CISCO NETACAD

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is auto-MDIX?

a feature that detects Ethernet cable type

Which expression accurately defines the term bandwidth?

a measure of the data carrying capacity of the media

Which device performs the function of determining the path that messages should take through internetworks?

a router

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

an intranet

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

application presentation session

Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

application, transport, Internet, and network access layers

Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)

cable DSL

What security violation would cause the most amount of damage to the life of a home user?

capturing of personal data that leads to identity theft

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

cellular satellite

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

congestion

Refer to the exhibit. A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with? (Choose two.)

connectivity: switch 2 no connectivity: PC-C

A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?

data confidentiality

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?

directly connected route

Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?

1 - rollover, 2 - straight-through, 3 - crossover

What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?

64 Bytes

What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)

64 Bytes 1518 Bytes

What is an advantage of network devices using open standard protocols?

A client host and a server running different operating systems can successfully exchange data.

Which statement describes the use of powerline networking technology?

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

A frame with the destination MAC address of RouterA. A packet with the destination IP address of ServerB.

What are two characteristics of IP? (Choose two.)

does not require a dedicated end-to-end connection operates independently of the network media

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

easy to create lacks centralized administration less cost to implement

What is one advantage that the IPv6 simplified header offers over IPv4?

efficient packet handling

Why are two strands of fiber used for a single fiber optic connection?

Allow for full-duplex connectivity

Which statement describes a characteristic of cloud computing?

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?

BYOD

The term indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).

Bandwith

What type of communication will send a message to all devices on a local area network?

Broadcast

The acronym refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.

Byod

Which two pieces of information are in the RAM of a Cisco router during normal operation? (Choose two.)

Cisco IOS IP routing table

A network is capable of delivering voice, video, text, and graphics over the same communication channels.

Converged

What is contained in the trailer of a data-link frame?

error detection

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

DHCP DNS FTP

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

Data link

What statement describes Ethernet?

Describes most common LAN type in the World

Which address does a NIC use when deciding whether to accept a frame?

Destination Mac address

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

Displaying a list of all available commands within a current mode determining which option, keyword, or argument is available for the entered command

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

EMI RFI

What process is used to place one message inside another message for transfer from the source to the destination?

Encapsulation

Which statement describes an extended star topology?

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.

Which command or key combination allows a user to return to the previous level in the command hierarchy?

Exit

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

Flow Control

Which PDU format is used when bits are received from the network medium by the NIC of a host?

Frame

What happens to runt frames received by a Cisco Ethernet switch?

Frame is dropped

What is a characteristic of port-based memory buffering?

Frames are buffered in queues linked to specific ports

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP,TCP,IP, Ethernet

Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

A physical topology that is a variation or combination of a point-to-point, hub and spoke, or mesh topology is commonly known as a topology.

Hybrid

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

Implementing a Firewall installing antivirus software

Which two statements describe intermediary devices? (Choose two.)

Intermediary devices direct the path of the data. Intermediary devices connect individual hosts to the network.

What command can be used on a Windows PC to see the IP configuration of that computer?

Ipconfig

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Issue the reload command without saving the running configuration.

What are two services performed by the data link layer of the OSI model? (Choose two.)

It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection.

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

Which statement describes a hardware feature of a Cisco 1941 router that has the default hardware configuration?

It has two types of ports that can be used to access the console.

What is one advantage of using fiber optic cabling rather than copper cabling?

It is able to carry signals much further than copper cabeling

What is the Internet?

It provides connections through interconnected global networks.

What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?

LLC

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

Following default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Locate and load the startup-config file from NVRAM.

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)

Logical link control is implemented in software. The data link layer uses LLC to communicate with the upper layers of the protocol suite.

What is true concerning physical and logical topologies?

Logical topologies refer to how a network transfers data between devices.

Which method of data transfer allows information to be sent and received at the same time?

full duplex

What statement describes a characteristic of MAC addresses?

Must be globally unique

Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?

Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.

At which layer of the OSI model would a logical address be encapsulated?

Network Layer

What are two potential network problems that can result from ARP operation? (Choose two.)

On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?

PC2 will send an ARP reply with its MAC address.

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully.

What IPv4 header field identifies the upper layer protocol carried in the packet?

Protocol

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

RM-3-Switch-2A4 SwBranch799

A collision fragment, also known as a frame, is a frame of fewer than 64 bytes in length.

RUNT

Which type of connector does a network interface card use?

Rj-45

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

SSH

Open the PT Activity. The enable password on all devices is cisco. Perform the tasks in the activity instructions and then answer the question.

SW1 does not have a default gateway configured.

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

Security Interference coverage area

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

Segment

Refer to the exhibit. R1 receives a packet destined for the IP address 192.168.2.10. Out which interface will R1 forward the packet?

Serial0/0/1

ARP is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses.

Spoofing

Which characteristic describes an IPv6 enhancement over IPv4?

The IPv6 header is simpler than the IPv4 header is, which improves packet handling.

A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?

The PC was preconfigured to use DHCP.

Which statement is true about the TCP/IP and OSI models?

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM.

What are two characteristics of RAM on a Cisco device? (Choose two.)

The configuration that is actively running on the device is stored in RAM. The contents of RAM are lost during a power cycle.

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI.

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts in other networks.

What is the function of the kernel of an operating software?

The kernel provisions hardware resources to meet software requirements.

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

The switch can be remotely managed. One device is attached to a physical interface. The default SVI has been configured.

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

The switch will forward the frame to all ports except port 4.

As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?

The transmitting node inserts start and stop bits into the frame.

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

if there is connectivity with the destination device

Refer to the exhibit. What is wrong with the displayed termination?

The untwisted length of each wire is too long

Which statement describes the treatment of ARP requests on the local link?

They are received and processed by every device on the local network.

Which statement is correct about network protocols?

They define how messages are exchanged between the source and the destination.

What are two functions of end devices on a network? (Choose two.)

They originate the data that flows through the network. They are the interface between humans and the communication network.

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?

Time-to-Live

What is the aim of an ARP spoofing attack?

To associate IP addresses to wrong MAC addresses

When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.

True

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Use the console port to locally access the switch from a serial or USB interface of the PC.

A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?

User Exec Mode

Which interface is the default SVI on a Cisco switch?

VLAN 1

What are two types of router interfaces? (Choose two.)

WAN LAN

What is a characteristic of a converged network?

it delivers data, voice, and video over the same network infrastructure

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

line console 0 login password cisco

Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?

only hosts B, C, and router R1

What are two examples of hybrid topologies? (Choose two.)

partial mesh extended star

On a Cisco switch, memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports.

port-based

What are proprietary protocols?

protocols developed by organizations who have control over their definition and operation

What routing table entry has a next hop address associated with a destination network?

remote routes

Which switching method uses the CRC value in a frame?

store-and-forward

What type of network must a home user access in order to do online shopping?

the Internet

Which characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications among many hosts?

the ability to operate without regard to the data that is carried in each packet

What is the definition of bandwidth?

the amount of data that can flow from one place to another in a given amount of time

Which information does the show startup-config command display?

the contents of the saved configuration file in the NVRAM

Which characteristic describes crosstalk?

the distortion of the transmitted messages from signals carried in adjacent wires

What two criteria are used to help select a network medium from various network media? (Choose two.)

the environment where the selected medium is to be installed he distance the selected medium can successfully carry a signal

Which characteristic describes the default gateway of a host computer?

the logical address of the router interface on the same network as the host computer

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

What addressing information is recorded by a switch to build its MAC address table?

the source Layer 2 address of incoming frames

Which interface allows remote management of a Layer 2 switch?

the switch virtual interface

What is the purpose of the startup configuration file on a Cisco router?

to contain the commands that are used to initially configure a router on startup

Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?

to display a message when a user accesses the switch

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

Why is it important to configure a hostname on a device?

to identify the device during remote access (SSH or telnet)

What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)

to identify where the frame starts and ends to distinguish data bits from control bits

What is a role of the Logical Link Control sublayer?

to mark frames to identify the network layer protocol being carried

What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs

What type of network traffic requires QoS?

video conferencing

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

wireless LAN


Ensembles d'études connexes

Chapter_3_Linux Operating System

View Set

CNO Practice Standard: Confidentiality and Privacy

View Set

Teaching and Learning/Patient Education

View Set

Ethos/Pathos/Logos in Patrick Henry's Speech to the Virginia Convention

View Set