Home
Explore
Exams
Search for anything
Search for anything
Login
Get started
Home
CCNA 1 Final
Studied by 0 people
0.0
(0)
Add a rating
Learn
A personalized and smart learning plan
Practice Test
Take a test on your terms and definitions
Spaced Repetition
Scientifically backed study method
Matching Game
How quick can you match all your cards?
Flashcards
Study terms and definitions
1 / 73
There's no tags or description
Looks like no one added any tags here yet for you.
74 Terms
View all (74)
Star these 74
1
Which two traffic types use the Real-Time Transport Protocol (RTP)?
Video and voice.
New cards
2
What wireless technology is popular in home automation applications due to low-power and data rate requirements?
ZigBee.
New cards
3
Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
Internet.
New cards
4
Which type of server relies on record types such as A, NS, AAAA, and MX?
DNS.
New cards
5
What are proprietary protocols?
Protocols developed by organizations that control their definition and operation.
New cards
6
What service is provided by DNS?
Resolves domain names into IP addresses.
New cards
7
If a client packet has a destination port number of 110, what service is the client requesting?
POP3.
New cards
8
What command is used on a Windows PC to see the IP configuration?
ipconfig.
New cards
9
What networking model is in use when a shared printer is accessible by multiple computers?
Peer-to-peer (P2P).
New cards
10
What characteristic describes a virus?
Malicious software or code running on an end device.
New cards
11
How should data types be prioritized if QoS is implemented, given financial transactions, web pages, and audio conferences?
Audio conference, financial transactions, web page.
New cards
12
What is the global routing prefix in an IPv6 address?
The network portion of the address.
New cards
13
What layers of the TCP/IP model are used when a file is transferred from Host1 to a server?
Application, transport, internet, and network access.
New cards
14
Which switching method stores the entire frame before forwarding?
Store-and-forward switching.
New cards
15
What is the default gateway for Host H1 in the exhibit provided?
R1: G0/0.
New cards
16
What service does Internet Messenger provide?
Real-time chatting among remote users.
New cards
17
What subnet mask can support 25 connected devices?
255.255.255.128.
New cards
18
What describes a characteristic of a Trojan horse?
Malicious software or code running on an end device.
New cards
19
What function does HTTPS provide?
Uses encryption to secure the exchange of data on the web.
New cards
20
How does a PC track data flow between multiple application sessions?
Based on the source port number used by each application.
New cards
21
What subnet mask can support 61 connected devices?
255.255.255.192.
New cards
22
What defines an effective DoS attack?
An attack that slows or crashes a device or network service.
New cards
23
How can matching application protocols to transport protocols be done?
By understanding which protocols operate at which layers.
New cards
24
What is the function of DHCP?
Dynamically assigns IP addresses to devices.
New cards
25
What characteristic describes a physical address?
It is the MAC address contained in the Layer 2 header.
New cards
26
What action occurs when a switch reaches a user-defined error threshold?
The switch will revert to store-and-forward mode.
New cards
27
Which wireless technology has low-power and low-data rate requirements for IoT?
Zigbee.
New cards
28
How does a host obtain a destination MAC address if no mappings are in its ARP cache?
It will send an ARP request for the MAC address of the destination device.
New cards
29
What address class is defined by a subnet mask of 255.255.255.0?
Class C network.
New cards
30
What can cause corrupted data signals in newly installed Ethernet cabling?
EDMI.
New cards
31
Which network addressing allows for access by MAC address?
Layer 2 addressing.
New cards
32
What are the criteria for IPv4 subnetting?
Each network must accommodate a specified number of devices.
New cards
33
What must a device do if it must reach an address not known through ARP?
Send an ARP request.
New cards
34
What is the purpose of NAT?
To share private IP addresses among multiple devices.
New cards
35
Which fields identify Layer 3 protocols in an Ethernet frame?
Type field.
New cards
36
What does the term ‘attenuation’ mean in data communication?
Loss of signal strength as distance increases.
New cards
37
What must a client do after generating an IPv6 address using SLAAC?
Send an ICMPv6 Neighbor Solicitation message to ensure the address is not in use.
New cards
38
What happens if a router receives an IPv4 packet with a TTL of 0?
It discards the packet and sends an ICMP Time Exceeded message.
New cards
39
What is required for a Windows host to display its routing table?
Use 'route print' or 'netstat -r' commands.
New cards
40
Which command can be executed on a Cisco device to check the configurations?
show running-config.
New cards
41
What is the function of an IPS?
Monitor and prevent network attacks.
New cards
42
How does a firewall protect the network?
It filters traffic based on defined rules.
New cards
43
What devices need to be identified when establishing a path in a routing table?
Next-hop addresses.
New cards
44
What effect does NAT have on applications requiring end-to-end connectivity?
It may introduce problems.
New cards
45
What is required for a device in a LAN to reach a device in another network?
Proper configuration of the default gateway.
New cards
46
How does a manager authenticate remote users?
Based on usernames and passwords.
New cards
47
What does a protocol analyzer do?
It captures and analyzes network traffic.
New cards
48
How should devices be addressed if multiple networks are combined?
Using a common subnet mask.
New cards
49
What does a redistribution route refer to in networking?
Allowing routers to forward packets to different routing tables.
New cards
50
What indicates a successful Layer 3 connection?
The ability to exchange data between hosts.
New cards
51
What explains the cause of data packet fragmentation in routing?
Exceeding the MTU of the next link.
New cards
52
What must be done to measure packet loss in the network?
Utilize ping or traceroute commands.
New cards
53
How does the Ethernet framing process work?
Encapsulates data packets for effective transmission.
New cards
54
What refers to the number of hosts in a subnet?
It is determined by the subnet mask.
New cards
55
What is the advantage of configuring a default gateway?
Ensures communication with devices outside the local subnet.
New cards
56
How do you check the operational statuses of interfaces on a device?
Using the 'show ip interface brief' command.
New cards
57
What indicates a potential network security threat?
Intrusion detection alarms or logs.
New cards
58
What does a port filtering firewall do?
Prevents access based on port numbers.
New cards
59
How are conference call data packets prioritized in QoS?
Real-time data gets higher priority than non-real-time data.
New cards
60
What method describes how functions communicate in a Layered model?
Encapsulation.
New cards
61
Which factors affect link-layer switching decisions?
MAC addresses and speed settings.
New cards
62
What command can be used to view active connections on a device?
netstat.
New cards
63
What is a sign of a DoS attack?
Abrupt service interruptions for users.
New cards
64
What signaling protocol allows remote management of network devices?
SNMP.
New cards
65
What role does the transport layer serve in TCP/IP?
Manages packet transmission and reliability.
New cards
66
What indicates that a packet has traversed multiple routers?
Changes in Layer 2 MAC addresses.
New cards
67
What does QoS stand for in networking?
Quality of Service.
New cards
68
How does encryption affect packet transmission for networks?
It ensures data privacy during exchange.
New cards
69
What aspect of a network addresses logical addressing?
IP addressing schemas.
New cards
70
What is the purpose of a subnet mask?
To delineate the network and host portions of an IP address.
New cards
71
What could hinder a device's ability to communicate across subnets?
Improper default gateway configuration.
New cards
72
How is backplane bandwidth typically measured?
In terms of bits per second.
New cards
73
What distinguishes public from private IP addressing?
Administrative controls and access.
New cards
74
How do routers utilize learned routes?
To manage packet forwarding efficiently.
New cards