Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CCENT Exam

QuestionAnswer
Which of the following protocols are examples of TCP/IP transport layer? (Choose two) A) Ethernet B) HTTP C) IP D) UDP E) SMTP F) TCP D) UDP F) TCP
Which two of the following protocols are examples of TCP/IP data link layer protocols? A) Ethernet B) HTTP C) IP D) UDP E) SMTP F) TCP G) PPP A) Ethernet G) PPP
The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? A) same-layer interaction B) Adjacent-layer interaction C) OSI model D) All of these answers are correct B) Adjacent-layer interaction
The process of TCP one computer marking a TCP segment as segment 1 and the receiving computer then acknowledging the receipt of TCP segment 1 is an example of what? A) data encapsulation B) same layer-interaction C) Adjacent-layer interaction D) OSI model B) Same-layer interaction
The process of a web server adding a TCP Header to the contents of a web page, followed by adding an IP header and then adding a data link header and trailer, is an example of what? A) data encapsulation B) same-layer interaction C) OSI model D) All of A) data encapsulation
Which of the following terms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers? A) data B) Chunk C) segment D) frame E) packet D) frame
Which OSI layer defines the functions of logical network-wide addressing and routing? Layer 3 the network layer
Which OSI layer defines the standards for cabling and connectors? Layer 1 the physical layer
In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN? A) only the devices that use cables A) only the devices that use cables are using ethernet
What Ethernet standard defines gigabit Ethernet over utp cabling? 1000BASE-T
Which of the following is true about Ethernet crossover cables for fast Ethernet? A) pins 1 and 2 are reversed. On the ootherend of the cable B) pins 1 and 2 on one end of the cable connect to pins 3 and 6 not the other end of the cable C) pins 1 and 2 on B) pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable
Each answer lists faithless of devices used in a 100BASE-T network. If these devices were connected with UTP Ethernet cables, which pairs of devices would require a straight-through cable? (Choose three) A) PC and Router B) PC and Switch C) Hub and Switch B) PC and Switch D) Router and Hub E) Wireless access point (Ethernet port) and Switch
Which of the following is true about the CSMA/CD algorithm? A) the algorithm never allows collisions to occur B) Collisions can happen, but the algorithm defines how the computers should notice a collisions and how to recover C) The algorithm works with B) Collisions can happen, but the algorithm defines how the computers should notice a collisions and how to recover
Which of the following is true about the Ethernet FCS field? A) Ethernet uses FCS for error recovery. B) It is 2 bytes long C)It resides in the Ethernet trailer not the Ethernet header D) It is used for encryption C) It resides in the Ethernet trailer not the Ethernet header
Which of the following are true about the format of Ethernet addresses? (Choose three) A) each manufacturer puts a unique OUI code into the first 2 bytes of the address B) each manufacturer puts a unique OUI code into the first 3 bytes of the address C) B) each manufacturer puts a unique OUI code into the first 3 bytes of the address C) each manufacturer puts a unique OUI code into the first half of the address E) the part of the address that hold this manufacturers code is called the OUI
Which of the following term describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? (Choose two) A) Burned-in address B) Unicast address C) Broadcast address D) Multicast address C) Broadcast address D) Multicast address
In the cabling for a leased line, which of the following typically connects to a four-wire line provided by a Telco? A) router serial interface without internal CSU/ CSU B) CSU/CSU C) router serial interface with internal transceiver D) switch serial inte B) CSU/DSU
Which of the following is an accurate speed at which a leased line can operate in the United States? A) 100Mbps B) 100Kbps C) 256Kbps D) 6.4Mbps C) 256Kbps
Which of the following fields in the HDLC header used by Cisco routers does Cisco add, beyond the ISO standard HDLC? A) flag B) type C) address D) FCS B) type
Two routers R1 and R2 connect using an Ethernet over MPLS service. The service provides point-to-point service between these two routers only as a layer 2 Ethernet service. Which of the following are the most likely to be true about this WAN? (Choose two) B) R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence D) R1 will forward data-link frames to R2 using an Ethernet header/trailer
Which of the following Internet access technologies used to connect a site to an ISP offers asymmetric speeds? (Choose two) A) leased lines B) DSL C) Cable Internet D) BGP B) DSL C) Cable Internet
Fred has just added DSL service at his home with a separate DSL modem and consumer-grade router with four Ethernet ports. Fred wants to use the same old phone he was using before the installation of DSL. Which is most likely true about the phone cabling a He uses the old phone, cabled to an existing telephone port and not to any new device
Which of the following are functions of the OSI layer 3 protocols? (Choose two) A) logical addressing B) physical addressing C) path selection D) arbitration E) error recovery A) logical addressing C) path selection
Which of the following is a valid class C IP address that can be assigned to a host? A) 1.1.1.1 B) 200.1.1.1 C) 128.128.128.128 D) 224.1.1.1 B) 200.1.1.1
What is the assignable range of values for the first octet for class A IP networks? 1-126
PCCAn PCCAre on two different Ethernet LANs that are separated by an IP router. PC1s IP address is 10.1.1.1 and no subletting is used. Which of the following addresses could be used for PC2? A) 10.1.1.2 B) 10.2.2.2 C) 10.200.200.1 D) 9.1.1.1 E) 225.1.1.1 D) 9.1.1.1 F) 1.1.1.1
Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with PC1 sharing the Ethernet with Router1 and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, what is true? Router1 strips the Ethernet header and trailer off the frame received from PC1 never to be used again
What does a router normally use when making a decision about routing TCP/IP packets? Destination IP address
What is true about a LAN-connected TCP/IP host and its IP routing (forwarding) choices? The host sends packets to its default gateway if the destination IP address is in a different class of IP network than the host or in a different subnet than the host
