Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

Texting
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

Social Media
Remaining cards (243)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Net 104

Cisco Net Academy CND1

QuestionAnswer
Texting Enables instant real-time communication between two or more people
Social Media Consists of interactive websites where people and communities create and share user generated content with friends, family, peers and the world
Collaboration Tools Allows individuals to communicate with each other, often across real-time interactive video
BLOGS abbreviation for "WeBlogs" Web Pages that are easy to update and edit
WiKis Web Pages that groups of people can edit and view together Group Creation
PodCasting Allows people to deliver their audio recordings to a wide audience. The audio file is placed on a website where others can download it and play the recording on their computers, laptops, and other mobile devices.
Peer-to-Peer (P2P) File Sharing Allows people to share files with each other without having to store and download them from a central Server. The user joins the P2P network by simply installing the P2P Software
Small Home Networks Coct a few computer to each other and the Internet
Medium to Large Networks Have many locations with hundreds or thousands of interconnected computers
Small Office/Home Office Networks (SOHO) Enables computers within a home office or a remote office to connect to a corporate network or access centralized shared resources
World Wide Networks The Internet is a network of networks that connects hundreds of millions of computers worldwide
Web Client and Server The Web Server runs Web Server Software and Clients Use their browser Software, such as Windows Internet Explorer, to access web pages on the server.
File Client and Server The file server stores corporate and user files in a central location. The Client devices access these files with client software such as Windows Explorer
Email Client and Server The Email Server runs email Server Software and clients use their mail client software, to access email on the server
Hosts End Devices
Servers Computers with Software that enable them to provide information, like email or web pages to other end devices on the network
Clients Computers with software installed that enable them to request and display the information obtained from the server
What are the advantages of peer-to-peer networking? Easy to setup. Less Complexity Lower cost since network devices and dedicated servers may not be required Can be used for simple tasks as transferring files and sharing printers
How do networks support the way we work? Record and manage financial info, cust info, & emp payroll sys Enable the trans of many diff types of info services, email, video, messaging, telephony.Efficient and cost-effective emp training. Online learning ops save time-consuming & costly travel,
How do Networks Support the Way We Play? Listen 2 rec artists, view motion pics, read books,Nets enable new forms of entertainment, ex. online games. Players participate in online competition. We compete with friends & foes around world.
Small home networks Connect a few computers to each other and the Internet.
The Small Office/Home Office or SOHO Network Enables computers within a home office or a remote office to connect to a corporate network or access centralized, shared resources.
Medium to large networks Networks used by corporations and schools, can have many locations with hundreds or thousands of interconnected computers.
The Internet A network of networks that connects hundreds of millions of computers world-wide.
When and why do you use Simple Networks? They are installed in homes to enable sharing of resources, such as printers, documents, pictures and music between a few local computers
When and why do you Home Office networks and small office networks? They are set up by individuals that work from a home or a remote office & need to connect to a corp net or other centralized resources. Many self-employed entrepreneurs use networks to advertise &sell products, order supplies & communicate with customers.
When and Why do we use businesses and large organizations, networks? They can be used 2 provide consolidation, storage & access 2 info on network servers. Nets allow 4 rapid communication email, instant messaging, &collaboration among employees., Many orgs use nets 2 provide prods & servs 2 custs through int connection.
What does the Web Server do? It runs web server software and clients use their browser software, such as Windows Internet Explorer, to access web pages on the server.
What does the File Server do? The File Server stores corporate and user files in a central location. .
What does the client devices do? The client devices access these files with client software such as Windows Explorer.
What does the Email server do? The Email Server runs email server software.
What does the Email Client do? They use their mail client software, such as Microsoft Outlook, to access email on the server.
What are Hosts? All computers connected to a network that participate directly in network communication. They are also end devices.
What are Servers? Computers with software that enable them to provide information, like email or web pages, to other end devices on the network.
What does Each service require? separate server software
What can a Computer Server Provide? it can provide services simultaneously to one or many clients.
What are clients? They are computers with software installed that enable them to request and display the information obtained from the server.
What are examples of client software? It is a web browser, like Chrome or FireFox. A single computer can also run multiple types of client software. For example, a user can check email and view a web page while instant messaging and listening to Internet radio.
