CCNA
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
(config)#service-password-encryption
What is the binary representation for the decimal number 173?
10101101
What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)
1518 bytes 64 bytes
What statement describes the function of the Address Resolution Protocol?
ARP is used to discover the MAC address of any host on the local network.
What type of communication rule would best describe CSMA/CD?
Access Method
Layer 4 (TCP/IP)
Application
Layer 7 (OSI/Pizza)
Application
At which OSI layer is a SOURCE IP address added to a PDU during the encapsulation process?
Application Layer
What method is used to manage contention-based access on a wireless network?
CSMA/CA
What happens when the transport input ssh command is entered on the switch vty lines?
Communication between the switch and remote users is encrypted
Which two protocols are service discovery protocols? (Choose two.)
DHCP DNS
Layer 2 (OSI/Pizza)
Data Link
What property of ARP causes cached IP-to-MAC mappings to remain in memory longer?
Entries in an ARP table are time-stamped and are purged after the timeout expires
What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?
Extranet
Which protocol operates at the network access layer of the TCP/IP model?
IP
Layer 2 (TCP/IP)
Internet
What are three characteristics of an SVI? (choose 3)
It is not associated with any physical interface on a switch It provides a means to remotely manage a switch It is associated with VLAN1 by default
final mode
Line Configuration Mode
Layer 3 (OSI/Pizza)
Network
Layer 1 (TCP/IP)
Network Access
Layer 1 (OSI/Pizza)
Physical
Layer 6 (OSI/Pizza)
Presentation
What IPv4 header field identifies the upper layer protocol carried in the packet?
Protocol
Layer 5 (OSI/Pizza)
Session
This protocol is responsible for guaranteeing the reliable delivery of information.
TCP
A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?
The computer has an invalid default gateway address.
A router boots and enters setup mode. What is the reason for this?
The configuration file is missing from NVRAM
After making configuration changes on a Cisco switch, a network admin issues a "copy running-config startup-config" command. What is the result of issuing this command?
The new configuration will be loaded if the switch is restarted
The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?
The switch can be remotely managed from a host on another network.
What statement describes a characteristic of MAC addresses?
They must be globally unique
What are two functions of an NVRAM?
To store the startup configuration line To retain contents when power if removed
Layer 3 (TCP/IP)
Transport
Layer 4 (OSI/Pizza)
Transport
An end device is either the source or destination of a message transmitted over the network.
True
What type of network traffic requires QoS?
Video Conferencing
What is a characteristic of UTP cabling?
cancellation
What is a primary role of the Physical layer in transmitting data on the network?
create the signals that represent the bits in each frame on to the media.
In addition to the cable length, what two factors could interfere with the communication carried over UTP cables?
crosstalk electromagnetic interference
Which protocol stack layer encapsulates data into frames?
data link
Match the configuration mode with the command that is available in that mode. (Not all options are used.) R1(config-line)# R1# R1(config-router)# R1> R1(config)#
enable: - R1> copy running-config startup-config: - R1# login: - R1(config-line)# interface fastethernet 0/0: - R1(config)#
What is the name of the process of adding protocol information to data as it moves down the protocol stack?
encapsulation
user EXEC mode
limited number of basic monitoring commands the first entrance into the CLI of an IOS device
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases*
What type of cable is used to connect a workstation serial port to a Cisco router console port?
rollover
BGP and OSPF are examples of which type of protocol?
routing
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)
routing protocols internet protocols messaging
What is the name of the PDU associated with the transport layer?
segment
What type of physical topology can be created by connecting all Ethernet cables to a central device?
star
With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
the magnetic field around the adjacent pairs of wire
What addressing information is recorded by a switch to build its MAC address table?
the source layer 2 address of incoming frames
Why would a Layer 2 switch need an IP address?
to enable the switch to be managed remotely
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?
to interrupt the ping process
When choosing passwords, which of the following would be least appropriate?
use common words from a dictionary.
Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?PC---SWITCH---ROUTER1---ROUTER2
1-rollover, 2-straight-through, 3-crossover
A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?
the ARP cache is cleared
Match the commands to the correct actions. (Not all options are used.) Provides security on the console Displays a message when the router is accessed Configures a name on the router
Router(config)# hostname CL1: - Configures a name on the router Router(config-line)# password class - Provides security on the console Router(config)# banner motd # - Displays a message when the router is accessed
How is SSH different from telnet?
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and send messages in plain text
What is contained in the trailer of a data-link frame?
error detection
Which command or key combination allows a user to return to the previous level in the command hierarchy?
exit
Which of the following statements concerning fault tolerant networks are FALSE.
f one path fails, the messages are queued until the path is restored.
Which switching method has the lowest level of latency?
fast-forward
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
flow control
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?
flow label
Which advantage does the store-and-forward switching method have compared with the cut-through switching method?
frame error checking
Which media communication type does not require media arbitration in the data link layer?
full-duplex
third mode
global configuration mode
Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?
store-and-forward switching
Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)
data link physical
Which is a multicast MAC address?
