click below
click below
Normal Size Small Size show me how
CS0013
FA1
| Question | Answer |
|---|---|
| Which of the following is the name for all computers connected to a network that participate directly in network communication? Group of answer choices media servers intermediary devices hosts | hosts |
| True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. Group of answer choices False True | True |
| What is one advantage of using fiber optic cabling rather than copper cabling? It is easier to terminate and install than copper cabling. It is able to carry signals much farther than copper cabling. | It is able to carry signals much farther than copper cabling. |
| Which statement correctly describes frame encoding? | It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits. |
| What is the equivalent to decimal of the hexadecimal 4A ? Group of answer choices 74 73 72 71 | 74 |
| A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? hierarchical bus mesh ring | mesh |
| What is true concerning physical and logical topologies? Logical topologies refer to how a network transfers data between devices. The logical topology is always the same as the physical topology. | Logical topologies refer to how a network transfers data between devices |
| True or false? The right-most part of an IP address is used to identify the network that a device belongs to. | False |
| Which delivery method is used to transmit information to all devices? Group of answer choices Unicast Anycast Multicast Broadcast | Broadcast |
| What is indicated by the term throughput? the guaranteed data transfer rate offered by an ISP the measure of the bits transferred across the media over a given period of time the measure of the usable data transferred across the media | the measure of the bits transferred across the media over a given period of time |
| What is the equivalent to hexadecimal of the decimal 61 ? Group of answer choices 3F 3D 3E 40 | 3D |
| Which option describes malicious code running on user devices? Group of answer choices Zero day or Zero hour Virtual Private Network Virus, worm or Trojan Horse Firewall | Virus, worm or Trojan Horse |
| Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices login banner # Warning # banner # Warning # banner motd # Warning # display # Warning # | banner motd # Warning # |
| Which protocol operates at the network access layer of the TCP/IP model? Group of answer choices DNS HTTP Ethernet IP | Ethernet |
| What is a characteristic of UTP cabling? Group of answer choices woven copper braid or metallic foil cladding cancellation immunity to electrical hazards | cancellation |
| A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? | The end-user device needs mobility when connecting to the network. |
| What is the purpose of the OSI physical layer? controlling access to media transmitting bits across the local media performing error detection on received frames d. exchanging frames between nodes over physical network media | transmitting bits across the local media |
| What is the equivalent to hexadecimal of the decimal 43 ? Group of answer choices 29 2C 2B 2A | 2B |
| What is the equivalent to decimal of the hexadecimal A7 ? Group of answer choices 165 167 166 168 | 167 |
| What is the equivalent to hexadecimal of the decimal 20 ? Group of answer choices 14 17 15 16 | 14 |
| What is the equivalent to decimal of the hexadecimal AF ? Group of answer choices 170 175 174 171 | 175 |
| What is the equivalent to decimal of the hexadecimal A8 ? Group of answer choices 167 166 165 168 | 168 |
| What are two services performed by the data link layer of the OSI model? (Choose two.) | It provides media access control and performs error detection. It accepts Layer 3 packets and encapsulates them into frames. |
| Which is a function of the Logical Link Control (LLC) sublayer? to identify which network layer protocol is being used to define the media access processes that are performed by the hardware to provide data link layer addressing | to identify which network layer protocol is being used |
| Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? Group of answer choices the use of CSMA/CA the development of half-duplex switch operation the use of full-duplex capable Layer 2 switches | the use of full-duplex capable Layer 2 switches |
| Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? Group of answer choices physical application transport data link | data link |
| Which standards organization oversees development of wireless LAN standards? Group of answer choices IEEE TIA ISO IANA | IEEE |
| Which two protocols belong in the TCP/IP model application layer? Group of answer choices DNS OSPF EIGRP DHCP | DNS DHCP |
| What is the order of the two addresses in the data link frame? Group of answer choices destination MAC, source MAC destination IP, source IP source MAC, destination MAC destination MAC, source IP | destination MAC, source MAC |
| What is the process of dividing a large data stream into smaller pieces prior to transmission? Group of answer choices duplexing segmentation multiplexing sequencing | segmentation |
| Which command enables password authentication for user EXEC mode access on a switch? Group of answer choices login enable secret class service password-encryption secret class | login |
| This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Group of answer choices running-config latest-config startup-config bootup-config | startup-config |
| What type of interface has no physical port associated with it? Group of answer choices console Ethernet serial Switch virtual interface (SVI) | Switch virtual interface (SVI) |
| What is the correct format for IPv4 address? Group of answer choices 256.0.2.4 193.64.64.256 192.168.0.5 192.256.0.0 | 192.168.0.5 |
| Means that only the intended and authorized recipients can access and read data. Group of answer choices Integrity Availability Authentication Confidentiality | Confidentiality |
| A worldwide collection of interconnected networks Group of answer choices Internet Intranet Ultranet Extranet | Internet |
| This attack captures private information from an organization's network. Group of answer choices Denial of Service Data interception and theft Virus Identity Theft | Data interception and theft |
| Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) | International Telecommunication Union (ITU) International Organization for Standardization (ISO) |
| What are the two sublayers of the OSI model data link layer? (Choose two.) Group of answer choices physical LLC MAC internet | LLC MAC |
| What type of physical topology can be created by connecting all Ethernet cables to a central device? Group of answer choices bus mesh ring star | star |
| What does a router do after de-encapsulating a received frame? Group of answer choices re-encapsulates the packet into a new frame forwards the new frame onto the network medium determines the best path de-encapsulates the frame | determines the best path |
| When data is encoded as pulses of light, which media is being used to transmit the data? Group of answer choices UTP cable coaxial cable fiber-optic cable wireless | fiber-optic cable |
| This attack steals the login credentials of a user in order to access private data. Group of answer choices Data interception and theft Identity Theft Denial of Service Virus | Identity Theft |
| Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Group of answer choices Virus, worm or Trojan Horse Firewall Zero day or Zero hour Virtual Private Network | Zero day or Zero hour |
| Extend LAN access technology into the WAN. Group of answer choices Business DSL Satellite Metro Ethernet Dedicated Leased Line | Metro Ethernet |
| The startup config is removed by using what privileged EXEC mode command. Group of answer choices erase startup-config erase running-config erase bootup-config erase latest-config | erase startup-config |
| Which information does the show startup-config command display? The contents of the current running configuration file in the RAM The contents of the saved configuration file in the NVRAM The bootstrap program in the ROM The IOS image copied into RAM | the contents of the saved configuration file in the NVRAM |
| From the privileged EXEC mode, access the global configuration mode by entering what command? Group of answer choices enable line console 0 configure terminal secret | configure terminal |
| Identify the end device. Group of answer choices hub router switch laptop | laptop |
| Identify the Intermediary device. Group of answer choices printer modem telephone TV | modem?? |
| Which command encrypts all plaintext passwords access on a switch? Group of answer choices secret class login service password-encryption enable secret class | service password-encryption |
| True or False? Mobile devices do not require IP addresses to communicate on the Internet. Group of answer choices False True | False |
| Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? | Use the console port to locally access the switch from a serial or USB interface of the PC. |
| Which statement is true about the running configuration file in a Cisco IOS device? | It affects the operation of the device immediately when modified. |
| Which step of the communication process is concerned with properly identifying the address of the sender and receiver? Group of answer choices Decoding Encoding Encapsulation Formatting | Formatting |
| True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. Group of answer choices False True | False |
| Which delivery method is used to transmit information to a single device? Group of answer choices Multicast Anycast Unicast Broadcast | Unicast ?? |
| BGP and OSPF are examples of which type of protocol? Group of answer choices routing network communication service discovery network security | routing |
| Which protocol stack layer encapsulates data into frames? Group of answer choices application transport data link network | data link |
| Which characteristic describes crosstalk? the distortion of the transmitted messages from signals carried in adjacent wires the distortion of the network signal from fluorescent lighting | the distortion of the transmitted messages from signals carried in adjacent wires |
| What is the definition of bandwidth? Group of answer choices the amount of data that can flow from one place to another in a given amount of time the measure of usable data transferred over a given period of time | the amount of data that can flow from one place to another in a given amount of time |
| What is the equivalent to decimal of the hexadecimal A4 ? Group of answer choices 152 153 161 164 | 164 |
| What is the equivalent to decimal of the hexadecimal 7A ? Group of answer choices 10 87 122 118 | 122 |
| What is the equivalent to hexadecimal of the decimal 31 ? Group of answer choices 21 1F 22 20 | 1F |
| What attribute of a NIC would place it at the data link layer of the OSI model? Group of answer choices RJ-45 port MAC address attached Ethernet cable IP address | MAC address |
| Which data link layer media access control method does Ethernet use? Group of answer choices turn taking token passing CSMA/CD determinism | CSMA/CD |
| Which attack slows down or crashes equipment and programs? Group of answer choices Zero day or Zero hour Firewall Denial of Service Virus, worm or Trojan Horse | Denial of Service |
| Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? Group of answer choices Smart Home Technology BYOD Video Communications Cloud Computing | Video Communications |
| Which option blocks unauthorized access to your network? Group of answer choices Firewall Zero day or Zero hour Virtual Private Network Virus, worm or Trojan Horse | Firewall |
| What is the function of the kernel of an operating system? Group of answer choices The kernel links the hardware drivers with the underlying electronics of a computer. The kernel provisions hardware resources to meet software requirements. | The kernel provisions hardware resources to meet software requirements. |
| Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Group of answer choices Aux Console SSH Telnet | Console |
| To move from user EXEC mode to privileged EXEC mode, What command should you use? Group of answer choices secret line console 0 enable configure terminal | enable |
| Why would a technician enter the command copy startup-config running-config? Group of answer choices to copy an existing configuration into RAM to remove all configurations from the switch to save an active configuration to NVRAM | to copy an existing configuration into RAM |
| What is the command to assign the name "Switch-1-Floor" to a switch? Group of answer choices hostname Switch-1-Floor host Switch-1-Floor name Switch-1-Floor host name Switch-1-Floor | hostname Switch-1-Floor |
| What types of standards are developed by the Electronics Industries Alliance (EIA)? Group of answer choices Voice over IP (VoIP) and satellite communications electric wiring and connectors radio equipment and cell towers | electric wiring and connectors |
| Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.) Group of answer choices ICMPv6 ICMPv4 IPv4 TCP | ICMPv6 ICMPv4 |
| This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. Group of answer choices Internet Engineering Task Force (IETF) Internet Research Task Force (IRTF) | Internet Engineering Task Force (IETF) |
| Which type of UTP cable is used to connect a PC to a switch port? Group of answer choices straight-through crossover rollover console | straight-through |
| What is the equivalent to hexadecimal of the decimal 52 ? Group of answer choices 35 33 34 36 | 34 |
| What is the equivalent to decimal of the hexadecimal B2 ? Group of answer choices 180 178 177 179 | 178 |
| What is the equivalent to hexadecimal of the decimal 63 ? Group of answer choices 3E 3D 3F 40 | 3F |
| What is the equivalent to hexadecimal of the decimal 42 ? Group of answer choices 29 2C 2B 2A | 2A |
| What is the equivalent to decimal of the hexadecimal B1 ? Group of answer choices 180 179 178 177 | 177 |
| Which two protocols are service discovery protocols? (Choose two.) Group of answer choices DNS SSH DHCP TCP | DNS DHCP |
| What is the equivalent to decimal of the hexadecimal 8A ? Group of answer choices 137 138 88 127 | 138 |
| What is the equivalent to hexadecimal of the decimal 54 ? Group of answer choices 36 33 34 35 | 36 |
| What is the equivalent to hexadecimal of the decimal 44 ? Group of answer choices 29 2A 2B 2C | 2C |
| What is the equivalent to decimal of the hexadecimal 4A ? Group of answer choices 72 73 71 74 | 74 |
| What is the equivalent to hexadecimal of the decimal 61 ? Group of answer choices 3E 3D 3F 40 | 3D |
| What identifier is used at the data link layer to uniquely identify an Ethernet device? Group of answer choices TCP port number sequence number IP address MAC address | MAC address |
| What method is used to manage contention-based access on a wireless network? Group of answer choices CSMA/CD CSMA/CA priority ordering token passing | CSMA/CA |
| These attacks slow or crash applications and processes on a network device. Group of answer choices Denial of Service Identity Theft Spyware Virus ChatGPT | Denial of Service |
| Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet. | Cable |
| These are types of software which are installed on a user's device. The software then secretly collects information about the user. Group of answer choices Firewall Zero day or Zero hour Virtual Private Network Spyware and Adware | Spyware and Adware ??? |
| Which interface allows remote management of a Layer 2 switch? Group of answer choices the AUX interface the console port interface the first Ethernet port interface the switch virtual interface | the switch virtual interface |
| This protocol is responsible for guaranteeing the reliable delivery of information. Group of answer choices Ethernet TCP IP HTTP | TCP |
| What is the name of the process of adding protocol information to data as it moves down the protocol stack? Group of answer choices segmentation encapsulation sequencing de-encapsulation | encapsulation |
| This standards organization is responsible for IP address allocation and domain name management. Group of answer choices Internet Society (ISOC) Internet Assigned Numbers Authority (IANA) Internet Engineering Task Force (IETF) | Internet Assigned Numbers Authority (IANA) |
| What type of cable is used to connect a workstation serial port to a Cisco router console port? Group of answer choices straight-through rollover crossover coaxial | rollover |
| What is the equivalent to decimal of the hexadecimal 5A ? Group of answer choices 11 80 10 90 | 90 |
| What is the equivalent to decimal of the hexadecimal A2 ? Group of answer choices 161 164 153 162 | 162 |
| What is the equivalent to decimal of the hexadecimal A6 ? Group of answer choices 166 168 165 167 | 166 |
| What is the equivalent to decimal of the hexadecimal CA ? Group of answer choices 203 204 205 202 | 202 |
| Which feature contains options such as Public, Private, Custom and Hybrid? Group of answer choices Cloud Computing Video Communications BYOD Smart Home Technology | Cloud Computing |
| Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. Group of answer choices Cellular Cable DSL Satellite | DSL ??? |
| This type of Internet connection is use in areas that would otherwise have no internet connectivity at all. Group of answer choices Cellular Satellite Cable DSL | Satellite ??? |
| Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate Metro Ethernet Dedicated Leased Line | Dedicated Leased Line ??? |
| Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? Group of answer choices WAN Extranet LAN Intranet | Extranet ??? |
| his is stored in Random Access Memory (RAM). It reflects the current configuration. Group of answer choices latest-config running-config bootup-config startup-config | running-config ??? |
| Why are two strands of fiber used for a single fiber optic connection? Group of answer choices They prevent crosstalk from causing interference on the connection. They allow for full-duplex connectivity. | They allow for full-duplex connectivity. ?? |
| A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? | physical layer |
| What is the equivalent to decimal of the hexadecimal A3 ? Group of answer choices 163 164 152 161 | 163 |
| Identify the end device. Group of answer choices switch hub smart phone router | smart phone |
| Identify the Intermediary device. Group of answer choices router TV telephone printer | router |
| These applications help to protect end devices from becoming infected with malicious software. Group of answer choices Virtual private networks Intrusion prevention systems Access control lists Antivirus and antispyware | Antivirus and antispyware |
| Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Group of answer choices Kernel Shell Hardware Software | Kernel |
| What privileged EXEC mode command will you use to show the current configurations that you made? Group of answer choices show running-config show startup-config show bootup-config show latest-config | show running-config |
| What is the purpose of the sequencing function in network communication? to uniquely label transmitted segments of data for proper reassembly by the receiver to ensure data flows at an efficient rate between sender and receiver | to uniquely label transmitted segments of data for proper reassembly by the receiver |
| Which three are components of message timing? (Choose three.) Group of answer choices Access Method Flow control Response Timeout Sequence Numbers | Access Method Flow control Response Timeout |
| Which procedure is used to reduce the effect of crosstalk in copper cables? Group of answer choices twisting opposing circuit wire pairs together designing a cable infrastructure to avoid crosstalk interference | twisting opposing circuit wire pairs together |
| A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is | the microwave oven the cellular phones that are used by the employees |
| What is the equivalent to hexadecimal of the decimal 22 ? Group of answer choices 14 16 15 17 | 16 |
| What is the equivalent to decimal of the hexadecimal CC ? Group of answer choices 204 205 203 202 | 204 |
| What is the equivalent to decimal of the hexadecimal A1 ? Group of answer choices 161 164 152 153 | 161 |
| What is the equivalent to decimal of the hexadecimal CB ? Group of answer choices 204 203 202 205 | 203 |
| An inexpensive option that uses any phone line and a modem and has low bandwidth Group of answer choices Dial Up Satellite Cable DSL | Dial Up |
| Which feature uses the same cellular technology as a smart phone? Group of answer choices BYOD Wireless Broadband Video Communications Powerline | BYOD ??? |
| A characteristics of a network that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. Group of answer choices Scalability Quality of Service (QoS) Security Fault Tolerance | Fault Tolerance ??? |
| What is the disadvantages of peer-to-peer networking Group of answer choices Easy to set up Less complex No centralized administration Less complex | No centralized administration ??? |
| Which IOS mode allows access to all commands and features? Group of answer choices Interface subconfiguration Mode Global Configuration Mode User EXEC Mode Privileged EXEC Mode | Privileged EXEC Mode ??? |
| What is the correct format for IPv4 address? Group of answer choices 192.168.0.1 aa.ab.cd.af 192:168:1:4 AB-CD-EF-10 | 192.168.0.1 ??? |
| Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.) Group of answer choices Internet Protocol File Transfer Routing Protocols Messaging | Internet Protocol Routing Protocols Messaging |
| Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.) Data link layer addresses are logical and network layer addresses are physical. | Data link layer addresses are physical and network layer addresses are logical. Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits. Network layer addresses are either 32 or 128 bits in length. ???? |
| A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? Group of answer choices IP at the Internet layer UDP at the Internet layer | IP at the Internet layer ??? |
| What is the equivalent to hexadecimal of the decimal 34 ? Group of answer choices 22 21 1F 20 | 22 |
| What is the equivalent to decimal of the hexadecimal 9A ? Group of answer choices 200 154 90 100 | 154 |
| Which statement describes the half-duplex mode of data transmission? Group of answer choices Data that is transmitted over the network can only flow in one direction. Data that is transmitted over the network flows in one direction at a time. | Data that is transmitted over the network flows in one direction at a time. |
| Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? Group of answer choices WAN Extranet LAN Intranet | WAN |
| Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Group of answer choices Scalability Quality of Service (QoS) Security Fault Tolerance | Security |
| Identify the end device. Group of answer choices router hub switch printer | printer |
| Coaxial cable encodes data into? Group of answer choices Radio frequencies Sound waves Electrical impulses Light signal | Electrical impulses |
| Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices banner motd # Keep out % banner motd # Keep out @ banner motd # Keep out # banner motd # Keep out ) | banner motd # Keep out # |
| How is the privileged EXEC mode access secured on a switch? Group of answer choices service password-encryption enable class secret class enable secret class | enable secret class |
| What is the PDU associated with the transport layer? Group of answer choices segment packet bits frame | segment |
| Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? Group of answer choices Anycast Broadcast Unicast Multicast | Multicast |
| UDP and TCP belong to which layer of the TCP/IP protocol? Group of answer choices transport network access application internet | transport |
| What is the equivalent to hexadecimal of the decimal 33 ? Group of answer choices 21 1F 20 22 | 21 |
| Identify the Intermediary device. Group of answer choices PC Hub printer telephone | Hub |
| Which device acts as a gateway to allow hosts to send traffic to remote IP networks? Group of answer choices DHCP server local router DNS server local switch | local router |
| How is an IPv4 address represented? Group of answer choices four decimal numbers between 0 and 255 separated by periods four binary numbers between 0 and 1 separated by colons four binary numbers between 0 and 1 separated by comma | four decimal numbers between 0 and 255 separated by periods |
| What is used to determine the network portion of an IPv4 address? Group of answer choices MAC address left-most part of the MAC address subnet mask right-most part of the IP address | subnet mask |
| Uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. | Cellular |
| How is SSH different from Telnet? | SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. ??? |
| Which access method would be the most appropriate in-band access to the IOS over a network connection? Group of answer choices HTTP Aux Telnet/SSH Console | Tellnet/SSH |
| A switch with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the switch boots up, which mode will display? | user EXEC mode |
| Which option creates a secure connection for remote workers? Group of answer choices Virus, worm or Trojan Horse Virtual Private Network Zero day or Zero hour Firewall | Virtual Private Network (VPN) |
| What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? | (config)# service password-encryption |
| Standards organizations are usually vendor-neutral. True False | TRUE |
| The physical part of a computer including underlying electronics. Group of answer choices Hardware Shell Software Kernel | Hardware |
| What is the equivalent to decimal of the hexadecimal 6A ? | 106 |
| What is the equivalent to decimal of the hexadecimal AE ? | 174 |
| Assures users that the information has not been altered in transmission, from origin to destination. Group of answer choices Availability Integrity Confidentiality Authentication | Integrity |
| Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? Group of answer choices Unicast Multicast Anycast Broadcast | Multicast |