Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

network midterm

kunware midterm

QuestionAnswer
Assures users of timely and reliable access to data services for authorized users. Security Availability Scalability Availability
Extend LAN access technology into the WAN. DSL Metro Ethernet Internet Metro Ethernet
A worldwide collection of interconnected networks. Intranet Extranet Internet Internet
Confidentiality, integrity, and availability are requirements of which characteristic of network architecture? Performance Security Reliability Security
Means that only the intended and authorized recipients can access and read data. Integrity Availability Confidentiality Confidentiality
Provide high bandwidth, high availability, always-on internet over a telephone line. Dial Up DSL Cable DSL
Which feature describes using personal tools to access a business or campus network? Cloud Computing BYOD VPN BYOD
An inexpensive internet option that uses a phone line and modem with low bandwidth. DSL Dial Up Satellite Dial Up
Which applications protect devices from malicious software? Firewall Antivirus and antispyware VPN Antivirus and antispyware
Identify the end device. Router Printer Switch Printer
Which network characteristic limits affected devices during failure and allows recovery? Scalability Fault Tolerance Security Fault Tolerance
Which feature connects a device using an electrical outlet? Wireless Powerline Fiber Powerline
Which attack steals login credentials to access private data? Phishing Identity Theft DoS Identity Theft
Which attack captures private data from an organization’s network? Spoofing Data interception and theft Malware Data interception and theft
Redundancy with multiple paths to a destination is which characteristic? Availability Fault Tolerance Scalability Fault Tolerance
Which option blocks unauthorized network access? Antivirus Firewall Hub Firewall
What are all computers participating directly in network communication called? Nodes Hosts Servers Hosts
Which policy prioritizes voice traffic during congestion? NAT Quality of Service ACL Quality of Service
Identify the intermediary device. Router Laptop Printer Router
Devices that connect individual end devices to the network. End devices Intermediary devices Servers Intermediary devices
Which feature supports conferencing over long distances? Email Video Communications Chat Video Communications
Identify the intermediary device. Switch Hub Modem Hub
Which characteristic allows a network to expand quickly? Security Scalability Availability Scalability
Which assures information is not altered in transit? Confidentiality Integrity Availability Integrity
Which infrastructure provides secure access to external organizations? Internet Extranet Intranet Extranet
Which feature includes Public, Private, Hybrid, and Custom? Virtualization Cloud Computing BYOD Cloud Computing
Which topology shows physical device locations and cabling? Logical topology Physical topology Network map Physical topology
Which software secretly collects user information? Firewall Spyware and Adware Antivirus Spyware and Adware
Which feature uses cellular technology like smartphones? DSL Wireless Broadband Satellite Wireless Broadband
Which attack slows or crashes applications? Spoofing Denial of Service Phishing Denial of Service
What is a disadvantage of peer-to-peer networking? High cost No centralized administration Complex setup No centralized administration
Which attack crashes equipment and programs? Malware Denial of Service Spyware Denial of Service
Coaxial cable encodes data as: Light pulses Electrical impulses Radio waves Electrical impulses
UTP stands for: Universal Twisted Pair Unshielded Twisted Pair Unterminated Twisted Pair Unshielded Twisted Pair
Which internet connection is offered by cable TV providers? DSL Cable Fiber Cable
Which internet access uses a cell phone network? Satellite Cellular DSL Cellular
What is an advantage of peer-to-peer networking? Centralized control Easy to set up High security Easy to set up
The source or destination of a network message is called: Router End Device Switch End Device
Which topology shows devices, ports, and addressing? Physical topology Logical topology Cable layout Logical topology
Identify the end device. Router Laptop Switch Laptop
Which internet type is used where no other connectivity exists? DSL Satellite Cable Satellite
Which attack occurs the day a vulnerability is discovered? Phishing Zero day DoS Zero day
What connects distant offices via rented private circuits? VPN Dedicated Leased Line Metro Ethernet Dedicated Leased Line
Identify the intermediary device. Router Modem Switch Modem
Which option secures remote worker connections? Firewall Virtual Private Network Proxy Virtual Private Network
Which infrastructure serves small geographic areas? WAN LAN MAN LAN
Which describes malicious code on devices? Firewall Virus, worm, or Trojan Horse Spyware Virus, worm, or Trojan Horse
Which organization manages IP addresses and domains? IEEE IANA ISO IANA
Which layer encapsulates data into frames? Network Data Link Transport Data Link
Which two are service discovery protocols? FTP DHCP DNS DHCP DNS
Which protocol guarantees reliable delivery? UDP TCP ICMP TCP
What determines the network portion of an IPv4 address? Gateway Subnet mask MAC address Subnet mask
Which protocols are in the application layer? HTTP DHCP DNS DHCP DNS
Data Link addresses never change end-to-end. True False False
The right-most part of an IP identifies the network. True False False
Frames between different networks go to a default gateway. True False True
