click below
click below
Normal Size Small Size show me how
Networking Mod 1 & 2
| Question | Answer |
|---|---|
| Assures users of timely and reliable access to data services for authorized users. | Availability |
| Extend LAN access technology into the WAN. | Metro Ethernet |
| A worldwide collection of interconnected networks | Internet |
| Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? | Security |
| Means that only the intended and authorized recipients can access and read data. | Confidentiality |
| Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. | DSL |
| Which feature describes using personal tools to access information and communicate across a business or campus network? | BYOD |
| An inexpensive option that uses any phone line and a modem and has low bandwidth | Dial Up |
| These applications help to protect end devices from becoming infected with malicious software. | Antivirus and antispyware |
| Identify the end device. | printer |
| A characteristics of a network that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. | Fault Tolerance |
| Which feature is being used when connecting a device to the network using an electrical outlet? | Powerline |
| This attack steals the login credentials of a user in order to access private data. | Identity Theft |
| This attack captures private information from an organization's network. | Data interception and theft |
| Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? | Fault Tolerance |
| Which option blocks unauthorized access to your network? | Firewall |
| Which of the following is the name for all computers connected to a network that participate directly in network communication? | hosts |
| With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? | Quality of Service (QoS) |
| Identify the Intermediary device. | router |
| Devices that connect individual end devices to the network. | Intermediary device *** |
| Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? | Video Communications |
| Identify the Intermediary device. | Hub |
| A characteristics of a network that can expands quickly to support new users and applications. | Scalability |
| Assures users that the information has not been altered in transmission, from origin to destination. | Integrity |
| Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? | Extranet |
| Which feature contains options such as Public, Private, Custom and Hybrid? | Cloud Computing |
| This type of topology diagrams illustrate the physical location of intermediary devices and cable installation. | Physical Topology |
| These are types of software which are installed on a user's device. The software then secretly collects information about the user. | Spyware and Adware |
| Which feature uses the same cellular technology as a smart phone? | Wireless Broadband |
| These attacks slow or crash applications and processes on a network device. | Denial of Service |
| What is the disadvantages of peer-to-peer networking | No centralized administration |
| Which attack slows down or crashes equipment and programs? | Denial of Service |
| Coaxial cable encodes data into? | Electrical impulses |
| The acronym UTP stands for? | Unshielded Twisted Pair |
| Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet. | Cable |
| Uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. | Cellular |
| What is the advantage of peer-to-peer networking? | Easy to set up |
| The source or destination of a message transmitted over the network. | End Device |
| This type topology diagrams illustrate devices, ports, and the addressing scheme of the network. | Logical Topology |
| Identify the end device. | laptop |
| This type of Internet connection is use in areas that would otherwise have no internet connectivity at all. | Satellite |
| Which option describes a network attack that occurs on the first day that a vulnerability becomes known? | Zero day or Zero hour |
| Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate | Dedicated Leased Line |
| Identify the Intermediary device. | modem |
| Which option creates a secure connection for remote workers? | Virtual Private Network |
| Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? | LAN |
| Which option describes malicious code running on user devices? | Virus, worm or Trojan Horse |
| This standards organization is responsible for IP address allocation and domain name management. | Internet Assigned Numbers Authority (IANA) |
| Which protocol stack layer encapsulates data into frames? | data link |
| Which two protocols are service discovery protocols? (Choose two.) | DHCP DNS |
| This protocol is responsible for guaranteeing the reliable delivery of information. | TCP |
| What is used to determine the network portion of an IPv4 address? | subnet mask |
| Which two protocols belong in the TCP/IP model application layer? | DHCP DNS |
| True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. | False |
| True or false? The right-most part of an IP address is used to identify the network that a device belongs to. | False |
| True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. | True |
| What types of standards are developed by the Electronics Industries Alliance (EIA)? | electric wiring and connectors |
| To save time, IOS commands may be partially entered and then completed by typing which key or key combination? | Tab |
| What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? | (config)# service password-encryption |
| Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. | Kernel |
| Which interface allows remote management of a Layer 2 switch? | the switch virtual interface |
| Which IOS mode are you in if the Switch> prompt is displayed? | User EXEC Mode |
| This is not predefined; it is a value or variable defined by the user | argument |
| From the privileged EXEC mode, access the global configuration mode by entering what command? | configure terminal |
| What command is used to save changes made to the running configuration to the startup configuration file. | copy running-config startup-config |
| An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? | Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed. |
| Which device acts as a gateway to allow hosts to send traffic to remote IP networks? | local switch |
| Which three are components of message timing? (Choose three.) | Flow control Response Timeout Access Method |
| True or false. Standards organizations are usually vendor-neutral. | True |
| Which delivery method is used to transmit information to all devices? | Broadcast |
| What is the PDU associated with the transport layer? | segment |
| Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.) | Internet Protocol Routing Protocols Messaging |
| Which step of the communication process is concerned with properly identifying the address of the sender and receiver? | Formatting *** |
| What is the purpose of the sequencing function in network communication? | to uniquely label transmitted segments of data for proper reassembly by the receiver |
| This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. | Internet Engineering Task Force (IETF) |
| How is SSH different from Telnet? | SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. |
| Which IOS mode allows access to all commands and features? | Privileged EXEC Mode |
| Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? | Console |
| This is a specific parameter defined in the operating system | keyword |
| Which access method would be the most appropriate in-band access to the IOS over a network connection? | Telnet/SSH |
| This is stored in Random Access Memory (RAM). It reflects the current configuration. | running-config |
| The physical part of a computer including underlying electronics. | Hardware |
| Which command encrypts all plaintext passwords access on a switch? | service password-encryption |
| How is an IPv4 address represented? | four decimal numbers between 0 and 255 separated by periods |
| Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? | Multicast |
| BGP and OSPF are examples of which type of protocol? | routing |
| What is the order of the two addresses in the data link frame? | destination MAC, source MAC |
| Which delivery method is used to transmit information to a single device? | Unicast |
| A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? | IP at the Internet layer |
| Which information does the show startup-config command display? | the contents of the saved configuration file in the NVRAM |
| The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces. | Shell |
| Which statement is true regarding the user EXEC mode? | The device prompt for this mode ends with the ">" symbol. |
| The startup config is removed by using what privileged EXEC mode command. | erase startup-config |
| What is the function of the kernel of an operating system? | The kernel provisions hardware resources to meet software requirements. |
| What is the correct format for IPv4 address? | 192.168.0.1 |
| Which is the command to configure a banner to be displayed when connecting to a switch? | banner motd # Warning # |
| UDP and TCP belong to which layer of the TCP/IP protocol? | transport |
| Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.) | - Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits. - Data link layer addresses are physical and network layer addresses are logical. - Network layer addresses are either 32 or 128 bits in length. |
| What is the name of the process of adding protocol information to data as it moves down the protocol stack? | encapsulation |
| Which interface is the default SVI on a Cisco switch? | VLAN 1 |
| What is the correct format for IPv4 address? | 192.168.0.5 |
| Which is the command to configure a banner to be displayed when connecting to a switch? | banner motd # Keep out # |
| Which is the command to configure a banner to be displayed when connecting to a switch? | banner motd # Keep out # |
| What privileged EXEC mode command will you use to show the current configurations that you made? | show running-config |
| This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. | startup-config |
| How is an IPv4 address represented? | four decimal numbers between 0 and 255 separated by periods |
| Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? | WAN |
| When data is encoded as pulses of light, which media is being used to transmit the data? | fiber-optic cable |
| Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.) | ICMPv6 ICMPv4 ICMPv4 ICMPv6 |
| What is the structure of an IPv4 address called? | dotted-decimal format |
| Which protocol operates at the network access layer of the TCP/IP model? | Ethernet |
| What is the process of dividing a large data stream into smaller pieces prior to transmission? | segmentation |
| What is the command to assign the name "Sw-Floor-2" to a switch? | hostname Sw-Floor-2 |
| Which command enables password authentication for user EXEC mode access on a switch? | login |
| What type of interface has no physical port associated with it? | Switch virtual interface (SVI) |
| To move from user EXEC mode to privileged EXEC mode, What command should you use? | enable |
| What is the process of converting information into the proper form for transmission? | Encoding |
| True or False? Mobile devices do not require IP addresses to communicate on the Internet. Group of answer choices False True | False |
| Which statement is true about the running configuration file in a Cisco IOS device? | It affects the operation of the device immediately when modified |
| Why would a technician enter the command copy startup-config running-config? | to copy an existing configuration into RAM |
| Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? | Use the console port to locally access the switch from a serial or USB interface of the PC. |
| How is the privileged EXEC mode access secured on a switch? | enable secret class |