Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

networking f2

netwroking f2

QuestionAnswer
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.) Group of answer choices Messaging Routing Protocols Internet Protocol File Transfer Messaging Routing Protocols Internet Protocol
Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.) Group of answer choices TCP ICMPv4 ICMPv6 IPv4 ICMPv4 ICMPv6
What is the process of converting information into the proper form for transmission? Group of answer choices Formatting Encapsulation Decoding Encoding Encoding
Which three are components of message timing? (Choose three.) Group of answer choices Access Method Flow control Sequence Numbers Response Timeout Access Method Flow control Response Timeout
What is the process of dividing a large data stream into smaller pieces prior to transmission? Group of answer choices multiplexing duplexing sequencing segmentation segmentation
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. Internet Engineering Task Force (IETF) Internet Architecture Board (IAB) Internet Research Task Force (IRTF) Internet Engineering Task Force (IETF)
True or false? The right-most part of an IP address is used to identify the network that a device belongs to. false
UDP and TCP belong to which layer of the TCP/IP protocol? Group of answer choices network access application transport internet transport
Which two protocols are service discovery protocols? (Choose two.) Group of answer choices SSH DHCP DNS TCP DHCP DNS
BGP and OSPF are examples of which type of protocol? Group of answer choices routing service discovery network security network communication Routing
Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices banner motd # Keep out # banner # Keep out # display # Keep out / login banner @ Keep out # banner motd # Keep out #
What is the function of the kernel of an operating system? The kernel links the hardware drivers with the underlying electronics of a computer. The kernel provisions hardware resources to meet software requirements. The kernel provisions hardware resources to meet software requirements.
Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices banner # Warning # banner motd # Warning # display # Warning # login banner # Warning # banner motd # Warning #
The physical part of a computer including underlying electronics. Group of answer choices Shell Kernel Software Hardware Hardware
To save time, IOS commands may be partially entered and then completed by typing which key or key combination? Group of answer choices Ctrl-N Ctrl-P Up Arrow Tab tab
The startup config is removed by using what privileged EXEC mode command. Group of answer choices erase bootup-config erase startup-config erase latest-config erase running-config erase startup-config
What type of interface has no physical port associated with it? Group of answer choices serial console Ethernet Switch virtual interface (SVI) Switch virtual interface (SVI)
To move from user EXEC mode to privileged EXEC mode, What command should you use? Group of answer choices line console 0 secret configure terminal enable enable
Which interface is the default SVI on a Cisco switch? Group of answer choices FastEthernet 0/1 VLAN 1 VLAN 99 GigabitEthernet 0/1 vlan 1
True or False? Mobile devices do not require IP addresses to communicate on the Internet. Group of answer choices True False false
20
Which step of the communication process is concerned with properly identifying the address of the sender and receiver? Group of answer choices Decoding Formatting Encoding Encapsulation formatting
This protocol is responsible for guaranteeing the reliable delivery of information. Group of answer choices Ethernet TCP IP HTTP TCP
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? HTML at the application layer IP at the Internet layer IP at the Internet layer
True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. Group of answer choices True False false
This standards organization is responsible for IP address allocation and domain name management. Internet Assigned Numbers Authority (IANA) Internet Engineering Task Force (IETF) Internet Architecture Board (IAB) Internet Society (ISOC) Internet Assigned Numbers Authority (IANA)
Which two protocols belong in the TCP/IP model application layer? Group of answer choices DNS DHCP EIGRP OSPF DHCS DNS
How is an IPv4 address represented? four binary numbers between 0 and 1 separated by comma thirty-two hexadecimal numbers separated by periods four decimal numbers between 0 and 255 separated by periods four decimal numbers between 0 and 255 separated by periods
Which IOS mode are you in if the Switch(config)# prompt is displayed? Group of answer choices Global Configuration Mode User EXEC Mode Privileged EXEC Mode Interface subconfiguration Mode Global Configuration Mode
What is the correct format for IPv4 address? Group of answer choices 192:168:1:4 192.168.0.1 aa.ab.cd.af AB-CD-EF-10 192.168.0.1
What command is used to save changes made to the running configuration to the startup configuration file. copy startup-config latest-config copy running-config startup-config copy startup-config bootup-config copy startup-config running-config copy running-config startup-config
Which device acts as a gateway to allow hosts to send traffic to remote IP networks? Group of answer choices local router DNS server local switch DHCP server local router
What is the structure of an IPv4 address called? Group of answer choices dotted-decimal format dotted-hexadecimal format b.dotted-octal format dotted-decimal format
