Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Answers Full 100% 2023 2024

   Networking Essentials 2.0   
Networking Essentials 2.0 - Final Exam - Skills PTSA
Packet Tracer Skills PTSA Lab NA
Practice Final Exam Answers Online Test
Final Exam Answers Online Test
  1. Which factor does not influence throughput?

    • the amount of data that is being sent and received on the connection
    • the type of data that is being transmitted
    • the operating system that is used by end devices
    • the latency that is created by the number of network devices encountered between source and destination

      Answers Explanation & Hints:

      Throughput is the amount of data that has successfully moved from one place to another in a given time period. Several factors could influence throughput, including the amount and type of data being transmitted and latency.

  2. Which two devices are considered end devices? (Choose two.)

    • laptop
    • router
    • switch
    • printer
    • hub

      Answers Explanation & Hints:

      A device that forms the interface between users and the underlying communication network is known as an end device. End devices are either the source or destination of a message.

  3. What is a characteristic of a peer-to-peer application?

    • Each device using the application provides a user interface and runs a background service.
    • Both devices initiate a three-way handshake to determine who is initiating the communication.
    • Each device can act both as a client and a server, but not simultaneously.
    • The resources required for the application are centralized.

      Answers Explanation & Hints:

      Peer-to-peer networks exist directly between client devices, with no centralized resources or authentication. Hybrid peer-to-peer systems also exist that decentralize resource sharing but can use centralized indexes to point to the resource locations.

  4. A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices?

    • hub
    • wireless router
    • switch
    • patch panel

      Answers Explanation & Hints:

      A wireless router connects multiple wireless devices to the network. It will then aggregate the internet access requests from home devices to the internet.

  5. When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?

    • physical topology diagram
    • DHCP server
    • DNS server
    • logical topology diagram

      Answers Explanation & Hints:

      A logical topology usually contains relevant network configuration information, such as the following:Device names
      Device IP addressing
      Network designations
      Configuration information

  6. A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?

    • Bluetooth
    • NFC
    • Wi-Fi
    • 3G

      Answers Explanation & Hints:

      NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other.

  7. Which two types of interference may affect the data throughput on UTP cables? (Choose two.)

    • EMI
    • noise
    • moisture
    • crosstalk
    • temperature

      Answers Explanation & Hints:

      Unshielded twisted-pair (UTP) cabling is sensitive to the interference introduced by electromagnetic interference (EMI) and crosstalk.

  8. What are two wiring schemes defined by the TIA/EIA organization for Ethernet installation in homes and businesses? (Choose two.)

    • T568A
    • STP
    • T568B
    • UTP
    • RJ-45

      Answers Explanation & Hints:

      The TIA/EIA organization defines the wiring schemes T568A and T568B for typical Ethernet installations. Each wiring scheme defines a specific order of wire connections on the end of the cable.

  9. What are two common media used in networks? (Choose two.)

    • copper
    • water
    • nylon
    • fiber
    • wood

      Answers Explanation & Hints:

      Common media used in networks include copper, glass or plastic optical fiber, and wireless.

  10. What is an advantage of using standards to develop and implement protocols?

    • A particular protocol can only be implemented by one manufacturer.
    • Products from different manufacturers can interoperate successfully.
    • Different manufacturers are free to apply different requirements when implementing a protocol.
    • Standards provide flexibility for manufacturers to create devices that comply with unique requirements.

      Answers Explanation & Hints:

      Standards-based protocols enable products from different manufacturers to interoperate successfully. Standards-based protocols enable many manufacturers to implement that protocol. If different manufacturers implement different requirements within the same protocol, then their products will not be interoperable.

  11. Which two criteria are used to help select a network medium for a network? (Choose two.)

    • the types of data that need to be prioritized
    • the cost of the end devices that are used in the network
    • the distance the selected medium can successfully carry a signal
    • the number of intermediate devices that are installed in the network
    • the environment where the selected medium is to be installed

      Answers Explanation & Hints:

      Criteria for choosing a network medium include the following:The distance the selected medium can successfully carry a signal in the environment in which the selected medium is to be installed
      The amount of data and the speed at which the data must be transmitted
      The cost of the medium and its installation

  12. At which layer of the OSI model would a logical address be added during encapsulation?

    • physical layer
    • data link layer
    • network layer
    • transport layer

      Answers Explanation & Hints:

      Logical addresses, also known as IP addresses, are added at the network layer. Physical addresses are edded at the data link layer. Port addresses are added at the transport layer. No addresses are added at the physical layer.

  13. What are two benefits of using a layered network model? (Choose two.)

    • It assists in protocol design.
    • It speeds up packet delivery.
    • It prevents designers from creating their own model.
    • It prevents technology in one layer from affecting other layers.
    • It ensures a device at one layer can function at the next higher layer.

      Answers Explanation & Hints:

      Some vendors have developed their own reference models and protocols. Today, if a device is to communicate on the Internet, the device must use the TCP/IP model. The benefits of using a layered model are as follows:assists in protocol design
      fosters competition between vendors
      prevents a technology that functions at one layer from affecting any other layer
      provides a common language for describing network functionality
      helps in visualizing the interaction between each layer and protocols between each layer

  14. Which type of address does a switch use to build the MAC address table?

    • destination IP address
    • source IP address
    • destination MAC address
    • source MAC address

      Answers Explanation & Hints:

      When a switch receives a frame with a source MAC address that is not in the MAC address table, the switch will add that MAC address to the table and map that address to a specific port. Switches do not use IP addressing in the MAC address table.

  15. A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will

    • the host send an ARP request?
    • the unicast IP address of the remote host
    • the unicast MAC address of the remote host
    • the subnet broadcast IP address
    • the broadcast MAC address

      Answers Explanation & Hints:

      ARP requests are sent when a host does not have an IP to MAC mapping for a destination in the ARP cache. ARP requests are sent to the Ethernet broadcast of FF:FF:FF:FF:FF:FF. In this example because the address of the remote host is unknown, an ARP request is sent to the Ethernet broadcast to resolve the MAC address of the default gateway that is used to reach the remote host.

  16. A network administrator installs a network device that focuses on interconnecting independent local networks. At which layer of devices does this technology reside?

    • core
    • access
    • internet
    • distribution

      Answers Explanation & Hints:

      The distribution layer connects local networks and controls the traffic flowing between them. Networking devices that make up the distribution layer are designed to interconnect networks, not individual hosts.

  17. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

    • The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host.
    • The packet will be sent directly to the destination host.
    • The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host.
    • The packet will be sent only to the default gateway.

      Answers Explanation & Hints:

      If the destination host is in the same LAN as the source host, there is no need for a default gateway. A default gateway is needed if a packet needs to be sent outside the LAN.

  18. If the default gateway is configured incorrectly on the host, what is the impact on communications?

    • The host is unable to communicate on the local network.
    • The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
    • The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
    • There is no impact on communications.

      Answers Explanation & Hints:

      A default gateway is only required to communicate with devices on another network. The absence of a default gateway does not affect connectivity between devices on the same local network.

  19. Which two statements describe characteristics of network addresses? (Choose two.)

    • A statically assigned IP address will be valid on any network to which the device connects.
    • The MAC address of a device will change when that device moves from one Ethernet network to another.
    • DHCP is used to dynamically assign both MAC and IP addresses to devices connected to the network.
    • A MAC address is also referred to as a physical address because it is permanently embedded on the NIC.
    • A valid public IPv4 or IPv6 address is needed in order for devices to communicate over the internet.

      Answers Explanation & Hints:

      Knowing how network addressing works can speed configuration and troubleshooting tasks. MAC addresses are assigned by the NIC manufacturer and remain the same as long as the NIC is not replaced. MAC addresses are used to communicate between devices connected to the same local Ethernet network. Valid IPv4 and IPv6 addresses are necessary for communications to be routed over the internet. All IP addresses are valid only on a network that has the same network prefix bits and the same subnet mask.

  20. What is the purpose of the subnet mask in conjunction with an IP address?

    • to uniquely identify a host on a network
    • to identify whether the address is public or private
    • to determine the subnet to which the host belongs
    • to mask the IP address to outsiders

      Answers Explanation & Hints:

      With the IPv4 address, a subnet mask is also necessary. A subnet mask is a special type of IPv4 address that coupled with the IP address determines the subnet of which the device is a member. ​

  21. What are three characteristics of multicast transmission? (Choose three.)

    • The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.
    • A single packet can be sent to a group of hosts.
    • Multicast transmission can be used by routers to exchange routing information.
    • The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.
    • Computers use multicast transmission to request IPv4 addresses.
    • Multicast messages map lower layer addresses to upper layer addresses.

      Answers Explanation & Hints:

      Broadcast messages consist of single packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses, and map upper layer addresses to lower layer addresses. A multicast transmission is a single packet sent to a group of hosts and is used by routing protocols, such as OSPF and RIPv2, to exchange routes. The address range 224.0.0.0 to 224.0.0.255 is reserved for link-local addresses to reach multicast groups on a local network.

  22. Refer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?

    Networking Essentials 2.0 Practice Final Exam Answers 03
    Networking Essentials 2.0 Practice Final Exam Answers 03
    • 192.168.0.1
    • 192.168.0.100
    • 255.255.255.0
    • 255.255.255.255
    • 192.168.0.255

      Answers Explanation & Hints:

      When a new client device is installed on a network that uses dynamic IP addressing, the client will send out a DHCP request message with the destination IPv4 address of 255.255.255.255.

  23. A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

    • 254
    • 251
    • 252
    • 253

      Answers Explanation & Hints:

      If the block of addresses allocated to the pool is 192.168.10.0/24, there are 254 IP addresses to be assigned to hosts on the network. As there are 3 printers which need to have their addresses assigned statically, then there are 251 IP addresses left for assignment.

  24. A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?

    • Send a DHCPREQUEST packet to IP address 255.255.255.255.
    • Send a DHCPACK packet to the default gateway address.
    • Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.
    • Use a statically configured IP address from the pool of IP addresses that is offered by the DHCP server.

      Answers Explanation & Hints:

      Like IP addressing, there is also a special MAC address for broadcast purposes: FF-FF-FF-FF-FF-FF. When a DHCP client needs to send a DHCP Discover message in order to seek DHCP servers, the client will use this MAC address as the destination MAC address in the Ethernet frame. It does this because it has no knowledge of the IP and MAC addresses of DHCP servers.

  25. Match each DHCP message type with its description. (Not all options are used.)

    Networking Essentials 2.0 Practice Final Exam Answers 001
    Networking Essentials 2.0 Practice Final Exam Answers 001

    Answers Explanation & Hints:

    Place the options in the following order:

    • a client initiating a message to find a DHCP server – DHCPDISCOVER
    • a DHCP server responding to the initial request by a client – DHCPOFFER
    • the client accepting the IP address provided by the DHCP server – DHCPREQUEST
    • the DHCP server confirming that the lease has been accepted – DHCPACK
  26. If the default gateway is configured incorrectly on a host, what is the impact on communications?

    • The host is unable to communicate on the local network.
    • The host is unable to communicate with hosts on remote networks.
    • The host is unable to communicate with hosts on both the local and remote networks.
    • The host cannot get an IP address from the DHCP server.

      Answers Explanation & Hints:

      In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device that a host device uses to communicate with devices on other networks. The default gateway device is not used when a host communicates with other hosts on the same network.

  27. A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)? (Choose two.)

    • when a host is sending packets to a local server in order to update the network media settings and music playlists
    • when a host is sending packets to the ISP in order to request a speed increase for Internet services
    • when a host is sending a print job to a network printer on the LAN
    • when a host is sending packets to a remote site owned by the manufacturer of the wireless router in order to request a digital copy of the device manual
    • when a host is sending HTTP packets to the wireless router in order to update the network addressing of the LAN

      Answers Explanation & Hints:

      A wireless router will perform Network Address Translation (NAT) whenever a private (local) source IPv4 address is translated to a public (global) address.

  28. Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

    • encapsulation
    • translation
    • dual-stack
    • tunneling

      Answers Explanation & Hints:

      The tunneling migration technique encapsulates an IPv6 packet inside an IPv4 packet. Encapsulation assembles a message and adds information to each layer in order to transmit the data over the network. Translation is a migration technique that allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. The dual-stack migration technique allows IPv4 and IPv6 protocol stacks to coexist on the same network simultaneously.

  29. A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?

    • application
    • transport
    • internet
    • network access

      Answers Explanation & Hints:

      The internet layer provides addresses for the purpose of connecting end devices on different networks.

  30. Which statement correctly describes data transmission at the transport layer?

    • Retransmission of lost packets is provided by both TCP and UDP.
    • Segmentation is provided by the window size field when the TCP protocol is used.
    • A single datagram can include both a TCP and a UDP header.
    • Both UDP and TCP use port numbers.
    • Segmentation is provided by sequence numbers when UDP is used.

      Answers Explanation & Hints:

      Segmentation is handled at Layer 4 by TCP sequence numbers. UDP does not have sequence numbers in the header, but instead, lets the application handle reordering if it is necessary. Only TCP provides reliable deliver and retransmits data. Each segment has either a TCP header or a UDP header; it cannot contain both.

  31. What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)

    • The Internet Layer IP protocol has built in mechanisms for ensuring the reliable transmission and receipt of data.
    • UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated.
    • TCP and UDP destination port numbers are dynamically generated by the sending device in order to track the responses to requests.
    • TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time.
    • The same Transport Layer source port is used for all of the tabs opened at the same time within a web browser.

      Answers Explanation & Hints:

      Application programmers make decisions about which protocols to use to transport the data to and from their applications based on whether the application can tolerate any lost data. Live streaming and voice transmissions can use UDP because if a few data packets are lost, the quality of the video and audio is not seriously impacted. TCP is used when all data must be complete and accurate.

  32. Match the protocol with the function. (Not all options are used.)

    Networking Essentials 2.0 Practice Final Exam Answers 002
    Networking Essentials 2.0 Practice Final Exam Answers 002
  33. While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)

    • IMAP4
    • TFTP
    • Telnet
    • HTTP
    • SMTP
    • DNS
    • POP3

      Answers Explanation & Hints:

      The email protocols used on a network are SMTP, POP3, and IMAP4. SMTP is used to send messages to a local email server, whereas POP and IMAP are used to receive email.

  34. What type of technology converts analog voice signals into digital data?

    • SMTP
    • VoIP
    • SNMP
    • POP3

      Answers Explanation & Hints:

      Voice over IP (VoIP) is a technology that is used with making telephone calls across a network or internet and it converts analog voice signals into digital data.

  35. Refer to the exhibit. Which router port connects to the modem provided by the service provider?

    Network Basics Module 1 - 4 Checkpoint Exam Answers 01
    Network Basics Module 1 – 4 Checkpoint Exam Answers 01
    • A
    • B
    • C
    • D

      Answers Explanation & Hints:

      The ports shown in the diagram are used as follows: The LAN ports, A and B, are used to connect wired devices on the home network. The Internet port, C, is connected to the modem. The port, labeled D, is the 5V DC power port that supplies power to the router.

  36. Which wireless RF band do IEEE 802.11b/g devices use?

    • 900 MHz
    • 2.4 GHz
    • 5 GHz
    • 60 GHz

      Answers Explanation & Hints:

      900 MHz is an FCC wireless technology that was used before development of the 802.11 standards. 900 MHz devices have a larger coverage range than the higher frequencies have and do not require line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at 60 GHz.

  37. Which type of device filtering can be enabled on some wireless access points or wireless routers?

    • authentication
    • IP address
    • user ID
    • MAC address

      Answers Explanation & Hints:

      On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network.

  38. A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

    • BYOD
    • virtualization
    • maintaining communication integrity
    • online collaboration

      Answers Explanation & Hints:

      Virtualization technology can run several different operating systems in parallel on a single CPU.

  39. In software defined network architecture, what function is removed from network devices and performed by an SDN controller?

    • control plane
    • data plane
    • security
    • application policies

      Answers Explanation & Hints:

      In network virtualization, the control plane function of each network device is removed and is performed by a centralized controller. The controller then can communicate control plane functions to each of the network devices. This allows the network devices to focus all resources on forwarding plane functions.

  40. A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

    • Disable SSID broadcast.
    • Enable WPA encryption.
    • Configure DMZ settings.
    • Configure a DNS server.

      Answers Explanation & Hints:

      Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced.

  41. Which three attacks exploit human behavior? (Choose three.)

    • pretexting
    • brute force
    • phishing
    • zombies
    • vishing
    • malware

      Answers Explanation & Hints:

      Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.​​

  42. Match the type of malware with the definition.

    Networking Essentials 2.0 Practice Final Exam Answers 003
    Networking Essentials 2.0 Practice Final Exam Answers 003
  43. An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are

    • locked out. What type of attack has occurred?
    • DDoS
    • brute force
    • ping of death
    • SYN flooding

      Answers Explanation & Hints:

      In a brute force attack, an unauthorized person will try to gain access to a system by sending as many passwords as possible as rapidly as possible.

  44. What is the effect of setting the security mode to WEP on a small wireless router?

    • It identifies the wireless LAN.
    • It allows the access point to inform clients of its presence.
    • It translates IP addresses into easy-to-remember domain names.
    • It encrypts data between the wireless client and the access point.
    • It translates an internal address or group of addresses into an outside, public address.

      Answers Explanation & Hints:

      WEP is used to encrypt data between the wireless client and the access point. DNS translates IP addresses into easy-to-remember domain names. NAT translates an internal address or group of addresses into an outside, public address. An SSID allows the access point to inform clients of its presence.

  45. What is an inherent security vulnerability of SSID broadcasting?

    • It broadcasts the identity of the network.
    • It sends traffic unencrypted between the wireless access point and the client.
    • It allows any host to join the wireless network.
    • It allows unauthenticated access to the wireless network.

      Answers Explanation & Hints:

      By default, wireless routers and access points broadcast SSIDs in plain text to all computers within the wireless range.This represents a security risk because an attacker can easily intercept the wireless signals and read plain text messages.

  46. Which solution allows external users to access only an internal FTP server on a private network?

    • dynamic NAT
    • NAT with overload
    • port forwarding
    • static NAT

      Answers Explanation & Hints:

      Port forwarding can be used to permit other users to reach devices on an internal network through the Internet. The firewall in the router determines if the traffic should be forwarded to an internal device based on the port number. Port numbers are associated with specific services, such as FTP, HTTP, HTTPS, and POP3.

  47. Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)

    • running configuration
    • IOS image file
    • startup configuration
    • POST diagnostics

      Answers Explanation & Hints:

      The two primary files needed for bootup are the IOS image file and startup configuration, which are copied into RAM to maximize performance. If a router configuration register is set to 0x2102, the router will attempt to load the IOS image from flash memory and the startup configuration file from NVRAM.

  48. Using default settings, what is the next step in the switch boot sequence after the IOS loads from flash?

    • Perform the POST routine.
    • Search for a backup IOS in ROM.
    • Load the bootstrap program from ROM.
    • Load the running-config file from RAM.
    • Locate and load the startup-config file from NVRAM.
  49. Match the router prompt to the configuration task.

    Networking Essentials 2.0 Practice Final Exam Answers 004
    Networking Essentials 2.0 Practice Final Exam Answers 004
  50. A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command on a Cisco switch. Which term is used to describe the “0/1” part in the command?

    • hot key
    • keyword
    • argument
    • command

      Answers Explanation & Hints:

      In this command structure, the Interface part is the command, the FastEthernet part is a keyword, and the 0/1 part is an argument.

  51. Which command can an administrator execute to determine what interface a router will use to reach remote networks?

    • show arp
    • show interfaces
    • show ip route
    • show protocols

      Answers Explanation & Hints:

      The show ip route command is used to display the IP routing table of the router. The IP routing table will show a list of known local and remote networks and the interfaces that the router will use to reach those networks.

  52. Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

    Networking Essentials 2.0 Practice Final Exam Answers 01
    Networking Essentials 2.0 Practice Final Exam Answers 01
    • Two physical interfaces have been configured.
    • The switch can be remotely managed.
    • One device is attached to a physical interface.
    • Passwords have been configured on the switch.
    • Two devices are attached to the switch.
    • The default SVI has been configured.

      Answers Explanation & Hints:

      Vlan1 is the default SVI. Because an SVI has been configured, the switch can be configured and managed remotely. FastEthernet0/0 is showing up and up, so a device is connected.

  53. Match the commands to the correct actions. (Not all options are used.)

    Networking Essentials 2.0 Practice Final Exam Answers 005
    Networking Essentials 2.0 Practice Final Exam Answers 005
  54. Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

    • interface fastethernet 0/0
    • line vty 0 4
    • line console 0
    • enable secret cisco
    • login
    • password cisco

      Answers Explanation & Hints:

      The three commands needed to password protect the console port are as follows:
      line console 0
      password cisco
      login
      The interface fastethernet 0/0 command is commonly used to access the configuration mode used to apply specific parameters such as the IP address to the Fa0/0 port. The line vty 0 4 command is used to access the configuration mode for Telnet. The 0 and 4 parameters specify ports 0 through 4, or a maximum of five simultaneous Telnet connections. The enable secret command is used to apply a password used on the router to access the privileged mode.

  55. A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

    • out-of-band access to a switch through the use of a virtual terminal with password authentication
    • remote access to the switch through the use of a telephone dialup connection
    • on-site access to a switch through the use of a directly connected PC and a console cable
    • remote access to a switch where data is encrypted during the session
    • direct access to the switch through the use of a terminal emulation program

      Answers Explanation & Hints:

      SSH provides a secure remote login through a virtual interface. SSH provides a stronger password authentication than Telnet. SSH also encrypts the data during the session.

  56. Which type of access is secured on a Cisco router or switch with the enable secret command?

    • virtual terminal
    • privileged EXEC
    • AUX port
    • console line

      Answers Explanation & Hints:

      The enable secret command secures access to the privileged EXEC mode of a Cisco router or switch.

  57. When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)

    • Set the user privilege levels.
    • Generate the asymmetric RSA keys.
    • Configure the correct IP domain name.
    • Configure role-based CLI access.
    • Create a valid local username and password database.
    • Manually enable SSH after the RSA keys are generated.

      Answers Explanation & Hints:

      SSH is automatically enabled after the RSA keys are generated. Setting user privilege levels and configuring role-based CLI access are good security practices but are not a requirement of implementing SSH.

  58. Using a systematic troubleshooting approach, a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information, which two questions are associated with Layer 3? (Choose two.)

    • Is the PC configured for DHCP?
    • Does a browser connection to www.cisco.com work?
    • Is the network cable plugged in?
    • From the PC, is the default gateway reachable using the ping command?
    • Is there a link light on the network card?

      Answers Explanation & Hints:

      IP address configuration and the ping command are associated with Layer 3 protocols. Visiting a web server is associated with the application layer. An Ethernet cable connection and NIC are associated with Layer 1 functions.

  59. During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move a few workstations cannot get a valid IP address. What should be checked first to identify the root cause of the problem?

    • Check the operation status of the DHCP server.
    • Test if these workstations can ping the default gateway.
    • Make sure the cables are functional and properly plugged.
    • Install all software updates.

      Answers Explanation & Hints:

      Because the workstations have just been moved from one location to another, the internal OS and applications have not changed. The first thing to check should be the Ethernet cable, including the type of cable used and whether the cables are properly plugged into both the workstation and the jack on the wall.

  60. A customer calls the help line to report a computer problem. The help line technician responds and works with the customer for some time. However, the technician cannot identify the root cause of the problem. What should the technician do to help the customer?

    • Tell the customer that a replacement computer will be shipped immediately.
    • Suggest that the customer visit the support website for more detailed information.
    • Tell the customer that a ticket is created and another technician will contact the user soon.
    • Ask for the email address of the customer in order to send all the support documents for the computer.

      Answers Explanation & Hints:

      When the first line technician cannot identify the cause of the problem, the technician should create a ticket and initiate the escalation process. Because the cause of the problem is not identified, the technician should not authorize the replacement process. The customer should not be sent to explore further troubleshooting.

  61. A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?

    • the subnet broadcast IP address
    • the unicast MAC address of the remote host
    • the unicast IP address of the remote host
    • the broadcast MAC address
  62. An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?

    • brute force
    • syn flooding
    • ping of death
    • DDoS
   Networking Essentials 2.0   
Networking Essentials 2.0 - Final Exam - Skills PTSA
Packet Tracer Skills PTSA Lab NA
Practice Final Exam Answers Online Test
Final Exam Answers Online Test
Subscribe
Notify of
guest
16 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments