Cisco Mod 1-3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Switch Virtual Interface Configuration

# interface vlan 1 # ip address ______________ # no shutdown

Privileged EXEC mode (#)

-Accessed by entering the enable command -Identified by a prompt ending with the # character

Global configuration mode (config)#

-Changes made affect the operation of the device as a whole -Accessed by entering the configure terminal command

Name three modes or interfaces that can be protected with passwords:

-Privileged EXEC mode (#) -Console interface -VTY Interface

ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process?

-ServerB will generate a frame with the destination MAC address of RouterB -ServerB will generate a packet with the destination IP address of HostA

User EXEC mode (>)

-The first entrance into the CLI of an IOS device -Limited number of basic monitoring commands

Communications Protocols

-all communications are governed by protocols -rules that communications will follow -rules vary depending on protocol

Scalability

-expand the network without degrading the service for existing users

The two characteristics of RAM:

-it is volatile memory. it loses all of its content when the device is powered off or restarted -it stores the configuration that is actively running on the device

Security

-protect the network from unauthorized access

Fault tolerance

-provide redundant links and devices

Device Names Rules

-start with a letter -no spaces -end with a letter or digit -letters, digits, dashes only -less than 64 characters

A user is implementing security on a small office network. Which 2 actions would provide the minimum security requirements for this network?

1. Implement a firewall 2. Install antivirus software

What is an advantage of network devices using open standard protocols?

A client host and a server running different operating systems can successfully exchange data

What is an advantage of network devices using open standard protocols?

A client host and server running different operating systems can successfully exchange data

The intranet

A private collection of LANs and WANs internal to an organization that is meant to be accessible only to organization members or others with authorization.

Which device performs the function of determining the path that messages should take through internetworks?

A router

Ctrl+Shift+6

All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.

SVI (Switch Virtual Interface)

Allows remote management of a Layer 2 switch

Exit

Allows the user to return to the previous hiearchy level

BOYD (Bring Your Own Device)

Allows users to use their own devices giving them more opportunities and greater flexibility.

The extranet

An organization that provides secure access to their network for individuals who work for a different organization that need access to their data on their network.

At which OSI layer is data added to a PDU during the encapsulation process?

Application

Peer-to-peer networks

Both clients and servers.

What term describes a computing model where server software runs on dedicated computers?

Client server

What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device?

Cloud

Tab

Completes a partial command name entry

PDU (Protocol Data Unit)

Data Segment (Ports) Packet (IP Address) Frame (Mac address) Bits

At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?

Data link

At which OSI layer is a source MAC added to a PDU during the encapsulation process?

Data link

Encapsulation (SENT)

Data, TCP, IP, Ethernet

Internet

Determines the best path through the network

Access method

Determines when someone can send a message

SOHO

Enables computer within a home or remote office to connect to a corporate network. (Small Office/Home Office)

Any other key

Ends the display string, returning to privileged EXEC mode

Backspace

Erases the character to the left of the cursor

Secure shell

Establishes a secure remote CLI connection to a device, through a virtual interface, over a network (Recommended method for remote connection)

Telnet

Establishes an insecure CLI connection to a device over the network (Insecure bc passwords are in plaintext)

Encapsulation (RECEIVED)

Ethernet, IP, TCP, Data

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

Ethernet, IP, TCP, HTTP

Network Architecture

Fault Tolerance Quality of Service Scalability Security

What three applications layer protocols are part of the TCP/IP protocol suite?

HTTP DNS DHCP FTP

IP address

Internet protocol address

In the show running-config command, which part of the syntax is represented by running-config?

Key word

LAN

Local Area Network

Response timeout

Manages how long a device waits when it does not hear a reply from the destination

Flow control

Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered

Left Arrow (Ctrl+B)

Moves the cursor one character to the left

Right Arrow (Ctrl+F)

Moves the cursor one character to the right

At which OSI layer is a destination IP address added to a PDU during the encapsulation process?

Network

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

Network

TCP/IP Model

Network access Internet Transport Application

Broadcast (IPv4)

One to all

Multicast

One to many, typically not all

Unicast

One to one communication

OSI Model

Physical Data link Network Transport Session Presentation Application - Please Do Not Throw Sausage Pizza Away

What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

QOS (Quality of Service)

Up Arrow (Ctrl+P)

Recalls the commands in the history buffer, beginning with the most recent commands

Application

Represents data to the user, plus encoding and dialog control

Network access

Represents data to the user, plus encoding and dialog control

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so patients can see medical records data of other patients. Which of the four network characteristics is violated?

Security

Transport

Supports communication between various devices across diverse networks

What two criteria are used to help select a network medium from various network media?

The distance the selected medium can successfully carry a signal. The environment where the selected medium is to be installed.

After making configuration changes on a cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

The new configuration (RAM -> NVRAM)

Encapsulation

The process where protocols add their information to the data

startup-config & running-config

The two system files that store the device configuration

(config)# service password-encryption

To encrypt plaintext passwords (then, show running-config to check)

copy running-config startup-config

To save changes made to the running configuration to the startup configuration file

At which ODI layer is a source port number added to a PDU during the encapsulation process?

Transport

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

Transport

At which OSI layer is a source port number added to a PDU during the encapsulation process?

Transport

Powerline networking

Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet by sending data on certain frequencies.

Quality of service

Voice and live video (high priority) transmissions require higher expectations for those services being delivered.

Ctrl+C or Ctrl+Z

When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode

WAN

Wide Area Network

VTY Password Configuration

line vty 0 15 password cisco login end


संबंधित स्टडी सेट्स

Chemistry - Semester 2 Final Exam Review

View Set

Innovation and Technological Management

View Set

Chapter 9- Advanced Business Quiz

View Set

Chapter 1 - Peace & Development

View Set

Adult Three Exam Two Practice Questions

View Set