CST230 - Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What involves the use of personal tools and devices for accessing resources on a business or campus network?

BYOD

Which of the following is a valid MAC address?

C0-34-FF-15-01-8E

zQuiz Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated?

CAT 6

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

Congestion

What application layer protocol is part of the TCP/IP protocol suite?

DNS

Which internet service uses PPPoE

DSL Internet Provider

A network admin is implementing a policy that requires strong, complex passwords. Which data protection goal is this?

Data confidentiality

Which is the best device to deploy if you want to protect your private network from a public untrusted network?

Firewall

Which of the following devices does not segment the network?

Hub

Which statement describe intermediary devices?

Intermediary devices connect individual hosts to the network.

What type of network must a home user access in order to do online shopping?

Internet

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

What is one advantage of using fiber optic cabling rather than copper cabling?

It is able to carry signals much farther than copper cabling.

What are three characteristics of a peer-to-peer network

Lacks central administration

At which layer of the OSI model do hubs operate?

Layer 1 - Physical Layer

A switch is associated with which OSI model layer?

Layer 2 - Data Link Layer

At which OSI layer does a router operate to forward network messages?

Layer 3 - Network Layer

At which of the following OSI layers does a router operate?

Layer 3- Network layer

At which layer of the OSI model would a logical address be added during encapsulation?

Network

Type of cable to use in HVAC Areas?

Plenum Rated

Which of the following cables offers the best protection against EMI?

RJ-6

Which type of connector does a network interface card use?

RJ45

Which device performs the function of determining the path that messages should take through internetworks?

Router

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

Segment

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart?

Single-mode

Which host name follows the guidelines for naming conventions on Cisco IOS devices?

SwBranch799

Which device sends signals from a computer onto a network?

Transceiver

Which interface is the default SVI on a Cisco switch?

VLAN1

When would you typically use an RJ11 connector?

When connecting a phone to a phone line When connecting a phone to a phone

Why are two strands of fiber used for a single fiber optic connection?

allow for full-duplex connectivity.

What type of communication will send a message to all devices on a local area network?

broadcast

What security violation would cause the most amount of damage to the life of a home user?

capturing of personal data that leads to identity theft

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

data link

Which address does a NIC use when deciding whether to accept a frame?

destination MAC address

Which characteristic describes crosstalk?

distortion of transmitted messages from signals carried in adjacent wires

What process is used to place one message inside another message for transfer from the source to the destination?

encapsulation

What is contained in the trailer of a data-link frame?

error detection

Which command or key combination allows a user to return to the previous level in the command hierarchy?

exit

What is an example of a hybrid topology?

extended star

Which PDU format is used when bits are received from the network medium by the NIC of a host?

frame

Which method of data transfer allows information to be sent and received at the same time?

full duplex

What command can be used on a Windows PC to see the IP configuration of that computer

ipconfig

What is a role of the Logical Link Control sublayer?

mark frames to identify the network layer protocol being carried

What is indicated by the term throughput?

measure of the bits transferred across the media over a given period

Which expression accurately defines the term bandwidth?

measure of the data carrying capacity of the media

What is a function of end devices on a network?

originate the data that flows through the network.

What is the Internet?

provides connections through interconnected global networks.

Which information does the show startup-config command display?​

the contents of the saved configuration file in the NVRAM

Which interface allows remote management of a Layer 2 switch?

the switch virtual interface

Refer to the exhibit. What is wrong with the displayed termination?

the untwisted length of each wire is too long.

A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?

to display a message when a user accesses the switch

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

Why is it important to configure a hostname on a device?

to identify the device during remote access (SSH or telnet)

What type of network traffic requires QoS?

video conferencing


Ensembles d'études connexes

Chapter 13 Special Phlebotomy Procedures

View Set

Astronomy II: Test II (practice questions, quiz questions, test questions)

View Set

Unit VIII GASTROINTESTINAL SYSTEM

View Set

Infants & Toddlers Ch 7: Supportive Communication w/ Fams and Colleagues

View Set

Chemistry Chapter 7 Ionic Bonding Test Review

View Set

Central Nervous System (Chapter 12)

View Set

Chapter 14: Introduction to Organic Chemistry

View Set