Welcome, visitor! [ Register | Login

About trucksalad0


Data Communications And Networking 1
When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the CLI, what will be returned in the CLI?
What is a group of web pages that groups of individuals can edit and view together called?
The farther you are from the central office when utilizing a DSL connection, the ___ connection speed
What type of information would be found on a logical topology diagram?
IP addressing scheme
Which type of traffic must receive the highest priority from QoS?
What is encrypted with the enable secret command?
the privileged executive mode password
Which devices would be considered end devices on a network? (Choose four.)
· IP phone
· Tablet computer
· Server
· Printer
An ____ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization
Which of the following are business-class Internet connection technologies normally supplied by a service provider? (Choose two.)
Leased lines
Metro Ethernet
Why would a technician enter the command copy startup-config running config?
to copy an existing configuration into RAM
A ____ network is able to expand to accept new devices and applications without affecting performance.
What is a network infrastructure that provides access to other networks over a wide geographic area?
What is a converged network?
A network where voice, video, and data move over the same infrastructure
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation?
What is the Cisco IOS?
The operating system for the Cisco network device
In which scenario would the use of a WISP be recommended
a farm in rural area without wired broadband access
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address
SwitchA(config-if)# no shutdown
What is the technician configuring?
Where is the configuration used during startup on Cisco IOS devices located?
Startup config
Which statement describes a network that supports QoS?
The network provides predictable levels of service to different types of traffic
What is the primary defense against unauthorized remote access to network devices?
Configuring a VTY password
How is the Cisco IOS generally accessed and navigated?
Through the CLI using a terminal emulator
providing better social media opportunities
providing a richer e-learning environment
What is a wiki?
a web page that groups of people can edit and review
What is a fault-tolerant network?
A network that can reroute traffic in case of device failure
Which technology would be best to provide a home user with a highspeed, always-on Internet connection?
What are the primary requirements of information security? (Choose three.)
What command will display a list of keywords available for viewing the status of an IOS switch?
Switch# show?
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
Which device acts as gateway to allow hosts to send traffic to remote IP networks?
local router
What type of connection to a Cisco IOS switch is used to make the initial configuration?
Console port
A network administer has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly?
Type the command and then press the? key
Which of the following are disadvantages of peer-to-peer networking? (Choose two.)
No centralized administration
Which of the following are examples of proprietary protocols? (Choose two.)
Novell NetWare
response timeout
Which application layer protocol allows users on one network to reliably transfer files to and from a host on another network?
What is the purpose of protocols in data communications?
providing the rules required for a specific type of communication to occur
What organization is responsible for the overall management and development of Internet standards?
Which message delivery option is used when all devices need to receive the same message simultaneously?
A ___ address is defined as a reserved address that routes packets back to the host
Which two components are added to the PDU at the network access layer? (Choose two.)
· frame header
· Trailer
What is the transport layer PDU?
Which is a function of the Logical Link Control (LLC) sublayer?
to identify which network layer protocol is being used
What is and advantage of using standards to develop and implement protocols?
Which of the following elements do both human and computer communication systems have in common? (Choose three.)
· Channel
· Source
· Receiver
Which two factors influence the method that is used for media access control? (Choose two.)
· how connection between nodes appears to the data link layer
· how nodes share the media
In fiber optic meda, the signals are represented as patterns of ­
What is an advantage of using standards to develop and implement protocols?
What happens when two devices on the same subnet are communicating?
The host portion of the IP addresses will be different
Which message timing factor impacts how much information can be sent and the speed at which it can be delivered
What is the name given to a one-to-many message delivery option?
Which of the following OSI model layers have the same functionality as the network access layer in the TCP/IP model? (Choose two.)
Data link
Which two statements are true of the deterministic access method?(Choose two.)
· The throughput is predictable
· Devices take turns transmitting
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
(config) # service password-encryption
What type of protocol describes communication over a data link and the physical transmission of data on the network media?
Network access protocol
Which organization is responsible for the standard that defines Media Access Control for wired Ethernet?
