Chapter 2 Flashcards
What criteria must be followed in the design of an IPv4 addressing scheme for end devices?
Each IP address must be unique within the local network.
While trying to solve a network issue, the technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the moods and interfaces like to be protected with passwords. (Choose 3)
VTY interface
Privileged EXEC mode
Console interface
A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?
User EXEC mode
What benefit does DHCP provided to a network
Hosts can connect to the Internet and get IP address without manual configuration.
A network administrator is planning an IOS upgrade on several of the head office routers and switches.
Which three questions must be answered before continuing with the IOS selection and upgrade (Choose 3)?
Do the routers and switches have enough RAM and flash memory with the proposed IOS versions?
Do the devices have enough NVRAM to store the IOS image?
What model routers and switches require upgrades?
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?
Displaying a list of all available commands within the current mode.
Determining which option, keyword, or argument is available for the entered command.
Which statement is true about the running configuration file and in Cisco IOS device?
It affects the operation of the device immediately when modified
Which two characters are allowed as part of the host name of a Cisco device? (Choose 2)
Dash
Numbers
Which two features are characteristics of flash memory? (Choose 2)
Flash Provides nonvolatile storage
The contents of flash may be overwritten.
Why is it important to configure a hostname on a device?
To identify the device during remote access (SSH or Telnet)
A Network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
SSH
What is a result of using the service password-encryption command on a Cisco network device?
All passwords in the configuration are not shown in clear text when viewing the configuration.
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
If there is connectivity with the destination device
A new network administrator has been asked to enter a banner message on a Cisco device.
What is the fastest way a network administrator could test whether the banner is properly configured?
Exit privileged EXEC mode and press enter.
Why would a Layer 2 switch need an IP address?
To enable the switch to be managed remotely.
Which interface allows remote management of a layer 2 switch?
This switch virtual interface.
What command can be used on a Windows PC to see the IP configuration of that computer?
IP config
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure
environment?
Use the console port to locally access the switch from a serial or USB interface of the PC.
Match 6 of the 7 following terms to the listed interfaces:
- It is not supported on Catalyst Switch Devices
- It displays startup, debugging, and error messages by default.
- It uses a DVI port on the device
- It can be used to restore an out of the box configuration on a switch or router
- It requires an active network connection
- It connects through dialup connections
- It allows access through use of telnet or SSH protocols.
CONSOLE PORT = 3. It uses a DVI port on the device
CONSOLE PORT = 4. It can be used to restore an out of the box configuration on a switch or router
VIRTUAL INTERFACE = 5. It requires an active network connection
VIRTUAL INTERFACE = 1. It is not supported on Catalyst Switch Devices
AUX PORT = 6. It connects through dialup connections
AUX PORT = 7. It allows access through use of telnet or SSH prot
Commands Hot Key Matching
- Redisplays, on a new line, the command currently being typed
- Scrolls backwards through previously entered commands
- returns directly to the privileged EXEC mode
- completes abbreviated commands and parameters
- cancels any command currently being entered and returns directly to privileged EXEC mode
TAB = 4. completes abbreviated commands and parameters
CTRL-R = 1. Redisplays, on a new line, the command currently being typed
CTRL-Z = 3. returns directly to the privileged EXEC mode
Up Arrow = 2. Scrolls backwards through previously entered commands
Ctrl-C = 5. cancels any command currently being entered and returns directly to privileged EXEC mode
Ctrl-Shift-6 = Allows the user to interrupt an IOS process such as ping or traceroute
Which of the following protocols are examples of TCP/IP transport layer protocols?
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCp
D and F
Which of the following protocols are examples of TCP/IP network access layer protocols?
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP
A and G
The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what?
a. Same-layer interaction
b. Adjacent-layer interaction
c. OSI model
d. All of these answers are correct
B. Adjacent-layer interaction occurs on one computer, with two adjacent layers in the model. The layer higher requests services from the next lowest layer, and the lower layer provides the services to the next higher layer.
The process of TCP on one computer making a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of the TCP segment 1 is an example of what?
a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. OSI model
e. All of these answers are correct
B. Same-layer interaction occurs on multiple computers. The functions defined by that layer typically need to be accomplished by multiple computers - for example, the sender setting a sequence number for a segment, and the receiver acknowledging receipt of that segment. A single layer defines that process, but the implementation of that layer on multiple devices is required to accomplish the function.
The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header, and then adding a data link header and trailer is an example of what?
A. Encapsulation is defined as the process of adding a header in front of data supplies by a higher layer (and possibly adding a trailer as well).
Which of the following terms are not valid terms for the names of the seven OSI layers?
C and E. OSI includes the transport layer (not transmission layer) and the network layer (not Internet layer)
same-layer interaction
When a particular layer on one networking device wants to communicate with the same layer on another networking device, they use headers to hold the information they want to communicate. Example: Setting sequence numbers in a transmission packet so the receiving device knows which sequences it received, and then can act on it if it misses a sequence.
adjacent-layer interaction
The process through which two layers work together, with the lower layer providing a service to the higher layer.
Example: HTTP protocol needs to do something it cannot due (error recovery) so it asks the next lower level, TCP, to perform this service.
PDU
Protocol Data Unit
List the OSI Layers
People Don't Need To See Paula Abdul 7 - Application 6 - Presentation 5 - Session 4 - Transport 3 - Network 2 - Data Link 1 - Physical
Application Layer
Layer 7 - Interfaces between network and application software. Also includes authentication services.
Presentation layer
Layer 6 - Defines the format and organization of data. Includes encryption.
Session Layer
Layer 5 - Establishes and maintains end-to-end bidirectional flows between endpoints. Includes managing transaction flows.
Transport Layer
Layer 4 - Provides a variety of services between two host computers, including connection establishment and termination, flow control, error recovery, and segmentation of large data blocks into smaller parts for transmission.
Network Layer
Layer 3 - Logical addressing, routing, and path determination.
Data link Layer
Layer 2 - Formats data into frames appropriate for transmission onto some physical medium. Defines rules for when the medium can be used. Defines means by which to recognize transmission errors.
Physical Layer
Layer 1 - Defines the electrical, optical, cabling, connectors, and procedural details required for transmitting bits, represented as some form of energy passing over a physical medium.
Example of Application layer Protocols
HTTP, POP3, SMTP
Example of Transport layer Protocols
TCP, UDP
Example of Internet layer Protocols
IP
Example of Network Access layer Protocols
Ethernet, Point-to-Point Protocol (PPP), T/1
What are the two most commonly used Transport layer Protocols?
TCP and UDP
TCP
Transmission Control Protocol
Includes an error recovery feature. The recipient knows if it didn’t receive a data packet, so after the full transmission, it sends a request back to the host for the lost sequence number.
UDP
User Datagram protocol
What does each layer do?
Each layer provides a service to the layer above it.