АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

An IPv6 enabled device sends a data packet with the destination address of FF02::1.What is the target of this packet:all IPv6 enabled nodes on the local link

Читайте также:
  1. A 16-bit wide flash memory device is used to store the FPGA configuration data. Because each
  2. A computer that is configured with the IPv6 address as shown in the exhibit is unable to access the internet. What is the problem?
  3. All wireless devices on the same WLAN must have the same SSID
  4. AN IMPOSSIBLE DEVICE
  5. C) The local governmental entities in the United States.
  6. Cisco Packet Tracer
  7. Cisco Packet Tracer
  8. Display Devices
  9. Host IP Address: 183.91.104.16 Eleven bits have been borrowed to create the required subnets.
  10. How does a networked server manage requests from multiple clients for different services:Each request is assigned source and destination port numbers.
  11. Installing Peripheral Devices

As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame:The transmitting node inserts start and stop bits into the frame.

At which layer of the OSI model would a logical address be encapsulated:network layer
What is the general term that is used to describe a piece of data at any layer of a networking model:protocol data unit

Consider the following range of addresses:2001:0DB8:BC15:00A0:0000::2001:0DB8:BC15:00A1:0000::2001:0DB8:BC15:00A2:0000::…2001:0DB8:BC15:00AF:0000:: The prefix for the range of addresses is “ 60

Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below:BA
What is a function of the BIOS:performs a power-on self test of internal components

Drag and drop.Match each characteristic to its corresponding internet conectivity type. satellite -> Not suited for heavily wooded areas;dialup telephone -> typically has very low bandwidth;DSL -> splits the access line into three signals;cable -> uses coaxial cable as a medium

Drag and drop.Match each definition to the corresponding security goal: maintaining integrity -> the assurance that the information has not been altered during transmission;ensuring confidentiality -> only the intended recipients can access and read the data;
ensuring availability -> the assurance of timely and reliable access to data

Drag and drop.Match the form of network communication with its description .Web pages that groups of people can edit and view together -> wiki;Interactive websites where people created and share user-generated content with friends and family -> Social media;real-time communication of between two or more people -> instant messaging;an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer: spyware

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent:the next byte that the destination expects to receive
What is a socket:the combination of a source IP address and port number or a destination IP address and port number
Fill in the blank. During a TCP session, the “ SYN ” field is used by the client to request communication with the server.

During normal operation, from which location do most Cisco switches and routers run the IOS: RAM

During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used: flash

During troubleshooting procedures, from which location will most Cisco routers load a limited IOS: ROM

Fill in the blank using a number. A total of “ 4 ” messages are exchanged during the TCP session termination process between the client and the server.

Fill in the blank with a number. 10,000,000,000 b/s can also be written as “ 10 ” Gb/s.
What are two characteristics of 802.11 wireless networks:Collisions can exist in the networks;They use CSMA/CA technology.

Fill in the blank. An intranet is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization

Fill in the blank. Do not use abbreviations. The ” show version ” command that is issued on a router is used to verify the value of the software configuration register.

Fill in the blank. Do not use abbreviations. The show” file systems ” command provides information about the amount of available and free flash memory and its permissions for reading or writing data.

Fill in the blank.VoIP ” defines the protocols and technologies that implement the transmission of voice data over an IP network.

Fill in the blank.A collision fragment, also known as a frame, is a frame of fewer than 64 bytes in length: runt

Fill in the blank. A nibble consists of “ 4 ”bits.

Fill in the blank.A Scalable network is able to expand to accept new devices and applications without affecting performance.

Fill in the blank.A address is defined as a reserved address that routes packets back to the host

Fill in the blank.An IPv6 address block with a /48 prefix has a/anvbit field for the subnet ID: 16

Fill in the blank.Consider the following range of addresses:2001:0DB8:BC15:0600:0000::to 2001:0DB8:BC15:0FFF:0000::The prefix for the range of addresses is: /52

Fill in the blank.During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a ” multicast ” message.

Fill in the blank. In a router, “ ROM ” is the nonvolatile memory where the diagnostic software, the bootup instructions, and a limited IOS are stored.

Fill in the blank. In dotted decimal notation, the subnet mask “ 255.255.254.0 ”will accommodate 500 hosts per subnet.

Fill in the blank.In fiber optic media, the signals are represented as patterns of: light

Fill in the blank.On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represents MAC address: broadcast

Fill in the blank.Refer to the exhibit. What command was used to resolve a given host name by querying the name servers:“ nslookup

Fill in the blank.The 8-bit binary value for 41 is: 00101001

Fill in the blank.The acronym “ BYOD ” refers to the trend of end users being able to use their personal devices to access the business network and resources.

Fill in the blank. The binary number 0000 1010 can be expressed as “ A ” in hexadecimal.
What are two features of ARP:If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.*If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

Fill in the blank.The Ethernet sublayer is responsible for communicating directly with the physical layer: MAC

Fill in the blank.The farther you are from the central office when utilizing a DSL connection, the lower the connection speed

Fill in the blank.The last host address on the 10.15.25.0/24 network is: 10.15.25.254

Fill in the blank.The shortest compressed format of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0000:0200 is: 2001:DB8:0:1470::200

Fill in the blank. The term “Bandwidth” indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).​
Refer to the exhibit. What is wrong with the displayed termination:The untwisted length of each wire is too long.

Fill in the blank. What is the decimal equivalent of the hex number 0x3F:“ 63
What are two types of IPv6 unicast addresses:link-local*loopback

For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet: It can rapidly adapt to the failure of network devices and communication links; Data packets can travel through the network using multiple different paths; Network devices dynamically decide on the best available path to forward each packet

How do hosts ensure that their packets are directed to the correct network destination:They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route

How does a Layer 3 switch differ from a Layer 2 switch: An IP address can be assi g ned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.007 сек.)