| Question | Answer |
| Coaxial cable encodes data into?
Group of answer choices
Light signal
Electrical impulses
Radio frequencies
Sound waves | Electrical Impulses |
| Which attack slows down or crashes equipment and programs?
Group of answer choices
Virus, worm or Trojan Horse
Firewall
Zero day or Zero hour
Denial of Service | Denial of Service (DoS) |
| Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?
Group of answer choices
Aux
Telnet
Console
SSH | Console |
| How is an IPv4 address represented?
four decimal numbers between 0 and 255 separated by periods
four decimal numbers between 0 and 222 separated by colons
thirty-two hexadecimal numbers separated by periods | four decimal numbers between 0 and 255 separated by periods |
| This is a specific parameter defined in the operating system
Group of answer choices
syntax
code
keyword
argument | keyword |
| Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Group of answer choices
Kernel
Hardware
Shell
Software | Kernel |
| This standards organization is responsible for IP address allocation and domain name management.
Internet Architecture Board (IAB)
Internet Assigned Numbers Authority (IANA)
Internet Society (ISOC)
Internet Engineering Task Force (IETF) | Internet Assigned Numbers Authority (IANA) |
| Which are true regarding network layer and data link layer addresses? (Choose three.)
Network layer addresses are either 32 or 128 bits in length.
Data link layer addresses are physical and network layer addresses are logical.
Network layer addresses a | Network layer addresses are either 32 or 128 bits in length.
Data link layer addresses are physical and network layer addresses are logical.
Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits. |
| True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway. | True |
| Which two protocols belong in the TCP/IP model application layer?
Group of answer choices
DNS EIGRP DHCP OSPF | DNS and DHCP |
| Which type of UTP cable is used to connect a PC to a switch port?
Group of answer choices
straight-through
rollover
crossover
console | Straight-through |
| A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
The end-user device needs mobility when connecting to the network. | The end-user device needs mobility when connecting to the network. |
| What is the definition of bandwidth?
the measure of usable data transferred over a given period of time
the speed at which bits travel on the network
the amount of data that can flow from one place to another in a given amount of time | the amount of data that can flow from one place to another in a given amount of time |
| Why are two strands of fiber used for a single fiber optic connection?
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.
The two strands allow the data to travel for longer distances without degrading. | They allow for full-duplex connectivity. |
| Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?
the use of CSMA/CA
the virtually unlimited availability of IPv6 addresses
the use of full-duplex capable Layer 2 switches
the development of half-duplex switch operation | the use of full-duplex capable Layer 2 switches |
| A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
ring
hierarchical
mesh
bus | mesh |
| Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)
International Telecommunication Union (ITU)
International Organization for Standardization (ISO) | International Telecommunication Union (ITU)
International Organization for Standardization (ISO) |
| What is auto-MDIX?
Group of answer choices
a type of Cisco switch
an Ethernet connector type
a type of port on a Cisco switch
a feature that detects Ethernet cable type | a feature that detects Ethernet cable type |
| What type of address is 01-00-5E-0A-00-02?
an address that reaches every host inside a local subnet
an address that reaches one specific host
an address that reaches every host in the network
an address that reaches a specific group of hosts | an address that reaches a specific group of hosts |
| Which statement is true about MAC addresses?
A NIC only needs a MAC address if connected to a WAN.
The first three bytes are used by the vendor assigned OUI.
The ISO is responsible for MAC addresses regulations. | The first three bytes are used by the vendor assigned OUI. |
| Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?
Group of answer choices
TTL
Hop Limit
Address Unreachable
No Route to Destination | Hop Limit |
| A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?
create a new Layer 2 Ethernet frame to be sent to the destination | create a new Layer 2 Ethernet frame to be sent to the destination |
| Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)
Group of answer choices
router solicitation
router advertisement
neighbor solicitation
neighbor advertisement | neighbor solicitation
neighbor advertisement |
| A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
The configuration file is missing from NVRAM.
The POST process has detected hardware failure. | The configuration file is missing from NVRAM. |
| Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. router commands providing the highest level of security?
enable secret trus | |
| What is the purpose of the startup configuration file on a Cisco router?
to contain the configuration commands that the router IOS is currently using
to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS | to contain the commands that are used to initially configure a router on startup |
| Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?
show ip interface brief
ping
show ip route
show interface fa0/1 | show ip interface brief |
| Which two characteristics describe Ethernet technology? (Choose two.)
It is supported by IEEE 802.3 standards.
It typically uses an average of 16 Mb/s for data transfer rates.
It uses the CSMA/CD access control method. | It is supported by IEEE 802.3 standards.
It uses the CSMA/CD access control method. |
| What is the special value assigned to the first 24 bits of a multicast MAC address?
Group of answer choices
01-5E-00
FF-00-5E
FF-FF-FF
01-00-5E | 01-00-5E |
| Which field in an IPv4 packet header will typically stay the same during its transmission?
Group of answer choices
Flag
Time-to-Live
Packet Length
Destination Address | Destination Address |
| How does the network layer use the MTU value?
The MTU is passed to the network layer by the data link layer. | The MTU is passed to the network layer by the data link layer. |
| When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?
Group of answer choices
destination MAC address
source IP address
destination IP address
source MAC address | destination IP address |
| What is the purpose of ARP in an IPv4 network?
to obtain a specific MAC address when an IP address is known
to forward data onward based on the destination MAC address. | to obtain a specific MAC address when an IP address is known |
| What type of information is contained in an ARP table?
Group of answer choices
switch ports associated with destination MAC addresses
domain name to IP address mappings
routes to reach destination networks
IP address to MAC address mappings | IP address to MAC address mappings |