Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

NETWORKING 1 MIDTERM

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Coaxial cable encodes data into? Group of answer choices Light signal Electrical impulses Radio frequencies Sound waves   Electrical Impulses  
🗑
Which attack slows down or crashes equipment and programs? Group of answer choices Virus, worm or Trojan Horse Firewall Zero day or Zero hour Denial of Service   Denial of Service (DoS)  
🗑
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch? Group of answer choices Aux Telnet Console SSH   Console  
🗑
How is an IPv4 address represented? four decimal numbers between 0 and 255 separated by periods four decimal numbers between 0 and 222 separated by colons thirty-two hexadecimal numbers separated by periods   four decimal numbers between 0 and 255 separated by periods  
🗑
This is a specific parameter defined in the operating system Group of answer choices syntax code keyword argument   keyword  
🗑
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. Group of answer choices Kernel Hardware Shell Software   Kernel  
🗑
This standards organization is responsible for IP address allocation and domain name management. Internet Architecture Board (IAB) Internet Assigned Numbers Authority (IANA) Internet Society (ISOC) Internet Engineering Task Force (IETF)   Internet Assigned Numbers Authority (IANA)  
🗑
Which are true regarding network layer and data link layer addresses? (Choose three.) Network layer addresses are either 32 or 128 bits in length. Data link layer addresses are physical and network layer addresses are logical. Network layer addresses a   Network layer addresses are either 32 or 128 bits in length. Data link layer addresses are physical and network layer addresses are logical. Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits.  
🗑
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway.   True  
🗑
Which two protocols belong in the TCP/IP model application layer? Group of answer choices DNS EIGRP DHCP OSPF   DNS and DHCP  
🗑
Which type of UTP cable is used to connect a PC to a switch port? Group of answer choices straight-through rollover crossover console   Straight-through  
🗑
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device needs mobility when connecting to the network.   The end-user device needs mobility when connecting to the network.  
🗑
What is the definition of bandwidth? the measure of usable data transferred over a given period of time the speed at which bits travel on the network the amount of data that can flow from one place to another in a given amount of time   the amount of data that can flow from one place to another in a given amount of time  
🗑
Why are two strands of fiber used for a single fiber optic connection? They increase the speed at which the data can travel. They allow for full-duplex connectivity. The two strands allow the data to travel for longer distances without degrading.   They allow for full-duplex connectivity.  
🗑
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? the use of CSMA/CA the virtually unlimited availability of IPv6 addresses the use of full-duplex capable Layer 2 switches the development of half-duplex switch operation   the use of full-duplex capable Layer 2 switches  
🗑
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? ring hierarchical mesh bus   mesh  
🗑
Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) International Telecommunication Union (ITU) International Organization for Standardization (ISO)   International Telecommunication Union (ITU) International Organization for Standardization (ISO)  
🗑
What is auto-MDIX? Group of answer choices a type of Cisco switch an Ethernet connector type a type of port on a Cisco switch a feature that detects Ethernet cable type   a feature that detects Ethernet cable type  
🗑
What type of address is 01-00-5E-0A-00-02? an address that reaches every host inside a local subnet an address that reaches one specific host an address that reaches every host in the network an address that reaches a specific group of hosts   an address that reaches a specific group of hosts  
🗑
Which statement is true about MAC addresses? A NIC only needs a MAC address if connected to a WAN. The first three bytes are used by the vendor assigned OUI. The ISO is responsible for MAC addresses regulations.   The first three bytes are used by the vendor assigned OUI.  
🗑
Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped? Group of answer choices TTL Hop Limit Address Unreachable No Route to Destination   Hop Limit  
🗑
A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next? create a new Layer 2 Ethernet frame to be sent to the destination   create a new Layer 2 Ethernet frame to be sent to the destination  
🗑
Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.) Group of answer choices router solicitation router advertisement neighbor solicitation neighbor advertisement   neighbor solicitation neighbor advertisement  
🗑
A router boots and enters setup mode. What is the reason for this? The IOS image is corrupt. Cisco IOS is missing from flash memory. The configuration file is missing from NVRAM. The POST process has detected hardware failure.   The configuration file is missing from NVRAM.  
🗑
Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. router commands providing the highest level of security? enable secret trus    
🗑
What is the purpose of the startup configuration file on a Cisco router? to contain the configuration commands that the router IOS is currently using to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS   to contain the commands that are used to initially configure a router on startup  
🗑
Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status? show ip interface brief ping show ip route show interface fa0/1   show ip interface brief  
🗑
Which two characteristics describe Ethernet technology? (Choose two.) It is supported by IEEE 802.3 standards. It typically uses an average of 16 Mb/s for data transfer rates. It uses the CSMA/CD access control method.   It is supported by IEEE 802.3 standards. It uses the CSMA/CD access control method.  
🗑
What is the special value assigned to the first 24 bits of a multicast MAC address? Group of answer choices 01-5E-00 FF-00-5E FF-FF-FF 01-00-5E   01-00-5E  
🗑
Which field in an IPv4 packet header will typically stay the same during its transmission? Group of answer choices Flag Time-to-Live Packet Length Destination Address   Destination Address  
🗑
How does the network layer use the MTU value? The MTU is passed to the network layer by the data link layer.   The MTU is passed to the network layer by the data link layer.  
🗑
When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination? Group of answer choices destination MAC address source IP address destination IP address source MAC address   destination IP address  
🗑
What is the purpose of ARP in an IPv4 network? to obtain a specific MAC address when an IP address is known to forward data onward based on the destination MAC address.   to obtain a specific MAC address when an IP address is known  
🗑
What type of information is contained in an ARP table? Group of answer choices switch ports associated with destination MAC addresses domain name to IP address mappings routes to reach destination networks IP address to MAC address mappings   IP address to MAC address mappings  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: 111lh