Network Fundamentals Flashcards
Which OSI layer header contains the address of a destination host that is on another network?
A. Application
B. Session
C. Transport
D. Network
E. Data link
F. Physical
Which OSI layer header contains the address of a destination host that is on another network?
A. Application
B. Session
C. Transport
D. Network
E. Data link
F. Physical
Refer to the exhibit.
A network has been planned as shown. Which three statements accurately describe the areas and devices in the network plan? (Choose three).
A. Network Device A is a switch.
B. Network Device B is a switch.
C. Network Device A is a hub.
D. Network Device B is a hub.
E. Area 1 contains a Layer 2 device.
F. Area 2 contains a Layer 2 device.
Refer to the exhibit.
A network has been planned as shown. Which three statements accurately describe the areas and devices in the network plan? (Choose three).
A. Network Device A is a switch.
B. Network Device B is a switch.
C. Network Device A is a hub.
D. Network Device B is a hub.
E. Area 1 contains a Layer 2 device.
F. Area 2 contains a Layer 2 device.
At which layer of the OSI model is RSTP used to prevent loops?
A. Physical
B. Data link
C. Network
D. Transport
At which layer of the OSI model is RSTP used to prevent loops?
A. Physical
B. Data link
C. Network
D. Transport
Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two).
A. A bridge
B. A router
C. A hub
D. A Layer 3 switch
E. An access point
Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two).
A. A bridge
B. A router
C. A hub
D. A Layer 3 switch
E. An access point
Which layer of the OSI model is responsible for segmenting data from a sending host that enables large files to be broken down into smaller segments to prevent transmission errors?
A. Session
B. Presentation
C. Application
D. Transport
Which layer of the OSI model is responsible for segmenting data from a sending host that enables large files to be broken down into smaller segments to prevent transmission errors?
A. Session
B. Presentation
C. Application
D. Transport
Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?
A. Physical
B. Data-link
C. Transport
D. Network
Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?
A. Physical
B. Data-link
C. Transport
D. Network
At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate?
A. application
B. transport
C. network
D. physical
E. data link
At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate?
A. application
B. transport
C. network
D. physical
E. data link
A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)?
A. 4, 48
B. 48, 4
C. 48, 1
D. 1, 48
E. 4, 1
A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)?
A. 4, 48
**B. 48, 4 **
C. 48, 1
D. 1, 48
E. 4, 1
A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast domain.
What are two characteristics of segmenting a network with a router? (Choose two).
A. A router processes data more quickly than switches. B. Filtering can occur based on layer 3 information.
C. A router decreases the number of collision domains. D. Adding a router to the network decreases latency.
E. Broadcasts are not forwarded across the router.
What are two characteristics of segmenting a network with a router? (Choose two).
A. A router processes data more quickly than switches. B. Filtering can occur based on layer 3 information.
C. A router decreases the number of collision domains. D. Adding a router to the network decreases latency.
E. Broadcasts are not forwarded across the router.
A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown.
router# show interfaces Serial0/ 1/ 0 is up, line protocol is down
At which OSI layer should the administrator begin troubleshooting?
A. physical
B. data link
C. network
D. transport
A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown.
router# show interfaces Serial0/ 1/ 0 is up, line protocol is down
At which OSI layer should the administrator begin troubleshooting?
A. physical
**B. data link **
C. network
D. transport
What process is used to establish a connection-oriented virtual circuit between two communicating hosts?
A. Flow control
B. Sequencing
C. Windowing
D. Three-way handshake
E. Duplexing
What process is used to establish a connection-oriented virtual circuit between two communicating hosts?
A. Flow control
B. Sequencing
C. Windowing
D. Three-way handshake
E. Duplexing
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?
A. Session
B. Transport
C. Network
D. Data link
E. Physical
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?
A. Session
B. Transport
C. Network
**D. Data link **
E. Physical
Refer to the exhibit.
If the hubs in the graphic were replaced by switches, what would be virtually eliminated?
A. Broadcast domains
B. Repeater domains
C. Ethernet collisions
D. Signal amplification
E. Ethernet broadcasts
Refer to the exhibit.
