Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Quiz and Test Questions for Net104

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
In fiber optic media , the signals are represented as patterns of ______________.   Light  
🗑
A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?   extended star  
🗑
This type of copper media is used in industrial or similar environments where there is a lot of interference.   STP  
🗑
This type of media provides the most mobility options.   wireless  
🗑
This type of media is used for high transmission speed and can also transfer data over long distances.   optical fiber  
🗑
Traditionally used for television but can now be used in a network to the connect the customer location to the wiring of the customer premises   coaxial  
🗑
What is a characteristic of a WAN hub-and-spoke topology?   The branch sites are connected to a central site through point-to-point links.  
🗑
Which method of data transfer allows information to be sent and received at the same time?   full duplex  
🗑
Which is a function of the Logical Link Control (LLC) sub-layer?   to identify which network layer protocol is being used  
🗑
What makes fiber preferable to copper cabling for interconnecting buildings?   greater distances per cable run limited susceptibility to EMI/RFI greater bandwidth potential  
🗑
What is the maximum possible throughput between thePC and the server?   128 kb/s  
🗑
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?   The end-user device needs mobility when connecting to the network.  
🗑
Which two factors influence the method that is used for media access control?   How the connection between nodes appears to the data link layer How nodes share the media  
🗑
This field helps to direct the frame toward its destination.   addressing  
🗑
This field checks if the frame has been damaged during the transfer   error detection  
🗑
This field is used by the LLC to identify the Layer 3 protocol   type  
🗑
This field identifies the beginning of a frame   frame start  
🗑
Which statement correctly describes frame encoding?   It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.  
🗑
What method is used to manage contention-based access on a wireless network?   CSMA/CA  
🗑
One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T568A standard. What type of cable would be created in this manner?   straight -through  
🗑
Which statement describes a characteristic of the frame header fields of the data link layer?   They vary depending on protocols.  
🗑
What is the purpose of the OSI physical layer?   transmitting bits across the local media  
🗑
What type of cable is used to connect a workstation serial port to a Cisco router console port?   rollover  
🗑
What are two reasons for physical layer protocols to use frame encoding techniques?   1. to distinguish data bits from control bits 2. to identify where the frame starts and ends  
🗑
What is indicated by the term throughput?   The measure of the bits transferred across the media over a given period of time  
🗑
Net admin notices new installed Ether cable is carry corrupt & distorted dat signals. Cable was install in ceiling cl to fluorescent lights & electrical equipt. Which 2 factors may interfere w/ copper cabling & result in signal distort & dat corrupt?   1. EMI 2. RFI  
🗑
Which characteristic describes Crosstalk?   The distortion of the transmitted messages from signals carried in adjacent wires  
🗑
What technique is used with UTP cable to help protect against signal interference from crosstalk?   Twisting the wires together into pairs  
🗑
The PC is connected to the console port of the switch. All the other connections are made though FastEthernet links. Which types of UTP cables can be used to connect the devices?   1 - rollover, 2-straight -through, 3-crossover  
🗑
What is wrong with the displayed termination?   The untwisted length of each wire is too long.  
🗑
Which type of connector does a network interface card use?   RJ-45  
🗑
What is one advantage of using fiber optic cabling rather than copper cabling?   It is able to carry signals much farther than copper cabling  
🗑
Why are two strands of fiber used for a single fiber optic connection?   They allow for full duplex connectivity  
🗑
A network administrator is designing the layout of a new wireless netowrk. Which three areas of concern should be accounted for when building a wireless network?   1. interference 2. security 3. coverage area  
🗑
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?   data link  
🗑
What are two services performed by the data link layer of the OSI model?   1. It accepts Layer 3 packets and encapsulates them into frames. 2. It provides media access control and performs error detection.  
🗑
What is true concerning physical and logical topologies?   Logical topologies refer to now a network transfers data between devices  
🗑
Which method of data transfer allows information to be sent and received at the same time?   full duplex  
🗑
Which statement describes an extended star topology?   End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.  
🗑
Which statement describes the media access control methods that are used by the networks in the exhibit?   Network 1 uses CSMA/CD and Network 3 uses CSMA/CA  
🗑
What is contained int he trailer of a data-link frame?   error detection  
🗑
As data travels on the media in a stream of 1s and 0s how does a receiving node identify the begininng and end of a frame?   The transmitting node inserts start and stops bits into the frame.  
🗑
What is the function of the CRTC value that is found in the FCS field of a frame?   To verify the integrity of the received frame  
🗑
The term ___________ indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).   bandwidth  
🗑
What acronym is used to reference the data link sub-layer that identifies the network layer protocol encapsulated in the frame?   LLC  
🗑
A physical topology that is a variation or combination of a point-to-point, hub and spoke, or mesh topology is commonly known as a __________ topology.   hybrid  
🗑
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network?   1. easy to create 2. less cost to implement 3. lacks centralized administration  
🗑
Which device performs the function of determining the path that messages should take through internet works?   A router  
🗑
What two criteria are used to help select a network medium from various network media?   1. The environment where the selected medium is to be installed 2. The distance the selected medium can successfully carry a signal  
🗑
Which two statements describe intermediary devices?   1. Intermediary devices direct the path of the data 2. Intermediary devices connect individual hosts to the network  
🗑
What are two functions of end devices on a network?   1. They are the interface between humans and the communication network. 2. They originate the data that flows through the network  
🗑
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?   wireless LAN  
🗑
What type of network must a home user access in order to do online shopping?   The Internet  
🗑
An employee at a branch office is creating a quote for a customer. In order to do this the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?   An Intranet  
🗑
Which two connection options provide an always-on, high -bandwidth internet connection to computers in a home office?   1. DSL 2. cable  
🗑
Which two internet connection options do not require that physical cables be run to the building?   1. cellular 2. satellite  
🗑
What type of network traffic requires QoS?   video conferencing  
🗑
Which expression accurately defines the term bandwidth?   A measure of the data carrying capacity of the media  
🗑
A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?   Data confidentiality  
🗑
Which statement describes a characteristic of cloud computing?   Applications can be accessed over the internet by individual users or businesses using any device, anywhere in the world.  
🗑
What is the Internet?   It provides connections through interconnected global networks  
🗑
Which statement describes the use of power-line networking technology?   A device connects to an existing home LAN using an adapter and an existing electrical outlet  
🗑
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network?   1. Installing Antivirus Software 2. Implementing a firewall  
🗑
A __________ network is capable of delivering voice, video, text, and graphics over the same communication channels.   converged  
🗑
The acronym __________ refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.   BYOD  
🗑
What are proprietary protocols?   protocols developed by organizations who have control over their definition and operation  
🗑
Which address does a NIC use when deciding whether to accept a frame?   destination MAC address  
🗑
Which three layers of the OSI model are comparable in function to the application layer the TCP/IP model?   Application, Presentation & Session  
🗑
Which statement is correct about network protocols?   They define how messages are exchanged between the source and the destination  
🗑
If Host 1 were to transfer a file to the server, what layers or the TCP/IP model would be used?   application, transport, internet and network access layers  
🗑
Host A is attempting to contact Server B. Which two statements correctly describe the addressing that Host A will generate in the process?   1. A packet with the destination IP address of Server B. 2. Frame with the destination MAC address of Router A  
🗑
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?   low control  
🗑
What is an advantage of network device using open standard protocols?   A client host and a server running different operating systems can successfully exchange data  
🗑
Which statement is true about the TCP/IP and OSI models?   The TCP/IP transport layer and OSI Layer 4 provide similar services ad functions.  
🗑
Which characteristic describes the default gateway of a host computer?   The logical address assigned to the switch interface connected to the router  
🗑
governing the way a web server and web client interact   Application protocol  
🗑
taking the segments from the transport protocol, encapsulating them into packets and assigning them with appropriate addresses   Internet Protocol  
🗑
preparing packets to be transmitted over the network media   network access protocol  
🗑
managing the individual conversations between webs servers and web clients   Transport Protocol  
🗑
Which PDU format is used when bits are received from the network medium by the NIC of a host?   Frame  
🗑
What three application layer protocols are part of the TCP/IP protocol suite   1. DNS 2. DHCP 3. FTP  
🗑
What process is used to place one message inside another message for transfer from the source to the destination?    
🗑
What will happen if the default gateway address is incorrectly configured on a host?    
🗑
The organization is responsible for over seeing and managing IP address allocation, domain a name management, and protocol identifiers   I.A.N.A.  
🗑
A web client is sending a request for a web page to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?   HTTP, TCP, IP Ethernet  
🗑
At which layer of the OSI model would a logical address be encapsulated   Network  
🗑
What type of communication will send a message to all devices on a local area network?   Broadcast  
🗑
What PDU is processed when a host computer is de-encapsulating a message at the transport layer of teh TCP/IP model?   Segment  
🗑
What will happen if the default gateway address is incorrectly configured on a host?   The host cannot communicate with hosts in other networks.  
🗑
What are the two reasons for physical layer protocols to use frame encoding techniques?   1. to distinguish data bits from control bits 2. to identify where the frame starts and ends  
🗑
What is indicated by the term throughput?   The measure of the bits transferred across the media over a given period of time  
🗑
A net admin notices install Ether cabling is carrying corrupt & distorted data signals. New cabling was install in ceiling cl 2 fluorescent & elect equipt. Which 2 facts inter w/ cop cabling & result in signal distortion & data corrupt?   1. EMI 2. RFI  
🗑
Which characteristic describes crosstalk?   The distortion of the transmitted messages from signals carried in adjacent wires  
🗑
What technique is used with UTP cable to help protect against signal interference from crosstalk?   Twisting the wires together into pairs  
🗑
The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?   1. rollover 2. straight-through 3. crossover  
🗑
What is wrong with the displayed termination?   The untwisted length of each wire is too long.  
🗑
Which type of connector does a network interface card use?   RJ-45  
🗑
What is one advantage of using fiber optic cabling rather than copper cabling?   It is able to carry signals much farther than copper cabling  
🗑
Why are two strands of fiber used for a single fiber optic connection?   They allow for full-duplex connectivity.  
🗑
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network?   1. interference 2. security 3. coverage area  
🗑
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?   data link  
🗑
What are two services performed by the data of the OSI model?   1. It accepts Layer 3 packets and encapsulates them into frames. 2. It provides media access control and performs error detection.  
🗑
What is true concerning physical and logical topologies?   Logical topologies refer to how a network transfers data between devices.  
🗑
Which method of data transfer allows information to be sent and received at the same time?   full duplex  
🗑
Which statement describes an extended star topology?   End devices connected to a central intermediate device, which in turn connects to other central intermediate devices.  
🗑
Which statement describes the medi access control methods that are used by the networks in the exhibit?   Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.  
🗑
What is contained in the trailer of a data-link frame?   error detection  
🗑
As data travel on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?   The transmitting node inserts start and stop bits into the frame.  
🗑
What is the function of the CRC value that is found in the FCS field of a frame?   To verify the integrity of the received frame  
🗑
What process is used to place one message inside another message for transfer from the source to the destination?   encapsulation  
🗑
What is an advantage of using standards to develop and implement protocols?   Products from different manufacturers can inter-operate successfully  
🗑
Which characteristic describes the default gateway of a host computer?   The logical address of the router interface on the same network as the hot computer.  
🗑
Governing the way a web server and a web client interact   Application Protocol  
🗑
Managing the individual conversations between web servers and web clients   Transport Protocol  
🗑
Taking the formatted segments from the transport protocol encapsulating them into packets, assigning them the appropriate addresses and delivering them across the best path to the destination host   Internet Protocol  
🗑
Preparing packets to be transmitted over the Network Media   Network Access Protocol  
🗑
Used to synchonize clocks between computer systems.   Network Time Protocol  
🗑
Which logical address is used for delivery of data to a remote network?   destination IP address  
🗑
Why are open standards important in the data communications industry?   They enable inter-operabiity between software and hardware from different vendors  
🗑
What type of delivery uses data link layer addresses?   local delivery  
🗑
What layer of the TCP/IP protocol model determines the best path through the networks?   internet  
🗑
What three requirements are defined by the protocols used in network communications to allow message transmission across a network?   1. message encoding 2. message size  
🗑
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?   transport  
🗑
What is the purpose of protocols in data communications?   Providing the rules required or a specific type of communication to occur.  
🗑
The MAC address of a PC does not change when the PC is moved to a different network because the MAC address is embedded in the _____________ of the PC.   Network Interface card (NIC)  
🗑
Which three acronyms/initialisms represent standards organizations?   1. IANA 2. IEEE 3. IETF  
🗑
What type of message is sent to a specific group of hosts?   multicast  
🗑
At which layer of the OSI model woul a physical address be encapsulated?   data link layer  
🗑
If the default gateway is configured incorrectly on the host, what is the impact on communications?   The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.  
🗑
Which message delivery option is used when all devices need to receive the same message simultaneously?   broadcast  
🗑
What method can be used by two computers to ensure tat packets are not dropped because too much data is being sent too quickly?   flow control  
🗑
What type of communication will send a message to all devices on a local area network?   broadcast  
🗑
What process is used to place one message inside another message for transfer from the source to the destination?   encapsulation  
🗑
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that i used to prepare the request for transmission?   HTTP, TCP, IP, Ethernet  
🗑
Which statement is correct about network protocols?   They define how messages are exchanged between the source and the destination.  
🗑
Which statement is true about the TCP/IP and OSI models?   The TCP/IP transport layer and OSI layer 4 provide similar services and functions.  
🗑
What is an advantage of using standards to develop and implement protocols?   Products from different manufacturers can inter-operate successfully.  
🗑
What three application layer protocols are part of the TCP/IP protocol suite?   1. DHCP 2. DNS 3. FTP  
🗑
What are the proprietary protocols?   Protocols developed by organizations who have control over their definition and operation  
🗑
What is an advantage of network devices using open standard protocols?   A client host and a server running different operating systems can successfully exchange data.  
🗑
If Host 1 were to transfer a file to the server, what layers of the TCP/IP model would be used?   Application, transport, internet, and network access leyers  
🗑
Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model?   Session, Application, Presentation  
🗑
At which layer of the OSI model would a logical address be encapsulated?   Network Layer  
🗑
Which PDU format is used when bits are received from the network medium by the NIC of a host?   frame  
🗑
Which PDU is processed when a host computer is do-encapsulating a message at the transport layer of the TCP/IP model?   segment  
🗑
Host A is attempting to contact Server B. Which two statements correctly describe the addressing that Host A will generate in the process?   1. A packet with the destination IP address of Server B. 2. A frame with the destination MAC address of Router A.  
🗑
Which address does a NIC use when deciding whether to accept a frame?   destination MAC address  
🗑
What will happen if the default gateway address is incorrectly configured on a host?   The host cannot communicate with hosts in other networks.  
🗑
Which characteristic describes the default gateway of a host computer?   The logical address of the router interface on the same network as the host computer.  
🗑
The process of converting information from one format into another acceptable for transmission   Message Encoding  
🗑
The process of placing one message format inside another message format   Message Encapsulation  
🗑
The process of breaking up a long message into individual pieces before being sent over the network   Message Sizing  
🗑
This organization is the largest developer of International Standards in the world for a wide variety of products and services. It is known for its open systems interconnected (OSI) reference model.   ISOC  
🗑
This organization is responsible for overseeing and managing IP Address allocation, domain name management, and protocol identifiers   EIA  
🗑
What is the function of the kernel of an operating software?   The kernel provisions hardware resources to meet software requirements  
🗑
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a witch to manage it. Which access method should be chosen   SSH  
🗑
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?   Use the console port to locally access the switch from a serial or USB interface of the PC.  
🗑
Which command or key combination allows a user to return to the previous level in the command hierarchy?   exit  
🗑
A router has a valid operating system and a configuration file stored in NVRAM. the configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?   user exec mode  
🗑
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?   1. Displaying a list of all available commands within the current mode. 2. Determining which option, keyword, or argument is available for the entered command  
🗑
Which information does the show start-up config command display?   The contents of the saved configuration file in the NVRAM.  
🗑
Why is it important to configure a hostname on a device?   To identify the device during remote access ( SSH or telnet)  
🗑
Which two host names follow the guidelines for naming conventions on Cisco IOS devices?   1. SwBranch799 2. RM-3-Switch-2A4  
🗑
How does the service password-encryption command enhance password security on Cisco routers and switches?   It encrypts passwords that are stored in router or switch configuration files.  
🗑
A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?   To display a message wen a user accesses the switch.  
🗑
While trying 2 solve a net issue, a tech made multiple changes 2 the current router configuration file. The change did not solve the problem & were not saved. What action can the technician take 2 discard the changes & work with the file in NVRAM?   Issue the reload command without saving the running configuration.  
🗑
Which statement is true about the running configuration file in a Cisco IOS device?   It affects the operation of the device immediately when modified.  
🗑
What are two characteristics of RAM on a Cisco device?   1. The contents of RAM are lost during a power cycle. 2. The configuration that is actively running on the device is stored in RAM.  
🗑
Which interface allows remote management of a Layer 2 switch?   The switch virtual interface.  
🗑
Which interface is the default SVI on a Cisco switch?   VLAN1  
🗑
Why would a Layer 2 switch need an IP address?   To Enable the Switch to be managed remotely.  
🗑
What command can be used on a Windows PC to see the IP configuration of that computer?   ipconfig  
🗑
A tech is adding a new PC 2 a LAN. After unpacking components & making all connections, tech starts PC. After OS loads, tech opens a browser, & verifies that PC can reach the Internet. Why was the PC able 2 connect 2 the net w/ no addl config?   The PC was pre-configured to use DHCP.  
🗑
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?   If there is connectivity with the destination device.  
🗑
A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with?   1. connectivity switch2 2. no connectivity: PC-C  
🗑
What three facts can be determined from the viewable output of the show ip interface brief command?   1. One device is attached to a physical interface. 2. The default SVI has been configured. 3. The switch can be remotely managed.  
🗑
Completes the remainder of a partially typed command or keyword   Tab  
🗑
Displays the next screen   Space Bar  
🗑
provides context sensitive help   ?  
🗑
Allows user to scroll backward through former commands   Up Arrow  
🗑
Cancels any command current;y being entered and returns directly to privileged EXEC mode   Ctrl C  
🗑
Allows the user to interrupt an IOS process such as ping or traceroute   Ctrl Shift 6  
🗑
An IT tech has manually configured an IP addr on a laptop for a new employee. Each time the emp tries to connect 2 the LAN, the emp receives a duplicate IP address error message. What can the company do to prevent this situation from arising again?   Use DHCP to automatically assign addresses.  
🗑
What command will prevent all un-encrypted passwords from displaying in plain text in a configuration file?   (config)# service password-encryption  
🗑
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?   1. displaying a list all available commands within the current mode 2. Determining which option, keyboard, or argument is available for the entered command  
🗑
To save time, IOS commands may be partially entered and then completed by typing which key or key combination?    
🗑
In fiber optic media, the signals are represented as patterns of _____________________.   Light  
🗑
A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hypbrid topology for a LAN?   extended star  
🗑
STP   This type of copper media is used in industrial or similar environments where there is a lot of interference  
🗑
wireless   This type of media provides the most mobility options.  
🗑
optical fiber   This type of media is used for high transmission speed and can also transfer data over long distances  
🗑
coaxial   Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.  
🗑
What is a characteristic of a WAN hub and spoke topology?   The branch sites are connected to a central site through point-to-point links.  
🗑
Which method of data transfer allows information to be sent and received at the same time?   full duplex  
🗑
Which is a function of the Logical Link Control (LLC) sublayer?   to identify which network layer protocol is being used  
🗑
What makes fiber preferable to copper cabling for interconnecting buildings?   1. greater distances per cable run 2. limited susceptibility to EMI/RFI 3. Greater bandwidth potential  
🗑
Refer to the exhibit. What is the maximum possible throughput between the PC and the server?   128kb/s  
🗑
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?   The end-user device needs mobility when connecting to the network.  
🗑
Which two factors influence the method that is used for media access control?   1. How the connection between nodes appears to the data link layer 2. How nodes share the media  
🗑
addressing   This field helps to direct the frame toward its destination.  
🗑
error detection   This field checks if the frame has been damaged during the transfer.  
🗑
type   This field is used by the LLC to identify the Layer 3 protocol.  
🗑
frame start   This field identifies the beginning of a frame.  
🗑
Which statement correctly describes frame encoding?   It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits  
🗑
What method is used to manage contention-based access on a wireless network?   CSMA/CA  
🗑
Refer to the exhibit. One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T568A standard. What type of cable would be created in this manner?   straight-through  
🗑
Which statement describes a characteristic of the frame header fields of the data link layer?   They vary depending on protocols  
🗑
What is the purpose of the OSI physical layer?   Transmitting bits across thelocal media  
🗑
What type of cable is used to connect a workstation serial port to a Cisco router console port?   rollover  
🗑
What are two reasons for physical layer protocols to use frame encoding techniques?   1, To distinguish data bits from control bits 2. To identify where the frame starts and ends  
🗑
what is indicated by the term throughput?   The measure of the bits transferred across the media over a given period of time  
🗑
A net admin notices that new installed Ethernet cabling is carrying corrupt n distorted signals. New cabling was in ceilng close lights n elect equipt. Which 2 factors interfere w/ copper cabling n result in signal distortion and data corruption?   1. RFI 2. EMI  
🗑
Which characteristic describes crosstalk?   The distortion of the transmitted messages from signals carried in adjacent wires  
🗑
What technique is used with UTP cable to help protect against signal interference from crosstalk?   Twisting the wires together into pairs  
🗑
Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?   1-rollover, 2 - straight-through, 3 - crossover  
🗑
Refer to the exhibit. What is wrong with the deisplayed termination?   The untwisted length of each wire is too long  
🗑
Which type of connector does a network interface card use?   RJ-45  
🗑
What is one advantage of using fiber optic cabling rather than copper cabling?   It is able to carry signals much farther than copper cabling  
🗑
Why are two strands of fiber used for a single fiber optic connection?   They allow for full-duplex connectivity  
🗑
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network?   1. security 2. interference 3. coverage area  
🗑
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media   data link  
🗑
What are two services performed by the data like layer of the OSI model?   1. It accepts Layer 3 packets and encapsulates them into frames. 2, It provides media access control and performs error detection.  
🗑
What is true concerning physical and logical topologies ?   Logical topologies refer to how a network transfers data between devices  
🗑
Which method of data transfer allows information to be sent and received at the same time?   full duplex  
🗑
Which statement describes an extended star topology?   End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.  
🗑
Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?   Network 1 uses CSMA/CA  
🗑
What is contained in the trailer of a data-link frame?   error detection  
🗑
As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?   The transmitting node inserts start and stop bits into the frame.  
🗑
What is the function of the CRC value that is found in the FCS field of a frame?   To verify the integrity of the received frame  
🗑
The term _________________ indicates the capacity of a medium to carry data and it is typically measured in kilobits per second or megabits per second.   bandwidth  
🗑
What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?   LLC  
🗑
A physical topology that is a variation or combination of a point-to-point, hub and spoke, or mesh topology is commonly known as a _________________ topology,   hybrid  
🗑
Multimode Fiber   1. Led as light source 2. Serveral paths of light into the fiber 3. Generally used with LANS  
🗑
Single Mode Fiber   1. Only one ray of light into the fiber 2. Generally used with campus backbone 3. Laser as the light source  
🗑
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?   store-and-forward  
🗑
What type of address is 01-00-SE-0A-00-02?   An address that reaches a specific group of hosts  
🗑
Which two functions or operations are performed by the MAC sublayer?   1. It is responsible for Media Access Control. 2. It adds a header and trailer to form an OSI Layer 2 PDU.  
🗑
The Ethernet __________________________ sublayer is responsible for communicating directly with the physical layer   MAC  
🗑
What is the decimal equivalent of the hexadecimal value of 3F?   63  
🗑
A layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?   shared memory buffering  
🗑
Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?   RT will send an ARP reply with its own Fa0/0 MAC address  
🗑
Refer to the exhibit. What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1?   00-60-2F-3A-07-CC  
🗑
On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represents the____________________________ MAC address.   Broadcast  
🗑
Refer to the Graphic. H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true?   H1 sends a unicast message to H2, and the switch forwards it directly to H2.  
🗑
When the store-and-forward method of switching is in use, what part of the Ethernet frame is used to perform an error check?   CRC in the trailer  
🗑
Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?   It sends the frame to all ports except the port on which it received the frame.  
🗑
The binary number 0000 1010 can be expressed as __________________ in hexadecimal.   0A  
🗑
The minimum Ethernet frame size is _____________bytes. Anything smaller than that should be considered a "runt frame."   64  
🗑
What is the primary purpose of ARP?   resolved IPv4 addresses to MAC addresses  
🗑
What happens to runt frames received by a Cisco Ethernet switch?   The frame is dropped.  
🗑
What are the two sizes (Minimum and maximum) of an Ethernet frame?   1. 64 bytes 2. 1518 bytes  
🗑
What statement describes Ethernet?   It defines the most common LAN type i the world.  
🗑
Which two statements describe features or functions of the logical link control sublayer in Ethernet standards?   1. The data link layer uses LLC to communicate with upper layers of the protocol suite. 2. Logical link control is implemented in software.  
🗑
What statement describes a characteristic of MAC addresses?   They must be globally unique.  
🗑
Which statement is true about MAC addresses?   The first three bytes are used by the vendor assigned OUI.  
🗑
Which destination address is used in an ARP request frame?   FFFF.FFFF.FFFF  
🗑
What addressing information is recorded by a switch to build its MAC address table?   The source Layer 2 address of incoming frames  
🗑
Refer to the exhibit. The exhibit shows a small switched network and teh contents of the MACX address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?   The switch will forward the frame to all ports except port 4.  
🗑
Which switching method uses the CRC value in a frame?   store-and-forward  
🗑
What is auto-MDIX?   a feature that detects Ethernet cable type  
🗑
When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.   True  
🗑
The ARP table in a switch maps which two types of address together?   Layer 3 address to a Layer 2 address  
🗑
Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet ot PC2 in this scenario. What will happen next?   PC2 will send an ARP rely with its MAC address  
🗑
Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?   Host A sends out a broadcast of FF:FF:FF:FF:FF:FF:FF:FF. Every other host connected to teh switch receives the broadcast and host D responds with its MAC address.  
🗑
Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?   only hosts B, C, and router R1.  
🗑
Which statement describes the treatment of ARP requests on the local link?   They are received and processed by every device on the local network.  
🗑
What are two potential network problems that can result from ARP opertion   1. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. 2. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.  
🗑
A collision fragment, also known as a ______________________ frame, is a frame of fewer than 64 bytes in length.   RUNT  
🗑
On a Cisco switch, ___________ memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports.   port-based  
🗑
ARP ____________ is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses.   spoofing  
🗑
Match the characteristics to the forwarding method   1. Cut-through 2. Store and Forward  
🗑
Cut-Through   1. Low Latency 2. may forward runt frames 3. Begins forwarding when the destination address is received  
🗑
Store and Forward   1. Always store the entire frame 2. Checks the CRC before forwarding 3. Checks the frame length before forwarding  
🗑
Which portion of the network layer address does a router use to forward packets?   network portion  
🗑
Which IPv4 address can a host use to ping the loopback interface?   127.0.01  
🗑
Refer to the exhibit. fill in the blank. A packet leaving PC-1 has to traverse _____________ hops to reach PC-4.   three  
🗑
If there are two or more possible routes tot he same destination, the ____________ is used to determine which route is used in the routing table.   Metric  
🗑
Within a producion network, what is the purpose of configuring a switch with a default gateway address?   The default gateway address is used to forward packets originating from the switch to remote networks.  
🗑
A router may ave to fragment a packet when forwarding it from one medium to another medium that has a smaller __________ .   MTU - Maximum Transmission Unit  
🗑
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?   Flow Label  
🗑
How does the network layer use the MTU value?   The MTU is passed to the network layer by the data link layer.  
🗑
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?   Time-to-Live  
🗑
open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which interfaces in each router are active and operational?   R1: G0/0 and S0/0/0 R2: G0/1 and S0/0/0  
🗑
Which key combination allows a user to abort setup mode?   Ctrl-C  
🗑
Fill in the blank. The acronym __________ is used to define the process that allows multiple devices to share a single routable IP address.   PAT or NAT  
🗑
Refer to the exhibit. Using the network in the exhibit, what would be teh default gateway address for host A in the 192.133.219.0 network?   192.133.219.1  
🗑
During the boot process, where will the router bootstrap program look for the IOS image by default?   flash  
🗑
What are two functions that are provided by the network layer?   1. providing end devices with a unique network identifier 2. directing data packets to destination hosts on other networks  
🗑
What type of IPv6 address is not routable and used only for communication on a single subnet?   link-local address  
🗑
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?   to test that the host has the capability to reach hosts on other networks  
🗑
What is the prefix length notation for the subnet mask 255.255.255.224?   /27  
🗑
An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?   all IPv6 enabled devices on the local link or network  
🗑
a link-local address   169.254.1.5  
🗑
a public address   198.133.219.2  
🗑
an experimental address   240 2.6.255  
🗑
a loopback address   127.0.0.1  
🗑
The shortest compressed format of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0200 is __________________.   2001:DB8:0:1470::200  
🗑
In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?   SLAAC  
🗑
This part of the address issued by an organization to identify subnets.   subnet ID  
🗑
This network portion of the address is assigned by the provider.   global routing prefix  
🗑
This part of teh address is the equivalent to the host portion of an IPv4 address.   interface ID  
🗑
Which two types of devices are typically assigned static IP addresses.   1. web servers 2. printers  
🗑
2001:DB8::BAF:3F57:FE94   global unicast  
🗑
FF02::1   all node multicast  
🗑
::1   loopback  
🗑
FF02::1:FFAE:F85F   solicited node multicast  
🗑
The last host address on the 10.15.25.0/24 network is ____________.   10.15.25.254/24  
🗑
The 8 - digit binary value of the last octet of the IPv4 address 172.17.10.7 is _______________.   172.16  
🗑
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?   tunneling  
🗑
The network portion of the address 172.16.30.5/16 is __________.   172.16  
🗑
How many bits are in an IPv4 address?   32  
🗑
Which two parts components of an IPv4 address?   1. host portion 2, network portion  
🗑
What does the IP address 172.17.4.250/24 represent?   host address  
🗑
What is the purpose of the subnet mask in conjunction with an IP address?   To determine the subnet to which the host belongs  
🗑
What subnet mask is represented by the slash notation /20?   255.255.240.0  
🗑
A message is sent to all hosts on a remote network. Which type of message is ti?   directed broadcast  
🗑
What are three characteristics of multicast transmission?   1. The range of 224.0.0.0 to 224 .0.0.255 is reserved to reach multicast groups on a local network. 2. A single packet can be sent to a group of hosts. 3. Multicast transmission can be used by routers to exchange routing information.  
🗑
What three IP addresses are private?   1. 192.168.5.5 2. 10.1.1.1 3. 172.16.4.4  
🗑
Which two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains?   1. dual stack 2. tunneling  
🗑
Which of these addresses is the shortest abbreviation for the IP addresses: 3FFE:1044:0000:0000:00AB:0000:0000:0057?   3FFE:1044:0:0AB::57  
🗑
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?   link-local  
🗑
What are two types of IPv6 unicast addresses?   1. link-local 2. loopback  
🗑
What are three parts of an IPv6 global unicast address?   1. A global routing prefix is used 2 identify network portion of addr that has provided by an ISP 2. An interface ID that is used 2 identify local host on network 3. A subnet ID that is used 2 identify networks inside of local enterprise site  
🗑
An administrator wants 2 configure hosts 2 automatically assign IPv6 addresses 2 themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?   stateless DHCPv6  
🗑
Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?   ICMPv6  
🗑
Which two things can be determined by using the ping command?   1. The destination device is reachable through the network 2. The Average time it takes a packet to reach the destination and for the response to return to the source  
🗑
What is the purpose of ICMP messages?   To provide feedback of IP packet transmissions  
🗑
What is indicated by a successful ping to the ::1 IPv6 address?   IP is properly installed on the host  
🗑
A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?   When the value int eh TTL field reaches zero  
🗑
What field content is used by ICMPv6 to determine that a packet has expired?   Hop Limit field  
🗑
The decimal equivalent of the binary number 10010101 is _____ .   149  
🗑
The binary equivalent of the decimal number 232 is __________ .   11101000  
🗑
What is the decimal equivalent of 0x3F?   63  
🗑
A test-net address   192.0.2.123  
🗑
An experimental Address   240.2.6.255  
🗑
A Private Address   172.19.20.5  
🗑
A LoopBack Address   127.0.0.1  
🗑
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?   link-local  
🗑
Refer to the exhibit. What is the global IPv6 address of the host in uncompressed format?   2001:0DB8:0000:0000:0BAF:0000:3F57:FE94  
🗑
What is the interface ID of the IPv6 address2001:DB8::1000:A9CD:47FF:FE57:FE94/64?   A9CD:47FF:FE57:FE94  
🗑
Which IPv6 network prefix is only intended for local links and can not be routed?   FE80::/10  
🗑
Consider the following range of addresses: 2001:0DB8:BC15:0600::TO 2001:0DB8:BC15:0FFF:: The prefix length for the range of addresses is _______ .   /52  
🗑
A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How may equal sized subnets are created?   4  
🗑
The IPv4 packets and IPv6 packets coexist in the same network.   dual-stack  
🗑
The IPv6 packet is transported inside an IPv4 packet.   tunneling  
🗑
Ipv6 packets are cnverted into IPv4 packets, and vice versa.   translation  
🗑
How many host addresses are available on the 192.168.10.128/26 network?   62  
🗑
What does the IP address 192.168.1.15/29 represent?   broadcast address  
🗑
A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?   255.255.255.224  
🗑
What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?   2001:D12:AA04:B5::/64  
🗑
What are two benefits of subnetting networks?   1. reducing the size of broadcast domains 2. grouping devices to improve management and security  
🗑
An administrator wants to create four subnetworks from the network address 192.168.1.0/24 What is the network address and subnet mask of the second useable subnet?   subnetwork 192.168.1.64 subnet mask 255.255.255.192  
🗑
Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses.   1. 19.18.10.208/28 2. 10.18.10.224/28  
🗑
The last host address on the 10.15.25.0/24 network is _________ .   10.15.25.254/24  
🗑
A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?   65536  
🗑
Device 1: IP address 192.168.10.77/28 on subnet 1. Subnet 1 network number________ . Subnet 1 broadcast address _______ .   192.168.10.64 192.168.10.79  
🗑
Device 2: IP address 192.168.10.17/30 on subnet 2. Subnet 2 network number________ . Subnet 2 broadcast address _______ .   192.168.10.16 192.168.10.19  
🗑
Device 3: IP address 192.168.10.35/29 on subnet 3. Subnet 3 network number________ . Subnet 3 broadcast address _______ .   192.168.10.32 192.168.10.39  
🗑
The network portion of the address 172.16.30.5/16 is ________ .   172.16  
🗑
A college has 5 campuses. Each camp has IP ph installed. Ea camp has an assigned IP addr range. Coll. has standardized IP ph are ass IP addr that have no. 4X in 3rd octet. ex: 10.1.40.x, 10.1.41.x Which 2 groupngs were used 2 create IP addr scheme?   1. geographic location 2. device type  
🗑
What is a result of connecting two or more switches together?   The size o the broadcast domain is increased.  
🗑
Refer to the exhibit. How many broadcast domains are there?   4  
🗑
What are two reasons a network administrator might want to create subnets?   1. Improves network performance 2. Easier to implement security policies  
🗑
Referto the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal subnets while providing enough host addresses for each subnet in the exhibit?   255.255.255.128  
🗑
Net Admin assigned LAN of LBMISS addr range 192.168.10.0. Addrr sub using /29. Tech use 5th sub for config net. sub 0 1st sub. router interface ass 1st usable host addr. wkgroup serv last usable host. Which config ent prop wkgroup serv allow conn int   IP address 192.168.10.38 subnet mask 255.255. 255.248. default gateway 192.168.10.33  
🗑
If a network device has a mask of /28, how many IP addresses are available for hosts on this network?   14  
🗑
Which subnet mask would be used if 5 host bits are available?   255.255.255.224  
🗑
How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0   1022  
🗑
How many bits must be borrowed from the host portion of an address to accommodate a router with 5 connected networks?   three  
🗑
A net admin wants 2 have same net mask 4 all nets. The site has # devices. IP phones 22addrs, PCs 20, Printers 2, Scanners 2, Net Admin assigned 192.168.10.0/24 to this site. Which sing subnet mask would make most efficient use of addrs 2 use 4 4 nets.   255.255.255.224  
🗑
A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create 2 subnetworks that would contain 10 hosts and 18 hosts. Which 2 networks would achieve that?   1. 192.168.1.96/28 2. 192.168.1.64/27  
🗑
A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. Ho many usable host addresses will this subnet provide?   6  
🗑
Refer to the exhibit. Given the network address of 192.168.5.0 and subnet mask of 255.255.255.224 for all subnets, how many total host addresses are unused in the assigned subnets?   72  
🗑
Refer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 5 hosts?   10.16.10.64/27  
🗑
A network administrator needs to monitor network traffic to and from servers in a data center.Which features of an IP addressing scheme should be applied to these devices?   predictable static IP addressesfor easier identification  
🗑
Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks?   1. It eliminates most address configuration errors 2. It reduces the burden on network support staff  
🗑
A DHCP server used 2 assign IP addrs dynamically 2 hosts on a net. Addr pool is config w/ 192.168.10.0/24. There r 3 printers on this net that need 2 use reserv static IP addrs f/ pool. How many IP addrs in pool are left 2 be assign 2 other hosts?   251  
🗑
Exhibit. co deploying IPv6 addr scheme. Subnet portion IPv6 addrs in hierarachical net design w/ site subsect rep mult geo sites. Sub-site sect rep mult campuses. subnet sect each net seg sep by routers. What max # of subnets achieved per sub-site?   16  
🗑
What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?   2001:DB8:BC15:A  
🗑
Consider the following range of addresses: 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: 2001:0DB8:BC15:00AF:0000:: The prefix-length for the range of addresses is _______________________ .   /60  
🗑
Match the sub network to a host address that would be included within the sub network. 1. 192.168.1.64/27 2. 192.168.1.32/27 3. 192.168.1.96/27   1. 192.168.1.68 2. 192.168.1.48 3. 192.168.1.121  
🗑
Refer to Exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addresses requirements for each ncetwork. Netwrk C - A-D-B Network   Network C -192.168.0.192/27 Network A -192.168.0.0/25 Network D -192.168.0.224/30 Network B - 192.168.0.128/26  
🗑
What is the purpose of using a source port number in a TCP communication?   To keep track of multiple conversations between devices  
🗑
What is an advantage of UDP over TCP?   UDP communication requires less overhead.  
🗑
A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur.   1. client sends FIN 2. server sends ACK 3. server sends FIN 4. client sends ACK  
🗑
window size: 9017 Refer to the exhibit. What does the value of the window size specify?   The amoount of the data that can be sent before an acknowledgment is required  
🗑
What are three responsibilities of the transport layer   1. meeting reliability requirements of applications, if any 2. multiplexing multi ple communication streams from many users or apps on same net 3. Identifying applications & services on the client and server that should handle transmitted data  
🗑
What action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?   The client randomly s learning of theelects a source port number.  
🗑
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination . What is one way that the TCP protocol addresses this?   The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.  
🗑
Which number or set of numbers represents a socket?   192.168.1.1:80  
🗑
What is the purpose of the TCP sliding window?   To request that a source decrease the rate at which it transmits data  
🗑
What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence?   transport  
🗑
Which three fields are used in a UDP segment header?   1. Length 2. Source Port 3. Checksum  
🗑
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead?   1. DNS 2. VoIP  
🗑
What type of applications are best suited for using UDP?   APPLICATIONS THAT ARE SENSITIVE TO DELAY  
🗑
Which transport layer feature is used to guarantee session establishment?   TCP 3-way handshake  
🗑
Which two characteristics are associated with UDP sessions?   1. Received data is unacknowledged. 2. Destination devices receive traffic with minimal delay.  
🗑
What happens if part of an FTP message is not delivered to the destination?   The part of the FTP message that was lost is re-sent.  
🗑
A host device needs to send a large video file accross net while providing data communication to other users. Which feature will allow different communication streams to occur at same time, w/o having a single data stream using all available bandwidth?   multiplexing  
🗑
What kind of port must be requested from IANA in order to be used with a specific application?   registered port  
🗑
What type of information is included in the transport header?   destination and source port numbers  
🗑
What is a socket?   The combination of a source IP address and port number o a destination IP address and port number.  
🗑
What is the complete range of TCP and UDP well-known ports?   0 to 1023  
🗑
Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?   ACK  
🗑
What is a characteristic of a TCP server process?   There can be many ports open simultaneously on a server, one for each active server application.  
🗑
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices?   1. SYN 2. ACK  
🗑
A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?   10 segments  
🗑
Which factor determines TCP window size?   the amount of data the destination can process at one time  
🗑
During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent?   the next byte that the destination expects to receive  
🗑
What information is used by TCP to reassemble and reorder received segments?   sequence numbers  
🗑
What does TCP do i the sending surce detects network congestion on the path to the destination?   The source will decrease the amount of data that it sends before it must receive acknowledgements fromthe destination.  
🗑
What is a Characteristic of res?   UDP reassembles the received datagrams in the order they were received  
🗑
What does a client do when it has UDP datagrams to send?   It just sends the datagrams.  
🗑
What happens if the first packet of a TFTP transfer is lost?   The TFTP application will retry the request if a reply is not received.  
🗑
A host device is receiving live streaming video. How does the device account for video data that is lost during transmission?   The device will continue receiving the streaming video , but there may be a momentary disruption.  
🗑
Why does HTTP use TCP as the transport layer protocol?   because HTTP requires reliable delivery  
🗑
When is UDP preferred to TCP?   when an application can tolerate some loss of data during transmission  
🗑
Which three application layer protocols use TCP?   1. SMTP 2. HTTP 3. FTP  
🗑
Exhibit: Consider a datagram that originates on PC that is destined for web server. Match IP addrs & port #s that are in that datagram to description 1. Destination IP Addr 2. Destination Port # 3. Source IP Address 4. Source Port Number   1. 192.160.1.2 2. 192.168.2.2 3. 2578 4. 80  
🗑
A user is attempting to access success. Which two configuration values must be set on the host to allow this access?   1. DNS server 2. default gateway  
🗑
Which three protocols or standards are used at the application layer of the TCP/IP model?   1. HTTP 2. MPEG 3. GIF  
🗑
Which TCP/IP model layer is closest to the end user?   application  
🗑
A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?   peer-to-peer (P2P  
🗑
What type of information is contained in a DNS MX record?   the domain name mapped to mail exchange servers  
🗑
Why DHCP preferredfor use on large networks?   It is a more efficient way to manage IP addresses than static address assignment.  
🗑
Which command is used to manually query a DNS server to resolve a specific host name?   nslookup  
🗑
What is an advantage of SMB over FTP?   SMB clients can establish a long-term connection to the server.  
🗑
In FTP, an FTP client uses the pull method to download files from an FTP server.   true  
🗑
Which protocol can be used to transfer messages from an email server to an email client?   POP3  
🗑
On a home network, which device is most likely to provide dynamic IP addressing to clients on the home ntwork?   a home router  
🗑
Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model?   1. session layer 2. application layer 3. presentation layer  
🗑
What is true about a client-server network?   The network included a dedicated server.  
🗑
What is comond protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?   Gnutella  
🗑
Which two definitions accurately describe the associated application layer protocol?   1. DNS - resolves Internet names to IP addresses 2. Telnet - provides remote access to servers and networking devices  
🗑
The application layer of the TCP/IP model performs the functions of what three layers of the OSI model?   1. presentation 2. session 3. application  
🗑
Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?   application  
🗑
What are two characteristics of the application layer of the TCP/IP model?   1. The creation and maintenance of dialogue between source and destination applications 2. closest to the end user  
🗑
A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications?   1. FTP 2. HTTP 3. SMTP  
🗑
What is an example of network communication that uses the client-server model?   A workstationinitiates a DNS request when the user types www.cisco.com in the address bar of a web browser.  
🗑
net design proj. 1 student is doing drawing other stud is writing proposal. Drawing is finished & stud wants 2 share folder that contains drawing so that other stud can access file and copy it 2 a USB drive. Which net model is being used?   peer=to=peer  
🗑
What do the client/server and peer-to-peer netgwork models have in common?   Both models support devices in server and client roles.  
🗑
What is an advantage for small organizations of adopting IMAP instead of POP?   Messages are kept in the mail servers until they are manually deleted from the email client.  
🗑
Which application layer protocol uses messaged types such as GET, PUT, and POST?   HTTP  
🗑
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small -to-medium-sized business?   IMAP  
🗑
What three statements describe a DHCP Discover message?   1, The message comes from a client seeking an IP address. 2. The destination IP address is 255.255.255.255. 3. All hosts receive the message, but only a DHCP server replies.  
🗑
What part of the URL , www.cisco.com/index.html, represents the top-level DNS domain?   .com  
🗑
Which two tasks can be performed by a local DNS server?   1. Mapping name-to-IP addresses for internal hosts. 2. Forwarding name resolution requests between servers.  
🗑
Which phrase describes an FTP daemon?   A program that is runnuing on a FTP server  
🗑
Which statement is true about FTP?   The client can download data from or upload data to the server.  
🗑
What is true about the Server Message Block protocol?   Clients establish a long term connection to servers.  
🗑
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?   SMB  
🗑
What is the acronym for the protocol that is used when securely communicating with a web server?   HTTPS  
🗑
The HTTP message type used by the client to request data from the web server is the ______________________________ message   GET  
🗑
>cisco.netacad.net< Server: Unknown Address: 192.168.0.1 Non-authoritative answer: Name: cisco.netacad.net Address: 72.163.6.223 Refer to Exhibit: What command was used to resolve a given host name by querying the name servers?   NSLOOKUP  
🗑
Peer-To-Peer Network   1. No dedicated server is required 2. Client & Server rules are set on per request basis.  
🗑
Peer-To-Peer Applications   1. Requires a specific user interface 2. A background service is required  
🗑
DHCP   Dynamically assigns IP addresses to clients  
🗑
DNS   maps URLs to numerical addresses  
🗑
IMAP   Allows viewing of messages on email clients  
🗑
HTTP   Displays web pages  
🗑
SMTP   Sends Email Messages  
🗑
Open the PT Activity. Which PC or PCs are sending FTP packets to the server?   PC_2  
🗑
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?   tracert 10.1.1.5  
🗑
username techadmin password 63t0ut0fh3r3! enable secret 5tay0ut!!%! service password-encryption login block-for 180 attempts 2 within 60 line console 0 login local end exit   exhibit chapt 11 quiz quest 2  
🗑
Refer exhibit Exhibited config is entered by a net admin into a router. Sometime later a net tech proceeds to log in to router via a console conn. Tech enters techadmin as usr name & tries a pw of 63t0ut0fh3r3! What will be result of action?   The router will display the DT_ATC_RS3> prompt  
🗑
An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?   show file systems  
🗑
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails ?   Have a second router that is connected to another ISP.  
