Cisco Networking 1

Ace your homework & exams now with Quizwiz!

Bit Byte Gigabyte Kilobyte Megabyte Terabyte

Bit (A one or a zero) Byte (Eight bits) Gigabyte (Approximately 1 billion bytes) Kilobyte (Approximately 1 thousand bytes) Megabyte (Approximately 1 million bytes) Terabyte (Approximately 1 trillion bytes)

A small group of users connected in a small area (LAN) that are geographically separated from a corporate office. a. SOHO b. Branch Office c. Mobile Users d. corporate or Central Office

Branch Office

_______ services provide a temporary connection across a phone circuit. In networking, these services are typically used for backup of primary circuits and for temporary boosts of bandwidth. a. Dedicated Circuit b. Circuit-Switched Services c. Cell-Switched Services d. Packet-Switched Services

Circuit-Switched Services

There are two types of software components when it comes to networking software, what are they? _______ and _______.

Client and server

A _______ occurs when two pieces of data collide and they must be retransmitted.

Collision

Media types such as ____ or ____ cabling are needed to connect the computers and networking components so that information can be shared between components.

Copper or fiber

Where most users in an organization and their resources are located. a. SOHO b. Branch Office c. Mobile Users d. Corporate or Central Office

Corporate or Central Office

_______ is responsible for assigning IP address information automatically to systems on the network.

DHCP

_______ and _______ are responsible for moving information between the LAN and WAN

DSU and CSU

A router also includes a _______ (GWLR) setting that is used if the router does not have a route to the destination in its routing table.

Gateway of Last Resort

A hub is a ______ device.

Layer 1

A next-generation firewall (NGFW) is a _____ firewall that can inspect the application data and detect malicious packets

Layer 7

127.0.0.1 is called the _____ address in the networking industry.

Loop back

The MAC address is the ____ address burned into the network card.

Physical

Users working form a small or home office (a handful of people) a. SOHO b. Branch Office c. Mobile Users d. Corporate or Central Office

SOHO

FTP and TFTP are similar except for the fact that FTP uses ____ to authenticate and TFTP uses ____ and does not support authentication to communicate.

TCP and UDP

___ are used to connect multiple LANs together a. LAN b. MAN c. PAN d. WAN

WAN

A layer 3 switch perform all the functions of a layer 2 switch but it also has the adds functionality of ______________

being a router

Systems look at the _____ address in the frame to decide whether to process the data or discard it.

destination

Which of the following IP addresses is a class "C" address? a. 192.168.10.0 b. 10.168.10.0 c. 128.168.10.5 d. 1.2.3.4

192.168.10.0

How many bits do I need to turn on in order to create 8 networks? My IP address is 192.168.10.0 and my subnet mask is 255.255.255.224 a. 2 b. 3 c. 4 d. 5

3

An ________ is a device added to your network that enables wireless clients to connect to the network.

Access point

This service is responsible for assigning IP addresses to computer and devices when they connect to the network so that they can communicate with other systems on the network or surf the Internet a. HTTP server b. DNS server c. DHCP server d. File server

DHCP server

This service is responsible for resolving fully qualified domain named (FQDNs) to IP addresses. a. DHCP b. DNS c. HTTP d. File

DNS

What acronym resolves and IP address to a domain name? a. TCP b. UDP c. DNS d. PING

DNS

A ______ circuit is a permanent connection between two sites in which the bandwidth is dedicated to that company's use.

Dedicated

What does acronym DHCP stand for? a Dynamic Host Confusion Protocol b. Dynamic Host Cool Protocol c. Dynamic Host Configuration protocol d. Dynamic Host Congestion Protocol

Dynamic Host Configuration protocol

FTP stands for which of the following? a. File to people b. File Transfer Protocol c. File Tender Payment d. Feed The People

File Transfer Protocol

What two characteristic describe an FTP connection? (Choose two) a. A large file requires more than two connections between the client and the server to successfully download it. b. The server establishes the first connection with the client to control traffic that consists of server commands and client replies. c. Files can be downloaded from or uploaded to the server. d. The client needs to run a daemon program to establish an FTP connection with a server. e. The first connection established is for traffic control and the second connection is created to transfer a file.

Files can be downloaded from or uploaded to the server The first connection established is for traffic control and the second connection is created to transfer a file.

_____ control which traffic is allowed to enter a network or system and which traffic should be blocked.

Firewall

The protocol used to deliver web pages from a web server to a web browser is called _____. a. FTP b. SMTP c. POP3 d. HTTP

HTTP

Hubs, switches, routers, firewalls, wireless access points, modems, and channel service/date service units are networking _____

Hardwares

The channel service unit/data service unit is a device that enables and organization to connect a _____ from the ISP to the organization's router for access to and from a LAN or WAN.

High Speed Datalink

A _______ is an older network device that you hopefully do not encounter on your networks, because they have been replaced by the more effective and secure switches. a. Router b. D-Link Switch c. Hub d. Access Point

Hub

An _________ is a security device that monitors activity, logs any suspicious activity, and then takes some form of corrective action.

IPS (intrusion prevention system)

Which statement describes the physical topology for a LAN a. It depicts the addressing scheme that is employed in the LAN. b. It describes whether the LAN is a broadcast or token-passing network. c. It defines how hosts and network devices connect to the LAN. d. It shows the order in which hosts access the network.

It defines how hosts and network devices connect to the LAN.

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? a. It is the IP address of the Router1 interface that connects the company to the Internet. b. It is the IP address of the Router1 interface that connects the PC1 LAN to Router1. c. It is the IP address of Switch1 that connects PC1 to other devices on the same LAN. d. It is the IP address of the ISP network device located in the cloud.

It is the IP address of the Router1 interface that connects the PC1 LAN to Router1

_____ are used to connect networking devices that reside in a close geographic area, such as a floor of a building, a building itself, or within a campus environment.

LAN

Users who connect to a network from any location, via LAN or WAN. a. SOHO b. Branch Office c. Mobile Users d. Corporate or Central Office

Mobile Users

Cell-switches service can provide the same features that dedicated circuits offer, such as having a dedicated link, but one of its advantages over dedicated circuits is that it enables a single device to connect to _____ devices on the same interface.

Multiple

The acronym NAT stands for

Network Address Translation

_____ is the Internet protocol for reading emails

POP3

The acronym PING stands for what? a. Packet Internet Gaming b. Packet Internet Golfer c. Packet Internet Goalie. d. Packet Internet Groper

Packet Internet Groper

________ services are similar to cell-switched services, except cell switched services switch fixed-length packets called cells and packet-switches services switch variable-length packets.

Packet-Switched

A ______ sends or routes data from one network to another until the data reaches its final destination.

Router

The router has a ______, which is a list of all the networks that it knows how to reach.

Routing table

Which of the following protocols is the protocol for sending e-mails? a. POP3 b. IMAP4 c. SMTP d. FTP

SMTP

______ is the protocol that is used to enable email software to send emails

SMTP

______ is the secure method of performing remote administration of a device on the network.

SSH

Packet filtering firewalls can filter traffic based on the ____ and _____ IP address, the source and destination port numbers and the protocols used.

Source and destination

A _____________ filters traffic based on source and destination IP addresses, the source and destination port numbers, and the protocol in use, but it also understands the context of a conversation and will not allow a packet through the firewall unless it suits a specific scenario.

Stateful Packet Inspection Firewall

The ____ acts as the central connectivity point for all devices on the network.

Switch

The CSU?DSU device handles signaling over the _____ link, sending data between your router and the service provider.

T1/T3

Which protocol requires and acknowledgment? a. UDP b. TCP c. DHCP d. TCP/IP

TCP

________ enables you to create a remote connection to a system, using the text-based interface of the system to perform remote administration.

Telnet

This command-line tool is used to test connectivity with another system. a. Ping b. Test c. Run d. Config

a. Ping

The demark, also knows the ______ is the point where the service provider's equipment connects to your building.

demarcation point

The term _____________ refers to the area between the connection into your building (from the service provider) and your company's communication equipment.

demark extensions

SSH _____ all communication including the username and password; it is designed as a secure replacement to telnet.

encrypts

The downfall of a simple packet filtering firewall is that it does not understand the context of the conversation, so it is easy for a _____ to craft a packet to pass through the firewall.

hacker


Related study sets

mastering in geology part 2 part 2

View Set

General Psychology Unit 2 (Chapters 5-8)

View Set

MKTG 361 EXAM 4 REVIEW QUESTIONS

View Set