25B Networking Essentials Exam with complete verified solutions already graded A+

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

73 Terms

1
New cards

What is NOT a physical layer problem?

Wireless

2
New cards

2 benefits of NAT?

Save public IPs

Extra layer of security

3
New cards

Reach limit for a twisted-pair cable?

100m

4
New cards

Data encoded using light?

Fiber optic

5
New cards

Throughput definition?

The measure of bits transferred over time

6
New cards

How many bits in a hextet?

16

7
New cards

What is Layer 3?

IP or Logical

8
New cards

What is Layer 2?

MAC or Physical

9
New cards

What allows Ipv6 and Ipv4 to be used simultaneously?

Dual stack

10
New cards

802.11 Standard

WIFI

11
New cards

802.15 Standard

Bluetooth

12
New cards

When configuring your secret password without line con 0, what configuration mode should it be in?

USER EXEC

13
New cards

What does the command #service password-encryption do?

Encrypts all plain text passwords

14
New cards

What are features of multicast?

Specific IP

Router

1 to Group of Hosts

15
New cards

What assists in collision prevention?

CSMA/CA

16
New cards

2 benefits of a Layered Network model?

Assists in protocol design

Prevents 1 layer from effecting other layers

17
New cards

When a PC works straight out of the box, what is enabled?

Static

DHCP

18
New cards

HTTP port number

443

19
New cards

What is Tunneling?

Encapsulation of IPV4 and IPV6

20
New cards

Purpose of SSH?

To secure access / Data

21
New cards

Process of condensing servers is called what?

Virtualization

22
New cards

3 commands used on console to lock in?

Line con 0

password cisco

login

23
New cards

When a DHCP discovers a message for MAC addresses on Layer 2, what letter is used?

F's

24
New cards

What type of attack is the ping of death?

Denial of Service - DOS

25
New cards

Purpose of a Subnet Mask?

Identifies the network of its connected host

26
New cards

What is the 1st thing a PC searches for when started up?

Flash memory

27
New cards

DORA is?

Discover

Offer

Request

Acknowledge

28
New cards

ARP

Address Resolution Protocol

29
New cards

Access Layer

Connects to hosts in a LAN

30
New cards

Distribution Layer

Interconnects the smaller local networks

31
New cards

Core Layer

Provides high speed backbone between layer devices

32
New cards

Encapsulation definition

Adding headers to a packet so it can be sent using another higher level protocol

- at source, moves down the stack, adds headers onto message

- at destination, moves up the stack, strips headers off original message

33
New cards

T568A

Cross over

2 like devices

34
New cards

T568B

Straight Through

2 unlike devices

35
New cards

Crosstalk

A type of interference caused by signals traveling on nearby wire pairs infringing on another pair's signal

36
New cards

Metal wires in cables use:

Electrical impulses

37
New cards

Fiber optic uses:

Light pulses

38
New cards

Wireless connection uses:

Electromagnetic waves

39
New cards

Not a criterion for choosing a network media?

TYPE of data than can be transmitted

40
New cards

What is the term for using tap to pay? Ex) Apple pay

NFC

41
New cards

3 areas of concern when setting up a Wireless Network?

Security

Coverage Area

Interference

42
New cards

PC to Switch connection requires what wiring?

Straight through

43
New cards

2 ports for configuration on a router?

Console

Auxiliary

44
New cards

Feature on a Wireless Router that prevents people from accessing it?

MAC Filtering

45
New cards

Connects Analog to Digital

VOIP

46
New cards

What prevents Trojan Horses?

Anti-virus Software

47
New cards

Interface Default SSI?

VLAN 1

48
New cards

2 files found in RAM?

Startup config

IOS image file

49
New cards

Which TCIP layer uses addressing?

Internet Layer

50
New cards

IPV6 Broadcast method?

Multicast

Anycast

Unicast

51
New cards

Which 2 things have to be configured to remote into a Switch?

Vlan 1

Default Gateway

52
New cards

Which method encapsulates IPv6 into IPv4

Tunneling

53
New cards

Term for a fraudulent email

Phishing

54
New cards

How many bits is in an IP address?

32 Bits

55
New cards

How many bits is in an IPv6 address?

128 Bits

56
New cards

What is a quicker way to find your useable IP?

256 minus 4th octet number

57
New cards

IEEE

Creator of wireless standards

58
New cards

Most frequently used ranges?

2.4 + 5 G/Hz

59
New cards

Tests wireless LAN devices from other manufacturers?

Wifi-Alliance

60
New cards

Purpose of NAT64

Converts IPv6 into IPv4

61
New cards

Type 1 Hypervisor

A 'bare metal' hypervisor in which you install directly on the server's hardware

62
New cards

Type 2 Hypervisor

'Hosted' virtualization environment. Host operating system (i.e. Windows/Linux) runs this hypervisor

63
New cards

Viruses do what to a PC?

Replicates by modifying itself

Cannot start by itself

64
New cards

Worms do what to a PC?

Uses network to spread

Spreads by itself

65
New cards

What is a Trojan Horse?

An attack tool that disguises itself as a pop up or an update

66
New cards

WEP is what?

Easy to crack

WPA2 is the preferred method

67
New cards

What server uses IMAP

Email

68
New cards

2 components on IPv4 addresses?

Host

Network

69
New cards

Command to find IOS Version + Software Used

show version (1st Line)

70
New cards

Command to find Register

show version (Last Line)

71
New cards

Command to find Flash Version

show flash (total)

72
New cards

Command to find Multicast Groups

show ipv6 int brief

73
New cards

Command to get MAC Address

ip config /all