Midterm flashcards modules 1-10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? -(config)# enable password secret -(config)# enable secret Secret_Password -(config-line)# password secret -(config)# service password-encryption -(config)# enable secret Encrypted_Password

(config)# service password-encryption

Why is NAT not needed in IPv6? -Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​ -Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​ -The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​ -The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.​

-Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

What property of ARP causes cached IP-to-MAC mappings to remain in memory longer? -Entries in an ARP table are time-stamped and are purged after the timeout expires. -A static IP-to-MAC address entry can be entered manually into an ARP table. -The type field 0x806 appears in the header of the Ethernet frame. -The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.

-Entries in an ARP table are time-stamped and are purged after the timeout expires.

What are two potential network problems that can result from ARP operation? (Choose two.) -Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing. -On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. -Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. -Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network. -Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port.

-On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. -Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.

Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.) -ServerB will generate a packet with the destination IP address of RouterB. -ServerB will generate a frame with the destination MAC address of SwitchB. -ServerB will generate a packet with the destination IP address of RouterA. -ServerB will generate a frame with the destination MAC address of RouterB. -ServerB will generate a packet with the destination IP address of HostA. -ServerB will generate a frame with the destination MAC address of RouterA

-ServerB will generate a frame with the destination MAC address of RouterB. -ServerB will generate a packet with the destination IP address of HostA.

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) -greater distances per cable run -lower installation cost -limited susceptibility to EMI/RFI -durable connections -greater bandwidth potential -easily terminated

-greater distances per cable run -limited susceptibility to EMI/RFI -greater bandwidth potential

A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.) -the amount of traffic that is currently crossing the network -the sophistication of the encapsulation method applied to the data -the type of traffic that is crossing the network -the latency that is created by the number of network devices that the data is crossing -the bandwidth of the WAN connection to the Internet -the reliability of the gigabit Ethernet infrastructure of the backbone

-the amount of traffic that is currently crossing the network -the type of traffic that is crossing the network -the latency that is created by the number of network devices that the data is crossing

Refer to the exhibit. IMAGE What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1? 00-60-2F-3A-07-AA 00-60-2F-3A-07-BB 00-60-2F-3A-07-CC 00-60-2F-3A-07-DD

00-60-2F-3A-07-CC

Refer to the exhibit. IMAGE The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices? *1 - rollover, 2 - crossover, 3 - straight-through *1 - rollover, 2 - straight-through, 3 - crossover *1 - crossover, 2 - straight-through, 3 - rollover *1 - crossover, 2 - rollover, 3 - straight-through

1 - rollover, 2 - straight-through, 3 - crossover

HQ(config)# interface gi0/1 HQ(config-if)# description Connects to the Branch LAN HQ(config-if)# ip address 172.19.99.99 255.255.255.0 HQ(config-if)# no shutdown HQ(config-if)# interface gi0/0 HQ(config-if)# description Connects to the Store LAN HQ(config-if)# ip address 172.19.98.230 255.255.255.0 HQ(config-if)# no shutdown HQ(config-if)# interface s0/0/0 HQ(config-if)# description Connects to the ISP HQ(config-if)# ip address 10.98.99.254 255.255.255.0 HQ(config-if)# no shutdown HQ(config-if)# interface s0/0/1 HQ(config-if)# description Connects to the Head Office WAN HQ(config-if)# ip address 209.165.200.120 255.255.255.0 HQ(config-if)# no shutdown HQ(config-if)# end Refer to the exhibit. A network administrator is connecting a new host to the Store LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? 172.19.98.230 172.19.98.1 10.98.99.254 209.165.200.120 172.19.99.99

172.19.98.230

Refer to the exhibit. A user PC has successfully transmitted packets to www.cisco.com. Which IP address does the user PC target in order to forward its data off the local network? 172.24.255.17 172.24.1.22 172.20.0.254 172.24.255.4 172.20.1.18

172.20.0.254

What is the IP address of the switch virtual interface (SVI) on Switch0? Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. 192.168.5.10 192.168.10.5 192.168.10.1 192.168.5.0

192.168.5.10

What property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table? -A static IP-to-MAC address entry can be entered manually into an ARP table. -Entries in an ARP table are time-stamped and are purged after the timeout expires. -The type field 0x806 appears in the header of the Ethernet frame. -The port-to-MAC address table on a switch has the same entries as the ARP table on the switch

A static IP-to-MAC address entry can be entered manually into an ARP table.

Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer? neighbor table ARP cache routing table MAC address table

ARP cache

What happens when the transport input ssh command is entered on the switch vty lines? The SSH client on the switch is enabled. Communication between the switch and remote users is encrypted. The switch requires a username/password combination for remote access. The switch requires remote connections via a proprietary client software.

Communication between the switch and remote users is encrypted.

What is a basic characteristic of the IP protocol? Connectionless media dependent user data segmentation reliable end-to-end delivery

Connectionless

Match the situation with the appropriate use of network media. copper cable, fiber optic, wireless -backbone cabling in an enterprise -guest access in a coffee shop -horizontal cabling structure -waiting rooms in a hospital -desktop PCs in an enterprise office -long-haul networks

Copper Cables: -horizontal cabling structure -desktop PCs in an enterprise office Fiber Optic: -backbone cabling in an enterprise -long-haul networks Wireless: -guest access in a coffee shop -waiting rooms in a hospital

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.) Crosstalk bandwidth size of the network signal modulation technique electromagnetic interference

Crosstalk electromagnetic interference

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) -ARP -DHCP -DNS -FTP -NAT -PPP

DHCP DNS FTP

Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.) -transport -data link -session -network -physical

Data link Physical

What are three ways that media access control is used in networking? (Choose three.) -Ethernet utilizes CSMA/CD. -Media access control provides placement of data frames onto the media. -Contention-based access is also known as deterministic.802.11 utilizes CSMA/CD. -Data link layer protocols define the rules for access to different media. -Networks with controlled access have reduced performance due to data collisions.

Ethernet utilizes CSMA/CD. Media access control provides placement of data frames onto the media. Data link layer protocols define the rules for access to different media.

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? -Ethernet, IP, TCP, HTTP -HTTP, TCP, IP, Ethernet -Ethernet, TCP, IP, HTTP -HTTP, Ethernet, IP, TCP

Ethernet, IP, TCP, HTTP

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured? Reboot the device. Enter CTRL-Z at the privileged mode prompt. Exit global configuration mode. Power cycle the device. Exit privileged EXEC mode and press Enter.

Exit privileged EXEC mode and press Enter.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which port does Switch0 use to send frames to the host with the IPv4 address 10.1.1.5? Fa0/1 Fa0/5 Fa0/9 Fa0/11

Fa0/11

For the TCP/IP protocol suite, what is the correct order of events when a Telnet message is being prepared to be sent over the network? First, second, third, fourth -The IP header is added -The TCP header is added -The Ethernet header is added The Telnet-formatted data is provided to the next layer

First: The telent-formatted data is provided to the next layer Second: The TCP header is added Third: The IP header is added Fourth: The Ethernet header is added

Which two fields or features does Ethernet examine to determine if a received frame is passed to the data link layer or discarded by the NIC? (Choose two.) auto-MDIX CEF Frame Check Sequence minimum frame size source MAC address

Frame Check Sequence minimum frame size

Which statement describes a feature of the IP protocol? -IP encapsulation is modified based on network media. -IP relies on Layer 2 protocols for transmission error control. -MAC addresses are used during the IP packet encapsulation. -IP relies on upper layer services to handle situations of missing or out-of-order packets.

IP relies on upper layer services to handle situations of missing or out-of-order packets.

Match the description to the organization. (Not all options are used.) ISOC, ISO, EIA, IANA -This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for its Open Systems Interconnection (OSI) reference model. -This organization promotes the open development, evolution, and use of the Internet throughout the world. -This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers

ISOC - This organization promotes the open development, evolution, and use of the Internet throughout the world. ISO - This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for its Open Systems Interconnection (OSI) reference model. EIA - None IANA - This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers

Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.) -Implements a trailer to detect transmission errors. -Controls the NIC responsible for sending and receiving data on the physical medium. -Places information in the frame that identifies which network layer protocol is being used for the frame. -Adds Layer 2 control information to network protocol data. -Enables IPv4 and IPv6 to utilize the same network interface and media.

