click below
click below
Normal Size Small Size show me how
networking mod 1-3
| Question | Answer |
|---|---|
| During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? | spyware |
| Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? | extranet |
| A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe? | bring your own device |
| What is an ISP | It is an organization that enables individuals and businesses to connect to the Internet. |
| In which scenario would the use of a WISP be recommended? | a farm in a rural area without wired broadband access |
| What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users? | scalability |
| A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center | fault tolerance |
| What are two characteristics of a scalable network? (Choose two.) | grows in size without impacting existing users suitable for modular devices that allow for expansion |
| Which device performs the function of determining the path that messages should take through internetworks? | router |
| Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) | cellular satellite |
| What type of network must a home user access in order to do online shopping? | internet |
| How does BYOD change the way in which businesses implement networks? | BYOD provides flexibility in where and how users can access network resources. |
| An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network | VPN |
| What is the internet | it provides connections through interconnected global networks |
| What are two functions of end devices on a network? (Choose two.) | They originate the data that flows through the network. They are the interface between humans and the communication network. |
| Which statement is true about the running configuration file in a Cisco IOS device | It affects the operation of the device immediately when modified. |
| Which two statements are true regarding the user EXEC mode? (Choose two.) | The device prompt for this mode ends with the ā>ā symbol. Only some aspects of the router configuration can be viewed. |
| Which type of access is secured on a Cisco router or switch with the enable secret command? | privileged EXEC |
| What is the default SVI on a Cisco switch? | VLAN1 |
| When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.) | the hostname should be fewer than 64 characters in length the hostname should contain no spaces the hostname should begin with a letter |
| What is the function of the shell in an OS? | It interfaces between the users and the kernel. |
| A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display? | user EXEC mode |
| An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? | Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed. |
| Which memory location on a Cisco router or switch will lose all content when the device is restarted? | RAM |
| Why would a technician enter the command copy startup-config running- config? | to copy an existing configuration into RAM |
| Which functionality is provided by DHCP? | automatic assignment of an IP address to each host |
| Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.) | displaying a list of all available commands within the current mode determining which option, keyword, or argument is available for the entered command |
| Which memory location on a Cisco router or switch stores the startup configuration file? | NVRAM |
| To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used? | 10.1.0.0 |
| Which three acronyms/initialisms represent standards organizations? (Choose three.) | IANA IEEE IETF |
| What type of communication will send a message to all devices on a local area network? | broadcast |
| In computer communication, what is the purpose of message encoding? | to convert information to the appropriate form for transmission |
| Which message delivery option is used when all devices need to receive the same message simultaneously? | broadcast |
| What are two benefits of using a layered network model? (Choose two.) | it assists in protocol design It prevents technology in one layer from affecting other layers. |
| What is the purpose of protocols in data communications? | providing the rules required for a specific type of communication to occur |
| Which logical address is used for delivery of data to a remote network? | destination IP address |
| What is the general term that is used to describe a piece of data at any layer of a networking model? | protocol data unit |
| Which two protocols function at the internet layer? (Choose two.) | ICMP IP |
| Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices? | transport |
| Which type of communication will send a message to a group of host destinations simultaneously? | multicast |
| What process is used to receive transmitted data and convert it into a readable message? | decoding |
| What is done to an IP packet before it is transmitted over the physical medium? | It is encapsulated in a Layer 2 frame. |
| What process is used to place one message inside another message for transfer from the source to the destination? | encapsulation |
| A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? | HTTP, TCP, IP, Ethernet |
| An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? | intranet |
| Which statement describes the use of powerline networking technology? | A device connects to an existing home LAN using an adapter and an existing electrical outlet |
| A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has bee | security |
| What type of network traffic requires QoS? | video conferencing |
| At which OSI layer is a source port number added to a PDU during the encapsulation process? | transport layer |
| At which OSI layer is a destination MAC address added to a PDU during the encapsulation process? | data link layer |
| At which OSI layer is a source port number added to a PDU during the encapsulation process? | transport layer |
| At which OSI layer is a source MAC address added to a PDU during the encapsulation process? | data link layer |
| At which OSI layer is a destination IP address added to a PDU during the encapsulation process? | network layer |
| At which OSI layer is data added to a PDU during the encapsulation process? | application layer |
| At which OSI layer is a source IP address added to a PDU during the encapsulation process? | network layer |
| At which OSI layer is data added to a PDU during the encapsulation process? | application layer |
| At which OSI layer is a destination port number added to a PDU during the encapsulation process? | transport layer |
| At which OSI layer is a source IP address added to a PDU during the encapsulation process? | network layer |
| What term describes the ability to use personal devices across a business or campus network? | BYOD |
| What term describes a private collection of LANs and WANs that belongs to an organization | intranet |
| What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video | quality of service |
| What term describes a technology that allows devices to connect to the LAN using an electrical outlet? | powerline networking |
| What term describes a type of network used by people who work from home or from a small remote office? | SOHO network |
| What term describes a computing model where server software runs on dedicated computers? | client/server |
| What term describes a type of network used by people who work from home or from a small remote office? | SOHO network |
| What term describes a network where one computer can be both client and server? | peer-to-peer |
| What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device? | cloud |
| Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the IP address of the switch virtual interface (SVI) on Switch0? | 192.168.5.10 |
| Which device performs the function of determining the path that messages should take through internetworks? | router |
| At which layer of the OSI model would a logical address be added during encapsulation? | network layer |
| Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.) | data link physical |
| A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? | Ethernet, IP, TCP, HTTP |
| Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond? | response timeout |
| Which PDU format is used when bits are received from the network medium by the NIC of a host? | frame |
| What layer is responsible for routing messages through an internetwork in the TCP/IP model? | internet |
| What process involves placing one PDU inside of another PDU? | encapsulation |
| When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address? | subnet mask |
| Which name is assigned to the transport layer PDU? | segment |
| What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) | DHCP DNS FTP |
| What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? | flow control |