01-00-5E-00-00-03
Which two functions are performed at the MAC sublayer of the OSI data link layer?
Adds Layer 2 control information to network protocol data. Controls the NIC responsible for sending and receiving data on the physical medium.
Which statement is true about the CSMA/CD access method that is used in Ethernet?
All network devices must listen before transmitting
Why is NAT not needed in IPv6?
Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
Exit privileged EXEC mode and press ENTER
What is a basic characteristic of the IP protocol?
connectionless
Which of the following statements concerning the use of a Dial-up Telephone Line for data transmission are TRUE.
Can be useful for mobile access while traveling. An inexpensive option that uses any phone line and a modem The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer.
password can be used to restrict access to all parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords (Choose Three)
Console interface Privileged EXEC mode VTY interface
What OSI physical layer term describes the physical medium which uses electrical pulses?
Copper Cable
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
DNS FTP DHCP
A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?
Ethernet, IP, TCP, HTTP
Which destination address is used in an ARP request frame?
FFFF.FFFF.FFFF
An organization may use an INtranet to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.
False
Which two fields or features does Ethernet examine to determine if a received frame is passed to the data link layer or discarded by the NIC?
Frame Check Sequence Minimum frame size
Which statement describes a feature of the IP protocol?
IP relies on upper layer services to handle situations of missing or out-of-order packets.
Which of the following statements are correct?
Intermediary devices connect the individual end devices to the network.
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
Intranet
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration
What is the auto-MDIX feature?
It enables a device to automatically configure an interface to use a straight-through or a crossover cable.*
What are two characteristics of fiber-optic cable?
It is not affected by EMI or RFI(crosstalk) It is more expensive than UTP cabling is
Which two statements describe the services provided by the data link layer?
It manages the access of frames to the network media It packages various Layer 3 PDUs into a frame format that is compatible with the network interface
Which two types of IPv6 messages are used in place of ARP for address resolution?
Neighbor advertisement Neighbor solicitation
At which layer of the OSI model would a LOGICAL address be added during encapsulation?
Network Layer
What are two potential network problems that can result from ARP operation? (Choose two.)
On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
Which two functions are primary functions of a router? (Choose two.)
Packet Forwarding Path Selection
Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)
Password Cisco Login Line Console 0
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network
Segments are sent from the transport layer to the internet layer
what is a characteristic of multicast messages?
Sent to a select group of hosts
What three items are contained in an Ethernet header and trailer?
Source MAC address Destination MAC address Error-checking information
What is the effect of using the Router# copy running-config startup-config command on a router
The contents of NVRAM will change
Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)
The frame has the broadcast address as the destination address The destination address is unknown to the switch
What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts in other networks.
A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection?
The link between the switches will work at the fastest speed that is supported by both switches. The link between switches will work as full-duplex. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.*
During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?
The physical address is added
What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF?
The switch forwards it out all ports except the ingress port.
Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?
The switch will forward the frame to all ports except port 4 (its own port) [PC1 (port4) < ] [PC4 (port 1) ^] [PC3 (port 2) >] [PC2 (port 3) v]
Which statement is correct about network protocols?
They define how messages are exchanged between the source and the destination
IANA
This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers
ISO
This organization is the largest. Known for its Open Systems Interconnection (OSI) reference model
ISOC
This organization promotes the open development, evolution, and use of the Internet throughout the world.
first mode
user EXEC mode
Privileged EXEC Mode
accessed by entering the enable command identified by a prompt ending with the # character
Global Configuration Mode
changes made affect the operation of the device as a whole accessed by entering the configure terminal command
What makes fiber preferable to copper cabling for interconnecting buildings
greater distances per cable run limited susceptibility to EMI/RFI greater bandwidth potential
what is one advantage of using the cut-through switching method instead of the store-and-forward switching method?
has a lower latency appropriate for high-performance computing applications
Which three basic parts are common to all frame types supported by the data link layer?
header / data / trailer
Second mode
privileged EXEC mode
What routing table entry has a next hop address associated with a destination network?
remote routes
Which data method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?
response timeout
What are two services provided by the OSI network layer? (Choose two.)
routing packets toward the destination encapsulating PDUs from the transport layer
Which name is assigned to the transport layer PDU?
segment
A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?
shared memory buffering
Which interface allows remote management of a Layer 2 switch?
the SVI (Switch Virtual Interface)
What is the auto-MDIX feature on a switch?
the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection
What two criteria are used to help select network media? (Choose two.)
the distance the selected medium can successfully carry a signal the environment where the selected medium is to be installed
What are two actions performed by a Cisco switch?
using the source MAC addresses of frames to build and maintain a MAC address table utilizing the MAC address table to forward frames via the destination MAC address
Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?
version