Module 1 - 13

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which IPv6 network prefix is only intended for local links and can not be routed?

FE80::/10 Topic 12.3.0 - FE80::/10 is a link-local prefix. Devices with only link-local addresses can communicate with other devices on the same network but not with devices on any other network.

What is the prefix length notation for the subnet mask 255.255.255.224?

/27 Topic 11.1.0 - The binary format for 255.255.255.224 is 11111111.11111111.11111111.11100000. The prefix length is the number of consecutive 1s in the subnet mask. Therefore, the prefix length is /27.

What is the recommended prefix length for most IPv6 subnets?

/64 Most IPv6 subnets will have a prefix length of /64.

What is the special value assigned to the first 24 bits of a multicast MAC address transporting an IPv4 packet?

01-00-5E Topic 7.2.0 - Just as with multicast IP addresses, there is a special assigned value for multicast MAC addresses. The first 24 bits are set in hex to: 01-00-5E. The remaining 6 hex digits are derived from the lower 23 bits of the IP multicast.

What is auto-MDIX?

A feature that detects Ethernet cable type Topic 7.4.0 - Auto-MDIX is a feature that is enabled on the latest Cisco switches and that allows the switch to detect and use whatever type of cable is attached to a specific port.​​

What does a code of "O" indicate next to a route in the routing table?

A route learned dynamically from OSPF Codes at the beginning of each routing table entry are used to identify the type of route or how the route was learned. A code of "O" indicates the route was learned from OSPF.

What is a function of the MAC sublayer? (Choose three.)

Controls access to the media Checks for errors in received bits Uses CSMA/CD or CSMA/CA to support Ethernet technology The MAC sublayer checks for bit errors, supports Ethernet technologies, and controls access to the media.

Which switching method can be implemented using fast-forward switching or fragment-free switching?

Cut-through switching Cut-through switching is implemented using either fast-forward switching or fragment-free switching.

What are two methods for switching data between ports on a switch? (Choose two.)

Cut-through switching Store-and-forward switching The two methods for switching data between ports on a switch are cut-through switching and store-and-forward switching.

MODULE - 6

DATA LINK LAYER

MODULE - 6 - END OF CHAPTER QUIZ

DATA LINK LAYER

Which part of an Ethernet Frame uses a pad to increase the frame field to at least 64 bytes?

Data field All frames must be at least 64 bytes long. Additional bits called a "pad" are used to increase the size of small frames to the minimum size.

Which statement describes the half-duplex mode of data transmission?

Data that is transmitted over the network flows in one direction at a time Topic 6.2.0 - The data that is transmitted over the network can flow using one of three modes: Simplex - Data can only flow in one direction. Half-duplex - Data flows in one direction at a time. Full-duplex - Data flows in both directions at the same time.

Which attack slows down or crashes equipment and programs?

Denial of Service (DoS)

What are the two most commonly referenced fields in an IPv4 packet header that indicate where the packet is coming from and where it is going? (Choose two.)

Destination IP address Source IP address The IP header fields that identify where the packet originated and where it is going are Source IP Address and Destination IP Address.

Which field in an IPv4 packet header will typically stay the same during its transmission?

Destination address Topic 8.1.0 - The value in the Destination Address field in an IPv4 header will stay the same during its transmission. The other options might change during its transmission.

Which two types of ICMP messages are common to both ICMPv4 and ICMPv6? (Choose two.)

Destination or Service Unreachable Time exceeded ICMP messages common to both ICMPv4 and ICMPv6 include host confirmation, destination or service unreachable, and time exceeded.

MODULE-12

Dynamic Addressing for IPv6 GUA's

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF Topic 9.2.0 - The purpose of an ARP request is to find the MAC address of the destination host on an Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the Ethernet LAN. The frame contains the IP address of the destination and the broadcast MAC address, FFFF.FFFF.FFFF.

True or False: The Subnet ID field in an GUA must borrow bits from the interface ID.

False The correct answer is False. GUAs do not use a bit from the interface ID to create subnets.

True or false? The right-most part of an IP address is used to identify the network that a device belongs to.

False The correct answer is False. It is the left-most portion of an IP address that identifies the network. The right-most portion is used to identify the specific device or interface.

True or False. RA messages are sent to all IPv6 routers by hosts requesting addressing information.

False The correct answer is False. Router Advertisement (RA) messages are sent to all IPv6 nodes. If Method 1 (SLAAC only) is used, the RA includes network prefix, prefix-length, and default-gateway information.

True or false? The physical layer is only concerned with wired network connections.

False The correct answer is False. The physical layer provides the means to transport bits over the network whether the network is wired or wireless.

True or false? When a frame is encoded by the physical layer, all bits are sent over the media at the same time.

False The correct answer is False. When encoded, the bits making up a frame are transmitted over the media one at a time.

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

Fault Tolerance

When data is encoded as pulses of light, which media is being used to transmit the data?

Fiber-optic cable

Which step of the communication process is concerned with properly identifying the address of the sender and receiver?

Formatting

Which part of an Ethernet frame detects errors in the frame?

Frame Check Sequence The FCS field uses a CRC to detect errors in a frame.

Which part of a GUA is assigned by the ISP?

Global Routing Prefix The global routing prefix is the part of a GUA that is assigned by an ISP.

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, TCP, IP, Ethernet

Which duplex communication method is used in WLANs?

Half-duplex Wireless LANs (WLANs) only support half-duplex because only one device can access the media at a time.

What does the data link layer add to a Layer 3 packet to create a frame? (Choose two.)

Header trailer The data link layer adds a header which contains the source and destination Layer 2 address and a trailer that contains a frame check sequence (FCS).

Which field is used to detect corruption in the IPv4 header?

Header Checksum The Header Checksum field in an IPv4 header is used to detect corrupt packets.

Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?

Hop Limit Topic 8.3.0 - ICMPv6, like IPv4, sends a Time Exceeded message if the router cannot forward an IPv6 packet because the packet has expired. However, the IPv6 packet does not have a TTL field. Instead, it uses the Hop Limit field to determine if the packet has expired.

What field content is used by ICMPv6 to determine that a packet has expired?

Hop Limit field Topic 13.1.0 - ICMPv6 sends a Time Exceeded message if the router cannot forward an IPv6 packet because the packet expired. The router uses a hop limit field to determine if the packet has expired, and does not have a TTL field.

MODULE - 13 - END OF CHAPTER QUIZ

ICMP

Which two protocols function at the internet layer? (Choose two.)

ICMP IP

Which protocol is used by IPv4 and IPv6 to provide error messaging?

ICMP Topic 13.1.0 - ICMP is used by IPv4 and IPv6 to provide for messages to be sent in the event of certain errors and for informational purposes.

Which protocol provides feedback from the destination host to the source host about errors in packet delivery?

ICMP Topic 13.1.0 - The ICMP protocol operates at Layer 3 of the OSI model, which is the Internet layer of the TCP/IP model. ICMP encapsulates the ping and traceroute commands.

MODULE - 13

ICMP Messages

Which standards organization oversees development of wireless LAN standards?

IEEE

Which organization defines standards for the network access layer (i.e., the OSI physical and data link layers)?

IEEE The IEEE defines standards for the TCP/IP network access layer, which are the OSI physical and data link layers.

Which three acronyms/initialisms represent standards organizations? (Choose three.)

IETF IEEE IANA

MODULE - 7

ETHERNET SWITCHING

MODULE - 7 - END OF CHAPTER QUIZ

ETHERNET SWITCHING

What are the two methods a device can use to generate its own IPv6 interface ID?

EUI-64 randomly generated When the RA message is either SLAAC or SLAAC with stateless DHCPv6, the client must generate its own interface ID using the EUI-64 process or a randomly generated 64-bit number.

Which part of an Ethernet Frame describes the higher-layer protocol that is encapsulated?

EtherType The EtherType field identifies the upper layer protocol that is encapsulated in the Ethernet Frame.

Which LAN topology is a hybrid topology?

Extended star The extended star topology is considered a hybrid topology because it combines multiple star topologies.

Which is the hexadecimal equivalent of 254?

FE The hexadecimal equivalent of 254 is FE.

Which three options are major issues associated with IPv4? (Choose three.)

IP address depletion Increased network complexity and Internet routing table expansion Lack of end-to-end connectivity IPv4 was standardized in the 1980s and has several technological limitations, such as lack of end-to-end connectivity and a depleted address space.

The media access control method used depends on which two criteria?

Media sharing topology The two criteria for determining the media access control method used are the type of media sharing involved and the topology.

