Hughes' Forehead

studied byStudied by 11 people
5.0(1)
Get a hint
Hint

What is the difference between the terms bandwidth and throughput?

1 / 33

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

34 Terms

1

What is the difference between the terms bandwidth and throughput?

Bandwidth is the capacity of data transfer in a network and throughput is the actual data transfer rate.

New cards
2

What is the function of ARP?

maps IPv4 addresses to MAC addresses

New cards
3

Which two steps are required before SSH can be enabled on a Cisco router? (Choose two.)

1. Give the router a host name and domain name.2. Generate a set of secret keys to be used for encryption and decryption.
2. Generate a set of secret keys to be used for encryption and decryption.

New cards
4

Which type of network is covered by the IEEE 802.11 standards?

Wi-Fi

New cards
5

Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?

encryption

New cards
6

A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

FF-FF-FF-FF-FF-FF and 255.255.255.255

New cards
7

When designing an IP address scheme, what is a benefit of using DHCP to assign host addresses?

Hosts are permanently assigned an address by the DHCP server so that they are easier to manage

New cards
8

What does the IP address 172.17.4.250/24 represent?

host address

New cards
9

A message is sent to all hosts on a remote network. Which type of message is it?

directed broadcast

New cards
10

A network administrator attempted to access the company website and received a "page not found" error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was an unusually large number of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?

It is likely that someone attempted a DoS attack.

New cards
11

Which three IP addresses are considered private addresses? (Choose three.)

1. 192.168.5.292.
2. 172.17.254.43.
3. 10.234.2.1

New cards
12

What are two characteristics of 802.11 wireless networks? (Choose two.)

1. They use CSMA/CA technology.
2. Collisions can exist in the networks.

New cards
13

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode

New cards
14

What benefit does DHCP provide to a network?

Hosts can connect to the network and get an IP address without manual configuration.

New cards
15

How are port numbers used in the TCP/IP encapsulation process?

If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

New cards
16

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

(config)# service password-encryption

New cards
17

A DHCP configured PC boots up. What is the order of the messages that are sent and received by this PC in order to obtain an appropriate IP address?

DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK​

New cards
18

A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?

Disable SSID broadcast.

New cards
19

What are three characteristics of multicast transmission? (Choose three.)

1. Multicast transmission can be used by routers to exchange routing information.
2. The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.
3. A single packet can be sent to a group of hosts.

New cards
20

A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command on a Cisco switch. Which term is used to describe the "0/1" part in the command?

argument

New cards
21

What is the purpose of the subnet mask in conjunction with an IP address?

to determine the subnet to which the host belongs

New cards
22

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

virtualization

New cards
23

Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

tunneling

New cards
24

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

1. line console 0
2. login
3. password cisco

New cards
25

What are two benefits of using a layered network model? (Choose two.)

1. It prevents technology in one layer from affecting other layers.
2. It assists in protocol design.

New cards
26

A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?

Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.

New cards
27

Which wireless RF band do IEEE 802.11b/g devices use?

2.4 GHz

New cards
28

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

remote access to a switch where data is encrypted during the session

New cards
29

Which type of address does a switch use to build the MAC address table?

source MAC address

New cards
30

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

251

New cards
31

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully.

New cards
32

Which type of access is secured on a Cisco router or switch with the enable secret command?

privileged EXEC

New cards
33

A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?

the broadcast MAC address

New cards
34

Which two statements describe characteristics of network addresses? (Choose two.)

1. A MAC address is also referred to as a physical address because it is permanently embedded on the NIC.
2. A valid public IPv4 or IPv6 address is needed in order for devices to communicate over the internet.

New cards

Explore top notes

note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 16 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 36 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard25 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard224 terms
studied byStudied by 216 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard28 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard22 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard41 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 4 people
Updated ... ago
4.0 Stars(2)
flashcards Flashcard25 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(2)