Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Networking Midterms1

QuestionAnswer
Assures users of timely and reliable access to data services for authorized users. Availability
Extend LAN access technology into the WAN. Metro Ethernet
A worldwide collection of interconnected networks Internet
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Security
Means that only the intended and authorized recipients can access and read data. Confidentiality
Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. DSL
Which feature describes using personal tools to access information and communicate across a business or campus network? BYOD
An inexpensive option that uses any phone line and a modem and has low bandwidth Dial Up
These applications help to protect end devices from becoming infected with malicious software. Antivirus and antispyware
Identify the end device. Printer
A characteristics of a network that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. Fault Tolerance
Which feature is being used when connecting a device to the network using an electrical outlet? Powerline
This attack steals the login credentials of a user in order to access private data. Identity Theft
This attack captures private information from an organization's network. Data interception and theft
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? Fault Tolerance
Which option blocks unauthorized access to your network? Firewall
Which of the following is the name for all computers connected to a network that participate directly in network communication? Hosts
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? Quality of Service (QoS)
Identify the Intermediary device. Router
Devices that connect individual end devices to the network. Intermediary device
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? Video Communications
Identify the Intermediary device. Hub
A characteristics of a network that can expands quickly to support new users and applications. Scalability
Assures users that the information has not been altered in transmission, from origin to destination. Integrity
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? Extranet
Which feature contains options such as Public, Private, Custom and Hybrid? Cloud Computing
This type of topology diagrams illustrate the physical location of intermediary devices and cable installation. Physical Topology
These are types of software which are installed on a user's device. The software then secretly collects information about the user. Spyware and Adware
Which feature uses the same cellular technology as a smart phone? Wireless Broadband
These attacks slow or crash applications and processes on a network device. Denial of Service
What is the disadvantages of peer-to-peer networking No centralized administration
Which attack slows down or crashes equipment and programs? Denial of Service
Coaxial cable encodes data into? Electrical impulses
The acronym UTP stands for? Unshielded Twisted Pair
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet. Cable
Uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. Cellular
What is the advantage of peer-to-peer networking? Easy to set up
The source or destination of a message transmitted over the network. End Device
This type topology diagrams illustrate devices, ports, and the addressing scheme of the network. Logical Topology
Identify the end device. Laptop
This type of Internet connection is use in areas that would otherwise have no internet connectivity at all. Satellite
Which option describes a network attack that occurs on the first day that a vulnerability becomes known? Zero day or Zero hour
Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate Dedicated Leased Line
Identify the Intermediary device. Modem
Which option creates a secure connection for remote workers? Virtual Private Network
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? LAN
Which option describes malicious code running on user devices? Virus, worm or Trojan Horse
This standards organization is responsible for IP address allocation and domain name management. Internet Assigned Numbers Authority (IANA)
Which protocol stack layer encapsulates data into frames? Data Link
Which two protocols are service discovery protocols? DHCP and DNS
This protocol is responsible for guaranteeing the reliable delivery of information. TCP
What is used to determine the network portion of an IPv4 address? Subnet mask
Which two protocols belong in the TCP/IP model application layer? DHCP and DNS
True or False? Data Link addresses are physical so they never change in the data link frame from source to destination. False
True or false? The right-most part of an IP address is used to identify the network that a device belongs to. False
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. True
What types of standards are developed by the Electronics Industries Alliance (EIA)? Electric wiring and connectors
To save time, IOS commands may be partially entered and then completed by typing which key or key combination? Tab
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? service password-encryption
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Kernel
Which interface allows remote management of a Layer 2 switch? Switch virtual interface
Which IOS mode are you in if the Switch> prompt is displayed? User EXEC Mode
This is not predefined; it is a value or variable defined by the user Argument
From the privileged EXEC mode, access the global configuration mode by entering what command? configure terminal
What command is used to save changes made to the running configuration to the startup configuration file. copy running-config startup-config
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? Nothing must be done
Which device acts as a gateway to allow hosts to send traffic to remote IP networks? Local switch
Which three are components of message timing? Flow control,Response Timeout,Access Method
True or false. Standards organizations are usually vendor-neutral. True
Which delivery method is used to transmit information to all devices? Broadcast
What is the PDU associated with the transport layer? Segment
Which services are provided by the internet layer of the TCP/IP protocol suite? Internet Protocol,Routing Protocols,Messaging
Which step of the communication process is concerned with properly identifying the address of the sender and receiver? Formatting
What is the purpose of the sequencing function in network communication? To uniquely label transmitted segments for proper reassembly
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. Internet Engineering Task Force (IETF)
How is SSH different from Telnet? SSH encrypts communication and authenticates users
Which IOS mode allows access to all commands and features? Privileged EXEC Mode
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Console
This is a specific parameter defined in the operating system Keyword
Which access method would be the most appropriate in-band access to the IOS over a network connection? Telnet/SSH
This is stored in Random Access Memory (RAM). It reflects the current configuration. Running-config
The physical part of a computer including underlying electronics. Hardware
Which command encrypts all plaintext passwords access on a switch? service password-encryption
How is an IPv4 address represented? Four decimal numbers between 0 and 255 separated by periods
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network? Multicast
BGP and OSPF are examples of which type of protocol? Routing
What is the order of the two addresses in the data link frame? Destination MAC,Source MAC
Which delivery method is used to transmit information to a single device? Unicast
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device? IP at the Internet layer
Which information does the show startup-config command display? Contents of the saved configuration file in NVRAM
The user interface that allows users to request specific tasks from the computer. Shell
Which statement is true regarding the user EXEC mode? The prompt ends with >
The startup config is removed by using what privileged EXEC mode command. erase startup-config
What is the function of the kernel of an operating system? Provisions hardware resources
What is the correct format for IPv4 address? 192.168.0.1
Which is the command to configure a banner to be displayed when connecting to a switch? banner motd
UDP and TCP belong to which layer of the TCP/IP protocol? Transport
Which of the following statements are true regarding network layer and data link layer addresses? Network layer addresses are logical;Data link addresses are physical;Network layer addresses are 32 or 128 bits
What is the name of the process of adding protocol information to data as it moves down the protocol stack? Encapsulation
Which interface is the default SVI on a Cisco switch? VLAN 1
Which command enables password authentication for user EXEC mode access on a switch? login
What type of interface has no physical port associated with it? Switch virtual interface
To move from user EXEC mode to privileged EXEC mode, What command should you use? enable
What is the process of converting information into the proper form for transmission? Encoding
True or False? Mobile devices do not require IP addresses to communicate on the Internet. False
Which statement is true about the running configuration file in a Cisco IOS device? It affects the device immediately
Why would a technician enter the command copy startup-config running-config? To copy saved config into RAM
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? Use the console port
How is the privileged EXEC mode access secured on a switch? enable secret class
Which type of UTP cable is used to connect a PC to a switch port? straight-through
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device needs mobility when connecting to the network
What is a characteristic of UTP cabling? cancellation
What is one advantage of using fiber optic cabling rather than copper cabling? It is able to carry signals much farther than copper cabling
Which characteristic describes crosstalk? the distortion of the transmitted messages from signals carried in adjacent wires
What type of cable is used to connect a workstation serial port to a Cisco router console port? rollover
What is indicated by the term throughput? the measure of the bits transferred across the media over a given period of time
Which procedure is used to reduce the effect of crosstalk in copper cables? twisting opposing circuit wire pairs together
A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. the microwave oven and the cellular phones used by the employees
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? physical layer
What is the equivalent to hexadecimal of the decimal 52? 34
What is the equivalent to decimal of the hexadecimal 6A? 106
What is the equivalent to decimal of the hexadecimal A7? 167
What is the equivalent to decimal of the hexadecimal 7A? 122
What is the equivalent to decimal of the hexadecimal AD? 173
What is the equivalent to decimal of the hexadecimal A1? 161
What is the equivalent to hexadecimal of the decimal 33? 21
What is the equivalent to hexadecimal of the decimal 22? 16
What is the equivalent to decimal of the hexadecimal A3? 163
What is the equivalent to decimal of the hexadecimal A? None of the above
What is the equivalent to decimal of the hexadecimal CA? 202
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? mesh
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? the use of full-duplex capable Layer 2 switches
What does a router do after de-encapsulating a received frame? determines the best path
What are two services performed by the data link layer of the OSI model? media access control and error detection;encapsulation of Layer 3 packets into frames
Which is a function of the Logical Link Control (LLC) sublayer? to identify which network layer protocol is being used
What type of physical topology can be created by connecting all Ethernet cables to a central device? star
Which statement describes the half-duplex mode of data transmission? Data flows in one direction at a time