What are two functions of a routing protocol? Advertising known routes to neighboring routers and learning routes and putting those routes into the routing table for routes advertised to router by its neighboring routers
A company implements a TCP/IP network, with PC1 sitting on an Ethernet LAN. What protocols and features requires PC1 to learn information from some other server device? DNS
What two header fields identify which TCP/IP application gets data received by the computer? TCP port number and UDP port number
What are four typical functions of TCP? Flow control (widowing), error recovery, multiplexing using port numbers, and ordered data transfer
What function is performed by both TCP and UDP? Multiplexing using port numbers
What are two names for data that includes the layer 4 protocol header and data given to layer 4 by the upper layers not including any headers and trailers from layers 1 to 3? Segment or L4PDU
In the URL which art identifies the web server? www.certskills.com
Fred opens up a web browser and connects to the www.certskills.com website. What are two things that are typically true about what happens between Fred's web browser and the web server? Messages flowing to the client typically use a source TCP port number of 80 and messages flowing to the server typically use TCP
In what two modes can you type the command show mac address-table and expect to get a response with MAC table entries? User mode and enable mode
In which mode of the CLI could you type the command reload and expect the switch to reboot? Enable mode
What is a difference between Telnet and SSH as supported by a Cisco switch? SSH encrypt all data exchange, including login passwords; Telnet encrypts nothing
What type of switch memory is used to store the configuration used by the switch when it is up and working? RAM
What command copies the configuration from RAM into NVRAM? Copy running-config startup-config
A switch user is currently in console line configuration mode. What two command options would place the user in enable mode? Using the end command once or pressing the Ctrl + z key sequence once
What statement best describes partbof the process of how a switch decides to forward a frame for a known Unicast MAC address? It compares the Unicast destination address the bridging, or MAC address table
What statement best describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
What statement best describes what a switch does with a gram destined for an unknown Unicast address? It forwards out all interfaces in the same VLAN except for the incoming interface
What comparison does a switch make when deciding whether a new MAC address should be added to its MAC table? It compares the unicast source address to the bridging or MAC address table
A Cisco catalyst switch had 24 10/100 ports, numbered 0/1 through 0/24. Ten PsC connect to the ten lowest numbered port, with those PCs working and sending data over the network. The other ports are not connected to any device. What will the show interfac Port fast ethernet 0/5 is in a connected state
Consider the output from a Cisco catalyst switch : sw1# show Mac address-table dynamic 1: 02aa.aaaa.aaaa: dynamic: gi0/1 1: 02bb.bbbb.bbbb: dynamic: gi0/2 1: 02cc.cccc.cccc: dynamic: gi0/3 Total Mac addresses for this criterion:3 02cc.cccc.cccc was learned from the source MAC address of a frame that entered port gi0/3
Imagine that you have configured the enable secret command, followed by the enable password command , from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged Enable secret
An engineer wants to set up simple password protection with no usernames for some switches in a lab, for the purpose of keeping curious Co-workers from logging into the cab switches from their desktop PCs.what command would be a useful part of that config A login vty mode subcommand
An engineer had formerly configured a Cisco 2960 switch to allow tenet access so that the switch expected a password of mypassword from the telnet user. The engineer then changed the configuration support secure shell. Which two commands could have been p Username <name> secret <password> vty mode subcommand and login local vty mode subcommand
An engineers desktop PC connects to a switch at the main site. A router at the main site connects to each branch office through a serial link, with one small router and switch at each branch . which 3 commands must be configured on the branch office switc The IP address command in interface configuration mode, the IP default-gateway command in global configuration mode, and the password command in vty line configuration mode
A layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows address 172.16.2.250 with mask 255.255.255.0 is reserved fir use by this new LAN switch, and that 172.16.2.254 is already configured on the router conne The ip address 172.16.2.250 255.255.255.0 command in interface VLAN 2 configuration mode and the ip default-gateway 172.16.2.254 command in the global configuration mode
What line subcommand tells a switch to wait until a show commands output has completed before displaying log messages on the screen? Logging synchronous
What describes a way to disable IEEE standard autonegotiation on a 10/100 port on a Cisco switch? Configure the speed 100 and duplex full interface subcommands
What mode of the CLI could you configure the duplex setting for the interface fast ethernet 0/5? Interface configuration mode
A Cisco catalyst switch connects with its gigabit0/1 port to an end users PC. The end user thinking the user is helping manually sets the PCs OSlo use a sowed of 1000Mbps and to use full duplex and disables the use of autonegotiation. The switch's G0/1 po Full duplex and 1000Mbps
What is required when configuring port security with sticky learning? Enabling port security with the switchport port-security interface subcommand.
A switch's port g0/1 has been correctly enabled with port security. The configuration sets the violation mode to restrict. A frame that violates the port security policy enters the interface followed by a frame that does not. What 2 things describe what h The switch generates syslog messages about the violating traffic for the first frame and the switch increments the violation counter for gi0/1 by 1
Created by: bor771729
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards