• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/57

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

57 Cards in this Set

  • Front
  • Back

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

easy to create


lacks centralized administration


less cost to implement

Which device performs the function of determining the path that messages should take through internetworks?

a router

What two criteria are used to help select a network medium from various network media? (Choose two.)

the distance the selected medium can successfully carry a signal


the environment where the selected medium is to be installed

Which two statements describe intermediary devices? (Choose two.)

Intermediary devices direct the path of the data.


Intermediary devices connect individual hosts to the network.

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

wireless LAN

What type of network must a home user access in order to do online shopping?

the Internet

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

an intranet

Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)

DSL


Cable



Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

cellular


satellite

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

congestion

What are two functions of end devices on a network? (Choose two.)

They originate the data that flows through the network.


They are the interface between humans and the communication network.

What type of network traffic requires QoS?

video conferencing

Which expression accurately defines the term bandwidth?

a measure of the data carrying capacity of the media

A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?

data confidentiality

Which statement describes a characteristic of cloud computing?

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

Which statement describes the use of powerline networking technology?

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

What security violation would cause the most amount of damage to the life of a home user?

capturing of personal data that leads to identity theft

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

implementing a firewall


installing antivirus software

A _____ network is capable of delivering voice, video, text, and graphics over the same communication channels.

converged

The acronym_____ refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.

BYOD

What is the function of the kernel of an operating software?

The kernel provisions hardware resources to meet software requirements.

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

SSH

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Use the console port to locally access the switch from a serial or USB interface of the PC.

Which command or key combination allows a user to return to the previous level in the command hierarchy?

exit

A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

displaying a list of all available commands within the current mode


determining which option, keyword, or argument is available for the entered command

Which information does the show startup-config command display?

the contents of the saved configuration file in the NVRAM

Why is it important to configure a hostname on a device?

to identify the device during remote access (SSH or telnet)

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

RM-3-Switch-2A4


SwBranch799

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Issue the reload command without saving the running configuration.

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

What are two characteristics of RAM on a Cisco device? (Choose two.)

The configuration that is actively running on the device is stored in RAM.


The contents of RAM are lost during a power cycle.

Which interface allows remote management of a Layer 2 switch?

the switch virtual interface

Which interface is the default SVI on a Cisco switch?

VLAN 1

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

What command can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?

The PC was preconfigured to use DHCP.

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

if there is connectivity with the destination device

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

flow control

What type of communication will send a message to all devices on a local area network?

broadcast

What process is used to place one message inside another message for transfer from the source to the destination?

encapsulation

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, TCP, IP, Ethernet

Which statement is correct about network protocols?

They define how messages are exchanged between the source and the destination.

Which statement is true about the TCP/IP and OSI models?

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully.

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

DHCP


DNS


FTP

What are proprietary protocols?

protocols developed by organizations who have control over their definition and operation

What is an advantage of network devices using open standard protocols?

A client host and a server running different operating systems can successfully exchange data.

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

application


presentation


session

At which layer of the OSI model would a logical address be encapsulated

network layer

Which PDU format is used when bits are received from the network medium by the NIC of a host?

frame

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

segment

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

A frame with the destination MAC address of RouterA.


A packet with the destination IP address of ServerB

Which address does a NIC use when deciding whether to accept a frame?

destination MAC address

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts in other networks.

Which characteristic describes the default gateway of a host computer?

the logical address of the router interface on the same network as the host computer