When
the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS
device using the CLI, what will be returned in the CLI? |
EaSt-2+56(config)# |
What
is a group of web pages that groups of individuals can edit and view together
called? |
Wiki |
The farther you are from the central
office when utilizing a DSL connection, the ___ connection speed |
slower |
Which
type of network design combines voice, video, and data on the same
communication channel? |
a
converged network |
What
type of information would be found on a logical topology diagram? |
IP
addressing scheme |
Which type of traffic must receive the
highest priority from QoS? |
VoIP |
What
is encrypted with the enable secret command? |
the
privileged executive mode password |
Which
devices would be considered end devices on a network? (Choose four.) |
·
IP
phone ·
Tablet
computer ·
Server ·
Printer |
An ____ is a private connection of LANs
and WANs that belongs to an organization, and is designed to be accessible
only by the members and employees of the organization, or others with
authorization |
intranet |
For which three reasons was a packet
switched connectionless data communications technology used when developing
the Internet (Choose three.) |
·
it
can rapidly adapt to the failure of network devices and communication links ·
Data
packets can travel through the network using multiple different paths ·
Network
devices dynamically decide on the best available path to forward each packet. |
In
which scenario would the use of a WISP be recommended? |
a farm
in a rural area without wired broadband access |
Which
of the following are business-class Internet connection technologies normally
supplied by a service provider? (Choose two.) |
Leased
lines Metro
Ethernet |
Why would a
technician enter the command copy startup-config running config? |
to copy
an existing configuration into RAM |
A
____ network is able to expand to accept new devices and applications without
affecting performance. |
scalable |
What
is a network infrastructure that provides access to other networks over a
wide geographic area? |
LAN |
What
is a converged network? |
A network
where voice, video, and data move over the same infrastructure |
An
administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the device? |
Nothing
must be done. Changes to the configuration on an IOS device take effect as
soon as the command is typed correctly and the Enter key has been pressed. |
A data center has
recently updated a physical server to host multiple operating systems on a
single CPU. The data center can now provide each customer with a separate web
server without having to allocate an actual discrete server for each
customer. What is the network trend that is being implemented by the data
center in this situation? |
virtualization |
What
is the Cisco IOS? |
The
operating system for the Cisco network device |
In
which scenario would the use of a WISP be recommended |
a farm in
rural area without wired broadband access |
During a routine
inspection, a technician discovered that software that was installed on a
computer was secretly collecting data about websites that were visited by
users of the computer. Which type of threat is affecting this computer? |
spyware |
A
technician configures a switch with these commands: SwitchA(config)#
interface vlan 1 SwitchA(config-if)#ip
address 192.168.1.1 255.255.255.0 SwitchA(config-if)#
no shutdown What
is the technician configuring? |
SVI |
Where
is the configuration used during startup on Cisco IOS devices located? |
Startup
config |
Which statement
describes a network that supports QoS? |
The network provides predictable
levels of service to different types of traffic |
What
is the primary defense against unauthorized remote access to network devices? |
Configuring
a VTY password |
How
is the Cisco IOS generally accessed and navigated? |
Through
the CLI using a terminal emulator |
What
are two benefits of collaboration and video-on-demand applications? (Choose
two.) |
providing
better social media opportunities providing
a richer e-learning environment |
What
is a wiki? |
a web
page that groups of people can edit and review |
What
is a fault-tolerant network? |
A
network that can reroute traffic in case of device failure |
Which technology
would be best to provide a home user with a highspeed, always-on Internet
connection? |
DSL |
What
are the primary requirements of information security? (Choose three.) |
Confidentiality Integrity Availability |
What
command will display a list of keywords available for viewing the status of
an IOS switch? |
Switch#
show? |
To
save time, IOS commands may be partially entered and then completed by typing
which key or key combination? |
Tab |
What
is initially entered at the CLI of the Cisco IOS when typing a command
sequence? |
Command |
Which
device acts as gateway to allow hosts to send traffic to remote IP networks? |
local
router |
Which
statement describes a feature of an IOS host name configuration? |
It does
not allow spaces |
Why
would a network administrator use the CLI of the Cisco IOS? |
to add a
password to a Cisco network device |
What
type of connection to a Cisco IOS switch is used to make the initial
configuration? |
Console
port |
A
network administer has forgotten the argument of an IOS command. How would
the administrator get help from the IOS CLI to complete the command correctly? |
Type the
command and then press the? key |
Which
of the following are disadvantages of peer-to-peer networking? (Choose two.) |
Scalability No
centralized administration |
Which of the
following are examples of proprietary protocols? (Choose two.) |
Novell NetWare AppleTalk |
Which
two message timing mechanisms are used in data communication? (Choose two.) |
flow
control response
timeout |
Which
application layer protocol allows users on one network to reliably transfer
files to and from a host on another network? |
FTP |
What
is the purpose of protocols in data communications? |
providing
the rules required for a specific type of communication to occur |
What organization
is responsible for the overall management and development of Internet
standards? |
IAB |
What will a network
administrator use to modify a configuration on a Cisco router? |
IOS |
Which
message delivery option is used when all devices need to receive the same
message simultaneously? |
broadcast |
A
___ address is defined as a reserved address that routes packets back to the
host |
loopback |
Which
two components are added to the PDU at the network access layer? (Choose
two.) |
·
frame
header ·
Trailer |
What
is the transport layer PDU? |
Segment |
Which is a function
of the Logical Link Control (LLC) sublayer? |
to
identify which network layer protocol is being used |
What
is and advantage of using standards to develop and implement protocols? |
Products
from different manufacturers can interoperate successfully |
Which
organization develops the 802 family of standard for wired and wireless LANs
and MANs? |
IEEE |
Which of the
following elements do both human and computer communication systems have in
common? (Choose three.) |
·
Channel ·
Source ·
Receiver |
Which
two factors influence the method that is used for media access control?
(Choose two.) |
·
how
connection between nodes appears to the data link layer ·
how
nodes share the media |
In
fiber optic meda, the signals are represented as patterns of |
light |
What
is an advantage of using standards to develop and implement protocols? |
Products
from different manufacturers can interoperate successfully |
What
happens when two devices on the same subnet are communicating? |
The host
portion of the IP addresses will be different |
Which
message timing factor impacts how much information can be sent and the speed
at which it can be delivered |
Flow
control |
What
is the name given to a one-to-many message delivery option? |
Multicast |
Which
of the following OSI model layers have the same functionality as the network
access layer in the TCP/IP model? (Choose two.) |
Data
link Physical |
Which two
statements are true of the deterministic access method?(Choose two.) |
·
The
throughput is predictable ·
Devices
take turns transmitting |
Which
logical address is used for delivery of data to a remote network? |
destination
IP address |
What command will
prevent all unencrypted passwords from displaying in plain text in a
configuration file? |
(config)
# service password-encryption |
What
type of protocol describes communication over a data link and the physical
transmission of data on the network media? |
Network
access protocol |
Which organization
is responsible for the standard that defines Media Access Control for wired
Ethernet? |
IEEE |
Which
TCP/IP model layer is responsible for providing the best path through the
network? |
Internet |
Which
two statements are true regarding the user EXEC mode? (Choose two.) |
·
Only
some aspects of the router configuration can be viewed ·
This
is the default mode on an unconfigured router when first powered up. |
Which
statement is correct about network protocols? |
They
define how messages are exchanged between the sources and the destination |
Which
OSI reference model layer is responsible for common representation of the
data transferred between application layer services? |
Presentation |
Which
of the following TCP/IP protocols exist at the transport layer of the TCP/IP
reference model? (Choose two.) |
·
UDP ·
TCP |
What
three functions are defined by network protocols to allow communication
between known source and destination IP addresses? (Choose three.) |
·
message
size ·
data
encoding ·
delivery
options |
What
happens to frames that are too long or too short for the channel used? |
They are
dropped. |
What
name is given to a group of interrelated protocols necessary to perform a
communication function? |
Protocol
suite |
Which
organization is responsible for developing communications standards for Voice
over IP (VoIP) devices? |
The
Telecommunications Industry Association (TIA) |
What
is a characteristic of a WAN hub-and-spoke topology? |
The
branch sites are connected to a central site through point-point links |
Which
statement describes a characteristic of the frame header fields of the data
link layer? |
They
vary depending on protocols |
Why
would a network administrator use the CLI of the Cisco IOS? |
to add a
password to a Cisco network device |
What
is the function of the kernel of an operating software? |
The
kernel provisions hardware resources to meet software requirements. |
A
company is contemplating whether to use a client/server or a peer-to-peer
network. What are three characteristics of a peer-to-peer network? (Choose
three.) |
·
lacks
centralized administration ·
less
cost to implement ·
easy
to create |
What
are two functions of end devices on a network? (Choose two.) |
·
They
are the interface between humans and the communication network. ·
They
originate the data that flows through the network. |
For
which three reasons was a packet switched connectionless data communications
technology used when developing the Internet (Choose three.) |
·
it
can rapidly adapt to the failure of network devices and communication links ·
Network
devices dynamically decide on the best available path to forward each packet. ·
Data
packets can travel through the network using multiple different paths |
Which
area of the network would a college IT staff most likely have to redesign as
a direct result of many students bringing their own tablets and smartphones
to school to access school |
wireless
LAN |
What
process is used to place one message inside another message for transfer from
the source to the destination? |
encapsulation |
Which
procedure is used to access a Cisco 2960 switch when performing an initial
configuration in a secure environment? |
Use the
console port to locally access the switch from a serial or USB interface of
the PC. |
A
web client is sending a request for a webpage to a web server. From the
perspective of the client, what is the correct order of the protocol stack
that is used to prepare the request for transmission? |
HTTP,
TCP, IP, Ethernet |
Which
two engineering organizations define open standards and protocols that apply
to the data link layer? |
International
Telecommunication Union (ITU) |
Which
type of network design combines voice, video, and data on the same communication
channel? |
a
converged network |
An
administrator has just changed the IP address of an interface on an IOS
device. What else must be done in order to apply those changes to the device? |
Nothing
must be done. Changes to the configuration on an IOS device take effect as
soon as the command is typed correctly and the Enter key has been pressed. |
A
network administrator needs to keep the user ID, password, and session
contents private when establishing remote CLI connectivity with a switch to
manage it. Which access method should be chosen? |
SSH |
What
two criteria are used to help select a network medium from various network
media? (Choose two.) |
·
the
distance the selected medium can successfully carry a signal ·
the
environment where the selected medium is to be installed |
Which
organization develops the 802 family of standard for wired and wireless LANs
and MANs? |
IEEE |
An
administrator measured the transfer of usable data across a 100 Mb/s physical
channel over a given period of time and obtained 60 Mb/s. Which kind of
measurement did the administrator obtain |
latency |
What
type of address is 01-00-5E-0A-00-02? |
an
address that reaches a specific group of hosts |
Which
two message timing mechanisms are used in data communication? (Choose two.) |
·
response
timeout ·
flow
control |
What
is a characteristic of a contention-based access method? |
It is as
nondeterministic method |
The
Ethernet ___ sublayer is responsible for communicating directly with the
physical layer. |
MAC |
Which
two statements describe intermediary devices? (Choose two.) |
·
Intermediary
devices direct the path of the data. ·
Intermediary
devices connect individual hosts to the network. |
To
save time, IOS commands may be partially entered and then completed by typing
which key or key combination? |
Tab |
What
type of delivery uses data link layer addresses? |
local
delivery |
What
is the purpose of the physical link control field in a data link layer
header? |
to
establish the media link |
In
which scenario would the use of a WISP be recommended? |
a farm in
a rural area without wired broadband access |
A ___ network is able to expand to accept new
devices and applications without affecting performance. |
scalable |
Which
PDU is processed when a host computer is de-encapsulating a message at the
transport layer of the TCP/IP model? |
segment |
Which
statement describes a feature of an IOS host name configuration? |
It does
not allow spaces |
What
will a network administrator use to modify a configuration on a Cisco router? |
IOS |
Which
interface command must be entered in a Layer 3 switch before IPv4 address can
be assigned to the interface? |
no
switchport |
Which
logical address is used for delivery of data to a remote network? |
destination
IP address |
Which
two Internet connection options do not require that physical cables be run to
the building? (Choose two.) |
·
Cellular ·
satellite |
A
router has a valid operating system and a configuration file stored in NVRAM.
