ExamGecko
Home Home / Cisco / CCST-Networking

Cisco CCST-Networking Practice Test - Questions Answers, Page 4

Question list
Search
Search

DRAG DROP

Move each protocol from the list on the left to the correct TCP/IP model layer on the right.

Note: You will receive partial credit for each correct match.


Question 31
Correct answer: Question 31

Explanation:

TCP/IP Model Overview: Cisco TCP/IP Model

Understanding the TCP/IP Model: TCP/IP Layers

Which address is included in the 192.168.200.0/24 network?

A.

192.168.199.13

A.

192.168.199.13

Answers
B.

192.168.200.13

B.

192.168.200.13

Answers
C.

192.168.201.13

C.

192.168.201.13

Answers
D.

192.168.1.13

D.

192.168.1.13

Answers
Suggested answer: B

Explanation:

* 192.168.200.0/24 Network: This subnet includes all addresses from 192.168.200.0 to 192.168.200.255. The /24 indicates a subnet mask of 255.255.255.0, which allows for 256 addresses.

* 192.168.199.13: This address is in the 192.168.199.0/24 subnet, not the 192.168.200.0/24 subnet.

* 192.168.200.13: This address is within the 192.168.200.0/24 subnet.

* 192.168.201.13: This address is in the 192.168.201.0/24 subnet, not the 192.168.200.0/24 subnet.

* 192.168.1.13: This address is in the 192.168.1.0/24 subnet, not the 192.168.200.0/24 subnet.

* Subnetting Guide: Subnetting Basics

Which device protects the network by permitting or denying traffic based on IP address, port number, or application?

A.

Firewall

A.

Firewall

Answers
B.

Access point

B.

Access point

Answers
C.

VPN gateway

C.

VPN gateway

Answers
D.

Intrusion detection system

D.

Intrusion detection system

Answers
Suggested answer: A

Explanation:

Firewall: A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It permits or denies traffic based on IP addresses, port numbers, or applications.

Access Point: This is a device that allows wireless devices to connect to a wired network using Wi-Fi. It does not perform traffic filtering based on IP, port, or application.

VPN Gateway: This device allows for secure connections between networks over the internet, but it is not primarily used for traffic filtering based on IP, port, or application.

Intrusion Detection System (IDS): This device monitors network traffic for suspicious activity and policy violations, but it does not actively permit or deny traffic.

Understanding Firewalls: Firewall Basics


Which command will display the following output?

A.

show mac-address-table

A.

show mac-address-table

Answers
B.

show cdp neighbor

B.

show cdp neighbor

Answers
C.

show inventory

C.

show inventory

Answers
D.

show ip interface

D.

show ip interface

Answers
Suggested answer: B

Explanation:

The command that will display the output provided, which includes capability codes, local interface details, device IDs, hold times, and platform port ID capabilities, is the show cdp neighbor command. This command is used in Cisco devices to display current information about neighboring devices detected by Cisco Discovery Protocol (CDP), which includes details such as the interface through which the neighbor is connected, the type of device, and the port ID of the device1.

* Cisco - show cdp neighbors

The provided output is from the Cisco Discovery Protocol (CDP) neighbor table. The show cdp neighbor command displays information about directly connected Cisco devices, including Device ID, Local Interface, Holdtime, Capability, Platform, and Port ID.

* A. show mac-address-table: Displays the MAC address table on the switch.

* C. show inventory: Displays information about the hardware inventory of the device.

* D. show ip interface: Displays IP interface status and configuration.

Thus, the correct answer is B. show cdp neighbor.

* Cisco CDP Neighbor Command

* Understanding CDP

HOTSPOT

Computers in a small office are unable to access companypro.net. You run the ipconfig command on one of the computers. The results are shown in the exhibit.

You need to determine if you can reach the router.

Which command should you use? Complete the command by selecting the correct options from each drop-down lists.


Question 35
Correct answer: Question 35

Explanation:

How to Use the Ping Command

Testing Network Connectivity with the Ping Command

=========================

To determine if you can reach the router, you should use the ping command with the IP address of the router.

Command: ping

Target: 192.168.0.1

So, the completed command is:

ping 192.168.0.1

Step by Step Comprehensive and Detailed Explanation:

ping: The ping command sends ICMP Echo Request messages to the target IP address and waits for an Echo Reply. It is commonly used to test the reachability of a network device.

192.168.0.1: This is the IP address of the default gateway (the router) as shown in the ipconfig output. Pinging this address will help determine if the computer can communicate with the router.

Using the ping Command: ping Command Guide

Which information is included in the header of a UDP segment?

A.

IP addresses

A.

IP addresses

Answers
B.

Sequence numbers

B.

Sequence numbers

Answers
C.

Port numbers

C.

Port numbers

Answers
D.

MAC addresses

D.

