TINFO 250 Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption Refer to curriculum topic: 2.2.2 To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file.

Refer to the exhibit. What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1?

00-60-2F-3A-07-CC Refer to curriculum topic: 5.3.1 The destination MAC address is used for local delivery of Ethernet frames. The MAC (Layer 2) address changes at each network segment along the path. As the frame leaves the web server, it will be delivered by using the MAC address of the default gateway.

The binary number 0000 1010 can be expressed as __ in hexadecimal.

0A Refer to curriculum topic: 5.1.2 The binary number 0000 1010 can be expressed as 0A in hexadecimal.

Refer to the exhibit. Fill in the blank. A packet leaving PC-1 has to traverse hops to reach PC-4.​

3 Refer to curriculum topic: 6.1.1 A hop is an intermediary Layer 3 device that a packet has to traverse to reach its destination. In this case, the number of hops a packet has to traverse from PC-1 to PC-4 is three, as there are three routers from source to destination.

The minimum Ethernet frame size is __ bytes. Anything smaller than that should be considered a "runt frame."

64 Refer to curriculum topic: 5.1.1 Ethernet II and IEEE 802.3 standards define the minimum frame size as 64 bytes and the maximum as 1518 bytes.

What method is used to manage contention-based access on a wireless network?

CSMA/CA Refer to curriculum topic: 4.2.4 Carrier sense multiple access with collision avoidance (CSMA/CA) is used with wireless networking technology to mediate media contention. Carrier sense multiple access with collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media contention. Priority ordering and token passing are not used (or not a method) for media access control.

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?

Flow Label Refer to curriculum topic: 6.1.4 The Flow Label in IPv6 header is a 20-bit field that provides a special service for real-time applications. This field can be used to inform routers and switches to maintain the same path for the packet flow so that packets will not be reordered.

Refer to the graphic. H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true?

H1 sends a unicast message to H2, and the switch forwards it directly to H2. Refer to curriculum topic: 5.2.1 Since H2 has just sent a broadcast message to all hosts, the MAC address for H2 is already in the switch MAC table. A unicast message from H1 to H2 will therefore be forwarded by the switch directly to H2.

Which statement correctly describes frame encoding?

It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits. Refer to curriculum topic: 4.1.3 Frame encoding converts a stream of data bits into a predefined code that is recognized by both the sender and receiver. These codes are used for a variety of purposes, such as distinguishing data bits from control bits, and identifying the beginning and end of a frame.

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet. Refer to curriculum topic: 1.2.4 An ISP, or Internet Service Provider, is an organization that provides access to the Internet for businesses and individuals.

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

It is responsible for Media Access Control. It adds a header and trailer to form an OSI Layer 2 PDU. Refer to curriculum topic: 5.1.1 The MAC sublayer is the lower of the two data link sublayers and is closest to the physical layer. The two primary functions of the MAC sublayer are to encapsulate the data from the upper layer protocols and to control access to the media.

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

It sends the frame to all ports except the port on which it received the frame. Refer to curriculum topic: 5.2.1 When a Layer 2 switch receives a frame with a broadcast destination address, it floods the frame to all ports except the port on which it received the frame.

If there are two or more possible routes to the same destination, the is used to determine which route is used in the routing table.

Metric If there are two or more possible routes to the same destination, the metric is used to decide which route appears in the routing table.

Fill in the blank. The acronym is used to define the process that allows multiple devices to share a single routable IP address.

Nat or Pat Refer to curriculum topic: 6.1.4 NAT or Network Address Translation is the process of modifying the IP packet header information on packets going outside the corporate network. Corporate networks typically use private addresses on the inside LAN and need a public address to be able to communicate through the WAN.

In order to test end-to-end connectivity, you would use ______ the command.

Ping

Open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which interfaces in each router are active and operational?

