CT210 Mid term

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?

64 bytes

What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)

64 bytes 1518 bytes

What is an advantage of network devices using open standard protocols?

A client host and a server running different operating systems can successfully exchange data.

Which statement describes the use of powerline networking technology?

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

Which statement describes a characteristic of cloud computing?

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?

BYOD

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

DHCP DNS FTP

Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)

DSL cable

Which statement describes an extended star topology?

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF

What is a characteristic of port-based memory buffering?

Frames are buffered in queues linked to specific ports.

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, TCP, IP, Ethernet

Which two statements describe intermediary devices? (Choose two.)

Intermediary devices direct the path of the data. Intermediary devices connect individual hosts to the network.

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Issue the reload command without saving the running configuration.

What are two services performed by the data link layer of the OSI model? (Choose two.)

It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection.

What statement describes Ethernet?

It defines the most common LAN type in the world.

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

What is one advantage of using fiber optic cabling rather than copper cabling?

It is able to carry signals much farther than copper cabling.

What is the Internet?

It provides connections through interconnected global networks.

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)

Logical link control is implemented in software. the upper layers of the protocol suite.

What is true concerning physical and logical topologies?

Logical topologies refer to how a network transfers data between devices.*

What are two potential network problems that can result from ARP operation? (Choose two.)

On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully.

Which type of connector does a network interface card use?

RJ-45

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

RM-3-Switch-2A4 SwBranch799

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

SSH

Which statement is true about the TCP/IP and OSI models?

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI.

What happens to runt frames received by a Cisco Ethernet switch?

The frame is dropped.

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts in other networks.

What is the function of the kernel of an operating software?

The kernel provisions hardware resources to meet software requirements.

As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?

The transmitting node inserts start and stop bits into the frame.

Why are two strands of fiber used for a single fiber optic connection?

They allow for full-duplex connectivity.

Which statement is correct about network protocols?

They define how messages are exchanged between the source and the destination.

What statement describes a characteristic of MAC addresses?

They must be globally unique.

What are two functions of end devices on a network? (Choose two.)

They originate the data that flows through the network. They are the interface between humans and the communication network.

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Use the console port to locally access the switch from a serial or USB interface of the PC.

What is auto-MDIX?

a feature that detects Ethernet cable type

Which expression accurately defines the term bandwidth?

a measure of the data carrying capacity of the media

Which device performs the function of determining the path that messages should take through internetworks?

a router

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

an intranet

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

application presentation session

What type of communication will send a message to all devices on a local area network?

broadcast

What security violation would cause the most amount of damage to the life of a home user?

capturing of personal data that leads to identity theft

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

cellular satellite

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

congestion

A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?

data confidentiality

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

data link

Which address does a NIC use when deciding whether to accept a frame?

destination MAC address

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

displaying a list of all available commands within the current mode determining which option, keyword, or argument is available for the entered command*

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

easy to create lacks centralized administration less cost to implement

What process is used to place one message inside another message for transfer from the source to the destination?

encapsulation

What is contained in the trailer of a data-link frame?

error detection

Use the console port to locally access the switch from a serial or USB interface of the PC.

exit

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

flow control

Which PDU format is used when bits are received from the network medium by the NIC of a host?

frame

Which method of data transfer allows information to be sent and received at the same time?

full duplex

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

implementing a firewall installing antivirus software

What is a characteristic of a converged network?

it delivers data, voice, and video over the same network infrastructure

At which layer of the OSI model would a logical address be encapsulated?

network layer

What are proprietary protocols?

protocols developed by organizations who have control over their definition and operation

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

security interference coverage area

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

segment

Which switching method uses the CRC value in a frame?

store-and-forward

What type of network must a home user access in order to do online shopping?

the Internet

What is the definition of bandwidth?

the amount of data that can flow from one place to another in a given amount of time

Which information does the show startup-config command display?

the contents of the saved configuration file in the NVRAM

What two criteria are used to help select a network medium from various network media? (Choose two.)

the distance the selected medium can successfully carry a signal he environment where the selected medium is to be installed

Which characteristic describes crosstalk?

the distortion of the transmitted messages from signals carried in adjacent wires

Which characteristic describes the default gateway of a host computer?

the logical address of the router interface on the same network as the host computer

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

What addressing information is recorded by a switch to build its MAC address table?

the source Layer 2 address of incoming frames

What is the aim of an ARP spoofing attack?

to associate IP addresses to the wrong MAC address

What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)

to distinguish data bits from control bits to identify where the frame starts and ends

Why is it important to configure a hostname on a device?

to identify the device during remote access (SSH or telnet)

What is a role of the Logical Link Control sublayer?

to mark frames to identify the network layer protocol being carried

What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs

A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode

What type of network traffic requires QoS?

video conferencing


Kaugnay na mga set ng pag-aaral

Chapter 11: The South, Slavery, and King Cotton

View Set

Nutrition: Science and Applications 4e Chapters 1 - 7; 13 - 18; and Focus on Eating Disorders: Test Questions

View Set

CHAPTER 20 Nursing Care of the Child With an Alteration in Bowel Elimination/ Gastrointestinal Disorder

View Set

Psyc Chapter 5, psych ch. 5-8, test 2

View Set