EIA develops standards for: Wireless protocols Electric wiring and connectors IP addressing Electric wiring and connectors
Which key completes IOS commands? Enter Tab Ctrl+C Tab
Which command encrypts plaintext passwords? enable secret service password-encryption login service password-encryption
What manages hardware and software interaction? Shell Kernel Firmware Kernel
Which interface manages a Layer 2 switch remotely? Console SVI Ethernet port SVI
Switch> prompt indicates which mode? Global config User EXEC Privileged EXEC User EXEC
A user-defined variable is called: Keyword Argument Command Argument
Command to enter global configuration mode: enable configure terminal interface configure terminal
Which command saves running config to startup config? write memory copy running-config startup-config save config copy running-config startup-config
After changing an IP address, what must be done? Reload device Save config Nothing Nothing
Which device sends traffic to remote networks? Router Local switch Hub Local switch
Which are components of message timing? Flow control Response timeout Access method Flow control Response timeout Access method
Standards organizations are vendor-neutral. True False True
Which delivery sends to all devices? Unicast Broadcast Multicast Broadcast
Transport layer PDU is called: Packet Segment Frame Segment
Which services are provided by the internet layer? IP Routing Messaging IP Routing Messaging
Which step identifies sender and receiver addresses? Encoding Formatting Encapsulation Formatting
Sequencing ensures: Faster transmission Correct reassembly Encryption Correct reassembly
Which organization publishes RFCs? ISO IETF IEEE IETF
How is SSH different from Telnet? SSH encrypts traffic Telnet encrypts traffic Both are secure SSH encrypts traffic
Which IOS mode allows all commands? User EXEC Privileged EXEC Global config Privileged EXEC
Best access method for initial switch setup? Telnet Console SSH Console
A predefined OS parameter is called: Argument Keyword Variable Keyword
Best in-band IOS access? Console Telnet/SSH AUX Telnet/SSH
Which config is stored in RAM? Startup-config Running-config Backup-config Running-config
Physical computer components are called: Software Hardware Firmware Hardware
Which command encrypts plaintext passwords? enable secret service password-encryption login service password-encryption
IPv4 addresses are represented as: Binary strings Four decimals 0–255 Hexadecimal Four decimals 0–255
Which delivery method sends to some but not all? Broadcast Multicast Unicast Multicast
BGP and OSPF are: Transport protocols Routing protocols Application protocols Routing protocols
Order of MAC addresses in a frame? Source then destination Destination then source Random Destination then source
Which delivery sends to one device? Broadcast Unicast Multicast Unicast
After Ethernet is removed, what is processed next? Transport layer Internet layer IP Application layer Internet layer IP
show startup-config displays: Running config Saved config in NVRAM Interface status Saved config in NVRAM
CLI/GUI request interface is called: Kernel Shell BIOS Shell
User EXEC mode prompt ends with: > $
Which command deletes startup config? delete config erase startup-config clear config erase startup-config
Kernel function is to: Manage users Provision hardware Encrypt data Provision hardware
Correct IPv4 format: 192.168.0.1 999.10.1.1 192.168.1 192.168.0.1
Banner command syntax: banner login banner motd set banner banner motd
UDP and TCP belong to which layer? Internet Transport Application Transport
Which statements about addresses are true? Logical vs physical MAC is hexadecimal IP is 32 or 128 bits Logical vs physical MAC is hexadecimal IP is 32 or 128 bits
Adding headers as data moves down the stack is: Encoding Encapsulation Formatting Encapsulation
Default SVI on a switch is: VLAN 0 VLAN 1 VLAN 99 VLAN 1
Correct IPv4 format: 192.168.0.5 256.1.1.1 192.168 192.168.0.5
Which command shows current config? show startup-config show running-config show interfaces show running-config
Saved configuration file is called: running-config startup-config backup-config startup-config
Which infrastructure spans large geographic areas? LAN WAN MAN WAN
Light pulses use which media? Copper Fiber-optic Wireless Fiber-optic
Which protocols report delivery errors? ICMPv4 ICMPv6 TCP ICMPv4 ICMPv6
IPv4 structure is called: Binary format Dotted-decimal format Hex format Dotted-decimal format
Which protocol is at the network access layer? IP Ethernet TCP Ethernet
Dividing data before transmission is called: Encoding Segmentation Encapsulation Segmentation
Command to name a switch Sw-Floor-2: switch-name hostname Sw-Floor-2 set hostname hostname Sw-Floor-2
Which command enables user EXEC password? login enable password login
Which interface has no physical port? Ethernet SVI Console SVI
Command to enter privileged EXEC mode: login enable configure enable
Converting data for transmission is: Encoding Segmentation Formatting Encoding
Mobile devices need IP addresses to communicate. True False False
Running configuration changes: Require reboot Apply immediately Are saved automatically Apply immediately
Why copy startup-config to running-config? To erase config To load saved config into RAM To back up config To load saved config into RAM
Initial secure switch access uses: Telnet Console port SSH Console port
Privileged EXEC access is secured with: enable password enable secret login enable secret
Created by: f3xo
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards