• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/72

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

72 Cards in this Set

  • Front
  • Back

Which 3 statements are true about the operation of a full-duplex Ethernet network



- There are no collisions in full-duplex


- A dedicated switchport is required for each full-duplex node


- The host network card and the switch port must be capable of operating in full-duplex mode

The application layer of the TCP/IP uses the ______ protocol?

SMTP

The transport layer of the TCP/IP uses the _____ protocol?

TCP

The internet layer of the TCP/IP uses the _____ protocol?

IP

The network access layer of the TCP/IP uses the _______ protocol?

Ethernet

Which OSI layer header contains the address of a destination host that is on another network?

Network layer

Which layer of the TCP/IP stack combines the OSI model physical and data link layers?

Network access layer

Which protocol uses a connection-oriented service to deliver files between end systems?

FTP

If the hubs were replaced by switches, what would be virtually eliminated?

Ethernet collisions

Which network device functions only at Layer 1 of the OSI model?

hub

Which transport layer protocol provides best-effort delivery service with no acknowledgmentreceipt required?

UDP - provides a connectionless datagram service that offers best-effort delivery, which means thatUDP does not guarantee delivery or verify sequencing for any datagrams.

Which layer of the OSI model controls the reliability of communications between network devicesusing flow control, sequencing and acknowledgments?

Transport

Which statements are true regarding ICMP packets? (Choose two.)

- TRACERT uses ICMP packets.


- They are encapsulated within IP datagrams.

Which statements accurately describe CDP? (Choose three.)

-CDP is a Cisco proprietary protocol.


- CDP is a datalink layer protocol.


- CDP can discover directly connected neighboring Cisco devices

How does a switch differ from a hub?

A switch tracks MAC addresses of directly-connected devices.

What must occur before a workstation can exchange HTTP packets with a web server?

A TCP connection must be established between the workstation and the web server

How does TCP differ from UDP? (Choose two.)

- TCP provides synchronized communication.


- TCP provides sequence numbering of packets.

A workstation has just resolved a browser URL to the IP address of a server. What protocol willthe workstation now use to determine the destination MAC address to be placed into framesdirected toward the server?

ARP

Host A is sending a packet to Host B for the first time. What destination MAC address will Host Ause in the ARP request?

ff-ff-ff-ff-ff-ff

What are two common TCP applications? (Choose two.)

- SMTP


- FTP

Which two statements describe the operation of the CSMA/CD access method? (Choose two.)

- In a CSMA/CD collision domain, stations must wait until the media is not in use beforetransmitting.


- After a collision, all stations run a random backoff algorithm. When the backoff delay period hasexpired, all stations have equal priority to transmit data.

On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or fromanother vendor?

CDP

At which layer of the OSI model does the protocol that provides the information that is displayedby the show cdp neighbors command operate?

data link

Which two characteristics apply to Layer 2 switches? (Choose two.)

- increases the number of collision domains


- implements VLAN

Which two characteristics describe the access layer of the hierarchical network design model?(Choose two.)

- layer 3 support


- port security

Which two options will help to solve the problem of a network that is suffering a broadcast storm?(Choose two.)

-a router


- a Layer 3 switch

A switch receives a frame on one of its ports. There is no entry in the MAC address table for thedestination MAC address. What will the switch do with the frame?

forward it out of all ports except the one that received it

Which address type does a switch use to make selective forwarding decisions?

destination MAC address

What does a host on an Ethernet network do when it is creating a frame and it does not have thedestination address?

sends out an ARP request with the destination IP address

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on theswitch (collision, broadcast)?

48, 4

Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.)

- 10.1.168.0


-10.1.174.255


- 10.1.160.255

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?

192.168.1.40/29

Which two statements describe the IP address 10.16.3.65/23? (Choose two.)

- The lowest host address in the subnet is 10.16.2.1 255.255.254.0


- The broadcast address of the subnet is 10.16.3.255 255.255.254.0

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addressesare available on each of the subnets?

2 - (/30 CIDR corresponds to mask 55.255.255.252 whose binary is 11111100 whichmeans 6 subnet bits and 2 host bits which means 62 subnets and 2 hosts per subnet)

Which one of the following IP addresses is the last valid host in the subnet using mask255.255.255.224?

192.168.2.62

What is the subnet address of 172.16.159.159/22?

172.16.156.0

What is the subnet address for the IP address 172.19.20.23/28?

172.19.20.16

An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26mask. Which two addresses can be assigned to hosts within the same subnet? (Choose two.)

- 192.168.4.67


- 192.168.4.125

What is the network address for the host with IP address 192.168.23.61/28?

192.168.23.48

Which three items will adequately fulfill the request? (Choose three)

- one IP subnet with a mask of 255.255.254.0


- seven 48-port switches


- one router interface

What is the purpose of assigning an IP address to a switch?

allows remote management of the switch

What two things does a router do when it forwards a packet? (Choose two.)

- switches the packet to the appropriate outgoing interfaces


- determines the next hop on the path

What does administrative distance refer to?

a measure of the trustworthiness of a routing information source

Which IOS command is used to initiate a login into a VTY port on a remote router?

router# telnet




* VTY ports are telnet ports hence command B will initiate login to the telnet port

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router.No routing protocols or other static routes are configured on the router. Which statement is trueabout this command?

- Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.




*160 it's actually network address of /27 so any address within the range of 160network will be sent to 192.168.10.2

Which two of these functions do routers perform on packets? (Choose two.)

- Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops


- Examine the Layer 3 headers of inbound packets and use that information to determine thenext hops for the packets

Which two commands will display the current IP address and basic Layer 1 and 2 status of aninterface? (Choose two.)

- router#show protocols


- router#show controllers




* Router#show protocols displays status of configured Layer 2 and 3 protocols whileshow controllers Displays statistics for interface hardware including the current IP address

An administrator is in the process of changing the configuration of a router. What command willallow the administrator to check the changes that have been made prior to saving the newconfiguration?

- Router# show running-config

On a live network, which commands will verify the operational status of router interfaces? (Choosetwo.)

- Router# show interfaces


- Router# show ip interface brief

Which router command will configure an interface with the IP address 10.10.80.1/19?

- router(config-if)# ip address 10.10.80.1 255.255.224.0

What is the best practice when assigning IP addresses in a small office of six hosts?

Assign the addresses statically on each node.

Name the protocol:




A PC sends packets to the default gateway IP address the first time since the PC is turned on

ARP - Address Resolution Protocol

Name the protocol:




The network administrator is checking basic IP connectivity from a workstation to a server

ICMP -


Name the protocol:




The TCP/IP protocol stack must find an IP address for packets destined for a URL

DNS - Domain Name

Name the protocol:




A network device will automatically assign IP addresses to workstations

DHCP

Name the protocol:




A PC with address 10.1.5.10 must access devices on the Internet

NAT - Network Address Translation

Name the protocol:




Only routers and servers require static IP addresses. Easy IP administration is required

DHCP -

Name the protocol:




A PC only knows a server as /MediaServer. IP needs to send data to that server.

DNS

Name the protocol:




A protocol is needed to replace current static routes with automatic route updates

OSPF

Protocol definitions:




A protocol used to monitor and manage network devices

SNMP

Protocol definitions:




A reliable, connection-oriented service that uses TCP to transfer files between systems

FTP

Protocol definitions:




A connectionless service that uses UDP to transfer files between systems

TFTP

Protocol definitions:




A protocol that converts human-readable names into machine readable addresses

DNS

Protocol definitions:




Used to assign IP addresses automatically and set parameters such as subnet mask and default gateway

DHCP

In the configuration of NAT, what does the keyword overload signify?

Multiple internal hosts will use one IP address to access external network resources.

What happens when computers on a private network attempt to connect to the Internet through aCisco router running PAT?

The router uses the same IP address but a different TCP source port number for eachconnection.




*Port Address Translation makes the PC connect to the Internet but using differentTCP source port

When configuring NAT, the Internet interface is considered to be what?

outside

The ip helper-address command does what?

relays a DHCP request across networks

An administrator has connected devices to a switch and, for security reasons, wants thedynamically learned MAC addresses from the address table added to the running configuration.What must be done to accomplish this?

Enable port security and use the keyword sticky

A company has placed a networked PC in a lobby so guests can have access to the corporatedirectory. A security concern is that someone will disconnect the directory PC and re-connect theirlaptop computer and have access to the corporate network. For the port servicing the lobby, whichthree configuration steps should be performed on the switch to prevent this? (Choose three.)

-Enable port security


-Create the port as an access port


- Statically assign the MAC address to the address table

Why would a network administrator configure port security on a switch?

to prevent unauthorized hosts from accessing the LAN

How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?

Configure the server MAC address as a static entry of port security