Phase 1 Flashcards
A company is contemplating whether to use a client/server or a peer-to-peer network. What are the characteristics of a peer-to-peer network?
Easy to create
Lacks centralized administration
Less cost to implement
Which device would direct data along alternate pathways when there was a link failure?
An intermediary device
What do End devices provide on a network?
They originate the data that flows through the network.
They are the interface between humans and the communication network.
How do home users connect to the internet?
Cellular & Cable
Which term describes data, voice, and video traffic co-existing on the same network?
Convergence
For which of the following types of network traffic would an organization typically establish QoS policies?
Voice & video conferencing
Which expression accurately defines the term bandwidth?
A measure of the number of bits that can be transmitted in a single second
A user is implementing security on a small office network. Which actions would provide the minimum security requirements for this network?
Implementing a firewall
Installing antivirus software
Which of the following are features of a circuit-switched network?
Establishes a dedicated circuit between source and destination
A new connection must be initiated upon call failure
What is the function of the kernel of an operating system?
The kernel provisions hardware resources to meet software requirements.
Which statement below is correct for accessing the switch CLI?
Use the console port to locally access the switch using a special cable connected to the PC.
What information does the show startup-config command display?
The contents of the saved configuration file in the NVRAM
Which of the following Cisco IOS modes of operation represents Global Config mode?
Switch25(config)#
Which of the following hostnames follow the guidelines for naming conventions on Cisco IOS devices?
RM-3-Switch-2A4
SwBranch799
Which Cisco IOS command would move from privileged exec mode to global configuration mode?
Switch_Floor1# configure terminal
What are the characteristics of RAM on a Cisco device?
The configuration that is actively running on the device is stored in RAM.
The contents of RAM are lost during a power cycle.
Where would an IP address be assigned on a layer 2 switch?
Switch Virtual Interface
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
The receiving device requests that the sending device slows down transmission rate
What type of communication will send a message to all devices on an IPv4 local area network?
Broadcast
What is the process called where control data is added to the application data?
Encapsulation
A web server is providing a request for a webpage to a client. From the perspective of the client, what is the correct order of the protocol stack that is used to receive the transmission?
Ethernet, IP, TCP, HTTP
Which application layer protocols are part of the TCP/IP protocol suite?
DNS & FTP & DHCP
Which layers of the OSI model are comparable in function to the application layer of the TCP/IP model?
Application – Session – Presentation
Which address does a PC use when deciding whether to accept a packet?
Destination IP address
What will happen if the default gateway address is incorrectly configured on a host?
The host can communicate with other hosts in the local network.
The host cannot communicate with hosts in other networks.
What should be assigned as a host computer’s default gateway address?
The logical address of the router interface on the same network as the host computer
What happens to frames that are too large or too small?
They are not delivered
Which definitions accurately describe the associated application layer protocol?
Telnet - provides remote access to servers and networking devices
A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which port numbers represent these key applications?
20/21 FTP
80 HTTP
25 Email SMTP
Why would it be desireable for an ISP to use POP3 instead of IMAP?
Messages are downloaded to the client and deleted from the email servers
What can HTTPS use to provide secure communication?
Authentication and encryption
Which of the following statements describe the DHCP process?
The DHCP offer message includes the duration of the lease
The DHCP v6 uses a Solicit message as the first part of the process
The discover message will be received by all devices in the local network.
During the TCP 3 way handshake which of the following are agreed?
Window Size
Maximum Segment Size