ITN - Modules 1 - 3: Basic Network Connectivity and Communications

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

(config)# service password-encryption

(config)# service password-encryption

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption

What is the IP address of the switch virtual interface (SVI) on Switch0?

192.168.5.10 Explanation: After the enable command is issued, the show running-configuration command or the show ip interfaces brief command will display the IP address of the switch virtual interface (SVI).

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface console interface privileged EXEC mode Explanation: Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.

What is an advantage of network devices using open standard protocols?

A client host and a server running different operating systems can successfully exchange data. Explanation: An advantage of network devices implementing open standard protocols, such as from the TCP/IP suite, is that clients and servers running different operating systems can communicate with each other. Open standard protocols facilitate innovation and competition between vendors and across markets, and can reduce the occurrence of monopolies in networking markets.

Which statement describes the use of powerline networking technology?

A device connects to an existing home LAN using an adapter and an existing electrical outlet. Explanation: Powerline networking adds the ability to connect a device to the network using an adapter wherever there is an electrical outlet.​ The network uses existing electrical wiring to send data. It is not a replacement for physical cabling, but it can add functionality in places where wireless access points cannot be used or cannot reach devices.

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

DHCP DNS FTP Explanation: DNS, DHCP, and FTP are all application layer protocols in the TCP/IP protocol suite. ARP and PPP are network access layer protocols, and NAT is an internet layer protocol in the TCP/IP protocol suite.

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

Ethernet, IP, TCP, HTTP Explanation:1. HTTP governs the way that a web server and client interact.2. TCP manages individual conversations between web servers and clients.3. IP is responsible for delivery across the best path to the destination.4. Ethernet takes the packet from IP and formats it for transmission.

What function does pressing the Tab key have when entering a command in IOS?

It completes the remainder of a partially typed word in a command. Explanation: Pressing the Tab key after a command has been partially typed will cause the IOS to complete the rest of the command.

What are three characteristics of an SVI? (Choose three.)

It provides a means to remotely manage a switch. It is associated with VLAN1 by default. It is not associated with any physical interface on a switch. Explanation: Switches have one or more switch virtual interfaces (SVIs). SVIs are created in software since there is no physical hardware associated with them. Virtual interfaces provide a means to remotely manage a switch over a network that is using IP. Each switch comes with one SVI appearing in the default configuration "out-of-the-box." The default SVI interface is VLAN1.

How is SSH different from Telnet?

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. Explanation: SSH is the preferred protocol for connecting to a device operating system over the network because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet connections.

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

SVI Explanation: For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely over the network.

RouterA ===== RouterB SwitchA SwitchB HostA HostB Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.)

ServerB will generate a frame with the destination MAC address of RouterB. ServerB will generate a packet with the destination IP address of HostA. Explanation: In order to send data to HostA, ServerB will generate a packet that contains the IP address of the destination device on the remote network and a frame that contains the MAC address of the default gateway device on the local network.

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

SwBranch799 RM-3-Switch-2A4 Explanation: Some guidelines for naming conventions are that names should:Start with a letterContain no spacesEnd with a letter or digitUse only letters, digits, and dashesBe less than 64 characters in length

Swithc1> config t % Invalid input detected at '^' marker. Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

The administrator must first enter privileged EXEC mode before issuing the command.

Which device performs the function of determining the path that messages should take through internetworks?

a router Explanation: A router is used to determine the path that the messages should take through the network. A firewall is used to filter incoming and outgoing traffic. A DSL modem is used to provide Internet connection for a home or an organization.

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

an intranet Explanation: Intranet is a term used to refer to a private connection of LANs and WANs that belongs to an organization. An intranet is designed to be accessible only by the organization's members, employees, or others with authorization.

What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device?

cloud

Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)

data link physical Explanation: The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI application, presentation, and session layers are functionally equivalent to the application layer within the TCP/IP model.

At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?

data link layer

Which command or key combination allows a user to return to the previous level in the command hierarchy?

exit Explanation: End and CTRL-Z return the user to the privileged EXEC mode. Ctrl-C ends a command in process. The exit command returns the user to the previous level.

What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

extranet

Which PDU format is used when bits are received from the network medium by the NIC of a host?

frame Explanation: When received at the physical layer of a host, the bits are formatted into a frame at the data link layer. A packet is the PDU at the network layer. A segment is the PDU at the transport layer. A file is a data structure that may be used at the application layer.

What layer is responsible for routing messages through an internetwork in the TCP/IP model?

internet Explanation: The TCP/IP model consists of four layers: application, transport, internet, and network access. Of these four layers, it is the internet layer that is responsible for routing messages. The session layer is not part of the TCP/IP model but is rather part of the OSI model.

At which layer of the OSI model would a logical address be added during encapsulation?

network layer Explanation: Logical addresses, also known as IP addresses, are added at the network layer. Physical addresses are edded at the data link layer. Port addresses are added at the transport layer. No addresses are added at the physical layer.

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?

response timeout Explanation: If a computer makes a request and does not hear a response within an acceptable amount of time, the computer assumes that no answer is coming and reacts accordingly.

Which name is assigned to the transport layer PDU?

segment Explanation: Application data is passed down the protocol stack on its way to be transmitted across the network media. During the process, various protocols add information to it at each level. At each stage of the process, a PDU (protocol data unit) has a different name to reflect its new functions. The PDUs are named according to the protocols of the TCP/IP suite:Data - The general term for the PDU used at the application layer.Segment - transport layer PDUPacket - network layer PDUFrame - data link layer PDUBits - A physical layer PDU used when physically transmitting data over the medium

What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?

show ip interface brief Explanation: The show ip interface brief command is used to display a brief synopsis of the condition of the device interfaces. The ipconfig command is used to verify TCP/IP properties on a host. The ping command is used to verify Layer 3 connectivity. The traceroute command is used to trace the network path from source to destination.

Which interface allows remote management of a Layer 2 switch?

the switch virtual interface Explanation: In a Layer 2 switch, there is a switch virtual interface (SVI) that provides a means for remotely managing the device.

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

to interrupt the ping process Explanation: To interrupt an IOS process such as ping or traceroute, a user enters the Ctrl-Shift-6 key combination. Tab completes the remainder of parameters or arguments within a command. To exit from configuration mode to privileged mode use the Ctrl-Z keystroke. CTRL-R will redisplay the line just typed, thus making it easier for the user to press Enter and reissue the ping command.

What type of network traffic requires QoS?

video conferencing


Kaugnay na mga set ng pag-aaral

BSAN 160 - Activities and Quiz Questions

View Set

Medical-Surgical:Cardiovascular and Hematology

View Set

CH 1 - 13 Combined (45 Hour Post-license 1st renewal)

View Set

Design High-Performing Architectures Section Exam

View Set

Informatics finals, Informatics Chp 2, Informatics Chp 3, Informatics Chp 4, Informatics Chp 5, Informatics Chp 6, Info Exam 2 Chap 7, Info Exam 2 Chap 8, Chap 11 Informatics, Info Exam 2 Chap 12, INFO Exam 3 Chap 13, INFO Exam 3 Chap 14, INFO Exam 3...

View Set

Reading the Bible Midterm review

View Set

Face-Negotiation Theory: Chapter 32

View Set

ENGL 135 Ch 14 Documenting a Research Paper

View Set

Chapter 11: Breast Cancer Staging & Treatment

View Set