Dan's networking Flashcards

1
Q

How can the IPv6 address 0000:0000:0000:0000:0000:0000:0000:0001 be condensed?

A

::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of address is used by the switch to forward transmissions to the appropriate host?

A

MAC address
Physical address
Hardware address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of fiber optic cable is suited for long distance links?

A

Single mode fiber (SMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What specialized network device is commonly used to load balance traffic across multiple servers in a group?

A) Content Engine
B) Firewall
C) Content Switch
D) DNS server

A

C) Content Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Router forwards broadcast traffic

True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do we need port numbers?

A

Port numbers basically transfer data received by the NIC to the local machine RAM location being reserved for the specific application. That is how one application’s data does not get mixed up with another application even though both might be received at the same time. Consider, for example, the idea of watching a movie online while receiving email at the same time. Port numbers keep your email from being displayed in your movie screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Session layer is responsible for passing data to the
Network layer at the lower bound and the Presentation layer at the upper bound.

True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A router operating at Layer 3 primarily makes its forwarding decisions based on what address?

A) Source IP address
B) Source MAC address
C) Destination IP address
D) Destination MAC address

A

C) Destination IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which term refers to your company’s data being stored on shared physical servers in the public cloud infrastructure?

A) Automation
B) Multi-tenancy
C) Orchestration
D) Infrastructure as code

A

B) Multi-tenancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which layer of the OSI reference model contains the MAC and LLC sublayers?

A) Network
B) Physical
C) Transport
D) Data Link

A

D) Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the network address of the host with an IP address of 192.168.68.210 with a subnet mask of 255.255.255.128?

A

192.168.68.128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a device directly used by an end user to access a network?

A) Server
B) Router
C) LAN
D) Client

A

D) Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A router has 2 Gigabit and 2 serial interfaces. How many broadcast domains does the router have?

A) 4
B) None
C) 2
D) 1

A

A) 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the length in term of number of bits of IPv6 address, MAC address and IPv4 address?

A

IPv6 is 128 bits
MAC is 48 bits
IPv4 is 32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network interface card has a MAC address of 00-00-86-15-7A-41. From this information, specify the OUI.

A) The OUI is 00-00-86
B) The OUI is 86-00-00
C) There is not sufficient information to specify the OUI.
D) The OUI is 15-7A-41.

A

A) The OUI is 00-00-86

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have an IP address with a prefix notation of /27. What is the dotted-decimal form of the subnet mask?

A) 255.255.255.128
B) 255.255.255.0
C) 255.255.255.224
D) 255.255.255.192

A

C) 255.255.255.224

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name the layers of the TCP/IP protocol stack (in order from top to bottom).

A

Application
Transport
Internet
Network Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of network is based on network clients sharing resources with one another?

A) Client/server
B) Peer-to-peer
C) Client-peer
D) Peer-to-server

A

B) Peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A bridge does not forward broadcast traffic.

False
or
True

A

False

Segments on different bridge ports are in separate collision domains but the same broadcast domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In terms of computer security, a switch offers better security than a hub. Why is this?

A) The use of the switch guarantees that all devices connected to it will share link integrity pulses. This sharing of the pulses strengthens the security of the connection.

B) A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible.

C) A hub requires a special pin to activate the connection.

D)A switch forwards the data it receives to every device connected to the switch. It is possible for network devices to pick up data intended for a different device. A hub eliminates this by only forwarding data packets to the correct device whenever possible.

A

B) A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which protocol supports a secure connection to a remote host via terminal emulation software?

A) SFTP
B) SSH
C) Telnet
D) FTP

A

B) SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What component performs signal amplification to extend the maximum allowable distance for a media type?

A

Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What type of “as a service” model features a powerful cloud environment targeted at developers who need to test and deploy updates to their applications?

A) IaaS
B) SaaS
C) DaaS
D) PaaS

A

D) PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following physical LAN topologies requires the most cabling?

A) WLAN
B) Ring
C) Bus
D) Star

A

D) Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What type of cloud deployment model features many customers consuming resources from a single provider?

A) Hybrid
B) Public
C) Community
D) Private

A

B) Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Differentiate switching from routing

A

Switching is forwarding frames to the destination device based on Layer 2 MAC addresses.
Routing is forwarding packets based on Layer 3 logical network addresses

27
Q

Which of the following is an example of an east-west traffic flow in a modern datacenter?

A) The downloading of a large number of archive files from a SAN
B) A client requesting email from a datacenter SaaS email solution
C) A client uploading large numbers of archive files for storage
D) A container requesting services provided by another container in the solution

A

D) A container requesting services provided by another container in the solution

28
Q

The three packets exchanged between two hosts when establishing a TCP connection in the correct order are SYN, ACK, SYN ACK.

False
or
True

A

False

29
Q

Which OSI layer packages bits of data from the Physical layer into frames?

A

Data Link Layer
Layer 2

30
Q

Describe Collision and Broadcast domains.

A

Collision domain
A collision domain is part of a network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment.

Broadcast domain
A broadcast domain is a domain in which a broadcast is forwarded. A broadcast domain contains all devices that can reach each other at the data link layer (OSI layer 2) by using broadcast.

31
Q

Which layer of the three-tiered model is most likely to feature large amounts of security and load balancing and is also often responsible for setting policy?

A) Core
B) Workstation
C) Distribution/aggregation
D) Access/edge

A

C) Distribution/aggregation

32
Q

What is the advantage of having a DHCP server in a TCP/IP network?

A

It simplifies the configuration of TCP/IP on the client computers and reduces the chance of errors.

33
Q

Described the difference between half and full duplex.

A

In half duplex mode, the signal is sent in both directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same time

34
Q

What is the binary version of 172.16.200.78?

A

10101100.‬‭00010000‬.‭11001000.‬‭01001110‬

35
Q

Which OSI layer combines messages or segments into packets?

A) Data Link
B) Physical
C) Transport
D) Network

A

D) Network

36
Q

List four differences between TCP and UDP.

A

TCP is connection-oriented, reliable, has segment sequencing, acknowledge sequencing and slower.
UDP is connectionless, unreliable, no sequencing, no acknowledgement and faster

37
Q

At which OSI layer is the concept of a port number introduced?

A

Transport Layer
Layer 4

38
Q

The binary number 10110100 has what decimal equivalent?

A) 114
B) 172
C) 190
D) 180

A

D) 180

39
Q

HTTP functions at which layer of the OSI model?

A) Layer 6
B) Layer 4
C) Layer 7
D) Layer 5

A

C) Layer 7

40
Q

A multicast is characterized by which of the following? (Choose two)

A) It is used when messages are sent to a specific group of networking devices

B) It uses Class C addressing

C) None of these answers are correct

D) It uses Class D addressing.

A

A) It is used when messages are sent to a specific group of networking devices

D) It uses Class D addressing.

41
Q

Which OSI layer handles the concept of logical addressing?

A) Physical Layer

B) Data Link Layer

C) Transport Layer

D) Network Layer

A

D) Network Layer

42
Q

Which of the following categories of UTP cabling are commonly used for 1000BASE-T networks? (Choose two.)

A) Cat 5e

B) Cat 6f

C) Cat 6

D) Cat 5

A

A) Cat 5e
C) Cat 6

43
Q

What convergence technology seeks to unify the SAN and the LAN?

A) iSCSI

B) FCoE

C) Fibre Channel

D) IB

A

B) FCoE

44
Q

An Ethernet system operating at 100Mbps defines which of the following?

A) None of these answers are correct
B) Fast Ethernet
C) Gigabit Ethernet
D) Link Ethernet
E) AUI Ethernet

A

B) Fast Ethernet

45
Q

TCP functions at which layer of the OSI model?

A) Layer 7
B) Layer 2
C) Layer 3
D) Layer 5
E) Layer 4

A

E) Layer 4

46
Q

What is the first DHCP message sent by a client attempting to obtain IP address information from a DHCP server?

A) DHCPREQUEST
B) DHCPDISCOVER
C) DHCPOFFER
D) DHCPACK

A

B) DHCPDISCOVER

47
Q

What is the command to display the status of the interfaces on the switch? Indicate the command prompt.

A

switch# show ip interfaces brief

48
Q

Explain the basic command ping -t www.cisco.com in relation to Internet Control Message Protocol.

A

Ping is a basic tool to verify if a host is live or not. The ping program in the source host sends packet (echo request) to the target IP address; if the target is live, the ping program in the target host responds by sending a packet back (echo reply) to the source host. Both of these ping packets are ICMP packets and –t means to keep pinging the host until stopped (Ctrl-C)

49
Q

PC1 with an IP address of 10.1.2.3 sends a packet to PC2 with an IP address of 192.168.1.2. What type of data flow does this represent?

A) anycast
B) broadcast
C) unicast
D) multicast

A

C) unicast

50
Q

The admin has connected the switch’s F0/1 to the router’s G0/0. Router’s G0/0 is 156.59.50.1. He needs to set up the management IP of the switch. What are the sequence of commands to assign an IPv4 address and subnet mask of 156.59.50.2/24 to VLAN 1? He needs to include short description and enable the interface and add the default gateway. Indicate the command prompt where to run each command.

A

Switch(config)# interface vlan 1
Switch(config-if)# description Connection to Router
Switch(config-if)# ip address 156.59.50.2 255.255.255.0
Switch(config-if)# no shutdown
Switch(config-if)#exit
Switch(config)#ip default-gateway 156.59.50.1

51
Q

Why is the subnet mask important in determining the network address?

A

The subnet mask provides the number of bits to use for the network portion of an address. The network address cannot be determined without it.

52
Q

Convert the binary ‭11010001.‬‭10100101‬.‭11001000‬.‭11101110‬ into dotted-decimal format.

A

209.165.200.238

53
Q

What is the command to save the running configuration to NVRAM?

A

copy running-config startup-config

54
Q

Write down the sequence of CLI commands to initialise and reload a switch. Indicate the command prompt

A

Switch>enable
Switch#show flash
Switch#delete vlan.dat
Switch#erase startup-config
Switch#reload

55
Q

How ARP works?

A

ARP is Address Resolution Protocol.
When you try to ping an IP address on your local network, say 192.168.1.1, your system has to map the IP address 192.168.1.1 to a MAC address. This involves using ARP to resolve the address.

Systems keep an ARP cache where they store information about what IP addresses are associated with what MAC addresses. When trying to send a packet to an IP address, the system will first consult this cache to see if it already knows the MAC address. If there is a value cached, ARP is not used.

If the IP address is not found in the ARP table, the system will then send a broadcast packet to the network using the ARP protocol to ask “who has 192.168.1.1”. Because it is a broadcast packet, it is sent to a MAC address FF:FF:FF:FF:FF:FF that causes all machines on the network to receive it. Any machine with the requested IP address will reply with an ARP packet that says “I am 192.168.1.1”, and this includes the MAC address which can receive packets for that IP.

56
Q

There is a special range of addresses for systens that cannot obtain an IP address automatically from a DHCP server. These addresses are not routable on the network. What is the value in the first octet for these addresses?

A) 169
B) 10
C) 172
D) 192

A

A) 169

57
Q

What is the command to enable password checking in console and telnet?

A

login

58
Q

How can the following IPv6 address be condensed? 2018:0230:140F:0000:0000:000:000A:003B

A

2018:230:140F::A:3B

59
Q

PC-A is given an IP address of 192.168.1.18 and PC-B is given an IP address of 192.168.1.33. Both have a subnet mask of 255.255.255.240. Are they on the same network? Why? (justify your answer)

A

No, PC-A is in 192.168.1.16/28 network while PC-B is in 192.168.1.32/28

60
Q

What is the purpose of “ipv6 unicast-routing” command?

A

To enable the forwarding of IPv6 unicast datagrams

61
Q

What type of IPv6 address is 2003:DB8:1:1:22:A33D:259A:21FE

A

Global unicast

Global unicast starts with 2000::/3

62
Q

What is the command to encrypt all text passwords displayed in the configuration?

A

service password-encryption

63
Q

What is the command to display the system image file of a router?

A

show version or show flash

64
Q

What is the command to configure the router’s interface with IPv6 address of 2002:ABCD:9876::1/64 using the EUI-64 method?

A

ipv6 address 2002:ABCD:9876::/64 eui-64