Cisco chapter 2&3 quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which logical address is used for delivery of data to a remote network?

destination IP address

What is the general term that is used to describe a piece of data at any layer of a networking model?

protocol data unit

Why would a technician enter the command copy startup-config running-config?

to copy an existing configuration into RAM.

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

transport

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption.

Which three acronyms/initialisms represent standards organizations? (Choose three.)

1- IANA 2- IEEE 3- IETF

Which two statements are true regarding the user EXEC mode? (Choose two.)

1- The device prompt for this mode ends with the ">" symbol. 2- Only some aspects of the router configuration can be viewed.

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

1- VTY interface. 2- console interface. 3- privileged EXEC mode.

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)

1- message encoding. 2- message size. 3- delivery options.

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

1- the hostname should be fewer than 64 characters in length. 2- the hostname should contain no spaces. 3- the hostname should begin with a letter.

True or False? Mobile devices do not require IP addresses to communicate on the Internet.

False

Fill in the blank. The MAC address of a PC does not change when the PC is moved to a different network because the MAC address is embedded in the ــــــــــــــــــــــــ of the PC.

NIC

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

Fill in the blank. In order to test end-to-end connectivity, you would use the ــــــــــــــــــ command.

Ping

How is SSH different from Telnet?

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

SVI

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast

At which layer of the OSI model would a physical address be encapsulated?

data link layer

What layer of the TCP/IP protocol model determines the best path through the network?

internet

What type of delivery uses data link layer addresses?

local delivery

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

local router

What type of message is sent to a specific group of hosts?

multicast

What is the purpose of protocols in data communications?

providing the rules required for a specific type of communication to occur.

Fill in the blank. The component of the operating software that provides the user interface is called the ـــــــــــــــــــــــــ

shell


Conjuntos de estudio relacionados

authority, responsibility, and accountability

View Set

texto de intertextualidad (nord) DIRECTA

View Set

Java 1400 - Exam 3 Study Guide (Lectures 15 - 19)

View Set

Module 4: Ecosystem Dynamics Part 1

View Set

09.03 Les villes et les pays Quiz

View Set