2-3 cisco quizzes

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/82

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

83 Terms

1
New cards

Drag the information type on the left to the appropriate layer of the OSI model that it is associated with on the right.

Network Layer

Data Link Layer

Physical Layer

Transport Layer

Transport Layer

Application Layer

Packets

Frames

Bits

Segments

Data

<p></p>
2
New cards

Match the TCP/IP protocols with their sunctions.

  • Used to send emails messages between mail servers

  • Used to send messages to groups of users

  • Used to assign IP addresses to Hosts

  • Used to get the MAC address of a host from its IP Address

  • SMTP

  • IGMP

  • DHCP

  • ARP

knowt flashcard image
3
New cards

The following items describe the functions performed at various OSI model layers:

  1. Logical topology, hardware addresses, media access, framing

  2. Logical device identification, path identification, and selection

  3. Flow control, reliable data transfer, windowing, segmentation, and sequencing

  4. Converting data to 0s and 1s, bit signaling, and synchronization

Which of the following correctly identifies, in order, the layers that perform each of the functions listed here?

Dara LInk, Network, Transport, Physical

<p>Dara LInk, Network, Transport, Physical </p><p></p><p></p><p></p>
4
New cards

Which two of the following functions are performed by IP? (Select two.)

  • creating multicast groups

  • routing datagrams to their destination

  • Delivering IP addresses to host

  • Identifying host with the IP address

  • routing datagrams to their destination

  • Identifying host with the IP address

IP is responsible for moving data through the network. It identifies devices by their IP addresses and routes datagrams based on this address. The other functions listed here are performed by other protocols in the TCP/IP suite.

5
New cards

Put the OSI layer is order

7

6

5

4

3

2

1

7 - Application

6- Presentation

5 - Session

4- Transport

3 - Network

2 - Data Link

1 - Physical

6
New cards

A client computer starts to download some files from an FTP server named FTPsvr1. While the first download is in progress, the user opens a second instance of the FTP program and initiates a second download.

What do the server and the client use to keep each download separate?

Session ID

7
New cards

Which of the following are limitations of the OSI model? (Select two.)

  • OSI layers are not theoretical and actually perform real functions.

  • Requires specialization of features at different levels.

  • OSI layers are theoretical and do not actually perform real functions.

  • A particular protocol implementation may not represent every OSI layer.

  • OSI layers are theoretical and do not actually perform real functions.

  • A particular protocol implementation may not represent every OSI layer.

The following are limitations of the OSI model:

  • OSI layers are theoretical and do not actually perform real functions.

  • Industry implementations rarely have a layer-to-layer correspondence with the OSI

    layers.

  • Different protocols within the stack perform different functions that help send or

    receive the overall message.

  • A particular protocol implementation may not represent every OSI layer (or may

    spread across multiple layers).

8
New cards

What is the purpose of the CRC in network communications?

Detect data errors

9
New cards

Match the TCP/IP protocols with their functions.

Used to get the IP address of a host from a known MAC address.

Used to Transfer Files

Used to Identify routes through an internetwork

BOOTP

OSPF

RARP

RIP

FTP

TFTP

Used to get the IP address of a host from a known MAC address.

  • BOOTP

  • RARP

Used to Transfer Files

  • FTP

  • TFTP

Used to Identify routes through an internetwork

  • OSPF

  • RIP

10
New cards

Which of the following are functions of the MAC sublayer in the OSI model? (Select two.)

  • Letting devices on the network have access to the LAN.

  • Defining a unique hardware address for each device on the network.

11
New cards

An internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and HTTP services. A client computer initiates a session with the HTTP server.

How is the HTTP request from the client routed to the correct service running on the server?

Port or socket number

Port or socket numbers are used to identify a service running on the server. For example, FTP uses ports 20 and 21 to send communications to the FTP service running on the server, while port number 80 is used for HTTP.

12
New cards

What is the purpose of a network model?

Standardize processes at each layer.

13
New cards

Match each tcp and / or UDP ports to the service that uses it

Dynamic Host Configuration Protocol (DHCP)

Network News Transport Protocol (NNTP)

Simple Network Management Protocol (SNMP)

Domain Name System

TEL NET

TFTP

TCP and UDP use port 23 for Telnet

TCP and UDP use port 53 for Domain Name System (DNS)

UDP uses ports 67 and 68 for Dynamic Host Configuration Protocol (DHCP)

UDP uses port 69 for Trivial File Transfer Protocol (TFTP)

TCP uses port 119 for Network News Transport Protocol (NNTP)

UDP uses ports 161 and 162 usually for Simple Network Management Protocol (SNMP)

14
New cards

Which of the following lists accurately describes TCP and UDP? (Select two.)

TCP: connection-oriented, reliable, sequenced, high overhead

UDP: connectionless, unreliable, unsequenced, low overhead

UDP: connection-oriented, reliable, sequenced, high overhead

TCP: connection-oriented, reliable, unsequenced, lov overhead

TCP: connection-oriented, reliable, sequenced, high overhead

UDP: connectionless, unreliable, unsequenced, low overhead

TCP characteristics include:

• Connection-oriented

• Reliable

• Sequenced

• High overhead

UDP characteristics include:

• Connectionless

• Unreliable

• Unsequenced

• Low overhead

15
New cards

Match each layer of the TCP/IP model to its functions. (Each layer matches with two functions.)

  • Is responsible for how messages are electrically transmitted.

  • Is responsible for forwarding packets through multiple networks.

  • Is responsible for describing the physical layout of the network.

  • Is responsible for error checking and reliable delivery.

  • Is not concerned with reliable delivery of information.

  • Integrates network functionality into the host operating system.

  • Provides the capability for services to operate on the network.

  • Uses ports to enable application-to-application communications between hosts.

  • Is responsible for how messages are electrically transmitted.

LINK

  • Is responsible for forwarding packets through multiple networks.

INTERNET

  • Is responsible for describing the physical layout of the network.

LINK

  • Is responsible for error checking and reliable delivery.

TRANSPORT

  • Is not concerned with reliable delivery of information.

INTERNET

  • Integrates network functionality into the host operating system.

APPLICATION

  • Provides the capability for services to operate on the network.

APPLICATION

  • Uses ports to enable application-to-application communications between hosts.

TRANSPORT

16
New cards

Which of the following are limitations of the TCP/IP model? (Select two.)

Divides networking tasks into logical layers.

TCP/IP layers are theoretical and do not actually perform real functions.

Forces modularity in networking features.

A particular protocol implementation may not represent every layer.

Does not aid in troubleshooting.

TCP/IP layers are theoretical and do not actually perform real functions.

A particular protocol implementation may not represent every layer.

17
New cards

The TCP/IP protocol stack uses port numbers to determine protocol use. Port usage is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN). Which of the following are characteristics of registered ports? (Select two.)

Has port numbers ranging from 0 to 1023.

Has port numbers ranging from 1024 to 49151.

Is assigned by ICANN for a network service.

Has port numbers ranging from 49152 to 65535.

Has port numbers ranging from 1024 to 49151.

Is assigned by ICANN for a network service.

18
New cards

Which of the following methods helps to detect lost packets? (Select two.)

Acknowledgements

Sequencing

Flow control

CRC

Acknowledgements

Sequencing

19
New cards

How does TCP handle data sequencing ?

TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the / Correct next segment.

20
New cards

You need to connect several network devices together using twisted pair Ethernet cables. Assuming Auto-MDIX is not enabled on these devices, drag the appropriate type of cabling on the left to each connection type on the right.

WORKSTATION TO SWITCH

ROUTER TO SWITCH

SWITCH TO SWITCH

WORKSTATION TO ROUTER

ROUTER TO ROUTER

If Auto-MDI/MDIX is not enabled, then you must use a crossover Ethernet cable when connecting the following devices:

  • Switch to switch

  • Switch to hub

  • Hub to hub

  • Workstation to router

  • Workstation to workstation

  • Router to router

Use a straight-through Ethernet cable to connect the following devices:

  • Workstation to hub

  • Workstation to switch

  • Router to hub

  • Router to switch

21
New cards

You want to implement an Ethernet network using the 1000BaseT standard using the minimum hardware specifications possible. Which of the following should you include in your plan? (Select two.)

Cat4 twisted pair cable

Cat5 twisted pair cable

Cat5e twisted pair cable

RJ-45 connectors

Cat5e twisted pair cable

RJ-45 connectors

22
New cards

You have a small network with two switches, SwitchA and SwitchB. MDI-X is not enabled on either switch. Each switch has three client computers connected. IP addresses have been assigned to various devices as follows:

WrkA_1, WrkA_2, and WrkA_3 are connected to SwitchA, while WrkB_4, WrkB_5, and WrkB_6 are connected to SwitchB. All of the devices are configured to operate within the same subnet.

You need to connect SwitchA and SwitchB so that workstations connected to SwitchA can communicate with workstations connected to SwitchB. What should you do?

Connect SwitchA and SwitchB using a crossover cable

23
New cards

Match each characteristic on the left with the appropriate fiber optic connector on the right.

Metal guide pins for alignment

Half the size of other connectors

V Bayonet-type connector

Push-on, pull-off connector

MT-RJ

Metal guide pins for alignment

LC

Half the size of other connectors

ST

V Bayonet-type connector

SC

Push-on, pull-off connector

24
New cards

Question 6

Which of the following are features of multimode fiber cable? (Select three.)

Transfers data through the core using a single light ray

Supports cable lengths that extend a great distance

Has a core diameter around 10 microns

Supports only limited distance cable lengths

Typically used for connecting networks between buildings

Has a core diameter around 50 to 100 microns

Transfers data through the core using multiple light rays

Has a core diameter around 50 to 100 microns

Transfers data through the core using multiple light rays

Supports only limited distance cable lengths

25
New cards

Which fiber optic cable requires the exposed fiber tip to be polished as part of the assembly process?

Only plastic core fiber connectors

Field terminated epoxy connectors

Pre-polished connectors

RJ-45 connectors

Field terminated epoxy connectors

26
New cards

You want to implement an Ethernet network using the 100Base-FX standard and the minimum hardware specifications possible. You need to support distances of up to 1,000 meters without repeaters.

Which of the following should you include in your plan? (Select two.)

Multi-mode fiber optic cable

RJ-45 connectors

Cat4 twisted pair cable

Cat5 twisted pair cable

SC connectors

Single-mode fiber optic cable

SC connectors

Single-mode fiber optic cable

27
New cards

Which pins are used in a Cat 5 Ethernet (100BASE-T) UTP cable?

2, 5, 6, and 9

1, 2, 3, and 6

1, 3, 4, and 7

4, 5, 7, and 8

1, 2, 3, and 6

28
New cards

You are deploying a new 10GB Ethernet network using Cat 6 cabling.

Which of the following are true concerning this media? (Select two.)

It uses twisted 18- or 16-gauge copper wiring.

It is completely immune to EMI.

It supports multi-mode transmissions.

It supports 10 GB Ethernet connections.

PVC insulation surrounds each copper wire.

It supports 10 GB Ethernet connections.

PVC insulation surrounds each copper wire.

29
New cards

What is the purpose of a frame check sequence (FCS) footer?

Contains logical network addresses

Checksum error detection

Holds segment data

Control information

Checksum error detection

30
New cards

What role does ARP play in the routing process?

ARP does not play any role in the routing process. Switches use ARP to map IP addresses to MAC addresses in collision domains.

If a router does not know a destination device's IP address, it sends an ARP broadcast containing the destination device's MAC address and requesting its IP address.

If a router knows the MAC and IP address of a destination host, it sends an ARP request to update the other routers' route tables.

If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the destination device's IP address and requesting its MAC address.

If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the destination device's IP address and requesting its MAC address.

31
New cards

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?

IMP lets routers bypass the general network broadcast by providing a dynamic table of IP-to-MAC address mappings.

Routers use DNS to resolve MAC addresses of diskless workstations into IP addresses based on the information contained in other routers' route tables.

Diskless workstations use ARP to ask a server for an IP address.

Routers use ARP to resolve known IP addresses into MAC addresses.

Routers use ARP to resolve known IP addresses into MAC addresses.

32
New cards

What term does the OSI model use that is different from the TCP/IP model uses to refer to frame, packet, and segment?

Protocol data unit (PDU)

IEEE Ethernet standard

Presentation

Session

Protocol data unit (PDU)

33
New cards

During network transmission, data is transferred to various routers, which forward the data to the appropriate network. If the source and destination network addresses reside on the same network, which protocol is used to determine the MAC address of the destination IP address?

  • UDP

  • TCP

  • HTTP get

  • ARP

ARP

34
New cards

The process of breaking a message into packets, adding control information and other information, and then transmitting the message through the transmission medium is known as

  • Sequencing

  • Segmentation

  • Transformation

  • Encapsulation

  • Encapsulation

35
New cards

Drag the information type on the left to the appropriate layer of the TCP/IP model it is associated with on the right.

Transport Layer

Link Layer

Application Layer

Internet Layer

Frames

Data

Packets

Segments

Transport Layer- segments

Link Layer - frames

Application Layer - data

Internet Layer- packets

36
New cards

What is the first thing that happens when a collision occurs on an Ethernet network?

All devices that were sending data transmit a clear to send (CTS) message.

The device that detected the collision transmits a jam signal.

All devices wait a random amount of time before trying to retransmit.

The device that detected the collision transmits a jam signal.

37
New cards

Which two of the following statements accurately describe half-duplex Ethernet? (Select two.)

It uses direct point-to-point connections between the sender and receiver.

It lets you use 100% of the available bandwidth for data transmission.

It uses collision detection and recovery.

It sends both signals along the same wire.

It uses collision detection and recovery.

It sends both signals along the same wire.

38
New cards

Which of the following is true of CSMA/CD? (Select two.)

If collisions are detected, an interrupt jam signal is broadcast to stop all transmissions.

Only devices with information to send have access to the transmission media.

Two devices can transmit at the same time without collisions occurring.

After a collision, sending devices run the same algorithm before sending their messages again.

A device with data to send first listens to the transmission medium to determine whether is free

Only devices with information to send have access to the transmission media.

A device with data to send first listens to the transmission medium to determine whether is free

39
New cards

Which two of the following statements accurately describe full-duplex Ethernet? (Select two.)

It uses built-in loopback and collision detection.

It uses 75% of the available bandwidth for actual signal transmission.

It is collision-free.

It multiplexes signals along the same wire for higher transmission speeds.

It uses direct point-to-point connections between the sender and receiver.

It is collision-free.

It uses direct point-to-point connections between the sender and receiver.

40
New cards

As specified in the Ethernet standards, what is the maximum number of hosts supported on a single subnet?

1024

41
New cards

Which of the following are true about Gigabit Ethernet? (Select two.)

Uses CSMA/CD

Requires fiber optic

Uses CSMA/CA

Can use both copper and fiber optic

Uses CSMA/CD

Can use both copper and fiber optic

42
New cards

What is the maximum cable length for UTP Ethernet T implementations?

100meters

43
New cards

What is the backoff on an Ethernet network?

The random amount of time a device waits before retransmitting after a collision.

44
New cards

Which of the following mechanisms are used on Ethernet networks to control access to the transmission medium? (Select two.)

Collision detection

Token

Request to send/clear to send (RTS/CTS)

Backoff

Collision detection

Backoff

45
New cards

Why is a DNS server essential in a network environment?.

  • It translates human-readable domain names into IP addresses.

46
New cards

How does Linux differ from Windows Server in managing server roles?

  • Linux uses configuration files and CLI, while Windows uses GUI tools like Server Manager.

47
New cards

Which of the following are general advantages of using routers on your network? (Select three.)

Routers provide multiple links between devices to support load balancing.

Routers provide more features, such as flow control, error detection, and congestion control, than switches or bridges.

Routers support multiple routing protocols for better flexibility.

48
New cards

Which is the primary role of a firewall?

To protect networks and workstations by allowing or denying network traffic. The firewall does this using a configured set of rules.

49
New cards

You have been put in charge of connecting two company networks that were previously separated.

You need to connect a 100BaseTx Ethernet network with an older token ring network. Most traffic will be localized within each network, with only a little traffic crossing between networks. Both networks are using the TCP/IP protocol suite.

Which connectivity device would be the best choice in this situation?

Router

50
New cards

Which of the following describes the function of a dedicated wireless access point on a network?

On a network, a wireless access point only acts as a bridge between the wireless segment and the wired segment on the same subnet.

51
New cards

What’s is the primary function of a dhcp sever in a network?

Automatically assign IP addresses to devices

52
New cards

Which of the following is a key feature of windows server for managing server roles?

Server manager

53
New cards

Which of the following statements are true about bridges? (Select two.)

Bridges connect two networks that use different protocols.

Bridges connect two network segments with the same network address.

Bridges convert one type of transmission medium into another.

Bridges connect two network segments with the same network address.

Bridges convert one type of transmission medium into another.

54
New cards

At which layer of the OSI model do network switches operate that do not support routing ?

Data link

55
New cards

You want to make a console connection to a router using the serial port on a PC. Select the necessary components to make the console connection. Select only the necessary components.

Components

Terminal emulation program

Rollover cable

Console port

56
New cards

Put the boot sequence process items in order

1

Power-on self-test checks hardware.

2

Boot loader software is loaded.

3

IOS is loaded.

4

Startup-config is loaded.

57
New cards

You are a network administrator configuring a new switch in your organization's network. The switch supports both Telnet and SSH for remote management.

To ensure secure access, you decide to enable SSH.

Which of the following actions should you take to properly implement SSH on the switch?

  • Configure a strong username and password, and disable Telnet on the switch.

58
New cards

Match the defition

RAM

FLASH

ROM

NVRAM

RAM stores the running-configuration file, routing tables, and ARP tables.

FLASH stores the Cisco IOS software.

ROM stores POST and the boot loader software.

NVRAM stores the startup-configuration file.

59
New cards

You have issued the following command and received the response as shown.

Router#sh start

%%Non-volatile configuration memory has not been set up or has bad checksum

Which of the following is a reason for this response?

  • No configuration file has been saved to NVRAM.

60
New cards

You are a network administrator tasked with configuring a legacy router in a small office network. The router only supports Telnet for remote access, and you need to make some urgent configuration changes.

Which of the following actions should you take to minimize security risks while using Telnet?

Use Telnet over a secure VPN connection to access the router.

61
New cards

You are troubleshooting a network switch that has lost remote connectivity due to a misconfiguration. Remote access methods such as SSH and HTTPS are no longer functional.

Which of the following actions should you take to regain access to the switch and resolve the issue?

Connect a console cable to the switch and access it through a terminal application on your computer.

62
New cards

You are managing a wireless controller for your organization's network. The controller supports both HTTP and HTTPS for web-based management.

To ensure secure access, you decide to configure HTTPS.

Which of the following actions should you take to properly implement HTTPS on the wireless controller?

Install a valid SSL/TLS certificate on the wireless controller and disable HTTP access.

63
New cards

Which of the following measures can you implement to help secure access to a router?

Keep the router in a locked room.

Set a password and use the login command.

64
New cards

You are a field technician for a large company. You have been sent to a remote site to troubleshoot a downed router. When you arrive at the remote site, how will you connect your laptop to the router?

Connect the laptop's COM/USB port to the router's console port using a rollover cable.

65
New cards

While working at the console of a Cisco device, you need to view a list of the commands that are currently stored in the history buffer of the s)

Which command should you use?

Show history

66
New cards

While working at the console of a Cisco device, you need to view a list of the commands that are available in the current mode.

Which command should you use?

?

67
New cards

You want to save the configuration file in NVRAM to a TFTP server with address 192.168.1.10 to be used as a backup. Which command would you use?

• copy start tftp

68
New cards

You need to back up the current IOS image on your router to the TFTP server. The TFTP server's IP address is 192.56.145.23. Which of the following commands do you use?

Copy flash tftp

69
New cards

You want to look at the size of the configuration files. Which command would you use?

Show flash

70
New cards

Match each command to its corresponding operation.

Save the current configuration to NVRAM.

copy run start

Load the current configuration saved in NVRAM into memory.

copy start run

Save the current configuration to a network server.

copy run tftp

Copy a configuration file from a network server into NVRAM.

copy tftp start

71
New cards

While working at the console of a Cisco device, you need to use the same command repeatedly.

Given that the command is quite long, what can you do to avoid having to retype it over and over?

Press the Up arrow key.

72
New cards

Which command would you use to remove the contents of NVRAM?

Erase NVRAM

73
New cards

Which of the following configuration register values tells the router to use configuration information from NVRAM?

0×2102

74
New cards

Which of the following commands configures a password to switch to privileged EXEC mode and saves the password using MD5 hashing?

Enable secret

75
New cards

What is the main security weakness associated with the service password-encryption command?

Passwords are easily broken

76
New cards

Which of the following is the most important thing to do to prevent console access to the router?

Keep the router in a locked room.

77
New cards

Router (config)#enable password cisco

Router (config)#enable secret highway

Router (config)#username admin password television

Router (config)#line con 0

Router (config-line)#password airplane

Router (config-line)#login

Router (config-line)#line vty 0 4

Router (config-lide)#password garage

Router (config-line)#login

Which password would you use to open telnet session to the router?

Garage

78
New cards

You want users to enter a password before being able to access the router through a Telnet session. You use the following commands: router#config t router (config)#line vty 0 4 router (config-line)#password cisco router (config-line)#exit router (config) #exit

You open a Telnet session with the router and discover that the session starts without being prompted for a password. What should you do?

In line configuration mode, add the login parameter

79
New cards

You are at a customer site and need to access their router. The previous administrator left the company and did not document the password to the device.

Which of the following would you access to start the password recovery process?

ROMmon

80
New cards

One of the steps in the password recovery process for a router is to access the ROM monitor. Which of the following methods will accomplish this? (Select two.)

Use a break sequence during the boot process.

Remove the external flash memory while the device is powered off and then boot.

81
New cards

After configuring a router to ignore the startup configuration when the device boots, what command would you use to tell the device to load the startup configuration upon boot?

confreg 0x2102

82
New cards

As part of the password recovery process on a router, you want the device to ignore the startup config file when the device is rebooted. Which of the following commands would you use to do this?

Confreg 0×2142

83
New cards

You want to prevent users from accessing a router through a telnet session. What should you do?

For the vty lines, add the login parameter and remove any passwords