Routers Quizzes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In the TCP/IP model, which layer defines the interface between software running on the computer and the network itself? Data link Internet Transport Application

Application

Which layer of the OSI model provides an interface between the network and the software running on a host machine? Application layer Presentation layer Session layer Transport layer Network layer Data link layer Physical layer

Application layer

In a formal URI, which component corresponds to a server's name in a web address? Path Scheme Protocol Authority

Authority

Assuming Auto-MDIX is not supported, which of these devices would require a straight-through cable when connecting to an Ethernet switch? A. Router B. Host C. Hub D. Bridge E. Switch

B. Host A. Router

When connecting a wire to a host FastEthernet interface, which pins are used for communications? A. Pins 3 and 6 to transmit B. Pins 1 and 2 to transmit C. Pins 1 and 2 to receive D. Pins 3 and 6 to receive E. Pins 1 and 2 for receive F. Pins 7 and 8 for transmit

B. Pins 1 and 2 to transmit D. Pins 3 and 6 to receive

You are trying to connect to your switch via the console port and are having trouble connecting to the switch. You check the setting for your terminal emulation program and find the following:PortCOM1Baud Rate300Data8ParityNoneStop1Flow ControlNoneWhich setting is incorrect, and what should it be set to? Port: com2 Flow Control: Xon/Xoff Parity: 1 Baud Rate: 9600

Baud Rate: 9600

Which of the following algorithms is used to control network access and handle collisions on the shared Ethernet network? DCAP CLNP CSMA/CD CSMA/CA

CSMA/CD

When STP has placed a port in the blocked state, this port ________. Will forward data frames but cannot receive them Will receive data frames but cannot forward them Will receive and forward data frames only Cannot receive or forward data frames

Cannot receive or forward data frames

What class of IPv4 address includes the first octet numbers from 192 to 223? Class E Class B Class D Class C Class A

Class C

Which classes defined for IPv4 are NOT used for unicast? Class B Class E Class D Class A Class C

Class E Class D

Which Cisco router command will enable you to alter the rate in which the router sends data out of a serial link? Clocking Clock rate Bandwidth Timing

Clock rate

You just unpacked a brand new Cisco 2960 switch. Which ports/interfaces are ready to connect to and be used to set up the switch? VTY fa0/1 AUX Console

Console

Which of the following fields in HDLC does not exist in Ethernet and is typically considered outmoded for modern links between routers? Control Address FCS Flag

Control

One of the primary goals of routing protocols is to reduce ________. Convergence time IPv4 address usage Connection jitter Serialization delay

Convergence time

When a collision occurs on a shared Ethernet network, what is the first step in recovery for the two computers in question? A. Do nothing until the line clears. B. Wait for the other computer to finish. C. Resend the last frame right away. D. Send a jamming signal.

D. Send a jamming signal.

Which protocol is used to translate a domain name to an IP address? ARP DNS DHCP RARP

DNS

What is the name of the Internet access technology typically deployed in homes that utilizes the existing telephone wiring and parts of the telephone network to deliver a high-speed connection? Cable Frame Relay Dial-up DSL MPLS

DSL

What is the name of the device that gives a customer a physical and data link high-speed connection onto the Internet via existing telephone wiring? DSL modem Router Cable modem Dial-up modem Ethernet switch

DSL modem

What is the name of the device that is typically located within a telephone company's central office (CO) and enables it to utilize existing telephone wiring for both normal telephone services and DSL? DSLAM CMTS DSL modem Telephone concentrator Class 5 switch

DSLAM

When connecting a router to an external CSU/DSU, which serial cable type is typically used? DCE RTS CTS DE DTE

DTE

When connecting to the Internet via a cable connection, how are the data speeds typically organized between the cable provider and the customer? Data from the provider to the customer is slower than data from the customer to the provider. Data from the provider to the customer is faster than data from the customer to the provider. The data rate depends on the time of day, sometimes faster in one direction, sometimes faster in the other direction. Data is spread equally in both directions.

Data from the provider to the customer is faster than data from the customer to the provider.

At which of the OSI model layers are rules defined that determine how a device can send data over a particular medium? Presentation Application Transport Network Data link

Data link

Which term can be used as an equivalent to default router? Default switch Default host Default gateway Default bridge

Default gateway

An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation. Octet Base 10 Decimal Dotted-decimal

Dotted-decimal

What name is given to the process of enclosing data with headers and trailers as the data is moved down the TCP/IP model? Condensing Encapsulation Encryption Inclosing

Encapsulation

Which of the following terms best describes the process of adding headers and possibly trailers to information for transit? Packets Encapsulation Data Linking Frames

Encapsulation

What term is used to describe a set of rules that are followed to ensure that devices can talk to each other and understand what each device is saying? Communications protocol Encryption scheme Encoding scheme Language agreement Data format

Encoding scheme

Which technology is commonly implemented inside a service provider's (SP) network and provides an Ethernet point-to-point connection between customer devices? Leased line EoMPLS ATM eBGP Frame Relay

EoMPLS

What is the name of a LAN device that provides many physical ports into which Ethernet cables can be connected? A. Ethernet switch B. Ethernet bridge C. Ethernet concentrator D. Ethernet repeater E. Ethernet router

Ethernet switch

Which field in the IEEE 802.3 Ethernet header provides a method for the receiving NIC to determine whether a frame experienced frame errors during transmission? CRC SFD Hash FCS Pad

FCS

A Cisco switch has four memory areas that store various files and the IOS. In which area is the IOS stored? NVRAM FLASH RAM ROM

FLASH

Given the following address table, which port would be used to forward a frame destined for 0200.2222.2222?Vlan Mac Address Type Ports---- ----------- -------- -----1 0200.1111.1111 DYNAMIC Fa0/11 0200.2222.2222 DYNAMIC Fa0/21 0200.3333.3333 DYNAMIC Fa0/31 0200.4444.4444 DYNAMIC Fa0/4 Fa0/1 Fa0/4 Fa0/2 Fa0/3

Fa0/2

Given the following address table, which port will NOT retransmit a frame received from 0200.3333.3333?Vlan Mac Address Type Ports---- ----------- -------- -----1 0200.1111.1111 DYNAMIC Fa0/11 0200.2222.2222 DYNAMIC Fa0/21 0200.3333.3333 DYNAMIC Fa0/31 0200.4444.4444 DYNAMIC Fa0/4 Fa0/1 Fa0/4 Fa0/3 Fa0/2

Fa0/3

Which part of the Ethernet address is assigned to vendors to identify the equipment manufactured by them? Last three bytes Second and third bytes First two bytes First three bytes Last byte

First three bytes

Which HDLC field is equivalent to the preamble in Ethernet? Address Flag FCS Control

Flag

The process of sending frames out all other interfaces, except the interface on which the frame arrived, is called ________. Flooding Replication Copying Forwarding

Flooding

What is the name of the data unit that is sent and received at the Ethernet data link layer? Frame Packet Section Bit Segment

Frame

The ________ command is the most frequently used within HTTP. HEAD GET POST PUT

GET

Which of the following is the mode that is active when the CLI prompt displays hostname(config-if)#? Global Line Interface VLAN

Global

Which of the following protocols are used to establish a point-to-point serial link? UDP TCP PPTP IP PPP H.323 HDLC

HDLC PPP

The ________ protocol is most often used to transfer web pages. MIME HTTP SSH HTML

HTTP

A ________ is typically used to access network devices because attempting to memorize individual IP addresses would be cumbersome. NIC name Static name Machine name Hostname

Hostname

Which IEEE standard defines the use of radio waves to communicate between wireless LAN nodes? IEEE 802.16 IEEE 802.3 IEEE 802.11 IEEE 802.5 IEEE 802.2

IEEE 802.11

What protocol standard is used when utilizing an Ethernet emulation point-to-point link? ISO 4507 IEEE 802.5 IEEE 802.3 IEEE 802.11 ISO 1431

IEEE 802.3

Which of the following is the correct term describing the middle of the Internet, owned by various Internet service providers and consisting of a complex network of networks? Internet core LAN WAN Internet access link

Internet core

What is the first step a router takes when it receives an Ethernet frame? It performs a lookup of the MAC address. It performs a lookup of the IP address. It determines whether the frame is unicast, multicast, or broadcast. It checks the integrity of the frame.

It checks the integrity of the frame.

Which of the following is an action that can be taken by a switch upon receiving a frame? It may forward the frame out of a selected port. It may retransmit the frame out of the port at which it was received. It may filter the frame and not send it out of a port. It may periodically retransmit the frame on all ports to assure receipt.

It may forward the frame out of a selected port. It may filter the frame and not send it out of a port.

What does it mean when an interface does NOT display configuration settings when using the show running-config and show startup-config commands? It means the interface is not active. It means the interface is configured the same as the following entry. It means the interface is configured the same as the previous entry. It means the configuration is running with default settings.

It means the configuration is running with default settings.

Which of the following is the mode that is activated in the CLI by the command line vty 0 15? Global Line Interface VLAN

Line

An Ethernet address is also commonly referred to as a ________ address. A. MAC B. IP C.Host D. Unicast E. CAM

MAC

What is the name of the device in a PC (or server) that connects it to a LAN network? PCI port DAC USB port NICSATA port

NIC

A Cisco switch has four area modules that store various files and the IOS. In which area module is the startup-configuration file stored? NVRAM FLASH RAM ROM

NVRAM

Which of the following protocols are enabled by default on a Cisco router for external users to access? Neither Telnet nor SSH Telnet Both Telnet and SSH SSH

Neither Telnet nor SSH

Which layer of the TCP/IP network model specifies how packets travel end to end over a TCP/IP network? Application Session Network Transport

Network

Which of the following layers in the OSI model corresponds to the Internet layer in the original TCP/IP model? Transport Application Physical Network

Network

Every image, video, audio, or animation within a web page is stored as a separate file called a(n) ________ on a web server. Element GUI iframe Object

Object

Which of the following actions will be taken when a port security violation takes place with the protect option enabled? Log and SNMP messages are sent. The interface is disabled. Offending traffic is discarded. The violation counter is incremented.

Offending traffic is discarded.

On a LAN RJ-45 connector, what name is given to the eight physical connections that make contact when connected? Pins Wires Threads Strands Crimps

Pins

Which technology enables a switch to control the number of MAC addresses that are allowed to send traffic through to a specific port? CBAC MAC Security DTP Port Security Layer 2 discard mode

Port Security

TCP and UDP are protocols working at the transport layer of the OSI model. They perform multiplexing using ________. IP addresses Port numbers Application names MAC addresses

Port numbers

From the following list, identify the port number(s) used by the FTP protocol. Ports 25 and 26 Ports 21 and 22 Port 20 Ports 20 and 21

Ports 20 and 21

Which of the OSI model layers has the main purpose of defining and negotiating data formatting? Transport Data link Application Network Presentation

Presentation

In comparing the OSI model to the TCP/IP model, which of the following layers of the OSI model are equivalent to the Application layer in the TCP/IP model? Transport Presentation Physical Application Network Data link Session

Presentation, Application, Session

What is the most common network cable connector used in Ethernet? RJ-10 RJ-48 RJ-45 RJ-11

RJ-45

A Cisco switch has four memory areas that store various files as well as the IOS. In which memory area is the bootstrap program stored? NVRAM FLASH RAM ROM

ROM

Cisco uses the term ________ to refer to a reinitialization of the software. Reinitialize Reboot Reload Refresh

Reload

The process of forwarding an IP packet from host to host is known as ________. Switching Routing Sending Delivery

Routing

One of the primary goals of routing protocols is to prevent ________. Routing loops Switching loops Packet loss Frame loss

Routing loops

What are the two main services provided by the network layer of the TCP/IP model? Routing Addressing Compression Encryption Reliability

Routing, Addressing

In IT, what term refers to a small network that is used for business purposes, typically in the home of a business or employee? SOHO network IT network Organizational network Cloud network Enterprise network

SOHO network

When connecting multiple switches with redundant links, which of the following protocols helps to ensure that you will have a loop-free Ethernet network? STP HTTP TCP ARP

STP

Which of the following prevents loops from a switch? MAC filtering STP VLAN Disabling send/receive on some ports

STP Disabling send/receive on some ports

What is the name used to identify a virtual NIC type of device that exists on Cisco switches to assign IP information to specific VLANs? PVC SVI VRF SVC

SVI

Before data can be sent using TCP, a connection must be established first. This connection establishment refers to the process of initializing and agreeing on which of the following values? Port numbers Acknowledgment numbers Protocol field value IP addresses Sequence numbers

Sequence numbers Port numbers Acknowledgment numbers

Which layer of the OSI model defines how to start, control, and end conversations by grouping messages in a workflow? Application layer Presentation layer Session layer Transport layer Network layer Data link layer Physical layer

Session layer

Which of the following will disable autonegotiation for an interface on a Cisco switch? Autonegotiation is disabled by default Setting the speed setting for the interface Setting the duplex setting for the interface Setting both the speed and duplex settings for the interface

Setting both the speed and duplex settings for the interface

The switchport port-security violation command has several options that alter the default switch behavior. Which one of these options is the most restrictive? Restrict Off Shutdown Protect

Shutdown

Refer to the figure. From the output shown from the show interface status command, what can be determined about how speed and duplex were assigned to interface F0/1? Speed was autonegotiated. Duplex was autonegotiated. Speed was not autonegotiated. Duplex was not autonegotiated.

Speed was autonegotiated. Duplex was not autonegotiated.

Which switch feature, when enabled, automatically learns the MAC address(es) that sends traffic over a switchport and stores it (them) in the port-security configuration? PortFast Sticky secure MAC addresses Static secure MAC addresses BPDU Guard

Sticky secure MAC addresses

________ defines a method of further subdividing the IPv4 address space into groups that are smaller than a single IP (classful) network. Subnetting Extrapolation Subclassification Supernetting Summarization

Subnetting

________ provides for retransmission and helps to avoid congestion, whereas ________ does not. UDP, TCP TCP, UDP ICMP, IP IP, ICMP

TCP, UDP

The Internet is essentially one big ________ network. EGP OSI TCP/IP iBGP Ethernet

TCP/IP

Other than user-issued commands, what will cause a switch to remove an entry in an address table? The age of the entry The address table becoming full The destination address belonging to the same interface as the source The source address being recognized again

The age of the entry The address table becoming full

Before a receiving host can even examine the TCP or UDP header, which of the following must happen? The host must find the destination port field. The host must process the outer headers in the message. It must read the Ethernet frame. The host must encapsulate the packet.

The host must process the outer headers in the message.

Which of the following is a characteristic of the shared passwords used in networking? Every piece of equipment must use the same password. The individual user defines each password. All configuration modes use the same password. The password is set and known by administrators.

The password is set and known by administrators.

In port security, what will occur when the MAC address count is at the maximum setting and a new frame arrives from a source address that is NOT in the table? The port will record a system log for the violation. The port will add the new MAC address in place of the oldest in the list. The password for the port is all that matters for traffic to pass. The port will shut down the interface.

The port will shut down the interface.

Which of the following items does a switch populate into its address table upon receiving a frame from an unknown source? The source MAC address The destination MAC address The destination port The receiving interface

The source MAC address The receiving interface

When using the no speed command on an interface, what is the resulting change made? The speed setting is no longer recorded for the interface. The speed defaults to the lowest possible value. The speed for the interface is set to 0, disabling it. The speed setting defaults to its automatic configuration.

The speed setting defaults to its automatic configuration.

Which of the following will occur if the speed setting cannot be sensed in a Cisco switch? The speed will default to the setting reported from the other end of the interface. The speed will default to the highest speed available. The speed will default to the lowest setting available. The speed will default to 1 Mbps.

The speed will default to the lowest setting available.

Why would it be necessary to use the copy running-config startup-config command after the switchport port-security mac-address sticky command? The sticky addresses are temporary until the configuration is saved. The request to use sticky addresses is only temporary. The running-config file cannot use sticky addresses. Only the startup-config file can manage port security.

The sticky addresses are temporary until the configuration is saved.

Which of the following will occur when a switch encounters an unknown destination unicast frame? The switch will filter the frame. The switch will flood the frame. The switch will determine if the incoming frame has a known source. The switch will add the destination to its address table.

The switch will flood the frame.

Which of the following is the goal of establishing a loop-free environment? This allows the switch to decide whether or not to forward a frame. This allows the switch to examine the source MAC address of each frame. This allows a switch to forward only one copy of the message to the destination. This allows a switch to learn MAC addresses.

This allows a switch to forward only one copy of the message to the destination.

Why are the individual wires within a UTP cable twisted together? To reduce electrical shorts To increase crosstalk To reduce electrical opens To increase electrical shorts To reduce crosstalk

To reduce crosstalk

Which layer of the OSI model includes the TCP and UDP protocols? Presentation Physical Network Transport Session Application Data link

Transport

Which layer of the TCP/IP model defines the rules for data packet recovery? Internet Data link Application Transport

Transport

Which layer of the OSI model defines functions related to data delivery, error recovery, and flow control? Application layer Presentation layer Session layer Transport layer Network layer Data link layer Physical layer

Transport layer

What is the difference between the ISO version of HDLC and the Cisco version of HDLC that is used, by default, on all serial interfaces? Type field Authentication support Optimized header Protocol field Encryption support

Type field

________ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation. TCP UDP ICMP IP

UDP

The address entered into a web browser (Firefox, Safari, Chrome, IE) is technically called a ________. Hostname DNS name URL Cookie

URL

The IEEE defines three general categories of Ethernet MAC addresses. What are these three types? Singlecast Loopback Unicast Broadcast Anycast Multicast

Unicast Broadcast Multicast

Which of the following is the correct term describing the middle of the Internet, owned by various Internet service providers and consisting of a complex network of networks? WAN LAN Internet access link Internet core

WAN

The process of TCP flow control is implemented by altering ________. Packet sizes Datagram sizes Window sizes The DSCP field

Window sizes

Which of the following is the most essential fact that allows the IEEE autonegotiation protocol to function? Cisco switch logic can determine speed and duplex for a connection. Any Ethernet device can sense the speed of a connection. Cisco meets the IEEE standard for the protocol. Wiring pinouts are common for 10BASE-T, 100BASE-T, and 1000BASE-T.

Wiring pinouts are common for 10BASE-T, 100BASE-T, and 1000BASE-T.

What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI? arpname netstat -a ifconfig arp -a

arp -a

You are having trouble remembering part of the correct format of a command. Which of the commands would give you help on the correct format of the parameters? command * command? command ? help

command ?

You have just completed the setup of your new Cisco 2960 switch, and you need to save your work. To save the configuration file, you would issue which of the following commands? save running-config startup-config move running-config startup-config copy running-config startup-config copy startup-config running-config

copy running-config startup-config

Which of the following commands would you issue to move from the User EXEC mode to the Privileged EXEC mode? open enter activate enable

enable

Which of the following commands should be done as a precursor to generating a matched public and private key for encryption? hostname name ip domain-name name crypto key prepare rsa ip ssh version 2

hostname name ip domain-name name

Which of the following keywords for the show mac address-table dynamic command would be most beneficial to a network engineer troubleshooting a problem using a network topology diagram that does NOT contain MAC addresses? aging-time address vlan interface

interface

Which of the following commands should immediately follow interface vlan 1 when configuring IPv4 on a switch? ip address ip-address mask no shutdown ip default-gateway ip-address ip name-server ip-address1 ip-address2 ...

ip address ip-address mask

Which of the following commands is used to configure a switch to use DNS to resolve a name to a matching IP address? ip address ip-address mask no shutdown ip default-gateway ip-address ip name-server ip-address1 ip-address2 ...

ip name-server ip-address1 ip-address2 ...

Which of the following commands is used to initiate the configuration mode to set a password for Telnet? line con 0 login password password-value line vty 0 15

line vty 0 15

Which command can be used to alter the default display behavior of syslog messages on a device so that they will not interrupt the output of a show command? logging synchronous synchronize messages logging timed logging systematic

logging synchronous

Which of the following commands is used to enable console password security using a simple password? line con 0 login password password-value line vty 0 15

login

Which of the following commands are shared between the console and Telnet for the setup of simple passwords? line con 0 login password password-value line vty 0 15

login password password-value

Which of the following commands should be used to force the use of username/password combinations stored on the local switch for both the console and Telnet? username name secret password login local no password line con 0

login local no password

Which of the following commands in configuration mode will enable the VLAN interface if it is not already enabled? ip address ip-address mask no shutdown ip default-gateway ip-address ip name-server ip-address1 ip-address2 ...

no shutdown

What is the name of one of the most common network troubleshooting utilities used to test basic connectivity from one host to another? scanner ping nmap traceroute

ping

The ________ changes dynamically when someone enters commands in configuration mode. running-config startup-config default-config ram-config

running-config

Which Cisco IOS command is used to display local interface (not server) DHCP IPv4 assignment information? show ip dhcp lease show ip dhcp binding show dhcp ip binding show dhcp lease

show dhcp lease

Which of the following commands will provide statistics about incoming and outgoing frames on an interface such as the number of unicast, multicast, and broadcast frames in and out of the interface? show mac address-table dynamic show interface name counters show interface name status show mac address-table

show interface name counters

The ________ stores the configuration used anytime the switch reloads Cisco IOS. ram-config startup-config running-config default-config

startup-config

Which Cisco IOS command is used to enable the use of switchport port security on a specific switchport? switchport security switchport switchport-security switchport port-security switchport port security enable

switchport port-security

Which of the following commands will set the number of MAC addresses allowed on a port with port security enabled? switchport mode access switchport mode trunk switchport port-security maximum switchport port-security violation

switchport port-security maximum

Which of the following transport input commands will configure a port to support both Telnet and SSH? transport input default transport input telnet ssh transport input both transport input all

transport input telnet ssh transport input all

You want to erase your startup configuration file. This can be accomplished by issuing which of the following commands? write erase move startup-config erase startup-config erase running-config erase nvram move running-config erase rom

write erase erase startup-config erase nvram

How many VLAN interfaces (SVI) can exist and be up on a typical Layer 2 Cisco switch at the same time? 1 8 2 4096

1

What is the physical rate of transmission of a T1 leased line? 2 Mbps 44.455 Mbps 100 Mbps 5.455 Mbps 1.544 Mbps 10 Mbps

1.544 Mbps

If a Cisco Gigabit Ethernet port is connected to a device that does not support IEEE autonegotiation, and the interface speed cannot be sensed, what speed is the interface defaulted into? 10 Mbps 100 Mbps 1 Gbps None; the port is shut down

10 Mbps

What is the longest copper cable length supported by the IEEE 802.3an 10 Gigabit Ethernet standard? 100 feet 100 meters 1 kilometer 180 meters 180 feet

100 meters

What is the longest copper cable length supported by the IEEE 802.3u FastEthernet standard? 1 kilometer 100 meters 100 feet 180 feet 180 meters

100 meters

TCP and UDP port numbers below ________ are reserved for well-known applications. 4196 256 512 1024

1024

From the following list, identify a valid Class B IP address. 127.16.01 129.112.54.6 101.32.255.255 192.1.1.4

129.112.54.6

In the IPv4 header, what is the size of the source and destination address fields? 32 bits 64 bits 128 bits 16 bits

32 bits

Which of the following return codes for HTTP requests means that the file could not be found? 80 404 443 420

404

Which TCP port numbers are used for insecure and secure HTTP (We(Web) traffic, by default? 443 161 80 110

443 80

The term octet is used to describe what size of binary number? 16 bit 4 bit 80 bit 8 bit

8 bit

Which of the following will occur on a network with redundant links that does NOT use STP? A frame will loop forever on the network. The frame will connect correctly as long as the redundancy is limited. The frame will transmit until a countdown timer is hit. The frame will transmit once and may not reach its destination.

A frame will loop forever on the network.

Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet? DHCP IP DNS ARP

ARP


Set pelajaran terkait

Ch. 14 Networking Hardening/ Ch. 15 Network Management/ Ch. 16 Network Optimization

View Set

Anatomy and Physiology Exam: Chapter 6

View Set