Which TCP/IP model layer is responsible for providing the best path through the network?
Which two statements are true regarding the user EXEC mode? (Choose two.)
· Only some aspects of the router configuration can be viewed
· This is the default mode on an unconfigured router when first powered up.
Which statement is correct about network protocols?
They define how messages are exchanged between the sources and the destination
Which OSI reference model layer is responsible for common representation of the data transferred between application layer services?
Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model? (Choose two.)
What three functions are defined by network protocols to allow communication between known source and destination IP addresses? that's how to be me (Choose three.)
· message size
· data encoding
· delivery options
What happens to frames that are too long or too short for the channel used?
They are dropped.
What name is given to a group of interrelated protocols necessary to perform a communication function?
Protocol suite
Which organization is responsible for developing communications standards for Voice over IP (VoIP) devices?
The Telecommunications Industry Association (TIA)
What is a characteristic of a WAN hub-and-spoke topology?
The branch sites are connected to a central site through point-point links
Which statement describes a characteristic of the frame header fields of the data link layer?
They vary depending on protocols
Why would a network administrator use the CLI of the Cisco IOS?
to add a password to a Cisco network device
What is the function of the kernel of an operating software?
The kernel provisions hardware resources to meet software requirements.
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
· lacks centralized administration
· less cost to implement
· easy to create
What are two functions of end devices on a network? (Choose two.)
· They are the interface between humans and the communication network.
· They originate the data that flows through the network.
For which three reasons was a packet switched connectionless data communications technology used when developing the Internet (Choose three.)
· it can rapidly adapt to the failure of network devices and communication links
· Network devices dynamically decide on the best available path to forward each packet.
· Data packets can travel through the network using multiple different paths
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school
wireless LAN
What process is used to place one message inside another message for transfer from the source to the destination?
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Use the console port to locally access the switch from a serial or USB interface of the PC.
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, Ethernet
Which two engineering organizations define open standards and protocols that apply to the data link layer?
International Telecommunication Union (ITU)
Which type of network design combines voice, video, and data on the same communication channel?
a converged network
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
What two criteria are used to help select a network medium from various network media? (Choose two.)
· the distance the selected medium can successfully carry a signal
· the environment where the selected medium is to be installed
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain
What type of address is 01-00-5E-0A-00-02?
an address that reaches a specific group of hosts
Which two message timing mechanisms are used in data communication? (Choose two.)
· response timeout
· flow control
What is a characteristic of a contention-based access method?
It is as nondeterministic method
The Ethernet ___ sublayer is responsible for communicating directly with the physical layer.
Which two statements describe intermediary devices? (Choose two.)
· Intermediary devices direct the path of the data.
· Intermediary devices connect individual hosts to the network.
To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
What type of delivery uses data link layer addresses?
local delivery
What is the purpose of the physical link control field in a data link layer header?
to establish the media link
In which scenario would the use of a WISP be recommended?
a farm in a rural area without wired broadband access
A ___ network is able to expand to accept new devices and applications without affecting performance.
Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
Which statement describes a feature of an IOS host name configuration?
It does not allow spaces
What will a network administrator use to modify a configuration on a Cisco router?
Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to the interface?
no switchport
Which logical address is used for delivery of data to a remote network?
destination IP address
Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
· Cellular
· satellite
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
user EXEC mode
An ___ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization
What type of communication will send a message to all devices on a local area network?
Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.
· Cable
Which command or key combination allows a user to return to the previous level in the command hierarchy?
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
· providing better social media opportunities
· providing a richer e-learning environment
When is a wired connection preffered to a wireless connection by an end-user device?
when the end-user device will run an application that requires a dedicated connection to the network
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
flow control
Which device performs the function of determining the path that messages should take through internet works?
a router
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
an intranet
hich term describes the state of a network when the demand on the network resources exceeds the available capacity?
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
The client sends a synchronization segment to begin the session
Which term defines the processing capabilities of a switch by rating how much data can be processed per second?
forwarding rate
Which two functions or operations are performed by the MAC sublayer? (Choose two.)
· it adds a header and trailer to form an OSI Layer 2 PDU
· It is responsible for Media Access Control
What are two functions that are provided by the network layer? (Choose two.)
· directing data packets to destination hosts on other networks
· providing end devices with a unique network identifier
During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?
Which destination address is used in an ARP request frame?
Which two files are loaded into RAM by the router when it boots? (Choose two.)
· startup configuration
· IOS image
On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the___ MAC address
How does the network layer use the MTU value?
The MTU is passed to the network layer by the data link layer
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?
Flow Label
During troubleshooting procedures, from which location will most Cisco routers load a limited IOS
When a client connects to an HTTP server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response?
the original source port number that was randomly generated by the client
Which entities are involve in a temporary communication that is established by the transport layer?
Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?
gateway of last resort
A collision fragment, also known as a ___ frame, is a frame of fewer than 64 bytes in length.
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?
Within a production network, what is the purpose of configuring a switch with a default gateway address?
The default gateway address is used to forward packets originating from the switch to remote networks
What is the command netstat -r used for?
to display the host routing table
What is an advantage of UDP over TCP?
UDP communication requires less overhead
Which three fields are used in a UDP segment header? (Choose three.)
· Source Port
· Checksum
· Length
What happens if part of an FTP message is not delivered to the destination?
The part of the FTP message that was lost is re-sent
Which address is used as a destination address on a broadcast Ethernet frame?
Which number or set of numbers represents a socket?
What is the purpose of using a source port number in a TCP communication?
to keep track of multiple conversations between devices
A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as What type of address is this?
What is true about the Ethernet MAC address? (Choose three.)
· The first 6 hexadecimal digits of a MAC address represent the OUI.
· The vendor is responsible for assigning the last 24 bits of the MAC address.
· The MAC address is also known as a burned-in address.
A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?
To notify the workstation, that another router on the same network, is the better defaultgateway to reach the remote server
Which application use UDP as the transport layer protocol?
Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC?
IEEE 802.3
Which statement accurately describes public IP addresses?
Public IP addresses must be unique across the entire Internet
The last host address on the network is
What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer? (Choose three.)
· Error detection
· Frame delimiting
· Addressing
The 8-bit binary value for 41 is
What is the name given to the Ethernet MAC sublayer PDU?
Which address is a multicast MAC address?
The shortest compressed format of the IPv6 address 2001: 0DB8:0000:1470:0000:0000:0000:0200 is
Which field in an Ethernet frame is used for error detection?
Frame Check Sequence
At which layers of the OSI model does Ethernet function? (Choose two.)
· Physical
· Data link
What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3?
64 bytes - 1518 bytes
What happens when a data collision occurs on an Ethernet bus?
All devices stop transmitting and try again later.
Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks?
Which type of IPv6 address is not routable and used for communication on a single subnet?
link-local address
Which statement is true about an interface that is configured with the IPv6 address command?
A link-local IPv6 address is automatically
Which two statement describe broadcast transmissions on a wired network? (Choose two.)
· Directed broadcasts are intended for all hosts on a local or remote network
· Limited broadcasts are only intended for the hosts on a local network
Which entities are involved in a temporary communication that is established by the transport
Standards provide flexibility for manufacturers to create devices that comply with unique requirements
Products from different manufacturers can interoperate successfully
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this command?
to test if the workstation can communicate on the network
What are the parts of an IPv4 address? (Choose two.)
· Network
· Host
A client is downloading a large file from a server using FTP. Many of the segments are lost during transit. What will most likely happen?
The FTP client responds to the server with a smaller window size in the TCP header.
The TCP/IP application layer effectively consists of which three OSI layers?
Application, presentation, session
What are the primary purposes of the transport layer? (Choose three.)
· Identifying the proper application for each communication stream
· Segmenting data for and reassembling segmented data into streams of application data at the destination
· Tracking the individual communication between applications on the source and destination hosts
What is a characteristic of UDP? What range of ports can either be used by TCP or UDP to identify the requested service on the destination device or as a client source port?

Sorry, no listings were found.