IST FINAL EXAM QUESTIONS AND VERIFIED
ANSWERS
Using default settings, what is the next step in the switch boot sequence after the IOS
loads from flash? - Answers - Locate and load the startup-config file from NVRAM.
Refer to the exhibit. A newly purchased client laptop has just connected to the local
area network. The local area network is using a wireless router that is providing
dynamic addressing as shown. Which IP address does the laptop use as a destination
address when requesting a dynamically assigned address? - Answers -
255.255.255.255
. A user is configuring a wireless access point and wants to prevent any neighbors from
discovering the network. What action does the user need to take? - Answers - Disable
SSID broadcast.
What is an inherent security vulnerability of SSID broadcasting? - Answers - It
broadcasts the identity of the network.
A network administrator installs a network device that focuses on interconnecting
independent local networks. At which layer of devices does this technology reside? -
Answers - distribution
What are three characteristics of multicast transmission? (Choose three.) - Answers -
Multicast transmission can be used by routers to exchange routing information.
The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local
network.
A single packet can be sent to a group of hosts.
What are two common media used in networks? (Choose two.) - Answers - fiber and
copper
Refer to the exhibit. Which router port connects to the modem provided by the service
provider? - Answers - C
A consumer places a smartphone close to a pay terminal at a store and the shopping
charge is successfully paid. Which type of wireless technology was used? - Answers -
NFC
What type of technology converts analog voice signals into digital data? - Answers -
VoIP
, What are two wiring schemes defined by the TIA/EIA organization for Ethernet
installation in homes and businesses? (Choose two.) - Answers - T568B and T568A
What is the effect of setting the security mode to WEP on a small wireless router? -
Answers - It encrypts data between the wireless client and the access point.
A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command
on a Cisco switch. Which term is used to describe the "0/1" part in the command? -
Answers - argument
What is the purpose of the subnet mask in conjunction with an IP address? - Answers -
to determine the subnet to which the host belongs
If the default gateway is configured incorrectly on a host, what is the impact on
communications? - Answers - The host is unable to communicate with hosts on remote
networks.
What is a characteristic of a peer-to-peer application? - Answers - Each device using
the application provides a user interface and runs a background service.
In software defined network architecture, what function is removed from network
devices and performed by an SDN controller? - Answers - control plane
A data center has recently updated a physical server to host multiple operating systems
on a single CPU. The data center can now provide each customer with a separate web
server without having to allocate an actual discrete server for each customer. What is
the networking trend that is being implemented by the data center in this situation? -
Answers - virtualization
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to
carry them over IPv4 network infrastructures? - Answers - tunneling
Which two types of interference may affect the data throughput on UTP cables?
(Choose two.) - Answers - EMI and crosstalk
Which three commands are used to set up secure access to a router through a
connection to the console interface? (Choose three.) - Answers - line console 0
login
password cisco
Which statement correctly describes data transmission at the transport layer? - Answers
- Both UDP and TCP use port numbers.
What are two benefits of using a layered network model? (Choose two.) - Answers - It
prevents technology in one layer from affecting other layers.
ANSWERS
Using default settings, what is the next step in the switch boot sequence after the IOS
loads from flash? - Answers - Locate and load the startup-config file from NVRAM.
Refer to the exhibit. A newly purchased client laptop has just connected to the local
area network. The local area network is using a wireless router that is providing
dynamic addressing as shown. Which IP address does the laptop use as a destination
address when requesting a dynamically assigned address? - Answers -
255.255.255.255
. A user is configuring a wireless access point and wants to prevent any neighbors from
discovering the network. What action does the user need to take? - Answers - Disable
SSID broadcast.
What is an inherent security vulnerability of SSID broadcasting? - Answers - It
broadcasts the identity of the network.
A network administrator installs a network device that focuses on interconnecting
independent local networks. At which layer of devices does this technology reside? -
Answers - distribution
What are three characteristics of multicast transmission? (Choose three.) - Answers -
Multicast transmission can be used by routers to exchange routing information.
The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local
network.
A single packet can be sent to a group of hosts.
What are two common media used in networks? (Choose two.) - Answers - fiber and
copper
Refer to the exhibit. Which router port connects to the modem provided by the service
provider? - Answers - C
A consumer places a smartphone close to a pay terminal at a store and the shopping
charge is successfully paid. Which type of wireless technology was used? - Answers -
NFC
What type of technology converts analog voice signals into digital data? - Answers -
VoIP
, What are two wiring schemes defined by the TIA/EIA organization for Ethernet
installation in homes and businesses? (Choose two.) - Answers - T568B and T568A
What is the effect of setting the security mode to WEP on a small wireless router? -
Answers - It encrypts data between the wireless client and the access point.
A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command
on a Cisco switch. Which term is used to describe the "0/1" part in the command? -
Answers - argument
What is the purpose of the subnet mask in conjunction with an IP address? - Answers -
to determine the subnet to which the host belongs
If the default gateway is configured incorrectly on a host, what is the impact on
communications? - Answers - The host is unable to communicate with hosts on remote
networks.
What is a characteristic of a peer-to-peer application? - Answers - Each device using
the application provides a user interface and runs a background service.
In software defined network architecture, what function is removed from network
devices and performed by an SDN controller? - Answers - control plane
A data center has recently updated a physical server to host multiple operating systems
on a single CPU. The data center can now provide each customer with a separate web
server without having to allocate an actual discrete server for each customer. What is
the networking trend that is being implemented by the data center in this situation? -
Answers - virtualization
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to
carry them over IPv4 network infrastructures? - Answers - tunneling
Which two types of interference may affect the data throughput on UTP cables?
(Choose two.) - Answers - EMI and crosstalk
Which three commands are used to set up secure access to a router through a
connection to the console interface? (Choose three.) - Answers - line console 0
login
password cisco
Which statement correctly describes data transmission at the transport layer? - Answers
- Both UDP and TCP use port numbers.
What are two benefits of using a layered network model? (Choose two.) - Answers - It
prevents technology in one layer from affecting other layers.