Last Updated on December 25, 2018 by Admin
Introduction to Networks (version 6.00) – ITN Final Exam Beta Online 2018 100%
ITN -- Final Exam Beta
Time limit: 0
Quiz-summary
0 of 50 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
Information
ITN -- Final Exam Beta
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 50 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Answered
- Review
-
Question 1 of 50
1. Question
1 pointsWhat is a field in the trailer part of an Ethernet frame?
Correct
Incorrect
-
Question 2 of 50
2. Question
1 pointsWhat will happen if the default gateway address is incorrectly configured on a host?
Correct
Incorrect
-
Question 3 of 50
3. Question
2 pointsUnder which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)
Correct
Incorrect
-
Question 4 of 50
4. Question
1 pointsWhat subnet mask is required to support 8 subnets on network 10.23.0.0/16?
Correct
Incorrect
-
Question 5 of 50
5. Question
1 pointsA DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 172.17.16.0/25. There are 11 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?
Correct
Incorrect
-
Question 6 of 50
6. Question
1 pointsWhat is a characteristic of a fault tolerant network?
Correct
Incorrect
-
Question 7 of 50
7. Question
2 pointsWhat are two examples of the cut-through switching method? (Choose two.)
Correct
Incorrect
-
Question 8 of 50
8. Question
3 pointsWhat three services are provided by the transport layer? (Choose three.)
Correct
Incorrect
-
Question 9 of 50
9. Question
1 pointsA network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?
Correct
Incorrect
-
Question 10 of 50
10. Question
1 pointsWhich connection provides a secure CLI session with encryption to a Cisco switch?
Correct
Incorrect
-
Question 11 of 50
11. Question
1 pointsA network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?
Correct
Incorrect
-
Question 12 of 50
12. Question
1 pointsWhich procedure is used to reduce the effect of crosstalk in copper cables?
Correct
Incorrect
-
Question 13 of 50
13. Question
1 pointsWhat is a key characteristic of the peer-to-peer networking model?
Correct
Incorrect
-
Question 14 of 50
14. Question
1 pointsEnter configuration commands, one per line. End with CNTL/Z.
HQ1 (config)# enable secret j0321ciscoG
HQ1 (config)# line console 0
HQ1 (config-line)# password j0Gsu
HQ1 (config-line)# login
HQ1 (config-line)# exit
HQ1 (config)# line vty 0 15
HQ1 (config-line)# password usw1tchj0
HQ1 (config-line)# login
HQ1 (config-line)# end
Refer to the exhibit. What password allows an administrator to enter privileged mode?
Correct
Incorrect
-
Question 15 of 50
15. Question
1 pointsWhich example of malicious code would be classified as a Trojan horse?
Correct
Incorrect
-
Question 16 of 50
16. Question
1 pointsRefer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?
Correct
Incorrect
-
Question 17 of 50
17. Question
1 pointsWhich type of UTP cable is used to connect a PC to a switch port?
Correct
Incorrect
-
Question 18 of 50
18. Question
2 pointsWhich two commands can be used on a Windows host to display the routing table? (Choose two.)
Correct
Incorrect
-
Question 19 of 50
19. Question
1 pointsWhat part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
Correct
Incorrect
-
Question 20 of 50
20. Question
1 pointsWhat is the binary value of the decimal value 67?
Correct
Incorrect
-
Question 21 of 50
21. Question
1 pointsWhat important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?
Correct
Incorrect
-
Question 22 of 50
22. Question
1 pointsWhat is a benefit of using cloud computing in networking?
Correct
Incorrect
-
Question 23 of 50
23. Question
1 pointsWhat action would be an example of a network attack that focused on disruption of service?
Correct
Incorrect
-
Question 24 of 50
24. Question
1 pointsWhat is done to an IP packet before it is transmitted over the physical medium?
Correct
Incorrect
-
Question 25 of 50
25. Question
1 pointsA company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
Correct
Incorrect
-
Question 26 of 50
26. Question
1 pointsEnter configuration commands, one per line. End with CNTL/Z.
DepotD(config)# interface gi0/1
DepotD(config-if)# description Connects to the DeptA LAN
DepotD(config-if)# ip address 172.16.86.254 255.255.255.240
DepotD(config-if)# no shutdown
DepotD(config-if)# interface s0/0/1
DepotD(config-if)# description Connects to HeadOffice WAN
DepotD(config-if)# ip address 10.86.113.126 255.255.255.192
DepotD(config-if)# no shutdown
DepotD(config-if)# end
Refer to the exhibit. An administrator is adding a new host to the DeptA LAN. Which IP address would be an appropriate address for the new host?
Correct
Incorrect
-
Question 27 of 50
27. Question
1 pointsEnter configuration commands, one per line. End with CNTL/Z.
HQ1(config)# interface gi0/1
HQ1(config-if)# description Connects to the RHouseB LAN
HQ1(config-if)# ip address 172.22.221.3 255.255.255.0
HQ1(config-if)# no shutdown
HQ1(config-if)# interface gi0/0
HQ1(config-if)# description Connects to the Store1 LAN
HQ1(config-if)# ip address 172.22.188.15 255.255.255.0
HQ1(config-if)# no shutdown
HQ1(config-if)# interface s0/0/0
HQ1(config-if)# description Connects to ISP
HQ1(config-if)# ip address 10.254.221.5 255.255.255.252
HQ1(config-if)# no shutdown
HQ1(config-if)# interface s0/0/1
HQ1(config-if)# description Connects to HeadOffice WAN
HQ1(config-if)# ip address 203.0.113.3 255.255.255.0
HQ1(config-if)# no shutdown
HQ1(config-if)# end
Refer to the exhibit. A network administrator is connecting a new host to the RHouseB LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?
Correct
Incorrect
-
Question 28 of 50
28. Question
1 pointsWhich IP address represents the network address for the network that includes IP address 10.112.185.63/30?
Correct
Incorrect
-
Question 29 of 50
29. Question
1 pointsWhat type of address is represented by the IP address 169.254.148.133 ?
Correct
Incorrect
-
Question 30 of 50
30. Question
1 pointsRefer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V. When users log in using Telnet, the banner does not appear correctly. What is the problem?
Correct
Incorrect
-
Question 31 of 50
31. Question
1 pointsWhat function does pressing the Tab key have when entering a command in IOS?
Correct
Incorrect
-
Question 32 of 50
32. Question
2 pointsWhat are two functions of NVRAM? (Choose two.)
Correct
Incorrect
-
Question 33 of 50
33. Question
1 pointsWhich well-known port number is used by the DHCP (client) protocol?
Correct
Incorrect
-
Question 34 of 50
34. Question
1 pointsWhich protocol or service functions at the application layer of the TCP/IP model?
Correct
Incorrect
-
Question 35 of 50
35. Question
1 pointsWhat is the prefix length for the IP address 10.100.185.0 with a subnet mask of 255.255.255.252?
Correct
Incorrect
-
Question 36 of 50
36. Question
3 pointsWhat are three characteristics of an SVI? (Choose three.)
Correct
Incorrect
-
Question 37 of 50
37. Question
1 pointsWhat does the IP address 10.15.239.64/26 represent?
Correct
Incorrect
-
Question 38 of 50
38. Question
1 pointsGiven network 172.22.188.0, which subnet mask would be used if 4 host bits are available?
Correct
Incorrect
-
Question 39 of 50
39. Question
1 pointsWhich protocol is used for email?
Correct
Incorrect
-
Question 40 of 50
40. Question
1 pointsA network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?
Correct
Incorrect
-
Question 41 of 50
41. Question
1 pointsA medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?
Correct
Incorrect
-
Question 42 of 50
42. Question
1 pointsWhat is the hexadecimal value of the decimal value 63?
Correct
Incorrect
-
Question 43 of 50
43. Question
2 pointsIn addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)
Correct
Incorrect
-
Question 44 of 50
44. Question
1 pointsWhat class of address is represented by the IP address 198.51.100.19 ?
Correct
Incorrect
-
Question 45 of 50
45. Question
2 pointsWhich two functions are primary functions of a router? (Choose two.)
Correct
Incorrect
-
Question 46 of 50
46. Question
1 pointsA Telnet client is receiving a response from a Telnet server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?
Correct
Incorrect
-
Question 47 of 50
47. Question
2 pointsRefer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)
Correct
Incorrect
-
Question 48 of 50
48. Question
4 pointsWhat are two actions performed by a Cisco switch? (Choose two.)
Correct
Incorrect
-
Question 49 of 50
49. Question
1 pointsWhich tool or utility is used in the denial of service network attacks?
Correct
Incorrect
-
Question 50 of 50
50. Question
1 pointsWhen applied to a router, which command would help mitigate brute-force password attacks against the router?
Correct
Incorrect