Please select 3 correct answers
Explanation:
The main difference between these protocols is that TCP is a connection-oriented protocol, while
UDP is a connectionless one. Each of the protocols has its strengths and weaknesses. One is much
faster, while the other is safer.
Explanation:
The Wi-Fi Alliance established three security and security certification methods to secure wireless computer
networks: Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3
(WPA3). These were specified by the Alliance in response to severe flaws discovered by researchers in the
previous system, Wired Equivalent Privacy (WEP).
Please select 2 correct answers
Explanation:
Intranet-based and Extranet-based VPNs are the two most frequent types of site-to-site VPNs. Intranet-based
site-to-site VPNs are used to connect numerous office sites' LANs into a single private network, referred to as a
WAN (Wide Area Network).
Explanation:
An Internet Protocol address, such as 192.0.2.1, is a numerical label that identifies a computer network
that communicates using the Internet Protocol. The fundamental functionalities of an IP address are
network interface identification and location addressing.
Explanation:
The main difference between IP precedence and DSCP is that IP precedence is a 3-bit field in TOC to give
priorities to the IP packets, while DSCP is 6 bits in Differential Services (DS) field for packet classification.
Generally, a computer network is a collection of networking devices connected together to exchange data.
Explanation:
The shutdown interface configuration command, which disables an interface, and the no shutdown command,
which enables it, are both available on the CISCO command-line interface.
Explanation:
Traffic shaping is a bandwidth management technique used on computer networks which delays some or
all datagrams to bring them into compliance with a desired traffic profile. Traffic shaping is used to optimize
or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by
delaying other kinds. It is often confused with traffic policing, the distinct but related practice of packet
dropping and packet marking.
Explanation:
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control (MAC) method used
most notably in early Ethernet technology for local area networking. It uses carrier -sensing to defer transmissions
until no other stations are transmitting.
Explanation:
Characteristics of REST and WS. 1. client- server. REST's client–server separation of concerns simplifies component
implementation, reduces the complexity of connector semantics, improves the effectiveness of performance tuning,
and increases the scalability of pure server components. REST enables intermediate processing by constraining
messages to be self-descriptive: interaction is stateless between requests, standard methods and media types are used
to indicate semantics and exchange.
Explanation:
The Network Configuration Protocol (NETCONF) is a network management protocol developed and standardized
by the IETF. It was developed in the NETCONF working group and published in December 2006 as RFC 4741 and
later revised in June 2011 and published as RFC 6241. The NETCONF protocol specification is an Internet Standards
Track document.
Explanation:
ARP (Address Resolution Protocol) Request ARP stands for address resolution protocol. This protocol is
used to find the MAC address of the device corresponding to its IP address. This protocol aims to create
communication between two devices on a local area network (Ethernet) byproviding the other device's
MAC address.
Explanation:
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing
information about managed devices on IP networks and for modifying that information to change device behavior.
Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and
more. SNMP is widely used in network management for network monitoring.
Explanation:
Routing Information Protocol (RIP) is normally a broadcast protocol, and for RIP routing updates to reach
nonbroadcast networks, you must configure the Cisco software to permit this exchange of routing information.
Explanation:
The traceroutecommand returns the sequence of hops a packet has traversed in order to get to a destination from
a given source, allowing you to discover the path a packet takes to get to a destination from a given source. This
application is included with both your host operating system (such as Linux or Microsoft (MS) Windows) and Cisco
IOS® Software.
Please select 3 correct answers
Explanation:
TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service (DDoS) attack that exploits part of the
normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.
Ping of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize,
or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
Explanation:
The feature used in this procedure is called IP/MAC binding. Using CLI, an Administrator may configure manual
binding table and configure which MAC address corresponds to which IP address. This is only recommended in
small to medium networks. Extra caution is required to implement in large networks.
Explanation:
A centralized network architecture is built around a single server that handles all the major processing.
Less powerful workstations connect to the server and submit their requests to the central server rather
than performing them directly. This can include applications, data storage, and utilities.
Explanation:
The Internet Protocol (IP) is a connectionless protocol that splits huge volumes of data into smaller,
transmittable packets and controls addressing data from one point to another. The following are the
primary components of Internet Protocol datagrams: IP Identification (IPID) is a protocol for reassembling
broken packets and uniquely identifying IP datagrams.
Explanation:
The correct answer:
192.168.145.255
Please select 2 correct answers
Explanation:
OSPF (Open Shortest Path First) is an Internet Protocol (IP) routing protocol. It is part of the set of internal
gateway protocols (IGPs) that operate within a single autonomous system and uses the link state routing (LSR)
algorithm (AS). RFC 2328 (1998) defines it as OSPF Version 2 for IPv4.
Intermediate System to Intermediate System (IS-IS, also abbreviated ISIS) is a routing system for efficiently moving
data across a computer network, which is a collection of physically connected computers or similar devices. It does
it by determining the most efficient data path through a packet switching network.
Please select 2 correct answers
Explanation:
The most common type of Fast Ethernet is 100BASE-TX, which uses two wire pairs inside
a category 5 or above cable.
A form of Fast Ethernet network implementation standard. 100BaseFX is a Fast Ethernet
variant that is commonly used to connect campus backbones.
Explanation:
RPVST+ is essentially RSTP that operates per-VLAN in a single layer 2 domain. In a multi-VLAN network,
VLAN tagging is used to enable the blocking of redundant links in one VLAN while enabling non-redundant
use of the same links by another VLAN.
Explanation:
Network address translation (NAT) is a method of translating one IP address space to another by changing
network address information in packets' IP headers while they are in transit through a traffic routing device.
Explanation:
Cisco Discovery Protocol (previously known as CDP) is a Layer 2 media-agnostic, network-agnostic protocol
that runs on Cisco equipment and allows networking applications to discover about directly linked devices 3
nearby.
Explanation:
Non-volatile random-access memory (NVRAM) is a type of random-access memory that can maintain data
even after power is turned off. This is in contrast to dynamic random-access memory (DRAM) and static
random-access memory (SRAM), which both save data for as long as power is supplied, or magnetic tape,
which can't be randomly accessed but keeps data indefinitely without power.