From REM1 Flashcards

1
Q

Convert decimal 239 to Hex.

A

EF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The broadcast MAC address (in hex notation) is:

A

FF:FF:FF:FF:FF:FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the range for Class B private IP addresses?

A

172.16.0.0 to 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Ethernet, a ____ is an alternating 1,0 pattern that provides a 5MHz clock at the start of each packet, which allows the receiving devices to lock the incoming bit stream.

A

Preamble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the protocol number for L2TP?

A

115

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enter the last valid host on the network that the host 10.90.42.113 255.255.240.0 is a part of.

A

10.90.47.254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Numbers below 1024 are considered well-known port numbers and are defined in RFC _____.

A

1700

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Routers can use _____ lists, created by an administrator, to control security on the types of packets that are allowed to enter or exit an interface.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In computer networking, a ________ is a type of group communication where data transmission is addressed to a group of destination computers simultaneously.

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Routers, by default, break up _______ domains.

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TFTP is a simple protocol for transferring files, implemented on top of the UDP/IP protocols using well-known port number ________.

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The configuration register value to turn on bit 6 in Cisco routers is ________.

A

0x2142

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Enter the first valid host on the network that the host 10.163.190.190/28 is a part of.

A

10.163.190.177

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During router boot up, if a startup-config file is in NVRAM, the router will copy this file and place it in RAM and call it the ________ file.

A

Running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In Ethernet, the packet sent down to the Data Link layer from the Network layer, the size can vary from ________ bytes to ________ bytes.

A

64, 1518

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Breaking up the subnet into subnets with different subnet masks is ________, a computer networking technology.

A

Variable Length Subnet Masking (VLSM)

17
Q

A company would like to configure new switches on the network for employees to have a change in IP network information. What port number would you configure to allow new feeds to pass through?

A

Port 67

18
Q

When the router is turned on, this is used to save the running configuration file.

A

NVRAM

19
Q

he third way to connect to a Cisco router is in-band, through the program ________.

A

Telnet

20
Q

RFC ________ is an annex to ICMP, which affords hosts extended capability in discovering routes to gateways.

A

1256

21
Q

Enter the broadcast address for the network 10.152.64.0/255.255.248.0.

A

10.152.71.255

22
Q

The address used by applications and hosts to send information to all nodes on a network is called the ________ address.
- Answer: Broadcast

A

Broadcast

23
Q

________ is a set of technologies that work on a network to guarantee its ability to dependably run high-priority applications and traffic under limited network capacity.

A

Quality of Service (QoS)

24
Q

A routing ________ is a unit calculated by a routing algorithm for selecting or rejecting a routing path for transferring data/traffic.

A

Metric

25
Q

Access to the IOS command line is called an ________ session.

A

EXEC

26
Q

A ________ is the basic, indispensable part of an operating system that allocates resources and manages things such as low-level hardware interfaces and security.

A

Kernel

27
Q

Most widely implemented Fast Ethernet standard. Uses Cat 5 UTP cable or STP cabling. 100 Mbps transmission with total segment length of 100 meters.

A

100BASE-TX

28
Q

________ is the field at the end of the frame that’s used to store the CRC.

A

Frame Check Sequence (FCS)

29
Q

The router uses something called a serial interface for WAN connections, specifically, a ________ physical interface on a Cisco router.

A

Serial

30
Q

What is CIDR notation used for in networking?

A

To define the subnet mask

31
Q
A