168.0.0 – 192.168.255.255

    • port 20
    • port 23
    • port 22
    • UDP
    • TCP
    • HTTPS
    • HTML
    • DHCP
    • HTTP
    • DNS

      Answers Explanation & Hints:

      Hypertext Transfer Protocol (HTTP) and HTTP Secure (HTTPS) are two application layer protocols that manage the content requests from clients and the responses from the web server. HTML (Hypertext Mark-up Language) is the encoding language that describes the content and display features of a web page. DNS is for domain name to IP address resolution. DHCP manages and provides dynamic IP configurations to clients.

  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 004

    • It controls the flow of data via the use of Layer 2 addresses.
    • It provides segmentation at Layer 2.
    • A router connects multiple IP networks.
    • It determines the best path to send packets.
    • It builds a routing table based on ARP requests.
    • A LAN is under one administrative control.
    • A LAN is implemented in a corporation to connect all of its offices.
    • A LAN connects remote users to the main corporate office.
    • A LAN can contain up to 100 hosts.
    • The default gateway address is misconfigured on the PC.
    • The IPv4 address and subnet mask are misconfigured on the PC.
    • The switch is malfunctioning.
    • The DHCP server is disconnected.
  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 02
    • subnet mask
    • DNS address
    • host IP address
    • default gateway address
    • DHCPACK broadcast message
    • DHCPDISCOVER broadcast message
    • DHCPOFFER unicast message
    • DHCPREQUEST unicast message
    • FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server
    • both MAC and IPv4 addresses of the DHCP server
    • MAC address of the DHCP server and 255.255.255.255
    • FF-FF-FF-FF-FF-FF and 255.255.255.255

      Answers Explanation & Hints:

      When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.

    • The switch can communicate with other hosts on the 172.16.100.0 network.
    • The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.
    • The switch will have a management interface with the address 172.16.100.1.
    • The switch can be remotely managed from a host on another network.

      Answers Explanation & Hints:

      A default gateway address is typically configured on all devices to allow them to communicate beyond just their local network.In a switch this is achieved using the command ip default-gateway <ip address>.

    • Give the router a host name and domain name.
    • Create a banner that will be displayed to users when they connect.
    • Enable SSH on the physical interfaces where the incoming connection requests will be received.
    • Generate a set of secret keys to be used for encryption and decryption.
    • Set up an authentication server to handle incoming connection requests.

      Explanation:

      There are four steps to configure SSH on a Cisco router. First, set the host name and domain name. Second, generate a set of RSA keys to be used for encrypting and decrypting the traffic. Third, create the user IDs and passwords of the users who will be connecting. Lastly, enable SSH on the vty lines on the router. SSH does not need to be set up on any physical interfaces, nor does an external authentication server need to be used. While it is a good idea to configure a banner to display legal information for connecting users, it is not required to enable SSH.​

  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 005

    Answers Explanation & Hints:

    The enable command is entered in R1> mode. The login command is entered in R1(config-line)# mode. The copy running-config startup-config command is entered in R1# mode. The ip address 192.168.4.4 255.255.255.0 command is entered in R1(config-if)# mode. The service password-encryption command is entered in global configuration mode.

    • MAC
    • IEEE
    • IANA
    • OSI
    • IETF
    • TCP/IP

      Answers Explanation & Hints:

      TCP/IP is a protocol stack that contains a lot of other protocols such as HTTP, FTP, and DNS. The TCP/IP protocol stack is required to be used when communicating on the Internet. A MAC address is an address that is burned into an Ethernet network card. OSI is the 7 layer model that is used to explain how networking works.

    • presentation
    • transport
    • application
    • network
    • session
    • data link

      Answers Explanation & Hints:

      The TCP/IP model consists of four layers: application, transport, internet, and network access. The OSI model consists of seven layers: application, presentation, session, transport, network, data link, and physical. The top three layers of the OSI model: application, presentation, and session map to the application layer of the TCP/IP model.

