CT210 Mid term
What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?
64 bytes
What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)
64 bytes 1518 bytes
What is an advantage of network devices using open standard protocols?
A client host and a server running different operating systems can successfully exchange data.
Which statement describes the use of powerline networking technology?
A device connects to an existing home LAN using an adapter and an existing electrical outlet.
Which statement describes a characteristic of cloud computing?
Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.
Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?
BYOD
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
DHCP DNS FTP
Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)
DSL cable
Which statement describes an extended star topology?
End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
Which destination address is used in an ARP request frame?
FFFF.FFFF.FFFF
What is a characteristic of port-based memory buffering?
Frames are buffered in queues linked to specific ports.
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, Ethernet
Which two statements describe intermediary devices? (Choose two.)
Intermediary devices direct the path of the data. Intermediary devices connect individual hosts to the network.
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration.
What are two services performed by the data link layer of the OSI model? (Choose two.)
It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection.
What statement describes Ethernet?
It defines the most common LAN type in the world.
How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords that are stored in router or switch configuration files.
What is one advantage of using fiber optic cabling rather than copper cabling?
It is able to carry signals much farther than copper cabling.
What is the Internet?
It provides connections through interconnected global networks.
The ARP table in a switch maps which two types of address together?
Layer 3 address to a Layer 2 address
Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)
Logical link control is implemented in software. the upper layers of the protocol suite.
What is true concerning physical and logical topologies?
Logical topologies refer to how a network transfers data between devices.*
What are two potential network problems that can result from ARP operation? (Choose two.)
On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
What is an advantage of using standards to develop and implement protocols?
Products from different manufacturers can interoperate successfully.
Which type of connector does a network interface card use?
RJ-45
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)
RM-3-Switch-2A4 SwBranch799
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
SSH
Which statement is true about the TCP/IP and OSI models?
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
Which statement is true about MAC addresses?
The first three bytes are used by the vendor assigned OUI.
What happens to runt frames received by a Cisco Ethernet switch?
The frame is dropped.
What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts in other networks.
What is the function of the kernel of an operating software?
The kernel provisions hardware resources to meet software requirements.
As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?
The transmitting node inserts start and stop bits into the frame.
Why are two strands of fiber used for a single fiber optic connection?
They allow for full-duplex connectivity.
Which statement is correct about network protocols?
They define how messages are exchanged between the source and the destination.
What statement describes a characteristic of MAC addresses?
They must be globally unique.
What are two functions of end devices on a network? (Choose two.)
They originate the data that flows through the network. They are the interface between humans and the communication network.
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Use the console port to locally access the switch from a serial or USB interface of the PC.
What is auto-MDIX?
a feature that detects Ethernet cable type
Which expression accurately defines the term bandwidth?
a measure of the data carrying capacity of the media
Which device performs the function of determining the path that messages should take through internetworks?
a router
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
an intranet
Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)
application presentation session
What type of communication will send a message to all devices on a local area network?
broadcast
What security violation would cause the most amount of damage to the life of a home user?
capturing of personal data that leads to identity theft
Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
cellular satellite
Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
congestion
A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?
data confidentiality
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
data link
Which address does a NIC use when deciding whether to accept a frame?
destination MAC address
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
displaying a list of all available commands within the current mode determining which option, keyword, or argument is available for the entered command*
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
easy to create lacks centralized administration less cost to implement
What process is used to place one message inside another message for transfer from the source to the destination?
encapsulation
What is contained in the trailer of a data-link frame?
error detection
Use the console port to locally access the switch from a serial or USB interface of the PC.
exit
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
flow control
Which PDU format is used when bits are received from the network medium by the NIC of a host?
frame
Which method of data transfer allows information to be sent and received at the same time?
full duplex
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)
implementing a firewall installing antivirus software
What is a characteristic of a converged network?
it delivers data, voice, and video over the same network infrastructure
At which layer of the OSI model would a logical address be encapsulated?
network layer
What are proprietary protocols?
protocols developed by organizations who have control over their definition and operation
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
security interference coverage area
Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
segment
Which switching method uses the CRC value in a frame?
store-and-forward
What type of network must a home user access in order to do online shopping?
the Internet
What is the definition of bandwidth?
the amount of data that can flow from one place to another in a given amount of time
Which information does the show startup-config command display?
the contents of the saved configuration file in the NVRAM
What two criteria are used to help select a network medium from various network media? (Choose two.)
the distance the selected medium can successfully carry a signal he environment where the selected medium is to be installed
Which characteristic describes crosstalk?
the distortion of the transmitted messages from signals carried in adjacent wires
Which characteristic describes the default gateway of a host computer?
the logical address of the router interface on the same network as the host computer
What is indicated by the term throughput?
the measure of the bits transferred across the media over a given period of time
What addressing information is recorded by a switch to build its MAC address table?
the source Layer 2 address of incoming frames
What is the aim of an ARP spoofing attack?
to associate IP addresses to the wrong MAC address
What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)
to distinguish data bits from control bits to identify where the frame starts and ends
Why is it important to configure a hostname on a device?
to identify the device during remote access (SSH or telnet)
What is a role of the Logical Link Control sublayer?
to mark frames to identify the network layer protocol being carried
What is the function of the CRC value that is found in the FCS field of a frame?
to verify the integrity of the received frame
What technique is used with UTP cable to help protect against signal interference from crosstalk?
twisting the wires together into pairs
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
user EXEC mode
What type of network traffic requires QoS?
video conferencing