Cisco 1,2, 3,4 Flashcards

1
Q

All end devices and network devices require an

A

Operating Systems (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The user can interact with the shell using a

A

command-line interface (CLI) or a graphical user interface (GUI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The physical part of a computer including underlying electronics

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A switch will forward traffic by default and does not need to be explicitly configured to operate.

A

Access Methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

you can use to connect to a networking device either by a serial connection over a console port, or by an SSH/Telnet connection

A

Terminal Emulation Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device.

A

User EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To execute configuration commands, a network administrator must access

A

Privileged EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mode allows access to only a limited number of basic monitoring commands.

It is often referred to as “view-only” mode.

A

User EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mode allows access to all commands and features.

The user can use any monitoring commands and execute configuration and management commands.

A

Privileged EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to configure console, SSH, Telnet, or AUX access.

A

Line Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Used to configure a switch port or router network interface.

A

Interface Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To move in and out of global configuration mode, use the

A

Configure Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

As shown in the figure, the portion of the OS that interacts directly with computer hardware is known as the kernel. The portion that interfaces with applications and the user is known as the shell.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When using a CLI, the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt,

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A GUI such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

GUIs may not always be able to provide all the features available with the CLI. GUIs can also fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a CLI. The CLI is less resource intensive and very stable when compared to a GUI.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When you are learning how to modify device configurations, you might want to start in a safe, non-production environment before trying it on real equipment.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which IOS mode allows access to all commands and features?

A

Privileged EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which IOS mode are you in if the Switch(config)# prompt is displayed?
Global Configuration Mode
26
Which IOS mode are you in if the Switch> prompt is displayed?
User EXEC Mode
27
Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)
CTRL Z END
28
This is a specific parameter defined in the operating system (in the figure, ip protocols).
Keyword
29
This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).
Argument
30
text indicates commands and keywords that you enter literally as shown.
Boldface
31
text indicates arguments for which you supply values
Italics
32
indicate an optional element (keyword or argument)
Square Brackets`
33
indicate a required element (keyword or argument).
Braces
34
indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.
Braces and vertical lines within square brackets
35
The command is ping and the user-defined argument is the ip-address of the destination device. For example, ping 10.10.10.5.
ping ip-address
36
The command is traceroute and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254.
Traceroute ip-address
37
When a command output produces more text than can be displayed in a terminal window, the IOS will display a “--More--” prompt.
T
38
The use of weak or easily guessed passwords continues to be the biggest security concern of organizations. Network devices, including home wireless routers, should always have passwords configured to limit administrative access.
T
39
All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be encrypted and legal notifications provided.
T
40
What is the command to assign the name “Sw-Floor-2” to a switch?
hostname SW-floor 2
41
How is the privileged EXEC mode access secured on a switch?
enable secret class
42
Which command enables password authentication for user EXEC mode access on a switch?
login
43
Which command encrypts all plaintext passwords access on a switch?
service password encryption
44
Which is the command to configure a banner to be displayed when connecting to a switch?
banner motd $ Keep out $
45
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
startup-config
46
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
running-config
47
The downside to using the reload command to remove an unsaved running config is the brief amount of time the device will be offline, causing network downtime.
T
48
What is the structure of an IPv4 address called?
dotted- decimal format
49
How is an IPv4 address represented?
four decimal number between 0 and 255 separated by period.
50
What type of interface has no physical port associated with it?
Switch Virtual Interface SVI
51
(DHCP).
Dynamic Host Configuration Protocol
52
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified
53
Which two statements are true regarding the user EXEC mode?
The device prompt for this mode ends with > Only some aspects of the router configuration can be viewed
54
Which type of access is secured on a Cisco router or switch with the enable secret command?
privileged EXEC
55
What is the default SVI on a Cisco switch?
VLAN1
56
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines?
Should begin with letter no spaces no more than 64 characters
57
What is the function of the shell in an OS?
Interfaces between the users and kernel
58
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display
User EXEC Model
59
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Nothing must be done
60
Which memory location on a Cisco router or switch will lose all content when the device is restarted?
RAM
61
Why would a technician enter the command copy startup-config running-config?
To copy an existing configuration into RAM
62
Which functionality is provided by DHCP?
Automatic assignment of an IP address to each host
63
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
Displaying a list of available commands within the current mode determining which keyword, option, or argument is available for the entered command
64
Which memory location on a Cisco router or switch stores the startup configuration file?
NVRAM
65
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?
10.1.0.0
66
Whether connecting to a local printer in the home or a website in another country, before any network communications can occur, a___ ____ to a local network must be established
physical connection
67
NIC
Network Interface Cards
68
Not all physical connections are equal, in terms of the performance level, when connecting to a network.
T
69
The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
T
70
The destination node physical layer retrieves these individual signals from the media, restores them to their bit representations, and passes the bits up to the data link layer as a complete frame.
T
71
he physical layer is only concerned with wired network connections.
T
72
When a frame is encoded by the physical layer, all bits are sent over the media at the same time.
F
73
The physical layer of the receiving device passes bits up to which higher level layer?
Data Link
74
The physical layer of the receiving device passes bits up to which higher level layer?
Frame
75
The protocols and operations of the upper OSI layers are performed using software designed by software engineers and computer scientists.
T
76
The physical layer consists of electronic circuitry, media, and connectors developed by engineers.
T
77
it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations.
T
78
ISO
International Organization for Standardization
79
TIA/EIA
Telecommunications Industry Association/Electronic Industries Association
80
ITU
International Telecommunication Union
81
ANSI
American National Standards Institute
82
IEEE
Institute of Electrical and Electronics Engineers
83
FCC
National telecommunications regulatory authorities including the Federal Communication Commission in the USA
84
(ETSI)
the European Telecommunications Standards Institute
85
The physical layer standards address three functional areas:
Physical Components Encoding Signaling
86
are the electronic hardware devices, media, and other connectors that transmit the signals that represent the bits.
Physical Components
87
is a method of converting a stream of data bits into a predefined "code”
Encoding or Line Encoding
88
The physical layer must generate the electrical, optical, or wireless signals that represent the "1" and "0" on the media.
Signaling
89
Different physical media support the transfer of bits at different rates. Data transfer is usually discussed in terms of
Bandwidth
90
Bandwidth is typically measured in
Kilobits per second (kbps), Megabit per second (Mbps) or gigabits per second (Gbps)
91
Terms used to measure the quality of bandwidth include:
Latency Throughput Goodput
92
refers to the amount of time, including delays, for data to travel from one given point to another.
Latency
93
is the measure of the transfer of bits across the media over a given period of time.
Throughput
94
There is a third measurement to assess the transfer of usable data; it is known as
Goodput
95
Which media uses patterns of microwaves to represent bits?
Wireless
96
Which media uses patterns of light to represent bits?
Fiber-optic
97
Which media uses electrical pulses to represent bits?
copper
98
Which of these is the name for the capacity of a medium to carry data?
bandwidth
99
Which of these is a measure of the transfer of bits across the media?
throughput
100
can distort and corrupt the data signals being carried by copper media. Potential sources of EMI and RFI include radio waves and electromagnetic devices, such as fluorescent lights or electric motors.
Electromagnetic interference (EMI) or radio frequency interference (RFI)
101
Is a disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an adjacent wire.
Crosstalk
102
cabling is the most common networking media.
Unshielded Twisted Pair (UTP Cable)
103
provides better noise protection than UTP cabling
Shielded Twisting Pairing (STP Cable)
104
gets its name from the fact that there are two conductors that share the same axis.
Coaxial Cable
105
A copper conductor is used to transmit the electronic signals.
T
106
A layer of flexible plastic insulation surrounds a copper conductor.
T
107
The insulating material is surrounded in a woven copper braid, or metallic foil, that acts as the second wire in the circuit and as a shield for the inner conductor. This second layer, or shield, also reduces the amount of outside electromagnetic interference.
T
108
The entire cable is covered with a cable jacket to prevent minor physical damage.
T
109
Coaxial cables attach antennas to wireless devices. The coaxial cable carries radio frequency (RF) energy between the antennas and the radio equipment.
Wireless Installations
110
Cable service providers provide internet connectivity to their customers by replacing portions of the coaxial cable and supporting amplification elements with fiber-optic cable. However, the wiring inside the customer's premises is still coax cable.
Cable Internet Installations
111
Which of the following attaches antennas to wireless devices? It can also be bundled with fiber-optic cabling for two-way data transmission.
Coaxial Cable
112
Which of the following counters EMI and RFI by using shielding techniques and special connectors?
STP
113
Which of the following is the most common network media?
UTP
114
Which of the following terminates with BNC, N type and F type connectors?
Coaxial
115
When used as a networking medium, UTP cabling consists of four pairs of color-coded copper wires that have been twisted together and then encased in a flexible plastic sheath. Its small size can be advantageous during installation.
T
116
UTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered other ways that they can limit the negative effect of crosstalk:
T
117
Designers now pair wires in a circuit. When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each other. Therefore, the two magnetic fields cancel each other and also cancel out any outside EMI and RFI signals.
Cancellation
118
To further enhance the cancellation effect of paired circuit wires, designers vary the number of twists of each wire pair in a cable. UTP cable must follow precise specifications governing how many twists or braids are permitted per meter (3.28 feet) of cable. Notice in the figure that the orange/orange white pair is twisted less than the blue/blue white pair. Each colored pair is twisted a different number of times.
Varying the number of twists per wire pair
119
UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit signal degradation and effectively provide self-shielding for wire pairs within the network media.
T
120
The most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router.
Ethernet Straight-through
121
A cable used to interconnect similar devices. For example, to connect a switch to a switch, a host to a host, or a router to a router.
Ethernet Crossover
122
Using a crossover or straight-through cable incorrectly between devices may not damage the devices, but connectivity and communication between the devices will not take place.
T
123
Optical fiber cable transmits data over longer distances and at higher bandwidths than any other networking media.
T
124
Optical fiber is a flexible, but extremely thin, transparent strand of very pure glass, not much bigger than a human hair
T
125
(SMF)
Single Mode Fiber
126
MMF
Multimode fiber
127
Used for backbone cabling applications and interconnecting infrastructure devices
Enterprise Networks
128
Used to provide always-on broadband services to homes and small businesses
Fiber-to-the-Home (FTTH
129
Used by service providers to connect countries and cities
Long-Haul Networks
130
Used to provide reliable high-speed, high-capacity solutions capable of surviving in harsh undersea environments at up to transoceanic distances. Search the internet for “submarine cables telegeography map” to view various maps online.
Submarine Cable Networks
131
Which of the following fiber-optic cable types can help data travel approximately 500 meters?
Multimode
132
Which of the following fiber-optic cable types use light emitting diodes (LEDs) as a data light source transmitter?
Multimode
133
Which of the following fiber-optic cable types use lasers in a single stream as a data light source transmitter?
Single mode
134
Which of the following fiber-optic cable types is used to connect long-distance telephony and cable TV applications?
Single Mode
135
Which of the following fiber-optic cable types can travel approximately 100 km?
Single mode
136
Which of the following fiber-optic cable types is used within a campus network?
Multi mode
137
Wireless data communication technologies work well in open environments. However, certain construction materials used in buildings and structures, and the local terrain, will limit the effective coverage.
Coverage Area
138
Wireless is susceptible to interference and can be disrupted by such common devices as household cordless phones, some types of fluorescent lights, microwave ovens, and other wireless communications.
Interface
139
Wireless communication coverage requires no access to a physical strand of media. Therefore, devices and users, not authorized for access to the network, can gain access to the transmission. Network security is a major component of wireless network administration
Security
140
WLANs operate in half-duplex, which means only one device can send or receive at a time. The wireless medium is shared amongst all wireless users. Many users accessing the WLAN simultaneously results in reduced bandwidth for each user.
Shared medium
141
commonly referred to as Wi-Fi.
Wi-Fi (IEEE 802.11)
142
This is a wireless personal area network (WPAN) standard, commonly known as
Bluetooth
143
this wireless standard uses a point-to-multipoint topology to provide wireless broadband access.
WiMAX (IEEE 802:16)
144
specification used for low-data rate, low-power communications.
Zigbee (IEEE 802.15.4)
145
These concentrate the wireless signals from users and connect to the existing copper-based network infrastructure, such as Ethernet. Home and small business wireless routers integrate the functions of a router, switch, and access point into one device, as shown in the figure
Wireless Access Point (AP)
146
These provide wireless communication capability to network hosts.
Wireless NIC adapters
147
True or false. Wireless is not well suited for enterprise networks.
T
148
True or false. Wireless LANs operate in full-duplex allowing all devices to send or receive data at the same time so the number of users does not impact performance.
F
149
Which of the following wireless standards is best suited for industrial and IoT environments?
Zigbee
150
Which of the following wireless standards is used for Personal Area Networks (PANs) and allows devices to communicate over distances of 1 to 100 meters?
Bluetooth
151
The signals are patterns of electrical pulses.
Copper Cable
152
The signals are patterns of light.
Fiber optic Cable
153
The signals are patterns of microwave transmissions.
Wireless
154
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
Physical Layer
155
What type of cable is used to connect a workstation serial port to a Cisco router console port?
rollover
156
Why are two strands of fiber used for a single fiber optic connection?
They allow for full duplex connectivity
157
Which procedure is used to reduce the effect of crosstalk in copper cables?
Twisting opposite circuit wire pairs together
158
What is one advantage of using fiber optic cabling rather than copper cabling?
Able to carry signals much farther than copper cabling
159
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
End user device needs mobility when connecting to the network
160
Which type of UTP cable is used to connect a PC to a switch port?
Straight through
161
What is the definition of bandwidth?
Amount of data that can flow from one place to another in a given amount of time
162
Which statement correctly describes frame encoding?
It converts bits into a predefined code in order to provide a predictible pattern to help distinguish data bits from control bits
163
What is a characteristic of UTP cabling?
Cancellation
164
A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion?
Microwave oven
165
What is the purpose of the OSI physical layer?
Transmitting bits across the local media
166
Which characteristic describes crosstalk?
The distortion of the transmitted of messages from signals carried in adjacent wires
167
What is indicated by the term throughput?
Measure of the bits transferred the media over a given period of time
168
Which standards organization oversees development of wireless LAN standards?
IEEE
169
IP address
Internet protocol address
170
The email server runs email server software. Clients use mail client software, such as Microsoft outlook, to access on the server.
Email
171
Client and server software usually run on separate computers, but it is also possible for one computer to be used for both roles at the same time. In small businesses and homes, many computers function as the servers and clients on the network. This type of network is called a peer-to-peer network.
Peer-to-Peer
172
USB
Universal Serial Bus
173
NIC
network interface card
174
The network devices that people are most familiar with are end devices. To distinguish one end device from another, each end device on a network has an address
End Devices
175
. They can connect multiple individual networks to form an internetwork
Intermediary Devices
176
Intermediary network devices perform some or all of these functions:
Regereate and retransmit communication signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternative pathways when there is a link failure Classify and direct messages according to priorities Permit or deny the flow of data, based on security settings
177
Network Media
Communication transmits across a network on media. The media provides the channel over which the message travels from source to destination
178
Data is encoded into electrical impulses.
Metal wires within cables
179
Data is encoded into pulses of light.
Glass or plastic fibers within cables (fiber-optic cable)
180
Data is encoded via modulation of specific frequencies of electromagnetic waves.
Wireless transmission
181
Network architects and administrators must be able to show what their networks will look like.
Network Representation
182
A NIC physically connects the end device to the network.
Network Interface Card
183
A connector or outlet on a networking device where the media connects to an end device or another networking device.
Physical port
184
Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
Interface
185
are mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.
Topology diagrams
186
topology diagrams illustrate the physical location of intermediary devices and cable installation, as shown in the figure.
Physical topology diagrams
187
topology diagrams illustrate devices, ports, and the addressing scheme of the network, as shown in the figure.
Logical topology diagrams
188
networks allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers
Small office and home office
189
is the largest network in existence. In fact, the term internet means a “network of networks”. It is a collection of interconnected private and public networks.
The internet
190
LAN
Local area networks
191
WAN
Wide area networks
192
ISP
Internet service provider
193
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
Cable
194
Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet.
DSL
195
are people, or electronic devices, that need to send a message to other individuals or devices.
Message source (sender)
196
The destination receives the message and interprets it.
Message Destination (receiver)
197
This consists of the media that provides the pathway over which the message travels from source to destination.
Channel
198
Sending a message, whether by face-to-face communication or over a network, is governed by rules called protocols.
T
199
Before communicating with one another, individuals must use established rules or agreements to govern the conversation.
T
200
Network Protocol Requirements
Message encoding Message formatting and encapsulation Message size Message timing Message delivery options
201
This is the process of managing the rate of data transmission.
Flow Control
202
If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly.
Response Timeout
203
This determines when someone can send a message.
Access method
204
What is the process of converting information into the proper form for transmission?
Encoding
205
Which step of the communication process is concerned with properly identifying the address of the sender and receiver?
Formatting
206
Which three are components of message timing?
Flow Control Access Method Response Timeout
207
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?
Multicast
208
Network protocols define a common format and set of rules for exchanging messages between devices.
T
209
Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.
Network Communications Protocols
210
Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
Network Security Protocols
211
rotocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).
Routing Protocols
212
Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.
Service Discovery Protocols
213
This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.
Addressing
214
This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.
Reliability
215
This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.
Flow control
216
This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.
Sequencing
217
This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.
Error Detection
218
This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.
Application Interface
219
A message sent over a computer network typically requires the use of several protocols, each one with its own functions and format.
Protocol Interaction
220
This protocol governs the way and web server and a web client interact
Hypertext Transfer Protocol (HTTP)
221
Is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices
TCP
222
This protocol is responsible for delivering messages from the sender to the receiver Is used by routers to forward the messages across mulptiple networks.
IP
223
Is responsible for the deliver of messages from one NIC to another NIC on the same Ethernet local area network LAN
Ethernet
224
BGP and OSPF are examples of which type of protocol?
Routing
225
Which two protocols are service discovery protocols?
DNS DHCP
226
What is the purpose of the sequencing function in network communication?
