Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Networking Mod 1 & 2

QuestionAnswer
Assures users of timely and reliable access to data services for authorized users. Availability
Extend LAN access technology into the WAN. Metro Ethernet
A worldwide collection of interconnected networks Internet
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Security
Means that only the intended and authorized recipients can access and read data. Confidentiality
Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. DSL
Which feature describes using personal tools to access information and communicate across a business or campus network? BYOD
An inexpensive option that uses any phone line and a modem and has low bandwidth Dial Up
These applications help to protect end devices from becoming infected with malicious software. Antivirus and antispyware
Identify the end device. printer
A characteristics of a network that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. Fault Tolerance
Which feature is being used when connecting a device to the network using an electrical outlet? Powerline
This attack steals the login credentials of a user in order to access private data. Identity Theft
This attack captures private information from an organization's network. Data interception and theft
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? Fault Tolerance
Which option blocks unauthorized access to your network? Firewall
Which of the following is the name for all computers connected to a network that participate directly in network communication? hosts
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? Quality of Service (QoS)
Identify the Intermediary device. router
Devices that connect individual end devices to the network. Intermediary device ***
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? Video Communications
Identify the Intermediary device. Hub
A characteristics of a network that can expands quickly to support new users and applications. Scalability
Assures users that the information has not been altered in transmission, from origin to destination. Integrity
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? Extranet
Which feature contains options such as Public, Private, Custom and Hybrid? Cloud Computing
This type of topology diagrams illustrate the physical location of intermediary devices and cable installation. Physical Topology
These are types of software which are installed on a user's device. The software then secretly collects information about the user. Spyware and Adware
Which feature uses the same cellular technology as a smart phone? Wireless Broadband
These attacks slow or crash applications and processes on a network device. Denial of Service
What is the disadvantages of peer-to-peer networking No centralized administration
Which attack slows down or crashes equipment and programs? Denial of Service
Coaxial cable encodes data into? Electrical impulses
The acronym UTP stands for? Unshielded Twisted Pair
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet. Cable
Uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. Cellular
What is the advantage of peer-to-peer networking? Easy to set up
The source or destination of a message transmitted over the network. End Device
This type topology diagrams illustrate devices, ports, and the addressing scheme of the network. Logical Topology
Identify the end device. laptop
This type of Internet connection is use in areas that would otherwise have no internet connectivity at all. Satellite
Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Zero day or Zero hour
Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate Dedicated Leased Line
Identify the Intermediary device. modem
Which option creates a secure connection for remote workers? Virtual Private Network
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? LAN
Which option describes malicious code running on user devices? Virus, worm or Trojan Horse
This standards organization is responsible for IP address allocation and domain name management. Internet Assigned Numbers Authority (IANA)
Which protocol stack layer encapsulates data into frames? data link
Which two protocols are service discovery protocols? (Choose two.) DHCP DNS
This protocol is responsible for guaranteeing the reliable delivery of information. TCP
What is used to determine the network portion of an IPv4 address? subnet mask
Which two protocols belong in the TCP/IP model application layer? DHCP DNS
True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. False
True or false? The right-most part of an IP address is used to identify the network that a device belongs to. False
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. True
What types of standards are developed by the Electronics Industries Alliance (EIA)? electric wiring and connectors
To save time, IOS commands may be partially entered and then completed by typing which key or key combination? Tab
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? (config)# service password-encryption
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Kernel
Which interface allows remote management of a Layer 2 switch? the switch virtual interface
Which IOS mode are you in if the Switch> prompt is displayed? User EXEC Mode
This is not predefined; it is a value or variable defined by the user argument
From the privileged EXEC mode, access the global configuration mode by entering what command? configure terminal
What command is used to save changes made to the running configuration to the startup configuration file. copy running-config startup-config
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
Which device acts as a gateway to allow hosts to send traffic to remote IP networks? local switch
Which three are components of message timing? (Choose three.) Flow control Response Timeout Access Method
True or false. Standards organizations are usually vendor-neutral. True
Which delivery method is used to transmit information to all devices? Broadcast
What is the PDU associated with the transport layer? segment
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.) Internet Protocol Routing Protocols Messaging
Which step of the communication process is concerned with properly identifying the address of the sender and receiver? Formatting ***
What is the purpose of the sequencing function in network communication? to uniquely label transmitted segments of data for proper reassembly by the receiver
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. Internet Engineering Task Force (IETF)
How is SSH different from Telnet? SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
Which IOS mode allows access to all commands and features? Privileged EXEC Mode
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Console
This is a specific parameter defined in the operating system keyword
Which access method would be the most appropriate in-band access to the IOS over a network connection? Telnet/SSH
This is stored in Random Access Memory (RAM). It reflects the current configuration. running-config
The physical part of a computer including underlying electronics. Hardware
Which command encrypts all plaintext passwords access on a switch? service password-encryption
How is an IPv4 address represented? four decimal numbers between 0 and 255 separated by periods
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? Multicast
BGP and OSPF are examples of which type of protocol? routing
What is the order of the two addresses in the data link frame? destination MAC, source MAC
Which delivery method is used to transmit information to a single device? Unicast
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? IP at the Internet layer
Which information does the show startup-config command display? the contents of the saved configuration file in the NVRAM
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces. Shell
Which statement is true regarding the user EXEC mode? The device prompt for this mode ends with the ">" symbol.
The startup config is removed by using what privileged EXEC mode command. erase startup-config
What is the function of the kernel of an operating system? The kernel provisions hardware resources to meet software requirements.
What is the correct format for IPv4 address? 192.168.0.1
Which is the command to configure a banner to be displayed when connecting to a switch? banner motd # Warning #
UDP and TCP belong to which layer of the TCP/IP protocol? transport
Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.) - Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits. - Data link layer addresses are physical and network layer addresses are logical. - Network layer addresses are either 32 or 128 bits in length.
What is the name of the process of adding protocol information to data as it moves down the protocol stack? encapsulation
Which interface is the default SVI on a Cisco switch? VLAN 1
What is the correct format for IPv4 address? 192.168.0.5
Which is the command to configure a banner to be displayed when connecting to a switch? banner motd # Keep out #
Which is the command to configure a banner to be displayed when connecting to a switch? banner motd # Keep out #
What privileged EXEC mode command will you use to show the current configurations that you made? show running-config
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. startup-config
How is an IPv4 address represented? four decimal numbers between 0 and 255 separated by periods
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? WAN
When data is encoded as pulses of light, which media is being used to transmit the data? fiber-optic cable
Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.) ICMPv6 ICMPv4 ICMPv4 ICMPv6
What is the structure of an IPv4 address called? dotted-decimal format
Which protocol operates at the network access layer of the TCP/IP model? Ethernet
What is the process of dividing a large data stream into smaller pieces prior to transmission? segmentation
What is the command to assign the name "Sw-Floor-2" to a switch? hostname Sw-Floor-2
Which command enables password authentication for user EXEC mode access on a switch? login
What type of interface has no physical port associated with it? Switch virtual interface (SVI)
To move from user EXEC mode to privileged EXEC mode, What command should you use? enable
What is the process of converting information into the proper form for transmission? Encoding
True or False? Mobile devices do not require IP addresses to communicate on the Internet. Group of answer choices False True False
Which statement is true about the running configuration file in a Cisco IOS device? It affects the operation of the device immediately when modified
Why would a technician enter the command copy startup-config running-config? to copy an existing configuration into RAM
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? Use the console port to locally access the switch from a serial or USB interface of the PC.
How is the privileged EXEC mode access secured on a switch? enable secret class
Created by: jxxnixx
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards