click below
click below
Normal Size Small Size show me how
Networking Midterms1
| Question | Answer |
|---|---|
| Assures users of timely and reliable access to data services for authorized users. | Availability |
| Extend LAN access technology into the WAN. | Metro Ethernet |
| A worldwide collection of interconnected networks | Internet |
| Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? | Security |
| Means that only the intended and authorized recipients can access and read data. | Confidentiality |
| Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. | DSL |
| Which feature describes using personal tools to access information and communicate across a business or campus network? | BYOD |
| An inexpensive option that uses any phone line and a modem and has low bandwidth | Dial Up |
| These applications help to protect end devices from becoming infected with malicious software. | Antivirus and antispyware |
| Identify the end device. | Printer |
| A characteristics of a network that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. | Fault Tolerance |
| Which feature is being used when connecting a device to the network using an electrical outlet? | Powerline |
| This attack steals the login credentials of a user in order to access private data. | Identity Theft |
| This attack captures private information from an organization's network. | Data interception and theft |
| Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? | Fault Tolerance |
| Which option blocks unauthorized access to your network? | Firewall |
| Which of the following is the name for all computers connected to a network that participate directly in network communication? | Hosts |
| With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? | Quality of Service (QoS) |
| Identify the Intermediary device. | Router |
| Devices that connect individual end devices to the network. | Intermediary device |
| Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? | Video Communications |
| Identify the Intermediary device. | Hub |
| A characteristics of a network that can expands quickly to support new users and applications. | Scalability |
| Assures users that the information has not been altered in transmission, from origin to destination. | Integrity |
| Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? | Extranet |
| Which feature contains options such as Public, Private, Custom and Hybrid? | Cloud Computing |
| This type of topology diagrams illustrate the physical location of intermediary devices and cable installation. | Physical Topology |
| These are types of software which are installed on a user's device. The software then secretly collects information about the user. | Spyware and Adware |
| Which feature uses the same cellular technology as a smart phone? | Wireless Broadband |
| These attacks slow or crash applications and processes on a network device. | Denial of Service |
| What is the disadvantages of peer-to-peer networking | No centralized administration |
| Which attack slows down or crashes equipment and programs? | Denial of Service |
| Coaxial cable encodes data into? | Electrical impulses |
| The acronym UTP stands for? | Unshielded Twisted Pair |
| Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet. | Cable |
| Uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. | Cellular |
| What is the advantage of peer-to-peer networking? | Easy to set up |
| The source or destination of a message transmitted over the network. | End Device |
| This type topology diagrams illustrate devices, ports, and the addressing scheme of the network. | Logical Topology |
| Identify the end device. | Laptop |
| This type of Internet connection is use in areas that would otherwise have no internet connectivity at all. | Satellite |
| Which option describes a network attack that occurs on the first day that a vulnerability becomes known? | Zero day or Zero hour |
| Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate | Dedicated Leased Line |
| Identify the Intermediary device. | Modem |
| Which option creates a secure connection for remote workers? | Virtual Private Network |
| Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? | LAN |
| Which option describes malicious code running on user devices? | Virus, worm or Trojan Horse |
| This standards organization is responsible for IP address allocation and domain name management. | Internet Assigned Numbers Authority (IANA) |
| Which protocol stack layer encapsulates data into frames? | Data Link |
| Which two protocols are service discovery protocols? | DHCP and DNS |
| This protocol is responsible for guaranteeing the reliable delivery of information. | TCP |
| What is used to determine the network portion of an IPv4 address? | Subnet mask |
| Which two protocols belong in the TCP/IP model application layer? | DHCP and DNS |
| True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. | False |
| True or false? The right-most part of an IP address is used to identify the network that a device belongs to. | False |
| True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. | True |
| What types of standards are developed by the Electronics Industries Alliance (EIA)? | Electric wiring and connectors |
| To save time, IOS commands may be partially entered and then completed by typing which key or key combination? | Tab |
| What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? | service password-encryption |
| Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. | Kernel |
| Which interface allows remote management of a Layer 2 switch? | Switch virtual interface |
| Which IOS mode are you in if the Switch> prompt is displayed? | User EXEC Mode |
| This is not predefined; it is a value or variable defined by the user | Argument |
| From the privileged EXEC mode, access the global configuration mode by entering what command? | configure terminal |
| What command is used to save changes made to the running configuration to the startup configuration file. | copy running-config startup-config |
| An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? | Nothing must be done |
| Which device acts as a gateway to allow hosts to send traffic to remote IP networks? | Local switch |
| Which three are components of message timing? | Flow control,Response Timeout,Access Method |
| True or false. Standards organizations are usually vendor-neutral. | True |
| Which delivery method is used to transmit information to all devices? | Broadcast |
| What is the PDU associated with the transport layer? | Segment |
| Which services are provided by the internet layer of the TCP/IP protocol suite? | Internet Protocol,Routing Protocols,Messaging |
| Which step of the communication process is concerned with properly identifying the address of the sender and receiver? | Formatting |
| What is the purpose of the sequencing function in network communication? | To uniquely label transmitted segments for proper reassembly |
| This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. | Internet Engineering Task Force (IETF) |
| How is SSH different from Telnet? | SSH encrypts communication and authenticates users |
| Which IOS mode allows access to all commands and features? | Privileged EXEC Mode |
| Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? | Console |
| This is a specific parameter defined in the operating system | Keyword |
| Which access method would be the most appropriate in-band access to the IOS over a network connection? | Telnet/SSH |
| This is stored in Random Access Memory (RAM). It reflects the current configuration. | Running-config |
| The physical part of a computer including underlying electronics. | Hardware |
| Which command encrypts all plaintext passwords access on a switch? | service password-encryption |
| How is an IPv4 address represented? | Four decimal numbers between 0 and 255 separated by periods |
| Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? | Multicast |
| BGP and OSPF are examples of which type of protocol? | Routing |
| What is the order of the two addresses in the data link frame? | Destination MAC,Source MAC |
| Which delivery method is used to transmit information to a single device? | Unicast |
| A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? | IP at the Internet layer |
| Which information does the show startup-config command display? | Contents of the saved configuration file in NVRAM |
| The user interface that allows users to request specific tasks from the computer. | Shell |
| Which statement is true regarding the user EXEC mode? | The prompt ends with > |
| The startup config is removed by using what privileged EXEC mode command. | erase startup-config |
| What is the function of the kernel of an operating system? | Provisions hardware resources |
| What is the correct format for IPv4 address? | 192.168.0.1 |
| Which is the command to configure a banner to be displayed when connecting to a switch? | banner motd |
| UDP and TCP belong to which layer of the TCP/IP protocol? | Transport |
| Which of the following statements are true regarding network layer and data link layer addresses? | Network layer addresses are logical;Data link addresses are physical;Network layer addresses are 32 or 128 bits |
| What is the name of the process of adding protocol information to data as it moves down the protocol stack? | Encapsulation |
| Which interface is the default SVI on a Cisco switch? | VLAN 1 |
| Which command enables password authentication for user EXEC mode access on a switch? | login |
| What type of interface has no physical port associated with it? | Switch virtual interface |
| To move from user EXEC mode to privileged EXEC mode, What command should you use? | enable |
| What is the process of converting information into the proper form for transmission? | Encoding |