What can a user do with client software? A user can also run multiple types of client software. For example, a user can check email and view a web page while instant messaging and listening to Internet radio.
What is peer to peer network? Client and server software running on the same computer at the same time. In small businesses and homes, many computers function as the servers and clients on the network.
What are the disadvantages of peer-to-peer networking? No centralized administration Not as secure Not scalable All devices may act as both clients and servers which can slow their performance
What does the network infrastructure provide? The stable and reliable channel over which these communications occur.
What network components make up the network infrastructure? Devices Media Services
What are devices and media? They are the physical elements, or hardware, of the network. Hardware is often the visible components of the network platform such as a laptop, PC, switch, router, wireless access point, or the cabling used to connect the devices.
What is hardware for the network? It is often the visible components of the network platform such as a laptop, PC, switch, router, wireless access point, or the cabling used to connect the devices.
What are Services for the network? They include many of the common network applications people use every day, like email hosting services and web hosting services.
What are processes for the network? It provide the functionality that directs and moves the messages through the network. They are less obvious to us but are critical to the operation of networks.
What are end devices? The network devices that people are most familiar with It is either the source or destination of a message transmitted over the network.
What are examples of end devices? Desktop Computer Laptop Printer Ip Phone Wireless Tablet TelePresence Endpoint
How do you distinguish one end device from another? Each end device on a network is identified by an address. When an end device initiates communication, it uses the address of the destination end device to specify where the message should be sent.
What are Intermediary Devices? They connect the individual end devices to the network and can connect multiple individual networks to form an internetwork. These devices provide connectivity and ensure that data flows across the network
What do Intermediary Devices do? These devices provide connectivity and ensure that data flows across the network.The devices use the destination end device address, with information about the network interconnections, to determine the path that messages should take through the net.
What functions do Intermediary Devices Perform? Regenerate & re-transmit data signals Maintains Information about what pathways exist through network & internetwork Notify other devices of errors & communications failures Direct data along alteranate pathways when there is a link failure
What other functions do Intermediary Devices perform Classify & direct mess according to priorities Permit or deny the flow of data, based on security settings
What are Intermediary Devices? Wireless Router Lan Switch Router MultiLayer switch FireWall Appliance
What is a Medium? It provides the channel over which the message travels from source to destination.
What are the three types of media that interconnect devices and to provide the pathway over which data can be transmitted? Metallic wires within cables Glass or plastic fibers (fiber optic cable) Wireless transmission
What are Metallic Wires within cables? The data is encoded into electrical impulses
What is Glass or plastic fibers (fiber optic cable)? The data is encoded as pulses of light
What are Wireless Transmission? The data is encoded using wavelengths from the electromagnetic spectrum
Why do Diagrams of networks use symbols? To represent the different devices and connections that make up a network. A diagram provides an easy way to understand how devices in a large network are connected.
What is a Topology Diagram? A “picture” of a net. It provides an ez way 2 understand how devs in a large net r connected. It givesThe ability to recognize the logical reps of the physical networking components is critical 2 being able to visualize the org and operation of a net.
What is a Network Interface Card (NIC) A LAN adapter, provides the physical connection to the network at the PC or other end device. The media that are connecting the PC to the networking device, plug directly into the card.
What is a physical port? A connector or outlet on a networking device where the media is connected to an end device or another networking device.
What is a Network Interface? It is a Specialized ports on a networking device that connect to individual networks. The routers are used to interconnect networks..
What are examples of Network Media? Wireless Media Lan Media Wan Media
What are Topology Diagrams? They provide a visual map of how the network is connected. There are two types.
What are Physical Topology Diagrams? They Identify the physical location of intermediary devices and cable installation. Logical topology diagrams - Identify devices, ports, and addressing scheme. (Figure 2)
What are Logical Topology Diagrams? They Identify devices, ports, and addressing scheme.
How do Network Infrastructures Vary? Size of the area covered Number of users connected Number and types of services available Area of responsibility
What is a Local Area Network (LAN)? A network infrastructure that provides access to users and end devices in a small geographical area, which is typically an enterprise, home, or small business network owned and managed by an individual or IT department.
What is a Wide Area Network (WAN)? A network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a telecommunications service provider.
What is a Metropolitan Area Network (MAN)? A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization.
What is a Wireless LAN (WLAN)? Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
What is a Storage Area Network (SAN)? A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.
