CCNA

Ace your homework & exams now with Quizwiz!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)#service-password-encryption

What is the binary representation for the decimal number 173?

10101101

What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)

1518 bytes 64 bytes

What statement describes the function of the Address Resolution Protocol?

ARP is used to discover the MAC address of any host on the local network.

What type of communication rule would best describe CSMA/CD?

Access Method

Layer 4 (TCP/IP)

Application

Layer 7 (OSI/Pizza)

Application

At which OSI layer is a SOURCE IP address added to a PDU during the encapsulation process?

Application Layer

What method is used to manage contention-based access on a wireless network?

CSMA/CA

What happens when the transport input ssh command is entered on the switch vty lines?

Communication between the switch and remote users is encrypted

Which two protocols are service discovery protocols? (Choose two.)

DHCP DNS

Layer 2 (OSI/Pizza)

Data Link

What property of ARP causes cached IP-to-MAC mappings to remain in memory longer?

Entries in an ARP table are time-stamped and are purged after the timeout expires

What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

Extranet

Which protocol operates at the network access layer of the TCP/IP model?

IP

Layer 2 (TCP/IP)

Internet

What are three characteristics of an SVI? (choose 3)

It is not associated with any physical interface on a switch It provides a means to remotely manage a switch It is associated with VLAN1 by default

final mode

Line Configuration Mode

Layer 3 (OSI/Pizza)

Network

Layer 1 (TCP/IP)

Network Access

Layer 1 (OSI/Pizza)

Physical

Layer 6 (OSI/Pizza)

Presentation

What IPv4 header field identifies the upper layer protocol carried in the packet?

Protocol

Layer 5 (OSI/Pizza)

Session

This protocol is responsible for guaranteeing the reliable delivery of information.

TCP

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

The computer has an invalid default gateway address.

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM

After making configuration changes on a Cisco switch, a network admin issues a "copy running-config startup-config" command. What is the result of issuing this command?

The new configuration will be loaded if the switch is restarted

The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?

The switch can be remotely managed from a host on another network.

What statement describes a characteristic of MAC addresses?

They must be globally unique

What are two functions of an NVRAM?

To store the startup configuration line To retain contents when power if removed

Layer 3 (TCP/IP)

Transport

Layer 4 (OSI/Pizza)

Transport

An end device is either the source or destination of a message transmitted over the network.

True

What type of network traffic requires QoS?

Video Conferencing

What is a characteristic of UTP cabling?

cancellation

What is a primary role of the Physical layer in transmitting data on the network?

create the signals that represent the bits in each frame on to the media.

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables?

crosstalk electromagnetic interference

Which protocol stack layer encapsulates data into frames?

data link

Match the configuration mode with the command that is available in that mode. (Not all options are used.) R1(config-line)# R1# R1(config-router)# R1> R1(config)#

enable: - R1> copy running-config startup-config: - R1# login: - R1(config-line)# interface fastethernet 0/0: - R1(config)#

What is the name of the process of adding protocol information to data as it moves down the protocol stack?

encapsulation

user EXEC mode

limited number of basic monitoring commands the first entrance into the CLI of an IOS device

What does the term "attenuation" mean in data communication?

loss of signal strength as distance increases*

What type of cable is used to connect a workstation serial port to a Cisco router console port?

rollover

BGP and OSPF are examples of which type of protocol?

routing

Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)

routing protocols internet protocols messaging

What is the name of the PDU associated with the transport layer?

segment

What type of physical topology can be created by connecting all Ethernet cables to a central device?

star

With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?

the magnetic field around the adjacent pairs of wire

What addressing information is recorded by a switch to build its MAC address table?

the source layer 2 address of incoming frames

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

to interrupt the ping process

When choosing passwords, which of the following would be least appropriate?

use common words from a dictionary.

Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?PC---SWITCH---ROUTER1---ROUTER2

1-rollover, 2-straight-through, 3-crossover

A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?

the ARP cache is cleared

Match the commands to the correct actions. (Not all options are used.) Provides security on the console Displays a message when the router is accessed Configures a name on the router

Router(config)# hostname CL1: - Configures a name on the router Router(config-line)# password class - Provides security on the console Router(config)# banner motd # - Displays a message when the router is accessed

How is SSH different from telnet?

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and send messages in plain text

What is contained in the trailer of a data-link frame?

error detection

Which command or key combination allows a user to return to the previous level in the command hierarchy?

exit

Which of the following statements concerning fault tolerant networks are FALSE.

f one path fails, the messages are queued until the path is restored.

Which switching method has the lowest level of latency?

fast-forward

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

flow control

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?

flow label

Which advantage does the store-and-forward switching method have compared with the cut-through switching method?

frame error checking

Which media communication type does not require media arbitration in the data link layer?

full-duplex

third mode

global configuration mode

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

store-and-forward switching

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)

data link physical

Which is a multicast MAC address?

01-00-5E-00-00-03

Which two functions are performed at the MAC sublayer of the OSI data link layer?

