CCNA chap 2review

Ace your homework & exams now with Quizwiz!

Which pins are used in a Cat 5 Ethernet (100BASE-T) UTP cable?

1, 2, 3, and 6

What is the maximum cable length for UTP Ethernet T implementations?

100 meters

As specified in the Ethernet standards, what is the maximum number of hosts supported on a single subnet?

1024

Which of the following methods helps to detect lost packets?

Acknowledgements Sequencing

Match the TCP/IP layers with their function. Breaks the data into pieces. ___ Prepares the data to be sent. ___ Adds physical addesses. ___ Adds logical addresses. ___

Application Transport Internet Link

What information is contained in the unicast response to an ARP broadcast?

B will recognize that an ARP request is coming in. It'll respond to A with an ARP reply. This process is called an ARP request. The ARP reply comes back as a unicast intended directly for A. Station B is telling Station A, "So, you're asking for my MAC address? Well, here it is."

Which protocols are used to determine the IP address of a known MAC address?

Both BOOTP (Bootstrap Protocol) and RARP (Reverse Address Resolution Protocol) are used to discover the IP address of a device with a known MAC address. BOOTP is an enhancement to RARP, and it is more commonly implemented than RARP. As its name implies, BOOTP is used by computers as they boot to receive an IP address from a BOOTP server. The Address Resolution Protocol (ARP) is used to get the MAC address of a host from a known IP address.

Which of the following statements are true about bridges?

Bridges connect two network segments with the same network address. Bridges convert one type of transmission medium into another.

What is the function of the Physical layer of the OSI model? What is the corresponding layer in the TCP/IP model?

By the time it gets to the Physical layer, data is simply referred to as bits. The purpose of the bottom layer is to physically transmit these bits, which exist as information passed on to the frame. So it transmits everything that was converted into 1s and 0s onto a wired system or wireless network. The packets are encapsulated within frames and sent to the network as bits of data.

Which of the following are true about Gigabit Ethernet?

Can use both copper and fiber optic. Uses CSMA/CD

You want to implement an Ethernet network using the 1000BaseT standard using the minimum hardware specifications possible. Which of the following should you include in your plan?

Cat5e twisted pair cable RJ-45 connectors

Workstation2 needs to send data to Workstation3. Identify the Layer 2 and Layer 3 addresses Workstation2 will use to send the data by dragging the corresponding address from the list on the left to its location on the right.(check it out)

Checked out 2

Workstation3 has started communicating with Workstation2. It sends a frame to the default gateway. Identify the Layer 2 and Layer 3 addresses used by the Cisco 2600 router to forward the data to Workstation2 by dragging the corresponding address from the list on the left to its location on the right.(check it out)

Checked out 3

What is the purpose of a frame check sequence (FCS) footer?

Checksum error detection

Which of the following mechanisms are used on Ethernet networks to control access to the transmission medium?

Collision detection Backoff

You have a small network with two switches, SwitchA and SwitchB. MDI-X is not enabled on either switch. Each switch has three client computers connected. IP addresses have been assigned to various devices as follows: WrkA_1, WrkA_2, and WrkA_3 are connected to SwitchA, while WrkB_4, WrkB_5, and WrkB_6 are connected to SwitchB. All of the devices are configured to operate within the same subnet. You need to connect SwitchA and SwitchB so that workstations connected to SwitchA can communicate with workstations connected to SwitchB. What should you do?

Connect SwitchA and SwitchB using a crossover cable.

What is the purpose of the CRC in network communications?

Detect data errors

Match each TCP and/or UDP ports to the service that uses it. TCP and UDP use port 23 for___ TCP and UDP use port 53 for__ UDP uses ports 67 and 68 for __ UDP uses port 69 for __ TCP uses port 119 for __ TCP uses ports 161 and 162 __

Domain Name System (DNS) Telnet Trivial File Transfer Protocol (TFTP) Network News Transport Protocol (NNTP) Simple Network Management Protocol (SNMP) Dynamic Host Configuration Protocol (DHCP)

Which fiber optic cable requires the exposed fiber tip to be polished as part of the assembly process?

Field terminated epoxy connectors

What functions are performed by Application layer protocols?

HTTP, which all web browsers use. The browser's job is to provide you an interface for submitting web requests.it passes the request off to HTTP, which then goes through the model to eventually retrieve your web page from the web server.suite of protocols that support whatever browser you see on-screen. HTTPS is secure vs HTTP submitting credit card information, so you need the transaction to be encrypted and secured. FTP and There's also an unsecure version of it called TFTPused to send and receive files over a TCP/IP-based network. Telnet, which is used to either remotely access applications off remote systems or get into a Cisco device to reconfigure it with remote access.

Match the firewall types on the left with the characteristics shown on the right. (Firewall types may be used more than once.) Usually a software firewall ___ Most robust and secure firewall ___ Considered a hardware firewall ___ Installed on a single computer ___ Installed on the edge of a network ___ Less robust and less customizable ____

Host-based firewall. Network-based firewall.

Which two of the following functions are performed by IP?

Identifying hosts with the IP address. Routing datagrams to their destination.

An internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and HTTP services. A client computer initiates a session with the HTTP server. How is the HTTP request from the client routed to the correct service running on the server?

Port or socket number

What term does the OSI model use that is different from the TCP/IP model uses to refer to frame, packet, and segment?

Protocol data unit (PDU)

You are asked to design a LAN segmentation solution for Company AGH. They have three workgroups separated with VLANs: Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department. Which segmentation device meets the functionality requirements and provides the simplest, most economical administration?

Router.a

The TCP/IP protocol stack uses port numbers to determine protocol use. Port usage is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN). Which of the following are characteristics of registered ports?

Is assigned by ICANN for a network service. Has port numbers ranging from 1024 to 49151.

How does TCP negotiate a connection with a remote host?

It needs to know which protocol to use on the Transport layer, and the Transport layer has to know which app on the Application layer it should pass the request off to. It's this port number, 80, that tells the Transport layer which application is being used above it.

Which two of the following statements accurately describe half-duplex Ethernet?

It uses collision detection and recovery. It sends both signals along the same wire.

You are deploying a new 10GB Ethernet network using Cat 6 cabling. Which of the following are true concerning this media?

PVC insulation surrounds each copper wire. It supports 10 GB Ethernet connections.

Which destination address and source address are identified in a frame header?

Segments are passed down to the internet layer. At this stage, the data receives the IP address of both the source and the destination. Once the internet layer has added the IP addresses, this entire thing is called a packet. It's also called an internet layer, or network layer, PDU. Next, this packet is brought down to the link layer. Its job is to add physical addressing. So, it adds MAC addresses, or media access control addresses, to the data. This is the destination, and this is the source. The source MAC address is the card you're sending from, and the destination MAC is the next network device in line, the one that gets you closer to your final destination.

Put the OSI model layers in order. Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Layer 1

Session Transport Network Application Presentation Physical Data Link

A client computer starts to download some files from an FTP server named FTPsvr1. While the first download is in progress, the user opens a second instance of the FTP program and initiates a second download. What do the server and the client use to keep each download separate?

Session ID

What action does a router perform when it receives frames?

So, Router 1 takes the exact same packet it received and puts a new frame header in front. The source IP address and destination IP address are still there. This portion didn't change. It's the same packet that A created and sent to the router. The new frame contains the destination MAC address and the source MAC address for Router 1 and Router 2. This is the second hop of the journey. The first frame got the data from A to Router 1. This second frame takes the data from Router 1 to Router 2. This is a hop-by-hop mechanism. Every hop uses a different frame with different MAC addresses, but the packet information is preserved from end to end.

What is the purpose of a network model?

Standardize processes at each layer.

Which of the following are features of multimode fiber cable?

Supports only limited distance cable lengths. Transfers data through the core using multiple light rays. Has a core diameter around 50 to 100 microns

You want to prevent collisions on your network by creating separate collision domains and defining virtual LANs. Which of the following devices should you choose?

Switch

Which of the following accurately describe how switches and hubs work?

Switches use the hardware address in the frame to send frames only to the port where the device is attached. A hub repeats frames to all ports, regardless of the destination address.

Which of the following are limitations of the TCP/IP model?

TCP/IP layers are theoretical and do not actually perform real functions. A particular protocol implementation may not represent every layer.

How does the Presentation layer ensure that data presented to the Application layer is in a compatible form?

The Presentation layer's primary purpose is to format data. The data you see on screen isn't how data on computer systems is stored and sent. The data is converted into a binary format.

What role does port assignments play in application-to-application communications?

The TCP/IP protocol stack uses port numbers to determine protocol use. Port or socket numbers are used to identify a service running on the server. For example, FTP uses ports 20 and 21 to send communications to the FTP service running on the server, while port number 80 is used for HTTP.

Which protocols are used by the Data Link layer?

The Data Link layer converts the packets into frames, adding physical device addressing information.

How are host-to-host connections managed?

The Internet layer is responsible for forwarding packets through multiple networks. This process is called routing. The Internet layer manages the host addressing and routing decisions to identify how packets traverse networks. The Internet layer is not concerned with reliable delivery of information. Instead, it relies on the Transport layer to establish a host-to-host communication channel and ensure information arrives correctly at the destination host

What happens if there are missing or damaged packets?

The Link layer converts the packets into frames, adding physical device addressing information and a frame check sequence (FCS) footer for error detection.

What are the TCP/IP encapsulation process steps on a sending host?

You could say that a frame is a packet with extra headers added to it on the bottom, and a packet is just a segment with extra fields and headers attached. A segment is encapsulated within a packet, and a packet is encapsulated within a frame.

Which of the following lists accurately describes TCP and UDP?

____:connectionless, unreliable, unsequenced, low overhead ____: connection-oriented, reliable, sequenced, high overhead

How does the TCP protocol differ from the UDP protocol?

are both Transport and Host-to-Host level protocols, but they have different characteristics.

How does TCP handle data sequencing?

breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the next segment.

What are MAC addresses? How are they used by the Link layer?

the network port in your workstation is going to have a physical address associated with it. Then two MAC addresses are added to the data from the Internet layer: your address, and the address of closest system you need to pass data through. The ___corresponds to the Physical and Data Link layers. It describes the physical layout of the network and how messages are formatted on the transmission medium. Sometimes, divided into the Data Link and Physical layers.

Which of the following is true of CSMA/CD?

A device with data to send first listens to the transmission medium to determine whether it is free. If collisions are detected, an interrupt jam signal is broadcast to stop all transmissions.

During network transmission, data is transferred to various routers, which forward the data to the appropriate network. If the source and destination network addresses reside on the same network, which protocol is used to determine the MAC address of the destination IP address?

ARP

Match the TCP/IP protocols with their functions. Used to send email messages between mail servers. ___ Used to send messages to groups of users. ___ Used to assign IP addresses to hosts. ___ Used to get the MAC address of a host from its IP address. ___

DHCP SMTP ARP IGMP

Drag the information type on the left to the appropriate layer of the TCP/IP model it is associated with on the right. Transport Layer ___ Link Layer ___ Application Layer ___ Internet Layer ___

Data Frames Packets Segments

At which layer of the OSI model do network switches operate that do not support routing?

Data Link

The following items describe the functions performed at various OSI model layers: Logical topology, hardware addresses, media access, framing Logical device identification, path identification, and selection Flow control, reliable data transfer, windowing, segmentation, and sequencing Converting data to 0s and 1s, bit signaling, and synchronization Which of the following correctly identifies, in order, the layers that perform each of the functions listed here?

Data Link, Network, Transport, Physical

The process of breaking a message into packets, adding control information and other information, and then transmitting the message through the transmission medium is known as __________?

Encapsulation

Which of the following are functions of the MAC sublayer in the OSI model?

Letting devices on the network have access to the LAN. Defining a unique hardware address for each device on the network.

Which of the following are limitations of the OSI model?

OSI layers are theoretical and do not actually perform real functions. A particular protocol implementation may not represent every OSI layer.

Match the TCP/IP protocols with their functions. Group 1 Used to get the IP address of a host from a known MAC address. ___ , ___ Group 2 Used to transfer files. ___ , ___ Group 3 Used to identify routes through an internetwork. ___ , ___

OSPF, BOOTP, FTP, RIP, TFTP, RARP

Which of the following describes the function of a dedicated wireless access point on a network?

On a network, a wireless access point only acts as a bridge between the wireless segment and the wired segment on the same subnet.

What is a PDU? How do PDUs relate to TCP/IP layers?

Once the data has an HTTP GET request and a port number attached to it, it's commonly called a segment. Another name for it is the transport layer PDU, or protocol data unit. It holds the information that the transport layer added above.

When are ARP requests used?

Once the packet is built, ARP's purpose is to enable station A to dynamically discover the MAC address of Station B. If Station A has never talked to Station B, it won't know the MAC address. But, once a station has communicated with another node on the network, it'll remember the MAC address for future use.

Which of the following are general advantages of using routers on your network?

Routers provide more features, such as flow control, error detection, and congestion control, than switches or bridges. Routers provide multiple links between devices to support load balancing. Routers support multiple routing protocols for better flexibility.

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?

Routers use ARP to resolve known IP addresses into MAC addresses.

Match each characteristic on the left with the appropriate fiber optic connector on the right. ____ Metal guide pins for alignment ____ Half the size of other connectors ____ Bayonet-type connector ____ Push-on, pull-off connector

SC ST MT-RJ LC

You want to implement an Ethernet network using the 100Base-FX standard and the minimum hardware specifications possible. You need to support distances of up to 1,000 meters without repeaters. Which of the following should you include in your plan?

SC connectors Single-mode fiber optic cable

What is the first thing that happens when a collision occurs on an Ethernet network?

The device that detected the collision transmits a jam signal.

What is the backoff on an Ethernet network?

The random amount of time a device waits before retransmitting after a collision.

How does the OSI model differ from the TCP/IP model? How are they similar?

They both have Application, transport network, and link layer but OSI model breaks it down the application and link layer.

What functions are provided by the Internet layer?

is comparable to the Network layer of the OSI model. It is responsible for moving packets through a network. This involves the addressing of hosts and making routing decisions to identify how the packet traverses the network.

What information does the Transport layer add to data being transmitted?

layer does is add the destination port to your request. Port 80 is for HTTP, so that's going to be embedded within the data. Once the internet layer has added the IP addresses, this entire thing is called a packet. It's also called an internet layer, or network layer, PDU.

Each connection in the image is labeled A-G. Drag the cable type from the left that you would use to make each connection type. Connection A ___ Connection B ___ Connection C ___ Connection E ___ Connection F ___ Connection G ___

Ethernet straight-through cable,Ethernet crossover cable

Which two of the following statements accurately describe full-duplex Ethernet?

It is collision-free. It uses direct point-to-point connections between the sender and receiver.

You need to connect a 100BaseTx Ethernet network with an older token ring network. Most traffic will be localized within each network, with only a little traffic crossing between networks. Both networks are using the TCP/IP protocol suite. Which connectivity device would be the best choice in this situation?

Router.x

Match each layer of the TCP/IP model to its functions. (Each layer matches with two functions.) Is responsible for how messages are electrically transmitted. ___ Is responsible for forwarding packets through multiple networks. ___ Is responsible for describing the physical layout of the network. ___ Is responsible for error checking and reliable delivery. ___ Is not concerned with reliable delivery of information. ___ Integrates network functionality into the host operating system. ___ Provides the capability for services to operate on the network. ___ Uses ports to enable application-to-application communications between hosts. ___

Application Transport Internet Link

Match the layers of the TCP/IP model to the corresponding layers of the OSI model. Application Presentation Session Transport Network Data Link Physical

Application Transport Internet Link

What role does ARP play in the routing process?

If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the destination device's IP address and requesting its MAC address.

Drag the information type on the left to the appropriate layer of the OSI model that it is associated with on the right. Network Layer = Data Link Layer = Physical Layer = Transport Layer = Application Layer =

Packets Bits Data Segments Frames

Match each Ethernet frame component with its description. A set of alternating ones and zeros terminated by two ones (11). ____ Information that needs to be transmitted from one host to the other. ____ Verifies that the frame contents arrived uncorrupted. ____ Identifies the receiving host's MAC address. ___ Junk data required to make 64 bytes. ___ Identifies the sending host's MAC address. ___ Specifies the Network/Internet layer protocol being used. ___

Pad. Type. Packet. Preamble. Source address. Destination address. Frame Check Sequence.

You need to connect several network devices together using twisted pair Ethernet cables. Assuming Auto-MDIX is not enabled on these devices, drag the appropriate type of cabling on the left to each connection type on the right. Workstation to switch ___ Router to switch ___ Switch to switch ___ Workstation to router ___ Router to router ___

Straight-through Ethernet cable, Crossover Ethernet cable,

What are the TCP/IP de-encapsulation process steps?

This frame was sent through the network; maybe across multiple switches, or potentially multiple routers. It was finally received at the web server itself. The web server looks at this field, looks at the destination MAC address field, and sees its own number. So, it knows this card is intended for itself. It can then pass it up to its own internet layer. If its own IP address is confirmed in here, then it will also check other safety and reliability features if necessary. Once all the data is validated, it's sent up to the Transport layer that runs within the web server. It verifies the port number; in this case, it's port 80. This means the incoming request is intended as a web request. So, the Transport layer passes the data up to HTTP on the Application layer, which retrieves the page that we wanted.

How does data encapsulation facilitate data transmission?

To get the data from A to B, we created one packet. Router 1 and Router 2 examined this packet as it traversed the network. But, on each leg of the journey, a new frame was created to get it closer and closer. It finally made it all the way to B. In this case, one packet was encapsulated three times in three separate frames. In a real network, your final destination could be even farther away, maybe 17 hops or more.

Which is the primary role of a firewall?

To protect networks and workstations by allowing or denying network traffic. The firewall does this using a configured set of rules.


Related study sets

Antidepressants, Antianxiety, Antipyscotics

View Set

CH.8 FORECASTING & DEMAND PLANNING

View Set

Epidemiology and Screening Disease

View Set