• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/62

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

62 Cards in this Set

  • Front
  • Back
Which of the following networks are private internetworks?
10.1.1.0/24
192.168.1.0/24
172.16.5.0/24
Which command will display details of the configured access lists?
Show access-lists
Given the following IP address 10.2.3.4/24, what is the broadcast address on this network?
10.2.3.255
In ISDN what point of the network is best described as device having a native ISDN interface?
TE1
The OSI model is rarely used as a training tool for network engineers?
FALSE
what WAN protocols used CHAP authentication
PPP
What IOS command was issued to display the following frame of relay PVC's?
show frame pvc
ISDN BRI is?
2 x 64K B channels and one 16K D channel
to set an interface to ppp mode what ios command is required? assume you are in interface mode.
encapsulation ppp
All but one one of the following is an OSI layer, which is NOT?
System
Which of the following are connection-oriented protocols?
TCP & FTP
Which following class of addresses contains the least number of hosts available?
Class C
Bits are converted to frames at which layer of the OSI model?
Data link & layer 2
It takes three packets to start a TCP session, how many packets are used to close it?
4
Routing of IP is a function of which OSI layer?
Network
Frame Relay is what type of protocol?
Connection oriented
How do you create a sub-interface on S0 on a Cisco 2501?
interface 20.1 point-to-point
Which of the following are features of Wi-Fi Protected Access (WPA)?
-WPA provides secure wireless networking
-WPA solves the issues found in Wired Equivalent Privacy (WEP) encryption.
What three Local Management Interface (LMI) types are supported on Cisco routers?
-ANSI
-Cisco
-Q933a
What is the term used for the Ethernet communication mechanism by which hosts can send and receive data simultaneously?
full-duplex
In the Frame Relay environment, which methods can be used to map an IP address to a Data-Link Connection Identifier (DLCI)?
-Inverse ARP
-Static map
A device has an address of 192.168.144.21 and a mask of 255.255.255.240. What will be the broadcast address for the subnet to which this device is attached?
192.168.144.31
Which of the following statements are TRUE of public Internet Protocol (IP) addressing?
-These addresses are publicly registered with the Internet Network Information Center (InterNIC)
-Through a public IP address, you can access another computer on the Internet, such as a Web server.
Which method does the Wi-Fi Protected Access (WPA) use to encrypt data?
MIC/TKIP
You are the senior network administrator for a large corporation. Some new trainees have recently joined the network security team. You are educating them about denial-of-service (DoS) attacks and the risks posed to a network by such attacks.

Which of the following risks does a DoS attack pose to a network? (Choose three.)
-Downtime and productivity loss
-Revenue loss
-Information theft
Which of the following is used for infection containment during the threat detection and mitigation process?
Cisco PIX firewall
Which statements represent physical security guidelines that should be followed during Cisco security deployment?
-Potential security breaches should be evaluated.
-The potential impact of stolen network resources and equipment should be assessed.
You are configuring a serial link between a Cisco router and a router produced by another vendor. What would be the advantages of using Point to Point Protocol (PPP) over High Level Data Link Control (HDLC) in this scenario?
HDLC has a proprietary "type" field that may be incompatible with equipment from other vendors.
Which Cisco IOS command disables Cisco Discovery Protocol Version 2 (CDPv2) advertisements?
no cdp advertise-v2
Which service is denoted by TCP/UDP port number 53?
Domain Name Service (DNS)
Which Internet Control Message Protocol (ICMP) message is sent by a host in the network to test connectivity with another host?
ICMP echo-request message
Which command is used on the Cisco Catalyst 2950 series switch to configure a port as a VLAN trunk port?
switchport mode trunk
What are the three types of Internet Protocol version 6 (IPv6) addresses?
Unicast
Anycast
Multicast
What is the purpose of frame tagging in Virtual LAN (VLAN) configurations?
frame identification over trunk links
Which media access control method is used by Ethernet technology to minimize collisions in the network?
CSMA/CD
Which Ethernet LAN contention or access method listens for a signal on the channel before transmitting data, and stops transmitting if a collision is detected?
CSMA/CD
Which of the following statements are TRUE of public Internet Protocol (IP) addressing? (2)
These addresses are publicly registered with the Internet Network Information Center (InterNIC).

Through a public IP address, you can access another computer on the Internet, such as a Web server.
Which organization manages and distributes global public IP addresses?
IANA
Which command is used on the Cisco Catalyst 2950 series switch to configure a port as a VLAN trunk port?
switchport mode trunk
A device has an address of 192.168.144.21 and a mask of 255.255.255.240. What will be the broadcast address for the subnet to which this device is attached?
192.168.144.31
You are the network administrator for your company. You have a Class B address range and are planning for a network that allows 150 hosts per subnet and up to 164 subnets.

Which subnet mask should you use to accomplish the task?
255.255.255.0
What is the default sequence in which a router searches for the Internetwork Operating System (IOS) image upon power on?
Flash, TFTP, ROM
Which of the following statements are TRUE regarding EIGRP operation? (Choose two.)
A successor is a primary route, and is installed in both the routing and topology tables.

A feasible successor is a backup route, and is only installed in the topology table.
In the network exhibit, the routers are running OSPF and are set to the defaults. What would be the effect of configuring a loopback interface on RouterA with an address of 192.168.1.50/24?
Router A would become the DR
Which Cisco Internetwork Operating System (IOS) command would be used to set the privileged mode password to "cisco"?
router(config)# enable password cisco
What is the maximum number of characters that are permitted for configuring a Service Set Identifier (SSID) in an Access Point (AP)?
32
Which method does the Wi-Fi Protected Access (WPA) use to encrypt data?
MIC/TKIP
You are configuring a serial link between a Cisco router and a router produced by another vendor. What would be the advantages of using Point to Point Protocol (PPP) over High Level Data Link Control (HDLC) in this scenario?
HDLC has a proprietary "type" field that may be incompatible with equipment from other vendors.
Which statements represent physical security guidelines that should be followed during Cisco security deployment? (Choose two.)
Potential security breaches should be evaluated.

The potential impact of stolen network resources and equipment should be assessed.
Which of the following is used for infection containment during the threat detection and mitigation process?
Cisco PIX firewall
Which Wide Area Network (WAN) switching technology is used by Asynchronous Transfer Mode (ATM)?
cell switching
Which Cisco IOS command disables Cisco Discovery Protocol Version 2 (CDPv2) advertisements?
no cdp advertise-v2
You need to configure an extended IP access list on your Cisco router. You need to control users' access by port.

Which of the following is NOT a valid entry for the port field in an IP extended access list?
IP
Which Frame Relay component is responsible for transmitting keepalives to ensure the PVC does not time out?
LMI
At which layer in the Open Systems Interconnection (OSI) model does flow control generally operate?
the transport layer
File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP) work at which layer in the Open Systems Interconnection (OSI) model?
the application layer
Which of the following is NOT a valid range for private IP addresses?
193.0.0.0 - 192.255.255.255
Which of the following is NOT a characteristic of private Internet Protocol (IP) addressing?
These addresses are publicly registered with the Internet Network Information Center (InterNIC).
What is the purpose of using the show arp command?
To view the Address Resolution Protocol (ARP) cache
Which command will enable you to configure only serial interface 0 on a Cisco router?
router(config)#interface serial 0
Which Cisco Internetwork Operating System (IOS) command is used to view the number of Enhanced Interior Gateway Routing Protocol (EIGRP) packets that are sent and received?
show ip eigrp traffic
Which Enhanced Interior Gateway Routing Protocol (EIGRP) packet type is used for neighbor discovery?
Hello