Implements a trailer to detect transmission errors. Controls the NIC responsible for sending and receiving data on the physical medium.

What function does pressing the Tab key have when entering a command in IOS? -It aborts the current command and returns to configuration mode. -It exits configuration mode and returns to user EXEC mode. -It moves the cursor to the beginning of the next line. -It completes the remainder of a partially typed word in a command.

It completes the remainder of a partially typed word in a command.

What is the auto-MDIX feature? -It enables a device to automatically configure an interface to use a straight-through or a crossover cable. -It enables a device to automatically configure the duplex settings of a segment. -It enables a device to automatically configure the speed of its interface. -It enables a switch to dynamically select the forwarding method.

It enables a device to automatically configure an interface to use a straight-through or a crossover cable.

What are two characteristics of fiber-optic cable? (Choose two.) -It is not affected by EMI or RFI. -Each pair of cables is wrapped in metallic foil. -It combines the technique of cancellation, shielding, and twisting to protect data. -It typically contains 4 pairs of fiber-optic wires. -It is more expensive than UTP cabling is.

It is not affected by EMI or RFI. It is more expensive than UTP cabling is.

Which two statements describe the services provided by the data link layer? (Choose two.) -It defines the end-to-end delivery addressing scheme. -It maintains the path between the source and destination devices during the data transmission. -It manages the access of frames to the network media. -It provides reliable delivery through link establishment and flow control. -It ensures that application data will be transmitted according to the prioritization. -It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.

It manages the access of frames to the network media. It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.

What is a characteristic of the LLC sublayer? -It provides the logical addressing required that identifies the device. -It provides delimitation of data according to the physical signaling requirements of the medium. -It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media. -It defines software processes that provide services to the physical layer.

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

What property of ARP allows hosts on a LAN to send traffic to remote networks? -Local hosts learn the MAC address of the default gateway. -The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. -The source MAC address appears in the header of the Ethernet frame. -The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.

Local hosts learn the MAC address of the default gateway.

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.) -Logical link control is implemented in software. -Logical link control is specified in the IEEE 802.3 standard. -The LLC sublayer adds a header and a trailer to the data. -The data link layer uses LLC to communicate with the upper layers of the protocol suite. -The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.

Logical link control is implemented in software. The data link layer uses LLC to communicate with the upper layers of the protocol suite.

What IPv4 header field identifies the upper layer protocol carried in the packet? Protocol Identification Version Differentiated Services

Protocol

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.) -Branch2! -RM-3-Switch-2A4 -Floor(15) -HO Floor 17 -SwBranch799

RM-3-Switch-2A4 SwBranch799

A network administrator requires access to manage routers and switches locally and remotely. Match the description to the access method. (Not all options are used.) SSH, Console, FTP, AUX, Telnet remote access via a dialup connection preferred out-of-band access method remote access method that uses encryption unsecure remote access

SSH: remote access method that uses encryption console:preferred out-of-band access method FTP: AUX: remote access via a dialup connection Telnet: unsecure remote access

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0SwitchA(config-if)# no shutdown What is the technician configuring? -Telnet access -SVI -password encryption -physical switchport access

SVI

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network? -Data is sent from the internet layer to the network access layer. -Packets are sent from the network access layer to the transport layer. -Segments are sent from the transport layer to the internet layer. -Frames are sent from the network access layer to the internet layer.

Segments are sent from the transport layer to the internet layer.

Which term describes a field in the IPv4 packet header used to limit the lifetime of a packet? TTL source IPv4 address protocol header checksum

TTL

What information does the loopback test provide? The TCP/IP stack on the device is working correctly. The device has end-to-end connectivity. DHCP is working correctly. The Ethernet cable is working correctly. The device has the correct IP address on the network.

The TCP/IP stack on the device is working correctly.

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? -The entire command, configure terminal, must be used. -The administrator is already in global configuration mode. -The administrator must first enter privileged EXEC mode before issuing the command. -The administrator must connect via the console port to access global configuration mode.

The administrator must first enter privileged EXEC mode before issuing the command.

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? The cable is not connected properly to the NIC. The computer has an invalid IP address. The computer has an incorrect subnet mask. The computer has an invalid default gateway address.

The computer has an invalid default gateway address.

A router boots and enters setup mode. What is the reason for this? The IOS image is corrupt. Cisco IOS is missing from flash memory. The configuration file is missing from NVRAM. The POST process has detected hardware failure.

The configuration file is missing from NVRAM.

What are two characteristics of RAM on a Cisco device? (Choose two.) -RAM provides nonvolatile storage. -The configuration that is actively running on the device is stored in RAM. -The contents of RAM are lost during a power cycle. -RAM is a component in Cisco switches but not in Cisco routers. -RAM is able to store multiple versions of IOS and configuration files.

The configuration that is actively running on the device is stored in RAM. The contents of RAM are lost during a power cycle.

What is the effect of using the Router# copy running-config startup-config command on a router? The contents of ROM will change. The contents of RAM will change. The contents of NVRAM will change. The contents of flash will change.

The contents of NVRAM will change.

What property of ARP causes the request to be flooded out all ports of a switch except for the port receiving the ARP request? -The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. -The type field 0x806 appears in the header of the Ethernet frame. -Entries in an ARP table are time-stamped and are purged after the timeout expires. -ARP replies are broadcast on the network when a host receives an ARP request.

The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.

What property of ARP forces all Ethernet NICs to process an ARP request? The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. The source MAC address appears in the header of the Ethernet frame. The type field 0x806 appears in the header of the Ethernet frame. ARP replies are broadcast on the network when a host receives an ARP request.

The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.

What will happen if the default gateway address is incorrectly configured on a host? The host cannot communicate with other hosts in the local network. The switch will not forward packets initiated by the host. The host will have to use ARP to determine the correct address of the default gateway. The host cannot communicate with hosts in other networks. A ping from the host to 127.0.0.1 would not be successful

The host cannot communicate with hosts in other networks.

A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.) -The link between the switches will work at the fastest speed that is supported by both switches. -The link between switches will work as full-duplex. -If both switches support different speeds, they will each work at their own fastest speed. -The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable. -The connection will not be possible unless the administrator changes the cable to a crossover cable. -The duplex capability has to be manually configured because it cannot be negotiated.

The link between the switches will work at the fastest speed that is supported by both switches. The link between switches will work as full-duplex. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command? -The new configuration will be stored in flash memory. -The new configuration will be loaded if the switch is restarted. -The current IOS file will be replaced with the newly configured file. -The configuration changes will be removed and the original configuration will be restored

The new configuration will be loaded if the switch is restarted.

What property of ARP causes a reply only to the source sending an ARP request? -The source MAC address appears in the header of the Ethernet frame. -The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. -The type field 0x806 appears in the header of the Ethernet frame. -ARP replies are broadcast on the network when a host receives an ARP request.

The source MAC address appears in the header of the Ethernet frame.

What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF? -The switch forwards it out all ports except the ingress port. -The switch shares the MAC address table entry with any connected switches. -The switch does not forward the frame. -The switch sends the frame to a connected router because the destination MAC address is not local.

The switch forwards it out all ports except the ingress port.

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame? The switch will discard the frame. The switch will forward the frame only to port 2. The switch will forward the frame to all ports except port 4. The switch will forward the frame to all ports. The switch will forward the frame only to ports 1 and 3.

The switch will forward the frame to all ports except port 4.

What property of ARP causes the NICs receiving an ARP request to pass the data portion of the Ethernet frame to the ARP process? -The type field 0x806 appears in the header of the Ethernet frame. -The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. -Entries in an ARP table are time-stamped and are purged after the timeout expires. -ARP replies are broadcast on the network when a host receives an ARP request.

The type field 0x806 appears in the header of the Ethernet frame.

Refer to the exhibit. IMAGE What is wrong with the displayed termination? -The woven copper braid should not have been removed. -The wrong type of connector is being used. -The untwisted length of each wire is too long. -The wires are too thick for the connector that is used.

The untwisted length of each wire is too long.

Which statement describes the treatment of ARP requests on the local link? They must be forwarded by all routers on the local network. They are received and processed by every device on the local network. They are dropped by all switches on the local network. They are received and processed only by the target device

They are received and processed by every device on the local network.

Which statement is correct about network protocols? -Network protocols define the type of hardware that is used and how it is mounted in racks. -They define how messages are exchanged between the source and the destination. -They all function in the network access layer of TCP/IP. -They are only required for exchange of messages between devices on remote networks.

They define how messages are exchanged between the source and the destination.

Which statement describes a characteristic of the frame header fields of the data link layer? -They all include the flow control and logical connection fields. -Ethernet frame header fields contain Layer 3 source and destination addresses. -They vary depending on protocols. -They include information on user applications.

They vary depending on protocols.

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly? Time-to-Live Sequence Number Acknowledgment Number Differentiated Services

Time-to-Live

Refer to the graphic. IMAGE What type of cabling is shown? STP UTP coax fiber

UTP

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) -VTY interface -console interface -Ethernet interface -boot IOS mode -privileged EXEC mode -router configuration mode

VTY interface console interface privileged EXEC mode

Which device performs the function of determining the path that messages should take through internetworks? -a router -a firewall -a web server -a DSL modem

a router

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? -an intranet -the Internet -an extranet -a local area network

an intranet

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway? ipconfig /all route print netstat -r arp -a

arp -a

What term describes a computing model where server software runs on dedicated computers? -client/server -internet -intranet -extranet

client/server

Which two devices commonly affect wireless networks? (Choose two.) Blu-ray players home theaters cordless phones microwaves incandescent light bulbs external hard drives

cordless phones microwaves

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? source MAC address source IP address destination MAC address Ethernet type destination IP address

destination MAC address

What is one advantage that the IPv6 simplified header offers over IPv4? smaller-sized header little requirement for processing checksums smaller-sized source and destination IP addresses efficient packet handling

efficient packet handling

Which command or key combination allows a user to return to the previous level in the command hierarchy? -end -exit -Ctrl-Z -Ctrl-C

exit

Which switching method has the lowest level of latency? cut-through store-and-forward fragment-free fast-forward

fast-forward

What are two examples of the cut-through switching method? (Choose two.) store-and-forward switching fast-forward switching CRC switching fragment-free switching QOS switching

fast-forward switching fragment-free switching

What OSI physical layer term describes the physical medium that uses the propagation of light? fiber-optic cable goodput latency throughput

fiber-optic cable

Which PDU format is used when bits are received from the network medium by the NIC of a host? -file -frame -packet -segment

frame

Which advantage does the store-and-forward switching method have compared with the cut-through switching method? -collision detecting -frame error checking -faster frame forwarding -frame forwarding using IPv4 Layer 3 and 4 information

frame error checking

Which media communication type does not require media arbitration in the data link layer? deterministic half-duplex full-duplex controlled access

full-duplex

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.) -implementing a firewall -installing a wireless network -installing antivirus software -implementing an intrusion detection system -adding a dedicated intrusion prevention device

implementing a firewall installing antivirus software

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.) first mode, second mode, third mode, and final mode -interface configuration mode -privileged EXEC mode -line configuration mode -global configuration mode -user EXEC mode

interface configuration mode: none privileged EXEC mode: second mode line configuration mode : final mode global configuration mode: third mode user EXEC mode: first mode

What layer is responsible for routing messages through an internetwork in the TCP/IP model? -internet -transport -network access -session

internet

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode? -letmein -secretin -lineconin -linevtyin

lineconin

What does the term "attenuation" mean in data communication? -loss of signal strength as distance increases -time for a signal to reach its destination -leakage of signals from one cable pair to another -strengthening of a signal by a networking device

loss of signal strength as distance increases

Which two types of IPv6 messages are used in place of ARP for address resolution? anycast broadcast echo reply echo request neighbor solicitation neighbor advertisement

neighbor solicitation neighbor advertisement

At which layer of the OSI model would a logical address be added during encapsulation? -physical layer -data link layer -network layer -transport layer

network layer

Which two functions are primary functions of a router? (Choose two.) packet forwarding microsegmentation domain name resolution path selection flow control

packet forwarding path selection

A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites? mesh partial mesh hub and spoke point-to-point

partial mesh

What routing table entry has a next hop address associated with a destination network? directly-connected routes local routes remote routes C and L source routes

remote routes

What is a function of ARP? resolving MAC addresses to IPv4 addresses resolving port addresses to MAC addresses resolving MAC addresses to port addresses resolving IPv4 addresses to MAC addresses

resolving IPv4 addresses to MAC addresses

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond? -encapsulation -flow control -access method -response timeout

response timeout

What are two services provided by the OSI network layer? (Choose two.) performing error detection routing packets toward the destination encapsulating PDUs from the transport layer placement of frames on the media collision detection

routing packets toward the destination encapsulating PDUs from the transport layer

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation? fault tolerance scalability security Quality of Service (QoS) reliability

security

What three items are contained in an Ethernet header and trailer? (Choose three.) source IP address source MAC address destination IP address destination MAC address error-checking information

source MAC address destination MAC address error-checking information

Which switching method uses the CRC value in a frame? cut-through fast-forward fragment-free store-and-forward

store-and-forward

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame? cut-through switching store-and-forward switching fragment-free switching fast-forward switching

store-and-forward switching

Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply? the MAC address of S1 the MAC address of the G0/0 interface on R1 the MAC address of the G0/0 interface on R2 the MAC address of S2 the MAC address of File_server1

the MAC address of the G0/0 interface on R1

What is the auto-MDIX feature on a switch? -the automatic configuration of an interface for 10/100/1000 Mb/s operation -the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection -the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable -the ability to turn a switch interface on or off accordingly if an active connection is detected

the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection

Which interface allows remote management of a Layer 2 switch? -the AUX interface -the console port interface -the switch virtual interface -the first Ethernet port interface

the switch virtual interface

What is the aim of an ARP spoofing attack? to flood the network with ARP reply broadcasts to fill switch MAC address tables with bogus addresses to associate IP addresses to the wrong MAC address to overwhelm network hosts with ARP requests

to associate IP addresses to the wrong MAC address

Why would a Layer 2 switch need an IP address? -to enable the switch to send broadcast frames to attached PCs -to enable the switch to function as a default gateway -to enable the switch to be managed remotely -to enable the switch to receive frames from attached PCs

to enable the switch to be managed remotely

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? -to restart the ping process -to interrupt the ping process -to exit to a different configuration mode -to allow the user to complete the command

to interrupt the ping process

What are two functions of NVRAM? (Choose two.) to store the routing table to retain contents when power is removed to store the startup configuration file to contain the running configuration file to store the ARP table

to retain contents when power is removed to store the startup configuration file

What is the function of the CRC value that is found in the FCS field of a frame? -to verify the integrity of the received frame -to verify the physical address in the frame -to verify the logical address in the frame -to compute the checksum header for the data field in the frame

to verify the integrity of the received frame

Match the description with the associated IOS mode. (Not all options are used.)--- user Exec mode, privileged EXEC mode, global configuration mode -changes made affect the operation of the device as a whole -accessed by entering the enable command -identified by prompt ending with the # character -limited number of basic monitoring commands -accessed by entering the configure terminal command -the first entrance into the cLI of an IOS device -used to enable the password for vty lines

user EXEC mode: limited number of basic monitoring commands the first entrance into the cLI of an IOS device privileged EXEC mode: accessed by entering the enable command identified by prompt ending with the # character global configuration mode: changes made affect the operation of the device as a whole accessed by entering the configure terminal command

What are two actions performed by a Cisco switch? (Choose two.) -building a routing table that is based on the first IP address in the frame header -using the source MAC addresses of frames to build and maintain a MAC address table -forwarding frames with unknown destination IP addresses to the default gateway -utilizing the MAC address table to forward frames via the destination MAC address -examining the destination MAC address to add new entries to the MAC address table

using the source MAC addresses of frames to build and maintain a MAC address table utilizing the MAC address table to forward frames via the destination MAC address

Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100? version source IPv4 address protocol TTL

version


Ensembles d'études connexes

A1 & A8 (Engine Performance, Tune Up and Repair) Vocabulary

View Set

Client with Heart Failure (final)

View Set

DMV Permit Test Practice: New York 2021

View Set

Chapter 9: Network Risk Management

View Set

Review Chapter 7:4 Skeletal System

View Set

Chapter 8 Life Insurance Questions

View Set