Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CS0013

FA1

QuestionAnswer
Which of the following is the name for all computers connected to a network that participate directly in network communication? Group of answer choices media servers intermediary devices hosts hosts
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. Group of answer choices False True True
What is one advantage of using fiber optic cabling rather than copper cabling? It is easier to terminate and install than copper cabling. It is able to carry signals much farther than copper cabling. It is able to carry signals much farther than copper cabling.
Which statement correctly describes frame encoding? It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
What is the equivalent to decimal of the hexadecimal 4A ? Group of answer choices 74 73 72 71 74
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? hierarchical bus mesh ring mesh
What is true concerning physical and logical topologies? Logical topologies refer to how a network transfers data between devices. The logical topology is always the same as the physical topology. Logical topologies refer to how a network transfers data between devices
True or false? The right-most part of an IP address is used to identify the network that a device belongs to. False
Which delivery method is used to transmit information to all devices? Group of answer choices Unicast Anycast Multicast Broadcast Broadcast
What is indicated by the term throughput? the guaranteed data transfer rate offered by an ISP the measure of the bits transferred across the media over a given period of time the measure of the usable data transferred across the media the measure of the bits transferred across the media over a given period of time
What is the equivalent to hexadecimal of the decimal 61 ? Group of answer choices 3F 3D 3E 40 3D
Which option describes malicious code running on user devices? Group of answer choices Zero day or Zero hour Virtual Private Network Virus, worm or Trojan Horse Firewall Virus, worm or Trojan Horse
Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices login banner # Warning # banner # Warning # banner motd # Warning # display # Warning # banner motd # Warning #
Which protocol operates at the network access layer of the TCP/IP model? Group of answer choices DNS HTTP Ethernet IP Ethernet
What is a characteristic of UTP cabling? Group of answer choices woven copper braid or metallic foil cladding cancellation immunity to electrical hazards cancellation
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device needs mobility when connecting to the network.
What is the purpose of the OSI physical layer? controlling access to media transmitting bits across the local media performing error detection on received frames d. exchanging frames between nodes over physical network media transmitting bits across the local media
What is the equivalent to hexadecimal of the decimal 43 ? Group of answer choices 29 2C 2B 2A 2B
What is the equivalent to decimal of the hexadecimal A7 ? Group of answer choices 165 167 166 168 167
What is the equivalent to hexadecimal of the decimal 20 ? Group of answer choices 14 17 15 16 14
What is the equivalent to decimal of the hexadecimal AF ? Group of answer choices 170 175 174 171 175
What is the equivalent to decimal of the hexadecimal A8 ? Group of answer choices 167 166 165 168 168
What are two services performed by the data link layer of the OSI model? (Choose two.) It provides media access control and performs error detection. It accepts Layer 3 packets and encapsulates them into frames.
Which is a function of the Logical Link Control (LLC) sublayer? to identify which network layer protocol is being used to define the media access processes that are performed by the hardware to provide data link layer addressing to identify which network layer protocol is being used
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? Group of answer choices the use of CSMA/CA the development of half-duplex switch operation the use of full-duplex capable Layer 2 switches the use of full-duplex capable Layer 2 switches
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? Group of answer choices physical application transport data link data link
Which standards organization oversees development of wireless LAN standards? Group of answer choices IEEE TIA ISO IANA IEEE
Which two protocols belong in the TCP/IP model application layer? Group of answer choices DNS OSPF EIGRP DHCP DNS DHCP
What is the order of the two addresses in the data link frame? Group of answer choices destination MAC, source MAC destination IP, source IP source MAC, destination MAC destination MAC, source IP destination MAC, source MAC
What is the process of dividing a large data stream into smaller pieces prior to transmission? Group of answer choices duplexing segmentation multiplexing sequencing segmentation
Which command enables password authentication for user EXEC mode access on a switch? Group of answer choices login enable secret class service password-encryption secret class login
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Group of answer choices running-config latest-config startup-config bootup-config startup-config
What type of interface has no physical port associated with it? Group of answer choices console Ethernet serial Switch virtual interface (SVI) Switch virtual interface (SVI)
What is the correct format for IPv4 address? Group of answer choices 256.0.2.4 193.64.64.256 192.168.0.5 192.256.0.0 192.168.0.5
Means that only the intended and authorized recipients can access and read data. Group of answer choices Integrity Availability Authentication Confidentiality Confidentiality
A worldwide collection of interconnected networks Group of answer choices Internet Intranet Ultranet Extranet Internet
This attack captures private information from an organization's network. Group of answer choices Denial of Service Data interception and theft Virus Identity Theft Data interception and theft
Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) International Telecommunication Union (ITU) International Organization for Standardization (ISO)
What are the two sublayers of the OSI model data link layer? (Choose two.) Group of answer choices physical LLC MAC internet LLC MAC
What type of physical topology can be created by connecting all Ethernet cables to a central device? Group of answer choices bus mesh ring star star
What does a router do after de-encapsulating a received frame? Group of answer choices re-encapsulates the packet into a new frame forwards the new frame onto the network medium determines the best path de-encapsulates the frame determines the best path
When data is encoded as pulses of light, which media is being used to transmit the data? Group of answer choices UTP cable coaxial cable fiber-optic cable wireless fiber-optic cable
This attack steals the login credentials of a user in order to access private data. Group of answer choices Data interception and theft Identity Theft Denial of Service Virus Identity Theft
Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Group of answer choices Virus, worm or Trojan Horse Firewall Zero day or Zero hour Virtual Private Network Zero day or Zero hour
Extend LAN access technology into the WAN. Group of answer choices Business DSL Satellite Metro Ethernet Dedicated Leased Line Metro Ethernet
The startup config is removed by using what privileged EXEC mode command. Group of answer choices erase startup-config erase running-config erase bootup-config erase latest-config erase startup-config
Which information does the show startup-config command display? The contents of the current running configuration file in the RAM The contents of the saved configuration file in the NVRAM The bootstrap program in the ROM The IOS image copied into RAM the contents of the saved configuration file in the NVRAM
From the privileged EXEC mode, access the global configuration mode by entering what command? Group of answer choices enable line console 0 configure terminal secret configure terminal
Identify the end device. Group of answer choices hub router switch laptop laptop
Identify the Intermediary device. Group of answer choices printer modem telephone TV modem??
Which command encrypts all plaintext passwords access on a switch? Group of answer choices secret class login service password-encryption enable secret class service password-encryption
True or False? Mobile devices do not require IP addresses to communicate on the Internet. Group of answer choices False True False
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? Use the console port to locally access the switch from a serial or USB interface of the PC.
Which statement is true about the running configuration file in a Cisco IOS device? It affects the operation of the device immediately when modified.
Which step of the communication process is concerned with properly identifying the address of the sender and receiver? Group of answer choices Decoding Encoding Encapsulation Formatting Formatting
True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. Group of answer choices False True False
Which delivery method is used to transmit information to a single device? Group of answer choices Multicast Anycast Unicast Broadcast Unicast ??
BGP and OSPF are examples of which type of protocol? Group of answer choices routing network communication service discovery network security routing
Which protocol stack layer encapsulates data into frames? Group of answer choices application transport data link network data link
Which characteristic describes crosstalk? the distortion of the transmitted messages from signals carried in adjacent wires the distortion of the network signal from fluorescent lighting the distortion of the transmitted messages from signals carried in adjacent wires
What is the definition of bandwidth? Group of answer choices the amount of data that can flow from one place to another in a given amount of time the measure of usable data transferred over a given period of time the amount of data that can flow from one place to another in a given amount of time
What is the equivalent to decimal of the hexadecimal A4 ? Group of answer choices 152 153 161 164 164
What is the equivalent to decimal of the hexadecimal 7A ? Group of answer choices 10 87 122 118 122
What is the equivalent to hexadecimal of the decimal 31 ? Group of answer choices 21 1F 22 20 1F
What attribute of a NIC would place it at the data link layer of the OSI model? Group of answer choices RJ-45 port MAC address attached Ethernet cable IP address MAC address
Which data link layer media access control method does Ethernet use? Group of answer choices turn taking token passing CSMA/CD determinism CSMA/CD
Which attack slows down or crashes equipment and programs? Group of answer choices Zero day or Zero hour Firewall Denial of Service Virus, worm or Trojan Horse Denial of Service
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? Group of answer choices Smart Home Technology BYOD Video Communications Cloud Computing Video Communications
Which option blocks unauthorized access to your network? Group of answer choices Firewall Zero day or Zero hour Virtual Private Network Virus, worm or Trojan Horse Firewall
What is the function of the kernel of an operating system? Group of answer choices The kernel links the hardware drivers with the underlying electronics of a computer. The kernel provisions hardware resources to meet software requirements. The kernel provisions hardware resources to meet software requirements.
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Group of answer choices Aux Console SSH Telnet Console
To move from user EXEC mode to privileged EXEC mode, What command should you use? Group of answer choices secret line console 0 enable configure terminal enable
Why would a technician enter the command copy startup-config running-config? Group of answer choices to copy an existing configuration into RAM to remove all configurations from the switch to save an active configuration to NVRAM to copy an existing configuration into RAM
What is the command to assign the name "Switch-1-Floor" to a switch? Group of answer choices hostname Switch-1-Floor host Switch-1-Floor name Switch-1-Floor host name Switch-1-Floor hostname Switch-1-Floor
What types of standards are developed by the Electronics Industries Alliance (EIA)? Group of answer choices Voice over IP (VoIP) and satellite communications electric wiring and connectors radio equipment and cell towers electric wiring and connectors
Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.) Group of answer choices ICMPv6 ICMPv4 IPv4 TCP ICMPv6 ICMPv4
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. Group of answer choices Internet Engineering Task Force (IETF) Internet Research Task Force (IRTF) Internet Engineering Task Force (IETF)
Which type of UTP cable is used to connect a PC to a switch port? Group of answer choices straight-through crossover rollover console straight-through
What is the equivalent to hexadecimal of the decimal 52 ? Group of answer choices 35 33 34 36 34
What is the equivalent to decimal of the hexadecimal B2 ? Group of answer choices 180 178 177 179 178
What is the equivalent to hexadecimal of the decimal 63 ? Group of answer choices 3E 3D 3F 40 3F
What is the equivalent to hexadecimal of the decimal 42 ? Group of answer choices 29 2C 2B 2A 2A
What is the equivalent to decimal of the hexadecimal B1 ? Group of answer choices 180 179 178 177 177
Which two protocols are service discovery protocols? (Choose two.) Group of answer choices DNS SSH DHCP TCP DNS DHCP
What is the equivalent to decimal of the hexadecimal 8A ? Group of answer choices 137 138 88 127 138
What is the equivalent to hexadecimal of the decimal 54 ? Group of answer choices 36 33 34 35 36
What is the equivalent to hexadecimal of the decimal 44 ? Group of answer choices 29 2A 2B 2C 2C
What is the equivalent to decimal of the hexadecimal 4A ? Group of answer choices 72 73 71 74 74
What is the equivalent to hexadecimal of the decimal 61 ? Group of answer choices 3E 3D 3F 40 3D
What identifier is used at the data link layer to uniquely identify an Ethernet device? Group of answer choices TCP port number sequence number IP address MAC address MAC address
What method is used to manage contention-based access on a wireless network? Group of answer choices CSMA/CD CSMA/CA priority ordering token passing CSMA/CA
These attacks slow or crash applications and processes on a network device. Group of answer choices Denial of Service Identity Theft Spyware Virus ChatGPT Denial of Service
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet. Cable
These are types of software which are installed on a user's device. The software then secretly collects information about the user. Group of answer choices Firewall Zero day or Zero hour Virtual Private Network Spyware and Adware Spyware and Adware ???
Which interface allows remote management of a Layer 2 switch? Group of answer choices the AUX interface the console port interface the first Ethernet port interface the switch virtual interface the switch virtual interface
This protocol is responsible for guaranteeing the reliable delivery of information. Group of answer choices Ethernet TCP IP HTTP TCP
What is the name of the process of adding protocol information to data as it moves down the protocol stack? Group of answer choices segmentation encapsulation sequencing de-encapsulation encapsulation
This standards organization is responsible for IP address allocation and domain name management. Group of answer choices Internet Society (ISOC) Internet Assigned Numbers Authority (IANA) Internet Engineering Task Force (IETF) Internet Assigned Numbers Authority (IANA)
What type of cable is used to connect a workstation serial port to a Cisco router console port? Group of answer choices straight-through rollover crossover coaxial rollover
What is the equivalent to decimal of the hexadecimal 5A ? Group of answer choices 11 80 10 90 90
What is the equivalent to decimal of the hexadecimal A2 ? Group of answer choices 161 164 153 162 162
What is the equivalent to decimal of the hexadecimal A6 ? Group of answer choices 166 168 165 167 166
What is the equivalent to decimal of the hexadecimal CA ? Group of answer choices 203 204 205 202 202
Which feature contains options such as Public, Private, Custom and Hybrid? Group of answer choices Cloud Computing Video Communications BYOD Smart Home Technology Cloud Computing
Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. Group of answer choices Cellular Cable DSL Satellite DSL ???
This type of Internet connection is use in areas that would otherwise have no internet connectivity at all. Group of answer choices Cellular Satellite Cable DSL Satellite ???
Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate Metro Ethernet Dedicated Leased Line Dedicated Leased Line ???
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? Group of answer choices WAN Extranet LAN Intranet Extranet ???
his is stored in Random Access Memory (RAM). It reflects the current configuration. Group of answer choices latest-config running-config bootup-config startup-config running-config ???
Why are two strands of fiber used for a single fiber optic connection? Group of answer choices They prevent crosstalk from causing interference on the connection. They allow for full-duplex connectivity. They allow for full-duplex connectivity. ??
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? physical layer
What is the equivalent to decimal of the hexadecimal A3 ? Group of answer choices 163 164 152 161 163
Identify the end device. Group of answer choices switch hub smart phone router smart phone
Identify the Intermediary device. Group of answer choices router TV telephone printer router
These applications help to protect end devices from becoming infected with malicious software. Group of answer choices Virtual private networks Intrusion prevention systems Access control lists Antivirus and antispyware Antivirus and antispyware
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Group of answer choices Kernel Shell Hardware Software Kernel
What privileged EXEC mode command will you use to show the current configurations that you made? Group of answer choices show running-config show startup-config show bootup-config show latest-config show running-config
What is the purpose of the sequencing function in network communication? to uniquely label transmitted segments of data for proper reassembly by the receiver to ensure data flows at an efficient rate between sender and receiver to uniquely label transmitted segments of data for proper reassembly by the receiver
Which three are components of message timing? (Choose three.) Group of answer choices Access Method Flow control Response Timeout Sequence Numbers Access Method Flow control Response Timeout
Which procedure is used to reduce the effect of crosstalk in copper cables? Group of answer choices twisting opposing circuit wire pairs together designing a cable infrastructure to avoid crosstalk interference twisting opposing circuit wire pairs together
A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is the microwave oven the cellular phones that are used by the employees
What is the equivalent to hexadecimal of the decimal 22 ? Group of answer choices 14 16 15 17 16
What is the equivalent to decimal of the hexadecimal CC ? Group of answer choices 204 205 203 202 204
What is the equivalent to decimal of the hexadecimal A1 ? Group of answer choices 161 164 152 153 161
What is the equivalent to decimal of the hexadecimal CB ? Group of answer choices 204 203 202 205 203
An inexpensive option that uses any phone line and a modem and has low bandwidth Group of answer choices Dial Up Satellite Cable DSL Dial Up
Which feature uses the same cellular technology as a smart phone? Group of answer choices BYOD Wireless Broadband Video Communications Powerline BYOD ???
A characteristics of a network that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. Group of answer choices Scalability Quality of Service (QoS) Security Fault Tolerance Fault Tolerance ???
What is the disadvantages of peer-to-peer networking Group of answer choices Easy to set up Less complex No centralized administration Less complex No centralized administration ???
Which IOS mode allows access to all commands and features? Group of answer choices Interface subconfiguration Mode Global Configuration Mode User EXEC Mode Privileged EXEC Mode Privileged EXEC Mode ???
What is the correct format for IPv4 address? Group of answer choices 192.168.0.1 aa.ab.cd.af 192:168:1:4 AB-CD-EF-10 192.168.0.1 ???
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.) Group of answer choices Internet Protocol File Transfer Routing Protocols Messaging Internet Protocol Routing Protocols Messaging
Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.) Data link layer addresses are logical and network layer addresses are physical. Data link layer addresses are physical and network layer addresses are logical. Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits. Network layer addresses are either 32 or 128 bits in length. ????
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? Group of answer choices IP at the Internet layer UDP at the Internet layer IP at the Internet layer ???
What is the equivalent to hexadecimal of the decimal 34 ? Group of answer choices 22 21 1F 20 22
What is the equivalent to decimal of the hexadecimal 9A ? Group of answer choices 200 154 90 100 154
Which statement describes the half-duplex mode of data transmission? Group of answer choices Data that is transmitted over the network can only flow in one direction. Data that is transmitted over the network flows in one direction at a time. Data that is transmitted over the network flows in one direction at a time.
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? Group of answer choices WAN Extranet LAN Intranet WAN
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Group of answer choices Scalability Quality of Service (QoS) Security Fault Tolerance Security
Identify the end device. Group of answer choices router hub switch printer printer
Coaxial cable encodes data into? Group of answer choices Radio frequencies Sound waves Electrical impulses Light signal Electrical impulses
Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices banner motd # Keep out % banner motd # Keep out @ banner motd # Keep out # banner motd # Keep out ) banner motd # Keep out #
How is the privileged EXEC mode access secured on a switch? Group of answer choices service password-encryption enable class secret class enable secret class enable secret class
What is the PDU associated with the transport layer? Group of answer choices segment packet bits frame segment
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? Group of answer choices Anycast Broadcast Unicast Multicast Multicast
UDP and TCP belong to which layer of the TCP/IP protocol? Group of answer choices transport network access application internet transport
What is the equivalent to hexadecimal of the decimal 33 ? Group of answer choices 21 1F 20 22 21
Identify the Intermediary device. Group of answer choices PC Hub printer telephone Hub
Which device acts as a gateway to allow hosts to send traffic to remote IP networks? Group of answer choices DHCP server local router DNS server local switch local router
How is an IPv4 address represented? Group of answer choices four decimal numbers between 0 and 255 separated by periods four binary numbers between 0 and 1 separated by colons four binary numbers between 0 and 1 separated by comma four decimal numbers between 0 and 255 separated by periods
What is used to determine the network portion of an IPv4 address? Group of answer choices MAC address left-most part of the MAC address subnet mask right-most part of the IP address subnet mask
Uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. Cellular
How is SSH different from Telnet? SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. ???
Which access method would be the most appropriate in-band access to the IOS over a network connection? Group of answer choices HTTP Aux Telnet/SSH Console Tellnet/SSH
A switch with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the switch boots up, which mode will display? user EXEC mode
Which option creates a secure connection for remote workers? Group of answer choices Virus, worm or Trojan Horse Virtual Private Network Zero day or Zero hour Firewall Virtual Private Network (VPN)
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? (config)# service password-encryption
Standards organizations are usually vendor-neutral. True False TRUE
The physical part of a computer including underlying electronics. Group of answer choices Hardware Shell Software Kernel Hardware
What is the equivalent to decimal of the hexadecimal 6A ? 106
What is the equivalent to decimal of the hexadecimal AE ? 174
Assures users that the information has not been altered in transmission, from origin to destination. Group of answer choices Availability Integrity Confidentiality Authentication Integrity
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? Group of answer choices Unicast Multicast Anycast Broadcast Multicast
Created by: powerupzzz
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards