IST 201 test 2
Describe the running configuration file in Cisco IOS devices: (Select all answers that apply.) 2.2.3.1 Save the Running Configuration File
. viewable in privileged EXEC mode b. modifying it affects the operation of a Cisco device immediately c. reflects the current configuration applied to a Cisco IOS device.
Place the seven fields of an Etherent Frame in order:
1. Preamble 2. Start of Frame Delimiter 3. Destination MAC Address 4. Source MAC Address 5. Length 6. Data (encapsulated) 7. Frame Check Sequence
The Subnet 255.255.254.0 can be represented with WHAT binary code? (fill in each blank with the appropriate octet binary code) [1st_octet] . [2nd_octet] . [3rd_octet] . [4th_octet] ________ . _________ . _________ . _________
11111111.11111111.11111110.00000000
The hexadecimal number 10 converts to _____ in decimal. (type number)
16
What is the last host address for the network 172.25.0.64/26? Hint: see below to figure out the last host address. subnet mask /26 --> 11111111.11111111.11111111.11000000 There are 6 host bits in the subnet mask. network address 172.25.0.64 .01000000 In the network address, all host bits are zeros 1st host address 172.25.0.65 .01000001 last host address .01111110 broadcast address .01111111 In the broadcast address, all host bits are ones
172.25.0.126
The first ______ bits of a MAC address structure are used by the vendor assigned OUI.
24
The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 20 Mb/s for the same time period. The goodput for this network is ____ Mb/s
60
How many usable host addresses are there in the subnet 192.168.1.32/26? (give answer as number) Hint: /26 --> 11111111.11111111.11111111.11000000 Find the number of host bits (n) in the subnet mask? Then use this formula , to find the No. of usable host address = 2n-2
62
Ethernet [a] is the most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router Ethernet [b] is an uncommon cable used to interconnect similar devices together. For example to connect a switch to a switch, a host to a host, or a router to a router. [c] is a Cisco proprietary cable used to connect to a router or switch console port.
A: Straight-through B: crossover C: rollover
To create a banner message of the day on a network device, use the ______[a]______ # the message of the day # global config command. The "#" in the command syntax is called the ____[b]____ character and can be any character as long as it does not occur in the message
A: banner motd B: delimiting
In [a] switching, the switch acts upon the data as soon as it is received, even if the transmission is not complete In [b] switching, when the switch receives the frame, it stores the data in buffers until the complete frame has been received.
A: cut-through B: Store-and-forward
The [a] interface allows remote Management on a Layer 2 switch; by default it is interface [b]. Review 2.3.1.2 Interfaces and Ports
A: switch virtual B: enabled
legacy port that was used to establish a CLI session remotely using a modem PuTTY Secure Shell (SSH) Console Port Telnet AUX port
AUX port
Used by the MAC sublayer to identify the source and destination nodes. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type
Addressing:
The binary number 1011 1111 can be expressed as _______ in hexadecimal.
BF
a physical management port that provides out-of-band access to a Cisco device PuTTY Secure Shell (SSH) Console Port Telnet AUX port
Console Port
Identifies special flow control services. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type
Control
Moves to the beginning of the line Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Ctrl-A
Exits the configuration mode or aborts the current command Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Ctrl-C
Moves to the end of the line Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Ctrl-E
Redisplays a line Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Ctrl-R
Allows the user to interrupt an IOS process such as ping or traceroute Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Ctrl-Shift-6
Exits the configuration mode and returns to user EXEC Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Ctrl-Z
Which number in hexadecimal corresponds to the decimal number 13? (type appropriate number/letter)
D
Contains the frame payload (i.e., packet header, segment header, etc.). Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type
Data
Allows the user to scroll backward through former commands Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Down Arrow
Included after the data to form the trailer. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type
Error Detection:
Destination and source MAC addresses do not change when a frame goes from one LAN to another.
False
Ethernet is a contention-based method of networking.
False
Used by the MAC sublayer to identify the beginning and end limits. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type
Frame start and stop indicator flags:
What do the highlighted numbers and characters mean?
It is the result of a service password-encryption command.
It places information in the frame that identifies which network layer protocol is being used for the frame. Media Access Control (MAC) Logical Link Control (LLC)
Logical Link Control (LLC)
This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media. Media Access Control (MAC) Logical Link Control (LLC)
Logical Link Control (LLC)
This upper sublayer defines the software processes that provide services to the network layer protocols. Media Access Control (MAC) Logical Link Control (LLC)
Logical Link Control (LLC)
It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use. Media Access Control (MAC) Logical Link Control (LLC)
Media Access Control (MAC)
This lower sublayer defines the media access processes performed by the hardware. Media Access Control (MAC) Logical Link Control (LLC)
Media Access Control (MAC)
In a network that uses IPv4, what prefix would best fit a subnet containing valid 255 hosts? Hint: No. of usable hosts = 2n-2 255 = 2n-2 Find n (the number of host bits needed in the subnet mask) Next, find the subnet mask in binary -_ _ _ _ _ _ _ _ . _ _ _ _ _ _ _ _ . _ _ _ _ _ _ _ _ . _ _ _ _ _ _ _ _
Prefix /23 gives 2^9-2=510 host addresses
a terminal emulation program available for connecting to a networking device either by a serial connection or by a SSH/Telnet connection PuTTY Secure Shell (SSH) Console Port Telnet AUX port
PuTTY
Why would a Layer 2 switch need an IP address? Remote management Use the ? character To verify the internal IP configuration on a local host. The operating system for the Cisco network device
Remote management
The process that a source host uses to determine the destination MAC address is known as _____________________ Protocol.
Reverse Address Resolution Protocol
a method for remotely establishing a secure CLI connection through a virtual interface PuTTY Secure Shell (SSH) Console Port Telnet AUX port
Secure Shell (SSH)
In [b] switching, when the switch receives the frame, it stores the data in buffers until the complete frame has been received.
Store-and-forward
Ethernet [a] is the most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router
Straight-through
Completes the remainder of a partially typed command or keyword Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Tab
an insecure method of remotely establishing a CLI session through a virtual interface PuTTY Secure Shell (SSH) Console Port Telnet AUX port
Telnet
What is the Cisco IOS? Remote management Use the ? character To verify the internal IP configuration on a local host. The operating system for the Cisco network device
The operating system for the Cisco network device
An Optical time domain reflectometer injects a test pulse of light into a fiber-optic cable segment and measures backscatter and reflection of light detected as a function of ____
Time
Why use the Ping command? Remote management Use the ? character To verify the internal IP configuration on a local host. The operating system for the Cisco network device
To verify the internal IP configuration on a local host.
Multimode fiber (MMF) consists of a larger core and uses LED emitters to send light pulses. Specifically, light from an LED enters the multimode fiber at different angles.
True
Used by the LLC to identify the Layer 3 protocol. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type
Type:
Allows the user to scroll forward through former commands Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E
Up Arrow
How do you access help screens in Cisco routers? Remote management Use the ? character To verify the internal IP configuration on a local host. The operating system for the Cisco network device
Use the ? character
The __________________ address is the IP address of the router that a host PC will use to access remote networks, including the Internet.
default gateway
On a MAC or Linux host, the ipconfig command is used to identify the MAC address of an Ethernet adapter
false
The more host bits that are borrowed, the fewer subnets that can be defined.
false
IPv6 uses a similar process to ARP for IPv4, known as ICMPv6 ____________________.
neighbor discovery
Enable a virtual interface using the __________________ interface configuration command.
no shutdown
[c] is a Cisco proprietary cable used to connect to a router or switch console port.
rollover
Servers and peripherals should have a predictable _________ IP address.
static
A switch can have multiple MAC addresses associated with a single port.
true
Any device that can be the source or destination of an Ethernet frame must be assigned a MAC address.
true
Changes to router and switch configurations take effect as soon as the command is entered.
true
Destination IP addresses in a packet header remain constant along the entire path to a target host.
true
Fiber-optic cable is completely immune to EMI and RFI.
true
If no device responds to an ARP request, the packet is dropped
true
Physical addresses at the data link layer have no meaning beyond the local network.
true
The terms subnet and network are often used interchangeably. Most networks are a subnet of some larger address block.
true
There is no one frame structure that meets the needs of all data transportation across all types of media.
true
Two optical fibers are required to support full duplex operation.
true
When a configured router properly boots up, it will display in ______________ mode.
user EXEC
The MAC address table is sometimes referred to as a __________________________________ table
content addressable memory
