Networking Devices and Initial Configuration

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which full range of decimal values are valid in one octet of an IPv4 address?

0 through 255

Which type of the following MAC address is unicast MAC address?

00-07-E9-42-AC-28

Which type of the following MAC address is an IPv4 multicast MAC address?

01-00-5E-00-00-C8

Which type of the following MAC address is an IPv6 multicast MAC address?

33-33-00-58-94-5C

How many octets exist in an IPv4 address?

4

For what purpose are IPv4 addresses utilized?

An IPv4 address is used to uniquely identify a device on an IP network.

What are two differences between binary and decimal numbers?

Binary numbers are based on powers of 2. Decimal numbers include 0 through 9.

Which part of an Ethernet Frame uses a pad to increase the frame field to at least 64 bytes?

Data field

What is the order of encapsulation for the protocol data units passing from the user application down the stack?

Data, Segments, Packets, Frames, Bits.

Which part of an Ethernet Frame describes the higher-layer protocol that is encapsulated?

EtherType

Which type of the following MAC address is broadcast MAC address?

FF-FF-FF-FF-FF-FF

Which part of an Ethernet frame detects errors in the frame?

Frame Check Sequence

Which field is used to detect corruption in the IPv4 header?

Header Checksum

Which three options are major issues associated with IPv4?

IP address depletion increased network complexity and Internet routing table expansion lack of end-to-end connectivity

Which statement accurately describes a characteristic of IPv4?

IPv4 has a 32-bit address space.

A company uses cloud services and is setting up a new switch supplied by the cloud provider. Which cloud model is used by the company?

IaaS

Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?

IaaS

Which characteristic defines a private cloud?

Intended for a specific organization

What is the responsibility of the distribution layer in a hierarchical network design?

It controls the traffic flows between the other layers.

What is a characteristic of a public cloud?

It is available to everyone.

Which statement describes one purpose of the subnet mask setting for a host?

It is used to determine to which network the host is connected.

Which statement accurately describes a Type 2 hypervisor?

It runs as a software layer on top of a host operating system.

Which two characteristics describe Ethernet technology?

It uses unique MAC addresses to ensure that data is sent to the appropriate destination. It is supported by IEEE 802.3 standards.

What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address?

It will discard the frame.

Which statement describes a characteristic of the network layer in the OSI model?

Its protocols specify the packet structure and processing used to carry the data from one host to another.

Which data link sublayer controls the network interface through software drivers?

LLC

Which data link sublayer works with the upper layers to add application information for delivery of data to higher level protocols?

LLC

Which two devices would commonly be found at the access layer of the hierarchical enterprise LAN design model?

Layer 2 switch access point

Which Ethernet sublayer is used to control network access using CSMA/CD?

MAC

Which type of address never changes on a device and is similar to a person's name?

MAC address

Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

NAT

Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

PaaS

Which part of an Ethernet Frame notifies the receiver to get ready for a new frame?

Preamble

Which field includes common values such as ICMP (1), TCP (6), and UDP (17)?

Protocol

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

QoS

Which term describes the type of cloud computing service that provides applications over the web?

SaaS

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

Scalability

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

Security

What information is added during encapsulation at OSI Layer 3?

Source and destination IP address.

Which is true of the IPv6 packet header?

The Hop Limit field replaces the IPv4 Time to Live field.

How does the network layer use the MTU value?

The MTU is passed to the network layer by the data link layer.

What happens to runt frames received by a Cisco Ethernet switch?

The frame is dropped.

Which statement describes IPv4 addressing?

The network portion of a destination IP address is obtained by performing an AND operation between a host IP address and a subnet mask.

Which statement is correct about IPv4 packet header fields?

The source and destination IPv4 addresses remain the same while travelling from source to destination.

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Time-to-Live

Which two are type 2 hypervisors?

Virtual PC Virtualbox

Which cloud model provides services for a specific organization or entity?

a private cloud

An administrator is adding voice and video service capabilities to an existing network. What design requirement is being satisfied by this situation?

access

Which design layer provides connectivity to devices on an Ethernet LAN?

access

Why is IPv6 designed to replace IPv4?

because the IPv4 address space will soon be depleted

Which delivery method does not guarantee that the packet will be delivered fully without errors?

best effort

What is the length restriction of the data field in an Ethernet frame?

between 46 to 1500 bytes

Saving your photos to a storage location maintained by your service provider is an example of ________.

cloud computing

Which cloud model is used to meet the needs of a specific industry, such as healthcare or media?

community cloud

Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?

congestion

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

congestion

What is a function of the MAC sublayer?

controls access to the media checks for errors in received bits uses CSMA/CD or CSMA/CA to support Ethernet technology

Community clouds

created for exclusive use by a specific community. needs that have been customized for the community.

Which layer is responsible for taking an IP packet and preparing it for transmission over the communications medium?

data link layer

What device uses all the RAM, processing power, and hard drive space devoted to one service?

dedicated server

What are the two most commonly referenced fields in an IPv4 packet header that indicate where the packet is coming from and where it is going?

destination IP address source IP address

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

destination MAC address

What are the three layers of the switch hierarchical design model?

distribution core access

Which is a characteristic of a Type 2 hypervisor?​

does not require management console software

What process involves placing one PDU inside of another PDU?

encapsulation

Which network feature uses redundancy as a means to limit the number of affected users in the event of a failure?

fault tolerance

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

fault-tolerance

What is the term for splitting up an IP packet when forwarding it from one medium to another medium with a smaller MTU?

fragmentation

Which three fields are found in an 802.3 Ethernet frame?

frame check sequence destination physical address source physical address

Which network design model improves efficiency by dividing the network into smaller pieces.

hierarchical

Which portion of an IP address uniquely identifies that device on that network?

host

Which cloud type consists of two or more clouds that are connected through a single architecture?

hybrid

Which cloud model represents two or more clouds where each part remains a distinctive object, but both are connected using a single architecture?

hybrid cloud

What term is used to define the software process that creates VMs and performs hardware abstraction to support VMs?

hypervisor

Which piece of software is responsible for creating virtual machines and providing them access to resources on a physical machine?

hypervisor

Which two options are improvements provided by IPv6 as compared to IPv4?

increased the IP address space uses a simpler header to provide improved packet handling

Private clouds

intended for a specific organization or entity, such as the government.

Which is true of the IPv6 header?

it consists of 40 octets. it contains 8 header fields.

Which three features represent benefits of virtualization?

less equipment improved disaster recovery less power consumption

An IP address is considered what type of address:

logical

Public clouds

made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage

Hybrid clouds

made up of two or more clouds, each part remains a separate object, but both are connected using a single architecture.

What is indicated by the 100 in the 100BASE-T standard?

megabits per second

Which layer of the OSI model is responsible for the logical addressing of packets?

network

An Ethernet MAC address is considered what type of address:

physical

Which address does not change when a device is connected to a new network?

physical

What characteristic of a network would allow video traffic to have priority over traffic from an email application?

quality of service

A student is streaming a movie to his computer but the movie keeps stopping. What service would give streaming traffic higher priority and avoid the movie stopping?

quality of service (QoS)

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

scalability

Which feature relies on prioritization of network traffic and is used to ensure successful delivery of real-time services?

scalability

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?

security

A company leases a cloud-based payroll system. Which cloud computing technology is this company using?

software as a service (SaaS)

What is encapsulated into the data field of an Ethernet frame?

the Layer 3 PDU

Which characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications among many hosts?

the ability to operate without regard to the data that is carried in each packet

What addressing information is recorded by a switch to build its MAC address table?

the source Layer 2 address of incoming frames

What is the function of a hypervisor?

to create VMs and provide hardware abstraction to support them

Which OSI layer sends segments to be encapsulated in an IPv4 or IPv6 packet?

transport layer

True or False?The impact of the failure of an important network device can be limited by a feature called fault tolerance.

true

Which term is associated with Cloud computing?

virtualization


Kaugnay na mga set ng pag-aaral

Micro Exam 2 Yuan Quizzes plus study guide

View Set

Government Chapter 1,2, & 5 D2l quizzes

View Set

LUMEN WAYMAKER - Module 1: Grammar

View Set

lesson 8, collocation in use, inter

View Set

Stakeholder Relationships, Social Responsibility, and Corporate Governance

View Set

Chapter 7: Implementing Authentication Controls

View Set