Which two engineering organizations define open standards and protocols that apply to the data link layer? International Telecommunication Union (ITU);International Organization for Standardization (ISO)
Which data link layer media access control method does Ethernet use? CSMA/CD
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? data link
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? discard the frame
What is auto-MDIX? a feature that detects Ethernet cable type
What are the two sizes of an Ethernet frame? 64 bytes and 1518 bytes
What type of address is 01-00-5E-0A-00-02? multicast address
What addressing information is recorded by a switch to build its MAC address table? source MAC address
Which two characteristics describe Ethernet technology? IEEE 802.3 standard;CSMA/CD access method
Which function or operation is performed by the LLC sublayer? communicates with upper protocol layers
Which network device makes forwarding decisions based on the destination MAC address? switch
What is the special value assigned to the first 24 bits of a multicast MAC address? 01-00-5E
Which two functions are performed by the MAC sublayer? media access control;adds header and trailer
Why are two strands of fiber used for a single fiber optic connection? to allow full-duplex communication
What is the purpose of the OSI physical layer? transmitting bits across the local media
What is the definition of bandwidth? the amount of data that can flow in a given time
Which statement correctly describes frame encoding? converts bits into a predictable code pattern
What is the equivalent to hexadecimal of the decimal 34? 22
What is the equivalent to hexadecimal of the decimal 44? 2C
What is the equivalent to decimal of the hexadecimal A? 10
What is the equivalent to decimal of the hexadecimal B1? 177
What is the equivalent to decimal of the hexadecimal AE? 174
What is the equivalent to hexadecimal of the decimal 31? 1F
What is the equivalent to hexadecimal of the decimal 23? 17
What is the equivalent to decimal of the hexadecimal CC? 204
What is the equivalent to hexadecimal of the decimal 20? 14
What is true concerning physical and logical topologies? Logical topologies describe how data flows
What are the two sublayers of the data link layer? LLC;MAC
What method is used to manage contention-based access on a wireless network? CSMA/CA
What identifier is used at the data link layer to uniquely identify an Ethernet device? MAC address
Which statement is true about MAC addresses? The first three bytes identify the vendor OUI
What happens to runt frames received by a Cisco Ethernet switch? They are dropped
What statement describes a characteristic of MAC addresses? They are globally unique
Which network device forwards data based on a MAC address table? switch
Which standards organization oversees wireless LAN standards? IEEE
What is the equivalent to decimal of the hexadecimal 2A? 42
What is the equivalent to decimal of the hexadecimal A2? 162
What is the equivalent to decimal of the hexadecimal B? 11
What is the equivalent to decimal of the hexadecimal 4A? 74
What is the equivalent to hexadecimal of the decimal 71? 47
What is the equivalent to hexadecimal of the decimal 64? 40
What is the equivalent to decimal of the hexadecimal 8A? 138
What is the equivalent to decimal of the hexadecimal A8? 168
What attribute of a NIC places it at the data link layer? MAC address
Which field in an IPv6 packet is used to determine expiration? Hop Limit
What was the reason for IPv6 creation? IPv4 address depletion
When a router receives a packet, what information is examined? destination IP address
Which IPv4 header field usually stays the same? destination address
Which information do routers use to forward packets? destination IP address
Which IPv6 enhancement improves packet handling? simpler header
Which IPv4 address is used for loopback? 127.0.0.1
What information is added at OSI Layer 3? source and destination IP addresses
How is a packet sent within the same LAN? sent directly to destination host
Which statement describes IPv4? 32-bit address space
When sending to a remote network, what does ARP provide? MAC address of the router interface
Which destination address is used in an ARP request? FFFF.FFFF.FFFF
How does ARP use an IP address? to determine the MAC address
What does the ARP table map? IP address to MAC address
Which command displays ARP cache on a host? arp -a
What does a Layer 2 switch do if destination MAC is unknown? floods all ports except incoming port
What is a function of ARP? resolving IP addresses to MAC addresses
Which router component stores routing table and running config? RAM
What does a switch do with a broadcast frame? forwards to all ports except source port
Which two ICMPv6 messages resolve MAC addresses? neighbor solicitation;neighbor advertisement
What is stored in NVRAM? startup configuration
Which commands enable console login with password cisco? line console 0;password cisco;login
Which command secures privileged EXEC access? enable secret trustknow1
Which command encrypts all passwords? service password-encryption
Which CLI mode allows full access? privileged EXEC mode
What is the purpose of banner motd? display login messages
What is true about service password-encryption? existing plaintext passwords are encrypted
Which command shows interface IPs and status? show ip interface brief
Which configuration mode allows the login command? line configuration mode
What describes the default gateway? router interface address on the same network
How does the network layer use MTU? passed from data link layer
Which Windows command shows routing table? netstat -r
What addresses does ARP map? IPv4 address to MAC address
What is ARP’s purpose? obtain MAC address using IP
What information is in an ARP table? IP-to-MAC mappings
Why does a router enter setup mode? missing startup configuration
What is the purpose of startup-config? configure router on boot
What happens after entering hostname portsmouth? portsmouth(config)
When lower layers are connectionless, how is missing data handled? upper-layer protocols request retransmission
Created by: jxxnixx
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards