IST 201 test 2

Ace your homework & exams now with Quizwiz!

Describe the running configuration file in Cisco IOS devices: (Select all answers that apply.) 2.2.3.1 Save the Running Configuration File

. viewable in privileged EXEC mode b. modifying it affects the operation of a Cisco device immediately c. reflects the current configuration applied to a Cisco IOS device.

Place the seven fields of an Etherent Frame in order:

1. Preamble 2. Start of Frame Delimiter 3. Destination MAC Address 4. Source MAC Address 5. Length 6. Data (encapsulated) 7. Frame Check Sequence

The Subnet 255.255.254.0 can be represented with WHAT binary code? (fill in each blank with the appropriate octet binary code) [1st_octet] . [2nd_octet] . [3rd_octet] . [4th_octet] ________ . _________ . _________ . _________

11111111.11111111.11111110.00000000

The hexadecimal number 10 converts to _____ in decimal. (type number)

16

What is the last host address for the network 172.25.0.64/26? Hint: see below to figure out the last host address. subnet mask /26 --> 11111111.11111111.11111111.11000000 There are 6 host bits in the subnet mask. network address 172.25.0.64 .01000000 In the network address, all host bits are zeros 1st host address 172.25.0.65 .01000001 last host address .01111110 broadcast address .01111111 In the broadcast address, all host bits are ones

172.25.0.126

The first ______ bits of a MAC address structure are used by the vendor assigned OUI.

24

The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 20 Mb/s for the same time period. The goodput for this network is ____ Mb/s

60

How many usable host addresses are there in the subnet 192.168.1.32/26? (give answer as number) Hint: /26 --> 11111111.11111111.11111111.11000000 Find the number of host bits (n) in the subnet mask? Then use this formula , to find the No. of usable host address = 2n-2

62

Ethernet [a] is the most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router Ethernet [b] is an uncommon cable used to interconnect similar devices together. For example to connect a switch to a switch, a host to a host, or a router to a router. [c] is a Cisco proprietary cable used to connect to a router or switch console port.

A: Straight-through B: crossover C: rollover

To create a banner message of the day on a network device, use the ______[a]______ # the message of the day # global config command. The "#" in the command syntax is called the ____[b]____ character and can be any character as long as it does not occur in the message

A: banner motd B: delimiting

In [a] switching, the switch acts upon the data as soon as it is received, even if the transmission is not complete In [b] switching, when the switch receives the frame, it stores the data in buffers until the complete frame has been received.

A: cut-through B: Store-and-forward

The [a] interface allows remote Management on a Layer 2 switch; by default it is interface [b]. Review 2.3.1.2 Interfaces and Ports

A: switch virtual B: enabled

legacy port that was used to establish a CLI session remotely using a modem PuTTY Secure Shell (SSH) Console Port Telnet AUX port

AUX port

Used by the MAC sublayer to identify the source and destination nodes. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type

Addressing:

The binary number 1011 1111 can be expressed as _______ in hexadecimal.

BF

a physical management port that provides out-of-band access to a Cisco device PuTTY Secure Shell (SSH) Console Port Telnet AUX port

Console Port

Identifies special flow control services. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type

Control

Moves to the beginning of the line Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Ctrl-A

Exits the configuration mode or aborts the current command Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Ctrl-C

Moves to the end of the line Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Ctrl-E

Redisplays a line Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Ctrl-R

Allows the user to interrupt an IOS process such as ping or traceroute Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Ctrl-Shift-6

Exits the configuration mode and returns to user EXEC Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Ctrl-Z

Which number in hexadecimal corresponds to the decimal number 13? (type appropriate number/letter)

D

Contains the frame payload (i.e., packet header, segment header, etc.). Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type

Data

Allows the user to scroll backward through former commands Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Down Arrow

Included after the data to form the trailer. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type

Error Detection:

Destination and source MAC addresses do not change when a frame goes from one LAN to another.

False

Ethernet is a contention-based method of networking.

False

Used by the MAC sublayer to identify the beginning and end limits. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type

Frame start and stop indicator flags:

What do the highlighted numbers and characters mean?

It is the result of a service password-encryption command.

It places information in the frame that identifies which network layer protocol is being used for the frame. Media Access Control (MAC) Logical Link Control (LLC)

Logical Link Control (LLC)

This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media. Media Access Control (MAC) Logical Link Control (LLC)

Logical Link Control (LLC)

This upper sublayer defines the software processes that provide services to the network layer protocols. Media Access Control (MAC) Logical Link Control (LLC)

Logical Link Control (LLC)

It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use. Media Access Control (MAC) Logical Link Control (LLC)

Media Access Control (MAC)

This lower sublayer defines the media access processes performed by the hardware. Media Access Control (MAC) Logical Link Control (LLC)

Media Access Control (MAC)

In a network that uses IPv4, what prefix would best fit a subnet containing valid 255 hosts? Hint: No. of usable hosts = 2n-2 255 = 2n-2 Find n (the number of host bits needed in the subnet mask) Next, find the subnet mask in binary -_ _ _ _ _ _ _ _ . _ _ _ _ _ _ _ _ . _ _ _ _ _ _ _ _ . _ _ _ _ _ _ _ _

Prefix /23 gives 2^9-2=510 host addresses

a terminal emulation program available for connecting to a networking device either by a serial connection or by a SSH/Telnet connection PuTTY Secure Shell (SSH) Console Port Telnet AUX port

PuTTY

Why would a Layer 2 switch need an IP address? Remote management Use the ? character To verify the internal IP configuration on a local host. The operating system for the Cisco network device

Remote management

The process that a source host uses to determine the destination MAC address is known as _____________________ Protocol.

Reverse Address Resolution Protocol

a method for remotely establishing a secure CLI connection through a virtual interface PuTTY Secure Shell (SSH) Console Port Telnet AUX port

Secure Shell (SSH)

In [b] switching, when the switch receives the frame, it stores the data in buffers until the complete frame has been received.

Store-and-forward

Ethernet [a] is the most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router

Straight-through

Completes the remainder of a partially typed command or keyword Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Tab

an insecure method of remotely establishing a CLI session through a virtual interface PuTTY Secure Shell (SSH) Console Port Telnet AUX port

Telnet

What is the Cisco IOS? Remote management Use the ? character To verify the internal IP configuration on a local host. The operating system for the Cisco network device

The operating system for the Cisco network device

An Optical time domain reflectometer injects a test pulse of light into a fiber-optic cable segment and measures backscatter and reflection of light detected as a function of ____

Time

Why use the Ping command? Remote management Use the ? character To verify the internal IP configuration on a local host. The operating system for the Cisco network device

To verify the internal IP configuration on a local host.

Multimode fiber (MMF) consists of a larger core and uses LED emitters to send light pulses. Specifically, light from an LED enters the multimode fiber at different angles.

True

Used by the LLC to identify the Layer 3 protocol. Error Detection: Control: Frame start and stop indicator flags: Addressing Data Type

Type:

Allows the user to scroll forward through former commands Up Arrow Ctrl-Z Ctrl-C Ctrl-Shift-6 Ctrl-R Tab Ctrl-A Down Arrow Ctrl-E

Up Arrow

How do you access help screens in Cisco routers? Remote management Use the ? character To verify the internal IP configuration on a local host. The operating system for the Cisco network device

Use the ? character

The __________________ address is the IP address of the router that a host PC will use to access remote networks, including the Internet.

default gateway

On a MAC or Linux host, the ipconfig command is used to identify the MAC address of an Ethernet adapter

false

The more host bits that are borrowed, the fewer subnets that can be defined.

false

IPv6 uses a similar process to ARP for IPv4, known as ICMPv6 ____________________.

neighbor discovery

Enable a virtual interface using the __________________ interface configuration command.

no shutdown

[c] is a Cisco proprietary cable used to connect to a router or switch console port.

rollover

Servers and peripherals should have a predictable _________ IP address.

static

A switch can have multiple MAC addresses associated with a single port.

true

Any device that can be the source or destination of an Ethernet frame must be assigned a MAC address.

true

Changes to router and switch configurations take effect as soon as the command is entered.

true

Destination IP addresses in a packet header remain constant along the entire path to a target host.

true

Fiber-optic cable is completely immune to EMI and RFI.

true

If no device responds to an ARP request, the packet is dropped

true

Physical addresses at the data link layer have no meaning beyond the local network.

true

The terms subnet and network are often used interchangeably. Most networks are a subnet of some larger address block.

true

There is no one frame structure that meets the needs of all data transportation across all types of media.

true

Two optical fibers are required to support full duplex operation.

true

When a configured router properly boots up, it will display in ______________ mode.

user EXEC

The MAC address table is sometimes referred to as a __________________________________ table

content addressable memory


Related study sets

Pharm HESI Quizzes compass Hesi 2023

View Set

Chapter 21: The Immune System: Innate and Adaptive Body Defenses

View Set

Google Data Analytics (General terms Course 1)

View Set

General Psychology: Social Cognition, Quiz 11

View Set

Conflicts of Interest in Human Subjects Research (ID 17464)

View Set

General Wisconsin Insurance Laws

View Set

Test 1-4: Law of Laplace & Surface Tension

View Set