CISCO CCNA ITN1

CISCO CCNA ITN1 Kurs

CISCO CCNA ITN1 Kurs


Set of flashcards Details

Flashcards 133
Language English
Category Computer Science
Level Other
Created / Updated 10.01.2022 / 21.12.2022
Weblink
https://card2brain.ch/box/20220110_cisco_ccna_itn1
Embed
<iframe src="https://card2brain.ch/box/20220110_cisco_ccna_itn1/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

A client packet is received by a server. The packet has a destination port number of 53. What service is the client requesting?

An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?

What are the three parts of an IPv6 global unicast address? (Choose three.)

What is one main characteristic of the data link layer?

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?

What service is provided by HTTPS?

Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)

A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

What are two functions that are provided by the network layer? (Choose two.)

A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?

What characteristic describes spyware?

What are three commonly followed standards for constructing and installing cabling? (Choose three.)

What attribute of a NIC would place it at the data link layer of the OSI model?

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

A client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting?

A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

What method is used to manage contention-based access on a wireless network?

What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device obtain a destination MAC address?

What characteristic describes a virus?

A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?

What service is provided by POP3?

What command can be used on a Windows PC to see the IP configuration of that computer?

A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?

Which layer of the TCP/IP model provides a route to forward messages through an internetwork?

What characteristic describes identity theft?

Refer to the exhibit. What is wrong with the displayed termination?

Match the header field with the appropriate layer of the OSI model. (Not all options are used.)

Layer 2 - 802.2 header / FCS (Framce Check Sequence) / Destination MAC Address

Layer 3 - TTL / Source IP Address

Layer 3 - Acknowledgment Number / Destination Port Number

Match a statement to the related network model. (Not all options are used.)

peer to peer network - no dedicated server is required / client and server roles are set on a per request basis

peer to peer application - requires a specific user interface / a background service is required

Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets?

https://i.imgur.com/PEo6xB6.png

Match each type of frame field to its function. (Not all options are used.)

https://i.imgur.com/3NbaAOr.png

Match

Match the characteristic to the forwarding method. (Not all options are used.)

https://i.imgur.com/KjGvl5A.png

Match

Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?

https://i.imgur.com/2D9jZh7.png

Refer to the exhibit. Which protocol was responsible for building the table that is shown?

https://i.imgur.com/jS2RlSO.png

Match the type of threat with the cause. (Not all options are used.)

https://i.imgur.com/oShJjWX.png

Match