    • DNS server
    • default gateway
    • source port number
    • source MAC address
    • HTTP server
    • Stations can transmit at any time.
    • They use CSMA/CA technology.
    • They are collision-free networks.
    • They use CSMA/CD technology.
    • Collisions can exist in the networks.
    • limited broadcast
    • multicast
    • directed broadcast
    • unicast

      Answers Explanation & Hints:

      A directed broadcast is a message sent to all hosts on a specific network. It is useful for sending a broadcast to all hosts on a nonlocal network. A multicast message is a message sent to a selected group of hosts that are part of a subscribing multicast group. A limited broadcast is used for a communication that is limited to the hosts on the local network. A unicast message is a message sent from one host to another.

    • application of policies
    • backbone connectivity
    • routing
    • network access
    • high-speed connectivity

      Answers Explanation & Hints:

      The main purpose of devices in the access layer is to supply network access to end users. Distribution layer devices provide services such as routing and policy functions. The core layer provides high-speed backbone connectivity.

  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 05
    Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 006

    Answers Explanation & Hints:

    Packets with a destination of 172.17.6.15 are forwarded through Fa0/0. Packets with a destination of 172.17.10.5 are forwarded through Fa1/1. Packets with a destination of 172.17.12.10 are forwarded through Fa1/0. Packets with a destination of 172.17.14.8 are forwarded through Fa0/1. Because network 172.17.8.0 has no entry in the routing table, it will take the gateway of last resort, which means that packets with a destination of 172.17.8.20 are forwarded through Serial0/0/0. Because a gateway of last resort exists, no packets will be dropped.

    • destination MAC address
    • source IP address
    • destination IP address
    • source MAC address

      Explanation:

      When a router receives a packet, it examines the destination address of the packet and uses the routing table to search for the best path to that network.

    • The host devices will select an unused IP address on the LAN for performing NAT through the wireless router.
    • The default gateway IP address of the LAN device is used as the global address for NAT translations through the wireless router.
    • The network administrator will choose an available IP address from the LAN and configure the global addressing of the wireless router.
    • The wireless router will act as a DHCP client in order to receive global addressing from the ISP.
    • Each LAN must select a single client device from the wireless router settings that can communicate to the internet via NAT.
    • Only a small group of high priority client devices can be chosen by the wireless router to communicate to the internet using NAT.
    • Each device must wait to receive a token from the wireless router in order to communicate to the internet via NAT.
    • All devices must share the single public IPv4 address assigned to the wireless router in order to communicate to the internet via NAT.
  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 06
    • The SSID is broadcast.
    • MAC address filtering is enabled.
    • WEP encryption is enabled.
    • The wireless channel is automatically selected.
    • A well-known administrator password is set.

      Explanation:

      Default settings on wireless routers often include broadcasting the SSID and using a well-known administrative password. Both of these pose a security risk to wireless networks. WEP encryption and MAC address filtering are not set by default. The automatic selection of the wireless channel poses no security risks.

    • passively monitors network traffic and logs intrusion attacks for security analysis
    • passively monitors network traffic and automatically blocks intrusion attacks
    • aggregates and correlates threat events, contextual information, and network device performance data
    • allows or blocks traffic based on IP address, port number, or application
    • when the Layer 2 switch is the default gateway of user traffic
    • when the Layer 2 switch is using a routed port
    • when the Layer 2 switch needs to forward user traffic to another device
    • when the Layer 2 switch needs to be remotely managed

      Explanation:

      Layer 2 switches can be configured with an IP address so that they can be remotely managed by an administrator. Layer 3 switches can use an IP address on routed ports. Layer 2 switches do not need a configured IP address to forward user traffic or act as a default gateway.

    • when the full IOS cannot be found
    • during a normal boot process
    • when the running configuration directs the router to do this
    • during a file transfer operation
    • divide and conquer
    • bottom-up
    • top-down
    • substitution
    • user EXEC mode
    • privileged EXEC mode
    • setup mode
    • global configuration mode

      Explanation:

      If a Cisco IOS device has a valid IOS and a valid configuration file, it will boot into user EXEC mode. A password will be required to enter privileged EXEC mode.

    • The server checks with another DNS server to see if it has an entry.
    • The server drops the request.
    • The server assigns a temporary IP address to the name and sends this IP address to the client.
    • The server returns a “page not found” response to the client.
    • The source port number is 110.
    • The source port number is dynamically generated.
    • The source port number is 25.
    • The source port number is 143.
    • to facilitate the basic operation of the hardware components of a device
    • to contain the configuration commands that the router IOS is currently using
    • to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS
    • to contain the commands that are used to initially configure a router on startup

      Explanation:

      The startup configuration file is stored in NVRAM and contains the commands needed to initially configure a router. It also creates the running configuration file that is stored in in RAM.

