Cisco Networking 1
Bit Byte Gigabyte Kilobyte Megabyte Terabyte
Bit (A one or a zero) Byte (Eight bits) Gigabyte (Approximately 1 billion bytes) Kilobyte (Approximately 1 thousand bytes) Megabyte (Approximately 1 million bytes) Terabyte (Approximately 1 trillion bytes)
A small group of users connected in a small area (LAN) that are geographically separated from a corporate office. a. SOHO b. Branch Office c. Mobile Users d. corporate or Central Office
Branch Office
_______ services provide a temporary connection across a phone circuit. In networking, these services are typically used for backup of primary circuits and for temporary boosts of bandwidth. a. Dedicated Circuit b. Circuit-Switched Services c. Cell-Switched Services d. Packet-Switched Services
Circuit-Switched Services
There are two types of software components when it comes to networking software, what are they? _______ and _______.
Client and server
A _______ occurs when two pieces of data collide and they must be retransmitted.
Collision
Media types such as ____ or ____ cabling are needed to connect the computers and networking components so that information can be shared between components.
Copper or fiber
Where most users in an organization and their resources are located. a. SOHO b. Branch Office c. Mobile Users d. Corporate or Central Office
Corporate or Central Office
_______ is responsible for assigning IP address information automatically to systems on the network.
DHCP
_______ and _______ are responsible for moving information between the LAN and WAN
DSU and CSU
A router also includes a _______ (GWLR) setting that is used if the router does not have a route to the destination in its routing table.
Gateway of Last Resort
A hub is a ______ device.
Layer 1
A next-generation firewall (NGFW) is a _____ firewall that can inspect the application data and detect malicious packets
Layer 7
127.0.0.1 is called the _____ address in the networking industry.
Loop back
The MAC address is the ____ address burned into the network card.
Physical
Users working form a small or home office (a handful of people) a. SOHO b. Branch Office c. Mobile Users d. Corporate or Central Office
SOHO
FTP and TFTP are similar except for the fact that FTP uses ____ to authenticate and TFTP uses ____ and does not support authentication to communicate.
TCP and UDP
___ are used to connect multiple LANs together a. LAN b. MAN c. PAN d. WAN
WAN
A layer 3 switch perform all the functions of a layer 2 switch but it also has the adds functionality of ______________
being a router
Systems look at the _____ address in the frame to decide whether to process the data or discard it.
destination
Which of the following IP addresses is a class "C" address? a. 192.168.10.0 b. 10.168.10.0 c. 128.168.10.5 d. 1.2.3.4
192.168.10.0
How many bits do I need to turn on in order to create 8 networks? My IP address is 192.168.10.0 and my subnet mask is 255.255.255.224 a. 2 b. 3 c. 4 d. 5
3
An ________ is a device added to your network that enables wireless clients to connect to the network.
Access point
This service is responsible for assigning IP addresses to computer and devices when they connect to the network so that they can communicate with other systems on the network or surf the Internet a. HTTP server b. DNS server c. DHCP server d. File server
DHCP server
This service is responsible for resolving fully qualified domain named (FQDNs) to IP addresses. a. DHCP b. DNS c. HTTP d. File
DNS
What acronym resolves and IP address to a domain name? a. TCP b. UDP c. DNS d. PING
DNS
A ______ circuit is a permanent connection between two sites in which the bandwidth is dedicated to that company's use.
Dedicated
What does acronym DHCP stand for? a Dynamic Host Confusion Protocol b. Dynamic Host Cool Protocol c. Dynamic Host Configuration protocol d. Dynamic Host Congestion Protocol
Dynamic Host Configuration protocol
FTP stands for which of the following? a. File to people b. File Transfer Protocol c. File Tender Payment d. Feed The People
File Transfer Protocol
What two characteristic describe an FTP connection? (Choose two) a. A large file requires more than two connections between the client and the server to successfully download it. b. The server establishes the first connection with the client to control traffic that consists of server commands and client replies. c. Files can be downloaded from or uploaded to the server. d. The client needs to run a daemon program to establish an FTP connection with a server. e. The first connection established is for traffic control and the second connection is created to transfer a file.
Files can be downloaded from or uploaded to the server The first connection established is for traffic control and the second connection is created to transfer a file.
_____ control which traffic is allowed to enter a network or system and which traffic should be blocked.
Firewall
The protocol used to deliver web pages from a web server to a web browser is called _____. a. FTP b. SMTP c. POP3 d. HTTP
HTTP
Hubs, switches, routers, firewalls, wireless access points, modems, and channel service/date service units are networking _____
Hardwares
The channel service unit/data service unit is a device that enables and organization to connect a _____ from the ISP to the organization's router for access to and from a LAN or WAN.
High Speed Datalink
A _______ is an older network device that you hopefully do not encounter on your networks, because they have been replaced by the more effective and secure switches. a. Router b. D-Link Switch c. Hub d. Access Point
Hub
An _________ is a security device that monitors activity, logs any suspicious activity, and then takes some form of corrective action.
IPS (intrusion prevention system)
Which statement describes the physical topology for a LAN a. It depicts the addressing scheme that is employed in the LAN. b. It describes whether the LAN is a broadcast or token-passing network. c. It defines how hosts and network devices connect to the LAN. d. It shows the order in which hosts access the network.
It defines how hosts and network devices connect to the LAN.
Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? a. It is the IP address of the Router1 interface that connects the company to the Internet. b. It is the IP address of the Router1 interface that connects the PC1 LAN to Router1. c. It is the IP address of Switch1 that connects PC1 to other devices on the same LAN. d. It is the IP address of the ISP network device located in the cloud.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1
_____ are used to connect networking devices that reside in a close geographic area, such as a floor of a building, a building itself, or within a campus environment.
LAN
Users who connect to a network from any location, via LAN or WAN. a. SOHO b. Branch Office c. Mobile Users d. Corporate or Central Office
Mobile Users
Cell-switches service can provide the same features that dedicated circuits offer, such as having a dedicated link, but one of its advantages over dedicated circuits is that it enables a single device to connect to _____ devices on the same interface.
Multiple
The acronym NAT stands for
Network Address Translation
_____ is the Internet protocol for reading emails
POP3
The acronym PING stands for what? a. Packet Internet Gaming b. Packet Internet Golfer c. Packet Internet Goalie. d. Packet Internet Groper
Packet Internet Groper
________ services are similar to cell-switched services, except cell switched services switch fixed-length packets called cells and packet-switches services switch variable-length packets.
Packet-Switched
A ______ sends or routes data from one network to another until the data reaches its final destination.
Router
The router has a ______, which is a list of all the networks that it knows how to reach.
Routing table
Which of the following protocols is the protocol for sending e-mails? a. POP3 b. IMAP4 c. SMTP d. FTP
SMTP
______ is the protocol that is used to enable email software to send emails
SMTP
______ is the secure method of performing remote administration of a device on the network.
SSH
Packet filtering firewalls can filter traffic based on the ____ and _____ IP address, the source and destination port numbers and the protocols used.
Source and destination
A _____________ filters traffic based on source and destination IP addresses, the source and destination port numbers, and the protocol in use, but it also understands the context of a conversation and will not allow a packet through the firewall unless it suits a specific scenario.
Stateful Packet Inspection Firewall
The ____ acts as the central connectivity point for all devices on the network.
Switch
The CSU?DSU device handles signaling over the _____ link, sending data between your router and the service provider.
T1/T3
Which protocol requires and acknowledgment? a. UDP b. TCP c. DHCP d. TCP/IP
TCP
________ enables you to create a remote connection to a system, using the text-based interface of the system to perform remote administration.
Telnet
This command-line tool is used to test connectivity with another system. a. Ping b. Test c. Run d. Config
a. Ping
The demark, also knows the ______ is the point where the service provider's equipment connects to your building.
demarcation point
The term _____________ refers to the area between the connection into your building (from the service provider) and your company's communication equipment.
demark extensions
SSH _____ all communication including the username and password; it is designed as a secure replacement to telnet.
encrypts
The downfall of a simple packet filtering firewall is that it does not understand the context of the conversation, so it is easy for a _____ to craft a packet to pass through the firewall.
hacker