Module 5 Quiz Flashcards
What is the maximum number of MAC addresses allowed on fa0/1?
Select one:
a.2
b.0
c.3
d.1
State whether the following is true or false:
The data link layer is responsible for framing and local physical addressing. The network layer takes on the responsibility of routing traffic and logical addressing.
Select one:
True
False
The data link layer is responsible for framing and local physical addressing. The network layer takes on the responsibility of routing traffic and logical addressing. It is responsible for encapsulating packets of information and sending it across the network. The main protocol in use on the network layer is IP. This protocol is deemed to be unreliable and performs best-effort delivery. It is deemed unreliable because it does not perform any checking to determine whether the destination host is available to receive traffic and it has no built-in mechanism for ensuring delivery of packets and resending them should delivery fail.
The correct answer is ‘True’.
What would the port number 500 be classified as?
Select one:
a.
Dynamic or private port
b.
Well-known port
c.
Registered port
Port numbers generally fall into the following ranges:
Well-known ports (0 – 1023): These are port numbers used by well-known system processes such as the File Transfer Protocol (FTP). They are usually used as destination ports by clients.
Registered ports (1024 – 49151): The Internet Assigned Numbers Authority (IANA) may assign these ports to organizations for use with their applications, e.g. certain Microsoft products always use specific ports. It is not illegal for these ports to be used for other purposes, but it might yield unexpected results since some applications expect these port numbers to be available.
Dynamic or private ports (49152 - 65535): These port numbers are completely open for use. They are usually dynamically allocated as source ports during communication.
Match the protocol with its port number.
Telnet
23
DNS
53
FTP
21
SMTP
25
Port number
Protocol
Application
20
TCP
FTP data
21
TCP
FTP control
22
TCP
SSH
23
TCP
Telnet
25
TCP
SMTP
53
UDP, TCP
DNS
67
UDP
DHCP Server
68
UDP
DHCP Client
69
UDP
TFTP
80
TCP
HTTP (WWW)
110
TCP
POP3
161
UDP
SNMP
443
TCP
SSL
514
UDP
Syslog
Which command(s) are required to assign the router the hostname of Bergen?
Router (config)# ________ _________
Router (config)# hostname Bergen
hostname name Bergen Router host Oslo
The task of configuring the Cisco device would probably fall to a network administrator. At any given time, the administrator may have the task of working on multiple devices at a time and switching between them on the same screen. This may be very confusing if all the devices have the same names, e.g. Router or Switch. Therefore, one of the first configuration tasks to perform on any new device is to give the device a new hostname. That is accomplished via a command from the global configuration mode, which has the following format:
Router (config)#hostname <the></the>
________ protocols do not require a connection termination phase. ________ protocols require an initial connection setup phase before data transfer can begin.
Connectionless protocols do not require a connection termination phase. Connection‑oriented protocols require an initial connection setup phase before data transfer can begin.
Which command would result in the following output?
Select one:
a.show interface
b.show interface brief
c.show ip route
d.show ip interface
e. show ip interface brief
Given the following image:
Which of the following statements regarding the image are true?
Select one:
a.Both IP addresses have /30 masks.
b.OSLO is the DTE.
c.The configuration will not work.
d.The no shutdown commands have turned the interfaces off.
Company EZ Net uses RIP as its dynamic routing protocol. What should be configured to provide a backup route for the routes created by RIP?
Select one:
a.static route
b.default gateway
c.floating static route
d.dynamic route
A static route has a default administrative distance of 1. That makes it impossible for a static route to serve as the backup route to anything except a directly connected network, since the route with the lowest administrative distance to any destination is always the one installed in the routing table.
To facilitate this functionality, it is possible to configure both an IPv4 and IPv6 static route with an alternate administrative distance. The administrative distance chosen should be higher than the target administrative distance, e.g. if the static route has to serve as a backup to the dynamic routing protocol RIP, which has an administrative distance of 120, the static route needs to have an administrative distance assigned of at least 121. If the RIP routing process fails, the floating static route would automatically become the route with the next lowest administrative route and be installed in the routing table, thereby acting as a backup route to RIP.
The syntax for declaring a floating IPv4 static route is as follows:
Router (config)#ip route <network> <subnet> <exit> <1-255>
or
Router (config)#ip route <network> <subnet> <next> <1-255></next></subnet></network></exit></subnet></network>
Which command(s) should be used to set a password that needs to be entered for a user to establish a console session? The password should be set to Noroff.
Oslo (config)# line console 0
Oslo (config-line)# password Noroff
Oslo (config-line)# login
Oslo (config)# line console 0
Oslo (config-line)# password Noroff
Oslo (config-line)# login
A router has been booted up and shows the following message:
Would you like to enter the initial configuration dialog? [yes/no]:
What does this mean?
a.
The start-up configuration file was not found in NVRAM.
b.
The running-config file was not found in NVRAM.
c.
A new interface has been added.
The TCP process of connection establishment does not include:
Select one:
a.
Assigning IP addresses
b.
Initializing Acknowledgement fields
c.
Agreeing on port numbers
d.
Initializing Sequence fields
The TCP process of connection establishments includes
- Initializing Sequence fields
- Initializing Acknowledgement fields
- Agreeing on port numbers
Which command(s) should be issued to move to privileged EXEC mode?
Oslo> enable
configure disable end terminal
Oslo> enable
configure, disable, end, terminal
The next command mode, after user EXEC mode, is called privileged EXEC mode or the enable mode. It is called the enable mode because of the command that a user must enter in order to access the privileged mode:
Router>enable
Once entered, the device’s prompt will change to the following:
Router#
This mode is referred to as the privileged mode because more powerful commands may be executed in this mode. It may be recognised by the # at the end of the prompt. As noted, commands at this level are a bit more powerful and may be used to disrupt device operations, but none of the commands at this level are able to change the device’s configuration. To return to user Exec mode, the user may enter the command:
Router#disable
____ sends a message from a client computer to a mail server or between mail servers. ____ delivers a message from a recipient’s mail server to the recipient’s email client.
Message transfer agent Message access agent Message text agent
Message transfer agent sends a message from a client computer to a mail server or between mail servers. Message access agent delivers a message from a recipient’s mail server to the recipient’s email client.
Browsing the web is just one of the basic activities performed via the application layer. Another such activity is sending and receiving email. To send email requires two things:
- Message transfer agent (MTA): Transfers a message from a client computer to a mail server or between mail servers. The Simple Mail Transfer Protocol (serves) this purpose.
- Message access agent (MAA) or message delivery agent (MDA): The message access (or delivery, depending on which resource you consult) agent delivers a message from a recipient’s mail server to the recipient’s email client. This purpose may be served by the Post Office Protocol (POP3) or Internet Mail Access Protocol (IMAP).
Which command(s) are used to set a password for accessing the privileged EXEC mode? This password should be shown in plain text in the running-config file. The password should be Noroff.
Oslo (config)# enable password Noroff
Oslo (config)# enable password Noroff
Once a user has access to the user EXEC mode, the next step would be to access the privileged EXEC mode. If a user has access to privileged EXEC mode, they are able to see many more configuration details than on the user EXEC mode. It makes sense, therefore, to attempt to block a user from accessing this mode needlessly. To do so, there are two commands a user may issue.They are as follows:
Router (config)#enable password <password>
Router (config)#enable secret <password></password></password>
To the user, these passwords would have the exact same effect. The router or switch will request a password once the user attempts to move to the privileged mode.The password created with the password command is shown in plain text, whereas the password created with the secret command is encrypted.