Cisco Q2 MOD 5-6-7 Flashcards

1
Q

192.168.11.10 IP address?

A

11000000.10101000.00001011.00001010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

172.16.31.30 IP address?

A

10101100.00010000.00011111.00011110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is the hexadecimal equivalent of 202?

A

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is the hexadecimal equivalent of 254?

A

FE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is the decimal equivalent of A9?

A

169

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the decimal equivalent of 7D?

A

125

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPv4 addresses begin as binary, a series of only 1s and 0s.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Binary is a numbering system that consists of the digits 0 and 1 called bits.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Each address consists of a string of 32 bits, divided into four sections called

A

Octets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Representation for decimal number 173

A

10101101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many binary bits exist within an IPv6 address

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Binary equivalent of the decimal number 232

A

111010000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two statements are correct about IPv4 and IPv6 address

A

IPv4 address are 32 bits in length

IPv6 address are represented be hexadecimal numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which IPv4 address, format was created for ease of use by purple and it’s expressed as 201.192.1.4?

A

Dotted decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the decimals equivalent of the binary number 10010101

A

011149

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the decimal equivalent of the hex number 0x3F

A

63

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Decimal equivalent of 0xC9

A

201

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Valid hexadecimal number

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Binary representation of 0xCA

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Binary representation of 0xCA

A

110001010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How many bits are in IPv4 address

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is responsible for network interface card (NIC) to network interface card communications