🗑
What is one of the most effective security tools available for protecting users from external threats?   firewalls  
🗑
Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?   ICMP  
🗑
Network services use __________ to define a set of rules that govern how devices communicate and the data formats used in a network.   protocols  
🗑
What is considered the most effective way to mitigate a worm attack?   Download security updates from the operating system vendor and patch all vulnerable systems.  
🗑
Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?   DHCP  
🗑
Which statement is true about Cisco IOS ping indicators?   U may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.  
🗑
How should traffic flow be captured in order to best understand traffic patterns in a network?   During peak utilization times  
🗑
On which two interfaces or ports can security be improved by configuring executive timeouts?   1. console ports 2. vty ports  
🗑
A website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?   ipconfig/displaydns  
🗑
Which element of scaling a network involves identifying the physical and logical topologies?   network documentation  
🗑
net design project. 1 student is doing drawing, while other stud is writing proposal. Drawing is finished & stud wants 2 shr folder that contains drawing so that otr stud can access file & copy it 2 a USB dr. Which networking model is being used?   peer-to-peer  
🗑
What do the client server and peer-to-peer network models have in common?   Both models support devices in server and client roles.  
🗑
What is an advantage for small organizations of adopting IMAP instead of POP?   Messages are kept in the mail servers until they are manually deleted from the email client.  
🗑
Which application layer protocol uses message types such as GET, PUT, and POST?   HTTP  
🗑
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small to medium-size business?   IMAP  
🗑
Which three statements describe a DHCP Discover message?   1. The message comes from a client seeking an IP address. 2. The destination IP address is 255.255.255.255. 3. All hosts receive the message, but only a DHCP server replies.  
🗑
What part of the URL, represents the top-level DNS domain?   .com  
🗑
component   protocol  
🗑
component www   part of the server name  
🗑
component cisco   part of the domain name  
🗑
component index   the name  
🗑
component com   the top-level domain  
🗑
Which two tasks can be performed by a local DNS server?   1. mapping name to IP addresses for internal hosts 2. forwarding name resolution requests between servers.  
🗑
Which phrase describes an FTP daemon?   A program that is running on an FTP server.  
🗑
What statement is true about FTP?   The client can download data from or upload data to the server  
🗑
What is true about the Server Message Block protocol?   Clients establish a long term connection to servers.  
🗑
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?   SMB  
🗑
What is the acronym for the protocol that is used when securely communicating with a web server?   HTTPS  
🗑
The HTTP message type used by the client to request data from the web server is the ______ message.   GET  
🗑
>cisco.netacad.net Server: Unknown Address: 192.168.0.1 Non-authoritative answer: Name: cisco.netacad.net Address: 73.163.6.223 What command was used to resolve a given host name by querying the name servers?   NSLOOKUP  
🗑
peer-to-peer network   1. No dedicated server is required 2. Client & server roles are set on peer  
🗑
peer-to-peer applications   1. Requires a specific user interface 2. A background service is required  
🗑
DHCP   Dynamically assigns IP addresses to clients  
🗑
DNS   maps URLs to numerical addresses  
🗑
IMAP   Allows viewing of messages on email clients  
🗑
HTTP   Displays web pages  
🗑
SMTP   sends email messages  
🗑
PT Activity Which PC or PCs are sending FTP packets to the server?   PC_2  
🗑
What type of traffic would most likely have the highest priority through the network?   voice  
🗑
Which command will block login attempts on Router A for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?   Router A(config)# login block-for 30 attempts 2 within 10  
🗑
Hardware Threats   physical damage to servers, routers, switches, cabling plant,and workstations  
🗑
Environmental Threats   Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)  
🗑
Electrical Threats   voltage spikes, insufficient supply voltage (brownouts) unconditioned power (noise), and total power loss  
🗑
Maintenance Threats   poor handling of key electrical components (electrostatic discharge) lack of critical spare parts, poor cabling, and poor labeling  
🗑
A newly hired network technician is given the task of ordering new hardware for a small business with large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?   devices with support for modularity  
🗑
Which network design consideration would be more important to a large corporation than to a small business?   redundancy  
🗑
Which two traffic types require delay sensitive delivery?   1. voice 2. video  
🗑
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth . Which three types of information should be used to plan for network growth?   1. Inventory of the devices that are currently used on the network. 2. Documentation of the current physical and logical topologies 3. Analysis of the network traffic based on protocols, applications, and services used on the network  
🗑
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer?   1. Capture traffic during peak utilization times to get a good representation of the different traffic types. 2. perform the capture on different network segments.  
🗑
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?   environmental  
🗑
Which type of network threat is intended to prevent authorized users from accessing resources?   DoS attacks  
🗑
Which two actions can be taken to prevent a successful network attack on an email server account?   1. Limit the number of unsuccessful attempts to log into the server. 2. Never send the password through the network in a clear text.  
🗑
Which firewall feature is used to ensure that packets coming into a network are legitimate responses initiated from internal hosts?   stateful packet inspection  
🗑
What is the purpose of the network security authentication function?   To require users to prove who they are  
🗑
A network administrator is issuing the LOGIN BLOCK -FOR 180 ATTEMPTS 2 WITHIN 30 command on a router. Which threat is the network administrator trying to prevent?   A user who is trying to guess a password to access the router  
🗑
What is the purpose of using SSH to connect to a router?   It allows a secure remote connection to the router command line interface.  
🗑
Which two steps are required before SSH can be enabled on a Cisco router?   1. Give the router a host name and a domain name. 2. Generate a set of secret keys to be used for encryption and decryption.  
🗑
Baseline doc for a small co had ping round trip time stats of 36/97/132 bet hosts H1 & H3. Today the net admin chked conn by pinging bet hosts H1 & H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the net admin?   Something is causing a time delay between the networks  
🗑
When should an administrator establish a network baseline?   At regular intervals over a period of time  
🗑
An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output , where should the administrator begin troubleshooting?   R1  
🗑
Which statement is true about CDP on a Cisco device?   CDP can be disabled globally or on a specific interface.  
🗑
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with the command?   The status of the switch interfaces and the address configured on interface vlan 1  
🗑
A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?   The ARP cache is cleared.  
🗑
A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option?   It forces the trace to use IPv6.  
🗑
Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH?   terminal monitor  
🗑
____________ defines the protocols and technologies that implement the transmission of voice data over an IP network.   VoIP  
🗑
The __________ command that is issued on a router is used to verify the value of the software configuration register.   Show Version  
🗑
Data Loss   Installing virus code to destroy surveillance recordings for certain days  
🗑
Identity Theft   Pretending to be someone else by using stolen personal information to apply for a credit card  
🗑
Disruption of Service   Preventing users from assessing a website by sending a large number of link requests in a short period  
🗑
Information Theft   Obtaining trade secret documents illegally  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: amipotasnick
Popular Computers sets