click below
click below
Normal Size Small Size show me how
networking f2
netwroking f2
| Question | Answer |
|---|---|
| Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.) Group of answer choices Messaging Routing Protocols Internet Protocol File Transfer | Messaging Routing Protocols Internet Protocol |
| Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.) Group of answer choices TCP ICMPv4 ICMPv6 IPv4 | ICMPv4 ICMPv6 |
| What is the process of converting information into the proper form for transmission? Group of answer choices Formatting Encapsulation Decoding Encoding | Encoding |
| Which three are components of message timing? (Choose three.) Group of answer choices Access Method Flow control Sequence Numbers Response Timeout | Access Method Flow control Response Timeout |
| What is the process of dividing a large data stream into smaller pieces prior to transmission? Group of answer choices multiplexing duplexing sequencing segmentation | segmentation |
| This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. Internet Engineering Task Force (IETF) Internet Architecture Board (IAB) Internet Research Task Force (IRTF) | Internet Engineering Task Force (IETF) |
| True or false? The right-most part of an IP address is used to identify the network that a device belongs to. | false |
| UDP and TCP belong to which layer of the TCP/IP protocol? Group of answer choices network access application transport internet | transport |
| Which two protocols are service discovery protocols? (Choose two.) Group of answer choices SSH DHCP DNS TCP | DHCP DNS |
| BGP and OSPF are examples of which type of protocol? Group of answer choices routing service discovery network security network communication | Routing |
| Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices banner motd # Keep out # banner # Keep out # display # Keep out / login banner @ Keep out # | banner motd # Keep out # |
| What is the function of the kernel of an operating system? The kernel links the hardware drivers with the underlying electronics of a computer. The kernel provisions hardware resources to meet software requirements. | The kernel provisions hardware resources to meet software requirements. |
| Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices banner # Warning # banner motd # Warning # display # Warning # login banner # Warning # | banner motd # Warning # |
| The physical part of a computer including underlying electronics. Group of answer choices Shell Kernel Software Hardware | Hardware |
| To save time, IOS commands may be partially entered and then completed by typing which key or key combination? Group of answer choices Ctrl-N Ctrl-P Up Arrow Tab | tab |
| The startup config is removed by using what privileged EXEC mode command. Group of answer choices erase bootup-config erase startup-config erase latest-config erase running-config | erase startup-config |
| What type of interface has no physical port associated with it? Group of answer choices serial console Ethernet Switch virtual interface (SVI) | Switch virtual interface (SVI) |
| To move from user EXEC mode to privileged EXEC mode, What command should you use? Group of answer choices line console 0 secret configure terminal enable | enable |
| Which interface is the default SVI on a Cisco switch? Group of answer choices FastEthernet 0/1 VLAN 1 VLAN 99 GigabitEthernet 0/1 | vlan 1 |
| True or False? Mobile devices do not require IP addresses to communicate on the Internet. Group of answer choices True False | false |
| 20 | |
| Which step of the communication process is concerned with properly identifying the address of the sender and receiver? Group of answer choices Decoding Formatting Encoding Encapsulation | formatting |
| This protocol is responsible for guaranteeing the reliable delivery of information. Group of answer choices Ethernet TCP IP HTTP | TCP |
| A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? HTML at the application layer IP at the Internet layer | IP at the Internet layer |
| True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. Group of answer choices True False | false |
| This standards organization is responsible for IP address allocation and domain name management. Internet Assigned Numbers Authority (IANA) Internet Engineering Task Force (IETF) Internet Architecture Board (IAB) Internet Society (ISOC) | Internet Assigned Numbers Authority (IANA) |
| Which two protocols belong in the TCP/IP model application layer? Group of answer choices DNS DHCP EIGRP OSPF | DHCS DNS |
| How is an IPv4 address represented? four binary numbers between 0 and 1 separated by comma thirty-two hexadecimal numbers separated by periods four decimal numbers between 0 and 255 separated by periods | four decimal numbers between 0 and 255 separated by periods |
| Which IOS mode are you in if the Switch(config)# prompt is displayed? Group of answer choices Global Configuration Mode User EXEC Mode Privileged EXEC Mode Interface subconfiguration Mode | Global Configuration Mode |
| What is the correct format for IPv4 address? Group of answer choices 192:168:1:4 192.168.0.1 aa.ab.cd.af AB-CD-EF-10 | 192.168.0.1 |
| What command is used to save changes made to the running configuration to the startup configuration file. copy startup-config latest-config copy running-config startup-config copy startup-config bootup-config copy startup-config running-config | copy running-config startup-config |
| Which device acts as a gateway to allow hosts to send traffic to remote IP networks? Group of answer choices local router DNS server local switch DHCP server | local router |
| What is the structure of an IPv4 address called? Group of answer choices dotted-decimal format dotted-hexadecimal format b.dotted-octal format | dotted-decimal format |
| What privileged EXEC mode command will you use to show the current configurations that you made? Group of answer choices show running-config show latest-config show startup-config show bootup-config | show running-config |
| What is the command to assign the name "Sw-Floor-2" to a switch? Group of answer choices name Sw-Floor-2 host name Sw-Floor-2 host Sw-Floor-2 hostname Sw-Floor-2 | hostname Sw-Floor-2 |
| 20/20 | |
| Which delivery method is used to transmit information to all devices? Group of answer choices Broadcast Multicast Anycast Unicast | broadcast |
| True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. Group of answer choices True False | true |
| This is a specific parameter defined in the operating system Group of answer choices keyword argument syntax code | keyword |
| Which statement is true about the running configuration file in a Cisco IOS device? It affects the operation of the device immediately when modified It should be deleted using the erase running-config command It is stored in NVRAM | It affects the operation of the device immediately when modified |
| What is the command to assign the name "Sw1" to a switch? Group of answer choices hostname Sw1 host Sw1 host name Sw1 name Sw1 | hostname Sw1 |
| From the privileged EXEC mode, access the global configuration mode by entering what command? Group of answer choices configure terminal secret line console 0 enable | configure terminal |
| Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices banner motd # Keep out % banner motd # Keep out ) banner motd # Keep out # banner motd # Keep out @ | banner motd # Keep out # |
| How is an IPv4 address represented? thirty-two hexadecimal numbers separated by colons four decimal numbers between 0 and 222 separated by colons four decimal numbers between 0 and 255 separated by periods | four decimal numbers between 0 and 255 separated by periods |
| 20/20 | |
| True or false. Standards organizations are usually vendor-neutral. Group of answer choices False True | true |
| Which delivery method is used to transmit information to a single device? Group of answer choices Multicast Anycast Unicast Broadcast | Unicast |
| Which protocol stack layer encapsulates data into frames? Group of answer choices application data link network transport | data link |
| This is not predefined; it is a value or variable defined by the user Group of answer choices keyword syntax argument code | argument |
| Which statement is true regarding the user EXEC mode? The device prompt for this mode ends with the ">" symbol. Global configuration mode can be accessed by entering the enable command. Interfaces and routing protocols can be configured. | The device prompt for this mode ends with the ">" symbol. |
| Which command enables password authentication for user EXEC mode access on a switch? Group of answer choices enable secret class service password-encryption login secret class | login |
| Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices display # Keep out # login banner # Keep out # banner motd # Keep out # banner # Keep out # | banner motd # Keep out # |
| 20/20 | |
| What is the purpose of the sequencing function in network communication? to uniquely label transmitted segments of data for proper reassembly by the receiver to ensure data flows at an efficient rate between sender and receiver | to uniquely label transmitted segments of data for proper reassembly by the receiver |
| What is the order of the two addresses in the data link frame? Group of answer choices destination MAC, source MAC source MAC, destination MAC destination MAC, source IP destination IP, source IP | destination MAC, source MAC |
| What is the name of the process of adding protocol information to data as it moves down the protocol stack? Group of answer choices segmentation de-encapsulation sequencing encapsulation | encapsulation |
| Why would a technician enter the command copy startup-config running-config? to copy an existing configuration into RAM to save an active configuration to NVRAM to make a changed configuration the new startup configuration | to copy an existing configuration into RAM |
| This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Group of answer choices startup-config latest-config running-config bootup-config | startup-config |
| This is stored in Random Access Memory (RAM). It reflects the current configuration. Group of answer choices running-config latest-config startup-config bootup-config | running-config |
| 20/20 | |
| What is used to determine the network portion of an IPv4 address? Group of answer choices right-most part of the IP address subnet mask MAC address left-most part of the MAC address | subnet mask |
| What is the PDU associated with the transport layer? Group of answer choices frame packet segment bits | segment |
| Which protocol operates at the network access layer of the TCP/IP model? Group of answer choices Ethernet IP DNS HTTP | Ethernet |
| Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Group of answer choices Kernel Hardware Software Shell | Kernel |
| This is a specific parameter defined in the operating system Group of answer choices syntax keyword code argument | keyword |
| Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Group of answer choices Console Aux Telnet SSH | Console |
| What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? (config)# enable secret Encrypted_Password (config)# enable secret Secret_Password (config)# service password-encryption | (config)# service password-encryption |
| Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? | Use the console port to locally access the switch from a serial or USB interface of the PC. |
| 20 |