Midterm ( 1-10 Quizzes)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which interface allows remote management of a Layer 2 switch? -the console port interface -the switch virtual interface -the AUX interface -the first Ethernet port interface

the switch virtual interface

Refer to the exhibit 75. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply? -the MAC address of the G0/0 interface on R1 -the MAC address of S2 -the MAC address of S1 -the MAC address of the G0/0 interface on R2 -the MAC address of File_server1

the MAC address of the G0/0 interface on R1

What is the purpose of the FCS field in a frame? -to determine if errors occurred in the transmission and reception -to verify the logical address of the sending node -to obtain the MAC address of the sending node -to compute the CRC header for the data field

to determine if errors occurred in the transmission and reception

What property of ARP causes the request to be flooded out all ports of a switch except for the port receiving the ARP request? -ARP replies are broadcast on the network when a host receives an ARP request. -Entries in an ARP table are time-stamped and are purged after the timeout expires. -The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. -The type field 0x806 appears in the header of the Ethernet frame.

The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.

What is a basic characteristic of the IP protocol? -media dependent -connectionless -user data segmentation -reliable end-to-end delivery

connectionless

What are two actions performed by a Cisco switch? (Choose two.) a)using the source MAC addresses of frames to build and maintain a MAC address table b)examining the destination MAC address to add new entries to the MAC address table c)utilizing the MAC address table to forward frames via the destination MAC address d)forwarding frames with unknown destination IP addresses to the default gateway e)building a routing table that is based on the first IP address in the frame header - a,c -b,c -a,d -c,d

a,c

What is one advantage that the IPv6 simplified header offers over IPv4? -smaller-sized source and destination IP addresses -smaller-sized header -efficient packet handling -little requirement for processing checksums

efficient packet handling

What is contained in the trailer of a data-link frame? -data -error detection -physical address -logical address

error detection

The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable. The connection will not be possible unless the administrator changes the cable to a crossover cable. If both switches support different speeds, they will each work at their own fastest speed. The duplex capability has to be manually configured because it cannot be negotiated. The link between switches will work as full-duplex. The link between the switches will work at the fastest speed that is supported by both switches. A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? -b,e,f -b,,d,f -a,b,d - a,e,f

- a,e,f

Refer to the exhibit 55. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?​ -1: rollover, 2: crossover, 3: straight-through -1 - rollover, 2 - straight-through, 3 - crossover -1 - crossover, 2 - rollover, 3 - straight-through -1 - crossover, 2 - straight-through, 3 - rollover

-1 - rollover, 2 - straight-through, 3 - crossover

Branch2! Floor(15) SwBranch799 RM-3-Switch-2A4 HO Floor 17 Which two host names follow the guidelines for naming conventions on Cisco IOS devices? -a, b -b, e -c, d -b, d

-c, d

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.) -crosstalk -bandwidth -signal modulation technique -electromagnetic interference -size of the network

-crosstalk -electromagnetic interference

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? -destination IP address -source IP address -source MAC address -Ethernet type -destination MAC address

-destination MAC address

What are two services provided by the OSI network layer? (Choose two.) -encapsulating PDUs from the transport layer -performing error detection -routing packets toward the destination -collision detection -placement of frames on the media

-encapsulating PDUs from the transport layer -routing packets toward the destination

How do you find the port the switch sends frames to?

-in cli ipconfig /all to find switch ip address -then type show mac address use ? if lost

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) -limited susceptibility to EMI/RFI -greater distances per cable run -easily terminated -durable connections -lower installation cost -greater bandwidth potential

-limited susceptibility to EMI/RFI -greater distances per cable run -greater bandwidth potential

Which statement describes the use of powerline networking technology? -New "smart" electrical cabling is used to extend an -existing home LAN. -Wireless access points use powerline adapters to distribute data through the home LAN. -A home LAN is installed without the use of physical cabling. -A device connects to an existing home LAN using an adapter and an existing electrical outlet.

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

What statement describes the function of the Address Resolution Protocol? -ARP is used to discover the IP address of any host on the local network. -ARP is used to discover the MAC address of any host on the local network. -ARP is used to discover the IP address of any host on a different network. -ARP is used to discover the MAC address of any host on a different network.

ARP is used to discover the MAC address of any host on the local network.

When the store-and-forward method of switching is in use, what part of the Ethernet frame is used to perform an error check? -protocol type in the header -destination MAC address in the header -CRC in the trailer -source MAC address in the header

CRC in the trailer

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? -HTTP, TCP, IP, Ethernet -Ethernet, IP, TCP, HTTP -HTTP, Ethernet, IP, TCP -Ethernet, TCP, IP, HTTP

Http, TCP, IP, Ethernet

What function does pressing the Tab key have when entering a command in IOS? -It completes the remainder of a partially typed word in a command. -It aborts the current command and returns to configuration mode. -It moves the cursor to the beginning of the next line. -It exits configuration mode and returns to user EXEC mode.

It completes the remainder of a partially typed word in a command.

Refer to the exhibit 85. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? -It is the IP address of the Router1 interface that connects the PC1 LAN to Router1. -It is the IP address of the ISP network device located in the cloud. -It is the IP address of the Router1 interface that connects the company to the Internet. -It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.

It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.

Switch1> config t % Invalid input detected An administrator is trying to configure the switch but receives the error message that is displayed above. What is the problem? -The administrator must connect via the console port to access global configuration mode. -The administrator is already in global configuration mode. -The administrator must first enter privileged EXEC mode before issuing the command. -The entire command, configure terminal , must be used.

The administrator must first enter privileged EXEC mode before issuing the command.

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly? -Acknowledgment Number -Sequence Number -Differentiated Services -Time to Live

Time to Live

In the show running-config command, which part of the syntax is represented by running-config ? -the command -a prompt -a variable -a keyword

a keyword

Which command or key combination allows a user to return to the previous level in the command hierarchy? -end -Ctrl-C -Ctrl-Z -exit

exit

Which switching method has the lowest level of latency? -fragment-free -cut-through -store-and-forward -fast-forward

fast-forward

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? -response timeout -flow control -access method -encapsulation

flow control

Which PDU format is used when bits are received from the network medium by the NIC of a host? -frame -packet -segment -file

frame

Which advantage does the store-and-forward switching method have compared with the cut-through switching method? -frame forwarding using IPv4 Layer 3 and 4 information -faster frame forwarding -collision detecting -frame error checking

frame error checking

What OSI physical layer term describes the amount of time, including delays, for data to travel from one point to another? -fiber-optic cable -air -copper cable -latency

latency

What layer is responsible for routing messages through an internetwork in the TCP/IP model? -session -network access -transport -internet

network access

A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites? -point-to-point -partial mesh -mesh -hub and spoke

partial mesh

What term describes a technology that allows devices to connect to the LAN using an electrical outlet? -internet -intranet -extranet -powerline networking

powerline networking

What IPv4 header field identifies the upper layer protocol carried in the packet? -Version -Protocol -Differentiated Services -Identification

protocol

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task? -port-based buffering -shared memory buffering -fixed configuration buffering -level 1 cache buffering

shared memory buffering

Which term describes a field in the IPv4 packet header that contains a 32-bit binary value associated with an interface on the sending device? -destination IPv4 address -TTL -source IPv4 address -protocol

source IPv4 address

Which two functions are primary functions of a router? (Choose two.) -microsegmentation -packet forwarding -flow control -path selection -domain name resolution

-packet forwarding -path selection

Floor(config)# interface gi0/1 Floor(config-if)# description Connects to the Registrar LAN Floor(config-if)# ip address 10.118.63.65 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface gi0/0 Floor(config-if)# description Connects to the Manager LAN Floor(config-if)# ip address 10.118.62.196 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface s0/0/0 Floor(config-if)# description Connects to the ISP Floor(config-if)# ip address 10.62.63.254 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface s0/0/1 Floor(config-if)# description Connects to the Head Office WAN Floor(config-if)# ip address 209.165.200.87 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# end Refer to the exhibit. A network administrator is connecting a new host to the Manager LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? -10.62.63.254 -10.118.62.1 -10.118.63.65 -10.118.62.196 -209.165.200.87

-10.118.62.196

Which destination address is used in an ARP request frame? -AAAA.AAAA.AAAA -0.0.0.0 -the physical address of the destination host -FFFF.FFFF.FFFF -255.255.255.255

-FFFF.FFFF.FFFF

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation? -Flow Label -Traffic Class -Next Header -Differentiated Services

-Flow label

Which statement describes a feature of the IP protocol? -IP relies on Layer 2 protocols for transmission error control. -MAC addresses are used during the IP packet encapsulation. -IP relies on upper layer services to handle situations of missing or out-of-order packets. -IP encapsulation is modified based on network media.

-IP relies on upper layer services to handle situations of missing or out-of-order packets.

What are two characteristics of fiber-optic cable? (Choose two.) -It typically contains 4 pairs of fiber-optic wires. Each pair of cables is wrapped in metallic foil. -It is not affected by EMI or RFI. -It combines the technique of cancellation, shielding, and twisting to protect data. -It is more expensive than UTP cabling is.

-It is not affected by EMI or RFI. -It is more expensive than UTP cabling is.

What are two potential network problems that can result from ARP operation? (Choose two.) -Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. -Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network. -On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. -Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port. -Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing

-Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. -On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.

How is SSH different from Telnet? -SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection. -SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet. -SSH makes connections over the network, whereas Telnet is for out-of-band access. -SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

-SSH makes connections over the network, whereas Telnet is for out-of-band access.

What is the effect of using the Router# copy running-config startup-config command on a router? -The contents of RAM will change. -The contents of NVRAM will change. -The contents of flash will change. -The contents of ROM will change.

-The contents of NVRAM will change.

What will happen if the default gateway address is incorrectly configured on a host? -A ping from the host to 127.0.0.1 would not be successful. -The host will have to use ARP to determine the correct address of the default gateway. -The host cannot communicate with hosts in other networks. -The switch will not forward packets initiated by the host. -The host cannot communicate with other hosts in the local network.

-The host cannot communicate with hosts in other networks.

How do hosts ensure that their packets are directed to the correct network destination? -They search in their own local routing table for a route to the network destination address and pass this information to the default gateway. -They always direct their packets to the default gateway, which will be responsible for the packet delivery. -They send a query packet to the default gateway asking for the best route. -They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​

-They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​

Which statement describes a characteristic of the frame header fields of the data link layer? -They include information on user applications. -They vary depending on protocols. -They all include the flow control and logical connection fields. -Ethernet frame header fields contain Layer 3 source and destination addresses.

-They vary depending on protocols.

Refer to exhibit 57. What type of cabling is shown? -UTP -coax -fiber -STP

-UTP

a)VTY interface b)privileged EXEC mode c)router configuration mode d)Ethernet interface e)boot IOS mode f)console interface g)Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the interfaces that can be protected with passwords? -a d e -b c d -a b f -c d e

-a b f

It is a special interface that allows connectivity by different types of media. It is associated with VLAN1 by default. It provides a means to remotely manage a switch. It is required to allow connectivity by any device at any location. It is designed as a security protocol to protect switch ports. It is not associated with any physical interface on a switch. Which are the characteristics of an SVI? -a, c, f -b, e, f -a, b, c -c, d, f

-b, e, f

a)auto-MDIX b)source MAC address c)Frame Check Sequence d)CEF e)minimum frame size Which two fields or features does Ethernet examine to determine if a received frame is passed to the data link layer or discarded by the NIC? -b c -d e -c e -a d

-c e

Which two types of IPv6 messages are used in place of ARP for address resolution?(choose two) -echo reply -neighbor solicitation -broadcast -anycast -neighbor advertisement -echo request

-neighbor solicitation -neighbor advertisement

A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.) -the amount of traffic that is currently crossing the network -the sophistication of the encapsulation method applied to the data -the type of traffic that is crossing the network -the latency that is created by the number of network devices that the data is crossing -the bandwidth of the WAN connection to the Internet -the reliability of the gigabit Ethernet infrastructure of the backbone

-the amount of traffic that is currently crossing the network -the type of traffic that is crossing the network -the latency that is created by the number of network devices that the data is crossing

With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs? -the magnetic field around the adjacent pairs of wire -the use of braided wire to shield the adjacent wire pairs -the collision caused by two nodes trying to use the media simultaneously -the reflection of the electrical wave back from the far end of the cable

-the magnetic field around the adjacent pairs of wire

What are two functions of NVRAM? (Choose two.) -to contain the running configuration file -to retain contents when power is removed -to store the startup configuration file -to store the ARP table -to store the routing table

-to retain contents when power is removed -to store the startup configuration file

Which is a multicast MAC address? (look at first 6 symbols) -01-00-5E-00-00-03 -FF-FF-FF-FF-FF-FF -00-26-0F-4B-00-3E -5C-26-0A-4B-19-3E

01-00-5E-00-03

Refer to the exhibit 89. A user PC has successfully transmitted packets to www.cisco.com. Which IP address does the user PC target in order to forward its data off the local network? -172.20.0.254 -172.20.1.18 -172.24.1.22 -172.24.255.17 -172.24.255.4

172.20.0.254

Which statement is true about the CSMA/CD access method that is used in Ethernet? -All network devices must listen before transmitting. -A jamming signal causes only devices that caused the collision to execute a backoff algorithm. -Devices involved in a collision get priority to transmit after the backoff period. -When a device hears a carrier signal and transmits, a collision cannot occur.

All network devices must listen before transmitting.

What happens when the transport input ssh command is entered on the switch vty lines? -The SSH client on the switch is enabled. -Communication between the switch and remote users is encrypted. -The switch requires remote connections via a proprietary client software. -The switch requires a username/password combination for remote access.

Communication between the switch and remote users is encrypted.

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network? -Segments are sent from the transport layer to the internet layer. -Data is sent from the internet layer to the network access layer. -Frames are sent from the network access layer to the internet layer. -Packets are sent from the network access layer to the transport layer.

Data is sent from the internet layer to the network access layer.

Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.) -Enables IPv4 and IPv6 to utilize the same network interface and media. -Integrates various physical technologies. -Implements a process to delimit fields within a Layer 2 frame. -Places information in the frame that identifies which network layer protocol is being used for the frame. -Controls the NIC responsible for sending and receiving data on the physical medium.

Enables IPv4 and IPv6 to utilize the same network interface and media. Places information in the frame that identifies which network layer protocol is being used for the frame.

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured? -Exit privileged EXEC mode and press Enter . -Power cycle the device. -Exit global configuration mode. -Enter CTRL-Z at the privileged mode prompt. -Reboot the device.

Exit privileged EXEC mode and press Enter .

Which two statements describe the services provided by the data link layer? (Choose two.) -It ensures that application data will be transmitted according to the prioritization. -It packages various Layer 3 PDUs into a frame format that is compatible with the network interface. -It provides reliable delivery through link establishment and flow control. -It defines the end-to-end delivery addressing scheme. -It maintains the path between the source and destination devices during the data transmission. -It manages the access of frames to the network media.

It packages various Layer 3 PDUs into a frame format that is compatible with the network interface. It manages the access of frames to the network media.

What is a characteristic of the LLC sublayer? -It provides the logical addressing required that identifies the device. -It provides delimitation of data according to the physical signaling requirements of the medium. -It defines software processes that provide services to the physical layer. -It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring? -Telnet access -physical switchport access -SVI -password encryption

SVI

Which statement describes the treatment of ARP requests on the local link? -They must be forwarded by all routers on the local network. -They are received and processed only by the target device. -They are received and processed by every device on the local network. -They are dropped by all switches on the local network.

They are received and processed by every device on the local network.

What is a characteristic of multicast messages? -They are sent to a select group of hosts. -They are sent to a single destination. -They must be acknowledged. -They are sent to all hosts on a network.

They are sent to a select group of hosts.

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command? -The new configuration will be stored in flash memory. -The new configuration will be loaded if the switch is restarted. -The current IOS file will be replaced with the newly configured file. -The configuration changes will be removed and the original configuration will be restored.

The new configuration will be stored in flash memory.

During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network? -The physical address is added. -An IP address is added. -The process port number is added. -The logical address is added.

The physical address is added.

What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF? -The switch does not forward the frame. -The switch refreshes the timer on that entry. -The switch sends the frame to a connected router because the destination MAC address is not local. -The switch forwards it out all ports except the ingress port.

The switch forwards it out all ports except the ingress port.

Refer to the exhibit 76. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame? -The switch will forward the frame to all ports except port 4. -The switch will discard the frame. -The switch will forward the frame only to ports 1 and 3. -The switch will forward the frame only to port 2. -The switch will forward the frame to all ports.

The switch will forward the frame to all ports except port 4.

Refer to exhibit 52. What is wrong with the displayed termination? -The untwisted length of each wire is too long. -The wires are too thick for the connector that is used. -The wrong type of connector is being used. -The woven copper braid should not have been removed.

The untwisted length of each wire is too long.

Which statement is correct about network protocols -They all function in the network access layer of TCP/IP. -Network protocols define the type of hardware that is used and how it is mounted in racks. -They define how messages are exchanged between the source and the destination. -They are only required for exchange of messages between devices on remote networks.

They define how messages are exchanged between the source and the destination.

Which device performs the function of determining the path that messages should take through internetworks? -a router -a web server -a firewall -a DSL modem

a router

What type of communication rule would best describe CSMA/CD? -message encapsulation -access method -flow control -message encoding

access method

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? -an intranet -the Internet -a local area network -an extranet

an intranet

At which OSI layer is a source port number added to a PDU during the encapsulation process? -network layer -transport layer -application layer -presentation layer

application layer

What are two examples of the cut-through switching method? (Choose two.) a)QOS switching b)fast-forward switching c)store-and-forward switching d)fragment-free switching e)CRC switching f)Navigation Bar -b,f -a,c -b,d -c,e

b,d

What process involves placing one PDU inside another PDU -encoding -segmentation -encapsulation -flow control

encapsulation

What is one advantage of using the cut-through switching method instead of the store-and-forward switching method? -provides the flexibility to support any mix of Ethernet speeds -has a positive impact on bandwidth by dropping most of the invalid frames -has a lower latency appropriate for high-performance computing applications​ -makes a fast forwarding decision based on the source MAC address of the frame

has a lower latency appropriate for high-performance computing applications​

What does the term "attenuation" mean in data communication? -loss of signal strength as distance increases -strengthening of a signal by a networking device -time for a signal to reach its destination -leakage of signals from one cable pair to another

loss of signal strength as distance increases

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond? -response timeout -encapsulation -access method -flow control

response timeout

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame? -fast-forward switching -store-and-forward switching -fragment-free switching -cut-through switching

store-and-forward switching

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address? -default gateway -subnet mask -DHCP server address -DNS server address

subnet mask

Which parameter does the router use to choose the path to the destination when there are multiple routes available? -the lower metric value that is associated with the destination network -the higher metric value that is associated with the destination network -the lower gateway IP address to get to the destination network -the higher gateway IP address to get to the destination network

the lower metric value that is associated with the destination network

Why would a Layer 2 switch need an IP address? -to enable the switch to send broadcast frames to attached PCs -to enable the switch to receive frames from attached PCs -to enable the switch to be managed remotely -to enable the switch to function as a default gateway

to enable the switch to be managed remotely

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? -to exit to a different configuration mode -to interrupt the ping process -to restart the ping process -to allow the user to complete the command

to interrupt the ping process


संबंधित स्टडी सेट्स

TMC test bank wrong questions 6-10/NBRC

View Set

Public Speaking final study guide

View Set

Chapter 4.2: Niches and Community Interactions

View Set

chapter 1 anatomy and physiology

View Set

Терапевтична стоматологія

View Set