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Without the data link layer, network layer protocols such as IP, would have to make provisions for connecting to every type of media that could exist along a delivery path.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
IEEE 802 LAN/MAN standards are specific to Ethernet LANs, wireless LANs (WLAN), wireless personal area networks (WPAN) and other types of local and metropolitan area networks
T
26
The IEEE 802 LAN/MAN data link layer consists of the following two sublayers:
Logical Link Control (LLC) Media Access Control (MAC)
27
The MAC sublayer controls the NIC and other hardware that is responsible for sending and receiving data on the wired or wireless LAN/MAN medium.
T
28
The LLC sublayer takes the network protocol data, which is typically an IPv4 or IPv6 packet, and adds Layer 2 control information to help deliver the packet to the destination node
T
29
The framing process provides important delimiters to identify fields within a frame. These delimiting bits provide synchronization between the transmitting and receiving nodes
Frame delimiting
30
Provides source and destination addressing for transporting the Layer 2 frame between devices on the same shared medium
Addressing
31
Includes a trailer used to detect transmission errors.
Error Detection
32
The MAC sublayer also provides media access control, allowing multiple devices to communicate over a shared (half-duplex) medium. Full-duplex communications do not require access control.
T
33
Router interfaces encapsulate the packet into the appropriate frame.
T
34
What is another name for the OSI data link layer?
Layer 2
35
The IEEE 802 LAN/MAN data link layer consists of which two sublayers?
Logical Link Control Media Access Control
36
What is the responsibility of the MAC sublayer?
Provides the method to get the frame on and off the media
37
What Layer 2 function does a router perform?
Accepts a frame from a medium De encapsulates frame Re encapsulates the packet into a new frame
38
The media access control method used depends on which two criteria?
Media Sharing Topology
39
Which organization defines standards for the network access layer (i.e., the OSI physical and data link layers)?
IEEE
40
Identifies the physical connections and how end devices and intermediary devices (i.e, routers, switches, and wireless access points) are interconnected.
Physical topology
41
Refers to the way a network transfers frames from one node to the next.
Logical Topology
42
The data link layer "sees" the logical topology of a network when controlling data access to the media. It is the logical topology that influences the type of network framing and media access control used.
T
43
Physical point-to-point topologies directly connect two nodes, as shown in the figure. In this arrangement, two nodes do not have to share the media with other hosts.
T
44
Physical point-to-point topologies directly connect two nodes, as shown in the figure. In this arrangement, two nodes do not have to share the media with other hosts.
T
45
In multiaccess LANs, end devices (i.e., nodes) are interconnected using star or extended star topologies, as shown in the figure. In this type of topology, end devices are connected to a central intermediary device, in this case, an Ethernet switch.
T
46
All end systems are chained to each other and terminated in some form on each end. Infrastructure devices such as switches are not required to interconnect the end devices.
Bus
47
End systems are connected to their respective neighbor forming a ring.
Ring
48
Which topology displays networking device layer IP addresses
Logical topology
49
What kind of network would use point-to-point, hub and spoke, or mesh topologies?
WAN
50
Which LAN topology is a hybrid topology?
Extended Star
51
Which duplex communication method is used in WLANs
Half duplex
52
Which media access control method is used in legacy Ethernet LANs?
Carrier senses multiple access/detection
53
What does the data link layer add to a Layer 3 packet to create a frame?
Header Trailer
54
What is the function of the last field in a data link layer frame?
To determine whether frame experienced transmission error
55
Which lists the Layer 2 and Layer 3 address fields in the correct order?
Destination NIC address, Source NIC address, Source IP Address, Destination IP address
56
Which of the following are data link layer protocols? (Choose three)
802.1 Ethernet PPP
57
What identifier is used at the data link layer to uniquely identify an Ethernet device
MAC Address
58
What attribute of a NIC would place it at the data link layer of the OSI model
MAC Address
59
Which two engineering organizations define open standards and protocols that apply to the data link layer?
Institute of Electrical and Electronics Engineer International Telecommunication Union
60
What is true concerning physical and logical topologies?
Logical topologies refer to how a network transfers data between devices
61
What method is used to manage contention-based access on a wireless network?
CSMA/CD
62
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
Mesh
63
Which statement describes the half-duplex mode of data transmission?
Data is transmitted over the network flows in one direction at a time
64
Which is a function of the Logical Link Control (LLC) sublayer?
To identify which network layer protocol is being used
65
Which data link layer media access control method does Ethernet use with legacy Ethernet hubs?
CSMA/CD
66
What are the two sublayers of the OSI model data link layer?
MAC LLC
67
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media
Data Link
68
What type of physical topology can be created by connecting all Ethernet cables to a central device
Star
69
What are two services performed by the data link layer of the OSI model?
It accepts Layer 3 packets and encapsulation them into frames It provides media access control and performs error detection
70
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary
The use of full-duplex capable Layer 2 switches
71
Ethernet operates in the data link layer and the physical layer
T
72
Ethernet uses wired communications, including twisted pair, fiber-optic links, and coaxial cables.
T
73
This IEEE 802.2 sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers.
LLC Sublayer
74
This sublayer (IEEE 802.3, 802.11, or 802.15 for example) is implemented in hardware and is responsible for data encapsulation and media access control.
Mac Sublayer
75
The MAC sublayer is responsible for data encapsulation and accessing the media.
T
76
This is the internal structure of the Ethernet frame
Ethernet Frame
77
he Ethernet frame includes both a source and destination MAC address to deliver the Ethernet frame from Ethernet NIC to Ethernet NIC on the same LAN
Ethernet Addressing
78
The Ethernet frame includes a frame check sequence (FCS) trailer used for error detection.
Ethernet Error Detection
79
Which part of an Ethernet Frame uses a pad to increase the frame field to at least 64 bytes?
Data Field
80
Which part of an Ethernet frame detects errors in the frame?
Frame Check Sequence
81
Which part of an Ethernet Frame describes the higher-layer protocol that is encapsulated?
Ether Type
82
Which part of an Ethernet Frame notifies the receiver to get ready for a new frame?
Preamble
83
Which data link sublayer controls the network interface through software drivers?
LLC
84
Which data link sublayer works with the upper layers to add application information for delivery of data to higher level protocols?
LLC
85
What is a function of the MAC sublayer?
Controls access to the media Checks for errors in received bits uses CMA/CD or CSMA/CA to support Ethernet technology
86