CCNA ITN MODULES 1-3 EXAM

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

+ Ethernet, IP, TCP, HTTP 1. HTTP governs the way that a web server and client interact. 2. TCP manages individual conversations between web servers and clients. 3. IP is responsible for delivery across the best path to the destination. 4. Ethernet takes the packet from IP and formats it for transmission.

What are three characteristics of an SVI? (Choose three.)

+ It provides a means to remotely manage a switch. + It is not associated with any physical interface on a switch. + It is associated with VLAN1 by default.

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

+ RM-3-Switch-2A4 + SwBranch799 Some guidelines for naming conventions are that names should: Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length

Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.)

+ ServerB will generate a frame with the destination MAC address of RouterB. +ServerB will generate a packet with the destination IP address of HostA. In order to send data to HostA, ServerB will generate a packet that contains the IP address of the destination device on the remote network and a frame that contains the MAC address of the default gateway device on the local network.

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

+ The new configuration will be loaded if the switch is restarted. With the copy running-config startup-config command, the content of the current operating configuration replaces the startup configuration file stored in NVRAM. The configuration file saved in NVRAM will be loaded when the device is restarted.

In the show running-config command, which part of the syntax is represented by running-config ?

+ a keyword The first part of the syntax, show , is the command, and the second part of the syntax, running-config, is the keyword. The keyword specifies what should be displayed as the output of the show command.

Which PDU format is used when bits are received from the network medium by the NIC of a host?

+ frame When received at the physical layer of a host, the bits are formatted into a frame at the data link layer. A packet is the PDU at the network layer. A segment is the PDU at the transport layer. A file is a data structure that may be used at the application layer.

What layer is responsible for routing messages through an internetwork in the TCP/IP model?

+ internet The TCP/IP model consists of four layers: application, transport, internet, and network access. Of these four layers, it is the internet layer that is responsible for routing messages. The session layer is not part of the TCP/IP model but is rather part of the OSI model.

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?

+ lineconin Telnet accesses a network device through the virtual interface configured with the line VTY command. The password configured under this is required to access the user EXEC mode. The password configured under the line console 0 command is required to gain entry through the console port, and the enable and enable secret passwords are used to allow entry into the privileged EXEC mode.

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

+ privileged EXEC mode + VTY interface + console interface Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.

Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)

+data link +physical The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI application, presentation, and session layers are functionally equivalent to the application layer within the TCP/IP model.

For the TCP/IP protocol suite, what is the correct order of events when a Telnet message is being prepared to be sent over the network?

1.) The Telnet-formatted data is provided to the next layer. 2.) The TCP header is added 3.) The IP header is added. 4.) The EThernet Header is added 1.3.6 Data Encapsulation

Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.)

The shortcuts with their functions are as follows: Tab - Completes the remainder of a partially typed command or keyword Space bar - displays the next screen ? - provides context-sensitive help Up Arrow - Allows user to scroll backward through former commands Ctrl-C - cancels any command currently being entered and returns directly to privileged EXEC mode Ctrl-Shift-6 - Allows the user to interrupt an IOS process such as ping or traceroute


Ensembles d'études connexes

CH 54 drugs acting on upper resp. tract PrepU

View Set

OB Chapt 1Perspectives on Maternal, Newborn & Women's Health Care

View Set

Importance of Being Earnest Lines - Algernon

View Set

Module 31: Exemplar C - Obsessive-Compulsive Disorder

View Set