Unit 1 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

How is Cisco IOS commonly used for configuring and managing network devices?

By executing commands in the command-line interface (CLI).

What are the functions of a router in network topology?

Forwarding packets between different networks, determining the best path for data transmission, implementing network security measures

True or False In Cisco ACLs (Access Control Lists), the order in which access control entries (ACEs) are applied matters, with ACEs evaluated from top to bottom, and the first matching ACE determining the action for the traffic.

True

With CIDR notation, IP addresses are allowed to use any subnet mask, regardless of predefined classes.

True

What is the binary equivalent of the hexadecimal number AF?

10101111

Which statement represents the binary equivalent of the hexadecimal number AF?

10101111

Complete the sentence. An IPv4 address consists of ___________.

32 bits divided into four octets

How many bits would the network portion need to "borrow" from the host portion in order to create 16 new sub-networks?

4 host bits

HTTP uses logical port __ while __ uses logical port 443. SSH uses logical port __ while __ uses logical port 445.

80, HTTPS, 22, SMB

What is a broadcast domain in networking?

A broadcast domain is a network area in which devices can communicate with each other without any restrictions

What best describes Variable Length Subnet Mask (VLSM)?

A method for assigning IP addresses to devices that allow different subnets to have different subnet masks depending on their size.

What is a network topology?

A network topology describes the structure of a network and represents all the connections between all components in a network.

What definition best describes "binary"?

A numbering system with a base of 2, using digits 0 and 1.

What is an ACL (Access Control List)?

A series of commands used to filter network traffic based on packet header information.

What are the differences between straight-through and crossover Ethernet cable configurations?

A straight-through Ethernet cable is used to connect devices of different types, such as a computer to a switch or a router to a modem, while a crossover Ethernet cable is used to connect devices of the same type, such as a computer to a computer or a switch to a switch.

Which statement about Access Control Lists (ACLs) is correct?

ACEs in an ACL represent the order of statements and are essential for proper ACL functioning.

What are the advantages of configuring an Access Control List (ACL) on a network device?

Allowing only relevant services to communicate across the network.

Which statement best describes how IP addresses and subnet masks work together?

An IP address and subnet mask work together to determine the network and host portions of an IP address.

What best differentiates between the various applications of access control lists (ACLs)?

Application 1: Filtering network traffic based on IP addresses; Application 2: Controlling access to network devices.

How can network traffic be analyzed using Wireshark?

By capturing and examining network packets in real-time.

Describe the associated codes for directly connected devices in a routing table.

C

What is the best definition for Classless Inter-Domain Routing (CIDR) notation?

CIDR is a class-based system that uses different ranges of bits for subnets.

Which statement best describes a benefit of DHCP in network management, performance, and security?

Centralized IP address management. Efficient utilization of IP address space. Better control over network resources through lease duration control and IP address reservation.

What is the process of configuring and verifying a standard access control list (ACL) on a router?

Configure the ACL by defining permit or deny statements based on IP addresses and verify its effectiveness through monitoring network traffic.

What is the DHCP protocol used for in computer networking?

DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to devices on a network.

Which statement best describes the purpose of DHCP and its benefits in network configuration?

DHCP allows for the automatic and dynamic allocation of IP addresses, simplifying network administration and reducing configuration errors.

What are the principles of access control list (ACL)?

Determine the actions and permissions allowed on resources.

Which trunking protocols are used in computer networking? Select all that apply

Dynamic Trunking Protocol (DTP), Inter-Switch Link (ISL)

How do the various versions and releases of the Cisco IOS differ?

Each release of Cisco IOS introduces new features and enhancements to improve performance and functionality.

What are the advantages of wireless networks?

Easy mobility, reduced cabling costs, and flexibility in device placement.

CIDR is used to further subnet and subnet while VLSM is only concerned with preserving IP addresses.

False

True or False In a 3-tier architecture, the core layer handles routing and switching functions, while the distribution layer handles access control and security functions, and the access layer handles end device connectivity. In a collapsed architecture, all these functions are combined into a single layer.

False

True or False The IPs 192.168.2.3/24 and 192.61.123.1/24 are in the same subnet.

False

True or False The TCP protocol is an unreliable transport protocol that does not guarantee delivery of data, does not perform flow control or error checking, is suitable for applications that prioritize speed and efficiency such as real-time streaming and online gaming. On the other hand, the UDP protocol is a reliable transport protocol that guarantees delivery of data, establishes a connection-oriented communication, performs flow control and error checking, and is suitable for applications that require accurate data delivery such as web browsing and file transfer.

