Net Test 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Match the description with the media 1) STP 2) Wireless 3) Optical Fiber 4) Coaxial

1) Copper media used when there is interference 2) Provides the most mobility options 3) High speed and data over distances 4) Was used for TV Refer to curriculum topic: 4.2.1 UTP cables are used in wired office environments. Coaxial cables are used to connect cable modems and televisions. Fiber optics are used for high transmission speeds and to transfer data over long distances. STP cables are used in environments where there is a lot of interference.

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

1) It adds a header and trailer to form an OSI Layer 2 PDU. 2) It is responsible for Media Access Control. Refer to curriculum topic: 5.1.1 The MAC sublayer is the lower of the two data link sublayers and is closest to the physical layer. The two primary functions of the MAC sublayer are to encapsulate the data from the upper layer protocols and to control access to the media.

Matching: 1) hardware threats 2) environmental threats 3) electrical threats 4) maintenance threats

1) Physical damage to servers, routers, switches 2) Extreme temps (too hot/too cold) 3) Voltage spikes, unconditioned power, and brownouts 4) Lack of spare parts, poor cabling, poor wiring

Fill in the blank: On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represents the _________ MAC address.

Broadcast Refer to curriculum topic: 5.1.2 On Ethernet networks, the broadcast MAC address is 48 binary ones displayed as hexadecimal FF-FF-FF-FF-FF-FF.

When the store-and-forward method of switching is in use, what part of the Ethernet frame is used to perform an error check?

CRC in the trailer Refer to curriculum topic: 5.2.2 The cyclic redundancy check (CRC) part of the trailer is used to determine if the frame has been modified during transit.​ If the integrity of the frame is verified, the frame is forwarded. If the integrity of the frame cannot be verified, then the frame is dropped.

Which process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5?

DHCP Refer to curriculum topic: 11.4.3 When a Windows computer cannot communicate with an IPv4 DHCP server, the computer automatically assigns itself an IP address in the169.254.0.0/16 range. Linux and Apple computers do not automatically assign an IP address.

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems. Refer to curriculum topic: 11.2.3 Because worms take advantage of vulnerabilities in the system itself, the most effective way to mitigate worm attacks is to download security updates from the operating system vendor and patch all vulnerable systems.

Refer to the graphic. H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true?

H1 sends a unicast message to H2, and the switch forwards it directly to H2. Refer to curriculum topic: 5.2.1 Since H2 has just sent a broadcast message to all hosts, the MAC address for H2 is already in the switch MAC table. A unicast message from H1 to H2 will therefore be forwarded by the switch directly to H2.

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

It sends the frame to all ports except the port on which it received the frame. Refer to curriculum topic: 5.2.1 When a Layer 2 switch receives a frame with a broadcast destination address, it floods the frame to all ports except the port on which it received the frame.

Fill in the blank. The Ethernet ______ sublayer is responsible for communicating directly with the physical layer.

MAC Refer to curriculum topic: 5.1.1 Ethernet at the data link layer is divided into two sublayers - the MAC and the LLC sublayers. The LLC sublayer is responsible for communicating with the upper layers, and the MAC sublayer communicates directly with the physical layer.

Which statement describes a characteristic of the frame header fields of the data link layer?

They vary depending on protocols. Refer to curriculum topic: 4.4.4 All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However, the structure of the frame and the fields that are contained in the header vary according to the protocol. Different data link layer protocols may use different fields, like priority/quality of service, logical connection control, physical link control, flow control, and congestion control.

What type of address is 01-00-5E-0A-00-02?

an address that reaches a specific group of hosts Refer to curriculum topic: 5.1.2 The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal. It allows a source device to send a packet to a group of devices.

How should traffic flow be captured in order to best understand traffic patterns in a network?

during peak utilization times Refer to curriculum topic: 11.1.3 Capturing traffic during low utilization time will not give a good representation of the different traffic types. Because some traffic could be local to a particular segment, the capture must be done on different network segments.

What is one of the most effective security tools available for protecting users from external threats?

firewalls Refer to curriculum topic: 11.2.3 A firewall is one of the most effective security tools for protecting internal network users from external threats. A firewall resides between two or more networks, controls the traffic between them, and helps prevent unauthorized access. A host intrusion prevention system can help prevent outside intruders and should be used on all systems.

Which element of scaling a network involves identifying the physical and logical topologies?

network documentation Refer to curriculum topic: 11.1.3 To scale a network, several elements are required: Network documentation - physical and logical topology Device Inventory - list of devices that use or make up the network Budget - Itemized IT budget, including fiscal year equipment purchasing budget Traffic analysis - protocols, applications, and services and their respective traffic requirements should be documented

Fill in the blank. Network services use ______ to define a set of rules that govern how devices communicate and the data formats used in a network.

protocols Refer to curriculum topic: 11.1.2 Each application or network service uses protocols, which define the standards and data formats to be used. Without protocols, the data network would not have a common way to format and direct data.

What is the primary purpose of ARP?

resolve IPv4 addresses to MAC addresses

What type of cable is used to connect a workstation serial port to a Cisco router console port?

rollover Refer to curriculum topic: 4.2.2 UTP cable wire pairs can be terminated in different configurations for use in different applications. To use a UTP cable for consoling into a Cisco router from a PC serial port, it must be terminated as a rollover or console cable.

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

shared memory buffering Refer to curriculum topic: 5.2.2 With shared memory buffering, the number of frames stored in the buffer is restricted only by the of the entire memory buffer and not limited to a single port buffer. This permits larger frames to be transmitted with fewer dropped frames. This is important to asymmetric switching, which applies to this scenario, where frames are being exchanged between ports of different rates. With port-based memory buffering, frames are stored in queues that are linked to specific incoming and outgoing ports making it possible for a single frame to delay the transmission of all the frames in memory because of a busy destination port. Level 1 cache is memory used in a CPU. Fixed configuration refers to the port arrangement in switch hardware.

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

RT1 will send an ARP reply with its own Fa0/0 MAC address. Refer to curriculum topic: 5.3.2 When a network device has to communicate with a device on another network, it broadcasts an ARP request asking for the default gateway MAC address. The default gateway (RT1) unicasts an ARP reply with the Fa0/0 MAC address.

What is a characteristic of a WAN hub-and-spoke topology?

The branch sites are connected to a central site through point-to-point links.​ Refer to curriculum topic: 4.4.2 A hub-and-spoke topology is a WAN version of the star topology in which a central site interconnects branch sites using point-to-point links. A mesh topology requires that every end system be interconnected to every other system using point-to-point links. A partial mesh is a variation of this topology, where some but not all end devices are interconnected. There is no topology where all the sites have to have hub devices that are connected to a router.

Refer to the exhibit. What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1?

00-60-2F-3A-07-CC Refer to curriculum topic: 5.3.1 The destination MAC address is used for local delivery of Ethernet frames. The MAC (Layer 2) address changes at each network segment along the path. As the frame leaves the web server, it will be delivered by using the MAC address of the default gateway.

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

1) Console port 2) VTY port Refer to curriculum topic: 11.2.4 Executive timeouts allow the Cisco device to automatically disconnect users after they have been idle for the specified time. Console, vty, and aux ports can be configured with executive timeouts.

Match each type of frame field to its function. 1) addressing 2) error detection 3) type 4) frame start

1) Field that helps direct frame to destination. 2) Checks if the frame has been damaged. 3) Used by LLC to identify protocol used. 4) Beginning of the frame Refer to curriculum topic: 4.4.4 Place in the following order: error detection - This field checks if the frame has been damaged during the transfer. The second answer is not used. addressing - This field helps to direct the frame toward its destination. frame start - This field identifies the beginning of a frame. type - This field is used by the LLC to identify the Layer 3 protocol.

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

1) greater distances per cable run 2) durable connections 3) greater bandwidth potential

Which two factors influence the method that is used for media access control? (Choose two.)

1) how the connection between nodes appears to the data link layer 2) how nodes share the media Refer to curriculum topic: 4.4.1 The media access control method used depends on the topology (how the connection between the nodes appears to the data link layer), and how the nodes share the media. The type of data generated by end devices applications, the way signals are encoded by the NICs on end devices, and even the way the IP protocol forwards the packet through the network have no influence on the choice of the method used for media access control.

Refer to the exhibit. What is the maximum possible throughput between the PC and the server?

128 kbp/s Refer to curriculum topic: 4.1.3 The maximum throughput between any two nodes on a network is determined by the slowest link between those nodes.

What is the decimal equivalent of the hexadecimal value of 3F?

63 Refer to curriculum topic: 5.1.2 In order to convert a hexadecimal number to decimal, consider that the digit to the far right represents the 1s column where values 0 through F can appear. A hexadecimal value of A equals the decimal number 10. B equals 11, and so on through F equaling 15. The value of F in the number F equals 15. Next consider the value of 3 in the hexadecimal number of 3F. That place holder is the 16s column. Multiple the number 3 times 16 for a total of 48. Add 48 to 15 for the grand total of 63. Hexadecimal 3F equals a decimal value of 63.​

Fill in the blank using a number: The minimum Ethernet frame size is ______ bytes. Anything smaller than that should be considered a "runt frame."

64 Refer to curriculum topic: 5.1.1 Ethernet II and IEEE 802.3 standards define the minimum frame size as 64 bytes and the maximum as 1518 bytes.

Fill in the blank: The binary number 0000 1010 is ________ in hexadecimal.

A Refer to curriculum topic: 5.1.2 The binary number 0000 1010 can be expressed as 0A in hexadecimal.

What method is used to manage contention-based access on a wireless network?

CSMA/CA Refer to curriculum topic: 4.2.4 Carrier sense multiple access with collision avoidance (CSMA/CA) is used with wireless networking technology to mediate media contention. Carrier sense multiple access with collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media contention. Priority ordering and token passing are not used (or not a method) for media access control.

A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?

Extended Star Refer to curriculum topic: 4.4.3 An extended star topology is an example of a hybrid topology as additional switches are interconnected with other star topologies. A partial mesh topology is a common hybrid WAN topology. The bus and ring are not hybrid topology types.

Which method of data transfer allows information to be sent and received at the same time?

Full Duplex

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?

Have a second router that is connected to another ISP. Refer to curriculum topic: 11.1.1 Small networks generally have only one link to an ISP to establish a connection to the Internet. Problems can occur in the network, which can cause the disruption of this service. In order to keep connectivity, redundancy has to be provided. If the problem is in the router interface that is connected to the ISP, another interface can be activated on the router, so if one interface fails, traffic may be redirected toward the other interface. However, if the router itself fails, a second router that is connected to another ISP can be used as a backup.

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

ICMP Refer to curriculum topic: 11.3.2 Traceroute uses the ICMP (Internet Control Message Protocol) to send and receive echo-request and echo-reply messages.

Which statement correctly describes frame encoding?

It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits. Refer to curriculum topic: 4.1.3 Frame encoding converts a stream of data bits into a predefined code that is recognized by both the sender and receiver. These codes are used for a variety of purposes, such as distinguishing data bits from control bits, and identifying the beginning and end of a frame.

In fiber optic media, the signals are represented as patterns of ______

LIGHT Refer to curriculum topic: 4.1.2 In fiber optic media, the physical layer produces the representation and groupings of bits as patterns of light.

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 30 attempts 2 within 10 Refer to curriculum topic: 11.2.4 The correct syntax is RouterA(config)# login block-for (number of seconds) attempts (number of attempts) within (number of seconds).

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device needs mobility when connecting to the network. Refer to curriculum topic: 4.1.1 When the end-user devices need mobility to connect to the network, wireless is recommended. If an end-user device only has an Ethernet NIC, the user will only be able to use Ethernet cabling. If RFI is an issue, wireless is not recommended. An end-user device that requires a dedicated connection for performance would perform better with a dedicated Ethernet cable.

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

store-and-forward Refer to curriculum topic: 5.2.2 When the store-and-forward switching method is used, the switch receives the complete frame before forwarding it on to the destination. In contrast, a cut-through switch forwards the frame once the destination Layer 2 address is read.

Which is a function of the Logical Link Control (LLC) sublayer?

to identify which network layer protocol is being used Refer to curriculum topic: 4.3.1 Defining the media access processes that are performed by the hardware and providing data link layer addressing are functions of the MAC sublayer. The data link layer accepts Layer 3 packets and packages them into data units that are called frames.

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

tracert 10.1.1.5 Refer to curriculum topic: 11.3.2 The tracert command is used to initiate a trace from the command prompt on a Windows PC. The traceroute command is used to initiate a trace from a Cisco router or switch. Some other PC operating systems, such as Linux and Mac OS also use the traceroute command. The ping command does not display the network path to the remote host.

What is the purpose of the OSI physical layer?

transmitting bits across the local media Refer to curriculum topic: 4.1.2 The physical layer is responsible for transmitting the actual signals across the physical media as bits. Exchanging frames, controlling media access, and performing error detection are all functions of the data link layer.


Set pelajaran terkait

110 Irregular Verbs, Past Tense, Past Participle (with pics)

View Set

3DS Max- Study Questions-First Test

View Set

Financial Analysis - USCA MBA - CH4 SB

View Set

Ch 33: Agency Formation & Duties

View Set

Chapter 1: Introduction And How Cars Work

View Set

Microscopes - Light and Electron

View Set

What does it take to start an e-commerce business? (T)

View Set