What privileged EXEC mode command will you use to show the current configurations that you made? Group of answer choices show running-config show latest-config show startup-config show bootup-config show running-config
What is the command to assign the name "Sw-Floor-2" to a switch? Group of answer choices name Sw-Floor-2 host name Sw-Floor-2 host Sw-Floor-2 hostname Sw-Floor-2 hostname Sw-Floor-2
20/20
Which delivery method is used to transmit information to all devices? Group of answer choices Broadcast Multicast Anycast Unicast broadcast
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. Group of answer choices True False true
This is a specific parameter defined in the operating system Group of answer choices keyword argument syntax code keyword
Which statement is true about the running configuration file in a Cisco IOS device? It affects the operation of the device immediately when modified It should be deleted using the erase running-config command It is stored in NVRAM It affects the operation of the device immediately when modified
What is the command to assign the name "Sw1" to a switch? Group of answer choices hostname Sw1 host Sw1 host name Sw1 name Sw1 hostname Sw1
From the privileged EXEC mode, access the global configuration mode by entering what command? Group of answer choices configure terminal secret line console 0 enable configure terminal
Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices banner motd # Keep out % banner motd # Keep out ) banner motd # Keep out # banner motd # Keep out @ banner motd # Keep out #
How is an IPv4 address represented? thirty-two hexadecimal numbers separated by colons four decimal numbers between 0 and 222 separated by colons four decimal numbers between 0 and 255 separated by periods four decimal numbers between 0 and 255 separated by periods
20/20
True or false. Standards organizations are usually vendor-neutral. Group of answer choices False True true
Which delivery method is used to transmit information to a single device? Group of answer choices Multicast Anycast Unicast Broadcast Unicast
Which protocol stack layer encapsulates data into frames? Group of answer choices application data link network transport data link
This is not predefined; it is a value or variable defined by the user Group of answer choices keyword syntax argument code argument
Which statement is true regarding the user EXEC mode? The device prompt for this mode ends with the ">" symbol. Global configuration mode can be accessed by entering the enable command. Interfaces and routing protocols can be configured. The device prompt for this mode ends with the ">" symbol.
Which command enables password authentication for user EXEC mode access on a switch? Group of answer choices enable secret class service password-encryption login secret class login
Which is the command to configure a banner to be displayed when connecting to a switch? Group of answer choices display # Keep out # login banner # Keep out # banner motd # Keep out # banner # Keep out # banner motd # Keep out #
20/20
What is the purpose of the sequencing function in network communication? to uniquely label transmitted segments of data for proper reassembly by the receiver to ensure data flows at an efficient rate between sender and receiver to uniquely label transmitted segments of data for proper reassembly by the receiver
What is the order of the two addresses in the data link frame? Group of answer choices destination MAC, source MAC source MAC, destination MAC destination MAC, source IP destination IP, source IP destination MAC, source MAC
What is the name of the process of adding protocol information to data as it moves down the protocol stack? Group of answer choices segmentation de-encapsulation sequencing encapsulation encapsulation
Why would a technician enter the command copy startup-config running-config? to copy an existing configuration into RAM to save an active configuration to NVRAM to make a changed configuration the new startup configuration to copy an existing configuration into RAM
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Group of answer choices startup-config latest-config running-config bootup-config startup-config
This is stored in Random Access Memory (RAM). It reflects the current configuration. Group of answer choices running-config latest-config startup-config bootup-config running-config
20/20
What is used to determine the network portion of an IPv4 address? Group of answer choices right-most part of the IP address subnet mask MAC address left-most part of the MAC address subnet mask
What is the PDU associated with the transport layer? Group of answer choices frame packet segment bits segment
Which protocol operates at the network access layer of the TCP/IP model? Group of answer choices Ethernet IP DNS HTTP Ethernet
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Group of answer choices Kernel Hardware Software Shell Kernel
This is a specific parameter defined in the operating system Group of answer choices syntax keyword code argument keyword
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Group of answer choices Console Aux Telnet SSH Console
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? (config)# enable secret Encrypted_Password (config)# enable secret Secret_Password (config)# service password-encryption (config)# service password-encryption
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? Use the console port to locally access the switch from a serial or USB interface of the PC.
20
Created by: f3xo
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards