ISAM - Networking Midterm
Which fields are contained within the IEEE Ethernet frame header? (Choose two) A. source and destination MAC Address B. source and destination network address C. source and destination MAC address and sourced and destination network address D. FCS field
A. source and destination MAC Address D. FCS field
What PPP protocol provides dynamic addressing, authentication, and multilink? A. NCP B. HDLC C. LCP D. X.25
C. LCP
Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 7
C. Layer 4
What does the command routerA(config)#1line cons 0 allow you to perform next? A. Set the telnet password B. shut down the router C. Set your console password D. Disable console connection
C. Set your console password
What is the main reason the OSI model was created? A. To create a layered model larger than the DoD model B. So application developers can change only one layer's protocols at a time C. So different networks could communicate D. So Cisco could use the model
C. So different networks could communicate
Segmentation of a data stream happens at which layer of the OSI model? A. Physical B. Data Link C. Network D. Transport
D. Transport
In a network with dozens of switches, how many root bridges would you have? A. 1 B. 2 C. 5 D. 12
A. 1
If you wanted to delete the configuration stored NVRAM, what would you type? A. erase startup B. erase nvram C. delete nvram D. erase running
A. erase startup
You have the following binary number: 10110111 What are the decimal and hexadecimal dquivalents? A. 69/0x2102 B. 183/B7 C. 173/A6 D.83/0 x C5
B. 183/B7
How many broadcast domains are created when you segment a network with a 12-port switch? A. 1 B. 2 C. 5 D. 12
A. 1
Which of the following is the valid host range for the subnet on which the IP address 192.168168.188 255.255.255.192 resides? A. 192.168.168.129-190 B. 192.168.168.129-191 C. 192.168.168.128-190 D. 192.168.168.129-192
A. 192.168.168.129-190
Which class of IP address has the most host addresses available by default? A. A B. B C. C D. A and B
A. A
Which of the following are types of flow control? (Choose all that apply) A. Buffering B. Cut-through C. Windowing D. Congestion avoidance E. VLANs
A. Buffering C. Windowing D. Congestion avoidance
Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet? (choose two) A. Half-duplex Ethernet operates in a shared collision domain B. Half-duplex Ethernet operates in a private collision domain C. Half duplex effective throughput-duplex Ethernet has a hi D. Half-duplex Ethernet has a lower effective throughput E. Half-duplex Ethernet operates in a private broadcast domain
A. Half-duplex Ethernet operates in a shared collision domain D. Half-duplex Ethernet has a lower effective throughput
Why does the data communication industry use the layered OSI reference model (Choose two)? A. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting B. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds C. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers D. It encourages industry standardization by defining what functions occur at each layer of the model E. It provides a framework by which changes in functionality in one layer require changes in other layers
A. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting D. It encourages industry standardization by defining what functions occur at each layer of the model
What protocol does PPP use to identify the Network layer protocol? A. NCP B. ISDN C. HDLC D. LCP
A. NCP
Which of the following describe router functions? (Choose all that apply) A. Packet switching B. Collision prevention C. Packet filtering D. Broadcast domain enlargement E. Internetwork communication F. Broadcast forwarding G. Path selection
A. Packet switching C. Packet filtering E. Internetwork communication G. Path selection
What are two main types of access control lists (ACL)s? (Choose 2) A. Standard B. IEEE C. Extended D. Specialized
A. Standard C. Extended
Which three statement are true about the operation of a full-duplex Ethernet network? A. There are no collisions in full duplex mode B. A dedicated switch port is required for each full duplex mode C. Ethernet hub ports are preconfigured for full duplex mode D. In a full duplex environment, the host network card must check for the availability of the network media before transmitting E. The host network card and the switch port must be capable of operating in full duplex mode
A. There are no collisions in full duplex mode B. A dedicated switch port is required for each full duplex mode E. The host network card and the switch port must be capable of operating in full duplex mode
Routers operate at layer ______. LAN switches operate at layer ______. Ethernet hubs operate at layer _____. Word processing operates at layer _____. A. 3,3,1,7 B. 3,2,1, none C. 3,2,1,7 D. 2,3,1,7 E. 3,3,2,none
B. 3,2,1, none
What type of RJ45 UTP cable is used between swtiches? A. straight-through B. Crossover cable C. Crossover with CSU/DSU D. Crossover with a router in between the two switches
B. Crossover cable
How often are BPDUs sent from a layer 2 device? A. Never B. Every 2 seconds C. Every 10 minutes D. Every 30 seconds
B. Every 2 seconds
Which protocol does Ping use? A. TCP B. ARP C. ICMP D. BootP
C. ICMP
How does a host on an Ethernet LAN know when to transmit after a collision has occurred? (Choose two) A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously B. In a CDSA/CD collision domain, stations must wait until the media is no in use before transmitting C. You can improve the CSMA/CD network by adding more hubs. D. After a collision, the station that detected the collision has first priority to resent the lost data E. After a collision, all station runs a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit date F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data
B. In a CDSA/CD collision domain, stations must wait until the media is no in use before transmitting E. After a collision, all station runs a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit date
Where is a hub specified in the OSI model? A. Session layer B. Physical layer C. Data Link Layer D. Application Layer
B. Physical layer
What does the passive command provide to dynamic routing protocols? A. Stops an interface from sending or receiving periodic dynamic updates B. Stops an interface from sending periodic dynamic updates but not from receiving updates C. Stops the router from receiving any dynamic updates D. Stops the router from sending any dynamic updates
B. Stops an interface from sending periodic dynamic updates but not from receiving updates
Which of the following types of connections can use full duplex? (Choose three.) A. Hub to hub B. Switch to switch C. Host to host D. Switch to hub E. Switch to host
B. Switch to switch C. Host to host E. Switch to host
Which protocol is used to send a destination network unknown message back to originating hosts? A. TCP B. ARP C. ICMP D. BootP
C. ICMP
What are two purposes for segmentation with a bridge? A. To add more broadcast domains B. To create more collision domains C. To add more bandwidth for users. D. To allow more broadcasts for users
B. To create more collision domains C. To add more bandwidth for users.
What command is used to create a backup configuration? A. copy running backup B. copy running-config startup-config C. config mem D. wr. mem
B. copy running-config startup-config
Which router command allows you to view the entire contents of all access lists? A. show all access-lists B. show access-lists C. show ip interface D. show interface
B. show access-lists
What command will display the line, protocol, DL CI, and LMI information of what interface? A. sh pvc B. show interface C. show frame-relay pvc D. show runn
B. show interface
What protocols are used to configure trunking on a switch? (Choose 2) A. VLAN trunking protocol B. VLAN C. 802.IQ D. A network that has only one entry and exit point
C. 802.IQ D. A network that has only one entry and exit point
What does a VLAN do? A. Acts as the fastest port to all servers B. Process multiple collision domains on one switch port C. Breaks up broadcast domains in a layer 2 switch internetwork D. Provides multiple broadcast domains within a single collision domain
C. Breaks up broadcast domains in a layer 2 switch internetwork
When data is encapsulated, which is the correct order? A. Data, frame, packet, segment, bit B. Segment, data, packet, frame, bit C. Data, segment, packet, frame, bit D. Data, segment, frame, packet, bit
C. Data, segment, packet, frame, bit
Which WLAN IEEE, specification allows up to 54Mbps at 2.4GHz? A. A B. B C. G D. N
C. G
Which layer 1 devices can be used to enlarge the area covered by a single LAN segment? (Choose 2) A. switch B. Nic C. Hub D. Repeater E. RJ45 receiver
C. Hub D. Repeater
What is the purpose of the flow control? A. To ensure that data is retransmitted if an acknowledgment is not received B. To reassemble segments in the correct order at the destination device C. To provide a means for the receiver to govern the amount of data sent by the sender D. To regulate the size of each segment
C. To provide a means for the receiver to govern the amount of data sent by the sender
Which protocol does DHCP use at the Transport layer? A. IP B. TCP C. UDP D. ARP
C. UDP
Which of the following commands will allow you to set your Telnet password on a Cisco route? A. line telnet 0 4 B. line aux 0 4 C. line vty 0 4 D. line con 0
C. line vty 0 4
Which command is used to determine if an IP access list is enabled on a particular interface? A. show access-lists B. show interface C. show ip interface D. show interface access-lists
C. show ip interface
How many collision domains are created when you segment a network with a 12-port switch? A. 1 B. 2 C. 5 D. 12
D. 12
How many is an IPv6 address? A. 32 bits B. 128 bytes C. 64 bits D. 128 bits
D. 128 bits
Where is a stub network? A. A network with more than one exit point B. A network with more than one exit and entry point C. A network with only one entry and no exit point D. A network that has only one entry and exit point
D. A network that has only one entry and exit point
A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session? A. Send a different source port number B. Restart the virtual circuit. C. Decrease the sequence number D. Decrease the window size
D. Decrease the window size
You want to implement a network medium that is not susceptile to EMI. Which type of cabling should you use? A. Thicknet coax B. Thinnet coax C. Category 5 UTP cable D. Fiber-optic cable
D. Fiber-optic cable
What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global internet? A. NAT B. Static C. Dynamic D. PAT
D. PAT
What type of RJ UTP cable do you use to connect a PC's COM port to a router or switch console port? A. Straight-through B. Crossover cable C. Crossover with a CDU/DSU D. Rolled
D. Rolled
Which of the following is true regarding VLANs? A. Two VLANs are configured by default on all Cisco switches B. VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed C. You should not have more than 10 switches in the same VTP domain D. VTP is used to send VLAN information to switches in a configured VTP domain
D. VTP is used to send VLAN information to switches in a configured VTP domain
To back up an IOS, what command will you use? A. backup IOS disk B. copy ios tftp C. copy tftp flash D. copy flash tftp
D. copy flash tftp
Which command is used to upgrade an IOS on a Cisco router? A. copy tftp run B. copy tftp start C. config net D. copy tftp flash
D. copy tftp flash
You have 10 users plugged into a hub running 10 Mbs half-duplex. there is a server connected to the switch running 10 Mps half duplex as well. How much bandwidth does each host have to the server? A. 100kbps B. 1Mbps C.2Mbps D.10Mbps
D.10Mbps
If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link? A. RouterA (config)#bandwidth 64 B. RouterA(config-if)#bandwidth 64000 C. RouterA(config)#clockrate 64000 D. RouterA(config-if)#clock rate 64 E. RouterA(config-if)#clock rate 64000
E. RouterA(config-if)#clock rate 64000