To uniquely label transmitted segments of data for proper reassembly by the receiver
227
This protocol is responsible for guaranteeing the reliable delivery of information.
TCP
228
A protocol suite is a group of inter-related protocols necessary to perform a communication function.
T
229
Is a set of protocols that work together to provide comprehensive network communication services.
Protocol Suites
230
Is the most common and relevant protocol suite used today
Internet Protocol Suite/ TCP or IP
231
Is a family of protocols developed jointly in 1977 by the International Organization for Standardization (ISO)
Open System Interconnection (OSI)
232
A short-lived proprietary protoclol suite released by Apple Inc.
Apple Talk
233
A short-lived proprietary protocol suite released and network operating system developed by Novell Inc.
Novell Netware
234
TCP/IP protocols are available for the application, transport, and internet layers
T
235
This means it is freely available to the public and can be used by any vendor on their hardware or in their software
Open Standard Protocol Suite
236
This means it has been endorsed by the networking industry and approved by a standard organization
Standards based protocol suite
237
DNS
Domain Name System. Translates domain names such as cisco.com, into IP addresses.
238
Dynamic Host Configuration Protocol for IPv4.
DHCPv4
239
DHCPv6A DHCPv6 server dynamically assigns IPv6 addressing information to DHCPv6 clients at start-up.
DHCPv6
240
SLAAC
Stateless Address Autoconfiguration. A method that allows a device to obtain its IPv6 addressing information without using a DHCPv6 server.
241
Enables clients to send email to a mail server and enables servers to send email to other servers.
Simple Mail Transfer Protocol.
242
Enables clients to retrieve email from a mail server and download the email to the client's local mail application.
POP3 - Post Office Protocol version 3
243
Enables clients to access email stored on a mail server as well as maintaining email on the server.
IMAP - Internet Message Access Protocol
244
Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is a reliable, connection-oriented, and acknowledged file delivery protocol.
FTP - File Transfer Protocol.
245
As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session in which the file transfer is encrypted. SSH is a method for secure remote login that is typically used for accessing the command line of a device.
SFTP - SSH File Transfer Protocol.
246
A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP.
TFTP - Trivial File Transfer Protocol.
247
A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.
HTTP - Hypertext Transfer Protocol
248
A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.
HTTPS - HTTP Secure.
249
A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.
REST - Representational State Transfer.
250
UDP and TCP belong to which layer of the TCP/IP protocol?
Transport
251
Which two protocols belong in the TCP/IP model application layer?
DNS, DHCP
252
Which protocol operates at the network access layer of the TCP/IP model?
Ethernet
253
Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)
ECMPv4 ICMPv6
254
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device?
IP at the internet layer
255
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)
Routing Protocols Messaging Internet Protocol
256
Open standards encourage interoperability, competition, and innovation. They also guarantee that the product of no single company can monopolize the market or have an unfair advantage over its competition.
T
257
Various organizations have different responsibilities for promoting and creating standards for the internet and TCP/IP protocol.
T
258
Responsible for promoting the open development and evolution of internet use throughout the world.
Internet Society (ISOC)
259
Responsible for the overall management and development of internet standards.
Internet architecture Board (IAB)
260
Develops, updates, and maintains internet and TCP/IP technologies. This includes the process and documents for developing new protocols and updating existing protocols, which are known as Request for Comments (RFC) documents
Internet Engineering Task Force (IETF)
261
Focused on long term research related to internet TCP/IP protocols such as Anti-Spam Research Group (ASRG) Crypto Forum Research Group (CFRG) and Peer to Peer Research Group (P2PRG)
Internet Research Task Force (IRTF)
262
Based in the United States, ICANN coordinates IP address allocation the management of domains names, and assignment of other information us in TCP/IP protocols.
Internet Corporation for Assigned Names and numbers (CANN)
263
Responsible for overseeing and managing IP address allocation, domain name management and protocol identifiers for ICANN
Internet Assigned Numbers Authority (IANA)
264
Organization of electrical engineering and electronics dedicated to advancing technological innovation and creating standards in a wide area of industries including power and energy, healthcare, telecommunications, and networking. Important IEEE networking standards include 802.3 Ethernet and 802.11 WLAN standard. Search the internet for other IEEE network standards.
Institute of Electrical and Electronics Engineers
265
Organization is best known for its standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.
Electronic Industries Alliance (EIA)
266
Organization responsible for developing communication standards in a variety of areas including radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more.
Telecommunications Industry Association (TIA)
267
One of the largest and oldest communication standards organizations. The ITU-T defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL).
International Telecommunications Union-Telecommunication Standardization Sector (ITU-T)
268
True or false. Standards organizations are usually vendor-neutral.
T
269
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.
Internet Engineering Task Force (IETF)
270
This standards organization is responsible for IP Address allocation and domain name management
Internet Assigned Numbers Authority (IANA)
271
What types of standards are developed by the Electronics Industries Alliance (EIA)
Electric Wiring and Connectors
272
layer contains protocols used for process-to-process communications.
application
273
layer provides for common representation of the data transferred between application layer services.
presentation
274
layer provides services to the presentation layer to organize its dialogue and to manage data exchange.
session
275
layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.
transport
276
layer provides services to exchange the individual pieces of data over the network between identified end devices.
network
277
layer protocols describe methods for exchanging data frames between devices over a common media
data link
278
protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.
physical layer
279
Represents data to the user, plus encoding and dialog control.
Application
280
Supports communication between various devices across diverse networks.
Transport
281
Determines the best path through the network.
Internet
282
Controls the hardware devices and media that make up the network.
Network Access
283
Because a large data stream is segmented into packets, large amounts of data can be sent over the network without tying up a communications link. This allows many different conversations to be interleaved on the network called multiplexing.
Increases speed
284
-If a single segment is fails to reach its destination due to a failure in the network or network congestion, only that segment needs to be retransmitted instead of resending the entire data stream.
Increases efficiency
285
The general term for the PDU used at the application layer
Data
286
Transport layer PDU
Segment
287
Network Layer PDU
Packet
288
Data Link layer PDU
Frame
289
Physical layer PDU used when physically transmitting data over the medium
Bits
290
When messages are being sent on a network, the encapsulation process works from top to bottom.
T
291
De-encapsulation is the process used by a receiving device to remove one or more of the protocol headers.
T
292
What is the process of dividing a large data stream into smaller pieces prior to transmission?
Segmentation
293
What is the PDU associated with the transport layer?
Segment
294
Which protocol stack layer encapsulates data into frames?
Data Link
295
What is the name of the process of adding protocol information to data as it moves down the protocol stack?
Encapsulation
296
The network and data link layers are responsible for delivering the data from the source device to the destination device.
T
297
Responsible for delivering the IP packet from the original source to the final destination, which may be on the same network or a remote network.
Network layer source and destination addresses
298
Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network.
Data link layer source and destination addresses
299
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway.
T
300
True or false? The right-most part of an IP address is used to identify the network that a device belongs to.
F
301
What is used to determine the network portion of an IPv4 address?
Subnet Mask
302
Which of the following statements are true regarding network layer and data link layer addresses?
Network Layer addressess are logical and data link addresses are expressed as 12 hexadecimal digits Data link layer addresses are physical and network layer addresses are logical Network layer addresses are either 32 or 128 bits in lengths
303
What is the order of the two addresses in the data link frame?
Destination MAC, Source MAC
304
True or False? Data Link addresses are physical so they never change in the data link frame from source to destination.
F
305
Which three acronyms/initialisms represent standards organizations?
IEEE IANA
306
In computer communication, what is the purpose of message encoding?
to convert information to the appropriate form for transmission
307
Which message delivery option is used when all devices need to receive the same message simultaneously?
broadcast
308
What are two benefits of using a layered network model? (Choose two.)
It assists in protocol design It prevents technology in one layer from affecting other layers
309
What is the purpose of protocols in data communications?
Providing the rules required for a specific type of communication to occur
310
Which logical address is used for delivery of data to a remote network?
Destination IP address
311
What is the general term that is used to describe a piece of data at any layer of a networking model?
Protocol Data Unit
312
Which two protocols function at the internet layer? (Choose two.)
IP ICMP
313
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?
Transport
314
Which type of communication will send a message to a group of host destinations simultaneously?
Multicast
315
What process is used to receive transmitted data and convert it into a readable message?
Decoding
316
What is done to an IP packet before it is transmitted over the physical medium?
It is encapsulated in a layer 2 frame
317
What process is used to place one message inside another message for transfer from the source to the destination?
Encapsulation
318
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, Ethernet