Cisco 1,2, 3,4 Flashcards

1
Q

All end devices and network devices require an

A

Operating Systems (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The user can interact with the shell using a

A

command-line interface (CLI) or a graphical user interface (GUI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The physical part of a computer including underlying electronics

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A switch will forward traffic by default and does not need to be explicitly configured to operate.

A

Access Methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

you can use to connect to a networking device either by a serial connection over a console port, or by an SSH/Telnet connection

A

Terminal Emulation Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device.

A

User EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To execute configuration commands, a network administrator must access

A

Privileged EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mode allows access to only a limited number of basic monitoring commands.

It is often referred to as “view-only” mode.

A

User EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mode allows access to all commands and features.

The user can use any monitoring commands and execute configuration and management commands.

A

Privileged EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to configure console, SSH, Telnet, or AUX access.

A

Line Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Used to configure a switch port or router network interface.

A

Interface Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To move in and out of global configuration mode, use the

A

Configure Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

As shown in the figure, the portion of the OS that interacts directly with computer hardware is known as the kernel. The portion that interfaces with applications and the user is known as the shell.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When using a CLI, the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt,

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A GUI such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

GUIs may not always be able to provide all the features available with the CLI. GUIs can also fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a CLI. The CLI is less resource intensive and very stable when compared to a GUI.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When you are learning how to modify device configurations, you might want to start in a safe, non-production environment before trying it on real equipment.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which IOS mode allows access to all commands and features?

A

Privileged EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which IOS mode are you in if the Switch(config)# prompt is displayed?

A

Global Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which IOS mode are you in if the Switch> prompt is displayed?

A

User EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)

A

CTRL Z

END

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

This is a specific parameter defined in the operating system (in the figure, ip protocols).

A

Keyword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).

A

Argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

text indicates commands and keywords that you enter literally as shown.

A

Boldface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

text indicates arguments for which you supply values

A

Italics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

indicate an optional element (keyword or argument)

A

Square Brackets`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

indicate a required element (keyword or argument).

A

Braces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.

A

Braces and vertical lines within square brackets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The command is ping and the user-defined argument is the ip-address of the destination device. For example, ping 10.10.10.5.

A

ping ip-address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The command is traceroute and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254.

A

Traceroute ip-address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

When a command output produces more text than can be displayed in a terminal window, the IOS will display a “–More–” prompt.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The use of weak or easily guessed passwords continues to be the biggest security concern of organizations. Network devices, including home wireless routers, should always have passwords configured to limit administrative access.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be encrypted and legal notifications provided.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the command to assign the name “Sw-Floor-2” to a switch?

A

hostname SW-floor 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How is the privileged EXEC mode access secured on a switch?

A

enable secret class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which command enables password authentication for user EXEC mode access on a switch?

A

login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which command encrypts all plaintext passwords access on a switch?

A

service password encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which is the command to configure a banner to be displayed when connecting to a switch?

A

banner motd $ Keep out $

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.

A

startup-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.

A

running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The downside to using the reload command to remove an unsaved running config is the brief amount of time the device will be offline, causing network downtime.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the structure of an IPv4 address called?

A

dotted- decimal format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How is an IPv4 address represented?

A

four decimal number between 0 and 255 separated by period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What type of interface has no physical port associated with it?

A

Switch Virtual Interface SVI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

(DHCP).

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which statement is true about the running configuration file in a Cisco IOS device?

A

It affects the operation of the device immediately when modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which two statements are true regarding the user EXEC mode?

A

The device prompt for this mode ends with >

Only some aspects of the router configuration can be viewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which type of access is secured on a Cisco router or switch with the enable secret command?

A

privileged EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the default SVI on a Cisco switch?

A

VLAN1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines?

A

Should begin with letter

no spaces

no more than 64 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the function of the shell in an OS?

A

Interfaces between the users and kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display

A

User EXEC Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

A

Nothing must be done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which memory location on a Cisco router or switch will lose all content when the device is restarted?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Why would a technician enter the command copy startup-config running-config?

A

To copy an existing configuration into RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which functionality is provided by DHCP?

A

Automatic assignment of an IP address to each host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

A

Displaying a list of available commands within the current mode

determining which keyword, option, or argument is available for the entered command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which memory location on a Cisco router or switch stores the startup configuration file?

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

A

10.1.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Whether connecting to a local printer in the home or a website in another country, before any network communications can occur, a___ ____ to a local network must be established

A

physical connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

NIC

A

Network Interface Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Not all physical connections are equal, in terms of the performance level, when connecting to a network.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The destination node physical layer retrieves these individual signals from the media, restores them to their bit representations, and passes the bits up to the data link layer as a complete frame.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

he physical layer is only concerned with wired network connections.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

When a frame is encoded by the physical layer, all bits are sent over the media at the same time.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

The physical layer of the receiving device passes bits up to which higher level layer?

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

The physical layer of the receiving device passes bits up to which higher level layer?

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The protocols and operations of the upper OSI layers are performed using software designed by software engineers and computer scientists.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

The physical layer consists of electronic circuitry, media, and connectors developed by engineers.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

ISO

A

International Organization for Standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

TIA/EIA

A

Telecommunications Industry Association/Electronic Industries Association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

ITU

A

International Telecommunication Union

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

ANSI

A

American National Standards Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

IEEE

A

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

FCC

A

National telecommunications regulatory authorities including the Federal Communication Commission in the USA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

(ETSI)

A

the European Telecommunications Standards Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

The physical layer standards address three functional areas:

A

Physical Components

Encoding

Signaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

are the electronic hardware devices, media, and other connectors that transmit the signals that represent the bits.

A

Physical Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

is a method of converting a stream of data bits into a predefined “code”

A

Encoding or Line Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

The physical layer must generate the electrical, optical, or wireless signals that represent the “1” and “0” on the media.

A

Signaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Different physical media support the transfer of bits at different rates. Data transfer is usually discussed in terms of

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Bandwidth is typically measured in

A

Kilobits per second (kbps), Megabit per second (Mbps) or gigabits per second (Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Terms used to measure the quality of bandwidth include:

A

Latency

Throughput

Goodput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

refers to the amount of time, including delays, for data to travel from one given point to another.

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

is the measure of the transfer of bits across the media over a given period of time.

A

Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

There is a third measurement to assess the transfer of usable data; it is known as

A

Goodput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which media uses patterns of microwaves to represent bits?

A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which media uses patterns of light to represent bits?

A

Fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Which media uses electrical pulses to represent bits?

A

copper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Which of these is the name for the capacity of a medium to carry data?

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which of these is a measure of the transfer of bits across the media?

A

throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

can distort and corrupt the data signals being carried by copper media. Potential sources of EMI and RFI include radio waves and electromagnetic devices, such as fluorescent lights or electric motors.

A

Electromagnetic interference (EMI) or radio frequency interference (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Is a disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an adjacent wire.

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

cabling is the most common networking media.

A

Unshielded Twisted Pair (UTP Cable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

provides better noise protection than UTP cabling

A

Shielded Twisting Pairing (STP Cable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

gets its name from the fact that there are two conductors that share the same axis.

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

A copper conductor is used to transmit the electronic signals.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

A layer of flexible plastic insulation surrounds a copper conductor.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

The insulating material is surrounded in a woven copper braid, or metallic foil, that acts as the second wire in the circuit and as a shield for the inner conductor. This second layer, or shield, also reduces the amount of outside electromagnetic interference.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

The entire cable is covered with a cable jacket to prevent minor physical damage.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Coaxial cables attach antennas to wireless devices. The coaxial cable carries radio frequency (RF) energy between the antennas and the radio equipment.

A

Wireless Installations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Cable service providers provide internet connectivity to their customers by replacing portions of the coaxial cable and supporting amplification elements with fiber-optic cable. However, the wiring inside the customer’s premises is still coax cable.

A

Cable Internet Installations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which of the following attaches antennas to wireless devices? It can also be bundled with fiber-optic cabling for two-way data transmission.

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which of the following counters EMI and RFI by using shielding techniques and special connectors?

A

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Which of the following is the most common network media?

A

UTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Which of the following terminates with BNC, N type and F type connectors?

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

When used as a networking medium, UTP cabling consists of four pairs of color-coded copper wires that have been twisted together and then encased in a flexible plastic sheath. Its small size can be advantageous during installation.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

UTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered other ways that they can limit the negative effect of crosstalk:

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Designers now pair wires in a circuit. When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each other. Therefore, the two magnetic fields cancel each other and also cancel out any outside EMI and RFI signals.

A

Cancellation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

To further enhance the cancellation effect of paired circuit wires, designers vary the number of twists of each wire pair in a cable. UTP cable must follow precise specifications governing how many twists or braids are permitted per meter (3.28 feet) of cable. Notice in the figure that the orange/orange white pair is twisted less than the blue/blue white pair. Each colored pair is twisted a different number of times.

A

Varying the number of twists per wire pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit signal degradation and effectively provide self-shielding for wire pairs within the network media.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

The most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router.

A

Ethernet Straight-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

A cable used to interconnect similar devices. For example, to connect a switch to a switch, a host to a host, or a router to a router.

A

Ethernet Crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Using a crossover or straight-through cable incorrectly between devices may not damage the devices, but connectivity and communication between the devices will not take place.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Optical fiber cable transmits data over longer distances and at higher bandwidths than any other networking media.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Optical fiber is a flexible, but extremely thin, transparent strand of very pure glass, not much bigger than a human hair

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

(SMF)

A

Single Mode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

MMF

A

Multimode fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Used for backbone cabling applications and interconnecting infrastructure devices

A

Enterprise Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Used to provide always-on broadband services to homes and small businesses

A

Fiber-to-the-Home (FTTH

129
Q

Used by service providers to connect countries and cities

A

Long-Haul Networks

130
Q

Used to provide reliable high-speed, high-capacity solutions capable of surviving in harsh undersea environments at up to transoceanic distances. Search the internet for “submarine cables telegeography map” to view various maps online.

A

Submarine Cable Networks

131
Q

Which of the following fiber-optic cable types can help data travel approximately 500 meters?

A

Multimode

132
Q

Which of the following fiber-optic cable types use light emitting diodes (LEDs) as a data light source transmitter?

A

Multimode

133
Q

Which of the following fiber-optic cable types use lasers in a single stream as a data light source transmitter?

A

Single mode

134
Q

Which of the following fiber-optic cable types is used to connect long-distance telephony and cable TV applications?

A

Single Mode

135
Q

Which of the following fiber-optic cable types can travel approximately 100 km?

A

Single mode

136
Q

Which of the following fiber-optic cable types is used within a campus network?

A

Multi mode

137
Q

Wireless data communication technologies work well in open environments. However, certain construction materials used in buildings and structures, and the local terrain, will limit the effective coverage.

A

Coverage Area

138
Q

Wireless is susceptible to interference and can be disrupted by such common devices as household cordless phones, some types of fluorescent lights, microwave ovens, and other wireless communications.

A

Interface

139
Q

Wireless communication coverage requires no access to a physical strand of media. Therefore, devices and users, not authorized for access to the network, can gain access to the transmission. Network security is a major component of wireless network administration

A

Security

140
Q

WLANs operate in half-duplex, which means only one device can send or receive at a time. The wireless medium is shared amongst all wireless users. Many users accessing the WLAN simultaneously results in reduced bandwidth for each user.

A

Shared medium

141
Q

commonly referred to as Wi-Fi.

A

Wi-Fi (IEEE 802.11)

142
Q

This is a wireless personal area network (WPAN) standard, commonly known as

A

Bluetooth

143
Q

this wireless standard uses a point-to-multipoint topology to provide wireless broadband access.

A

WiMAX (IEEE 802:16)

144
Q

specification used for low-data rate, low-power communications.

A

Zigbee (IEEE 802.15.4)

145
Q

These concentrate the wireless signals from users and connect to the existing copper-based network infrastructure, such as Ethernet. Home and small business wireless routers integrate the functions of a router, switch, and access point into one device, as shown in the figure

A

Wireless Access Point (AP)

146
Q

These provide wireless communication capability to network hosts.

A

Wireless NIC adapters

147
Q

True or false. Wireless is not well suited for enterprise networks.

A

T

148
Q

True or false. Wireless LANs operate in full-duplex allowing all devices to send or receive data at the same time so the number of users does not impact performance.

A

F

149
Q

Which of the following wireless standards is best suited for industrial and IoT environments?

A

Zigbee

150
Q

Which of the following wireless standards is used for Personal Area Networks (PANs) and allows devices to communicate over distances of 1 to 100 meters?

A

Bluetooth

151
Q

The signals are patterns of electrical pulses.

A

Copper Cable

152
Q

The signals are patterns of light.

A

Fiber optic Cable

153
Q

The signals are patterns of microwave transmissions.

A

Wireless

154
Q

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

A

Physical Layer

155
Q

What type of cable is used to connect a workstation serial port to a Cisco router console port?

A

rollover

156
Q

Why are two strands of fiber used for a single fiber optic connection?

A

They allow for full duplex connectivity

157
Q

Which procedure is used to reduce the effect of crosstalk in copper cables?

A

Twisting opposite circuit wire pairs together

158
Q

What is one advantage of using fiber optic cabling rather than copper cabling?

A

Able to carry signals much farther than copper cabling

159
Q

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

A

End user device needs mobility when connecting to the network

160
Q

Which type of UTP cable is used to connect a PC to a switch port?

A

Straight through

161
Q

What is the definition of bandwidth?

A

Amount of data that can flow from one place to another in a given amount of time

162
Q

Which statement correctly describes frame encoding?

A

It converts bits into a predefined code in order to provide a predictible pattern to help distinguish data bits from control bits

163
Q

What is a characteristic of UTP cabling?

A

Cancellation

164
Q

A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion?

A

Microwave oven

165
Q

What is the purpose of the OSI physical layer?

A

Transmitting bits across the local media

166
Q

Which characteristic describes crosstalk?

A

The distortion of the transmitted of messages from signals carried in adjacent wires

167
Q

What is indicated by the term throughput?

A

Measure of the bits transferred the media over a given period of time

168
Q

Which standards organization oversees development of wireless LAN standards?

A

IEEE

169
Q

IP address

A

Internet protocol address

170
Q

The email server runs email server software. Clients use mail client software, such as Microsoft outlook, to access on the server.

A

Email

171
Q

Client and server software usually run on separate computers, but it is also possible for one computer to be used for both roles at the same time.

In small businesses and homes, many computers function as the servers and clients on the network. This type of network is called a peer-to-peer network.

A

Peer-to-Peer

172
Q

USB

A

Universal Serial Bus

173
Q

NIC

A

network interface card

174
Q

The network devices that people are most familiar with are end devices. To distinguish one end device from another, each end device on a network has an address

A

End Devices

175
Q

. They can connect multiple individual networks to form an internetwork

A

Intermediary Devices

176
Q

Intermediary network devices perform some or all of these functions:

A

Regereate and retransmit communication signals

Maintain information about what pathways exist through the network and internetwork

Notify other devices of errors and communication failures
Direct data along alternative pathways when there is a link failure

Classify and direct messages according to priorities
Permit or deny the flow of data, based on security settings

177
Q

Network Media

A

Communication transmits across a network on media. The media provides the channel over which the message travels from source to destination

178
Q

Data is encoded into electrical impulses.

A

Metal wires within cables

179
Q

Data is encoded into pulses of light.

A

Glass or plastic fibers within cables (fiber-optic cable)

180
Q

Data is encoded via modulation of specific frequencies of electromagnetic waves.

A

Wireless transmission

181
Q

Network architects and administrators must be able to show what their networks will look like.

A

Network Representation

182
Q

A NIC physically connects the end device to the network.

A

Network Interface Card

183
Q

A connector or outlet on a networking device where the media connects to an end device or another networking device.

A

Physical port

184
Q

Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.

A

Interface

185
Q

are mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.

A

Topology diagrams

186
Q

topology diagrams illustrate the physical location of intermediary devices and cable installation, as shown in the figure.

A

Physical topology diagrams

187
Q

topology diagrams illustrate devices, ports, and the addressing scheme of the network, as shown in the figure.

A

Logical topology diagrams

188
Q

networks allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers

A

Small office and home office

189
Q

is the largest network in existence. In fact, the term internet means a “network of networks”. It is a collection of interconnected private and public networks.

A

The internet

190
Q

LAN

A

Local area networks

191
Q

WAN

A

Wide area networks

192
Q

ISP

A

Internet service provider

193
Q

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

A

Cable

194
Q

Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet.

A

DSL

195
Q

are people, or electronic devices, that need to send a message to other individuals or devices.

A

Message source (sender)

196
Q

The destination receives the message and interprets it.

A

Message Destination (receiver)

197
Q

This consists of the media that provides the pathway over which the message travels from source to destination.

A

Channel

198
Q

Sending a message, whether by face-to-face communication or over a network, is governed by rules called protocols.

A

T

199
Q

Before communicating with one another, individuals must use established rules or agreements to govern the conversation.

A

T

200
Q

Network Protocol Requirements

A

Message encoding
Message formatting and encapsulation
Message size
Message timing
Message delivery options

201
Q

This is the process of managing the rate of data transmission.

A

Flow Control

202
Q

If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly.

A

Response Timeout

203
Q

This determines when someone can send a message.

A

Access method

204
Q

What is the process of converting information into the proper form for transmission?

A

Encoding

205
Q

Which step of the communication process is concerned with properly identifying the address of the sender and receiver?

A

Formatting

206
Q

Which three are components of message timing?

A

Flow Control

Access Method

Response Timeout

207
Q

Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?

A

Multicast

208
Q

Network protocols define a common format and set of rules for exchanging messages between devices.

A

T

209
Q

Protocols enable two or more devices to communicate over one or more networks.

The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.

A

Network Communications Protocols

210
Q

Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).

A

Network Security Protocols

211
Q

rotocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).

A

Routing Protocols

212
Q

Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.

A

Service Discovery Protocols

213
Q

This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.

A

Addressing

214
Q

This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.

A

Reliability

215
Q

This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.

A

Flow control

216
Q

This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.

A

Sequencing

217
Q

This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.

A

Error Detection

218
Q

This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.

A

Application Interface

219
Q

A message sent over a computer network typically requires the use of several protocols, each one with its own functions and format.

A

Protocol Interaction

220
Q

This protocol governs the way and web server and a web client interact

A

Hypertext Transfer Protocol (HTTP)

221
Q

Is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices

A

TCP

222
Q

This protocol is responsible for delivering messages from the sender to the receiver

Is used by routers to forward the messages across mulptiple networks.

A

IP

223
Q

Is responsible for the deliver of messages from one NIC to another NIC on the same Ethernet local area network LAN

A

Ethernet

224
Q

BGP and OSPF are examples of which type of protocol?

A

Routing

225
Q

Which two protocols are service discovery protocols?

A

DNS

DHCP

226
Q

What is the purpose of the sequencing function in network communication?

A

To uniquely label transmitted segments of data for proper reassembly by the receiver

227
Q

This protocol is responsible for guaranteeing the reliable delivery of information.

A

TCP

228
Q

A protocol suite is a group of inter-related protocols necessary to perform a communication function.

A

T

229
Q

Is a set of protocols that work together to provide comprehensive network communication services.

A

Protocol Suites

230
Q

Is the most common and relevant protocol suite used today

A

Internet Protocol Suite/ TCP or IP

231
Q

Is a family of protocols developed jointly in 1977 by the International Organization for Standardization (ISO)

A

Open System Interconnection (OSI)

232
Q

A short-lived proprietary protoclol suite released by Apple Inc.

A

Apple Talk

233
Q

A short-lived proprietary protocol suite released and network operating system developed by Novell Inc.

A

Novell Netware

234
Q

TCP/IP protocols are available for the application, transport, and internet layers

A

T

235
Q

This means it is freely available to the public and can be used by any vendor on their hardware or in their software

A

Open Standard Protocol Suite

236
Q

This means it has been endorsed by the networking industry and approved by a standard organization

A

Standards based protocol suite

237
Q

DNS

A

Domain Name System. Translates domain names such as cisco.com, into IP addresses.

238
Q

Dynamic Host Configuration Protocol for IPv4.

A

DHCPv4

239
Q

DHCPv6A DHCPv6 server dynamically assigns IPv6 addressing information to DHCPv6 clients at start-up.

A

DHCPv6

240
Q

SLAAC

A

Stateless Address Autoconfiguration. A method that allows a device to obtain its IPv6 addressing information without using a DHCPv6 server.

241
Q

Enables clients to send email to a mail server and enables servers to send email to other servers.

A

Simple Mail Transfer Protocol.

242
Q

Enables clients to retrieve email from a mail server and download the email to the client’s local mail application.

A

POP3 - Post Office Protocol version 3

243
Q

Enables clients to access email stored on a mail server as well as maintaining email on the server.

A

IMAP - Internet Message Access Protocol

244
Q

Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is a reliable, connection-oriented, and acknowledged file delivery protocol.

A

FTP - File Transfer Protocol.

245
Q

As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session in which the file transfer is encrypted. SSH is a method for secure remote login that is typically used for accessing the command line of a device.

A

SFTP - SSH File Transfer Protocol.

246
Q

A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP.

A

TFTP - Trivial File Transfer Protocol.

247
Q

A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.

A

HTTP - Hypertext Transfer Protocol

248
Q

A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.

A

HTTPS - HTTP Secure.

249
Q

A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.

A

REST - Representational State Transfer.

250
Q

UDP and TCP belong to which layer of the TCP/IP protocol?

A

Transport

251
Q

Which two protocols belong in the TCP/IP model application layer?

A

DNS, DHCP

252
Q

Which protocol operates at the network access layer of the TCP/IP model?

A

Ethernet

253
Q

Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)

A

ECMPv4

ICMPv6

254
Q

A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device?

A

IP at the internet layer

255
Q

Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)

A

Routing Protocols

Messaging

Internet Protocol

256
Q

Open standards encourage interoperability, competition, and innovation. They also guarantee that the product of no single company can monopolize the market or have an unfair advantage over its competition.

A

T

257
Q

Various organizations have different responsibilities for promoting and creating standards for the internet and TCP/IP protocol.

A

T

258
Q

Responsible for promoting the open development and evolution of internet use throughout the world.

A

Internet Society (ISOC)

259
Q

Responsible for the overall management and development of internet standards.

A

Internet architecture Board (IAB)

260
Q

Develops, updates, and maintains internet and TCP/IP technologies. This includes the process and documents for developing new protocols and updating existing protocols, which are known as Request for Comments (RFC) documents

A

Internet Engineering Task Force (IETF)

261
Q

Focused on long term research related to internet TCP/IP protocols such as Anti-Spam Research Group (ASRG) Crypto Forum Research Group (CFRG) and Peer to Peer Research Group (P2PRG)

A

Internet Research Task Force (IRTF)

262
Q

Based in the United States, ICANN coordinates IP address allocation the management of domains names, and assignment of other information us in TCP/IP protocols.

A

Internet Corporation for Assigned Names and numbers (CANN)

263
Q

Responsible for overseeing and managing IP address allocation, domain name management and protocol identifiers for ICANN

A

Internet Assigned Numbers Authority (IANA)

264
Q

Organization of electrical engineering and electronics dedicated to advancing technological innovation and creating standards in a wide area of industries including power and energy, healthcare, telecommunications, and networking. Important IEEE networking standards include 802.3 Ethernet and 802.11 WLAN standard. Search the internet for other IEEE network standards.

A

Institute of Electrical and Electronics Engineers

265
Q

Organization is best known for its standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.

A

Electronic Industries Alliance (EIA)

266
Q

Organization responsible for developing communication standards in a variety of areas including radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more.

A

Telecommunications Industry Association (TIA)

267
Q

One of the largest and oldest communication standards organizations. The ITU-T defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL).

A

International Telecommunications Union-Telecommunication Standardization Sector (ITU-T)

268
Q

True or false. Standards organizations are usually vendor-neutral.

A

T

269
Q

This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.

A

Internet Engineering Task Force (IETF)

270
Q

This standards organization is responsible for IP Address allocation and domain name management

A

Internet Assigned Numbers Authority (IANA)

271
Q

What types of standards are developed by the Electronics Industries Alliance (EIA)

A

Electric Wiring and Connectors

272
Q

layer contains protocols used for process-to-process communications.

A

application

273
Q

layer provides for common representation of the data transferred between application layer services.

A

presentation

274
Q

layer provides services to the presentation layer to organize its dialogue and to manage data exchange.

A

session

275
Q

layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.

A

transport

276
Q

layer provides services to exchange the individual pieces of data over the network between identified end devices.

A

network

277
Q

layer protocols describe methods for exchanging data frames between devices over a common media

A

data link

278
Q

protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.

A

physical layer

279
Q

Represents data to the user, plus encoding and dialog control.

A

Application

280
Q

Supports communication between various devices across diverse networks.

A

Transport

281
Q

Determines the best path through the network.

A

Internet

282
Q

Controls the hardware devices and media that make up the network.

A

Network Access

283
Q

Because a large data stream is segmented into packets, large amounts of data can be sent over the network without tying up a communications link. This allows many different conversations to be interleaved on the network called multiplexing.

A

Increases speed

284
Q

-If a single segment is fails to reach its destination due to a failure in the network or network congestion, only that segment needs to be retransmitted instead of resending the entire data stream.

A

Increases efficiency

285
Q

The general term for the PDU used at the application layer

A

Data

286
Q

Transport layer PDU

A

Segment

287
Q

Network Layer PDU

A

Packet

288
Q

Data Link layer PDU

A

Frame

289
Q

Physical layer PDU used when physically transmitting data over the medium

A

Bits

290
Q

When messages are being sent on a network, the encapsulation process works from top to bottom.

A

T

291
Q

De-encapsulation is the process used by a receiving device to remove one or more of the protocol headers.

A

T

292
Q

What is the process of dividing a large data stream into smaller pieces prior to transmission?

A

Segmentation

293
Q

What is the PDU associated with the transport layer?

A

Segment

294
Q

Which protocol stack layer encapsulates data into frames?

A

Data Link

295
Q

What is the name of the process of adding protocol information to data as it moves down the protocol stack?

A

Encapsulation

296
Q

The network and data link layers are responsible for delivering the data from the source device to the destination device.

A

T

297
Q

Responsible for delivering the IP packet from the original source to the final destination, which may be on the same network or a remote network.

A

Network layer source and destination addresses

298
Q

Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network.

A

Data link layer source and destination addresses

299
Q

True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway.

A

T

300
Q

True or false? The right-most part of an IP address is used to identify the network that a device belongs to.

A

F

301
Q

What is used to determine the network portion of an IPv4 address?

A

Subnet Mask

302
Q

Which of the following statements are true regarding network layer and data link layer addresses?

A

Network Layer addressess are logical and data link addresses are expressed as 12 hexadecimal digits

Data link layer addresses are physical and network layer addresses are logical

Network layer addresses are either 32 or 128 bits in lengths

303
Q

What is the order of the two addresses in the data link frame?

A

Destination MAC, Source MAC

304
Q

True or False? Data Link addresses are physical so they never change in the data link frame from source to destination.

A

F

305
Q

Which three acronyms/initialisms represent standards organizations?

A

IEEE

IANA

306
Q

In computer communication, what is the purpose of message encoding?

A

to convert information to the appropriate form for transmission

307
Q

Which message delivery option is used when all devices need to receive the same message simultaneously?

A

broadcast

308
Q

What are two benefits of using a layered network model? (Choose two.)

A

It assists in protocol design

It prevents technology in one layer from affecting other layers

309
Q

What is the purpose of protocols in data communications?

A

Providing the rules required for a specific type of communication to occur

310
Q

Which logical address is used for delivery of data to a remote network?

A

Destination IP address

311
Q

What is the general term that is used to describe a piece of data at any layer of a networking model?

A

Protocol Data Unit

312
Q

Which two protocols function at the internet layer? (Choose two.)

A

IP

ICMP

313
Q

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

A

Transport

314
Q

Which type of communication will send a message to a group of host destinations simultaneously?

A

Multicast

315
Q

What process is used to receive transmitted data and convert it into a readable message?

A

Decoding

316
Q

What is done to an IP packet before it is transmitted over the physical medium?

A

It is encapsulated in a layer 2 frame

317
Q

What process is used to place one message inside another message for transfer from the source to the destination?

A

Encapsulation

318
Q

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

A

HTTP, TCP, IP, Ethernet