Introduction to Networks Flashcards

1
Q

What is a characteristic of a fault tolerant network?

A

A network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transaction. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

A

Audio conference, financial transactions, web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a benefit of using cloud computing in networking?

A

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of the shell in an OS?

A

It interfaces between the users and the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which connection provides a secure CLI session with encryption to a Cisco switch?

A

An SSH connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?

A

The command is being entered from the wrong mode of operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An administrator uses Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

A

To interrupt the ping process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?

Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)# enable password letmein
SW1(config)# enable secret secretin
SW1(config)# line console 0
SW1(config-line)# password lineconin
SW1(config-line)# login
SW1(config-line)# exit
SW1(config)# line vty 0 15
SW1(config-line)# password linevtyin
SW1(config-line)# login
SW1(config-line)# end
SW1#
A

lineconin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

A

VLAN 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an advantage to using a protocol that is defined by an open standard?

A

It encourages competition and promotes choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two benefits of using a layered network model?

A

It assists in protocol design, it prevents technology in one layer from affecting other layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two osi model layers have the same functionality as two layers of the TCP/IP model?

A

Network, transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which name is assigned to the transport layer PDU?

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower that the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

A

The amount of traffic that is currently crossing the network, the type of traffic that is crossing the network, the latency that is created by the number of network devices that the data is crossing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

A

Physical layer

17
Q

Which type of UTP cable is used to connect a pc to a switch port?

A

Straight-through

18
Q

A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

A

The amount of traffic that is currently crossing the network, the type of traffic that is crossing the network, the latency that is created by the number of network devices that the data is crossing

19
Q

What is a characteristic of UTP cabling?

A

Cancellation

20
Q

What are two characteristics of fiber-optic cable? (Choose two.)

A

It is not affected by EMI or RFI, it is more expensive than UTP cable is

21
Q

What is a characteristic of the LLC sublayer?

A

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media

22
Q

A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

A

Partial mesh

23
Q

What method is used to manage contention-based access on a wireless network?

A

CSMA/CA

24
Q

What are three primary functions provided by Layer 2 data encapsulation? (Choose three.)

A

Data link layer addressing, detection of errors through CRC calculations, delimiting group of bits into frames

25
Q

What will a host of an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

A

It will discard the frame

26
Q

What are two examples of the cut-through switching method? (Choose two.)

A

Fast-forward switching, fragment free switching

27
Q

What are two actions performed by a Cisco switch? (Choose two.)

A

Using the source MAC addresses of frames to build and maintain a MAC address table, utilizing the MAC address table to forward frames via the destination MAC address

28
Q

Which frames forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

A

Store-and forward switching