False

What is the primary function of a router in network topology?

Filtering and forwarding network traffic.

What best evaluates the benefits and limitations of using access control lists (ACLs) as a tool for network compartmentalization and access control?

Fine-grained control over network traffic; Limitations: Scalability challenges for large networks.

Which mode in Cisco IOS allows users to modify the device configuration?

Global Configuration mode

What is the difference between half duplex and full duplex communication in networking?

Half duplex communication restricts data transmission to one direction at a time, while full duplex communication allows data to be transmitted in both directions simultaneously.

What is an advantage of using hexadecimal over binary?

Hexadecimal notation allows for a more compact representation of binary data.

Which devices are most commonly used in layer 1?

Hubs and Repeaters

What are the key characteristics of the IPv6 protocol?

IPv6 addresses are 128 bits long and are represented in hexadecimal notation.

What is the structure of IPv6 addresses?

IPv6 addresses consist of eight groups of four hexadecimal digits separated by colons.

What is the benefit of network address translation (NAT)?

Improved network security, Efficient use of IP addresses, Simplified network management.

What are the advantages of remote management in network devices?

Improved physical security and reduced risk of unauthorized access, increased efficiency and convenience when managing network devices from a remote location, enhanced troubleshooting capabilities and faster resolution of network issues.

What is the structure and format of MAC addresses?

MAC addresses consist of six groups of eight hexadecimal digits.

Which of the following best describes the Transport layer in the OSI model?

Manages end-to-end communication between applications.

Which statement best describes the process of how NAT (Network Address Translation) works?

NAT translates IP addresses from private to public for internet connectivity.

Which statement accurately compares and contrasts NTP with other time synchronization protocols?

NTP and PTP are both designed for high-precision time synchronization, while SNTP is a simplified version of NTP.

Which statement accurately describes a key feature of the NTP?

NTP is designed to synchronize the time across devices in a network to ensure accurate timekeeping.

VLANs help improve_______ by implementing access control policies and firewall rules between VLANs, they help ____________by aiding in network troubleshooting, and they help_________ by enabling QoS policies.

Network security, Network management, Network performance

VLANs help improve______by implementing access control policies and firewall rules between VLANs, they help_______by aiding in network troubleshooting, and they help________by enabling QoS policies.

Network security, Network management, Network performance

Which statement is not a feature of Trunk mode on a switch interface?

Only carries traffic on the VLAN to which the traffic belongs.

What is the difference between physical and logical addresses in networking?

Physical addresses are unique identifiers assigned to devices at the data link layer of the OSI model, while logical addresses are unique identifiers assigned to devices at the network layer of the OSI model.

What are the three violation modes in Cisco switches and their corresponding actions?

Protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts.

In a scenario involving a port security violation, which violation mode and recovery action would be most appropriate?

Protect mode with a recovery action of disabling the port.

What is the operation or function of layer 3 (the network layer)?

Responsible for the organization of data into packets with an IP source and destination for routing.

What is the concept of routing and the purpose of a routing table in the routing process?

Routing is the process of determining the optimal path for data packets to reach their destinations and the routing table is used to store network addresses and associated next hop information.

Which statement best describes the concept of routing and the purpose of a routing table in the routing process?

Routing is the process of forwarding data packets between different networks.

Which statement accurately compares and contrasts Telnet and SSH?

SSH is more secure than Telnet as it encrypts data and provides secure remote access.

In a scenario involving a port security violation, which violation mode and recovery action would be appropriate?

Shutdown mode and manual recovery.

Extended access control lists (ACLs) filter packets based on which attributes?

Source and destination IP addresses Source and destination Layer 4 protocols (UDP and TCP) Protocol type or number, e.g., IP, HTTPS, 80, etc.

Which statement best differentiates between the various types of NAT?

Static NAT allows for a one-to-one mapping of private IP addresses to public IP addresses, while dynamic NAT allows for a one-to-many mapping.

Which statements accurately describe the router-on-a-stick method and the function of sub-interfaces?

Sub-interfaces facilitate inter-VLAN communication by tagging incoming frames with appropriate VLAN IDs. Sub-interfaces allow a single physical interface to be logically divided into multiple virtual interfaces, enabling routing between VLANs.

What is not a reason for subnetting a large network?

Subnetting increases the size of the network and network traffic, allowing more packets to be delivered.

Which statement accurately describes the purpose of switches in a LAN?

Switches provide interconnectivity between devices within a LAN.

Which statement best explains the significance of using the Syslog standard for monitoring and troubleshooting computer networks and systems?

Syslog enables real-time monitoring of network devices and systems.

How does the Syslog standard implementation in Cisco IOS contribute to network monitoring and logging?

Syslog in Cisco IOS offers a centralized logging system for storing system events and facilitating monitoring of network activities.

Which statement best describes the role of the Syslog standard in monitoring computer, network, and security systems?

Syslog provides a centralized logging system for storing system events and facilitating monitoring of computer, network, and security systems.

Why are testing and verifying extended ACL configurations considered crucial in network environments?

Testing and verifying extended ACL configurations are essential for identifying and resolving misconfigurations or errors.

What are the key features and functions of the Cisco IOS?

The Cisco IOS supports multiple routing protocols, such as OSPF and EIGRP, for efficient network routing.

Which statement best describes the NTP stratum model and its responsibility?

The NTP stratum model is a hierarchical system that ranks time servers based on their accuracy and reliability. It ensures that time synchronization is maintained across all devices on the network.

What is a limitation of the IPv4 address space?

The maximum size of an IPv4 address is 32 bits, which limits the number of unique addresses that can be assigned.

What is the purpose of a standard Access Control List (ACL) and what are its limitations?

The purpose of a standard ACL is to control access to specific network services and resources based on the source IP address. Its limitations include the inability to filter traffic based on destination IP addresses and port numbers.

What is the purpose and function of MAC addresses in computer networking?

They provide a unique identifier for devices on a network.

What is the benefit of using Wireshark as a troubleshooting tool in computer networks?

To analyze and capture network packets for troubleshooting purposes.

How is software sniffing commonly used in computer networks?

To capture and analyze network traffic.

What is the primary purpose of Trunk mode in switch interface configurations?

To enable communication between multiple switches.

What is the purpose of port security in Cisco switches?

To protect physical ports from unauthorized access and ensure secure communication within the network.

Which statement best describes the primary uses of NAT (Network Address Translation)?

To translate private IP addresses to public IP addresses for internet connectivity.

A trunk port is a type of port on a network switch that is configured to carry traffic for multiple VLANs.

True

Each layer of the OSI model plays a crucial role in the network communication process and is important for enabling communication between devices.

True

IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses.

True

Subnetting makes the network more efficient by dividing the network into smaller, interconnected networks which helps to minimize network traffic.

True

True or False Cisco IOS analyzes the device's logging and debugging output for any indications of errors or abnormal behavior.

True

True or False Dynamic IP addressing adapts to network changes automatically, while static IP addressing requires manual reconfiguration.

True

True or False The OSI model has 7 layers, while the TCP/IP model has 4 layers. The OSI model provides a standard reference model for network communication, while the TCP/IP model is a protocol suite used for internet communication.

True

True or False The layered approach of the OSI model facilitates understanding and troubleshooting of network communication issues by allowing identification of the devices used at each layer, which aids in diagnosing problems and implementing solutions.

True

In what ways do VLANs enhance network performance and optimize bandwidth allocation in computer networks?

VLANs allow network administrators to segment network traffic into logical groups, which may facilitate improved network performance and efficient bandwidth utilization.

Which network spans across a large geographic area and is managed by multiple service providers?

WAN

What are the three main logical port groups?

Well-known ports, Registered ports, and Dynamic/Private ports.

What are Wildcards in the context of Access Control Lists (ACLs)?

Wildcards are used to define the range of IP addresses allowed in both Extended and Standard ACLs.

Fill in the blank to describe the process for configuring an extended ACL. Define the criteria for ___________, including source and destination IP addresses. Specify the ____________to be filtered, such as TCP, UDP, or ICMP. Determine the actions to be taken for matching traffic, such as permit or ______. Establish the sequence or order of ACL ________. Apply the ACL to the appropriate ___________ on the router.

filtering, protocol(s), deny, rules, interface(s)


Conjuntos de estudio relacionados

😔😴 Test - Unit 4 Monetary Policy 👅🍑🙊 hehe

View Set

Persuasive Speech: Preparation Outline

View Set

Prep U: Ch 54- Management of Patients With Kidney Disorders

View Set

1.4 Rates of Change and Tangent Lines

View Set