Module Quizzes | Netacad Flashcards

Covers Chapter 1 to Chapter 10

1
Q

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

DoS attack​

Identity theft

Spyware

Zero-day attack

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Internet

Intranet

Extranet

Extendednet

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

Cloud computing

Online collaboration

Bring your own device

Video conferencing

A

Bring your own device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an ISP?

It is a standards body that develops cabling and wiring standards for networking.

It is a protocol that establishes how computers within a local network communicate.

It is an organization that enables individuals and businesses to connect to the Internet.

It is a networking device that combines the functionality of several different networking devices in one.

A

It is an organization that enables individuals and businesses to connect to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In which scenario would the use of a WISP be recommended?

An Internet cafe in a city

A farm in a rural area without wired broadband access

Any home with multiple wireless devices

An apartment in a building with cable access to the Internet

A

A farm in a rural area without wired broadband access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

Reliability

Scalability

Quality of service

Accessibility

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

Quality of service (QoS)

Scalability

Security

Fault tolerance

Integrity

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two characteristics of a scalable network? (Choose two.)

Easily overloaded with increased traffic

Grows in size without impacting existing users

Is not as reliable as a small network

Suitable for modular devices that allow for expansion

Offers limited number of applications

A

Grows in size without impacting existing users
Suitable for modular devices that allow for expansion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which device performs the function of determining the path that messages should take through internetworks?

A router

A firewall

A web server

A DSL modem

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

DSL

Cellular

Satellite

Dialup

Dedicated leased line

A

Cellular
Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of network must a home user access in order to do online shopping?

An intranet

The Internet

An extranet

A local area network

A

The Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does BYOD change the way in which businesses implement networks?​

BYOD requires organizations to purchase laptops rather than desktops.

BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.

BYOD devices are more expensive than devices that are purchased by an organization.

BYOD provides flexibility in where and how users can access network resources.

A

BYOD provides flexibility in where and how users can access network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

ACL

IPS

VPN

BYOD

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Internet?

It is a network based on Ethernet technology.

It provides network access for mobile devices.

It provides connections through interconnected global networks.

It is a private network for an organization with LAN and WAN connections.

A

It provides connections through interconnected global networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two functions of end devices on a network? (Choose two.)

They originate the data that flows through the network.

They direct data over alternate paths in the event of link failures.

They filter the flow of data to enhance security.

They are the interface between humans and the communication network.

They provide the channel over which the network message travels.

A

They originate the data that flows through the network.
They are the interface between humans and the communication network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

It is stored in NVRAM.

It should be deleted using the erase running-config command.

It is automatically saved when the router reboots.

A

It affects the operation of the device immediately when modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which two statements are true regarding the user EXEC mode? (Choose two.)

All router commands are available.

Global configuration mode can be accessed by entering the enable command.

The device prompt for this mode ends with the ‘>’ symbol.

Interfaces and routing protocols can be configured.

Only some aspects of the router configuration can be viewed.

A

The device prompt for this mode ends with the ‘>’ symbol.
Only some aspects of the router configuration can be viewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of access is secured on a Cisco router or switch with the enable secret command?

Virtual terminal

Privileged EXEC

AUX port

Console line

A

Privileged EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the default SVI on a Cisco switch?

VLAN1

VLAN99

VLAN100

VLAN999

A

VLAN1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

The hostname should be fewer than 64 characters in length

The hostname should be written in all lower case characters

The hostname should contain no spaces

The hostname should end with a special character

The hostname should begin with a letter

A

-The hostname should be fewer than 64 characters in length
-The hostname should contain no spaces
-The hostname should begin with a letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the function of the shell in an OS?

It interacts with the device hardware.

It interfaces between the users and the kernel.

It provides dedicated firewall services.

It provides the intrusion protection services for the device.

A

It interfaces between the users and the kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

Global configuration mode

Setup mode

Privileged EXEC mode

User EXEC mode

A

User EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Copy the running configuration to the startup configuration file.

Copy the information in the startup configuration file to the running configuration.

Reload the device and type yes when prompted to save the configuration.

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

A

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which memory location on a Cisco router or switch will lose all content when the device is restarted?

ROM

Flash

NVRAM

RAM

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why would a technician enter the command copy startup-config running-config?

To remove all configurations from the switch

To save an active configuration to NVRAM

To copy an existing configuration into RAM

To make a changed configuration the new startup configuration

A

To copy an existing configuration into RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which functionality is provided by DHCP?

Automatic assignment of an IP address to each host

Remote switch management

Translation of IP addresses to domain names

End-to-end connectivity test

A

Automatic assignment of an IP address to each host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

Providing an error message when a wrong command is submitted

Displaying a list of all available commands within the current mode

Allowing the user to complete the remainder of an abbreviated command with the TAB key

Determining which option, keyword, or argument is available for the entered command

Selecting the best command to accomplish a task

A

-Displaying a list of all available commands within the current mode
-Determining which option, keyword, or argument is available for the entered command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which memory location on a Cisco router or switch stores the startup configuration file?

RAM

ROM

NVRAM

Flash

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

10.1.0.0

10.0.0.0

10.1.100.32

10.1.100.0

A

10.1.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which three acronyms/initialisms represent standards organizations? (Choose three.)

a. IANA
b. TCP/IP
c. IEEE
d. IETF
e. OSI
f. MAC

A

a. IANA
c. IEEE
d. IETF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What type of communication will send a message to all devices on a local area network?

a. Broadcast
b. Multicast
c. Unicast
d. Allcast

A

a. Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In computer communication, what is the purpose of message encoding?

a. To convert information to the appropriate form for transmission
b. To interpret information
c. To break large messages into smaller frames
d. To negotiate correct timing for successful communication

A

a. To convert information to the appropriate form for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which message delivery option is used when all devices need to receive the same message simultaneously?

a. Duplex
b. Unicast
c. Multicast
d. Broadcast

A

d. Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are two benefits of using a layered network model? (Choose two.)

a. It assists in protocol design.
b. It speeds up packet delivery.
c. It prevents designers from creating their own model.
d. It prevents technology in one layer from affecting other layers.
e. It ensures a device at one layer can function at the next higher layer.

A

a. It assists in protocol design.
d. It prevents technology in one layer from affecting other layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the purpose of protocols in data communications?

a. Specifying the bandwidth of the channel or medium for each type of communication
b. Specifying the device operating systems that will support the communication
c. Providing the rules required for a specific type of communication to occur
d. Dictating the content of the message sent during communication

A

c. Providing the rules required for a specific type of communication to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which logical address is used for delivery of data to a remote network?

a. Destination MAC address
b. Destination IP address
c. Destination port number
d. Source MAC address
e. Source IP address

A

b. Destination IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the general term that is used to describe a piece of data at any layer of a networking model?

Frame

Packet

Protocol data unit

Segment

A

Protocol data unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which two protocols function at the internet layer? (Choose two.)

POP

BOOTP

ICMP

IP

PPP

A

ICMP
IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

a. Application
b. Presentation
c. Session
d. Transport
e. Network

A

d. Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which type of communication will send a message to a group of host destinations simultaneously?

a. Broadcast
b. Multicast
c. Unicast
d. Anycast

A

b. Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What process is used to receive transmitted data and convert it into a readable message?

Access control

Decoding

Encapsulation

Flow control

A

Decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is done to an IP packet before it is transmitted over the physical medium?

a. It is tagged with information guaranteeing reliable delivery.
b. It is segmented into smaller individual pieces.
c. It is encapsulated into a TCP segment.
d. It is encapsulated in a Layer 2 frame.

A

d. It is encapsulated in a Layer 2 frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What process is used to place one message inside another message for transfer from the source to the destination?

Access control

Decoding

Encapsulation

Flow control

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

a. HTTP, IP, TCP, Ethernet
b. HTTP, TCP, IP, Ethernet
c. Ethernet, TCP, IP, HTTP
d. Ethernet, IP, TCP, HTTP

A

b. HTTP, TCP, IP, Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What three requirements are defined by the protocols used in network communications to allow message transmission across a network? (Choose three.)

a. connector specifications
b. message encoding
c. media selection
d. message size
e. delivery options
f. end-device installation

A

b. message encoding
d. message size
e. delivery options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What type of delivery uses data link layer addresses?

a. remote delivery
b. local and remote delivery
c. local delivery
d. remote delivery using routers

A

c. local delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What layer of the TCP/IP protocol model determines the best path through the network?

application
transport
internet
network access

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

a. Presentation layer
b. Network layer
c. Physical layer
d. Data link layer

A

c. Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What type of cable is used to connect a workstation serial port to a Cisco router console port?

Crossover

Rollover

Straight-through

Coaxial

A

Rollover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Why are two strands of fiber used for a single fiber optic connection?

a. The two strands allow the data to travel for longer distances without degrading.
b. They prevent crosstalk from causing interference on the connection.
c. They increase the speed at which the data can travel.
d. They allow for full-duplex connectivity.

A

d. They allow for full-duplex connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which procedure is used to reduce the effect of crosstalk in copper cables?

Requiring proper grounding connections

Twisting opposing circuit wire pairs together

Wrapping the bundle of wires with metallic shielding

Designing a cable infrastructure to avoid crosstalk interference

Avoiding sharp bends during installation

A

Twisting opposing circuit wire pairs together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is one advantage of using fiber optic cabling rather than copper cabling?

a. It is usually cheaper than copper cabling.
b. It is able to be installed around sharp bends.
c. It is easier to terminate and install than copper cabling.
d. It is able to carry signals much farther than copper cabling.

A

d. It is able to carry signals much farther than copper cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

a. The end-user device only has an Ethernet NIC.
b. The end-user device requires a dedicated connection because of performance requirements.
c. The end-user device needs mobility when connecting to the network.
d. The end-user device area has a high concentration of RFI.

A

c. The end-user device needs mobility when connecting to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which type of UTP cable is used to connect a PC to a switch port?

a. Console
b. Rollover
c. Crossover
d. Straight-through

A

d. Straight-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the definition of bandwidth?

a. The speed of bits across the media over a given period of time
b. The speed at which bits travel on the network
c. The amount of data that can flow from one place to another in a given amount of time
d. The measure of usable data transferred over a given period of time

A

c. The amount of data that can flow from one place to another in a given amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which statement correctly describes frame encoding?

a. It uses the characteristic of one wave to modify another wave.
b. It transmits data signals along with a clock signal which occurs at evenly spaced time durations.
c. It generates the electrical, optical, or wireless signals that represent the binary numbers of the frame.
d. It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.

A

d. It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a characteristic of UTP cabling?

a. Cancellation
b. Cladding
c. Immunity to electrical hazards
d. Woven copper braid or metallic foil

A

a. Cancellation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion?

The microwave oven

The large number of trees that surround the office

The elevated location where the wireless LAN was installed

The number of wireless devices that are used in the wireless LAN

A

The microwave oven

another answer: the cellular phones that are used by the employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the purpose of the OSI physical layer?

a. Controlling access to media
b. Transmitting bits across the local media
c. Performing error detection on received frames
d. Exchanging frames between nodes over physical network media

A

b. Transmitting bits across the local media

60
Q

Which characteristic describes crosstalk?

a. The distortion of the network signal from fluorescent lighting
b. The distortion of the transmitted messages from signals carried in adjacent wires
c. The weakening of the network signal over long cable lengths
d. The loss of wireless signal over excessive distance from the access point

A

b. The distortion of the transmitted messages from signals carried in adjacent wires

61
Q

What is indicated by the term throughput?

a. The guaranteed data transfer rate offered by an ISP
b. The capacity of a particular medium to carry data
c. The measure of the usable data transferred across the media
d. The measure of the bits transferred across the media over a given period of time
e. The time it takes for a message to get from sender to receiver

A

d. The measure of the bits transferred across the media over a given period of time

62
Q

Which standards organization oversees development of wireless LAN standards?

IANA

IEEE

ISO

TIA

A

IEEE

63
Q

What is the binary representation for the decimal number 173?

10100111

10100101

10101101

10110101

A

10101101

64
Q

Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format?

234.17.10.9

234.16.12.10

236.17.12.6

236.17.12.10

A

236.17.12.10

65
Q

How many binary bits exist within an IPv6 address?

32

48

64

128

256

A

128

66
Q

What is the binary equivalent of the decimal number 232?

11101000

11000110

10011000

11110010

A

11101000

67
Q

Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)

IPv6 addresses are represented by hexadecimal numbers.

IPv4 addresses are represented by hexadecimal numbers.

IPv6 addresses are 32 bits in length.

IPv4 addresses are 32 bits in length.

IPv4 addresses are 128 bits in length.

IPv6 addresses are 64 bits in length.

A

-IPv6 addresses are represented by hexadecimal numbers.
-IPv4 addresses are 32 bits in length

68
Q

Which IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14?

Binary

Dotted decimal

Hexadecimal

ASCII

A

Dotted decimal

69
Q

What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?

192.0.2.199

198.51.100.201

203.0.113.211

209.165.201.223

A

203.0.113.211

70
Q

What is the decimal equivalent of the binary number 10010101?

149

157

168

192

A

149

71
Q

What is the decimal equivalent of the hex number 0x3F?

63

77

87

93

A

63

72
Q

What is the dotted decimal representation of the IPv4 address which is represented as the binary string 00001010.01100100.00010101.00000001?

10.100.21.1

10.10.20.1

100.10.11.1

100.21.10.1

A

10.100.21.1

73
Q

What is the decimal equivalent of 0xC9?

185

200

201

199

A

201

74
Q

Which is a valid hexadecimal number?

F

G

H

J

A

F

75
Q

What is the binary representation of 0xCA?

10111010

11010101

11001010

11011010

A

11001010

76
Q

How many bits are in an IPv4 address?

32

64

128

256

A

32

77
Q

Which statement describes a characteristic of the frame header fields of the data link layer?

a. They all include the flow control and logical connection fields.
b. Ethernet frame header fields contain Layer 3 source and destination addresses.
c. They vary depending on protocols.
d. They include information on user applications.

A

c. They vary depending on protocols.

78
Q

Which two factors influence the method that is used for media access control? (Choose two.)

a. How data is generated by end devices applications
b. How the connection between nodes appears to the data link layer
c. How signals are encoded by the NICs on end devices
d. How nodes share the media
e. How the IP protocol forwards the packet to the destination

A

b. How the connection between nodes appears to the data link layer
d. How nodes share the media

79
Q

What is a characteristic of a WAN hub-and-spoke topology?

a. It requires that some of the branch sites be interconnected through point-to-point links.
b. It requires that every site be interconnected to each other through point-to-point links.
c. All sites require a hub device that connects to a router.
d. The branch sites are connected to a central site through point-to-point links.

A

d. The branch sites are connected to a central site through point-to-point links.

80
Q

What identifier is used at the data link layer to uniquely identify an Ethernet device?

IP address

MAC address

Sequence number

TCP port number

UDP port number

A

MAC address

81
Q

What attribute of a NIC would place it at the data link layer of the OSI model?

Attached Ethernet cable

IP address

MAC address

RJ-45 port

TCP/IP protocol stack

A

MAC address

82
Q

Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)

Institute of Electrical and Electronics Engineers (IEEE)

Internet Assigned Numbers Authority (IANA)

International Telecommunication Union (ITU)

Electronic Industries Alliance (EIA)

Internet Society (ISOC)

A

Institute of Electrical and Electronics Engineers (IEEE)
International Telecommunication Union (ITU)

83
Q

What is true concerning physical and logical topologies?

a. The logical topology is always the same as the physical topology.
b. Physical topologies are concerned with how a network transfers frames.
c. Physical topologies display the IP addressing scheme of each network.
d. Logical topologies refer to how a network transfers data between devices.

A

d. Logical topologies refer to how a network transfers data between devices.

84
Q

What method is used to manage contention-based access on a wireless network?

CSMA/CD

Priority ordering

CSMA/CA

Token passing

A

CSMA/CA

85
Q

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

Bus

Hierarchical

Mesh

Ring

Star

A

Mesh

86
Q

Which statement describes the half-duplex mode of data transmission?

a. Data that is transmitted over the network can only flow in one direction.
b. Data that is transmitted over the network flows in one direction at a time.
c. Data that is transmitted over the network flows in one direction to many different destinations simultaneously.
d. Data that is transmitted over the network flows in both directions at the same time.

A

b. Data that is transmitted over the network flows in one direction at a time.

87
Q

Which is a function of the Logical Link Control (LLC) sublayer?

a. To define the media access processes that are performed by the hardware
b. To provide data link layer addressing
c. To identify which network layer protocol is being used
d. To accept segments and package them into data units that are called packets

A

c. To identify which network layer protocol is being used

88
Q

Which data link layer media access control method does Ethernet use with legacy Ethernet hubs?

CSMA/CD

Determinism

Turn taking

Token passing

A

CSMA/CD

89
Q

What are the two sublayers of the OSI model data link layer? (Choose two.)

Internet

Physical

LLC

Transport

MAC

Network access

A

LLC
MAC

90
Q

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

Application

Transport

Data link

Physical

A

Data link

91
Q

What type of physical topology can be created by connecting all Ethernet cables to a central device?

Bus

Ring

Star

Mesh

A

Star

92
Q

What are two services performed by the data link layer of the OSI model? (Choose two.)

It fragments data packets into the MTU size.

It determines the path to forward packets.

It accepts Layer 3 packets and encapsulates them into frames.

It provides media access control and performs error detection.

It monitors the Layer 2 communication by building a MAC address table.

A
  • It accepts Layer 3 packets and encapsulates them into frames.
  • It provides media access control and performs error detection.
93
Q

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?

The virtually unlimited availability of IPv6 addresses

The use of CSMA/CA

The use of full-duplex capable Layer 2 switches

The development of half-duplex switch operation

The use of Gigabit Ethernet speeds

A

The use of full-duplex capable Layer 2 switches

94
Q

Which two characteristics describe Ethernet technology? (Choose two.)

a. It is supported by IEEE 802.3 standards.
b. It is supported by IEEE 802.5 standards.
c. It typically uses an average of 16 Mbps for data transfer rates.
d. It uses unique MAC addresses to ensure that data is sent to the appropriate destination.
e. It uses a ring topology.

A

a. It is supported by IEEE 802.3 standards.
d. It uses unique MAC addresses to ensure that data is sent to the appropriate destination.

Another answer: It uses the CSMA/CD access control method.

95
Q

What statement describes a characteristic of MAC addresses?

They must be globally unique.

They are only routable within the private network.

They are added as part of a Layer 3 PDU.

They have a 32-bit binary value.

A

They must be globally unique.

96
Q

What is the special value assigned to the first 24 bits of a multicast MAC address transporting an IPv4 packet?

01-5E-00

FF-00-5E

FF-FF-FF

01-00-5E

A

01-00-5E

97
Q

What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address?

a. It will discard the frame.
b. It will forward the frame to the next host.
c. It will remove the frame from the media.
d. It will strip off the data-link frame to check the destination IP address.

A

a. It will discard the frame.

98
Q

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

Repeater

Hub

Switch

Router

A

Switch

99
Q

Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table?

Hub

Router

Switch

Modem

A

Switch

100
Q

Which function or operation is performed by the LLC sublayer?

It performs data encapsulation.

It communicates with upper protocol layers.

It is responsible for media access control.

It adds a header and trailer to a packet to form an OSI Layer 2 PDU.

A

It communicates with upper protocol layers.

101
Q

What happens to runt frames received by a Cisco Ethernet switch?

The frame is dropped.

The frame is returned to the originating network device.

The frame is broadcast to all other devices on the same network.

The frame is sent to the default gateway.

A

The frame is dropped.

102
Q

What addressing information is recorded by a switch to build its MAC address table?

The destination Layer 3 address of incoming packets

The destination Layer 2 address of outgoing frames

The source Layer 3 address of outgoing packets

The source Layer 2 address of incoming frames

A

The source Layer 2 address of incoming frames

103
Q

What is auto-MDIX?

A type of Cisco switch

An Ethernet connector type

A feature to automatically determine speed and duplex

A feature that detects Ethernet cable typ​e

A

A feature that detects Ethernet cable typ​e

104
Q

What type of address is 01-00-5E-0A-00-02?

An address that reaches every host inside a local subnet

An address that reaches one specific host

An address that reaches every host in the network

An address that reaches a specific group of hosts

A

An address that reaches a specific group of hosts

105
Q

Which statement is true about MAC addresses?

MAC addresses are implemented by software.

A NIC only needs a MAC address if connected to a WAN.

The first three bytes are used by the vendor assigned OUI.

The ISO is responsible for MAC addresses regulations.

A

The first three bytes are used by the vendor assigned OUI.

106
Q

What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.)

56 bytes

64 bytes

128 bytes

1024 bytes

1518 bytes

A

-64 bytes
-1518 bytes

107
Q

Which two functions or operations are performed by the MAC sublayer? (Choose two.)

It is responsible for Media Access Control.

It performs the function of NIC driver software.

It adds a header and trailer to form an OSI Layer 2 PDU.

It handles communication between upper and lower layers.

It adds control information to network protocol layer data.

A

-It is responsible for Media Access Control.
-It adds a header and trailer to form an OSI Layer 2 PDU.

108
Q

Which command can be used on a Windows host to display the routing table?

netstat -s

show ip route

netstat -r

tracert

A

netstat -r

109
Q

What information is added during encapsulation at OSI Layer 3?

Source and destination MAC

Source and destination application protocol

Source and destination port number

Source and destination IP address

A

Source and destination IP address

110
Q

How does the network layer use the MTU value?

a. The network layer depends on the higher level layers to determine the MTU.
b. The network layer depends on the data link layer to set the MTU, and adjusts the speed of transmission to accommodate it.
c. The MTU is passed to the network layer by the data link layer.
d. To increase speed of delivery, the network layer ignores the MTU.

A

c. The MTU is passed to the network layer by the data link layer.

111
Q

Which characteristic describes an IPv6 enhancement over IPv4?

a. IPv6 addresses are based on 128-bit flat addressing as opposed to IPv4 which is based on 32-bit hierarchical addressing.
b. The IPv6 header is simpler than the IPv4 header is, which improves packet handling.
c. Both IPv4 and IPv6 support authentication, but only IPv6 supports privacy capabilities.
d. The IPv6 address space is four times bigger than the IPv4 address space.

A

b. The IPv6 header is simpler than the IPv4 header is, which improves packet handling.

112
Q

Which statement accurately describes a characteristic of IPv4?

All IPv4 addresses are assignable to hosts.​

IPv4 has a 32-bit address space.​

An IPv4 header has fewer fields than an IPv6 header has.​

IPv4 natively supports IPsec.​

A

IPv4 has a 32-bit address space.​

113
Q

When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?

Destination MAC address

Source IP address

Destination IP address

Source MAC address

A

Destination IP address

114
Q

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host.

The packet will be sent directly to the destination host.

The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host.

The packet will be sent only to the default gateway.

A

The packet will be sent directly to the destination host.

115
Q

Which IPv4 address can a host use to ping the loopback interface?

126.0.0.1

127.0.0.0

126.0.0.0

127.0.0.1

A

127.0.0.1

116
Q

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

a. Connectionless acknowledgements are used to request retransmission.
b. Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.
c. Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available
d. The best-effort delivery process guarantees that all packets that are sent are received.

A

b. Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

117
Q

What was the reason for the creation and implementation of IPv6?

To make reading a 32-bit address easier

To relieve IPv4 address depletion

To provide more address space in the Internet Names Registry

To allow NAT support for private addressing

A

To relieve IPv4 address depletion

118
Q

Which information is used by routers to forward a data packet toward its destination?

Source IP address

Destination IP address

Source data-link address

Destination data-link address

A

Destination IP address

119
Q

Which field in an IPv4 packet header will typically stay the same during its transmission?

Flag

Time-to-Live

Packet Length

Destination Address

A

Destination Address

120
Q

Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped?

TTL

Hop Limit

Address Unreachable

No Route to Destination

A

Hop Limit

121
Q

Which router component holds the routing table, ARP cache, and running configuration file?

RAM

Flash

NVRAM

ROM

A

RAM

122
Q

What type of information is contained in an ARP table?

Switch ports associated with destination MAC addresses

Domain name to IPv4 address mappings

Routes to reach destination networks

IPv4 address to MAC address mappings

A

IPv4 address to MAC address mappings

123
Q

A PC is configured to obtain an IPv4 address automatically from network 192.168.1.0/24. The network administrator issues the arp -a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

This is a static map entry.

This is a dynamic map entry.

This entry refers to the PC itself.

This entry maps to the default gateway.

A

This is a static map entry.

124
Q

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway?

ipconfig /all

route print

netstat -r

arp -a

A

arp -a

125
Q

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It initiates an ARP request.

It broadcasts the frame out of all ports on the switch.

It notifies the sending host that the frame cannot be delivered.

It forwards the frame out of all ports except for the port at which the frame was received.

A

It forwards the frame out of all ports except for the port at which the frame was received.

126
Q

Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)

Router solicitation

Router advertisement

Neighbor solicitation

Neighbor advertisement

Echo request

A

Based on netacad:
- Router solicitation
- Neighbor advertisement

Based on online sources:
- Neighbor solicitation
- Neighbor advertisement

127
Q

How does the ARP process use an IPv4 address?

To determine the MAC address of the remote destination host

To determine the MAC address of a device on the same network

To determine the amount of time a packet takes when traveling from source to destination

To determine the network number based on the number of bits in the IPv4 address

A

To determine the MAC address of a device on the same network

128
Q

What is one function of the ARP protocol?

Obtaining an IPv4 address automatically

Mapping a domain name to its IP address

Resolving an IPv4 address to a MAC address

Maintaining a table of domain names with their resolved IP addresses

A

Resolving an IPv4 address to a MAC address

129
Q

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?

It drops the frame.

It sends the frame to all ports except the port on which it received the frame.

It sends the frame to all ports that are registered to forward broadcasts.

It sends the frame to all ports.

A

It sends the frame to all ports except the port on which it received the frame.

130
Q

What addresses are mapped by ARP?

IPv4 address to a destination MAC address

Destination IPv4 address to the source MAC address

Destination IPv4 address to the destination host name

Destination MAC address to the source IPv4 address

A
  • IPv4 address to a destination MAC address

Another answer:
- Destination MAC address to a destination IPv4 address

131
Q

When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP?

The IPv4 address of the destination host

The IPv4 address of the default gateway

The MAC address of the router interface closest to the sending host

The MAC address of the switch port that connects to the sending host

A

The MAC address of the router interface closest to the sending host

132
Q

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

Layer 3 address to a Layer 4 address

Layer 4 address to a Layer 2 address

Layer 2 address to a Layer 4 address

A

Layer 3 address to a Layer 2 address

133
Q

What is the purpose of ARP in an IPv4 network?

To forward data onward based on the destination IP address

To obtain a specific MAC address when an IP address is known

To forward data onward based on the destination MAC address.

To build the MAC address table in a switch from the information that is gathered

A

To obtain a specific MAC address when an IP address is known

134
Q

Which destination address is used in an ARP request frame?

0.0.0.0

255.255.255.255

FFFF.FFFF.FFFF

127.0.0.1

01-00-5E-00-AA-23

A

FFFF.FFFF.FFFF

135
Q

A router boots and enters setup mode. What is the reason for this?

The IOS image is corrupt.

Cisco IOS is missing from flash memory.

The configuration file is missing from NVRAM.

The POST process has detected hardware failure.

A

The configuration file is missing from NVRAM.

136
Q

Which command is used to encrypt all passwords in a router configuration file?

Router_A (config) # enable secret <password></password>

Router_A (config) # service password-encryption

Router_A (config) # enable password <password></password>

Router_A (config) # encrypt password

A

Router_A (config) # service password-encryption

137
Q

Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?

secret password trustknow1

enable password trustknow1

service password-encryption

enable secret trustknow1

A

enable secret trustknow1

138
Q

What will be the response from the router after the command, “router(config)# hostname portsmouth” is entered?

portsmouth#

portsmouth(config)#

invalid input detected

router(config-host)#

hostname = portsmouth
portsmouth#

? command not recognized
router(config)#

A

portsmouth(config)#

139
Q

An administrator is configuring a new router to permit out-of-band management access. Which set of commands will allow the required login using a password of cisco?

Router(config)# line vty 0 4
Router(config-line)# password manage
Router(config-line)# exit
Router(config)# enable password cisco

Router(config)# line vty 0 4
Router(config-line)# password cisco
Router(config-line)# login

Router(config)# line console 0
Router(config-line)# password cisco
Router(config-line)# login

Router(config)# line console 0
Router(config-line)# password cisco
Router(config-line)# exit
Router(config)# service password-encryption

A

Router(config)# line console 0
Router(config-line)# password cisco
Router(config-line)# login

140
Q

Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?

show ip interface brief

ping

show ip route

show interface fa0/1

A

show ip interface brief

141
Q

Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?

User EXEC mode

Privileged EXEC mode

Global configuration mode

Interface configuration mode

A

Privileged EXEC mode

142
Q

Which characteristic describes the default gateway of a host computer?

a. The logical address of the router interface on the same network as the host computer
b. The physical address of the switch interface connected to the host computer
c. The physical address of the router interface on the same network as the host computer
d. The logical address assigned to the switch interface connected to the router

A

a. The logical address of the router interface on the same network as the host computer

142
Q

What is the purpose of the startup configuration file on a Cisco router?

a. To facilitate the basic operation of the hardware components of a device
b. To contain the commands that are used to initially configure a router on startup
c. To contain the configuration commands that the router IOS is currently using
d. To provide a limited backup version of the IOS, in case the router cannot load the full featured IOS

A

b. To contain the commands that are used to initially configure a router on startup

143
Q

What is the purpose of the banner motd command?

a. It configures a message that will identify printed documents to LAN users.
b. It is a way that routers communicate the status of their links with one another.
c. It provides an easy way of communicating with any user attached to a router’s LANs.
d. It provides a way to make announcements to those who log in to a router.

A

d. It provides a way to make announcements to those who log in to a router.

144
Q

A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task?

a. User executive mode
b. Global configuration mode
c. Any line configuration mode
d. Privileged EXEC mode

A

c. Any line configuration mode

145
Q

What is stored in the NVRAM of a Cisco router?

a. The Cisco IOS
b. The running configuration
c. The bootup instructions
d. The startup configuration

A

d. The startup configuration

146
Q

Which statement regarding the service password-encryption command is true?

It is configured in privileged EXEC mode.

It encrypts only line mode passwords.

As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.

To see the passwords encrypted by the service password-encryption command in plain text, issue the no service password-encryption command.

A

As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.