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

Mesh Topic 6.2.0 - The mesh topology provides high availability because every node is connected to all other nodes. Mesh topologies can be found in WANs. A partial mesh topology can also be used where some, but not all, end points connect to one another.

Which dynamic addressing method for GUAs is the one where devices rely solely on the contents of the RA message for their addressing information?

Method 1: SLAAC SLAAC is a method where devices create their own GUA without the services of DHCPv6. Using SLAAC, devices rely on the local router ICMPv6 RA messages to obtain the necessary information.

To what type of address are ICMPv6 neighbor solicitation messages sent?

Multicast ICMPv6 neighbor solicitation messages are sent as a multicast.

MODULE - 8

NETWORK LAYER

MODULE - 8 - END OF CHAPTER QUIZ

NETWORK LAYER

MODULE - 1

NETWORKING TODAY

MODULE - 5

NUMBER SYSTEMS

MODULE - 5 - END OF CHAPTER QUIZ

NUMBER SYSTEMS

Which two ICMPv6 messages are used in to determine the MAC address of a known IPv6 address?

Neighbor Advertisement Neighbor Solicitation The two ICMPv6 messages used in determining the MAC address of a known IPv6 address are the neighbor solicitation and the neighbor advertisement.

What message is sent by a host to check the uniqueness of an IPv6 address before using that address?

Neighbor Solicitation Topic 13.1.0 - In IPv6, Duplicate Address Detection (DAD) is used in place of ARP. An IPv6 host performs DAD by sending a neighbor solicitation (NS) message to its own IPv6 address to ensure the uniqueness of the address prior to using it.

Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)

Neighbor solicitation neighbor advertisement Topic 9.3.0 - IPv6 uses neighbor solicitation (NS) and neighbor advertisement (NA) ICMPv6 messages for MAC address resolution.

Which two commands could be entered on a Windows host to view its IPv4 and IPv6 routing table? (Choose two.)

Netstat -r Route print The commands netstat -r and route print will display the routing table of a Windows host.

MODULE 11.4.4 QUIZ

Network Segmentation

MODULE - 4

PHYSICAL LAYER

MODULE - 4 END OF CHAPTER QUIZ

PHYSICAL LAYER

MODULE - 3 - CHAPTER-QUIZ

PROTOCOLS AND MODELS

Which utility uses the Internet Control Messaging Protocol (ICMP)?

Ping Topic 13.1.0 - ICMP is used by network devices to send error messages.

What information is added during encapsulation at OSI Layer 3?

Source and destination IP address Topic 8.1.0 - IP is a Layer 3 protocol. Layer 3 devices can open the Layer 3 header to inspect the Layer 3 header which contains IP-related information including the source and destination IP addresses.

Which field in an IPv6 GUA is used for subnetting?

Subnet ID The Subnet ID field, which is between the Global Routing Prefix field and the Interface ID field, is used for subnetting.

MODULE-12

Subnet an IPv6 Network

When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?

destination IP address Topic 8.4.0 - When a router receives a packet, it examines the destination address of the packet and uses the routing table to search for the best path to that network.

Which lists the Layer 2 and Layer 3 address fields in the correct order?

destination NIC address, source NIC address, source IP address, destination IP address The correct order of Layer 2 and Layer 3 address fields is: destination NIC address, source NIC address, source IP address, destination IP address

Which command can be used on a Windows host to display the routing table?

netstat -r Topic 8.4.0 - On a Windows host, either the route print or netstat -r commands can be used to display the host routing table. The show ip route command is used on a router to display its routing table. The netstat -s command is used to display per-protocol statistics. The tracert command is used to display the path that a packet travels to its destination.

What are two benefits of using a layered network model? (Choose two.)

it prevents technology in one layer from affecting other layers. it assists in protocol design

What is the purpose of the banner motd command?

it provides a way to make announcements to those who log in to a router. Topic 10.1.0 - The banner motd command is used to display a message when a user attempts to log into the router.

At a minimum, which address is required on IPv6-enabled interfaces?

link-local Topic 12.3.0 - All IPv6 enabled interfaces must at minimum have a link-local address. Other IPv6 addresses can be assigned to the interface as required.

What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?

link-local Topic 12.3.0 - When IPv6 is enabled on any interface, that interface will automatically generate an IPv6 link-local address.

Which type of IPv6 address is not routable and used only for communication on a single subnet?

link-local address Topic 12.3.0 - Link-local addresses have relevance only on the local link. Routers will not forward packets that include a link-local address as either the source or destination address.

Which dynamic addressing method for GUAs is the one where devices get their IPv6 configuration in a RA message and request DNS information from a DHCPv6 server?

method 2: SLAAC and stateless DHCPv6 SLAAC and stateless DHCPv6 is a method where devices use SLAAC for the GUA and default gateway address. The devices then use a stateless DHCPv6 server for DNS servers and other addressing information.

Which dynamic addressing method for GUAs is the one where devices rely solely on a DHCPv6 server for their addressing information?

method 3: stateful DHCPv6 Stateful DHCPv6 is a method where devices automatically receive their addressing information including a GUA, prefix length, and the addresses of DNS servers from a stateful DHCPv6 server.

Which type of communication will send a message to a group of host destinations simultaneously?

multicast

Which of the following fiber-optic cable types is used within a campus network?

multimode Multimode fiber has a shorter distance limitation than single mode fiber. Commonly used on LANs within a campus network.

Which of the following fiber-optic cable types can help data travel approximately 500 meters?

multimode Multimode fiber has a shorter distance limitation than single-mode fiber. Commonly used on LANs with a distance of a few hundred meters but can be up to 2 km.

Which of the following fiber-optic cable types use light emitting diodes (LEDs) as a data light source transmitter?

multimode Multimode fiber used LEDs as the light source.

Which two parts are components of an IPv4 address? (Choose two.)

network portion host portion Topic 11.1.0 - An IPv4 address is divided into two parts: a network portion - to identify the specific network on which a host resides, and a host portion - to identify specific hosts on a network. A subnet mask is used to identify the length of each portion.

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

physical layer

What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered?

portsmouth (config) # Topic 10.1.0 - The command hostname portsmouth is used to change the current router name to portsmouth.

Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?

privileged EXEC mode Topic 10.1.0 - The command Router#configure terminal allows a user to enter the privileged mode from where the configuration,management and troubleshooting commands can be accessed.

What is the general term that is used to describe a piece of data at any layer of a networking model?

protocol data unit

What is the purpose of protocols in data communications?

providing the rules required for a specific type of communication to occur

What type of cable is used to connect a workstation serial port to a Cisco router console port?

rollover

Which devices will not forward an IPv4 broadcast packet by default?

router Routers will not forward an IPv4 broadcast packet by default.

Which command could be used on a Cisco router to view its ARP table?

show ip arp The command show ip arp is used on Cisco routers to view the ARP table.

Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?

show ip interface brief Topic 10.2.0 - The show ip interface brief command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status.

What is the command used on a Cisco IOS router to view the routing table?

show ip route The show ip route command is used to view the routing table on a Cisco router.

Which of the following fiber-optic cable types is used to connect long-distance telephony and cable TV applications?

single-mode Single-mode fiber is commonly used for long haul TV and telephony applications.

Which of the following fiber-optic cable types can travel approximately 100 km? Which of the following fiber-optic cable types can travel approximately 62.5 miles or 100 km/100000 m?

single-mode Single-mode fiber is used for long haul applications up to 100 km.

Which of the following fiber-optic cable types use lasers in a single stream as a data light source transmitter?

single-mode Single-mode fiber uses laser technology as the light source.

Which two situations are the result of excessive broadcast traffic? (Choose two)

slow network operations slow device operations Slow network operations and slow device operations are the result of excessive broadcast traffic.

What type of physical topology can be created by connecting all Ethernet cables to a central device?

star Topic 6.2.0 - Devices connected to the Ethernet star topology connect to either a hub or a switch.

Which type of UTP cable is used to connect a PC to a switch port?

straight-through

When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP?

the MAC address of the router interface closest to the sending host Topic 9.1.0 - When a host sends an IPv4 packet to a destination on a different network, the Ethernet frame cannot be sent directly to the destination host because the host is not directly reachable in the same network. The Ethernet frame must be sent to another device known as the router or default gateway in order to forward the IPv4 packet. ARP is used to discover the MAC address of the router (or default gateway) and use it as the destination MAC address in the frame header.

Which feature describes using personal tools to access information and communicate across a business or campus network?

(BYOD) Bring Your Own Device

MODULE - 2

BASIC SWITCH AND END DEVICE CONFIGURATION

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

cellular satellite

Which option describes malicious code running on user devices?

Virus, Worm, or Trojan Horse

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

(QoS) Quality of Service

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

(VPN) Virtual Private Network

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?

(WAN) Wide Area Network

Which two protocols are service discovery protocols? (Choose two.)

(DNS) Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol Service discovery protocols, such as DNS and DHCP enable automatic detection of service. DHCP is used to discover services for automatic IP address allocation and DNS for name-to-IP address resolution services.

Which connections are specialized ports on a networking device that connect to individual networks?

Interface

What is the function of the shell in an OS?

It interfaces between the users and the kernel

What is the order of the two addresses in the data link frame?

destination MAC, source MAC The data link frame addressing consists of a destination and source MAC address in that order.

Which type of access is secured on a Cisco router or switch with the enable secret command?

privileged EXEC

What is the PDU associated with the transport layer?

segment The transport layer PDU is known as a segment.

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?

(LAN) Local Area Network

Which connection physically connects the end device to the network?

(NIC) Network Interface Card

How does BYOD change the way in which businesses implement networks?​

BYOD provides flexibility in where and how users can access network resources.

Which memory location on a Cisco router or switch stores the startup configuration file?

NVRAM

MODULE - 3

PROTOCOLS AND MODELS

Which memory location on a Cisco router or switch will lose all content when the device is restarted?

RAM

Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)

end & 'CTRL + Z' To return from any prompt, all the way down to privileged EXEC mode, type the end command or by pressing the CTRL+Z keys simultaneously on the keyboard.

Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?

Multicast

True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway.

True The correct answer is True. When two devices are on different IP networks, frames cannot be sent directly to the receiver since it is on a different logical network. The frames must first be forwarded to a default gateway (router).

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

10.1.0.0

Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?

Aux The AUX port on a Cisco device provided out-of-band connections over a telephone line.

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

Bring Your Own Device (BYOD)

Which feature contains options such as Public, Private, Custom and Hybrid?

Cloud Computing

Which two protocols belong in the TCP/IP model application layer?

DNS DHCP DHCP and DNS are both application layer protocols.

True or False? Data Link addresses are physical so they never change in the data link frame from source to destination.

False The correct answer is False. Data link addresses change within the data link frame when the receiving device is not on the same network.

Which option blocks unauthorized access to your network?

Firewall

Which three are components of message timing? (Choose three.)

Flow Control Access Method Response timeout

Which IOS mode are you in if the Switch(config)# prompt is displayed?

Global Configuration Mode Global configuration mode is identified by the (config)# prompt.

Which of the following is the name for all computers connected to a network that participate directly in network communication?

Hosts

This standards organization is responsible for IP address allocation and domain name management.

Internet Assigned Numbers Authority (IANA) IANA is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers for ICANN.

This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.

Internet Engineering Task Force (IETF) The IETF develops and maintains the specifications for new protocols and updates to existing protocols through published documents called Request for Comments (RFCs).

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

What is the Internet?

It provides connections through interconnected global networks.

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

Logical Topology

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

Physical Topology

Which feature is being used when connecting a device to the network using an electrical outlet?

Powerline

Which IOS mode allows access to all commands and features?

Privileged EXEC mode (or enable mode)The privileged EXEC mode allows access to all commands. Higher level commands like global configuration mode and subconfiguration modes can only be reached from the privileged EXEC mode.

Which two devices are intermediary devices? (Choose two)

Routers and Switches

Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)

Routing Protocols Messaging Internet Protocol IP (Internet Protocol), ICMP (Messaging), and Routing Protocols are services provided at the Internet Layer.

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

Scalability

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

Security

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

Spyware

This protocol is responsible for guaranteeing the reliable delivery of information.

TCP Transmission Control Protocol (TCP) manages the conversation between end devices and guarantees the reliable delivery of information.

Which access method would be the most appropriate in-band access to the IOS over a network connection?

Telnet/SSH Both Telnet and SSH are in-band access methods that require an active network connection to the device.

Which option creates a secure connection for remote workers?

Virtual Private Network (VPN)

Which feature uses the same cellular technology as a smart phone?

Wireless Broadband

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access

How is the privileged EXEC mode access secured on a switch?

enable secret class Securing access to the EXEC mode on a Cisco switch is accomplished with the enable secret command followed by the password. In this example the command is Switch(config)# enable secret class.

How is an IPv4 address represented?

four decimal numbers between 0 and 255 separated by periods IPv4 addresses are written as four groups of decimal numbers separated by periods. For example: 192.168.1.1.

What is the command to assign the name "Sw-Floor-2" to a switch?

hostname Sw-Floor-2 The global configuration command to set the host name on a Cisco device is hostname. So, in this example the full command is Switch(config)# hostname Sw-Floor-2.

Which command enables password authentication for user EXEC mode access on a switch?

login User EXEC mode access through the console port is enabled with the login command entered in line mode. For example: Switch(config-line)# login.

BGP and OSPF are examples of which type of protocol?

routing Border Gateway Protocol (BGP) Open Shortest Path First (OSPF) BGP and OSPF are routing protocols. They enable routers to exchange route information to reach remote networks.

Which command encrypts all plaintext passwords access on a switch?

service password-encryption The service password-encryption command entered in global configuration mode will encrypt all plaintext passwords.

What is used to determine the network portion of an IPv4 address?

subnet mask It is the subnet mask used in IPv4 that is used to determine the network portion of an IPv4 address.

What are two characteristics of a scalable network? (Choose two.)

suitable for modular devices that allow for expansion grows in size without impacting existing users

What type of network must a home user access in order to do online shopping?

the internet

UDP and TCP belong to which layer of the TCP/IP protocol?

transport TCP and UDP are both transport layer protocols.

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode

A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?

. (period) Topic 13.2.0 - When the ping command is issued on a router, the most common indicators are as follows: ! - indicates receipt of an ICMP echo reply message . - indicates a time expired while waiting for an ICMP echo reply message U - an ICMP message of unreachability was received

What is the dotted decimal representation of the IPv4 address which is represented as the binary string 00001010.01100100.00010101.00000001?

10.100.21.1 Topic 5.1.0 - Converting the binary string of 00001010.01100100.00010101.00000001 to dotted decimal gives 10.100.21.1

Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. What is the network address of Host-A?

10.5.4.0 The network address for 10.5.4.100 with a subnet mask of 255.255.255.0 is 10.5.4.0.

Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)

10.5.4.1 10.5.4.99 Host A is on network 10.5.4.0. Therefore, devices with the IPv4 addresses 10.5.4.1 and 10.5.4.99 are on the same network.

Which of the following is the binary equivalent to the 172.16.31.30 IP address?

10101100.00010000.00011111.00011110

What is the binary representation for the decimal number 173?

10101101 Topic 5.1.0 decimal 173 = 128 + 0 + 32 + 0 + 8 + 4 + 0 + 1

Which is the binary equivalent to the 192.168.11.10 IP address?

11000000.10101000.00001011.00001010

What is the binary representation of 0xCA?

11001010 Topic 5.2.0 - When converted, CA in hex is equivalent to 11011010 in binary. One way to do the conversion is one nibble at a time, C = 1100 and A = 1010. Combine the two nibbles gives 11001010.

What is the binary equivalent of the decimal number 232?

11101000 Topic 5.1.0 - 232 in binary is 11101000. 128+64+32+8 = 232

Given a /48 Global Routing Prefix and a /64 prefix, what is the subnet portion of the following address: 2001:db8:cafe:1111:2222:3333:4444:5555

1111 ?????? The subnet portion of the address is the 16 bits between the /48 and /64 prefixes, which are 2222.

Which of the following is the decimal equivalent of 7D?

125 The decimal equivalent of 7D is 125.

Which IPv4 address can a host use to ping the loopback interface?

127.0.0.1 Topic 8.4.0 - A host can ping the loopback interface by sending a packet to a special IPv4 address within the network 127.0.0.0/8.

How many binary bits exist within an IPv6 address?

128 Topic 5.2.0 - IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from 32 bits to 128 bits.

What is the decimal equivalent of the binary number 10010101?

149 Topic 5.1.0 - Binary 10010101 maps to 149 in decimal. 128+16+4+1 = 149

Your organization is issued the IPv6 prefix of 2001:db8:130f::/48 by your service provider. With this prefix, how many bits are available for your organization to create /64 subnetworks if interface ID bits are not borrowed?

16 Topic 12.8.0 - The global routing prefix that is assigned to the organization has 48 bits. The next 16 bits are used for the subnet ID. This makes up the first 64 bits of the address, which is typically the network portion of the address. The remaining 64 bits of the 128-bit IPv6 address are for the interface ID (or host) portion of the address.

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

16 - 2 = 14 Topic 11.1.0 - A /28 mask is the same as 255.255.255.240. This leaves 4 host bits. With 4 host bits, 16 IP addresses are possible, but one address represents the subnet number and one address represents the broadcast address. 14 addresses can then be used to assign to network devices.

Which is the decimal equivalent of A9?

169 The decimal equivalent of A9 is 169.

Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. What is the network address of Host-A?

172.16.0.0 The network address for 172.16.4.100 with a subnet mask of 255.255.0.0 is 172.16.0.0.

Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)

172.16.4.99 172.16.0.1 Host A is on network 172.16.0.0. Therefore, devices with the IPv4 addresses 172.16.4.99 and 172.16.0.1 are on the same network.

Host-A has the IPv4 address and subnet mask 192.168.1.50 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)

192.168.1.1 192.168.1.100 Host A is on network 192.168.1.0. Therefore, devices with the IPv4 addresses 192.168.1.1 and 192.168.1.100 are on the same network.

What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?

2001:DB8:0:AB00::1234 Topic 12.2.0 - There are two rules defining how an IPv6 address can be compressed. The first rule states that leading zeros in a hextet can be eliminated. The second rule states that a single :: can be used to represent one or more contiguous all zero hextets. There can be one and only one :: in an IPv6 address.

What is the network address for the IPv6 address 2001:DB8:AA04:B5::1/64?

2001:DB8:AA04:B5::/64 Topic 12.8.0 - The /64 represents the network and subnet IPv6 fields which are the first four groups of hexadecimal digits. The first address within that range is the subnetwork address of 2001:DB8:AA04:B5::/64.​

What is the prefix associated with the IPv6 address 2001:DB8:D15:EA:CC44::1/64?

2001:DB8:D15:EA::/64 Topic 12.3.0 - The /64 represents the network and subnet IPv6 fields. The fourth field of hexadecimal digits is referred to as the subnet ID. The subnet ID for this address is 2001:DB8:D15:EA::0/64.​​

What is the most compressed representation of the IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001?

2001:db8:0:abcd::1 Topic 12.2.0 - The IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001 in its most compressed format would be 2001:db8:0:abcd::1. The one leading zero in the second hextet can be removed. The first hextet of zeros would be compressed to a single zero. The three consecutive hextets of zeros can be compressed to a double colon ::. The three leading zeros in the last hextet can be removed. The double colon :: can only be used once in an address.

What is the decimal equivalent of 0xC9?

201 Topic 5.2.0 - 0x refers to the item as hexadecimal. Convert each character into its corresponding nibble. Then combine the nibbles together and calculate the resulting decimal equivalent. C has a value of 12. 12 x 16 = 192. 192 + 9 = 201.

What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?

203.0.113.211 Topic 5.1.0 - Each section (octet) contains eight binary digits. Each digit represents a specific value (128, 64, 32, 16, 8, 4, 2, and 1). Everywhere there is a 1, the specific value is relevant. Add all relevant values in a particular octet to obtain the decimal value. For example binary 11001011 equals 203 in decimal.

Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format?

236.17.12.10 Topic 5.1.0 - The binary number 11101100 00010001 00001100 00001010 translates to 236.17.12.10.

What subnet mask is represented by the slash notation /20?

255.255.240.0 Topic 11.1.0 - The slash notation /20 represents a subnet mask with 20 1s. This would translate to: 11111111.11111111.11110000.0000, which in turn would convert into 255.255.240.0.

Which subnet mask would be used if 5 host bits are available?

255.255.255.224 Topic 11.1.0 - The subnet mask of 255.255.255.0 has 8 host bits. The mask of 255.255.255.128 results in 7 host bits. The mask of 255.255.255.224 has 5 host bits. Finally, 255.255.255.240 represents 4 host bits.

Which subnet mask would be used if exactly 4 host bits are available?

255.255.255.240 Topic 11.1.0 - The subnet mask of 255.255.255.224 has 5 host bits. The mask of 255.255.255.128 results in 7 host bits. The mask of 255.255.255.240 has 4 host bits. Finally, 255.255.255.248 represents 3 host bits.

Given a /32 Global Routing Prefix and a /64 prefix, how many bits would be allocated for the Subnet ID?

32 The subnet portion of the address consists of the 32 bits between the /32 and /64 prefixes.

How many bits are in an IPv4 address?

32 Topic 5.1.0 - An IPv4 address is comprised of 4 octets of binary digits, each containing 8 bits, resulting in a 32-bit address.

A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.224. How many usable host addresses will this subnet provide?​

32 - 2 = 30 Topic 11.8.0 - The subnet mask 255.255.255.224 is equivalent to the /27 prefix. This leaves 5 bits for hosts, providing a total of 30 usable IP addresses (25 = 32 - 2 = 30).

How many usable IP addresses are available on the 192.168.1.0/27 network?

32 - 2 = 30 Topic 11.1.0 - A /27 mask is the same as 255.255.255.224. This leaves 5 host bits. With 5 host bits, 32 IP addresses are possible, but one address represents the subnet number and one address represents the broadcast address. Thus, 30 addresses can then be used to assign to network devices.

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?

4 Topic 11.5.0 - The normal mask for 192.168.10.0 is /24. A /26 mask indicates 2 bits have been borrowed for subnetting. With 2 bits, four subnets of equal size could be created.​

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

62 Topic 11.5.0 - When a /26 mask is used, 6 bits are used as host bits. With 6 bits, 64 addresses are possible, but one address is for the subnet number and one address is for a broadcast. This leaves 62 addresses that can be assigned to network devices.

What is the decimal equivalent of the hex number 0x3F?

63 Topic 5.2.0 - Hex 0x3F is 63 in decimal. (3*16)+(15*1) = 63

If a network device has a mask of /26, how many IP addresses are available for hosts on this network?

64 - 2 = 62 Topic 11.1.0 - A /26 mask is the same as 255.255.255.192. This leaves 6 host bits. With 6 host bits, 64 IP addresses are possible, but one address represents the subnet number and one address represents the broadcast address. Thus 62 addresses can then be assigned to network hosts.

What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)

64 and 1518 bytes Topic 7.1.0 - The minimum Ethernet frame is 64 bytes. The maximum expected Ethernet frame is 1518 bytes. A network technician must know the minimum and expected maximum frame size in order to recognize runt and jumbo frames.

Which of the following are data link layer protocols? (Choose three)

802.11 Ethernet PPP 802.11, Ethernet, and PPP are Layer 2 protocols. IP is Layer 3 and UDP is Layer 4.

What is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64?

A9CD:47FF:FE57:FE94 Topic 12.2.0 - The interface ID of an IPv6 address is the rightmost 64 bits, or last four hextets, of the address if no interface ID bits have been used for subnets.

MODULE - 9

ADDRESS RESOLUTION

MODULE - 9 - END OF CHAPTER QUIZ

ADDRESS RESOLUTION

What two protocols are used to determine the MAC address of a known destination device IP address (IPv4 and IPv6)?

ARP ND Address Resolution Protocol (ARP) is used to determine the device MAC address of a known destination device IPv4 address. Neighbor Discovery (ND) is used to determine the MAC address of a known destination device IPv6 address.

Which statement is true about ARP?

ARP entries are cached temporarily. The ARP table is cached temporarily in RAM.

What is an attack using ARP?

ARP poisoning Two security issues with ARP Requests are that ARP messages are sent as broadcasts and can be spoofed.

What Layer 2 function does a router perform? (Choose three.)

Accepts a frame from a medium, de-encapsulates the frame, re-encapsulates the packet into a new frame Routers perform four functions at Layer 2. They accept a frame from the media, de-encapsulate the packet from a frame, re-encapsulate the packet into a new frame, and forwards the new frame appropriate to the medium of that segment of the physical network.

What type of address is 01-00-5E-0A-00-02?

An address that reaches a specific group of hosts Topic 7.2.0 - The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal. It allows a source device to send a packet to a group of devices.

Which statement regarding the service password-encryption command is true?

As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted Topic 10.1.0 - The command service password-encryption is used to encrypt all the clear text passwords in the running-configuration file.

What feature automatically negotiates the best speed and duplex setting between interconnecting devices?

Autonegotiation Autonegotiation is a technology that automatically negotiates the speed and duplex between two connected devices.

MODULE - 10 - END OF CHAPTER QUIZ

BASIC ROUTER CONFIGURATION

Which of the following wireless standards is used for Personal Area Networks (PANs) and allows devices to communicate over distances of 1 to 100 meters?

Bluetooth This wireless standard is used for Personal Area Networks (PANs) and allows devices to communicate over distances of 1 to 100 meters.

Which is the hexadecimal equivalent of 202?

CA The hexadecimal equivalent of 202 is CA.

What method is used to manage contention-based access on a wireless network?

CSMA/CA Topic 6.2.0 - Carrier sense multiple access with collision avoidance (CSMA/CA) is used with wireless networking technology to mediate media contention. Carrier sense multiple access with collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media contention. Priority ordering and token passing are not used (or not a method) for media access control.

Which data link layer media access control method does Ethernet use with legacy Ethernet hubs?

CSMA/CD Topic 6.2.0 - CSMA/CD is used by Ethernet networks using legacy Ethernet hubs. CSMA/CA is used by 802.11-based wireless networks.

Which media access control method is used in legacy Ethernet LANs?

Carrier sense multiple access/collision detection Carrier sense multiple access /collision detection (CSMA/CD) is the media access control method used in legacy Ethernet LANs.

What type of information is contained in an ARP table?

IP address to MAC address mappings Topic 9.2.0 - ARP tables are used to store mappings of IPv4 addresses to MAC addresses. When a network device needs to forward a packet, the device knows only the IPv4 address. To deliver the packet on an Ethernet network, a MAC address is needed. ARP resolves the MAC address and stores it in an ARP table.

A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device?

IP at the internet layer Data is de-encapsulated so the next layer to receive the data would be the internet layer.

What is indicated by a successful ping to the ::1 IPv6 address?

IP is properly installed on the host. Topic 12.2.0 - The IPv6 address ::1 is the loopback address. A successful ping to this address means that the TCP/IP stack is correctly installed. It does not mean that any addresses are correctly configured.

MODULE 11.1.8 QUIZ

IPv4 Address Structure

MODULE - 11- END OF CHAPTER QUIZ

IPv4 Addressing

MODULE-12

IPv4 Issues

What addresses are mapped by ARP?

IPv4 address to a destination MAC address. Topic 9.2.0 - ARP, or the Address Resolution Protocol, works by mapping the IPv4 address to a destination MAC address. The host knows the destination IPv4 address and uses ARP to resolve the corresponding destination MAC address.

Which statement accurately describes a characteristic of IPv4?

IPv4 has a 32-bit address space Topic 8.2.0 - IPv4 has a 32-bit address space, providing 4,294,967,296 unique addresses, but only 3.7 billion are assignable, a limit due to address reservation for multicasting and testing. IPv4 does not provide native support for IPsec. IPv6 has a simplified header with fewer fields than IPv4 has.

MODULE-12

IPv6 Address Types

MODULE - 12 - END OF CHAPTER QUIZ

IPv6 Addressing

Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)

IPv6 addresses are represented by hexadecimal numbers & IPv4 addresses are 32 bits in length Topic 5.2.0 - IPv4 addresses are represented as dotted decimal numbers and are 32 bits in length. IPv6 addresses are represented by hexadecimal numbers and are 128 bits in length.

Which two options are improvements provided by IPv6 as compared to IPv4? (Choose two.)

Increased the IP address space Uses a simpler header to provide improved packet handling There are several technical improvements made to IPv6, two of which are a vastly larger IP address pool and a simplified protocol header.

Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)

International Organization for Standardization (ISO)International Telecommunication Union (ITU) Institute of Electrical and Electronics Engineers (IEEE) Topic 6.1.0 - The IANA is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers. The EIA is an international standards and trade alliance for electronics organizations, and is best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment. IEEE defines open standards and protocols that apply to the network access layer.

What are two services performed by the data link layer of the OSI model? (Choose two.)

It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection. Topic 6.1.0 - The data link layer is responsible for the exchange of frames between nodes over a physical network media. Specifically the data link layer performs two basic services: It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection. Path determination is a service provided at Layer 3. A Layer 2 switch builds a MAC address table as part of its operation, but path determination is not the service that is provided by the data link layer.

Which function or operation is performed by the LLC sublayer?

It communicates with upper protocol layers Topic 7.1.0 - The Ethernet LLC sublayer has the responsibility to handle communication between the upper layers and the lower layers of the protocol stack. The LLC is implemented in software and communicates with the upper layers of the application to transition the packet to the lower layers for delivery.

Which is true of the IPv6 header?

It consists of 40 octets It contains 8 header fields The IPv6 header is a fixed length of 40 octets and contains 8 header fields.

Which statement correctly describes frame encoding?

It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits

What two functions are provided by ARP? (Choose two.)

Maintains a table of IPv4 to MAC address mappings Resolves IPv4 addresses to MAC addresses ARP has two primary functions: maintain a table of IPv4 to MAC address mappings and determine the MAC addresses of known IPv4 addresses.

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It forwards the frame out of all ports except for the port at which the frame was received. Topic 9.2.0 - A Layer 2 switch determines how to handle incoming frames by using its MAC address table. When an incoming frame contains a destination MAC address that is not in the table, the switch forwards the frame out all ports, except for the port on which it was received.

What is one advantage of using fiber optic cabling rather than copper cabling?

It is able to carry signals much farther than copper cabling

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

It is responsible for Media Access Control. It adds a header and trailer to form an OSI Layer 2 PDU. Topic 7.1.0 - The MAC sublayer is the lower of the two data link sublayers and is closest to the physical layer. The two primary functions of the MAC sublayer are to encapsulate the data from the upper layer protocols and to control access to the media.

Which two characteristics describe Ethernet technology? (Choose two.)

It is supported by IEEE 802.3 standards It uses unique MAC addresses to ensure that data is sent to the appropriate destination. Topic 7.1.0 - The 802.3 Ethernet standard specifies that a network implement the CSMA/CD access control method. Each node on the network has a unique MAC address for communication purposes.

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

It sends the frame to all ports except the port on which it received the frame. Topic 9.2.0 - When a Layer 2 switch receives a frame with a broadcast destination address, it floods the frame to all ports except the port on which it received the frame.

What is the purpose of the command ping ::1?

It tests the internal configuration of an IPv6 host. Topic 12.2.0 - The address ::1 is an IPv6 loopback address. Using the command ping ::1 tests the internal IP stack to ensure that it is configured and functioning correctly. It does not test reachability to any external device, nor does it confirm that IPv6 addresses are properly configured on the host.

What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address?

It will discard the frame Topic 7.3.0 - In an Ethernet network, each NIC in the network checks every arriving frame to see if the destination MAC address in the frame matches its own MAC address. If there is no match, the device discards the frame. If there is a match, the NIC passes the frame up to the next OSI layer.

Which type of IPv6 unicast address is not routable between networks?

LLA Link-local IPv6 addresses are for link only communication and are not routable.

What type of IPv6 address begins with fe80?

LLA Link-local IPv6 addresses start with the prefix fe80.

What are the two sublayers of the OSI model data link layer? (Choose two.)

LLC MAC Topic 6.1.0 - The data link layer of the OSI model is divided into two sublayers: the Media Access Control (MAC) sublayer and the Logical Link Control (LLC) sublayer.

Which data link sublayer controls the network interface through software drivers?

LLC The LLC sublayer is responsible for controlling the network interface card through software drivers.

Which data link sublayer works with the upper layers to add application information for delivery of data to higher level protocols?

LLC The LLC works with upper layers to support higher level protocols.

What is another name for the OSI data link layer?

Layer 2 The data link layer is Layer 2 of the OSI model.

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address Topic 9.2.0 - The switch ARP table keeps a mapping of Layer 2 MAC addresses to Layer 3 IP addresses. These mappings can be learned by the switch dynamically through ARP or statically through manual configuration.

Which statement about host forwarding decisions is true?

Local hosts can reach each other without the need of a router A router is not needed to forward packets between local hosts on the network.

The IEEE 802 LAN/MAN data link layer consists of which two sublayers? (Choose two.)

Logical Link Control Media Access Control The data link layer consists of two sublayers. These are Logical Link Control (LLC) and Media Access Control (MAC)

What is true concerning physical and logical topologies?

Logical topologies refer to how a network transfers data between devices Topic 6.2.0 - Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes.

Which topology displays networking device layer IP addresses?

Logical topology The logical topology shows the IP addresses assigned to device interfaces.

What identifier is used at the data link layer to uniquely identify an Ethernet device?

MAC address Topic 6.3.0 - Ethernet frames are identified at the data link layer by their MAC addresses, which are unique to each NIC. IP addresses are used at the network layer, and TCP and UDP port numbers are used at the transport layer. Sequence numbers are fields in TCP headers.

What attribute of a NIC would place it at the data link layer of the OSI model?

MAC address Topic 6.3.0 - The data link layer describes media access and physical addressing. The encoding of a MAC address on a NIC places it at that layer. Ports and cables are placed at the physical layer of the OSI model. IP addresses are placed at the network layer. The TCP/IP protocol stack describes a different model.

Which command can be used to test connectivity between two devices using echo request and echo reply messages?

Ping Topic 13.2.0 - Ping is used to test connectivity between end devices. It can be used with both IPv4 and IPv6. Ping uses the ICMP protocol which issues an echo request/echo reply. The ipconfig command is used at the command line of a Windows computer to display IP addressing information. Netstat is used to display the local routing table.

Which two types of memory buffering techniques are used by switches? (Choose two.)

Port-based memory buffering Shared memory buffering Switches use two memory buffering techniques: Port-based memory buffering and shared memory buffering.

Which part of an Ethernet Frame notifies the receiver to get ready for a new frame?

Preamble The first few bytes of the preamble inform the receiver of a new frame.

Which two statements are correct about private IPv4 addresses? (Choose two.)

Private IPv4 addresses are assigned to devices within an organization's intranet (internal network). Any organization (home, school, office, company) can use the 10.0.0.0/8 address Private IPv4 addresses are assigned to devices within an organization's intranet (internal network) and any organization (home, school, office, company) can use the 10.0.0.0/8 address.

Which field includes common values such as ICMP (1), TCP (6), and UDP (17)?

Protocol The protocol field identifies the upper layer protocol that is carried inside the IP packet. Common protocols are TCP, UDP, and ICMP.

What is the responsibility of the MAC sublayer?

Provides the method to get the frame on and off the media The MAC sublayer of the data link layer is responsible for getting frames on and off the media.

Where is the ARP table stored on a device?

RAM The ARP table is cached temporarily in RAM.

Which router component holds the routing table, ARP cache, and running configuration file?

RAM Topic 9.2.0 - The routing table, ARP cache, and running configuration file are stored in volatile RAM.

Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?

RIRs RIRs receive IP addresses from IANA and are responsible for allocating these addresses to ISPs and some other organizations.

What is one function of the ARP protocol?

Resolving an IPv4 address to a MAC address Topic 9.2.0 - The two main functions of the ARP protocol are to resolve an IPv4 address to a MAC address and to maintain an ARP table, which lists the resolved pairs of IPv4 address and MAC address. A device automatically obtains an IP address through DHCP. The functions of DNS include resolving (or mapping) a domain name with its IP address and maintaining a table for the domain name/IP pairs.

Which two ICMPv6 messages are used in SLAAC?

Router Advertisement Router Solicitation The two ICMPv6 messages used in SLAAC are the router solicitation and the router advertisement.

Which type of ICMPv6 message would a host send to acquire an IPv6 configuration when booting up?

Router Solicitation (RS) message An IPv6-enabled host booting up would send an ICMPv6 router solicitation message. An IPv6-enabled router would respond with a router advertisement message.

An administrator is configuring a new router to permit out-of-band management access. Which set of commands will allow the required login using a password of cisco?

Router(Config)# line console 0 Router(Config-line)# password cisco Router(Config-line)# login Topic 10.1.0 - The VTY lines are the Virtual Terminal lines of the router, used solely to control inbound Telnet connections while console 0 is the physical console port on the switch/router you plug into. The line vty command is used to remote configure access into the switch/router via telnet or ssh.

Which command is used to encrypt all passwords in a router configuration file?

Router_A (config) # service password-encryption Topic 10.1.0 - The command service password-encryption is used to encrypt and secure plain-text passwords configured on a router.

Which of the following counters EMI and RFI by using shielding techniques and special connectors?

STP Shielded twisted pair cable (STP) incorporates shielding and special connectors to prevent signal interference from other wires, EMI, and RFI.

Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table?

Switch Topic 7.3.0 - If a MAC address is found in the MAC address table, then data is sent to the associated switch port. If the MAC address is not found in the MAC address table, the data is sent to all switch ports that have devices attached to the same network.

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

Switch Topic 7.3.0 - Switches are the central connection point for a LAN and they maintain a MAC address table. The MAC address table has a port number associated with a MAC address for each particular device. The switch inspects a frame to look at the destination MAC address. The switch then looks in its MAC address table and if that MAC address is found, the switch forwards the data to the port that is associated with that particular MAC address.

What type of interface has no physical port associated with it?

Switch Virtual Interface (SVI) Switch virtual interfaces (SVIs) are virtual and have no physical port. Layer 2 switches use SVIs for remote management.

Which is true of the IPv6 packet header?

The Hop Limit field replaces the IPv4 Time to Live field. Several fields in the IPv6 header replaced fields in the IPv4 header. For example, the Hop Limit field replaced the IPv4 header Time to Live field.

Which characteristic describes an IPv6 enhancement over IPv4?​

The IPv6 header is simpler than the IPv4 header is, which improves packet handling. Topic 8.3.0 - IPv6 addresses are based on 128-bit hierarchical addressing, and the IPv6 header has been simplified with fewer fields, improving packet handling. IPv6 natively supports authentication and privacy capabilities as opposed to IPv4 that needs additional features to support those. The IPv6 address space is many times bigger than IPv4 address space.

What destination MAC address would be included in a frame sent from a source device to a destination device on the same local network?

The MAC address of the destination device. When sending a frame to another device on the same local network, the device sending the frame will use the MAC address of the destination device.

What destination MAC address would be included in a frame sent from a source device to a destination device on a remote local network?

The MAC address of the local router interface. When sending a frame to another device on a remote network, the device sending the frame will use the MAC address of the local router interface, which is the default gateway.

How does the network layer use the MTU value?

The MTU is passed to the network layer by the data link layer. Topic 8.1.0 - The data link layer indicates to the network layer the MTU for the medium that is being used. The network layer uses that information to determine how large the packet can be when it is forwarded. When packets are received on one medium and forwarded on a medium with a smaller MTU, the network layer device can fragment the packet to accommodate the smaller size.

A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies. What conclusion can be drawn based on this connectivity test?

The TCP/IP Implementation is functional. Topic 13.2.0 - The ping 127.0.0.1 command is used to verify that the TCP/IP stack is functional. It verifies the proper operation of the protocol stack from the network layer to physical layer, without sending a signal on the media. That is, this test does not go beyond the PC itself. For example, it does not detect whether a cable is connected to the PC or not.

What is the definition of bandwidth?

The amount of data that can flow from one place to another in a given amount of time

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM. Topic 10.1.0 - If a router cannot locate the startup-config file in NVRAM it will enter setup mode to allow the configuration to be entered from the console device.

Which default gateway statement is true?

The default gateway address is the IP address of the router on the local network The default gateway is the IP address of a router on the local network.

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device needs mobility when connecting to the network.

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI. Topic 7.2.0 - A MAC address is composed of 6 bytes. The first 3 bytes are used for vendor identification and the last 3 bytes must be assigned a unique value within the same OUI. MAC addresses are implemented in hardware. A NIC needs a MAC address to communicate over the LAN. The IEEE regulates the MAC addresses.

What happens to runt frames received by a Cisco Ethernet switch?

The frame is dropped Topic 7.1.0 - In an attempt to conserve bandwidth and not forward useless frames, Ethernet devices drop frames that are considered to be runt (less than 64 bytes) or jumbo (greater than 1500 bytes) frames.

A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion?

The microwave oven & the cellular phones that are used by the employees

What statement describes a characteristic of MAC addresses?

The must be globally unique Topic 7.2.0 - Any vendor selling Ethernet devices must register with the IEEE to ensure the vendor is assigned a unique 24-bit code, which becomes the first 24 bits of the MAC address. The last 24 bits of the MAC address are generated per hardware device. This helps to ensure globally unique addresses for each Ethernet device.

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

The packet will be sent directly to the destination host. Topic 8.4.0 - If the destination host is in the same LAN as the source host, there is no need for a default gateway. A default gateway is needed if a packet needs to be sent outside the LAN.

Which statement is true about variable-length subnet masking?

The size of each subnet may be different, depending on requirements. Topic 11.8.0 - In variable-length subnet masking, bits are borrowed to create subnets. Additional bits may be borrowed to create additional subnets within the original subnets. This may continue until there are no bits available to borrow.

What addressing information is recorded by a switch to build its MAC address table?

The source Layer 2 address of incoming frames Topic 7.3.0 - A switch builds a MAC address table by inspecting incoming Layer 2 frames and recording the source MAC address found in the frame header. The discovered and recorded MAC address is then associated with the port used to receive the frame.

Which statement is correct about IPv4 packet header fields?

The source and destination IPv4 addresses remain the same while traveling from source to destination. The source and destination IP addresses in the IP packet do not change in route from source to destination.

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?

The use of full-duplex capable Layer 2 switches Topic 6.2.0 - The use of Layer 2 switches operating in full-duplex mode eliminates collisions, thereby eliminating the need for CSMA/CD.

Why are two strands of fiber used for a single fiber optic connection?

They allow for full-duplex connectivity

Which is a characteristic of static routes?

They are manually configured Static routes are manually configured and do not adjust to changes in the network topology and are not advertised to neighboring routers.

What are two functions of end devices on a network? (Choose two.)

They are the interface between humans and the communication network. They originate the data that flows through the network.

A PC is configured to obtain an IPv4 address automatically from network 192.168.1.0/24. The network administrator issues the arp -a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

This is a static map entry Topic 9.2.0 - The IPv4 address of 192.168.1.255 on the 192.168.1.0/24 network is the broadcast address, which is statically mapped to ff-ff-ff-ff-ff-ff in the ARP table.

Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?

Time Exceeded Topic 13.1.0 - Traceroute progressively increments the TTL (IPv4) or hop limit (IPv6) field (1, 2, 3, 4...) for sending sequence of ping commands. When a router senses that the TTL or hop limit is 0, it will discard the packet and send a time exceeded message to the source of the traceroute. The returned message contains the IP address of the router that discarded the packet. Hence the traceroute utility learns the address of the router. This process continues and provides the trace with the address of each hop (router) as the packets continue traveling through routers to reach the destination.

Which two statements are correct about public IPv4 addresses? (Choose two.)

To access a device over the internet, the destination IPv4 address must be a public address. Public IPv4 address exhaustion is a reason why there are private IPv4 address and why organizations are transitioning to IPv6.

What is the function of the last field in a data link layer frame?

To determine whether the frame experienced transmission errors The last field in the data link frame is the frame check sequence (FCS) which is used to determine if the frame has experienced transmission errors.

Which is a function of the Logical Link Control (LLC) sublayer?

To identify which network layer protocol is being used Topic 6.1.0 - Defining the media access processes that are performed by the hardware and providing data link layer addressing are functions of the MAC sublayer. The data link layer accepts Layer 3 packets and packages them into data units that are called frames.

Which of the following wireless standards is best suited for industrial and IoT environments?

Zigbee Zigbee is intended for applications that require short-range, low data-rates, and long battery life, making it well suited for industrial and IoT applications.

A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?

Tracert Topic 13.2.0 - The ping command is used to verify connectivity to a device, the commands ipconfig /flushdns will cause the adapter to flush the DNS cache, while ipconfig /*displaydns* will result in the display of the DNS information in the cache.

What is a function of the tracert command that differs from the ping command when they are used on a workstation?

Tracert shows the information of routers in the path Topic 13.2.0 - The tracert command sends three pings to each hop (router) in the path toward the destination and displays the domain name and IP address of hops from their responses. Because tracert uses the ping command, the travel time is the same as a standalone ping command. The primary function of a standalone ping command is to test the connectivity between two hosts.

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

Transport

True or False: 4 out of 5 RIRs no longer have enough IPv4 addresses to allocate to customers on a regular basis.

True The correct answer is True. Four of the five RIRs, ARIN, APNIC, LACNIC, and RIPENCC have exhausted their IPv4 address pools. Only AfriNIC has remaining IPv4 address space to allocate to customers.

True or False? IPv6 was designed with subnetting in mind.

True The correct answer is True. IPv6 has a separate subnet ID field in the network prefix portion of the address that can be used to create subnets.

True or False? A router can be configured with a combination of both static routes and a dynamic routing protocol.

True The correct answer is True. Routers can be configured with static routes and with a dynamic routing protocol.

Which procedure is used to reduce the effect of crosstalk in copper cables?

Twisting opposing circuit wire pairs together

MODULE 11.3.8 QUIZ

Types of IPV4 Addresses

Which of the following is the most common network media?

UTP Unshielded twisted pair cable (UTP) is the most common type of wired network media.

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host. Topic 8.1.0 - When connectionless protocols are in use at a lower layer of the OSI model, upper-level protocols may need to work together on the sending and receiving hosts to account for and retransmit lost data. In some cases, this is not necessary, because for some applications a certain amount of data loss is tolerable.

What is the default SVI on a Cisco switch?

VLAN1

What kind of network would use point-to-point, hub and spoke, or mesh topologies?

WAN Wide Area Networks (WANs) come in many topologies, to include point-to-point, hub-and-spoke, and mesh.

What are three parts of an IPv6 global unicast address? (Choose three.)

a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP a subnet a subnet ID that is used to identify networks inside of the local enterprise site an interface ID that is used to identify the local host on the network Topic 12.3.0 - There are three elements that make up an IPv6 global unicast address. A global routing prefix which is provided by an ISP, a subnet ID which is determined by the organization, and an interface ID which uniquely identifies the interface interface of a host.

A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task?

any line configuration mode Topic 10.1.0 - The command login is used to allow access to a router or switch through aux lines, console lines, and Telnet lines.

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?

arp -a Topic 9.2.0 - ARP is a protocol used with IPv4 to map a MAC address to an associated specific IP address. The command arp -a will display the MAC address table on a Windows PC.

Which of these is the name for the capacity of a medium to carry data?

bandwidth Bandwidth is the capacity of a network medium to carry data.

Which delivery method does not guarantee that the packet will be delivered fully without errors?

best effort Best effort delivery does not guarantee packets will be delivered to the destination.

What type of communication will send a message to all devices on a local area network?

broadcast

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast

Which address type is not supported in IPv6?

broadcast Topic 12.3.0 - IPv6 supports unicast, private, and multicast addresses but does not support Layer 3 broadcasts.

What is a characteristic of UTP cabling?

cancellation

Which of the following terminates with BNC, N type and F type connectors?

coaxial Coaxial cable, which is used for cable TV and internet service and to attach antennas to wireless devices, uses several types of connectors to include BNC, N type, and F type connectors.

Which of the following attaches antennas to wireless devices? It can also be bundled with fiber-optic cabling for two-way data transmission.

coaxial Coaxial cable, which is used for cable TV and internet service, is also used to attach antennas to wireless devices.

Which media uses electrical pulses to represent bits?

copper Electrical pulses are used to represent bits on networks using copper cable media.

The physical layer of the receiving device passes bits up to which higher level layer?

data link The physical layer receives frames from the data-link layer and converts it to bits for transmission. On the sending device the physical layer passes the transmitted bits up to the data link layer as a complete frame.

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

data link Topic 6.3.0 - Encapsulation is a function of the data link layer. Different media types require different data link layer encapsulation.

Which layer is responsible for taking an IP packet and preparing it for transmission over the communications medium?

data link layer The data link layer receives IP packets from the network layer and encapsulates them for transmission over the medium.

What process is used to receive transmitted data and convert it into a readable message?

decoding

This type of route is also known as a gateway of last resort.

default route A default route is also known as a gateway of last resort.

What is the most important motivating factor for moving to IPv6?

depletion of IPv4 addresses The main driver or most important factor for IPv6 is the depletion of the IPv4 address space.

Which logical address is used for delivery of data to a remote network?

destination IP address

Which information is used by routers to forward a data packet toward its destination?

destination IP address Topic 8.4.0 - The destination IP address is the IP address for the receiving device. This IP address is used by routers to forward the packet to its destination.

Which IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14?

dotted decimal Topic 5.1.0 - For ease of use by people, binary patterns are represented as dotted decimal. Computer systems were created to understand binary addressing.

What is the structure of an IPv4 address called?

dotted-decimal format IPv4 addresses are written in dotted-decimal format. For example: 192.168.1.1.

Which of the following techniques use native IPv6 connectivity?

dual stack Only dual stack uses native IPv6 connectivity.

Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?

enable secret trustknow1 Topic 10.1.0 - The command service password-encryption is used to encrypt and secure plain-text passwords configured on a router

What process is used to place one message inside another message for transfer from the source to the destination?

encapsulation

Which is a valid hexadecimal number?

f Topic 5.2.0 - The hexadecimal numbers are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.. The hexadecimal number 0 represents 0 in decimal and is represented as 0000 in binary. The hexadecimal number f represents 15 in decimal .

True or false. Wireless LANs operate in full-duplex allowing all devices to send or receive data at the same time so the number of users does not impact performance.

false The correct answer is False. WLANs operate in half-duplex, which means only one device can send or receive at a time. This can impact network performance if there are many users accessing the WLAN at the same time.

True or false. Wireless is not well suited for enterprise networks.

false The correct answer is False. Wireless provides the greatest mobility of all media and is gaining popularity in enterprise networks.

Which media uses patterns of light to represent bits?

fiber-optic Fiber-optic cables use patterns of light to represent bits.

What is the term for splitting up an IP packet when forwarding it from one medium to another medium with a smaller MTU?

fragmentation Fragmentation is the process of splitting up IP packets to travel over a medium with a smaller MTU.

What PDU is received by the physical layer for encoding and transmission?

frame The physical layer receives frames from the data link layer for encoding and transmission.

What does the IP address 172.17.4.250/24 represent?

host address Topic 11.1.0 - The /24 shows that the network address is 172.17.4.0. The broadcast address for this network would be 172.17.4.255. Useable host addresses for this network are 172.17.4.1 through 172.17.4.254.

What is done to an IP packet before it is transmitted over the physical medium?

it is encapsulated in a Layer 2 frame.

Which two things can be determined by using the ping command? (Choose two.)

the destination device is reachable through the network the average time it takes a packet to reach the destination and for response to return to the source Topic 13.2.0 - A ping command provides feedback on the time between when an echo request was sent to a remote host and when the echo reply was received. This can be a measure of network performance. A successful ping also indicates that the destination host was reachable through the network.

Which characteristic describes crosstalk?

the distortion of the transmitted messages from signals carried in adjacent wires

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

the hostname should be fewer than 64 characters in length the hostname should contain no spaces the hostname should begin with a letter

Which characteristic describes the default gateway of a host computer?

the logical address of the router interface on the same network as the host computer Topic 10.3.0 - The default gateway is the IP address of an interface on the router on the same network as the sending host.

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

What is stored in the NVRAM of a Cisco router?

the startup configuration Topic 10.1.0 - The Cisco IOS is stored in flash.The running configuration file is stored in RAM.The bootup instructions are stored in ROM.The startup configuration file is stored in NVRAM.

Which of these is a measure of the transfer of bits across the media?

throughput The transfer of bits across the network media over a period of time is known as throughput.

What is the purpose of the startup configuration file on a Cisco router?

to contain the commands that are used to initially configure a router on startup Topic 10.1.0 - The startup configuration file is stored in NVRAM and contains the commands needed to initially configure a router. It also creates the running configuration file that is stored in in RAM.

In computer communication, what is the purpose of message encoding?

to convert information to the appropriate form for transmission

How does the ARP process use an IPv4 address?

to determine the MAC address of a device on the same network Topic 9.1.0 - The ARP process is used to complete the necessary mapping of IPv4 and MAC addresses that are stored in the ARP table that is maintained by each node on a LAN. When the destination device is not on the same network as the source device, the MAC address of the Layer 3 device on the the source network is discovered and added to the ARP table of the source node.

What is the purpose of the subnet mask in conjunction with an IP address?

to determine the subnet to which the host belongs Topic 11.1.0 - With the IPv4 address, a subnet mask is also necessary. A subnet mask is a special type of IPv4 address that coupled with the IP address determines the subnet of which the device is a member. ​

What is the minimum configuration for a router interface that is enabled for IPv6?

to have a link-local IPv6 address Topic 12.3.0 - With IPv6, a router interface typically has more than one IPv6 address. The router will at least have a link-local address that can be automatically generated, but the router commonly has an global unicast address also configured.

Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?

to identify the network address of the destination network Topic 11.1.0 - ANDing allows us to identify the network address from the IP address and the network mask.

What is the purpose of ARP in an IPv4 network?

to obtain a specific MAC address when an IP address is known Topic 9.2.0 - ARP performs two functions: To obtain a specific MAC address when an IP address is known, by broadcasting an ARP request message to all devices on a particular Ethernet network To use the gathered information to create a viewable table of IP address to MAC address mappings

What was the reason for the creation and implementation of IPv6?

to relieve IPv4 address depletion Topic 8.3.0 - IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from the 32 bits to 128 bits, which should provide sufficient addresses for future Internet growth needs for many years to come.

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?

to test that the host has the capability to reach hosts on other network. Topic 13.2.0 - The ping command is used to test connectivity between hosts. The other options describe tasks not performed by ping. Pinging the default gateway will test whether the host has the capability to reach hosts on its own network and on other networks.

What is the purpose of the sequencing function in network communication?

to uniquely label transmitted segments of data for proper reassembly by the receiver Sequencing uniquely identifies or labels each transmitted segment with a sequence number that is used by the receiver to reassemble the segments in the proper order.

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?

traceroute Topic 13.2.0 - The traceroute command provides connectivity information about the path a packet takes to reach the destination and about every router (hop) along the way. It also indicates how long a packet takes to get from the source to each hop and back.

What is the purpose of the OSI physical layer?

transmitting bits across the local media

Which OSI layer sends segments to be encapsulated in an IPv4 or IPv6 packet?

transport layer Transport layer PDUs, called segments, are encapsulated at the network layer by IPv4 and IPv6 into packets.

Which media uses patterns of microwaves to represent bits?

wireless In wireless networks data is represented by patterns of microwave transmissions.

Which functionality is provided by DHCP?

automatic assignment of an IP address to each host

Which is the command to configure a banner to be displayed when connecting to a switch?

banner motd $Keep Out$ The command to set a banner stating "Keep out" that will be displayed when connection to a Cisco switch is Switch(config)# banner motd $ Keep out $

Which protocol stack layer encapsulates data into frames?

data link The data link layer encapsulates data into a frame.

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

displaying a list of all available commands within the current mode determining which option, keyword, or arguments is available for the entered command

Why would a technician enter the command copy startup-config running-config?

to copy an existing configuration into RAM

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?

Console Because a new switch would not have any initial configurations, it could only be configured through the console port.

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?

Console Connecting a computer to a Cisco device through the console port requires a special console cable.

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data?

Extranet

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Extranet

What is the name of the process of adding protocol information to data as it moves down the protocol stack?

Encapsulation As data moves down the protocol stack, protocol data is added to the original data. This process is known as encapsulation.

What is the process of converting information into the proper form for transmission?

Encoding

Which protocol operates at the network access layer of the TCP/IP model?

Ethernet Ethernet is a network access layer protocol.

Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)

ICMPv4 ICMPv6 ICMPv4 and ICMPv6 provide feedback when errors occur.

Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.)

Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits. Data link layer addresses are physical and network layer addresses are logical. Network layer addresses are either 32 or 128 bits in length MAC addresses are physical addresses and 48 bits or 12 hex digits in length. IPv4 addresses and IPv6 addresses are logical. IPv4 addresses are 32 bits and IPv6 addresses are 128 bits.

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

Which two statements are true regarding the user EXEC mode? (Choose two.)

The device prompt for this mode ends with the ">" symbol &Only some aspects of the router configuration can be viewed

True or false. Standards organizations are usually vendor-neutral.

True The correct answer is True. Most standards organizations are vendor-neutral, non-profit organizations that develop and promote open standards.

Which IOS mode are you in if the Switch> prompt is displayed?

User EXEC mode (or view-only mode) The > prompt after the device name identifies user EXEC mode.

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

Video Communications

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

Zero-day or Zero-hour

Which device performs the function of determining the path that messages should take through internetworks?

a router

What types of standards are developed by the Electronics Industries Alliance (EIA)?

electric wiring and connectors The Electronics Industries Alliance (EIA) develops standards related to electrical wiring, connectors, and network equipment racks.

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

fault tolerance

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

scalability

What is the process of dividing a large data stream into smaller pieces prior to transmission?

segmentation Segmentation is the process of dividing a large data stream into smaller pieces which are then transmitted to the receiver.


Conjuntos de estudio relacionados

Starting out with C++ Chapter 4 Quiz

View Set

Catcher in the Rye. Chapter 1-7 quiz

View Set

Chapter 11: Diseases and Conditions of the Urinary System

View Set

Medical Terminology, Module 5 Exercise 22

View Set

Chapter 1 Introduction to Information Security

View Set