R1: G0/0 and S0/0/0 R2: G0/1 and S0/0/0 Refer to curriculum topic: 6.4.2 The command to use for this activity is show ip interface brief in each router. The active and operational interfaces are represented by the value "up" in the "Status" and "Protocol" columns. The interfaces in R1 with these characteristics are G0/0 and S0/0/0. In R2 they are G0/1 and S0/0/0.

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?

RT1 will send an ARP reply with its own Fa0/0 MAC address. Refer to curriculum topic: 5.3.2 When a network device has to communicate with a device on another network, it broadcasts an ARP request asking for the default gateway MAC address. The default gateway (RT1) unicasts an ARP reply with the Fa0/0 MAC address.

STP Wireless Optical fiber Coaxial

Refer to curriculum topic: 4.2.1 UTP cables are used in wired office environments. Coaxial cables are used to connect cable modems and televisions. Fiber optics are used for high transmission speeds and to transfer data over long distances. STP cables are used in environments where there is a lot of interference.

How is SSH different from Telnet?

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. Refer to curriculum topic: 2.1.2 SSH is the preferred protocol for connecting to a device operating system over the network because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet connections.

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

SVI Refer to curriculum topic: 2.3.2 For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely over the network.

When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

Store-and-forward Refer to curriculum topic: 5.2.2 When the store-and-forward switching method is used, the switch receives the complete frame before forwarding it on to the destination. In contrast, a cut-through switch forwards the frame once the destination Layer 2 address is read.

To save time, IOS commands may be partially entered and then completed by typing which key or key combination?

Tab

How does the network layer use the MTU value?

The MTU is passed to the network layer by the data link layer. Refer to curriculum topic: 6.1.2 The data link layer indicates to the network layer the MTU for the medium that is being used. The network layer uses that information to determine how large the packet can be when it is forwarded. When packets are received on one medium and forwarded on a medium with a smaller MTU, the network layer device can fragment the packet to accommodate the smaller size.

What is a characteristic of a WAN hub-and-spoke topology?

The branch sites are connected to a central site through point-to-point links.​ Refer to curriculum topic: 4.4.2 A hub-and-spoke topology is a WAN version of the star topology in which a central site interconnects branch sites using point-to-point links. A mesh topology requires that every end system be interconnected to every other system using point-to-point links. A partial mesh is a variation of this topology, where some but not all end devices are interconnected. There is no topology where all the sites have to have hub devices that are connected to a router.

Within a production network, what is the purpose of configuring a switch with a default gateway address?

The default gateway address is used to forward packets originating from the switch to remote networks. Refer to curriculum topic: 6.4.3 A default gateway address allows a switch to forward packets that originate on the switch to remote networks. A default gateway address on a switch does not provide Layer 3 routing for PCs that are connected on that switch. A switch can still be accessible from Telnet as long as the source of the Telnet connection is on the local network.

Which two statements are true regarding the user EXEC mode? (Choose two.)

The device prompt for this mode ends with the ">" symbol. Only some aspects of the router configuration can be viewed. Refer to curriculum topic: 2.1.3 User EXEC mode limits access to some show and debug commands. It is the first level of user interface encountered when configuring a router and is intended for investigation of certain functions of the device. The User EXEC prompt is identified with the ">" symbol.

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device needs mobility when connecting to the network. Refer to curriculum topic: 4.1.1 When the end-user devices need mobility to connect to the network, wireless is recommended. If an end-user device only has an Ethernet NIC, the user will only be able to use Ethernet cabling. If RFI is an issue, wireless is not recommended. An end-user device that requires a dedicated connection for performance would perform better with a dedicated Ethernet cable.

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. Refer to curriculum topic: 3.3.2 A default gateway is only required to communicate with devices on another network. The absence of a default gateway does not affect connectivity between devices on the same local network.

Why are open standards important in the data communications industry?

They enable interoperability between software and hardware from different vendors. Refer to curriculum topic: 3.2.3 Open standard protocols facilitate interoperability between software and hardware made by different manufacturers. For example, open standards allow a client with a Linux operating system to connect to a server running a Microsoft Windows operating system. They would also be able to successfully exchange data. If all software, hardware, and protocols were proprietary, this would not be possible.

Which statement describes a characteristic of the frame header fields of the data link layer?

They vary depending on protocols. Refer to curriculum topic: 4.4.4 All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However, the structure of the frame and the fields that are contained in the header vary according to the protocol. Different data link layer protocols may use different fields, like priority/quality of service, logical connection control, physical link control, flow control, and congestion control.

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

Time-to-live Refer to curriculum topic: 6.1.3 When a router receives a packet, the router will decrement the Time-to-Live (TTL) field by one. When the field reaches zero, the receiving router will discard the packet and will send an ICMP Time Exceeded message to the sender.

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

Transport Refer to curriculum topic: 3.2.4 The OSI model consists of seven layers: application, presentation, session, transport, network, data link, and physical. The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

VPN Refer to curriculum topic: 1.4.3 Virtual private networks (VPN) are used to provide secure access to remote workers.

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface console interface privileged EXEC mode Refer to curriculum topic: 2.2.2 Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.

In which scenario would the use of a WISP be recommended?

a farm in a rural area without wired broadband access Refer to curriculum topic: 1.4.2 Wireless Internet Service Providers (WISPs) are typically found in rural areas where DSL or cable access is not available. A dish or antenna on the property of the subscriber connects wirelessly to a WISP transmitter, eliminating the need for physical cabling outside the building.

What is a WAN?

a network infrastructure that provides access to other networks over a large geographic area Refer to curriculum topic: 1.2.2 A WAN provides access to other networks over a large geographic area. A SAN provides data storage, retrieval, and replication. A MAN spans a limited physical area such as a city. A LAN provides access in a small geographic area.

What are two characteristics of a scalable network? (Choose two.)

a. grows in size without impacting existing users b. suitable for modular devices that allow for expansion Refer to curriculum topic: 1.3.2 Scalable networks are networks that can grow without requiring costly replacement of existing network devices. One way to make a network scalable is to buy networking devices that are modular.

Which two factors influence the method that is used for media access control?

a. how the connection between nodes appears to the data link layer b. how nodes share the media

What type of address is 01-00-5E-0A-00-02?

an address that reaches a specific group of hosts Refer to curriculum topic: 5.1.2 The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal. It allows a source device to send a packet to a group of devices.

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast Refer to curriculum topic: 3.1.1 When all devices need to receive the same message simultaneously, the message would be delivered as a broadcast. Unicast delivery occurs when one source host sends a message to one destination host. The sending of the same message from a host to a group of destination hosts is multicast delivery. Duplex communication refers to the ability of the medium to carry messages in both directions.

Which logical address is used for delivery of data to a remote network?

destination IP address Refer to curriculum topic: 3.3.2 The destination IP address is used for end-to-end delivery of data to a remote network. The destination MAC address is used for delivery on a local network. The destination port number identifies the application that should process the data at the destination. Source addresses identify the sender of the data.

What are two functions that are provided by the network layer? (Choose two.) providing end devices with a unique network identifier

directing data packets to destination hosts on other networks Refer to curriculum topic: 6.1.1 The network layer is primarily concerned with passing data from a source to a destination on another network. IP addresses supply unique identifiers for the source and destination. The network layer provides connectionless, best-effort delivery. Devices rely on higher layers to supply services to processes.

During the boot process, where will the router bootstrap program look for the IOS image by default?

flash Refer to curriculum topic: 6.3.2 The IOS image is typically stored in flash memory. If the image is not in flash memory when the router boots, the router bootstrap program can look for it on a TFTP server

What type of delivery uses data link layer addresses?

local delivery Refer to curriculum topic: 3.3.2 If a device is sending frames to another device on the same local network, it uses ARP to determine the MAC address of the receiving device. The sending device then uses the Layer 2 addresses to send the frames.

What three requirements are defined by the protocols used in network communications to allow message transmission across a network? (Choose three.)

message encoding message size delivery options Refer to curriculum topic: 3.1.1 The protocols used in network communications define the details of how a message is transmitted, including requirements for message delivery options, message timing, message encoding, formatting and encapsulation, and message size.

What type of message is sent to a specific group of hosts?

multicast Refer to curriculum topic: 3.1.1 A communication that has a single source going to a single destination is called a unicast. A communication from a single source to a group of destinations is called a multicast. A communication from a single source to all destinations on the same local network is called a broadcast.

The MAC address of a PC does not change when the PC is moved to a different network because the MAC address is embedded in the _____ of the PC.

network pc card Refer to curriculum topic: 3.3.2 The MAC address is also known as the physical or Ethernet address. Because it is encoded on hardware, on the Ethernet NIC, it will stay the same no matter where the NIC is geographically located.

What is the general term that is used to describe a piece of data at any layer of a networking model?

protocol data unit Refer to curriculum topic: 3.3.1 The term protocol data unit (PDU) is used to describe a piece of data at any layer of a networking model. A packet is the PDU at the network layer. A frame is the data link layer PDU. A segment is the PDU at the transport layer.

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

shared memory buffering Refer to curriculum topic: 5.2.2 With shared memory buffering, the number of frames stored in the buffer is restricted only by the size of the entire memory buffer and not limited to a single port buffer. This permits larger frames to be transmitted with fewer dropped frames. This is important to asymmetric switching, which applies to this scenario, where frames are being exchanged between ports of different rates. With port-based memory buffering, frames are stored in queues that are linked to specific incoming and outgoing ports making it possible for a single frame to delay the transmission of all the frames in memory because of a busy destination port. Level 1 cache is memory used in a CPU. Fixed configuration refers to the port arrangement in switch hardware.

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

spyware Refer to curriculum topic: 1.4.3 Spyware is software that is installed on a network device and that collects information.

Refer to the exhibit. One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T568A standard. What type of cable would be created in this manner?

straight-through Refer to curriculum topic: 4.2.2 A straight-through cable can have either a T568A or T568B standard termination at one end and the same at the other end. A crossover cable has a T568A standard termination at one end and a T568B standard at the other end. A rollover cable can have either a T568A or T568B standard termination at one end, and at the other end have the same standard, but with the wires connected in reverse order. A fiber-optic cable is not terminated using RJ-45 connectors.

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

the hostname should be fewer than 64 characters in length the hostname should contain no spaces the hostname should begin with a letter Refer to curriculum topic: 2.2.1 A hostname can be configured with upper or lower case characters and should end with a letter or digit, not a special character. A hostname should start with a letter and no space is allowed for a hostname.

Why would a technician enter the command copy startup-config running-config?

to copy an existing configuration into RAM Refer to curriculum topic: 2.2.3 Usually, changes are made to a running configuration in RAM and copied to NVRAM. However, in this case, the technician wants to copy a previously saved configuration from NVRAM into RAM in order to make changes to it.

Which is a function of the Logical Link Control (LLC) sublayer?

to identify which network layer protocol is being used Refer to curriculum topic: 4.3.1 Defining the media access processes that are performed by the hardware and providing data link layer addressing are functions of the MAC sublayer. The data link layer accepts Layer 3 packets and packages them into data units that are called frames.

What is the purpose of the OSI physical layer?

transmitting bits across the local media Refer to curriculum topic: 4.1.2 The physical layer is responsible for transmitting the actual signals across the physical media as bits. Exchanging frames, controlling media access, and performing error detection are all functions of the data link layer.


Set pelajaran terkait

POB Chapter 6: Entrepreneurship and Small Business Management(TF) *(9) Quizlet SLT Set

View Set

abeka vocabulary spelling poetry V quiz 02A

View Set

Chapter 25: Fluids, Electrolytes, & Acid Base Homeostasis

View Set

PHYS2- Steroid Hormones and the Adrenal Glands - III

View Set

Chapter 45: Antineoplastic Drugs Part 1: Cancer Overview and Cell Cycle-Specific Drugs

View Set