MAC addresses

Answers
Suggested answer: C

Explanation:

The header of a UDP (User Datagram Protocol) segment includes port numbers. Specifically, it contains the source port number and the destination port number, which are used to identify the sending and receiving applications. UDP headers do not include IP addresses or MAC addresses, as those are part of the IP and Ethernet frame headers, respectively. Additionally, UDP does not use sequence numbers, which are a feature of TCP (Transmission Control Protocol) for ensuring reliable delivery of data segments1.

Segmentation Explained with TCP and UDP Header

User Datagram Protocol (UDP) - GeeksforGeeks

Which three fields are used in a UDP segment header

=========================

UDP Header: The header of a UDP segment includes the following key fields:

Source Port: The port number of the sending application.

Destination Port: The port number of the receiving application.

Length: The length of the UDP header and data.

Checksum: Used for error-checking the header and data.

IP Addresses: These are included in the IP header, not the UDP header.

Sequence Numbers: These are part of the TCP header, not UDP.

MAC Addresses: These are part of the Ethernet frame header and are not included in the UDP header.

RFC 768 - User Datagram Protocol: RFC 768

Cisco Guide on UDP: Cisco UDP Guide

DRAG DROP

Move the security options from the list on the left to its characteristic on the right. You may use each security option once, more than once, or not at all.

Note: You will receive partial credit for each correct answer.


Question 37
Correct answer: Question 37

A support technician examines the front panel of a Cisco switch and sees 4 Ethernet cables connected in the first four ports. Ports 1, 2, and 3 have a green

LED. Port 4 has a blinking green light.

What is the state of the Port 4?

A.

Link is up with cable malfunctions.

A.

Link is up with cable malfunctions.

Answers
B.

Link is up and not stable.

B.

Link is up and not stable.

Answers
C.

Link is up and active.

C.

Link is up and active.

Answers
D.

Link is up and there is no activity.

D.

Link is up and there is no activity.

Answers
Suggested answer: C

Explanation:

On a Cisco switch, a port with a blinking green LED typically indicates that the port is up (active) and is currently transmitting or receiving data. This is a normal state indicating active traffic on the port.

* A. Link is up with cable malfunctions: Usually indicated by an amber or blinking amber light.

* B. Link is up and not stable: Not typically indicated by a green blinking light.

* D. Link is up and there is no activity: Would be indicated by a solid green light without blinking.

Thus, the correct answer is C. Link is up and active.

* Cisco Switch LED Indicators

* Cisco Ethernet Switch LED Patterns

Which component of the AAA service security model provides identity verification?

A.

Authorization

A.

Authorization

Answers
B.

Auditing

B.

Auditing

Answers
C.

Authentication

C.

Authentication

Answers
D.

Accounting

D.

Accounting

Answers
Suggested answer: C

Explanation:

The AAA service security model consists of three components: Authentication, Authorization, and Accounting.

* Authentication: This is the process of verifying the identity of a user or device. It ensures that only legitimate users can access the network or service.

* Authorization: This determines what an authenticated user is allowed to do or access within the network.

* Auditing/Accounting: This component tracks the actions of the user, including what resources they access and what changes they make.

Thus, the correct answer is C. Authentication.

* Cisco AAA Overview

* Understanding AAA (Authentication, Authorization, and Accounting)

A help desk technician receives the four trouble tickets listed below. Which ticket should receive the highest priority and be addressed first?

A.

Ticket 1: A user requests relocation of a printer to a different network jack in the same office. The jack must be patched and made active.

A.

Ticket 1: A user requests relocation of a printer to a different network jack in the same office. The jack must be patched and made active.

Answers
B.

Ticket 2: An online webinar is taking place in the conference room. The video conferencing equipment lost internet access.

B.

Ticket 2: An online webinar is taking place in the conference room. The video conferencing equipment lost internet access.

Answers
C.

Ticket 3: A user reports that response time for a cloud-based application is slower than usual.

C.

Ticket 3: A user reports that response time for a cloud-based application is slower than usual.

Answers
D.

Ticket 4: Two users report that wireless access in the cafeteria has been down for the last hour.

D.

Ticket 4: Two users report that wireless access in the cafeteria has been down for the last hour.

Answers
Suggested answer: B

Explanation:

When prioritizing trouble tickets, the most critical issues affecting business operations or high-impact activities should be addressed first. Here's a breakdown of the tickets:

Ticket 1: Relocation of a printer, while necessary, is not urgent and does not impact critical operations.

Ticket 2: An ongoing webinar losing internet access is critical, especially if the webinar is time-sensitive and involves multiple participants.

Ticket 3: Slower response time for a cloud-based application is important but typically not as urgent as a complete loss of internet access for a live event.

Ticket 4: Wireless access down in the cafeteria affects users but does not have the same immediate impact as a live webinar losing connectivity.

Thus, the correct answer is B. Ticket 2: An online webinar is taking place in the conference room. The video conferencing equipment lost internet access.

IT Help Desk Best Practices

Prioritizing IT Support Tickets

Total 40 questions
Go to page: of 4