CST230 - Midterm
What involves the use of personal tools and devices for accessing resources on a business or campus network?
BYOD
Which of the following is a valid MAC address?
C0-34-FF-15-01-8E
zQuiz Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated?
CAT 6
Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
Congestion
What application layer protocol is part of the TCP/IP protocol suite?
DNS
Which internet service uses PPPoE
DSL Internet Provider
A network admin is implementing a policy that requires strong, complex passwords. Which data protection goal is this?
Data confidentiality
Which is the best device to deploy if you want to protect your private network from a public untrusted network?
Firewall
Which of the following devices does not segment the network?
Hub
Which statement describe intermediary devices?
Intermediary devices connect individual hosts to the network.
What type of network must a home user access in order to do online shopping?
Internet
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified.
What is one advantage of using fiber optic cabling rather than copper cabling?
It is able to carry signals much farther than copper cabling.
What are three characteristics of a peer-to-peer network
Lacks central administration
At which layer of the OSI model do hubs operate?
Layer 1 - Physical Layer
A switch is associated with which OSI model layer?
Layer 2 - Data Link Layer
At which OSI layer does a router operate to forward network messages?
Layer 3 - Network Layer
At which of the following OSI layers does a router operate?
Layer 3- Network layer
At which layer of the OSI model would a logical address be added during encapsulation?
Network
Type of cable to use in HVAC Areas?
Plenum Rated
Which of the following cables offers the best protection against EMI?
RJ-6
Which type of connector does a network interface card use?
RJ45
Which device performs the function of determining the path that messages should take through internetworks?
Router
Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
Segment
Which type of optical fiber is normally used to connect two buildings that are several kilometers apart?
Single-mode
Which host name follows the guidelines for naming conventions on Cisco IOS devices?
SwBranch799
Which device sends signals from a computer onto a network?
Transceiver
Which interface is the default SVI on a Cisco switch?
VLAN1
When would you typically use an RJ11 connector?
When connecting a phone to a phone line When connecting a phone to a phone
Why are two strands of fiber used for a single fiber optic connection?
allow for full-duplex connectivity.
What type of communication will send a message to all devices on a local area network?
broadcast
What security violation would cause the most amount of damage to the life of a home user?
capturing of personal data that leads to identity theft
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
data link
Which address does a NIC use when deciding whether to accept a frame?
destination MAC address
Which characteristic describes crosstalk?
distortion of transmitted messages from signals carried in adjacent wires
What process is used to place one message inside another message for transfer from the source to the destination?
encapsulation
What is contained in the trailer of a data-link frame?
error detection
Which command or key combination allows a user to return to the previous level in the command hierarchy?
exit
What is an example of a hybrid topology?
extended star
Which PDU format is used when bits are received from the network medium by the NIC of a host?
frame
Which method of data transfer allows information to be sent and received at the same time?
full duplex
What command can be used on a Windows PC to see the IP configuration of that computer
ipconfig
What is a role of the Logical Link Control sublayer?
mark frames to identify the network layer protocol being carried
What is indicated by the term throughput?
measure of the bits transferred across the media over a given period
Which expression accurately defines the term bandwidth?
measure of the data carrying capacity of the media
What is a function of end devices on a network?
originate the data that flows through the network.
What is the Internet?
provides connections through interconnected global networks.
Which information does the show startup-config command display?
the contents of the saved configuration file in the NVRAM
Which interface allows remote management of a Layer 2 switch?
the switch virtual interface
Refer to the exhibit. What is wrong with the displayed termination?
the untwisted length of each wire is too long.
A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?
to display a message when a user accesses the switch
Why would a Layer 2 switch need an IP address?
to enable the switch to be managed remotely
Why is it important to configure a hostname on a device?
to identify the device during remote access (SSH or telnet)
What type of network traffic requires QoS?
video conferencing