Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

NWM1-M3

QuestionAnswer
Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. Group of answer choices Satellite Cable DSL Cellular DSL
Identify the Intermediary device. Group of answer choices telephone TV printer router router
Which option creates a secure connection for remote workers? Group of answer choices Zero day or Zero hour Firewall Virtual Private Network Virus, worm or Trojan Horse Virtual Private Network
These applications help to protect end devices from becoming infected with malicious software. Group of answer choices Antivirus and antispyware Intrusion prevention systems Virtual private networks Access control lists Antivirus and antispyware
Coaxial cable encodes data into? Group of answer choices Sound waves Light signal Electrical impulses Radio frequencies Electrical impulses
Which statement is true regarding the user EXEC mode? The device prompt for this mode ends with the ">" symbol.
The physical part of a computer including underlying electronics. Group of answer choices Hardware Kernel Shell Software Hardware
Which statement is true about the running configuration file in a Cisco IOS device? It affects the operation of the device immediately when modified.
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? (config)# service password-encryption
What is the command to assign the name "Switch-1-Floor" to a switch? Group of answer choices host Switch-1-Floor hostname Switch-1-Floor host name Switch-1-Floor name Switch-1-Floor hostname Switch-1-Floor
True or false? The right-most part of an IP address is used to identify the network that a device belongs to. Group of answer choices True False False
Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.) Data link layer addresses are physical and network layer addresses are logical. Network layer addresses are either 32 or 128 bits in length. Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits.
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.) Group of answer choices Routing Protocols Internet Protocol File Transfer Messaging Routing Protocols Internet Protocol Messaging
This protocol is responsible for guaranteeing the reliable delivery of information. Group of answer choices IP Ethernet HTTP TCP TCP
What is the process of converting information into the proper form for transmission? Group of answer choices Decoding Encapsulation Formatting Encoding Encoding
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device needs mobility when connecting to the network.
Why are two strands of fiber used for a single fiber optic connection? They allow for full-duplex connectivity.
What is indicated by the term throughput? the measure of the bits transferred across the media over a given period of time
Which characteristic describes crosstalk? the distortion of the transmitted messages from signals carried in adjacent wires
What is the definition of bandwidth? the amount of data that can flow from one place to another in a given amount of time
What is the equivalent to hexadecimal of the decimal 61 ? Group of answer choices 3E 40 3F 3D 3D
What is the equivalent to hexadecimal of the decimal 22 ? Group of answer choices 15 16 14 17 16
What is the equivalent to decimal of the hexadecimal 2A ? Group of answer choices 43 40 41 42 42
What is the equivalent to hexadecimal of the decimal 43 ? Group of answer choices 2A 29 2B 2C 2B
What is the equivalent to hexadecimal of the decimal 42 ? Group of answer choices 2B 2A 29 2C 2A
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? Group of answer choices data link physical application transport data link
Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) International Telecommunication Union (ITU) International Organization for Standardization (ISO)
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? mesh
What identifier is used at the data link layer to uniquely identify an Ethernet device? Group of answer choices TCP port number MAC address sequence number IP address MAC address
Which data link layer media access control method does Ethernet use? Group of answer choices token passing CSMA/CD determinism turn taking CSMA/CD
Which option blocks unauthorized access to your network? Group of answer choices Firewall Zero day or Zero hour Virus, worm or Trojan Horse Virtual Private Network Firewall
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Group of answer choices Fault Tolerance Scalability Quality of Service (QoS) Security Security
Identify the Intermediary device. Group of answer choices modem TV telephone printer modem
These attacks slow or crash applications and processes on a network device. Group of answer choices Identity Theft Virus Spyware Denial of Service Denial of Service
True or False? Mobile devices do not require IP addresses to communicate on the Internet. Group of answer choices True False False
What is the command to assign the name "Sw1" to a switch? Group of answer choices name Sw1 host Sw1 hostname Sw1 host name Sw1 hostname Sw1
What is the correct format for IPv4 address? Group of answer choices 192.168.0.1 AB-CD-EF-10 192:168:1:4 aa.ab.cd.af 192.168.0.1
A switch with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the switch boots up, which mode will display? user EXEC mode
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? Copy the running configuration to the startup configuration file.
This standards organization is responsible for IP address allocation and domain name management. Internet Assigned Numbers Authority (IANA)
What is the process of dividing a large data stream into smaller pieces prior to transmission? Group of answer choices multiplexing duplexing segmentation sequencing segmentation
What is the PDU associated with the transport layer? Group of answer choices segment packet frame bits segment
Which two protocols belong in the TCP/IP model application layer? Group of answer choices OSPF EIGRP DNS DHCP DNS DHCP
Which protocol operates at the network access layer of the TCP/IP model? Group of answer choices IP DNS HTTP Ethernet Ethernet
What is a characteristic of UTP cabling? Group of answer choices cancellation cladding woven copper braid or metallic foil immunity to electrical hazards cancellation
Which type of UTP cable is used to connect a PC to a switch port? Group of answer choices console rollover straight-through crossover straight-through
What is one advantage of using fiber optic cabling rather than copper cabling? It is able to carry signals much farther than copper cabling.
What is the equivalent to decimal of the hexadecimal CB ? Group of answer choices 203 204 202 205 203
What is the equivalent to decimal of the hexadecimal 5A ? Group of answer choices 80 10 90 11 90
What is the equivalent to hexadecimal of the decimal 71 ? Group of answer choices 49 47 48 50 47
What is the equivalent to decimal of the hexadecimal A1 ? Group of answer choices 153 152 161 164 161
What type of physical topology can be created by connecting all Ethernet cables to a central device? Group of answer choices mesh bus star ring star
What attribute of a NIC would place it at the data link layer of the OSI model? Group of answer choices RJ-45 port attached Ethernet cable MAC address IP address MAC address
What are the two sublayers of the OSI model data link layer? (Choose two.) Group of answer choices MAC physical internet LLC MAC LLC
Which is a function of the Logical Link Control (LLC) sublayer? to identify which network layer protocol is being used
A worldwide collection of interconnected networks Group of answer choices Internet Ultranet Intranet Extranet Internet
Which of the following is the name for all computers connected to a network that participate directly in network communication? Group of answer choices media hosts intermediary devices servers hosts
Extend LAN access technology into the WAN. Group of answer choices Metro Ethernet Business DSL Satellite Dedicated Leased Line Metro Ethernet
Identify the end device. Group of answer choices router hub laptop switch laptop
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces. Group of answer choices Hardware Software Shell Kernel Shell
Which interface allows remote management of a Layer 2 switch? Group of answer choices the console port interface the switch virtual interface the AUX interface the first Ethernet port interface the switch virtual interface
Which command encrypts all plaintext passwords access on a switch? Group of answer choices secret class login enable secret class service password-encryption service password-encryption
This is a specific parameter defined in the operating system Group of answer choices syntax argument keyword code keyword
Which statement is true about the running configuration file in a Cisco IOS device? It affects the operation of the device immediately when modified
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. Group of answer choices True False True
BGP and OSPF are examples of which type of protocol? Group of answer choices network security service discovery routing network communication routing
What is the name of the process of adding protocol information to data as it moves down the protocol stack? Group of answer choices de-encapsulation segmentation sequencing encapsulation encapsulation
UDP and TCP belong to which layer of the TCP/IP protocol? Group of answer choices transport application internet network access transport
What type of cable is used to connect a workstation serial port to a Cisco router console port? Group of answer choices coaxial straight-through rollover crossover rollover
What is the equivalent to decimal of the hexadecimal A5 ? Group of answer choices 165 168 166 167 Quiz 165
What is the equivalent to hexadecimal of the decimal 63 ? Group of answer choices 3F 40 3E 3D 3F
What is the equivalent to hexadecimal of the decimal 23 ? Group of answer choices 16 15 14 17 17
What is the equivalent to decimal of the hexadecimal A8 ? Group of answer choices 166 167 168 165 168
What is the equivalent to hexadecimal of the decimal 64 ? Group of answer choices 3E 3F 40 3D 40
What method is used to manage contention-based access on a wireless network? Group of answer choices token passing CSMA/CA CSMA/CD priority ordering CSMA/CA
A characteristics of a network that can expands quickly to support new users and applications. Group of answer choices Security Quality of Service (QoS) Fault Tolerance Scalability Scalability
Identify the end device. Group of answer choices switch hub smart phone router smart phone
What command is used to save changes made to the running configuration to the startup configuration file. copy running-config startup-config
Which access method would be the most appropriate in-band access to the IOS over a network connection? Group of answer choices Console Aux HTTP Telnet/SSH Telnet/SSH
Which protocol stack layer encapsulates data into frames? Group of answer choices data link transport application network data link
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? IP at the Internet layer
Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.) Group of answer choices IPv4 ICMPv6 ICMPv4 TCP ICMPv6 ICMPv4
What types of standards are developed by the Electronics Industries Alliance (EIA)? electric wiring and connectors
What is used to determine the network portion of an IPv4 address? Group of answer choices left-most part of the MAC address MAC address subnet mask right-most part of the IP address subnet mask
Which statement correctly describes frame encoding? It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
Which standards organization oversees development of wireless LAN standards? Group of answer choices ISO IEEE TIA IANA IEEE
What is the equivalent to hexadecimal of the decimal 31 ? Group of answer choices 20 1F 22 21 1F
What is the equivalent to decimal of the hexadecimal A ? Group of answer choices 10 8 11 9 10
What is the equivalent to decimal of the hexadecimal A5 ? Group of answer choices 168 167 165 166 165
What is the equivalent to hexadecimal of the decimal 51 ? Group of answer choices 33 34 36 35 33
Which statement describes the half-duplex mode of data transmission? Data that is transmitted over the network flows in one direction at a time.
The source or destination of a message transmitted over the network. Group of answer choices Router End Device Intermediary device Switch End Device
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? Quality of Service (QoS)
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? Group of answer choices WAN LAN Extranet Intranet WAN
The acronym UTP stands for? Group of answer choices United Transport Protocol Universal Transmission Protocol Untwisted Transmission Pair Unshielded Twisted Pair Unshielded Twisted Pair
Which interface is the default SVI on a Cisco switch? Group of answer choices VLAN 1 GigabitEthernet 0/1 FastEthernet 0/1 VLAN 99 VLAN 1
Which IOS mode are you in if the Switch> prompt is displayed? Group of answer choices Global Configuration Mode User EXEC Mode Interface subconfiguration Mode Privileged EXEC Mode User EXEC Mode
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Group of answer choices Aux Telnet SSH Console Console
Why would a technician enter the command copy startup-config running-config? to copy an existing configuration into RAM
True or false. Standards organizations are usually vendor-neutral. Group of answer choices False True True
What is the purpose of the OSI physical layer? transmitting bits across the local media
What is the equivalent to decimal of the hexadecimal A4 ? Group of answer choices 153 164 161 152 164
What is the equivalent to decimal of the hexadecimal A7 ? Group of answer choices 165 167 166 168 167
What is the equivalent to decimal of the hexadecimal A3 ? Group of answer choices 164 163 152 161 163
What is the equivalent to hexadecimal of the decimal 21 ? Group of answer choices 14 17 15 16 15
Identify the end device. Group of answer choices switch hub printer router printer
This type of Internet connection is use in areas that would otherwise have no internet connectivity at all. Group of answer choices Cellular DSL Cable Satellite Satellite
Which option describes malicious code running on user devices? Group of answer choices Zero day or Zero hour Virtual Private Network Firewall Virus, worm or Trojan Horse Virus, worm or Trojan Horse
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? Group of answer choices Video Communications Smart Home Technology Cloud Computing BYOD Video Communications
What is the command to assign the name "Sw-Floor-2" to a switch? Group of answer choices name Sw-Floor-2 hostname Sw-Floor-2 host Sw-Floor-2 host name Sw-Floor-2 hostname Sw-Floor-2
This is stored in Random Access Memory (RAM). It reflects the current configuration. Group of answer choices latest-config bootup-config running-config startup-config running-config
True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. Group of answer choices True False False
Which two protocols are service discovery protocols? (Choose two.) Group of answer choices DHCP SSH TCP DNS DHCP DNS
What is the equivalent to decimal of the hexadecimal 8A ? Group of answer choices 138 88 127 137 138
What is the equivalent to decimal of the hexadecimal 7A ? Group of answer choices 10 122 87 118 122
What is the equivalent to hexadecimal of the decimal 62 ? Group of answer choices 40 3E 3D 3F 3E
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? Group of answer choices Security Scalability Fault Tolerance Quality of Service (QoS) Fault Tolerance
This attack steals the login credentials of a user in order to access private data. Group of answer choices Virus Data interception and theft Identity Theft Denial of Service Identity Theft
These are types of software which are installed on a user's device. The software then secretly collects information about the user. Group of answer choices Zero day or Zero hour Virtual Private Network Spyware and Adware Firewall Spyware and Adware
From the privileged EXEC mode, access the global configuration mode by entering what command? Group of answer choices enable secret line console 0 configure terminal configure terminal
This is not predefined; it is a value or variable defined by the user Group of answer choices code keyword syntax argument argument
Which delivery method is used to transmit information to a single device? Group of answer choices Broadcast Unicast Anycast Multicast Unicast
Which procedure is used to reduce the effect of crosstalk in copper cables? twisting opposing circuit wire pairs together
What is the equivalent to decimal of the hexadecimal CC ? Group of answer choices 202 205 204 203 204
What is the equivalent to decimal of the hexadecimal A6 ? Group of answer choices 165 166 168 167 166
What is the equivalent to decimal of the hexadecimal 4A ? Group of answer choices 71 74 73 72 74
What is the equivalent to decimal of the hexadecimal AD ? Group of answer choices 176 174 173 175 173
Which feature uses the same cellular technology as a smart phone? Group of answer choices Powerline Video Communications Wireless Broadband BYOD Wireless Broadband
What is the advantage of peer-to-peer networking? Group of answer choices Easy to set up More Secure Centralized administration Centralized Server Easy to set up
This attack captures private information from an organization's network. Group of answer choices Identity Theft Denial of Service Data interception and theft Virus Data interception and theft
To save time, IOS commands may be partially entered and then completed by typing which key or key combination? Group of answer choices Tab Up Arrow Ctrl-P Ctrl-N Tab key
Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices login banner @ Keep out # display # Keep out / banner motd # Keep out # banner # Keep out # banner motd # Keep out #
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? physical layer
A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. What are two possible causes of the signal distortion? the cellular phones that are used by the employees the microwave oven
What is the equivalent to decimal of the hexadecimal A2 ? Group of answer choices 161 162 153 164 162
What does a router do after de-encapsulating a received frame? Group of answer choices determines the best path re-encapsulates the packet into a new frame forwards the new frame onto the network medium de-encapsulates the frame determines the best path
Which statement describes the half-duplex mode of data transmission? Data that is transmitted over the network flows in one direction at a time.
Created by: Itsrmr
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards