• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
You have a Frame Relay network. What type of encapsulation is necessary if the routers are from different vendors?
IETF Internet Engineering Task Force encapsulation
If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method are you using?
Cut-through
In which switching method does latency vary depending on frame length?
store-and-forward
The reasons to use a layer model are what?
To clarify what general functions are to be done rather than how to do them
To reduce the complexity of networking into more manageable sublayers
To enable interoperability using standard interfaces
To allow changes in one layer to occur without changing other layers
To speed up network industry progress by allowing specialization
To allow for shortcut explanations to facilitate protocol comparisons
To order network troubleshooting steps
To facilitate systematic troubleshooting
What part of the OSI model corresponds with the DoD's host-to-host layer?
Transport
How is cost calculated on an 802.1D link?
Bandwidth
What are the benefits of Fast Ethernet?
100BaseT has 10 times the performance of 10BaseT
All cable does not have to be upgraded
You can use most of your existing cabling and network equipment
10Mbps and 100Mbps can be used together
It uses tried-and-true CSMA/CD technology
Migration is easy
What is the distance limitation of 100BaseFX?
Up to 412 meters
What is the distance limitation of 1000BaseCX (IEEE 802.3z)
25 meters
What is the distance limitation of 1000BaseSX (IEEE 802.3z)
220 meters with 62.5 micron, 550 meters with 50 micron
What is the distance limitation of 1000BaseLX (IEEE 802.3z)
3 km to 10 km
What is the purpose of the Spanning Tree Protocol (STP)?
Bridges use the scanning-tree algorithm, enabling a learning bridge to dynamcially work around loops in a network topology by creating a spanning tree
What is the IEEE version of spanning tree?
IEEE 802.1d
Enhanced Editing Commands: CTRL + A, E, B, F, D
Ctrl+A = move cursor to beginning of line
Ctrl+E = Move cursor to end of line
Ctrl+B=Moves back one character
Ctrl+F = move forward one character
Ctrl+D = Deletes single character
Enhanced Editing Commands: CTRL + R, U, W, Esc+B, Esc+F
CTRL + R = Redisplays line
Ctrl + U=erase a line
Ctrl + W = Erase a word
Esc+B = Moves back one character
Esc+F = moves forward one word
What are the four layers of the DOD model?
(Application/Process), Host-to-Host (Transport), Internet, Network Access
What does the "Base" in 10BaseT indicate?
The word Base indicates baseband signaling, which is digital signalling
What is the process of placing one frame inside another?
Tunneling
You are at a client’s site, trying to detect the source of network trouble. While using a protocol analyzer, you detect the presence of BPDU frames. Identify the role of BPDU frames in a network environment.
Switches or bridges running Spanning Tree Protocol exchange Bridge Protocol Data Units (BPDUs) every two seconds. BPDUs carry bridge ID information that includes the MAC address and bridge priority of the source device.
How many unequal-cost load-balanced routes can IGRP support for a given destination network?
IGRP provides support for up to six unequal-cost load-balanced routes
the default configuration provides support for four.
When configuring a static route, which keyword would you use to ensure that the route is not removed even if the interface goes down?
If an interface shuts down or cannot communicate with the next-hop router, a static route is removed from the routing table unless the keyword permanent is used when the route is configured.
You have created access list 104 to be applied inbound. When you attempted to apply this list to an interface, you mistakenly linked the interface to access list 105, which does not exist. What will happen to traffic attempting to pass through the interface?
Prior to Cisco IOS 10.3, applying an undefined access list to an interface would stop all traffic from passing through the router. With later releases of the IOS, the router recognizes that there is no defined access list and continues routing.
While reviewing your running configuration, you notice an access list line that reads access-list 10 deny 192.168.5.19. The wildcard mask field is notably absent. How is this access list line interpreted by the router?
The wildcard mask is optional when configuring a standard access list. If a wildcard mask is not specified, the router interprets the statement to be that the list is to match all bits of the source address.
When is authentication of a PPP session completed?
After a link has been established, the authentication phase will proceed if authentication has been requested by either peer device. Once the authentication phase has completed, the Network layer protocol phase begins. Once the Network layer protocol phase is successfully completed, a PPP session has been established.
When might DDR be better than Frame Relay?
Dial-on-demand routing is well suited to networks that require periodic connections, that transfer small amounts of data, and that need to support telecommuters by providing access to the corporate network. As traffic demands grow, alternatives to DDR should be considered what commands would you use to set the history buffer to its maximum value?