What are Specific features of LANs? Interconnect end devs in limited area ex. home, school, office building, campus. Administered by 1 org or ind. Administrative ctrl governs sec & access ctrl policies r enforced on net lvl. Provide high speed band 2 int end devs and intermediary devices
Who manages WANs? Service Providers (SP) or Internet Service Providers (ISP).
What are Specific features of WANs? WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents. WANs are usually administered by multiple service providers. WANs typically provide slower speed links between LANs.
How can one view the Internet? A collection of interconnected LANs and WANs. Some of the LAN ex.s are connected to each other through a WAN connection.
How are WANs connected? WANs are connected to each other with The red WAN connection lines represent all the varieties of ways we connect networks. WANs can connect through copper wires, fiber optic cables, and wireless transmissions.
Who is in charge of the Internet? There R organizations that have been developed 4 the purpose of helping 2 maintain structure & standardization of Internet protocols and processes.
What organizations set the standards for the Internet? the Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB),
What does internet mean? Is used to describe multiple networks interconnected.
What does the term Internet (with a capital “I”) mean? Referring to the global system of interconnected computer networks or the World Wide Web, the term Internet (with a capital “I”) is used.
What is the Intranet? A private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization
What is an Extranet? It provide secure and safe access to individuals who work for a different organization, but require access to the organization’s data. Examples of extranets include:
What are Examples of extranets? A company that is providing access 2 outside suppliers & contractors. A hospital that is providing a booking system 2 drs to make appointments 4 patients. An office of ed that is providing budget and personnel information to schools in its district.
What are many different ways to connect users and organizations to the Internet? Home usrs, teleworkers (remote workers), small offices require connection 2 Int Serv Prov (ISP) 2 access Int. Connection opts vary bet ISP & geog loc. Pop choices broadband cable, broadband digital subscriber line (DSL), wireless WANs, & mobile servs.
How do organizations access corporate sites and the Internet? Organizations typically require access to other corporate sites and the Internet. Fast connections are required to support business services including IP phones, video conferencing, and data center storage.
What are the connection options? Cable DSL - Digital Subscriber Lines Cellular Satellite Dial-up Telephone
What is a cable connection? Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
What is a DSL - Digital Subscriber Lines connection? It provides a high bandwidth, always on, connection to the Internet. It runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
What is a cellular connection? This Internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
What is a Satellite connection? The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
What is a Dial-up Telephone connection? An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
What type of cable do many homes and small offices connect with? Many homes and small offices are more commonly being connected directly with fiber optic cables. This enables an ISP to provide higher bandwidth speeds and support more services such as Internet, phone, and TV.
What are Businesses Internet Connection? Businesses may require higher bandwidth, dedicated bandwidth, and managed services. Connection options available differ depending on the type of service providers located nearby.
What are common connection options for businesses? Dedicated Leased Line Ethernet WAN DSL Satellite
What are Dedicated Leased Line ? They are actually reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
What are Ethernet WAN ? They extend LAN access technology into the WAN. The benefits of Ethernet are now being extended into the WAN
What are Symmetric Digital Subscriber Lines (SDSL) ? Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
What is a Satellite? Similar to small office and home office users, satellite service can provide a connection when a wired solution is not available.
What is a network architecture? It refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
What are the four basic characteristics of network architecture? Fault Tolerance Scalability Quality of Service (QoS) Security
What is Fault Tolerance? A net that limits impact of a failure, fewest no. of devs R affected. Is built 2 allow quick rec when failure occurs. Nets depend on mult paths bet srce & dest mess. If 1 path fails, mess can be sent over a diff link. Redundant path.
How does network provide redundancy? One way reliable networks provide redundancy is by implementing a packet-switched network.
What is a packet-switched network? Packet switching splits traffic into packets that are routed over a shared network.
How are the packets routed? A 1 message, an email or a video stream, is broken into mult mess blocks, called packets. Each packet has the addressing info of the source & dest of the message. Routers in the net switch the packets based on the cond of the net at that moment.
Do all packets take the same route? All the packets in a single message could take very different paths to the destination. the user is not aware and is unaffected by the router dynamically changing the route when a link fails.
What is circuit-switched networks? These networks used for voice communications. This network is one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
What is a scalable network ? It can exp quick 2 sup usrs & apps w/o impacting perf of serv being del 2 existing usrs. Designers follow accepted standards & protocols. Allows sw & hw vends 2 focus on imp prods & servs w/o worrying about designing a rules 4 operating w/in net.
Why is Quality of Service (QoS) important in today's network? As data, voice, and video content continue to converge onto the same network, QoS becomes a primary mechanism for managing congestion and ensuring reliable delivery of content to all users.
When does congestion occur? Congestion occurs when the demand for bandwidth exceeds the amount available. When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion.
How is Network bandwidth measured? Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).
What happens when the volume of traffic is greater than what can be transported across the network? The devices queue, or hold, the packets in memory until resources become available to transmit them.
What are The two types of network security concerns that must be addressed? The network infrastructure security and information security.
How do you Secure a network infrastructure ? The physical securing of devices that provide network connectivity, and preventing unauthorized access to the management software that resides on them,
What does Information security refers to? Protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices.
What are the three primary requirements, In order to achieve the goals of network security? Confidentiality Integrity Availability
What is Data confidentiality ? Only the intended and authorized recipients can access and read data.
What is Data integrity? Having the assurance that the information has not been altered in transmission, from origin to destination.
What is Data availability? Having the assurance of timely and reliable access to data services for authorized users.
What are two characteristics of Fault Tolerance? 1. Networks should always be available. 2. Data can travel through more than one route for delivery from a remote source.
What are two characteristics of Scalability? 1. Networks can grow or expand with minimal impact on performance. 2. Common Network Standards allow hardware and software vendors to focus on product improvements and services.
What are two characteristics of Quality of Service (QoS)? 1. Priority Queues are implemented when demand for network bandwidth exceeds supply. 2. Developing a plan for priority queuing is a strategy for quality delivery of information
What are two characteristics of Security? 1. Business and Personal equipment must be protected. 2. Business and Personal data must be protected.
What is Bring Your Own Device (BYOD)? The concept of any device, to any content, in any manner, is a major global trend that requires significant changes to the way devices are used.
What is Collaboration? “the act of working with another or others on a joint project.”
What is an example of a Collaboration tools? Cisco WebEx give employees, students, teachers, customers, and partners a way to instantly connect, interact, and achieve their objectives.
What do they use video for? For communications, collaboration, and entertainment.Video is becoming a critical requirement for effective collaboration as organizations extend across geographic & cultural boundaries.
What are examples of Video technology? Video calls can be made to and from anywhere with an Internet connection. Video conferencing is a powerful tool for communicating with others at a distance, both locally and globally.
What is Cloud Computing? It allows us to store personal files, even backup our entire hard disk drive on servers over the Internet. Applications such as word processing and photo editing can be accessed via the internet.
What does Cloud Computing do for business? It extends IT's capabilities w/o requiring investment in new infrastructure, training new personnel, or licensing new sw. These services r available on demand & delivered economically 2 any device anywhere in the world w/o compromising sec or function.
What are The four primary types of Clouds? Public Clouds, Private Clouds, Hybrid Clouds, and Custom Clouds.
What are data centers? A facility used to house computer systems and associated components. A data center can occupy one room of a building, one or more floors, or an entire building.
Why do only large companies use data centers? Data centers are typically very expensive to build and maintain. For this reason, only large organizations use privately built data centers to house their data and provide services to users
What do small companies use? Smaller organizations that cannot afford to maintain their own private data center can reduce the overall cost of ownership by leasing server and storage services from a larger data center organization in the Cloud.
What are Custom Clouds? The most common vector for data loss includes instant messaging software and social media sites. For instance, intercepted email or IM messages could be captured and reveal confidential information.
What is A hybrid cloud? It is made up of 2 or more clouds (ex: pt custom, pt public), where each pt remains a distinctive obj, but both r connected using a single architecture. Individuals on a cloud would be able 2 have degs of access to various servs based on usr acc rights.
What is a public cloud? Cloud-based applications and services offered to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. This type of cloud uses the Internet to provide services.
What is Smart home technology ? It is technology that is integrated into every-day appliances allowing them to interconnect with other devices, making them more ‘smart’ or automated.
What is Power Line Networking? It is an emerging trend for home networking that uses existing electrical wiring to connect devices.
What does "no new wires" means? Ability 2 connect a dev 2 net wherever there is an elec outlet. Saves cost of installing data cables & w/o any add cost 2 the elec- bill. Using the same wiring that delivers electricity, powerline net sends info by sending data on certain frequencies.
When is Powerline networking useful? Powerline networking is especially useful when wireless access points cannot be used or cannot reach all the devices in the home.
What is Powerline networking designed for? Powerline networking is not designed to be a substitute for dedicated cabling in data networks. However, it is an alternative when data network cables or wireless communications are not a viable option.
What are common technologies used to connect homes and small businesses to the Internet? . DSL, Cable and Wireless
What is Wireless Internet Service Provider (WISP)? It is an ISP that connects subscribers to a designated access point or hot spot using similar wireless tech found in home wireless lans (WLANs). THEY are more commonly found in rural environments where DSL or cable services are not available.
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.) 1. easy to create 2. less cost to implement 3. lacks centralized administration
Which device performs the function of determining the path that messages should take through internetworks? a router
What two criteria are used to help select a network medium from various network media? (Choose two.) 1. the environment where the selected medium is to be installed 2. the distance the selected medium can successfully carry a signal
Which two statements describe intermediary devices? (Choose two.) 1. Intermediary devices direct the path of the data. 2. Intermediary devices connect individual hosts to the network.
What are two functions of end devices on a network? (Choose two.) 1. They are the interface between humans and the communication network. 2. They originate the data that flows through the network.
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? wireless LAN
What type of network must a home user access in order to do online shopping? the Internet
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? the Internet
Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.) 1. DSL 2. cable
Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) 1. cellular 2. satellite
What type of network traffic requires QoS? video conferencing
Which expression accurately defines the term bandwidth? a measure of the data carrying capacity of the media
A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support? data confidentiality
Which statement describes a characteristic of cloud computing? Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.
What is the Internet? t provides connections through interconnected global networks.
Which statement describes the use of powerline networking technology? A device connects to an existing home LAN using an adapter and an existing electrical outlet.
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.) 1. installing antivirus software 2. implementing a firewall
A network is capable of delivering voice, video, text, and graphics over the same communication channels. converged
Fill in the blank. The acronym refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources. byod
podcast an audio-based medium that allows people to deliver their recordings to a wide audience
social media interactive websites where people create and share user-generated content with friends and family
wiki web pages that groups of people can edit and view together
instant messaging real-time communication between two or more people
DSL high bandwidth connection that runs over telephone line
dialup telephone typically has very low bandwidth
satellite not suited for heavily wooded areas
copy uses coaxial cable as a medium
ensuring confidentiality only the intended recipients can access and read the data
maintaining integrity The assurance that the information has not been altered during transmission
ensuring availability The assurance of timely and reliable access to data
An is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization. INTRANET
What are two characteristics of a scalable network? (Choose two.) 1. grows in size without impacting existing users 2, suitable for modular devices that allow for expansion
The project started the development of inter-network connections using TCP/IP that has evolved into the Internet today. ARPANET - Advanced Research Projects Agency Network
Which statement describes a characteristic of a converged network? A single network that delivers voice, video, and data to a variety of devices.
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? spyware
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network? VPN
How does BYOD change the way in which businesses implement networks?​ BYOD provides flexibility in where and how users can access network resources.
Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here? fault tolerance
Metro Ethernet high-speed business class copper or fiber connection
satellite requires a dish and clear line of sight for service
SDSL business class service that provides the same upload and download speeds over telephone lines
cable signal carried on the same copper or fiber medium as the television signal
cellular access via the cell phone network
Which three devices are considered end devices in a network? (Choose three.) 1. VoIP phone 2. security camera 3. TelePresence endpoint
In which scenario would the use of a WISP be recommended? a farm in a rural area without wired broadband access
What is a WAN? a network infrastructure that provides access to other networks over a large geographic area
What is an ISP? It is an organization that enables individuals and businesses to connect to the Internet.
Ready for Chapt 2 Quiz and Test
An IT tech has manually configured an IP addr on a laptop 4 a new employee. Each time employee tries to connect 2 the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again? C. Use DHCP to automatically assign addresses.
What command will prevent all un-encrypted passwords from displaying in plain text in a configuration file? D. (config)# service password-encryption
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.) B. displaying a list of all available commands within the current mode D. determining which option, keyword, or argument is available for the entered command
To save time, IOS commands may be partially entered and then completed by typing which key or key combination? A. Tab Refer to curriculum topic: 2.1.4
Which device acts as a gateway to allow hosts to send traffic to remote IP networks? C. local router Refer to curriculum topic: 2.3.1
A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring? B. SVI Refer to curriculum topic: 2.3.2
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) A. VTY interface B. console interface E. privileged EXEC mode
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? D. Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.) A. the hostname should be fewer than 64 characters in length C. the hostname should contain no spaces E. the hostname should begin with a letter
Fill in the blank. In order to test end-to-end connectivity, you would use the command. ping trace traceroute tracert
How is SSH different from Telnet? SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
True or False? Mobile devices do not require IP addresses to communicate on the Internet. False
Fill in the blank. The component of the operating software that provides the user interface is called the . shell
Which two statements are true regarding the user EXEC mode? (Choose two.) C. The device prompt for this mode ends with the ">" symbol. E. Only some aspects of the router configuration can be viewed.
Why would a technician enter the command copy startup-config running-config? C. to copy an existing configuration into RAM
What is the function of the kernel of an operating software? A. The kernel provisions hardware resources to meet software requirements.
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? B. SSH
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? A. Use the console port to locally access the switch from a serial or USB interface of the PC.
Which command or key combination allows a user to return to the previous level in the command hierarchy? C. exit
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display? C. user EXEC mode
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.) C. displaying a list of all available commands within the current mode E. determining which option, keyword, or argument is available for the entered command
Which information does the show startup-config command display?​ A. the contents of the saved configuration file in the NVRAM
Why is it important to configure a hostname on a device? D. to identify the device during remote access (SSH or telnet)
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.) C. SwBranch799 E. RM-3-Switch-2A4
How does the service password-encryption command enhance password security on Cisco routers and switches? B. It encrypts passwords that are stored in router or switch configuration files.
SW1# Configure Terminal Enter Configuration commands, one per line. End with CNTL/Z. SW1(config)# banner motd # Use of this device is restricted to authorized members of the Admin group.# SW1(config)# end SW1# D. to display a message when a user accesses the switch
Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command? D. to display a message when a user accesses the switch
While trying 2 solve a network issue, a tech made mult changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM? D. Issue the reload command without saving the running configuration.
Which statement is true about the running configuration file in a Cisco IOS device? D. It affects the operation of the device immediately when modified.
What are two characteristics of RAM on a Cisco device? (Choose two.) B. The contents of RAM are lost during a power cycle. C. The configuration that is actively running on the device is stored in RAM.
Which interface allows remote management of a Layer 2 switch? A. the switch virtual interface
Which interface is the default SVI on a Cisco switch? B. VLAN 1
Why would a Layer 2 switch need an IP address? B. to enable the switch to be managed remotely
What command can be used on a Windows PC to see the IP configuration of that computer? A. ipconfig
A technician is adding a new PC 2 a LAN. Aft unpacking components & making all connections, tech starts PC. Aft OS loads tech opens a browser, & verifies that PC can reach Internet. Why was PC able 2 connect 2 net with no additional configuration? C. The PC was preconfigured to use DHCP.
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? D. if there is connectivity with the destination device
Refer to the exhibit. A net tech is testing connectivity in a new net. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with? (Choose two.) B. connectivity: switch 2 D. no connectivity: PC-C
Exhibit show ot from show ip interface brief command exec on a sw. Ot is as follows: Refer 2 exhibit. What 3 facts can b determined from viewable ot of show ip interface brief command? (Choose three.) A. One device is attached to a physical interface. D. The default SVI has been configured. F. The switch can be remotely managed.
second mode Private Exec Mode
final mode Line configuration Mode
third mode Global configuration Mode
first mode user Exec Mode
- Tab - Completes the remainder of a partially typed command or keyword
Space bar - displays the next screen
- ? - provides context-sensitive help
Up Arrow - - Allows user to scroll backward through former commands
- Ctrl-C - - cancels any command currently being entered and returns directly to privileged EXEC mode
Ctrl-Shift-6 - - Allows the user to interrupt an IOS process such as ping or traceroute
Ready for Chapt 3 Quiz and Test.
Created by: amipotasnick
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards