CCNA 3 Flashcards

1
Q

Which network topology allows all traffic to flow through a central hub

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is true about Ethernet

A

802.3 protocol

10Base T half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If a router has 3 hosts connected in one port and two other hosts connected in another port, how may broadcast domains are present on the router

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On which type of device is every port in the same collision domain

A

a hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which MTU size can cause a baby giant error

A

1518

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three characteristics of the TCP protocol

A

The connection is established before data is transmitted.
It ensures that all data is transmitted and received by the remote device.
It uses seperate SYN and ACK messages to establish a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?

A

This is an Ethernet port operating at half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which three elements are fields in a basic Ethernet data frame?

A

Preamble
Type/length
Frame check sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What interconnection cable can you use when you use a MDI connection?

A

Crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

for what two purposes does the Ethernet protocol use physical addresses

A

To uniquely identify devices at Layer 2

to allow communication between different devices on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In an Ethernet network, under what two scenarios can devices transmit?

A

When they detect no other devices are sending

When the medium is idle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many broadcast domains are shown in the graphic assuming only the default VLAN is configured on the switches?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which statement about upgrading a Cisco IOS device with TFTP server

A

the operation is performed in encrypted format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two options are fields in an Ethernet frame?

A

frame check sequence

type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two statements about UDP are true?

A

It can transmit data at a rate higher than the path capacity

It can be used for multicast and broadcast traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two statements about fiber cable are true?

A

Single-mode cable is most appropriate for installations longer 10 km
Multi-mode cable supports speeds between 100 Mbps and 100 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which statements correctly describe steps in the OSI data encapsulation process?

A

The transport layer divides a data stream into segments and may add reliability and flow control information
Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What layers of the OSI Model is included in TCP/IP Model’s INTERNET layer?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Where does routing occur within the DoD TCP/IP reference model?

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following correctly describe steps in the OSI data encapsulation process

A

The transport layer divides a data stream into segments and may add reliability and flow control information.
Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which networking technology is currently recognized as the standard for computer networking?

A

Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer?

A

Session
Presentation
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

On which layer TCP/IP is ACL APIC-EM path

A

Layer 4(Application layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

which option is the benefit of implementing an intelligent DNS for a cloud computing solution?

A

It can redirect user requests to locations that are using fewer network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the three major components of Cisco network virtualization

A

network access control
path isolation
virtual network services

27
Q

Which three technical services support cloud computing?

A

layer 3 networking routing
ip localization
extended SAN services

28
Q

Which major component of the network virtualization architecture isolate users according to policy?

A

network access control

29
Q

Which three options are the major components of a network virtualization architecture?

A

Virtual network services
network access control
path isolation

30
Q

Which cloud service is typically used to provide DNS and DHCP services to an enterprise?

A

IaaS (Infrastructure as a service)

31
Q

Which command can you enter to determine whether serial interface 0/2/0 has been configured using HDLC encapsulation?

A

router#show interfaces S0/2/0

32
Q

Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?

A

PPP (Point to point protocol)

33
Q

Which statements about using leased lines for your WAN infrastructure are true?

A

Leased lines with sufficient bandwidth can avoid latency between endpoints.
Leased lines require little installation and maintenance expertise.

34
Q

Which of the following describes the roles of devices in a WAN?

A

A CSU/DSU (channel service unit/data service unit) terminates a digital local loop
A modem terminates an analog local loop
A router is commonly considered a DTE (Data terminal equipment) device

35
Q

Which two pieces of information are provided by the “show controllers serial 0” command?

A

The type of cable that is connected to the interface

the status of the physical layer of the interface

36
Q

Which command is used to know the duplex speed of serial link?

A

Show interface

37
Q

Which WAN topology provides a direct connection from each site to all other sites on the network

38
Q

What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links?

A

reduced cost
increased security
scalability

39
Q

True or False:

DWDM (dense wavelength division multiplexing) allows a single strand of fiber to support bidirectional communications

40
Q

True or False:

DWDM (dense wavelength division multiplexing) is used for long-distance and submarine cable systems

41
Q

True or False:

DWDM (dense wavelength division multiplexing) supports both the SDH and SONET standards

42
Q

True or False:

DWDM (dense wavelength division multiplexing)can multiplex up to 256 channels on a single fiber

43
Q

True or False:

DWDM (dense wavelength division multiplexing)can carry up to a 1-Gbps signal on each channel

44
Q

True or False:

DWDM (dense wavelength division multiplexing) supports simplex communications over multiple strands of fiber

45
Q

which PPP subprotocol negotiates authentication options?

A

LCP (Link control protocol)

46
Q

Which benefit of implementing a dual-homed WAN connection instead of a single-homed connection is true?

A

Only dual-homed connections enable an individual router to tolerate the loss of a network link

47
Q

Which two statements about using the CHAP authentication mechanism in a PPP link are true?

A

CHAP (Challenge handshake authentication protocol) uses a three-way handshake
CHAP authentication periodically occurs after link establishment.

48
Q

A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?

A

Main(config)# interface serial 0/0
Main(config)#ip address 172.16.1.1 255.255.255.252
encapsulation ppp
no shut

49
Q

What is the benefit of point-to-point leased line?

A

simply configuration

50
Q

When you deploy multilink PPP on your network, where must you configure the group IP address on each device?

A

Under the multilink interface

51
Q

What are two authentication types of MLPPP (Multilink PPP)

A

PAP (password authentication protocol)

CHAP

52
Q

At which layer of the OSI model does PPP perform?

A

Layer 2 (Data layer)

53
Q

Which command is used to enable CHAP authentication with PAP as the fallback method on a serial interface?

A

(config-if)# ppp authentication chap pap

54
Q

Which two authentication methods are compatible with MLPPP on a serial interface?

55
Q

Which statement about QoS default behavior is true?

A

Packets that arrive with a tag are untagged at the edge of an administrative domain.

56
Q

What 8-bit field exists in IP packet for QoS?

57
Q

Which feature can you implement to reserve bandwidth for VoIP calls across the call path?

58
Q

What does traffic shaping do to reduce congestion in a network?

A

buffers and queues packets

59
Q

in which byte of an IP packet can traffic be marked?

A

the ToS byte

60
Q

Which function does traffic shaping perform?

A

It buffers and queues excess packets

61
Q

Which option is the main function of congestion management

A

queuing traffic based on priority

62
Q

Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic

A

PQ (Performance quality)

63
Q

Which two QoS tools can provide congestion management

A
CBWFQ (class based weighted fair queuing)
PQ
64
Q

Which function does traffic shaping perform?

A

It bufferes and queues excess packets