Professional Documents
Culture Documents
Data Comm & Networking 1 (Upgraded) Created By:Anonymous
Data Comm & Networking 1 (Upgraded) Created By:Anonymous
CREATED BY:ANONYMOUS
Which two components are added to the PDU at the network access layer? (Choose two.)
-Trailer
-frame header
What three functions are defined by network protocols to allow communication between known source
-delivery options
-message size
-data encoding
-They define how messages are exchanged between the sources and the destination
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
Answer: IEEE
-IOS
Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout
What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
What happens when two devices on the same subnet are communicating?
Which message delivery option is used when all devices need to receive the same message
simultaneously?
-broadcast
A ______ address is defined as a reserved address that routes packets back to the host
-loopback
-Host
-Network
Which two statements are true of the deterministic access method?(Choose two.)
-light
-local delivery
Which two factors influence the method that is used for media access control? (Choose two.)
Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up.
Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC?
-IEEE 802.2
Answer: 192.168.1.1:80
A user is unable to access the company server from a computer. On issuing the ipconfig command, the
user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?
-experimental
What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3?
Which statement is true about an interface that is configured with the IPv6 address command?
-A link-local IPv6 address is automatically
Answer: 01-00-5E-00-00-C8
-SMTP
What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer?
(Choose three.)
-Frame delimiting
-Error detection
-Addressing
Answer: 10.15.25.254
-The vendor is responsible for assigning the last 24 bits of the MAC address.
A network administrator notices that the default gateway devices sends an ICMP Redirect message to
the workstation when the workstation tries to connect to file server on another network. What is the
-To notify the workstation, that another router on the same network, is the better default-gateway to
Answer: FF-FF-FF-FF-FF-FF
At which layers of the OSI model does Ethernet function? (Choose two.)
-Physical
-Data link
Answer: 2001:DB8:0:1470::200
Answer: 00101001
-Frame
When transporting data from real-time applications, such as streaming audio and video, which field in
the IPv6 header can be used to inform the routers and switches to maintain the same path for the
-Flow Label
Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?
Which action is performed by a client when establishing communication with a server via the use of UDP
Which three fields are used in a UDP segment header? (Choose three.)
-Source Port
-Checksum
-Length
During troubleshooting procedures, from which location will most Cisco routers load a limited IOS
-ROM
Answer: 0x0800
How does one compute for the protocol overhead for Ethernet as a percentage?
In a ARP request frame what is the value of the destination mac address field?
Answer: FFFF.FFFF.FFFF
Which two files are loaded into RAM by the router when it boots? (Choose two.)
-startup configuration
-IOS image
-The MTU is passed to the network layer by the data link layer
When a client connects to an HTTP server by the use of a randomly generated source port number, what
destination port number will the HTTP server use when building a response?
-the original source port number that was randomly generated by the client
A collision fragment, also known as __________ frame, is a frame of fewer than 64 bytes in length.
-runt
Which entities are involve in a temporary communication that is established by the transport layer?
-applications
What could be calculated from the formula "Efficiency x Net bit rate"?
-Throughput
What is an advantage of UDP over TCP?
What are two functions that are provided by the network layer? (Choose two.)
What could be calculated from the formula "Time spent transmitting data / Total Time"?
-Channel utilization
Which term defines the processing capabilities of a switch by rating how much data can be processed
per second?
-forwarding rate
It is the rate of how much data can be processed per second by a switch.
-forwarding rate
Within a production network, what is the purpose of configuring a switch with a default gateway
address?
-The default gateway address is used to forward packets originating from the switch to remote
networks.
During the boot process, in what memory location will the router bootstrap program look for the IOS
-flash
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a
packet?
-Time-to-Live
What is a group of web pages that groups of individuals can edit and view together called?
-Wiki
-Confidentiality
-Availability
-Integrity
What is a network infrastructure that provides access to other networks over a wide geographic area?
-WAN
What is the primary defense against unauthorized remote access to network devices?
Which of the following are business-class Internet connection technologies normally supplied by a
-Leased lines
-Metro Ethernet
What type of connection to a Cisco IOS switch is used to make the initial configuration?
-Console port
Why would a technician enter the command copy startup-config running config?
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
-Command
A data center has recently updated a physical server to host multiple operating systems on a single CPU.
