Module1-3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which two protocols function at the internet layer? (Choose two.) POP BOOTP ICMP IP PPP

ICMP and IP both function at the internet layer, whereas PPP is a network access layer protocol, and POP and BOOTP are application layer protocols.

Which functionality is provided by DHCP?

automatic assignment of an IP address to each host

What term describes a computing model where server software runs on dedicated computers?

client/server

Which logical address is used for delivery of data to a remote network?

destination IP address: The destination IP address is used for end-to-end delivery of data to a remote network. The destination MAC address is used for delivery on a local network. The destination port number identifies the application that should process the data at the destination. Source addresses identify the sender of the data.

What term describes a technology that allows devices to connect to the LAN using an electrical outlet?

powerline netowrking

Which type of access is secured on a Cisco router or switch with the enable secret command?

privileged EXEC: The enable secret command secures access to the privileged EXEC mode of a Cisco router or switch.

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) ARP DHCP DNS FTP NAT PPP

DNS, DHCP, and FTP are all application layer protocols in the TCP/IP protocol suite. ARP and PPP are network access layer protocols, and NAT is an internet layer protocol in the TCP/IP protocol suite.

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? HTTP, IP, TCP, Ethernet HTTP, TCP, IP, Ethernet Ethernet, TCP, IP, HTTP Ethernet, IP, TCP, HTTP

HTTP, TCP, IP, Ethernet: 1. HTTP governs the way that a web server and client interact. 2. TCP manages individual conversations between web servers and clients. 3. IP is responsible for delivery across the best path to the destination .4. Ethernet takes the packet from IP and formats it for transmission.

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network? Data is sent from the internet layer to the network access layer. Packets are sent from the network access layer to the transport layer. Segments are sent from the transport layer to the internet layer. Frames are sent from the network access layer to the internet layer.

Segments are sent from the transport layer to the internet layer.: When the data is traveling from the PC to the network, the transport layer sends segments to the internet layer. The internet layer sends packets to the network access layer, which creates frames and then converts the frames to bits. The bits are released to the network media.

Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two) ServerB will generate a packet with the destination IP address of RouterB. ServerB will generate a frame with the destination MAC address of SwitchB. ServerB will generate a packet with the destination IP address of RouterA. ServerB will generate a frame with the destination MAC address of RouterB. ServerB will generate a packet with the destination IP address of HostA. ServerB will generate a frame with the destination MAC address of RouterA.

ServerB will generate a frame with the destination MAC address of RouterB. ServerB will generate a packet with the destination IP address of HostA.

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access: Wireless Internet Service Providers (WISPs) are typically found in rural areas where DSL or cable access is not available. A dish or antenna on the property of the subscriber connects wirelessly to a WISP transmitter, eliminating the need for physical cabling outside the building.

At which OSI layer is a source MAC address added to a PDU during the encapsulation process?

data link layer

Which PDU format is used when bits are received from the network medium by the NIC of a host? file frame packet segment

frame

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? implementing a firewall installing a wireless network installing antivirus software implementing an intrusion detection system adding a dedicated intrusion prevention device

implementing a firewall installing antivirus software

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?

lineconin Telnet accesses a network device through the virtual interface configured with the line VTY command. The password configured under this is required to access the user EXEC mode. The password configured under the line console 0 command is required to gain entry through the console port, and the enable and enable secret passwords are used to allow entry into the privileged EXEC mode.

What term describes a network where one computer can be both client and server?

peer-to-peer

What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?

show ip interface brief: The show ip interface brief command is used to display a brief synopsis of the condition of the device interfaces. The ipconfig command is used to verify TCP/IP properties on a host. The ping command is used to verify Layer 3 connectivity. The traceroute command is used to trace the network path from source to destination.

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

transport layer

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

transport layer: The OSI model consists of seven layers: application, presentation, session, transport, network, data link, and physical. The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.

In computer communication, what is the purpose of message encoding?

to convert information to the appropriate form for transmission: Each bit of the message is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media over which the bits are transmitted. The destination host receives and decodes the signals in order to interpret the message.

Which device performs the function of determining the path that messages should take through internetworks?

A router is used to determine the path that the messages should take through the network.

Match each characteristic to its corresponding Internet connectivity type. (Not all options are used.)

DSL is an always-on, high bandwidth connection that runs over telephone lines. Cable uses the same coaxial cable that carries television signals into the home to provide Internet access. Dialup telephone is much slower than either DSL or cable, but is the least expensive option for home users because it can use any telephone line and a simple modem. Satellite requires a clear line of sight and is affected by trees and other obstructions. None of these typical home options use dedicated leased lines such as T1/E1 and T3/E3.

web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? Ethernet, IP, TCP, HTTP HTTP, TCP, IP, Ethernet Ethernet, TCP, IP, HTTP HTTP, Ethernet, IP, TCP

Ethernet, IP, TCP, HTTP

What is the function of the shell in an OS?

It interfaces between the users and the kernel.: Most operating systems contain a shell and a kernel. The kernel interacts with the hardware and the shell interfaces between the kernel and the users.

What is done to an IP packet before it is transmitted over the physical medium?

It is encapsulated in a Layer 2 frame.: When messages are sent on a network, the encapsulation process works from the top of the OSI or TCP/IP model to the bottom. At each layer of the model, the upper layer information is encapsulated into the data field of the next protocol. For example, before an IP packet can be sent, it is encapsulated in a data link frame at Layer 2 so that it can be sent over the physical medium.

Which memory location on a Cisco router or switch stores the startup configuration file?

NVRAM: The startup configuration file of a Cisco router or switch is stored in NVRAM, which is nonvolatile memory.

How is SSH different from Telnet?

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring? Telnet access SVI password encryption physical switchport access

SVI: For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely over the network.

What are the benefits of using a layered network model?

Some vendors have developed their own reference models and protocols. Today, if a device is to communicate on the Internet, the device must use the TCP/IP model. The benefits of using a layered model are as follows: 1. assists in protocol design 2.fosters competition between vendors 3.prevents a technology that functions at one layer from affecting any other layer 4.provides a common language for describing network functionality 5.helps in visualizing the interaction between each layer and protocols between each layer

What are three characteristics of an SVI? (Choose three.) It is designed as a security protocol to protect switch ports. It is not associated with any physical interface on a switch. It is a special interface that allows connectivity by different types of media. It is required to allow connectivity by any device at any location. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.

Switches have one or more switch virtual interfaces (SVIs). SVIs are created in software since there is no physical hardware associated with them. Virtual interfaces provide a means to remotely manage a switch over a network that is using IP. Each switch comes with one SVI appearing in the default configuration "out-of-the-box." The default SVI interface is VLAN1.

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)

The configuration mode that the administrator first encounters is user EXEC mode. After the enable command is entered, the next mode is privileged EXEC mode. From there, the configure terminal command is entered to move to global configuration mode. Finally, the administrator enters the line console 0 command to enter the mode in which the configuration will be entered.

The function of network protocols?

They define how messages are exchanged between the source and the destination.

What is the default SVI on a Cisco switch?

VLAN1: Layer 2 switches use switch virtual interfaces (SVIs) to provide a means for remote access over IP. The default SVI on a Cisco switch is VLAN1.

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN: Virtual private networks (VPN) are used to provide secure access to remote workers.

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) VTY interface console interface Ethernet interface boot IOS mode privileged EXEC mode router configuration mode

VTY interface console interface privileged EXEC mode Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.

At which OSI layer is data added to a PDU during the encapsulation process?

application layer

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

extranet: The term Internet refers to the worldwide collection of connected networks. Intranet refers to a private connection of LANs and WANS that belong to an organization and is designed to be accessible to the members of the organization, employees, or others with authorization.​ Extranets provide secure and safe access to ​suppliers, customers, and collaborators.

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

flow control

Match the description with the associated IOS mode

https://itexamanswers.net/ccna-1-v7-modules-1-3-basic-network-connectivity-and-communications-exam-answers.html question no 27

Which type of communication will send a message to a group of host destinations simultaneously?

multicast: Multicast is a one-to-many communication where the message is delivered to a specific group of hosts. Broadcast communication is a one-to-all communication. A unicast communication is a one-to-one communication. Anycast is an IPv6 term and is the sending of data in a one-to-nearest communication.

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

network layer

At which layer of the OSI model would a logical address be added during encapsulation?

network layer

What is the general term that is used to describe a piece of data at any layer of a networking model?***

protocol data unit: The term protocol data unit (PDU) is used to describe a piece of data at any layer of a networking model. A packet is the PDU at the network layer. A frame is the data link layer PDU. A segment is the PDU at the transport layer.

What is the purpose of protocols in data communications?

providing the rules required for a specific type of communication to occur

Which name is assigned to the transport layer PDU? bits data frame packet segment

segment Application data is passed down the protocol stack on its way to be transmitted across the network media. During the process, various protocols add information to it at each level. At each stage of the process, a PDU (protocol data unit) has a different name to reflect its new functions. The PDUs are named according to the protocols of the TCP/IP suite: Data - The general term for the PDU used at the application layer. Segment - transport layer PDU Packet - network layer PDU Frame - data link layer PDU Bits - A physical layer PDU used when physically transmitting data over the medium

segment- frame- packet- Layers?

segment - transport layer; packet - network layer; frame - data link layer;

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

subnet mask

Which interface allows remote management of a Layer 2 switch?

the switch virtual interface: In a Layer 2 switch, there is a switch virtual interface (SVI) that provides a means for remotely managing the device.


Kaugnay na mga set ng pag-aaral

AP Gov: Interest Groups and Campaigning

View Set

Muscles of the face, lips and tongue

View Set

informatics exam 1 in class questions

View Set

CHAPTER 61 Assessment of the Endocrine System

View Set