MIDTERM EXAM CTS 1650
Which part of an Ethernet Frame uses a pad to increase the frame field to at least 64 bytes?
Data field
True or False? When a frame is encoded by the physical layer, all bits are sent over the media at the same time.
False
Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?
Hop Limit field
What addresses are mapped by ARP?
IPv4 address to a destination MAC address
A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?
The packet will be sent directly to the destination host.
What was the reason for the creation and implementation of IPv6?
to relieve IPv4 address depletion
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
issue the reload command without saving the running configuration.
which statement correctly describes frame encoding?
it converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
what are two services performed by the data link layer of the OSI model? (Choose two)
*It monitors the Layer 2 communication by building a MAC address table. It accepts Layer 3 packets and encapsulates them into frames *It provides media access control and performs error detection
What are two functions of end devices on a network? (Choose two.)*They are the interface between humans and the communication network*They direct data over alternate paths in the event of link failures.*They provide the channel over which the network message travels.*They filter the flow of data to enhance security.*They originate the data that flows through the network.
*They are the interface between humans and the communication network *They originate the data that flows through the network
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)
1- the hostname should be fewer than 64 characters in length. 2- the hostname should contain no spaces. 3- the hostname should begin with a letter.
Why would a technician enter the command copy startup-config running-config?
to copy an existing configuration into RAM
Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer?
ARP cache
What Layer 2 function does a router perform? (Choose three.)
Accepts a frame from a medium De-encapsulates the frame Re-encapsulates the packet into a new frame
Which statement accurately describes a characteristic of IPV4?
All IPv4 addresses are assignable to hosts.
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified.
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
It forwards the frame out of all ports except for the port at which the frame was received
What is done to an IP packet before it is transmitted over the physical medium?
It is encapsulated in a Layer 2 frame
What are three characteristics of an SVI? (Choose three.)
It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.
Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home or small business?
LAN
An administrator is configuring a new router to permit out of bad management access. Which set of commands will allow the required login using a password of cisco?
Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login
Which command is used to encrypt all passwords in a router configuration file?
Router_A (config)# service password-encryption
Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.)
ServerB will generate a frame with the destination MAC address of RouterB. ServerB will generate a packet with the destination IP address of HostA.
What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of NVRAM will change.
A network administrator is also designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
The end-user device needs mobility when connecting to the network.
What is a characteristics of statistic routes?
They are manually configured.
When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?
Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
VPN
Which of the following wireless standards is best suited for industrial Iot environments?
Zigbee
Which of these is the name for the capacity of a medium to carry data?
bandwidth
Which two OSI model layers have the same functionality as a single layer of the TCP/IP model?
data link and physical layers
This type of route is also known as a gateway of last resort.
default route
What is the order of the two addresses in the data link frame?
destination MAC, source MAC
How is the privileged EXEC mode access secured on a switch?
enable secret class
Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?
enable secret trustknow1
What is the name of the process of adding protocol information to data as it moves down the protocol stack?
encapsulation
What process involves placing one PDU inside of another PDU?
encapsulation
Which term refers to a network that provides secure access to the corporate offices by suppliers customers and collaborators?
extranet
Which is a valid hexadecimal number?
f
What type of network must a home user access in order to do online shopping?
internet
To what type of address are ICMPv6 neighbor solicitation message sent?
multicast
Which command can be used on a Windows host to display the routing table?
netstat -r
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
physical layer
What is one function of the ARP protocol?
resolving an IPv4 address to a MAC address
What is the command used on a Cisco IOS router to view the routing table?
show ip route
Which type of UTP cable is used to connect a PC to a switch port?
straight-through
What is stored in the NVRAM of a cisco router?
the startup configuration
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?
the use of full-duplex capable Layer 2 switches
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
this command prevents someone from viewing the running configuration passwords.