Chapter 2 Flashcards

1
Q

What criteria must be followed in the design of an IPv4 addressing scheme for end devices?

A

Each IP address must be unique within the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While trying to solve a network issue, the technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

A

Issue the reload command without saving the running configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the moods and interfaces like to be protected with passwords. (Choose 3)

A

VTY interface

Privileged EXEC mode

Console interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?

A

User EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What benefit does DHCP provided to a network

A

Hosts can connect to the Internet and get IP address without manual configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network administrator is planning an IOS upgrade on several of the head office routers and switches.
Which three questions must be answered before continuing with the IOS selection and upgrade (Choose 3)?

A

Do the routers and switches have enough RAM and flash memory with the proposed IOS versions?

Do the devices have enough NVRAM to store the IOS image?

What model routers and switches require upgrades?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?

A

Displaying a list of all available commands within the current mode.

Determining which option, keyword, or argument is available for the entered command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement is true about the running configuration file and in Cisco IOS device?

A

It affects the operation of the device immediately when modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two characters are allowed as part of the host name of a Cisco device? (Choose 2)

A

Dash

Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two features are characteristics of flash memory? (Choose 2)

A

Flash Provides nonvolatile storage

The contents of flash may be overwritten.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is it important to configure a hostname on a device?

A

To identify the device during remote access (SSH or Telnet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a result of using the service password-encryption command on a Cisco network device?

A

All passwords in the configuration are not shown in clear text when viewing the configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

A

If there is connectivity with the destination device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A new network administrator has been asked to enter a banner message on a Cisco device.
What is the fastest way a network administrator could test whether the banner is properly configured?

A

Exit privileged EXEC mode and press enter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why would a Layer 2 switch need an IP address?

A

To enable the switch to be managed remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which interface allows remote management of a layer 2 switch?

A

This switch virtual interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What command can be used on a Windows PC to see the IP configuration of that computer?

A

IP config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure
environment?

A

Use the console port to locally access the switch from a serial or USB interface of the PC.

20
Q

Match 6 of the 7 following terms to the listed interfaces:

  1. It is not supported on Catalyst Switch Devices
  2. It displays startup, debugging, and error messages by default.
  3. It uses a DVI port on the device
  4. It can be used to restore an out of the box configuration on a switch or router
  5. It requires an active network connection
  6. It connects through dialup connections
  7. It allows access through use of telnet or SSH protocols.
A

CONSOLE PORT = 3. It uses a DVI port on the device
CONSOLE PORT = 4. It can be used to restore an out of the box configuration on a switch or router

VIRTUAL INTERFACE = 5. It requires an active network connection
VIRTUAL INTERFACE = 1. It is not supported on Catalyst Switch Devices

AUX PORT = 6. It connects through dialup connections
AUX PORT = 7. It allows access through use of telnet or SSH prot

21
Q

Commands Hot Key Matching

  1. Redisplays, on a new line, the command currently being typed
  2. Scrolls backwards through previously entered commands
  3. returns directly to the privileged EXEC mode
  4. completes abbreviated commands and parameters
  5. cancels any command currently being entered and returns directly to privileged EXEC mode
A

TAB = 4. completes abbreviated commands and parameters

CTRL-R = 1. Redisplays, on a new line, the command currently being typed

CTRL-Z = 3. returns directly to the privileged EXEC mode

Up Arrow = 2. Scrolls backwards through previously entered commands

Ctrl-C = 5. cancels any command currently being entered and returns directly to privileged EXEC mode

Ctrl-Shift-6 = Allows the user to interrupt an IOS process such as ping or traceroute

22
Q

Which of the following protocols are examples of TCP/IP transport layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCp

A

D and F

23
Q

Which of the following protocols are examples of TCP/IP network access layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP

A

A and G

24
Q

The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what?

a. Same-layer interaction
b. Adjacent-layer interaction
c. OSI model
d. All of these answers are correct

A

B. Adjacent-layer interaction occurs on one computer, with two adjacent layers in the model. The layer higher requests services from the next lowest layer, and the lower layer provides the services to the next higher layer.

25
Q

The process of TCP on one computer making a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of the TCP segment 1 is an example of what?

a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. OSI model
e. All of these answers are correct

A

B. Same-layer interaction occurs on multiple computers. The functions defined by that layer typically need to be accomplished by multiple computers - for example, the sender setting a sequence number for a segment, and the receiver acknowledging receipt of that segment. A single layer defines that process, but the implementation of that layer on multiple devices is required to accomplish the function.

26
Q

The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header, and then adding a data link header and trailer is an example of what?

A

A. Encapsulation is defined as the process of adding a header in front of data supplies by a higher layer (and possibly adding a trailer as well).

27
Q

Which of the following terms are not valid terms for the names of the seven OSI layers?

A

C and E. OSI includes the transport layer (not transmission layer) and the network layer (not Internet layer)

28
Q

same-layer interaction

A

When a particular layer on one networking device wants to communicate with the same layer on another networking device, they use headers to hold the information they want to communicate. Example: Setting sequence numbers in a transmission packet so the receiving device knows which sequences it received, and then can act on it if it misses a sequence.

29
Q

adjacent-layer interaction

A

The process through which two layers work together, with the lower layer providing a service to the higher layer.
Example: HTTP protocol needs to do something it cannot due (error recovery) so it asks the next lower level, TCP, to perform this service.

30
Q

PDU

A

Protocol Data Unit

31
Q

List the OSI Layers

A
People Don't Need To See Paula Abdul
7 - Application
6 - Presentation
5 - Session
4 - Transport
3 - Network
2 - Data Link
1 - Physical
32
Q

Application Layer

A

Layer 7 - Interfaces between network and application software. Also includes authentication services.

33
Q

Presentation layer

A

Layer 6 - Defines the format and organization of data. Includes encryption.

34
Q

Session Layer

A

Layer 5 - Establishes and maintains end-to-end bidirectional flows between endpoints. Includes managing transaction flows.

35
Q

Transport Layer

A

Layer 4 - Provides a variety of services between two host computers, including connection establishment and termination, flow control, error recovery, and segmentation of large data blocks into smaller parts for transmission.

36
Q

Network Layer

A

Layer 3 - Logical addressing, routing, and path determination.

37
Q

Data link Layer

A

Layer 2 - Formats data into frames appropriate for transmission onto some physical medium. Defines rules for when the medium can be used. Defines means by which to recognize transmission errors.

38
Q

Physical Layer

A

Layer 1 - Defines the electrical, optical, cabling, connectors, and procedural details required for transmitting bits, represented as some form of energy passing over a physical medium.

39
Q

Example of Application layer Protocols

A

HTTP, POP3, SMTP

40
Q

Example of Transport layer Protocols

A

TCP, UDP

41
Q

Example of Internet layer Protocols

A

IP

42
Q

Example of Network Access layer Protocols

A

Ethernet, Point-to-Point Protocol (PPP), T/1

43
Q

What are the two most commonly used Transport layer Protocols?

A

TCP and UDP

44
Q

TCP

A

Transmission Control Protocol

Includes an error recovery feature. The recipient knows if it didn’t receive a data packet, so after the full transmission, it sends a request back to the host for the lost sequence number.

45
Q

UDP

A

User Datagram protocol

46
Q

What does each layer do?

A

Each layer provides a service to the layer above it.