ISAM - Networking Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which fields are contained within the IEEE Ethernet frame header? (Choose two) A. source and destination MAC Address B. source and destination network address C. source and destination MAC address and sourced and destination network address D. FCS field

A. source and destination MAC Address D. FCS field

What PPP protocol provides dynamic addressing, authentication, and multilink? A. NCP B. HDLC C. LCP D. X.25

C. LCP

Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 7

C. Layer 4

What does the command routerA(config)#1line cons 0 allow you to perform next? A. Set the telnet password B. shut down the router C. Set your console password D. Disable console connection

C. Set your console password

What is the main reason the OSI model was created? A. To create a layered model larger than the DoD model B. So application developers can change only one layer's protocols at a time C. So different networks could communicate D. So Cisco could use the model

C. So different networks could communicate

Segmentation of a data stream happens at which layer of the OSI model? A. Physical B. Data Link C. Network D. Transport

D. Transport

In a network with dozens of switches, how many root bridges would you have? A. 1 B. 2 C. 5 D. 12

A. 1

If you wanted to delete the configuration stored NVRAM, what would you type? A. erase startup B. erase nvram C. delete nvram D. erase running

A. erase startup

You have the following binary number: 10110111 What are the decimal and hexadecimal dquivalents? A. 69/0x2102 B. 183/B7 C. 173/A6 D.83/0 x C5

B. 183/B7

How many broadcast domains are created when you segment a network with a 12-port switch? A. 1 B. 2 C. 5 D. 12

A. 1

Which of the following is the valid host range for the subnet on which the IP address 192.168168.188 255.255.255.192 resides? A. 192.168.168.129-190 B. 192.168.168.129-191 C. 192.168.168.128-190 D. 192.168.168.129-192

A. 192.168.168.129-190

Which class of IP address has the most host addresses available by default? A. A B. B C. C D. A and B

A. A

Which of the following are types of flow control? (Choose all that apply) A. Buffering B. Cut-through C. Windowing D. Congestion avoidance E. VLANs

A. Buffering C. Windowing D. Congestion avoidance

Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet? (choose two) A. Half-duplex Ethernet operates in a shared collision domain B. Half-duplex Ethernet operates in a private collision domain C. Half duplex effective throughput-duplex Ethernet has a hi D. Half-duplex Ethernet has a lower effective throughput E. Half-duplex Ethernet operates in a private broadcast domain

A. Half-duplex Ethernet operates in a shared collision domain D. Half-duplex Ethernet has a lower effective throughput

Why does the data communication industry use the layered OSI reference model (Choose two)? A. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting B. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds C. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers D. It encourages industry standardization by defining what functions occur at each layer of the model E. It provides a framework by which changes in functionality in one layer require changes in other layers

A. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting D. It encourages industry standardization by defining what functions occur at each layer of the model

What protocol does PPP use to identify the Network layer protocol? A. NCP B. ISDN C. HDLC D. LCP

A. NCP

Which of the following describe router functions? (Choose all that apply) A. Packet switching B. Collision prevention C. Packet filtering D. Broadcast domain enlargement E. Internetwork communication F. Broadcast forwarding G. Path selection

A. Packet switching C. Packet filtering E. Internetwork communication G. Path selection

What are two main types of access control lists (ACL)s? (Choose 2) A. Standard B. IEEE C. Extended D. Specialized

A. Standard C. Extended

Which three statement are true about the operation of a full-duplex Ethernet network? A. There are no collisions in full duplex mode B. A dedicated switch port is required for each full duplex mode C. Ethernet hub ports are preconfigured for full duplex mode D. In a full duplex environment, the host network card must check for the availability of the network media before transmitting E. The host network card and the switch port must be capable of operating in full duplex mode

A. There are no collisions in full duplex mode B. A dedicated switch port is required for each full duplex mode E. The host network card and the switch port must be capable of operating in full duplex mode

Routers operate at layer ______. LAN switches operate at layer ______. Ethernet hubs operate at layer _____. Word processing operates at layer _____. A. 3,3,1,7 B. 3,2,1, none C. 3,2,1,7 D. 2,3,1,7 E. 3,3,2,none

B. 3,2,1, none

What type of RJ45 UTP cable is used between swtiches? A. straight-through B. Crossover cable C. Crossover with CSU/DSU D. Crossover with a router in between the two switches

B. Crossover cable

How often are BPDUs sent from a layer 2 device? A. Never B. Every 2 seconds C. Every 10 minutes D. Every 30 seconds

B. Every 2 seconds

Which protocol does Ping use? A. TCP B. ARP C. ICMP D. BootP

C. ICMP

How does a host on an Ethernet LAN know when to transmit after a collision has occurred? (Choose two) A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously B. In a CDSA/CD collision domain, stations must wait until the media is no in use before transmitting C. You can improve the CSMA/CD network by adding more hubs. D. After a collision, the station that detected the collision has first priority to resent the lost data E. After a collision, all station runs a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit date F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data

B. In a CDSA/CD collision domain, stations must wait until the media is no in use before transmitting E. After a collision, all station runs a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit date

Where is a hub specified in the OSI model? A. Session layer B. Physical layer C. Data Link Layer D. Application Layer

B. Physical layer

What does the passive command provide to dynamic routing protocols? A. Stops an interface from sending or receiving periodic dynamic updates B. Stops an interface from sending periodic dynamic updates but not from receiving updates C. Stops the router from receiving any dynamic updates D. Stops the router from sending any dynamic updates

B. Stops an interface from sending periodic dynamic updates but not from receiving updates

Which of the following types of connections can use full duplex? (Choose three.) A. Hub to hub B. Switch to switch C. Host to host D. Switch to hub E. Switch to host

B. Switch to switch C. Host to host E. Switch to host

Which protocol is used to send a destination network unknown message back to originating hosts? A. TCP B. ARP C. ICMP D. BootP

C. ICMP

What are two purposes for segmentation with a bridge? A. To add more broadcast domains B. To create more collision domains C. To add more bandwidth for users. D. To allow more broadcasts for users

B. To create more collision domains C. To add more bandwidth for users.

What command is used to create a backup configuration? A. copy running backup B. copy running-config startup-config C. config mem D. wr. mem

B. copy running-config startup-config

Which router command allows you to view the entire contents of all access lists? A. show all access-lists B. show access-lists C. show ip interface D. show interface

B. show access-lists

What command will display the line, protocol, DL CI, and LMI information of what interface? A. sh pvc B. show interface C. show frame-relay pvc D. show runn

B. show interface

What protocols are used to configure trunking on a switch? (Choose 2) A. VLAN trunking protocol B. VLAN C. 802.IQ D. A network that has only one entry and exit point

C. 802.IQ D. A network that has only one entry and exit point

What does a VLAN do? A. Acts as the fastest port to all servers B. Process multiple collision domains on one switch port C. Breaks up broadcast domains in a layer 2 switch internetwork D. Provides multiple broadcast domains within a single collision domain

C. Breaks up broadcast domains in a layer 2 switch internetwork

When data is encapsulated, which is the correct order? A. Data, frame, packet, segment, bit B. Segment, data, packet, frame, bit C. Data, segment, packet, frame, bit D. Data, segment, frame, packet, bit

C. Data, segment, packet, frame, bit

Which WLAN IEEE, specification allows up to 54Mbps at 2.4GHz? A. A B. B C. G D. N

C. G

Which layer 1 devices can be used to enlarge the area covered by a single LAN segment? (Choose 2) A. switch B. Nic C. Hub D. Repeater E. RJ45 receiver

C. Hub D. Repeater

What is the purpose of the flow control? A. To ensure that data is retransmitted if an acknowledgment is not received B. To reassemble segments in the correct order at the destination device C. To provide a means for the receiver to govern the amount of data sent by the sender D. To regulate the size of each segment

C. To provide a means for the receiver to govern the amount of data sent by the sender

Which protocol does DHCP use at the Transport layer? A. IP B. TCP C. UDP D. ARP

C. UDP

Which of the following commands will allow you to set your Telnet password on a Cisco route? A. line telnet 0 4 B. line aux 0 4 C. line vty 0 4 D. line con 0

C. line vty 0 4

Which command is used to determine if an IP access list is enabled on a particular interface? A. show access-lists B. show interface C. show ip interface D. show interface access-lists

C. show ip interface

How many collision domains are created when you segment a network with a 12-port switch? A. 1 B. 2 C. 5 D. 12

D. 12

How many is an IPv6 address? A. 32 bits B. 128 bytes C. 64 bits D. 128 bits

D. 128 bits

Where is a stub network? A. A network with more than one exit point B. A network with more than one exit and entry point C. A network with only one entry and no exit point D. A network that has only one entry and exit point

D. A network that has only one entry and exit point

A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session? A. Send a different source port number B. Restart the virtual circuit. C. Decrease the sequence number D. Decrease the window size

D. Decrease the window size

You want to implement a network medium that is not susceptile to EMI. Which type of cabling should you use? A. Thicknet coax B. Thinnet coax C. Category 5 UTP cable D. Fiber-optic cable

D. Fiber-optic cable

What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global internet? A. NAT B. Static C. Dynamic D. PAT

D. PAT

What type of RJ UTP cable do you use to connect a PC's COM port to a router or switch console port? A. Straight-through B. Crossover cable C. Crossover with a CDU/DSU D. Rolled

D. Rolled

Which of the following is true regarding VLANs? A. Two VLANs are configured by default on all Cisco switches B. VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed C. You should not have more than 10 switches in the same VTP domain D. VTP is used to send VLAN information to switches in a configured VTP domain

D. VTP is used to send VLAN information to switches in a configured VTP domain

To back up an IOS, what command will you use? A. backup IOS disk B. copy ios tftp C. copy tftp flash D. copy flash tftp

D. copy flash tftp

Which command is used to upgrade an IOS on a Cisco router? A. copy tftp run B. copy tftp start C. config net D. copy tftp flash

D. copy tftp flash

You have 10 users plugged into a hub running 10 Mbs half-duplex. there is a server connected to the switch running 10 Mps half duplex as well. How much bandwidth does each host have to the server? A. 100kbps B. 1Mbps C.2Mbps D.10Mbps

D.10Mbps

If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link? A. RouterA (config)#bandwidth 64 B. RouterA(config-if)#bandwidth 64000 C. RouterA(config)#clockrate 64000 D. RouterA(config-if)#clock rate 64 E. RouterA(config-if)#clock rate 64000

E. RouterA(config-if)#clock rate 64000


Ensembles d'études connexes

PHI2010-PHILOSOPHY AND YOU- Final

View Set

AP Econ Fall Final Review Unit 2

View Set

Plant and Animal Cells , Prokaryotic vs Eukaryotic Cells

View Set

Multipel Choice Test (April 2017, June 2016, March 2016)

View Set