Adds Layer 2 control information to network protocol data. Controls the NIC responsible for sending and receiving data on the physical medium.

Which statement is true about the CSMA/CD access method that is used in Ethernet?

All network devices must listen before transmitting

Why is NAT not needed in IPv6?​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

Exit privileged EXEC mode and press ENTER

What is a basic characteristic of the IP protocol?

connectionless

Which of the following statements concerning the use of a Dial-up Telephone Line for data transmission are TRUE.

Can be useful for mobile access while traveling. An inexpensive option that uses any phone line and a modem The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer.

password can be used to restrict access to all parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords (Choose Three)

Console interface Privileged EXEC mode VTY interface

What OSI physical layer term describes the physical medium which uses electrical pulses?

Copper Cable

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

DNS FTP DHCP

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

Ethernet, IP, TCP, HTTP

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF

An organization may use an INtranet to provide secure and safe access to individuals who work for a different organization but require access to the organization's data.

False

Which two fields or features does Ethernet examine to determine if a received frame is passed to the data link layer or discarded by the NIC?

Frame Check Sequence Minimum frame size

Which statement describes a feature of the IP protocol?

IP relies on upper layer services to handle situations of missing or out-of-order packets.

Which of the following statements are correct?

Intermediary devices connect the individual end devices to the network.

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

Intranet

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Issue the reload command without saving the running configuration

What is the auto-MDIX feature?

It enables a device to automatically configure an interface to use a straight-through or a crossover cable.*

What are two characteristics of fiber-optic cable?

It is not affected by EMI or RFI(crosstalk) It is more expensive than UTP cabling is

Which two statements describe the services provided by the data link layer?

It manages the access of frames to the network media It packages various Layer 3 PDUs into a frame format that is compatible with the network interface

Which two types of IPv6 messages are used in place of ARP for address resolution?

Neighbor advertisement Neighbor solicitation

At which layer of the OSI model would a LOGICAL address be added during encapsulation?

Network Layer

What are two potential network problems that can result from ARP operation? (Choose two.)

On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.

Which two functions are primary functions of a router? (Choose two.)

Packet Forwarding Path Selection

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

Password Cisco Login Line Console 0

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network

Segments are sent from the transport layer to the internet layer

what is a characteristic of multicast messages?

Sent to a select group of hosts

What three items are contained in an Ethernet header and trailer?

Source MAC address Destination MAC address Error-checking information

What is the effect of using the Router# copy running-config startup-config command on a router

The contents of NVRAM will change

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)

The frame has the broadcast address as the destination address The destination address is unknown to the switch

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts in other networks.

A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection?

The link between the switches will work at the fastest speed that is supported by both switches. The link between switches will work as full-duplex. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.*

During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?

The physical address is added

What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF?

The switch forwards it out all ports except the ingress port.

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

The switch will forward the frame to all ports except port 4 (its own port) [PC1 (port4) < ] [PC4 (port 1) ^] [PC3 (port 2) >] [PC2 (port 3) v]

Which statement is correct about network protocols?

They define how messages are exchanged between the source and the destination

IANA

This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers

ISO

This organization is the largest. Known for its Open Systems Interconnection (OSI) reference model

ISOC

This organization promotes the open development, evolution, and use of the Internet throughout the world.

first mode

user EXEC mode

Privileged EXEC Mode

accessed by entering the enable command identified by a prompt ending with the # character

Global Configuration Mode

changes made affect the operation of the device as a whole accessed by entering the configure terminal command

What makes fiber preferable to copper cabling for interconnecting buildings

greater distances per cable run limited susceptibility to EMI/RFI greater bandwidth potential

what is one advantage of using the cut-through switching method instead of the store-and-forward switching method?

has a lower latency appropriate for high-performance computing applications

Which three basic parts are common to all frame types supported by the data link layer?

header / data / trailer

Second mode

privileged EXEC mode

What routing table entry has a next hop address associated with a destination network?

remote routes

Which data method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?

response timeout

What are two services provided by the OSI network layer? (Choose two.)

routing packets toward the destination encapsulating PDUs from the transport layer

Which name is assigned to the transport layer PDU?

segment

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

shared memory buffering

Which interface allows remote management of a Layer 2 switch?

the SVI (Switch Virtual Interface)

What is the auto-MDIX feature on a switch?

the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection

What two criteria are used to help select network media? (Choose two.)

the distance the selected medium can successfully carry a signal the environment where the selected medium is to be installed

What are two actions performed by a Cisco switch?

using the source MAC addresses of frames to build and maintain a MAC address table utilizing the MAC address table to forward frames via the destination MAC address

Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?

version


Related study sets

Hon Pos Health And Wellness Midterm Study Guide

View Set

Topic 10: Urinary Elimination and Reproduction

View Set

Purchasing chapter 1, 2, 3, and 4

View Set

Parent Functions - Odd, Even, or Neither

View Set

Prelude 4. Music as Order and Logic

View Set

Mastering A and P Anatomy Chapter 4

View Set

Reproductive- Lippincott Management of Care

View Set