Itn module1-7

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards
Spyware
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
2
New cards
Extranet
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
3
New cards
Bring Your Own Device (BYOD)
A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?
4
New cards
Internet Service Provider (ISP)
It is an organization that enables individuals and businesses to connect to the Internet.
5
New cards
Wireless Internet Service Provider (WISP)
The scenario that the use of ____ is recommended is a farm in a rural area without wired broadband access
6
New cards
Scalability
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
7
New cards
Fault Tolerance
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?
8
New cards
Scalability
This characteristic grows in size without impacting existing users and is suitable for modular devices that allow for expansion
9
New cards
Router
Which device performs the function of determining the path that messages should take through internetworks?
10
New cards
Cellular, Satellite
Two Internet connection options do not require that physical cables be run to the building?
11
New cards
Internet
What type of network must a home user access in order to do online shopping?
12
New cards
Bring Your Own Device (BYOD)
Provides flexibility in where and how users can access network resources.
13
New cards
Virtual Private Network (VPN)
What network feature would allow an employee to gain secure remote access to a company network?
14
New cards
Internet
It provides connections through interconnected global networks.
15
New cards
End Devices
It is where data that flows through the network originates and is an interface between humans and communication network
16
New cards
User EXEC Mode
Ends with the > symbol and only some aspects of the router configuration can be viewed
17
New cards
Privileged EXEC Mode
Which type of access is secured on a Cisco router or switch with the enable secret command?
18
New cards
VLAN1
What is the default SVI on a Cisco switch?
19
New cards
Naming Conventions
The hostname should be fewer than 64 characters in length, contains no spaces, and it begins with a letter
20
New cards
Shell
Interfaces between the user and the kernel
21
New cards
RAM
Which memory location on a Cisco router or switch will lose all content when the device is restarted
22
New cards
Non-Volatile Random Access Memory (NVRAM)
Which memory location on a Cisco router or switch stores the startup configuration file?
23
New cards
10.1.0.0
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?
24
New cards
Standard Organizations
IANA, IEEE, IETF
25
New cards
Broadcast
What type of communication will send a message to all devices on a local area network?
26
New cards
Encoding
Converts information to the appropriate form for transmission
27
New cards
Layered Network Model
Its benefits include: assists in protocol design, prevents technology in one layer from affecting other layers
28
New cards
Protocol
Provides the rules required for a specific type of communication to occur
29
New cards
Destination IP address
Which logical address is used for delivery of data to a remote network?
30
New cards
Protocol Data Unit (PDU)
What is the general term that is used to describe a piece of data at any layer of a networking model?
31
New cards
IP, ICMP
Which two protocols function at the internet layer?
32
New cards
Transport
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?
33
New cards
Multicast
Which type of communication will send a message to a group of host destinations simultaneously?
34
New cards
Decoding
What process is used to receive transmitted data and convert it into a readable message?
35
New cards
Encapsulated in a Layer 2 frame
What is done to an IP packet before it is transmitted over the physical medium?
36
New cards
Encapsulation
What process is used to place one message inside another message for transfer from the source to the destination?
37
New cards
Powerline Networking Technology
A device connects to an existing home LAN using an adapter and an existing electrical outlet
38
New cards
Tab Key
It completes the remainder of a partially typed word in a command
39
New cards
Switch Virtual Interface (SVI)
It provides a means to remotely manage a switch, not associated with any physical interface on a switch, and is associated with VLAN1 (default)
40
New cards
" Exit "
Allows a user to return to the previous level in the command hierarchy
41
New cards
(config)# service password-encryption
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
42
New cards
show ip interface brief
What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?
43
New cards
Response Timeout
Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?
44
New cards
Network Protocols
They define how messages are exchanged between the source and the destination.
45
New cards
Peer-to-peer
What term describes a network where one computer can be both client and server?
46
New cards
Physical Layer
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
47
New cards
Rollover
What type of cable is used to connect a workstation serial port to a Cisco router console port?
48
New cards
Full-Duplex Connectivity
Why are two strands of fiber used for a single fiber optic connection?
49
New cards
Twisting opposing circuit wire pairs together
Reduces the effect of crosstalk in copper cables?
50
New cards
Straight-Through
Which type of UTP cable is used to connect a PC to a switch port?
51
New cards
Amount of data that can flow from one place to another in a given amount of time
52
New cards
Crosstalk
It's the leakage / distortion of the transmitted messages from signals carried in adjacent wires
53
New cards
Throughput
The measure of the bits transferred across the media over a given period of time
54
New cards
MAC address
What identifier is used at the data link layer to uniquely identify an Ethernet device?
55
New cards
Logical Topologies
Refers to how a network transfers data between devices
56
New cards
Carrier Sense Multiple Access / Collision Avoidance (CSMA / CA)
Contention-based access on a wireless network
57
New cards
Mesh
Which physical topology requires that every node is attached to every other node on the network?
58
New cards
Half Duplex
Data that is transmitted over the network flows in one direction at a time
59
New cards
Logical Link Control (LLC)
Identifies which network layer protocol is being used
60
New cards
LLC, MAC
What are the two sublayers of the OSI model data link layer?
61
New cards
Data Link
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
62
New cards
Star
What type of physical topology can be created by connecting all Ethernet cables to a central device?
63
New cards
MAC addresses
They must be globally unique
64
New cards
It will discard the frame
What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address?
65
New cards
Switch
Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame
66
New cards
Switch
Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table?
67
New cards
The frame is dropped
What happens to runt frames received by a Cisco Ethernet switch?
68
New cards
The source Layer 2 address of incoming frames
What addressing information is recorded by a switch to build its MAC address table?
69
New cards
auto-MDIX
A feature that detects Ethernet cable type
70
New cards
64 bytes, 1518 bytes
Ethernet frame sizes, minimum : ___ ; maximum : ___