• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/47

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

47 Cards in this Set

  • Front
  • Back
What is an ISP?
It is an organization that enables individuals and businesses to connect to the Internet.
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?
leased line
What are two characteristics of a scalable network?
grows in size without impacting existing userssuitable for modular devices that allow for expansion
For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet?
It can rapidly adapt to the loss of data transmission facilities.
It efficiently utilizes the network infrastructure to transfer data.
Data packets can travel multiple paths through the network simultaneously
A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem?
Move the cable to the router console port.
From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?
The delimiting character appears in the banner message.
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
This command prevents someone from viewing the running configuration passwords.
A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access?
default gateway
dns server
HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process?
A frame with the destination MAC address of RouterA.
A packet with the destination IP address of ServerB
What three primary functions does data link layer encapsulation provide? (Choose three.)
addressing
error detection
frame delimiting
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
The end-user device needs mobility when connecting to the network.
What makes fiber preferable to copper cabling for interconnecting buildings?
greater distances per cable run
limited susceptibility to EMI/RFI
greater bandwidth potential
A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?
partial mesh
What is the function of CSMA/CA in a WLAN?
it provides the mechanism for media access.
What are two actions performed by a Cisco switch
It provides the mechanism for media access.
What are two actions performed by a Cisco switch?
using the source MAC addresses of frames to build and maintain a MAC address table
utilizing the MAC address table to forward frames via the destination MAC address
What information is added during encapsulation at OSI Layer 3?
source and destination IP address
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?
The Source Address field name from IPv4 is kept in IPv6.
The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
Which two functions are primary functions of a router?
packet switching
path selection
Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?
Locate and load the startup-config file from NVRAM.
A router boots and enters setup mode. What is the reason for this?
the configuration file is missing from NVRAM.
Why are port numbers included in the TCP header of a segment?
to enable a receiving host to forward the data to the appropriate application
What is one purpose of the TCP three-way handshake?
synchronizing sequence numbers between source and destination in preparation for data transfer
What are two ways that TCP uses the sequence numbers in a segment
to identify missing segments at the destination
to reassemble the segments at the remote location
A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?
6,001
A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?
4
Which service will translate private internal IP addresses into Internet routable public IP addresses?
nat
A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks?
192.168.99.0/26
192.168.99.64/27
What are the three parts of an IPv6 global unicast address?
global routing prefix
subnet ID
interface ID
The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create?
4096
Which statement describes a characteristic of the traceroute utility?
It identifies the routers in the path from a source host to a destination host
What three statements describe features or functions of media access control?
t is responsible for detecting transmission errors in transmitted data.
Data link layer protocols define the rules for access to different media.
Ethernet utilizes CSMA/CD.
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
physical layer
Why are the paired wires twisted in a CAT5 cable
to provide eletromagnetic noise cancellation
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?
it will discrad the frame
the ARP table in a switch maps which two types of address together?
Layer 3 address to a Layer 2 address
Which two types of applications rely on their traffic having priority over other traffic types through the network?
video
voice
Which devices should be secured to mitigate against MAC address spoofing attacks?
Layer 2 devices
Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?
line
Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity?
shows the IP address of the next hop router for each route
A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says “This connection has limited or no connectivity.” The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem?
The workstation is unable to obtain an IP address from a DHCP server.
To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?
The configuration should have been copied to the running configuration instead.
What is the effect of setting the security mode to WEP on the Linksys integrated router?
It encrypts data between the wireless client and the access point.
Which two settings could be changed to improve security on the wireless network
ssid
ssid broadcast
the minimum Ethernet frame size is ____ bytes. Anything smaller than that should be considered a "runt frame." fill in the blank"
64
In dotted decimal notation, the IP address ______________s the last host address for the network 172.25.0.64/26.
172.25.0.126/26
how many bits in a nibble?
4