    • Tracert shows each hop, while ping shows a destination reply only.
    • Tracert uses IP addresses; ping does not.
    • Both ping and tracert can show results in a graphical display.
    • Ping shows whether the transmission is successful; tracert does not.

      Answers Explanation & Hints:

      The ping utility tests end-to-end connectivity between the two hosts. However, if the message does not reach the destination, there is no way to determine where the problem is located. On the other hand, the traceroute utility ( tracert in Windows) traces the route a message takes from its source to the destination. Traceroute displays each hop along the way and the time it takes for the message to get to that network and back.

    • fewer security requirements
    • less power consumption
    • improved disaster recovery
    • less equipment
    • less device monitoring
    • less employee technical training
    • fewer security requirements
    • less power consumption
    • improved disaster recovery
    • less equipment
    • less device monitoring
    • less employee technical training
    • Cloud computing utilizes data center technology whereas virtualization is not used in data centers.
    • Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized
    • Internet connections.
    • Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.
    • Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology.

      Explanation:

      Cloud computing separates the application from the hardware. Virtualization separates the OS from the underlying hardware. Virtualization is a typical component within cloud computing. Virtualization is also widely used in data centers. Although the implementation of virtualization facilitates an easy server fault tolerance setup, it is not a fault tolerance technology by design. The Internet connection from a data center or service provider needs redundant physical WAN connections to ISPs.​​

    • to ensure the fastest possible download speed
    • because transmission errors can be tolerated easily
    • because HTTP requires reliable delivery
    • because HTTP is a best-effort protocol

      Answers Explanation & Hints:

      When a host requests a web page, transmission reliability and completeness must be guaranteed. Therefore, HTTP uses TCP as its transport layer protocol.

    • ISP DHCP server
    • PC-based DHCP client
    • wireless router
    • PC-based DHCP server
    • ISP router
    • A gateway address is not required for hosts on one subnet to communicate with hosts on another subnet.
    • Hosts are permanently assigned an address by the DHCP server so that they are easier to manage
    • Changing the subnetting scheme does not require manually reassigning individual host addresses.
    • Devices on the Internet can easily locate the hosts and send data to them.
    • If possible, enable the network device to use SSH instead of Telnet.
    • If possible, configure the business firewall to filter port 23.
    • If possible, encrypt the Telnet password on the classroom computer.
    • If possible, use a VPN tunnel from the classroom computer to the network device.
    • Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
    • End users have the freedom to use personal tools to access information and communicate across a business network.
    • Home networking uses existing electrical wiring to connect devices to the network wherever there is an electrical outlet, saving the cost of installing data cables.
    • Technology is integrated into every-day appliances allowing them to interconnect with other devices, making them more ‘smart’ or automated.
    • RJ-11
    • fiber-optic
    • coaxial
    • twisted-pair
    • DHCP allows users to refer to locations by a name rather than an IP address.
    • Hosts always have the same IP address and are therefore always reachable.
    • Hosts can connect to the network and get an IP address without manual configuration.
    • Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has static assignments.
    • A default gateway is improperly configured on the AP.
    • A bad cable exists between the client and the WLC.
    • The workstation is out of range.
    • The AP does not have power.
    • The wireless client is not configured for DHCP.
    • Low-level CPU initialization begins.
    • POST is initiated.
    • The default IOS image is loaded.
    • The boot loader is loaded.
    • Users access shared files from a file server.
    • A user visits a webpage on the company web site.
    • A user has shared a printer attached to the workstation.
    • Users print documents from a network printer that has a built-in NIC.

      Explanation:

      In a peer-to-peer network there is no centralized or dedicated server. A user computer can be a client to request service from another user computer and a server to share a network resource (such as a printer) to other users.

