Intro to Networking Flashcards

Pass Pass

1
Q

_____ provides a secure CLI session with encryption to Cisco Switch.

A

An SSH connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network tech is attempting to configure an interface. He enters the command : SanJose(config)# ip address 192.169.2.1 255.255.255.0 . Why is the command rejected by the device?

A

The command is being entered from the wrong mode of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On which switch interface would an adminstrator configure an IP address so that the switch can be managed remotely?

A

VLAN 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol is respondisble for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which name is assigned to the transport layer PDU?

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database app. The engineer notices the network throughput appearing lower than the bandwidth expected. Which three factors would influence the differences in throughput? (Answers Three)

A
  • The amount of traffic that is currently crossing the network.
  • The type of traffic that is crossing the network.
  • The latency that is created by the number of network devices that the data is corssing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a characteristic of the LLC sublayer?

A

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What method is used to manage contention-based access on a wireless network?

A

-CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three primary functions provided by Layer 2 data encapsulation? Choose three.

A
  • Data link layer addressing
  • Detection of errors through CRC calculations
  • Delimiting groups of bits into frames
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

A

It will discard the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

A

Store - and - Forward switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What addresses are mapped by the ARP?

A

Destination MAC address to a Destination IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What information is added during encapsulation at OSI Layer 3?

A

Source and Destination ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two services provided by the OSI network layer? Choose two

A
  • Routing packets towards the destination
  • Encapsulating PDUs from the transport layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three characteristics of multicast transmission?

A
  • A single packet can be sent to a group of hosts.
  • Multicast transmission can be used by routers to exchange routing information.
  • Routers will not forward multicast addresses in the range from 224.0.0.0 to 224.0.0.255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three ranges of IP addresses that are reserved for internal private use?

A
  • 10.0.0.0 /8
  • 172.16.0.0 /12
  • 192.168.0.0 /16
17
Q

What purpose does NAT64 serve in IPv6?

A

It converts IPv6 packets into IPv4 packets.

18
Q

Which three addresses are valid public addresses?

A
  • 198.133.219.17
  • 128.107.12.117
  • 64.104.78.227