Cisco CCST Networking Practice Exam

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts from the Cisco CCST Networking Practice Exam, including protocols, troubleshooting commands, and networking principles.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Which protocol does IPv6 use host use to resolve the MAC address associated with a destination host.

Neighbor Discovery Protocol (NDP)

2
New cards
<p>You have two switches that are connected as shown in the image.</p><p>The laptop is connected to port A on the 1st switch, The second switch is connected to port D on the first switch. The laptop sends a broadcast frame to the first switch.</p><p>• You need to identify the ports through which the broadcast frame are forwarded.</p><p>• Which ports should you identify?</p>

You have two switches that are connected as shown in the image.

The laptop is connected to port A on the 1st switch, The second switch is connected to port D on the first switch. The laptop sends a broadcast frame to the first switch.

• You need to identify the ports through which the broadcast frame are forwarded.

• Which ports should you identify?

B, C and D only

3
New cards

Match the OSI layer with the correct protocol.

OSI Layer - Application

SMTP, HTTP, FTP

4
New cards

Match the OSI layer with the correct protocol.

OSI Layer - Transport

TCP, UDP

5
New cards

Match the OSI layer with the correct protocol.

OSI Layer - Network

Router

6
New cards

Match the OSI layer with the correct protocol.

OSI Layer - Data Link

Layer 2 Switch

7
New cards

Match the OSI layer with the correct protocol.

OSI Layer - Physical

Cable, Hub, NIC

8
New cards

Identify the correct CIA security principle from the example.

  • You generate a digital signature and attach it to a message.

Integrity

9
New cards

Identify the correct CIA security principle from the example.

  • You configure 3 redundant web servers at your company

Availability

10
New cards

Identify the correct CIA security principle from the example.

  • You encrypt sensitive email message.

Confidentiality

11
New cards

Which network technology is not impacted by electromagnectic and radio wave interference.

Fiber

12
New cards

How does a firewall determine which traffic to block?

The firewall matches traffic based on source and destination IP addresses.

13
New cards