    • Bandwidth represents the data transfer rate in a local network and throughput represents the data transfer rate over the Internet.
    • Bandwidth is the capacity of data transfer in a network and throughput is the actual data transfer rate.
    • Bandwidth measures data transfer of web applications and throughput measures data transfer of video applications.
    • Bandwidth is measured with Mb/s and throughput is measured in Kbps.
    • The network engineer will create a new pool of IP addresses and provide a new network subnet and router configuration for the conference.
    • The network engineer will manually release each lease created by the conference attendees yesterday and statically assign the incoming devices at the conference.
    • The network engineer will disconnect all devices using an IP address from the DHCP server in preparation for the conference.
    • The network engineer will verify that the DHCP leasing time is set for a couple of hours.
    • Source port numbers and destination port numbers are not necessary when UDP is the transport layer protocol being used for the communication.
    • Destination port numbers are assigned automatically and cannot be changed.
    • If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.
    • Source port and destination port numbers are randomly generated.

      Answers Explanation & Hints:

      Both UDP and TCP use port numbers to provide a unique identifier for each conversation. Source port numbers are randomly generated and are used to track different conversations. Destination port numbers identify specific services by using either a default port number for the service or a port number that is assigned manually by a system administrator.

    • application
    • transport
    • Internet
    • network access
    • Ethernet patch cable
    • telephone cable
    • console cable
    • modem cable

      Explanation:

      A straight-through Ethernet cable, or patch cable, is commonly used to connect to a wireless router for initial configuration.

    • MAC address filtering
    • encryption
    • authentication
    • traffic filtering

      Explanation:

      Encryption is used to secure plaintext data that would be viewable traveling over a wireless network.

  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 007

    • save it until a usable path is installed
    • send it back to the source host
    • drop it
    • broadcast it to directly attached networks
  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 07
    • The timer on R1 will expire and R1 will resend the segment to R2.​
    • R1 will request that PC1 resend the segment.
    • The web server will not acknowledge this segment. The PC1 timer will expire and PC1 will resend the segment.​
    • R1 forwarded the data to R2 but R2 did not receive it. R2 will send a request to R1 to resend the segment.
    • unshielded twisted pair
    • fiber optic
    • shielded twisted pair
    • coax
    • addresses from different subnets for redundancy
    • random static addresses to improve security
    • predictable static IP addresses for easier identification
    • dynamic addresses to reduce the probability of duplicate addresses

      Explanation:

      When monitoring servers, a network administrator needs to be able to quickly identify them. Using a predictable static addressing scheme for these devices makes them easier to identify. Server security, redundancy, and duplication of addresses are not features of an IP addressing scheme.

    • binary
    • readable
    • text
    • inferred
  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 008

  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 009

    • (config)# enable password secret
    • (config)# enable secret Encrypted_Password
    • (config-line)# password secret
    • (config)# enable secret Secret_Password
    • (config)# service password-encryption

      Answers Explanation & Hints:

      To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file.

    • ROM
    • NVRAM
    • RAM
    • flash

      Answers Explanation & Hints:

  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 010

    • They define how messages are exchanged between the source and the destination.
    • Network protocols define the type of hardware that is used and how it is mounted in racks.
    • They all function in the network access layer of TCP/IP.
    • They are only required for exchange of messages between devices on remote networks.

      Answers Explanation & Hints:

      Network protocols are implemented in hardware, or software, or both. They interact with each other within different layers of a protocol stack. Protocols have nothing to do with the installation of the network equipment. Network protocols are required to exchange information between source and destination devices in both local and remote networks.

  • Networking essentials (version 2) - networking essentials 2.0 final exam
    Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers 08
    • 192.168.10.1 port 53
    • 192.168.20.3 port 80
    • 192.168.20.3 port 53
    • 192.168.20.2 port 80
    • 192.168.20.2 port 53
    • All devices connected to a physical network need to belong to the same IPv4 logical network.
    • A physical network can connect multiple devices of different IPv4 logical networks.
    • End devices on different IPv4 logical networks can communicate with each other if they all connect to the same switch.
    • A local physical network supports one IPv4 logical network.
    • DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK​
    • DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK​
    • DHCPOFFER, DHCPDISCOVER, DHCPREQUEST, DHCPACK​
    • DHCPREQUEST, DHCPOFFER, DHCPDISCOVER, DHCPACK​
    • Empty the browser cache.
    • Defragment the hard disk.
    • Delete unused software.
    • Use antivirus software.
    • Keep software up to date.