Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

NETWORKING 1 MIDTERM

QuestionAnswer
Coaxial cable encodes data into? Group of answer choices Light signal Electrical impulses Radio frequencies Sound waves Electrical Impulses
Which attack slows down or crashes equipment and programs? Group of answer choices Virus, worm or Trojan Horse Firewall Zero day or Zero hour Denial of Service Denial of Service (DoS)
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch? Group of answer choices Aux Telnet Console SSH Console
How is an IPv4 address represented? four decimal numbers between 0 and 255 separated by periods four decimal numbers between 0 and 222 separated by colons thirty-two hexadecimal numbers separated by periods four decimal numbers between 0 and 255 separated by periods
This is a specific parameter defined in the operating system Group of answer choices syntax code keyword argument keyword
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Group of answer choices Kernel Hardware Shell Software Kernel
This standards organization is responsible for IP address allocation and domain name management. Internet Architecture Board (IAB) Internet Assigned Numbers Authority (IANA) Internet Society (ISOC) Internet Engineering Task Force (IETF) Internet Assigned Numbers Authority (IANA)
Which are true regarding network layer and data link layer addresses? (Choose three.) Network layer addresses are either 32 or 128 bits in length. Data link layer addresses are physical and network layer addresses are logical. Network layer addresses a Network layer addresses are either 32 or 128 bits in length. Data link layer addresses are physical and network layer addresses are logical. Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits.
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. True
Which two protocols belong in the TCP/IP model application layer? Group of answer choices DNS EIGRP DHCP OSPF DNS and DHCP
Which type of UTP cable is used to connect a PC to a switch port? Group of answer choices straight-through rollover crossover console Straight-through
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device needs mobility when connecting to the network. The end-user device needs mobility when connecting to the network.
What is the definition of bandwidth? the measure of usable data transferred over a given period of time the speed at which bits travel on the network the amount of data that can flow from one place to another in a given amount of time the amount of data that can flow from one place to another in a given amount of time
Why are two strands of fiber used for a single fiber optic connection? They increase the speed at which the data can travel. They allow for full-duplex connectivity. The two strands allow the data to travel for longer distances without degrading. They allow for full-duplex connectivity.
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? the use of CSMA/CA the virtually unlimited availability of IPv6 addresses the use of full-duplex capable Layer 2 switches the development of half-duplex switch operation the use of full-duplex capable Layer 2 switches
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? ring hierarchical mesh bus mesh
Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) International Telecommunication Union (ITU) International Organization for Standardization (ISO) International Telecommunication Union (ITU) International Organization for Standardization (ISO)
What is auto-MDIX? Group of answer choices a type of Cisco switch an Ethernet connector type a type of port on a Cisco switch a feature that detects Ethernet cable type a feature that detects Ethernet cable type
What type of address is 01-00-5E-0A-00-02? an address that reaches every host inside a local subnet an address that reaches one specific host an address that reaches every host in the network an address that reaches a specific group of hosts an address that reaches a specific group of hosts
Which statement is true about MAC addresses? A NIC only needs a MAC address if connected to a WAN. The first three bytes are used by the vendor assigned OUI. The ISO is responsible for MAC addresses regulations. The first three bytes are used by the vendor assigned OUI.
Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped? Group of answer choices TTL Hop Limit Address Unreachable No Route to Destination Hop Limit
A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next? create a new Layer 2 Ethernet frame to be sent to the destination create a new Layer 2 Ethernet frame to be sent to the destination
Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.) Group of answer choices router solicitation router advertisement neighbor solicitation neighbor advertisement neighbor solicitation neighbor advertisement
A router boots and enters setup mode. What is the reason for this? The IOS image is corrupt. Cisco IOS is missing from flash memory. The configuration file is missing from NVRAM. The POST process has detected hardware failure. The configuration file is missing from NVRAM.
Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. router commands providing the highest level of security? enable secret trus
What is the purpose of the startup configuration file on a Cisco router? to contain the configuration commands that the router IOS is currently using to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS to contain the commands that are used to initially configure a router on startup
Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status? show ip interface brief ping show ip route show interface fa0/1 show ip interface brief
Which two characteristics describe Ethernet technology? (Choose two.) It is supported by IEEE 802.3 standards. It typically uses an average of 16 Mb/s for data transfer rates. It uses the CSMA/CD access control method. It is supported by IEEE 802.3 standards. It uses the CSMA/CD access control method.
What is the special value assigned to the first 24 bits of a multicast MAC address? Group of answer choices 01-5E-00 FF-00-5E FF-FF-FF 01-00-5E 01-00-5E
Which field in an IPv4 packet header will typically stay the same during its transmission? Group of answer choices Flag Time-to-Live Packet Length Destination Address Destination Address
How does the network layer use the MTU value? The MTU is passed to the network layer by the data link layer. The MTU is passed to the network layer by the data link layer.
When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination? Group of answer choices destination MAC address source IP address destination IP address source MAC address destination IP address
What is the purpose of ARP in an IPv4 network? to obtain a specific MAC address when an IP address is known to forward data onward based on the destination MAC address. to obtain a specific MAC address when an IP address is known
What type of information is contained in an ARP table? Group of answer choices switch ports associated with destination MAC addresses domain name to IP address mappings routes to reach destination networks IP address to MAC address mappings IP address to MAC address mappings
Created by: 111lh
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards