1. CCNA - Pre-assessment

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Link Control Protocol in the PPP stack provides negotiation of dynamic addressing, authentication and multilink.

What PPP protocol provides for dynamic addressing, authentication and multilink?

Standard and extended access control lists are used to configure security on a router.

What are the two main types of access control lists (ACLs)?

The command to to back up the configuration on a router is 'copy running-config startup-config'.

What command is used to create a backup configuration?

The 'show interface' command shows the line, protocol, DLCI and LMI information of an interface.

What command will display the line, protocol, DLCI and LMI information of an interface?

VLANs break up broadcast domains at Layer 2 level.

What does a VLAN do?

The 'passive' command, short for 'passive-interface', stops regular updates from being sent out an interface. However, the interface can still receive updates.

What does the 'passive' command provide to the RIP dynamic routing protocol?

The command 'line console 0' places you at a prompt where you can set your console user-mode password.

What does the command 'routerA(configure)#line cons 0' allow you to perform next?

Port Address Translation (PAT) allows a one-to-many approach to network address translation.

What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global internet?

Stub networks have only one connection to an internetwork. Default routes should normally be set on a stub network or network loops may occur, although there are exceptions.

What is a stub network?

The primary reason the OSI model was created was so that different networks could inter operate.

What is the main reason the OSI model was created?

User Datagram Protocol (UDP) is a connectionless network service at the Transport Layer, and DHCP uses this connectionless service.

Which protocol does DHCP use at the Transport Layer?

ICMP is the protocol at the Network layer that is used to send messages back to an originating router.

Which protocol is used to send a destination network unknown message back to the originating hosts?

'show access-lists' allows you to see the contents of all access lists.

Which router command allows you to see the entire contents of all access lists?

The command 'copy flash tftp' will prompt you to back up an existing file in flash to a tftp host.

To back up an IOS, what command will you use?

Each field in an IPv6 address is 16 bits long. A complete IPv6 address is a total of 128 bits.

Each field in an IPv6 address is how many bits long?

An IPv6 address is 128 bits long, whereas an IPv4 address is 32 bits long.

How long is an IPv6 address?

1 - by default, switches break up collision domains on a per-port basis but are one large broadcast domain.

How many broadcast domains are created when you segment a network with a 12-port switch?

12 - Layer 2 switching creates individual collision domains per port.

How many collision domains are created when you segment a network with a 12-port switch?

Every 2 seconds, BPDUs are sent out from all active bridge ports by default.

How often are BPDUs sent from a Layer 2 device?

The command 'erase startup-config' deletes the configuration stored in NVRAM.

If you wanted to delete the configuration stored in NVRAM, what would you type?

'clock rate 64000'. The 'clock rate' command is two words, and the line speed is in bps.

If your router is facilitating a CSU/DSU, which command would you use to provide the router with a 64000bps serial link?

The PDU encapsulation method defines how data is encoded as it goes through each layer of the TCP/IP model. Data is segmented at the Transport Layer, packets created at the Network Layer, frames at the Data Link Layer, and finally, the Physical Layer encodes the binary bits into a digital signal. So, segments, packets, frames, and bits.

The Protocol Data Unit Encapsulation (PDU) is completed in which order?

The port roles used within RSTP include discarding, learning and forwarding. The difference between 802.1d and RSTP is the discarding role.

The RSTP provides which new port role?

NCP - Network Control Protocol

What protocol does PPP use to identify the Network layer protocol?

ICMP is the protocol at the Network layer used to send echo requests and replies.

What protocol does Ping use?

802.1Q and ISL encapsulations are used to configure trunking on a port. VTP is only used to create VTP domains and send VLAN information across a trunk link.

What protocols are used to configure trunking on a switch? Name two.

Hubs generate electrical signals, which are specified at the Physical Layer.

Where is a hub specified in the OSI Model?

IEEE 802.11bg is in the 2.4GHz range, with a top speed of 54Mbps.

Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?

Class A addressing provides 24 bits for host addressing.

Which class of IPv4 addresses has the most host addresses by default?

The 'show ip interface' command will show you if any interfaces have outbound or inbound access lists set up.

Which command is used to determine if an IP access list is enabled on a particular interface?

The 'copy tftp flash' command places a new file into flash memory, which is the default location for Cisco IOS in routers.

Which command is used to upgrade an IOS on a Cisco router?

line vty 0 4

Which command will allow you to set your Telnet password on a Cisco router?

192.168.168.129 - .190 256 - 192 = 64, so 64 is our block size. Count in increments of 64 to find our subnet. 64, 128, 192. Subnet is 128, broadcast is 191 so valid range is from 129 - 190.

Which is the valid host range in which the IP address 192.168.168.188 255.255.255.192 resides?

D: Switches do not propagate VLAN information by default; you must configure the VTP domain for this to occur. VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a trunk link.

Which one of the following is true regarding VLANs? A. Two VLANs are configured by default on all Cisco switches. B. VLANs only work if you have a complete Cisco switched internet work. No off-brand switches are allowed. C. You should not have more than 10 switches in the same VTP domain. D. VTP is used to send VLAN information to switches in a configured VTP domain.


Set pelajaran terkait

The Peripheral Nervous System: Efferent Division

View Set

Chapter 1: Concepts and Trends in Healthcare

View Set

Business Management - Ch 14 - Exam 3

View Set

World History Finals Study Guide

View Set

14-Regulation of Bacterial Gene Transcription

View Set