If the hubs in the graphic were replaced by switches, what would be virtually eliminated?
A. Broadcast domains
B. Repeater domains
C. Ethernet collisions
D. Signal amplification
E. Ethernet broadcasts
Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links.
All devices attached to the network are shown. How many collision domains are present in this network?
A. 2
B. 3
C. 6
D. 9
E. 15
All devices attached to the network are shown. How many collision domains are present in this network?
A. 2
B. 3
C. 6
D. 9
E. 15
Which layer of the TCP/ IP stack combines the OSI model physical and data link layers?
A. Internet layer
B. Transport layer
C. Application layer
D. Network access layer
Which layer of the TCP/ IP stack combines the OSI model physical and data link layers?
A. Internet layer
B. Transport layer
C. Application layer
D. Network access layer
How does a switch differ from a hub?
A. A switch does not induce any latency into the frame transfer time.
B. A switch tracks MAC addresses of directly-connected devices.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switch decreases the number of broadcast domains.
E. A switch decreases the number of collision domains.
How does a switch differ from a hub?
A. A switch does not induce any latency into the frame transfer time.
B. A switch tracks MAC addresses of directly-connected devices.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switch decreases the number of broadcast domains.
E. A switch decreases the number of collision domains.
What is the purpose of flow control?
A. To ensure data is retransmitted if an acknowledgement is not received.
B. To reassemble segments in the correct order at the destination device.
C. To provide a means for the receiver to govern the amount of data sent by the sender.
D. To regulate the size of each segment.
What is the purpose of flow control?
A. To ensure data is retransmitted if an acknowledgement is not received.
B. To reassemble segments in the correct order at the destination device.
C. To provide a means for the receiver to govern the amount of data sent by the sender.
D. To regulate the size of each segment.
How many collision domains are shown?
A. One
B. Two
C. Three
D. Four
E. Six
F. Twelve
How many collision domains are shown?
A. One
B. Two
C. Three
D. Four
E. Six
F. Twelve
What source and destination information can be found in the data link layer?
A. URL
B. IP address
C. port number
D. MAC address
What source and destination information can be found in the data link layer?
A. URL
B. IP address
C. port number
D. MAC address
When troubleshooting a LAN interface operating in full duplex mode, which error condition can be immediately ruled out?
A. Giants
B. No buffers
C. Collisions
D. Ignored
E. Dribble condition
When troubleshooting a LAN interface operating in full duplex mode, which error condition can be immediately ruled out?
A. Giants
B. No buffers
C. Collisions
D. Ignored
E. Dribble condition
Which protocol uses a connection-oriented service to deliver files between end systems?
A. TFTP
B. DNS
C. FTP
D. SNMP
E. RIP
Which protocol uses a connection-oriented service to deliver files between end systems?
A. TFTP
B. DNS
C. FTP
D. SNMP
E. RIP
Which network device functions only at Layer 1 of the OSI model?
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Which network device functions only at Layer 1 of the OSI model?
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Most hubs are amplifying the electrical signals therefore; they are really repeaters with several ports. Hubs and repeaters are Layer 1 (physical layer) devices.
Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?
A. HTTP
B. IP
C. TCP
D. Telnet
E. UDP
Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?
A. HTTP
B. IP
C. TCP
D. Telnet
E. UDP
What must occur before a workstation can exchange HTTP packets with a web server?
A. A UDP connection must be established between the workstation and its default gateway.
B. A UDP connection must be established between the workstation and the web server.
C. A TCP connection must be established between the workstation and its default gateway.
D. A TCP connection must be established between the workstation and the web server.
E. An ICMP connection must be established between the workstation and its default gateway.
F. An ICMP connection must be established between the workstation and the web server.
What must occur before a workstation can exchange HTTP packets with a web server?
A. A UDP connection must be established between the workstation and its default gateway.
B. A UDP connection must be established between the workstation and the web server.
C. A TCP connection must be established between the workstation and its default gateway.
D. A TCP connection must be established between the workstation and the web server.
E. An ICMP connection must be established between the workstation and its default gateway.
F. An ICMP connection must be established between the workstation and the web server.
How does TCP differ from UDP? (Choose two).
A. TCP provides best effort delivery.
B. TCP provides synchronized communication.
C. TCP segments are essentially datagrams.
D. TCP provides sequence numbering of packets.
E. TCP uses broadcast delivery.
How does TCP differ from UDP? (Choose two).
A. TCP provides best effort delivery.
B. TCP provides synchronized communication.
C. TCP segments are essentially datagrams.
D. TCP provides sequence numbering of packets.
E. TCP uses broadcast delivery.
What are two common TCP applications? (Choose two).
A. TFTP
B. SMTP
C. SNMP
D. FTP
E. DNS
What are two common TCP applications? (Choose two).
A. TFTP
B. SMTP
C. SNMP
D. FTP
E. DNS
SMTP uses TCP port 25, while FTP uses TCP ports 20 and 21.
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?
A. Transport
B. Network
C. Presentation
D. Session
E. Application
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?
A. Transport
B. Network
C. Presentation
D. Session
E. Application
The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data link
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data link
FTP belongs to Application layer and it is also the highest layer of the OSI model.
What layer is responsible for combining bits into bytes, and bytes into frames?
A. Application
B. Presentation
C. Transport
D. Data Link
What layer is responsible for combining bits into bytes, and bytes into frames?
A. Application
B. Presentation
C. Transport
D. Data Link
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two).
A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. E. The presentation layer translates bits into voltages for transmission across the physical link.
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two).
A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. E. The presentation layer translates bits into voltages for transmission across the physical link.
Which two Ethernet fiber-optic modes support distances of greater than 550 meters? (Choose two).
A. 1000Base-LX
B. 1000Base-FX
C. 1000Base-SC
D. 100Base-CX
E. 1000Base-ZX
Which two Ethernet fiber-optic modes support distances of greater than 550 meters? (Choose two).
A. 1000Base-LX
B. 1000Base-FX
C. 1000Base-SC
D. 100Base-CX
E. 1000Base-ZX
1000BASE-LX is used with Single-mode or Multi-mode fiber with a range of 3-10Km. 1000Base-ZX is single mode fiber with a range of 43-75Km.
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?
A. This is a 10Mbs switch port.
B. This is a 100Mbs switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?
A. This is a 10Mbs switch port.
B. This is a 100Mbs switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.
Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/ CD. CSMA/ CD is only used in obsolete shared media Ethernet (which uses repeater or hub and runs at half-duplex).
CSMA/ CD is a protocol that helps devices do what?
A. Increase bandwidth between all devices.
B. Allows devices to transmit simultaneously.
C. Share bandwidth evenly without having two devices transmit at the same time.
D. Administers the bandwidth for the device that is currently transmitting.
CSMA/ CD is a protocol that helps devices do what?
A. Increase bandwidth between all devices.
B. Allows devices to transmit simultaneously.
C. Share bandwidth evenly without having two devices transmit at the same time.
D. Administers the bandwidth for the device that is currently transmitting.
Half-Duplex uses ____ with a digital signal running in both directions?
A. One wire pair
B. Two wire pairs
C. Three wire pairs
D. Four wire pairs
Half-Duplex uses ____ with a digital signal running in both directions?
A. One wire pair
B. Two wire pairs
C. Three wire pairs
D. Four wire pairs
Identify the incorrect statement regarding Full-duplex.
A. Uses CSMA/ CD to avoid collisions.
B. No collisions occur in full-duplex.
C. A dedicated switchport is required for each full-duplex mode.
D. The host NIC and Switchport must be full-duplex capable.
Identify the incorrect statement regarding Full-duplex.
A. Uses CSMA/ CD to avoid collisions.
B. No collisions occur in full-duplex.
C. A dedicated switchport is required for each full-duplex mode.
D. The host NIC and Switchport must be full-duplex capable.
In a half-duplex network, one wire pair is used in the ethernet cable. During transmission, a device will listen to the wire to begin transmission of data. To avoid data collisions, CSMA/ CD was created to mitigate any collisions during data transmission.
What is the first 24 bits in a MAC address called?
A. NIC
B. BIA
C. OUI
D. VAI
What is the first 24 bits in a MAC address called?
A. NIC
B. BIA
C. OUI
D. VAI
Organizational Unique Identifier (OUI) is the first 24 bits of a MAC address for a network device, which indicates the specific vendor for that device as assigned by the Institute of Electrical and Electronics Engineers, Incorporated (IEEE).
A MAC address is _____ bits long, and expressed in _____?
A. 48, decimal
B. 24, decimal
C. 48, hexadecimal
D. 32, hexadecimal
A MAC address is _____ bits long, and expressed in _____?
A. 48, decimal
B. 24, decimal
C. 48, hexadecimal
D. 32, hexadecimal
What is the decimal equivalent of 10010110?
A. 140
B. 170
C. 120
D. 150
What is the decimal equivalent of 10010110?
A. 140
B. 170
C. 120
D. 150
Each binary digit is equivalent to a decimal value in an IP address. The IP address consists of 4 octets, 8 binary bits each. To convert binary to decimal, multiply the binary value to the corresponding value of 2 - 1x2( 7) + 0x2( 6) + 0x2( 5) + 1x2( 4) + 0x2( 3) + 1x2( 2) + 1x2( 1) + 0x2( 0). Add the sums together - 1x128 + 0x64 + 0x32 + 1x16 + 0x8 + 1x4 + 1x2 + 0x1 = 128 + 0 + 0 + 16 + 0 + 4 + 2 + 0 which equals 150.
What is the hexadecimal value of C?
A. 0101
B. 1100
C. 1101
D. 1110
What is the hexadecimal value of C?
A. 0101
B. 1100
C. 1101
D. 1110
The hexadecimal value of C is 12. In binary, it is represented as 1100. Values in a nibble are 8-4-2-1. We have 1 in the 8 position, 1 in the 4 position, 0 in the 2, 0 in the position.
What cable would you use between a Router and a Switch or Hub?
A. Straight-Through
B. Crossover
C. Rolled
D. Coax
What cable would you use between a Router and a Switch or Hub?
A. Straight-Through
B. Crossover
C. Rolled
D. Coax
What is the equivalent of 11001010.11110101.10000011.11101011 in hexadecimal?
A. 0xE61A3D67
B. 0xD8B2D356
C. 0xCAF583EB
D. 0xE81E3D36
What is the equivalent of 11001010.11110101.10000011.11101011 in hexadecimal?
A. 0xE61A3D67
B. 0xD8B2D356
C. 0xCAF583EB
D. 0xE81E3D36
0x denotes that this is a hexadecimal value. To convert this to hexadecimal, break up each octet into 2 nibble of 4 bits each. The correct answer is C - 0xCAF583EB.
The Cisco Hierarchical Model contains what three layers?
A. Core Layer, Distribution Layer, Access Layer
B. Backbone Layer, Production Layer, Access layer
C. Border Gateway Layer, ISP Layer, Distribution Layer
D. Regional Layer, Local Layer, User Layer
The Cisco Hierarchical Model contains what three layers?
A. Core Layer, Distribution Layer, Access Layer
B. Backbone Layer, Production Layer, Access layer
C. Border Gateway Layer, ISP Layer, Distribution Layer
D. Regional Layer, Local Layer, User Layer
Which fields are contained within an IEEE Ethernet Frame? (Choose two).
A. Source and destination MAC address.
B. Source and destination network address.
C. Source and destination port number.
D. FCS Field.
Which fields are contained within an IEEE Ethernet Frame? (Choose two).
A. Source and destination MAC address.
B. Source and destination network address.
C. Source and destination port number.
D. FCS Field.
An Ethernet frame has source and destination MAC addresses, an Ether-Type field to identify the Network layer protocol, the data, and the FCS field that holds the answer to the CRC.
1000Base-T is which IEEE standard?
A. 802.3F
B. 802.3z
C. 802.3ab
D. 802.3ae
1000Base-T is which IEEE standard?
A. 802.3F
B. 802.3z
C. 802.3ab
D. 802.3ae
Data encapsulation follows what process?
A. Application, Segment, Network, Frame, Bits
B. Segments, Packets, Frames, Bits
C. Coax, Twisted pair, Fiber, Wireless
D. Packets, Frames, Segments, Bits E. Bits, Packets, Segments, Application data
Data encapsulation follows what process?
A. Application, Segment, Network, Frame, Bits
B. Segments, Packets, Frames, Bits
C. Coax, Twisted pair, Fiber, Wireless
D. Packets, Frames, Segments, Bits E. Bits, Packets, Segments, Application data
What term is used for the unwanted signal interference from adjacent pairs in a cable?
A. EMI
B. RFI
C. Crosstalk
D. Attenuation
What term is used for the unwanted signal interference from adjacent pairs in a cable?
A. EMI
B. RFI
C. Crosstalk
D. Attenuation
Refer to the exhibit.
A host is connected to switch port fa0/ 3. The host and switch have been fully configured for IP connectivity as shown. However, the indicator LED on switch port fa0/ 3 is not on, and the host cannot communicate with any other hosts including those connected to VLAN 2 on the same switch. Based on the given information, what is the problem?
A. Switch port fa0/ 3 is not configured as a trunk port.
B. There is an incorrect cable type.
C. The switch has been assigned an incorrect subnet mask.
D. Switch port fa0/ 3 has been blocked by STP.
E. The switch and the host must be in the same subnet.
Refer to the exhibit.
A host is connected to switch port fa0/ 3. The host and switch have been fully configured for IP connectivity as shown. However, the indicator LED on switch port fa0/ 3 is not on, and the host cannot communicate with any other hosts including those connected to VLAN 2 on the same switch. Based on the given information, what is the problem?
A. Switch port fa0/ 3 is not configured as a trunk port.
B. There is an incorrect cable type.
C. The switch has been assigned an incorrect subnet mask.
D. Switch port fa0/ 3 has been blocked by STP.
E. The switch and the host must be in the same subnet.
A network device needs to be installed in the place of the icon labeled Network Device to accommodate a leased line attachment to the Internet. Which network device and interface configuration meets the minimum requirements for this installation?
A. A router with two Ethernet interfaces.
B. A switch with two Ethernet interfaces.
C. A router with one Ethernet and one serial interface.
D. A switch with one Ethernet and one serial interface.
E. A router with one Ethernet and one modem interface.
A network device needs to be installed in the place of the icon labeled Network Device to accommodate a leased line attachment to the Internet. Which network device and interface configuration meets the minimum requirements for this installation?
A. A router with two Ethernet interfaces.
B. A switch with two Ethernet interfaces.
C. A router with one Ethernet and one serial interface.
D. A switch with one Ethernet and one serial interface.
E. A router with one Ethernet and one modem interface.
An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. Based on the output shown, what could be the problem?
A. The serial interface is configured for half duplex.
B. The serial interface does not have a cable attached.
C. The serial interface has the wrong type of cable attached.
D. The serial interface is configured for the wrong frame size.
E. The serial interface has a full buffer.
An administrator cannot connect from R1 to R2. To troubleshoot this problem, the administrator has entered the command shown in the exhibit. Based on the output shown, what could be the problem?
A. The serial interface is configured for half duplex.
B. The serial interface does not have a cable attached.
C. The serial interface has the wrong type of cable attached.
D. The serial interface is configured for the wrong frame size.
E. The serial interface has a full buffer.
Which two statements describe the operation of the CSMA/ CD access method? (Choose two).
A. In a CSMA/ CD collision domain, multiple stations can successfully transmit data simultaneously.
B. In a CSMA/ CD collision domain, stations must wait until the media is not in use before transmitting.
C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/ CD access method.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
Which two statements describe the operation of the CSMA/ CD access method? (Choose two).
A. In a CSMA/ CD collision domain, multiple stations can successfully transmit data simultaneously.
B. In a CSMA/ CD collision domain, stations must wait until the media is not in use before transmitting.
C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/ CD access method.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?
A. 1
B. 2
C. 4
D. 8
If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?
A. 1
B. 2
C. 4
D. 8
What kind of cable should be used to make each connection that is identified by the numbers shown?
A. 1 - Ethernet Crossover cable 2 - Ethernet straight-through cable 3 - Fiber Optic cable 4 - Rollover cable.
B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - Serial cable 4 - Rollover cable. C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - Serial cable 4 - Null-modem cable.
D. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Rollover cable.
E. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Ethernet Straight-through cable.
What kind of cable should be used to make each connection that is identified by the numbers shown?
A. 1 - Ethernet Crossover cable 2 - Ethernet straight-through cable 3 - Fiber Optic cable 4 - Rollover cable.
B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - Serial cable 4 - Rollover cable. C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - Serial cable 4 - Null-modem cable.
D. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Rollover cable.
E. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Ethernet Straight-through cable.
For what two purposes does the Ethernet protocol use physical addresses? (Choose two).
A. To uniquely identify devices at Layer 2.
B. To allow communication with devices on a different network.
C. To differentiate a Layer 2 frame from a Layer 3 packet. D. To establish a priority system to determine which device gets to transmit first.
E. To allow communication between different devices on the same network.
F. To allow detection of a remote device when its physical address is unknown.
For what two purposes does the Ethernet protocol use physical addresses? (Choose two).
A. To uniquely identify devices at Layer 2.
B. To allow communication with devices on a different network.
C. To differentiate a Layer 2 frame from a Layer 3 packet. D. To establish a priority system to determine which device gets to transmit first.
E. To allow communication between different devices on the same network.
F. To allow detection of a remote device when its physical address is unknown.
In an Ethernet network, under what two scenarios can devices transmit? (Choose two).
A. When they receive a special token.
B. When there is a carrier.
C. When they detect no other devices are sending.
D. When the medium is idle.
E. When the server grants access.
In an Ethernet network, under what two scenarios can devices transmit? (Choose two).
A. When they receive a special token.
B. When there is a carrier.
C. When they detect no other devices are sending.
D. When the medium is idle.
E. When the server grants access.
The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address. What address would you ping to perform this task?
A. 10.1.1.1
B. 192.168.0.1
C. 127.0.0.1
D. 239.1.1.1
The network administrator has asked you to check the status of the workstation’s IP stack by pinging the loopback address. What address would you ping to perform this task?
A. 10.1.1.1
B. 192.168.0.1
C. 127.0.0.1
D. 239.1.1.1
Which IP address can be assigned to an internet interface?
A. 9.255.255.10
B. 10.180.48.224
C. 192.168.20.223
D. 172.16.200.18
Which IP address can be assigned to an internet interface?
A. 9.255.255.10
B. 10.180.48.224
C. 192.168.20.223
D. 172.16.200.18
The IP address which can be assigned to an Internet interface must a public IP address. Private IP address (10.0.0.0 - 10.255.255.255; 172.16.0.0 - 172.31.255.255; 192.168.0.0 - 192.168.255.255). Special IP addresses (the local loopback address 127.0.0.1, multicast addresses…) cannot be assigned to an Internet interface. In this question, only answer B doesn’t belong to the range of private IP addresses.
What TCP message does a host send to establish a connection with a destination host?
A. ISN
B. Establish
C. HELLO
D. SYN
E. Request open
f. ACK
What TCP message does a host send to establish a connection with a destination host?
A. ISN
B. Establish
C. HELLO
D. SYN
E. Request open
f. ACK
The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two).
A. SNMP
B. HTTP
C. Telnet
D. RMON
E. SSH
The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two).
A. SNMP
B. HTTP
C. Telnet
D. RMON
E. SSH
The corporate head office has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence, what will happen?
A. UDP will drop the datagrams.
B. UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
C. UDP will send an ICMP Information Request to the source host.
D. UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.
The corporate head office has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence, what will happen?
A. UDP will drop the datagrams.
B. UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
C. UDP will send an ICMP Information Request to the source host.
D. UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.
Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two). A. Ease of management and troubleshooting.
B. Efficient utilization of MAC addresses.
C. Dedicated communications between devices.
D. Reduces routing table entries.
E. Auto-negotiation of media rates.
Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two). A. Ease of management and troubleshooting.
B. Efficient utilization of MAC addresses.
C. Dedicated communications between devices.
D. Reduces routing table entries.
E. Auto-negotiation of media rates.
Which of the following describes private IP addresses? (Choose two).
A. Addresses that can be routed through the public internet.
B. A scheme to conserve public addresses.
C. Addresses licensed to enterprises or ISPs by an internet registry organization.
D. Addresses chosen by a company to communicate with the internet.
E. Addresses that cannot be routed through the public internet.
Which of the following describes private IP addresses? (Choose two).
A. Addresses that can be routed through the public internet.
B. A scheme to conserve public addresses.
C. Addresses licensed to enterprises or ISPs by an internet registry organization.
D. Addresses chosen by a company to communicate with the internet.
E. Addresses that cannot be routed through the public internet.
An administrator attempts a traceroute but receives a “Destination Unreachable” message. Which protocol is responsible for that message?
A. TCP
B. SNMP
C. RUDP
D. RARP
E. ICMP
An administrator attempts a traceroute but receives a “Destination Unreachable” message. Which protocol is responsible for that message?
A. TCP
B. SNMP
C. RUDP
D. RARP
E. ICMP
When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to “talk” to?
A. Show Network Address request
B. ARP request
C. RARP request
D. Proxy ARP request
E. Show Hardware Address request
F. Ping request
When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to “talk” to?
A. Show Network Address request
B. ARP request
C. RARP request
D. Proxy ARP request
E. Show Hardware Address request
F. Ping request
Which of the following host addresses are members of networks that cannot be routed across the public internet? (Choose three).
A. 10.172.13.65
B. 198.234.12.95
C. 172.16.223.125
D. 172.64.12.29
E. 212.193.48.254
F. 192.168.23.252
Which of the following host addresses are members of networks that cannot be routed across the public internet? (Choose three).
A. 10.172.13.65
B. 198.234.12.95
C. 172.16.223.125
D. 172.64.12.29
E. 212.193.48.254
F. 192.168.23.252
Which option can be configured for the default gateway of the Local Area Connection?
A. 192.223.129.0
B. 10.0.0.0
C. 192.223.129.254
D. 10.0.0.254
Which option can be configured for the default gateway of the Local Area Connection?
A. 192.223.129.0
B. 10.0.0.0
C. 192.223.129.254
D. 10.0.0.254
Which command would you use on a Cisco router to verify the Layer 3 path to a host?
A. tracert address
B. traceroute address
C. telnet address
D. ssh address
Which command would you use on a Cisco router to verify the Layer 3 path to a host?
A. tracert address
B. traceroute address
C. telnet address
D. ssh address
Workstation A has been assigned an IP address of 192.0.2.24/ 28. Workstation B has been assigned an IP address of 192.0.2.100/ 28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts were unsuccessful. What two things can be done to allow communications between the hosts? (Choose two).
A. Change the subnet mask of the hosts to /26.
B. Change the address of Workstation A to 192.0.2.15.
C. Change the subnet mask of the hosts to /25.
D. Change the address of Workstation B to 192.0.2.111. E. Replace the straight-through cable with a crossover cable.
Workstation A has been assigned an IP address of 192.0.2.24/ 28. Workstation B has been assigned an IP address of 192.0.2.100/ 28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts were unsuccessful. What two things can be done to allow communications between the hosts? (Choose two).
A. Change the subnet mask of the hosts to /26.
B. Change the address of Workstation A to 192.0.2.15.
C. Change the subnet mask of the hosts to /25.
D. Change the address of Workstation B to 192.0.2.111. E. Replace the straight-through cable with a crossover cable.
A /28 is CIDR notation for the 255.255.255.240 subnet mask. This has a block size of 16 in the fourth octet. Workstation A is in the 192.0.2.16 subnet, Workstation B is in the 192.0.2.96 subnet. Both workstations are in the wrong subnet. Changing the subnet mask to /25 (255.255.255.128), provides two subnets: 0 and 128, which would put both hosts in the zero (0) subnet. With both workstations in the same subnet, you will need a crossover cable in order to be able to communicate between the two hosts.
The network default gateway being applied to a host by DHCP is 192.168.5.33/ 28. Which of the following option is a valid IP address for that subnet?
A. 192.168.5.14
B. 192.168.5.47
C. 192.168.5.40
D. 192.168.5.55
E. 192.168.5.32
The network default gateway being applied to a host by DHCP is 192.168.5.33/ 28. Which of the following option is a valid IP address for that subnet?
A. 192.168.5.14
B. 192.168.5.47
C. 192.168.5.40
D. 192.168.5.55
E. 192.168.5.32
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two).
A. CDP
B. DHCP
C. ICMP
D. ARP
E. DNS
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two).
A. CDP
B. DHCP
C. ICMP
D. ARP
E. DNS
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?
A. The PC has the TCP/ IP protocol stack correctly installed.
B. The PC has connectivity with a Layer 3 device.
C. The PC has connectivity up to Layer 5 of the OSI model.
D. The PC has connectivity with a local host.
E. The PC has a default gateway correctly configured.
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?
A. The PC has the TCP/ IP protocol stack correctly installed.
B. The PC has connectivity with a Layer 3 device.
C. The PC has connectivity up to Layer 5 of the OSI model.
D. The PC has connectivity with a local host.
E. The PC has a default gateway correctly configured.
What will happen if a private IP address is assigned to a public interface connected to an ISP?
A. Several automated methods will be necessary on the private network.
B. The NAT process will be used to translate this address in a valid IP address.
C. Only is ISP router will have the capability to access the public network.
D. Addresses in a private range will be not routed on the internet backbone.
E. A conflict of IP addresses happens, because other public routers can use the same range.
What will happen if a private IP address is assigned to a public interface connected to an ISP?
A. Several automated methods will be necessary on the private network.
B. The NAT process will be used to translate this address in a valid IP address.
C. Only is ISP router will have the capability to access the public network.
D. Addresses in a private range will be not routed on the internet backbone.
E. A conflict of IP addresses happens, because other public routers can use the same range.
Where does routing occur within the DoD TCP/ IP reference model?
A. Transport
B. Network
C. Internet
D. Application
Where does routing occur within the DoD TCP/ IP reference model?
A. Transport
B. Network
C. Internet
D. Application
The Internet Layer of TCP/ IP is equivalent to the Network Layer which is responsible for routing decision.
On the network 131.1.123.0/ 27, what is the last IP address that can be assigned to a host?
A. 131.1.123.32
B. 131.1.123.31
C. 131.1.123.30
D. 131.1.123.33
On the network 131.1.123.0/ 27, what is the last IP address that can be assigned to a host?
A. 131.1.123.32
B. 131.1.123.31
C. 131.1.123.30
D. 131.1.123.33
A Layer 2 broadcast is also known as a hardware broadcast. Of the following, which two are binary and hexadecimal Layer 2 broadcasts? (Choose two).
A. 11111111
B. FF.FF.FF.FF.FF.FF C. 00000000
D. 45. AC. 24. E3.60. A5
E. 255.255.255.255
A Layer 2 broadcast is also known as a hardware broadcast. Of the following, which two are binary and hexadecimal Layer 2 broadcasts? (Choose two).
A. 11111111
B. FF.FF.FF.FF.FF.FF
C. 00000000
D. 45. AC. 24. E3.60. A5
E. 255.255.255.255
When is it necessary to use a public IP address on a routing interface?
A. Connect a router on a local network.
B. Allow distribution of routes between networks.
C. Connect a network to the internet.
D. Translate a private IP address.
E. Connect a router to another router.
When is it necessary to use a public IP address on a routing interface?
A. Connect a router on a local network.
B. Allow distribution of routes between networks.
C. Connect a network to the internet.
D. Translate a private IP address.
E. Connect a router to another router.
Which of the following are types of flow control? (Choose three).
A. Buffering
B. Cut-through
C. Windowing
D. Congestion avoidance
E. Load balancing
Which of the following are types of flow control? (Choose three).
A. Buffering
B. Cut-through
C. Windowing
D. Congestion avoidance
E. Load balancing