| True or False? Mobile devices do not require IP addresses to communicate on the Internet. | False |
| Which statement is true about the running configuration file in a Cisco IOS device? | It affects the device immediately |
| Why would a technician enter the command copy startup-config running-config? | To copy saved config into RAM |
| Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? | Use the console port |
| How is the privileged EXEC mode access secured on a switch? | enable secret class |
| Which type of UTP cable is used to connect a PC to a switch port? | straight-through |
| A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? | The end-user device needs mobility when connecting to the network |
| What is a characteristic of UTP cabling? | cancellation |
| What is one advantage of using fiber optic cabling rather than copper cabling? | It is able to carry signals much farther than copper cabling |
| Which characteristic describes crosstalk? | the distortion of the transmitted messages from signals carried in adjacent wires |
| What type of cable is used to connect a workstation serial port to a Cisco router console port? | rollover |
| What is indicated by the term throughput? | the measure of the bits transferred across the media over a given period of time |
| Which procedure is used to reduce the effect of crosstalk in copper cables? | twisting opposing circuit wire pairs together |
| A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. | the microwave oven and the cellular phones used by the employees |
| A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? | physical layer |
| What is the equivalent to hexadecimal of the decimal 52? | 34 |
| What is the equivalent to decimal of the hexadecimal 6A? | 106 |
| What is the equivalent to decimal of the hexadecimal A7? | 167 |
| What is the equivalent to decimal of the hexadecimal 7A? | 122 |
| What is the equivalent to decimal of the hexadecimal AD? | 173 |
| What is the equivalent to decimal of the hexadecimal A1? | 161 |
| What is the equivalent to hexadecimal of the decimal 33? | 21 |
| What is the equivalent to hexadecimal of the decimal 22? | 16 |
| What is the equivalent to decimal of the hexadecimal A3? | 163 |
| What is the equivalent to decimal of the hexadecimal A? | None of the above |
| What is the equivalent to decimal of the hexadecimal CA? | 202 |
| A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? | mesh |
| Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? | the use of full-duplex capable Layer 2 switches |
| What does a router do after de-encapsulating a received frame? | determines the best path |
| What are two services performed by the data link layer of the OSI model? | media access control and error detection;encapsulation of Layer 3 packets into frames |
| Which is a function of the Logical Link Control (LLC) sublayer? | to identify which network layer protocol is being used |
| What type of physical topology can be created by connecting all Ethernet cables to a central device? | star |
| Which statement describes the half-duplex mode of data transmission? | Data flows in one direction at a time |
| Which two engineering organizations define open standards and protocols that apply to the data link layer? | International Telecommunication Union (ITU);International Organization for Standardization (ISO) |
| Which data link layer media access control method does Ethernet use? | CSMA/CD |
| Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? | data link |
| What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? | discard the frame |
| What is auto-MDIX? | a feature that detects Ethernet cable type |
| What are the two sizes of an Ethernet frame? | 64 bytes and 1518 bytes |
| What type of address is 01-00-5E-0A-00-02? | multicast address |
| What addressing information is recorded by a switch to build its MAC address table? | source MAC address |
| Which two characteristics describe Ethernet technology? | IEEE 802.3 standard;CSMA/CD access method |
| Which function or operation is performed by the LLC sublayer? | communicates with upper protocol layers |
| Which network device makes forwarding decisions based on the destination MAC address? | switch |
| What is the special value assigned to the first 24 bits of a multicast MAC address? | 01-00-5E |
| Which two functions are performed by the MAC sublayer? | media access control;adds header and trailer |
| Why are two strands of fiber used for a single fiber optic connection? | to allow full-duplex communication |
| What is the purpose of the OSI physical layer? | transmitting bits across the local media |
| What is the definition of bandwidth? | the amount of data that can flow in a given time |
| Which statement correctly describes frame encoding? | converts bits into a predictable code pattern |
| What is the equivalent to hexadecimal of the decimal 34? | 22 |
| What is the equivalent to hexadecimal of the decimal 44? | 2C |
| What is the equivalent to decimal of the hexadecimal A? | 10 |
| What is the equivalent to decimal of the hexadecimal B1? | 177 |
| What is the equivalent to decimal of the hexadecimal AE? | 174 |
| What is the equivalent to hexadecimal of the decimal 31? | 1F |
| What is the equivalent to hexadecimal of the decimal 23? | 17 |
| What is the equivalent to decimal of the hexadecimal CC? | 204 |
| What is the equivalent to hexadecimal of the decimal 20? | 14 |
| What is true concerning physical and logical topologies? | Logical topologies describe how data flows |
| What are the two sublayers of the data link layer? | LLC;MAC |
| What method is used to manage contention-based access on a wireless network? | CSMA/CA |
| What identifier is used at the data link layer to uniquely identify an Ethernet device? | MAC address |
| Which statement is true about MAC addresses? | The first three bytes identify the vendor OUI |
| What happens to runt frames received by a Cisco Ethernet switch? | They are dropped |
| What statement describes a characteristic of MAC addresses? | They are globally unique |
| Which network device forwards data based on a MAC address table? | switch |
| Which standards organization oversees wireless LAN standards? | IEEE |
| What is the equivalent to decimal of the hexadecimal 2A? | 42 |
| What is the equivalent to decimal of the hexadecimal A2? | 162 |
| What is the equivalent to decimal of the hexadecimal B? | 11 |
| What is the equivalent to decimal of the hexadecimal 4A? | 74 |
| What is the equivalent to hexadecimal of the decimal 71? | 47 |
| What is the equivalent to hexadecimal of the decimal 64? | 40 |
| What is the equivalent to decimal of the hexadecimal 8A? | 138 |
| What is the equivalent to decimal of the hexadecimal A8? | 168 |
| What attribute of a NIC places it at the data link layer? | MAC address |
| Which field in an IPv6 packet is used to determine expiration? | Hop Limit |
| What was the reason for IPv6 creation? | IPv4 address depletion |
| When a router receives a packet, what information is examined? | destination IP address |
| Which IPv4 header field usually stays the same? | destination address |
| Which information do routers use to forward packets? | destination IP address |
| Which IPv6 enhancement improves packet handling? | simpler header |
| Which IPv4 address is used for loopback? | 127.0.0.1 |
| What information is added at OSI Layer 3? | source and destination IP addresses |
| How is a packet sent within the same LAN? | sent directly to destination host |
| Which statement describes IPv4? | 32-bit address space |
| When sending to a remote network, what does ARP provide? | MAC address of the router interface |
| Which destination address is used in an ARP request? | FFFF.FFFF.FFFF |
| How does ARP use an IP address? | to determine the MAC address |
| What does the ARP table map? | IP address to MAC address |
| Which command displays ARP cache on a host? | arp -a |
| What does a Layer 2 switch do if destination MAC is unknown? | floods all ports except incoming port |
| What is a function of ARP? | resolving IP addresses to MAC addresses |
| Which router component stores routing table and running config? | RAM |
| What does a switch do with a broadcast frame? | forwards to all ports except source port |
| Which two ICMPv6 messages resolve MAC addresses? | neighbor solicitation;neighbor advertisement |
| What is stored in NVRAM? | startup configuration |
| Which commands enable console login with password cisco? | line console 0;password cisco;login |
| Which command secures privileged EXEC access? | enable secret trustknow1 |
| Which command encrypts all passwords? | service password-encryption |
| Which CLI mode allows full access? | privileged EXEC mode |
| What is the purpose of banner motd? | display login messages |
| What is true about service password-encryption? | existing plaintext passwords are encrypted |
| Which command shows interface IPs and status? | show ip interface brief |
| Which configuration mode allows the login command? | line configuration mode |
| What describes the default gateway? | router interface address on the same network |
| How does the network layer use MTU? | passed from data link layer |
| Which Windows command shows routing table? | netstat -r |
| What addresses does ARP map? | IPv4 address to MAC address |
| What is ARP’s purpose? | obtain MAC address using IP |
| What information is in an ARP table? | IP-to-MAC mappings |
| Why does a router enter setup mode? | missing startup configuration |
| What is the purpose of startup-config? | configure router on boot |
| What happens after entering hostname portsmouth? | portsmouth(config) |
| When lower layers are connectionless, how is missing data handled? | upper-layer protocols request retransmission |