Phase 1 Flashcards

1
Q

A company is contemplating whether to use a client/server or a peer-to-peer network. What are the characteristics of a peer-to-peer network?

A

Easy to create

Lacks centralized administration

Less cost to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which device would direct data along alternate pathways when there was a link failure?

A

An intermediary device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do End devices provide on a network?

A

They originate the data that flows through the network.

They are the interface between humans and the communication network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do home users connect to the internet?

A

Cellular & Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which term describes data, voice, and video traffic co-existing on the same network?

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For which of the following types of network traffic would an organization typically establish QoS policies?

A

Voice & video conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which expression accurately defines the term bandwidth?

A

A measure of the number of bits that can be transmitted in a single second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user is implementing security on a small office network. Which actions would provide the minimum security requirements for this network?

A

Implementing a firewall

Installing antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are features of a circuit-switched network?

A

Establishes a dedicated circuit between source and destination

A new connection must be initiated upon call failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the function of the kernel of an operating system?

A

The kernel provisions hardware resources to meet software requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement below is correct for accessing the switch CLI?

A

Use the console port to locally access the switch using a special cable connected to the PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What information does the show startup-config command display?

A

The contents of the saved configuration file in the NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following Cisco IOS modes of operation represents Global Config mode?

A

Switch25(config)#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following hostnames follow the guidelines for naming conventions on Cisco IOS devices?

A

RM-3-Switch-2A4

SwBranch799

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Cisco IOS command would move from privileged exec mode to global configuration mode?

A

Switch_Floor1# configure terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the characteristics of RAM on a Cisco device?

A

The configuration that is actively running on the device is stored in RAM.

The contents of RAM are lost during a power cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where would an IP address be assigned on a layer 2 switch?

A

Switch Virtual Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

A

The receiving device requests that the sending device slows down transmission rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of communication will send a message to all devices on an IPv4 local area network?

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the process called where control data is added to the application data?

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A web server is providing a request for a webpage to a client. From the perspective of the client, what is the correct order of the protocol stack that is used to receive the transmission?

A

Ethernet, IP, TCP, HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which application layer protocols are part of the TCP/IP protocol suite?

A

DNS & FTP & DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which layers of the OSI model are comparable in function to the application layer of the TCP/IP model?

A

Application – Session – Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which address does a PC use when deciding whether to accept a packet?

A

Destination IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What will happen if the default gateway address is incorrectly configured on a host?

A

The host can communicate with other hosts in the local network.

The host cannot communicate with hosts in other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What should be assigned as a host computer’s default gateway address?

A

The logical address of the router interface on the same network as the host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What happens to frames that are too large or too small?

A

They are not delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which definitions accurately describe the associated application layer protocol?

A

Telnet - provides remote access to servers and networking devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which port numbers represent these key applications?

A

20/21 FTP

80 HTTP

25 Email SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Why would it be desireable for an ISP to use POP3 instead of IMAP?

A

Messages are downloaded to the client and deleted from the email servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What can HTTPS use to provide secure communication?

A

Authentication and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following statements describe the DHCP process?

A

The DHCP offer message includes the duration of the lease

The DHCP v6 uses a Solicit message as the first part of the process

The discover message will be received by all devices in the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

During the TCP 3 way handshake which of the following are agreed?

A

Window Size

Maximum Segment Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is a best-effort file delivery protocol?

A

TFTP

35
Q

How many ports does a server require to provide FTP services?

A

2

36
Q

A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

A

Multiplexing

37
Q

What is a socket pair?

A

The combination of a source ip address and port number, and a destination ip address and port number

38
Q

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

A

ACK

39
Q

Which flag and field in the TCP header are used in the three-way handshake to establish connectivity between two network devices?

A

Sequence Number

SYN

40
Q

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent?

A

The next byte that the destination expects to receive

41
Q

What information is used by TCP to reassemble and reorder received segments?

A

Sequence numbers

42
Q

What happens if the first packet of an FTP transfer is lost?

A

The transport layer will resend when the timeout is reached.

43
Q

When is UDP preferred to TCP?

A

When an application can tolerate some loss of data during transmission

44
Q

Which of the following application layer protocols use TCP?

A

SMTP & FTP & HTTP

45
Q

Which of the following is NOT a transport layer header field?

A

Data

46
Q

In the event of segment loss what transport layer feature allows acknowledgment of discontinuous segments and requests retransmission of the missing data only?

A

SACK

47
Q

What two criteria are used to help select a network medium from various network media?

A

The distance the medium can successfully carry a signal

The cost of the medium and installation

48
Q

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

A

An intranet

49
Q

For which of the following types of network traffic would an organization typically establish QoS policies?

A

Video conferencing

50
Q

Which term ensures the validation of the sender and uses mechanisms to ensure that the packet has not changed during transmission?

A

Data integrity

51
Q

Which statement describes a potential benefit of cloud computing?

A

Reduced cost of infrastructure.

52
Q

Which of the following will provide a secure remote CLI connection to a switch?

A

SSH

53
Q

How does the service password-encryption command enhance password security on Cisco routers and switches?

A

It encrypts any passwords that are stored in plain text in RAM.

54
Q

What are two characteristics of RAM on a Cisco device?

A

The configuration that is actively running on the device is stored in RAM.

The contents of RAM are lost during a power cycle.

55
Q

Where would an IP address be assigned on a layer 2 switch?

A

Interface VLAN1

56
Q

What would you type at the windows command prompt to view domain name to IP address mappings?

A

Ipconfig /displaydns

57
Q

Which of the following are valid iOS Hot Keys or shortcuts?

A

Ctrl-A

Up Arrow

Ctrl-R

58
Q

Which of the following is a valid naming convention for a cisco device?

A

Must contain no spaces

59
Q

What type of communication will send a message to a group of devices on an IPv4 local area network?

A

Multicast

60
Q

Which statement is correct about network protocols?

A

They define a common format and a set of rules for exchanging messages between devices.

61
Q

What are proprietary protocols?

A

A single company or organization controls how the protocol functions.

62
Q

At which layer of the OSI model would a physical address be encapsulated?

A

Data link layer

63
Q

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

A

Segment

64
Q

Which characteristic must be assigned for the default gateway of a host computer?

A

The logical address of the router interface on the same network as the host computer

65
Q

What does OSI stand for?

A

Open Systems Interconnect

66
Q

What is the correct de-encapsulation order?

A

Bit > frame > packet > segment > data

67
Q

Which two definitions accurately describe the associated application layer protocol?

A

Telnet - provides remote access to servers and networking devices

DNS - resolves Internet names to IP addresses

68
Q

What are two characteristics of the application layer of the TCP/IP model?

A

The creation and maintenance of dialogue between source and destination applications

Closest to the end-user

69
Q

What is an example of network communication that uses the client-server model?

A

A workstation initiates an FTP session to download a file from a dedicated central file store.

70
Q

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

A

IMAP

71
Q

What are the steps of a successful automatic allocation of an IP address?

A

DHCP DISCOVER
DHCP OFFER
DHCP REQUEST
DHCP ACK

D.O.R.A

72
Q

Which statement is true about FTP?

A

The client can download data from or upload data to the server.

73
Q

During the TCP 3 way handshake which of the following are agreed?

A

Window Size

Maximun Segment Size

74
Q

Which protocol allows the user to access server resources as if they were local to the client host?

A

SMB

75
Q

What happens if part of an FTP message is not delivered to the destination?

A

The part of the FTP message that was lost is re-sent.

76
Q

A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

A

Multiplexing

77
Q

What type of information is included in the transport header?

A

Destination and source port numbers

78
Q

What is a characteristic of a TCP server process?

A

There can be many ports open simultaneously on a server, one for each active server application.

79
Q

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent?

A

The next byte that the destination expects to receive

80
Q

What action will TCP initiate when network congestion impacts delivery to the destination host?

A

The source will decrease the amount of data that it sends before it must receive acknowledgments from the destination.

81
Q

A host device is receiving the live streaming video. How does the device account for video data that is lost during transmission?

A

The device will continue receiving the streaming video, but there may be a momentary disruption.

82
Q

Why does HTTP use TCP as the transport layer protocol?

A

Because HTTP requires reliable delivery

83
Q

Which three application layer protocols use UDP?

A

VOIP
TFTP
DHCP

84
Q

Which portion of a transport layer PDU is not generated during encapsulation?

A

Data