CST 230 MIDTERM EXAM

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What involves the use of personal tools and devices for accessing resources on a business or campus network? Wireless Network BYOD Cloud computing BYOB

BYOD

Which of the following is a valid MAC address? 192.168.12.15 192.168.12.15 C0-34-FF-15-01-8E 83-5A-5B-0B-31-55-F1 255.255.255.0

C0-34-FF-15-01-8E

Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated? Cat5 CAT5e CAT3 CAT6

CAT6

What application layer protocol is part of the TCP/IP protocol suite? NAT PPP DNS ARP

DNS

Which internet service uses PPPoE? Fiber Internet Provider Wireless Internet Provider DSL Internet Provider Cable Internet Provider

DSL Internet Provider

The fast food chain Wendy's has come out with a RPG game called what?

Feast of Legends

Which is the best device to deploy if you want to protect your private network from a public untrusted network? Gateway Hub Router Firewall

Firewall

Which of the following devices does not segment the network? Firewall Switch Hub Router

Hub

Which statement describe intermediary devices? Intermediary devices initiate the encapsulation process. Intermediary devices alter data content. Intermediary devices generate data content. Intermediary devices connect individual hosts to the network.

Intermediary devices connect individual hosts to the network.

Which statement is true about the running configuration file in a Cisco IOS device? It is automatically saved when the router reboots. It is stored in NVRAM. It affects the operation of the device immediately when modified. It should be deleted using the erase running-config command. Next

It affects the operation of the device immediately when modified.

What is one advantage of using fiber optic cabling rather than copper cabling? It is able to carry signals much farther than copper cabling. It is easier to terminate and install than copper cabling. It is usually cheaper than copper cabling. It is able to be installed around sharp bends.

It is able to carry signals much farther than copper cabling.

At which layer of the OSI model do hubs operate? Layer 4 Layer 2 Layer 1 Layer 3

Layer 1

A switch is associated with which OSI model layer? Layer 4 Layer 2 Layer 1 Layer 3

Layer 2

At which OSI layer does a router operate to forward network messages? Layer 1 Layer 4 Layer 3 Layer 5

Layer 3

At which of the following OSI layers does a router operate? Layer 3 Layer 2 Layer 1 Layer 4

Layer 3

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? data link session application transport

data link

Which address does a NIC use when deciding whether to accept a frame? destination MAC address destination IP address source MAC address source IP address

destination MAC address

Which characteristic describes crosstalk? distortion of transmitted messages from signals carried in adjacent wires weakening of the network signal over long cable lengths loss of wireless signal over excessive distance from the access point distortion of the network signal from fluorescent lighting

distortion of transmitted messages from signals carried in adjacent wires

What process is used to place one message inside another message for transfer from the source to the destination? flow control encoding encapsulation decoding

encapsulation

What is contained in the trailer of a data-link frame? logical address error detection data physical address

error detection

Which command or key combination allows a user to return to the previous level in the command hierarchy? ctrl-z end exit shift + 6

exit

What is an example of a hybrid topology? extended star point-to-point hub and spoke full mesh

extended star

Which PDU format is used when bits are received from the network medium by the NIC of a host? packet segment frame file

frame

Which method of data transfer allows information to be sent and received at the same time? half duplex simplex full duplex multiplex

full duplex

Which information does the show startup-config command display?​ the contents of the current running configuration file in the RAM the bootstrap program in the ROM the IOS image copied into RAM the contents of the saved configuration file in the NVRAM

the contents of the saved configuration file in the NVRAM

At which layer of the OSI model would a logical address be added during encapsulation? Network Data Link Physical Transport

Network

Type of cable to use in HVAC Areas? Plenum Rated PVC Jacketed Cables STP STP Cables

Plenum Rated

Which of the following cables offers the best protection against EMI? CAT5 CAT5e RJ-6 CAT6

RJ-6

Which type of connector does a network interface card use? RJ11 Serial RJ45 PS2

RJ45

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model? Segment frame Packet Bits

Segment

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart? Fibere-Channel Dual-mode Multi-mode Single-mode

Single-mode

Which host name follows the guidelines for naming conventions on Cisco IOS devices? Branch2! SwBranch799 HO Floor 17 Floor(15)

SwBranch799

Which term describes the state of a network when the demand on the network resources exceeds the available capacity? synchronization convergence optimization congestion

congestion

A network admin is implementing a policy that requires strong, complex passwords. Which data protection goal is this? data redundancy data quality data integrity data confidentiality

data confidentiality

Which device sends signals from a computer onto a network? Cable Router Gateway Transceiver

Transceiver

Which interface is the default SVI on a Cisco switch? GigabitEthernet 0/1 FastEthernet 0/1 VLAN 99 VLAN1

VLAN1

What type of network traffic requires QoS? Email Wiki Online Shopping Video Conferencing

Video Conferencing

When would you typically use an RJ11 connector? When using Cat 3 cables When connecting a phone to a phone line When connecting a phone to a phone When using RG-6 cables When using Cat 5 or higher cables When using Cat 5 or higher cables

When connecting a phone to a phone line When connecting a phone to a phone

Why are two strands of fiber used for a single fiber optic connection? increase the speed at which the data can travel. allow for full-duplex connectivity. prevent crosstalk from causing interference on the connection. two strands allow data to travel for longer distances without degrading

allow for full-duplex connectivity.

Which device performs the function of determining the path that messages should take through internetworks? a. DSL Modem b. Router c. Firewall d. Web Server

b. Router

What type of communication will send a message to all devices on a local area network? unicast multicast allcast broadcast

broadcast

What security violation would cause the most amount of damage to the life of a home user? replication of worms and viruses in your computer capturing of personal data that leads to identity theft denial of service to your email server spyware that leads to spam emails

capturing of personal data that leads to identity theft

What command can be used on a Windows PC to see the IP configuration of that computer? show interfaces ping ipconfig hopcount -a

ipconfig

What are three characteristics of a peer-to-peer network? scalable better device performance when acting as both client and server lacks centralized administration better security

lacks centralized administration

What is a role of the Logical Link Control sublayer? mark frames to identify the network layer protocol being carried provide data link layer addressing provide access to various Layer 1 network technologies define the media access processes performed by network hardware

mark frames to identify the network layer protocol being carried

What is indicated by the term throughput? guaranteed data transfer rate offered by an ISP measure of the usable data transferred across the media measure of the bits transferred across the media over a given period capacity of a particular medium to carry data

measure of the bits transferred across the media over a given period

Which expression accurately defines the term bandwidth? method of limiting the impact of a hardware or software failure measure of the data carrying capacity of the media state where the demand on the network exceeds the available capacity set of techniques to manage the utilization of network resources

measure of the data carrying capacity of the media

What is a function of end devices on a network? direct data over alternate paths in the event of link failures. provide the channel over which the network message travels. originate the data that flows through the network. filter the flow of data to enhance security.

originate the data that flows through the network.

What is the Internet? It provides network access for mobile devices. network based on Ethernet technology. private network for an organization with LAN and WAN connections. provides connections through interconnected global networks.

provides connections through interconnected global networks.

Which interface allows remote management of a Layer 2 switch? the console port interface the first Ethernet port interface the AUX interface the switch virtual interface

the switch virtual interface

A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command? to display a message when a user accesses the switch the message will display when a user enters the enable command configure switch SW1 so that only the users in the Admin group can telnet force users of the Admin group to enter a password for authentication

to display a message when a user accesses the switch

Why would a Layer 2 switch need an IP address? to enable the switch to receive frames from attached PCs to enable the switch to function as a default gateway to enable the switch to send broadcast frames to attached PCs to enable the switch to be managed remotely

to enable the switch to be managed remotely

Why is it important to configure a hostname on a device? to identify the device during remote access (SSH or telnet) Cisco router or switch only begins to operate when its hostname is set to allow local access to the device through the console port a hostname must be configured before any other parameters

to identify the device during remote access (SSH or telnet)


संबंधित स्टडी सेट्स

Chapter 6: Consumer Attitude Formation and Change

View Set

Math 115 Chapter 7-1 Estimating a Population Proportion

View Set

Grammar: Present Simple, Present Continuous, Present Perfect Simple, Present Perfect Continuous

View Set

Home Inspection Ch. 07: Electrical Systems

View Set

Oral Pathology exam 3 (CH 8 AND 9)

View Set

Unintentional Injury and Trauma (MVA)

View Set

Positive symptoms for Schizophrenia

View Set