The configuration file contains an enable secret password but no console
password. When the router boots up, which mode will display? |
user EXEC
mode |
An
___ is a private connection of LANs and WANs that belongs to an organization,
and is designed to be accessible only by the members and employees of the
organization, or others with authorization |
intranet |
What
type of communication will send a message to all devices on a local area
network? |
broadcast |
Which
two connection options provide an always-on, high-bandwidth Internet
connection to computers in a home office? (Choose two. |
·
Cable ·
DSL |
Which
command or key combination allows a user to return to the previous level in
the command hierarchy? |
exit |
What
are two benefits of collaboration and video-on-demand applications? (Choose
two.) |
·
providing
better social media opportunities ·
providing
a richer e-learning environment |
When
is a wired connection preffered to a wireless connection by an end-user
device? |
when the
end-user device will run an application that requires a dedicated connection
to the network |
What
method can be used by two computers to ensure that packets are not dropped
because too much data is being sent too quickly? |
flow
control |
Which
device performs the function of determining the path that messages should
take through internet works? |
a router |
During
a routine inspection, a technician discovered that software that was installed
on a computer was secretly collecting data about websites that were visited
by users of the computer. Which type of threat is affecting this computer |
spyware |
An
employee at a branch office is creating a quote for a customer. In order to
do this, the employee needs to access confidential pricing information from
internal servers at the Head Office. What type of network would the employee
access? |
an
intranet |
hich
term describes the state of a network when the demand on the network
resources exceeds the available capacity? |
congestion |
Which
action is performed by a client when establishing communication with a server
via the use of UDP at the transport layer? |
The
client sends a synchronization segment to begin the session |
Which
term defines the processing capabilities of a switch by rating how much data
can be processed per second? |
forwarding
rate |
Which
two functions or operations are performed by the MAC sublayer? (Choose two.) |
·
it
adds a header and trailer to form an OSI Layer 2 PDU ·
It
is responsible for Media Access Control |
What
are two functions that are provided by the network layer? (Choose two.) |
·
directing
data packets to destination hosts on other networks ·
providing
end devices with a unique network identifier |
During
the boot process, in what memory location will the router bootstrap program
look for the IOS image if a TFTP server is not used? |
flash |
Which
destination address is used in an ARP request frame? |
FFFF.FFFF.FFFF |
Which
two files are loaded into RAM by the router when it boots? (Choose two.) |
·
startup
configuration ·
IOS
image |
On
Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the___
MAC address |
broadcast |
How
does the network layer use the MTU value? |
The MTU
is passed to the network layer by the data link layer |
When
transporting data from real-time applications, such as streaming audio and
video, which field in the IPv6 header can be used to inform the routers and
switches to maintain the same path for the packets in the same conversation? |
Flow
Label |
During
troubleshooting procedures, from which location will most Cisco routers load
a limited IOS |
ROM |
When
a client connects to an HTTP server by the use of a randomly generated source
port number, what destination port number will the HTTP server use when building
a response? |
the
original source port number that was randomly generated by the client |
Which
entities are involve in a temporary communication that is established by the
transport layer? |
applications |
Which
feature on a Cisco router permits the forwarding of traffic for which there
is no specific route? |
gateway
of last resort |
A
collision fragment, also known as a ___ frame, is a frame of fewer than 64
bytes in length. |
runt |
Which
value, that is contained in an IPv4 header field, is decremented by each
router that receives a packet? |
Time-to-Live |
Within
a production network, what is the purpose of configuring a switch with a
default gateway address? |
The
default gateway address is used to forward packets originating from the
switch to remote networks |
What
is the command netstat –r used for? |
to
display the host routing table |
What
is an advantage of UDP over TCP? |
UDP
communication requires less overhead |
Which
three fields are used in a UDP segment header? (Choose three.) |
·
Source
Port ·
Checksum ·
Length |
What
happens if part of an FTP message is not delivered to the destination? |
The part
of the FTP message that was lost is re-sent |
Which
address is used as a destination address on a broadcast Ethernet frame? |
FF-FF-FF-FF-FF-FF |
Which
number or set of numbers represents a socket? |
192.168.1.1:80 |
What
is the purpose of using a source port number in a TCP communication? |
to keep
track of multiple conversations between devices |
A
user is unable to access the company server from a computer. On issuing the
ipconfig command, the user finds that the IP address of the computer is
displayed as 169.254.0.2. What type of address is this? |
experimental |
What
is true about the Ethernet MAC address? (Choose three.) |
·
The
first 6 hexadecimal digits of a MAC address represent the OUI. ·
The
vendor is responsible for assigning the last 24 bits of the MAC address. ·
The
MAC address is also known as a burned-in address. |
Which
statement is true about an interface that is configured with the IPv6 address
command? |
A
link-local IPv6 address is automatically |
A
network administrator notices that the default gateway devices sends an ICMP
Redirect message to the workstation when the workstation tries to connect to
file server on another network. What is the purpose for this ICMP message? |
To
notify the workstation, that another router on the same network, is the
better defaultgateway to reach the remote server |
Which
application use UDP as the transport layer protocol? |
SMTP |
Which
standard specifies the Ethernet MAC sublayer functionality in a computer NIC? |
IEEE
802.3 |
Which
statement accurately describes public IP addresses? |
Public IP
addresses must be unique across the entire Internet |
The
last host address on the 10.15.25.0/24 network is |
10.15.25.254 |
What
are the primary functions associated with data encapsulation at the Ethernet
MAC sublayer? (Choose three.) |
·
Error
detection ·
Frame
delimiting ·
Addressing |
The
8-bit binary value for 41 is |
00101001 |
What
is the name given to the Ethernet MAC sublayer PDU? |
Frame |
Which
address is a multicast MAC address? |
01-00-5E-00-00-C8 |
The
shortest compressed format of the IPv6 address 2001:
0DB8:0000:1470:0000:0000:0000:0200 is |
2001:DB8:0:1470::200 |
Which
field in an Ethernet frame is used for error detection? |
Frame
Check Sequence |
At
which layers of the OSI model does Ethernet function? (Choose two.) |
·
Physical ·
Data
link |
What
is the minimum and maximum Ethernet frame size as defined by IEEE 802.3? |
64 bytes
– 1518 bytes |
What
happens when a data collision occurs on an Ethernet bus? |
All
devices stop transmitting and try again later. |
Your
organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service
provider. With this prefix, how many bits are available for your organization
to create subnetworks? |
128 |
Which
type of IPv6 address is not routable and used for communication on a single
subnet? |
link-local
address |
Which
statement is true about an interface that is configured with the IPv6 address
command? |
A
link-local IPv6 address is automatically |
Which
two statement describe broadcast transmissions on a wired network? (Choose
two.) |
·
Directed
broadcasts are intended for all hosts on a local or remote network ·
Limited
broadcasts are only intended for the hosts on a local network |
Which
entities are involved in a temporary communication that is established by the
transport |
applications |
Standards
provide flexibility for manufacturers to create devices that comply with
unique requirements |
Products
from different manufacturers can interoperate successfully |
A
user who is unable to connect to the file server contacts the help desk. The
helpdesk technician asks the user to ping the IP address of the default
gateway that is configured on the workstation. What is the purpose for this
command? |
to test
if the workstation can communicate on the network |
What
are the parts of an IPv4 address? (Choose two.) |
·
Network ·
Host |
A
client is downloading a large file from a server using FTP. Many of the
segments are lost during transit. What will most likely happen? |
The FTP
client responds to the server with a smaller window size in the TCP header. |
The
TCP/IP application layer effectively consists of which three OSI layers? |
Application,
presentation, session |
What
are the primary purposes of the transport layer? (Choose three.) |
·
Identifying
the proper application for each communication stream ·
Segmenting
data for and reassembling segmented data into streams of application data at
the destination ·
Tracking
the individual communication between applications on the source and
destination hosts |
What
is a characteristic of UDP? What range of ports can either be used by TCP or
UDP to identify the requested service on the destination device or as a
client source port? |
1024 to
49151 |
What
is assigned by the transport layer to identify an application or service? |
Port |
What
does UDP do when receiving messages that are more than one datagram in
length? |
UDP
reassembles that data in the order it was received and passes it to the
application. |
Which
TCP header field specifies the number of bytes that can be accepted before an
acknowledgement is required? |
Window
size |
What
three protocols do email users and servers use to process email? (Choose
three.) |
·
SMTP ·
POP3 ·
IMAP4 |
What
is an advantage that UDP has over TCP? |
Low
overhead |
Friday, February 26, 2021
Data Communications and Networking 1
IT6201 Data Communications and Networking 1
Subscribe to:
Post Comments (Atom)
Your most welcome :)
ReplyDeleteVery Nice Post...usb-redirector-client-crack
ReplyDelete