The data center can now provide each customer with a separate web server without having to allocate
an actual discrete server for each customer. What is the network trend that is being implemented by the
-virtualization
An administrator has just changed the IP address of an interface on an IOS device. What else must be
-Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the
command is typed correctly and the Enter key has been pressed.
A network administer has forgotten the argument of an IOS command. How would the administrator get
-Printer
-Tablet computer
-IP phone
-Server
To save time, IOS commands may be partially entered and then completed by typing which key or key
combination?
-Tab
SwitchA(config-if)# no shutdown
-SVI
-A network where voice, video, and data move over the same infrastructure
An ____________is a private connection of LANs and WANs that belongs to an organization, and is
designed to be accessible only by the members and employees of the organization, or others with
authorization.
-Intranet
Which type of traffic must receive the highest priority from QoS?
-VOIP
What command will display a list of keywords available for viewing the status of an IOS Switch
Switch# show?
A _______ network is able to expand to accept new devices and applications without affecting
performance.
-scalable
When the command "Switch(config)# hostname EaSt-2+56" is entered in a Cisco IOS device using the
EaSt-2+56(config)#
The farther you are from the central office when utilizing a DSL connection, the_______ the connection
speed.
-slower
Which device acts as gateway to allow hosts to send traffic to remote IP networks?
-local router
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
Which technology would be best to provide a home user with a highspeed, always-on Internet
connection?
-DSL
During a routine inspection, a technician discovered that software that was installed on a computer was
secretly collecting data about websites that were visited by users of the computer. Which type of threat
-spyware
What is a wiki?
Which type of network design combines voice, video, and data on the same communication channel?
-a converged network
Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up.
Which message timing factor impacts how much information can be sent and the speed at which it can
be delivered?
-Flow control
Which of the following elements do both human and computer communication systems have in
- Source
-Default gateway (wrong) channel siguro
-Receiver
Which of the following OSI model layers have the same functionality as the network access layer in the
-Data link
-physical
What happens when two devices on the same subnet are communicating?
-They define how messages are exchanged between the sources and the destination
Which application layer protocol allows users on one network to reliably transfer files to and from a host
on another network?
-FTP
Which OSI reference model layer is responsible for common representation of the data transferred
-Physical (wrong)
-Segment
-Multicast
-Novell NetWare
-AppleTalk
Which two factors influence the method that is used for media access control? (Choose two.)
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
-IEEE
function?
-Protocol suite
What happens to frames that are too long or too short for the channel used?
What organization is responsible for the overall management and development of Internet standards?
-IAB
Which two components are added to the PDU at the network access layer? (Choose two.)
-Trailer
-frame header
Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout
Which organization is responsible for the standard that defines Media Access Control for wired
Ethernet?
-IEEE Which application layer protocol allows users on one network to reliably transfer files to and from a
host on another network?
Which TCP/IP model layer is responsible for providing the best path through the network?
-Internet
-IOS
What three functions are defined by network protocols to allow communication between known source
-data encoding
-message size
-delivery options
What type of protocol describes communication over a data link and the physical transmission of data
devices?
-destination ip address
What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
Which message delivery option is used when all devices need to receive the same message
simultaneously?
-broadcast
A ___________ address is defined as a reserved address that routes packets back to the host
-loopback
Which two statements are true of the deterministic access method?(Choose two.)
Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model?
(Choose two.)
-TCP
-UDP
-light
For which three reasons was a packet switched connectionless data communications technology used
-Data packets can travel through the network using multiple different paths
-it can rapidly adapt to the failure of network devices and communication links
-Network devices dynamically decide on the best available path to forward each packet.
Where is the configuration used during startup on Cisco IOS devices located?
-Startup config
-Scalability
When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the CLI,
-EaSt-2+56(config)#
What command will display a list of keywords available for viewing the status of an IOS switch?
-Switch# show?
-when the end-user device will run an application that requires a dedicated connection to the network
An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given
period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain
-goodput
Which command or key combination allows a user to return to the previous level in the command
hierarchy?
-exit
Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of
-segment
Which area of the network would a college IT staff most likely have to redesign as a direct result of many
students bringing their own tablets and smartphones to school to access school resources?
-wireless LAN
A web client is sending a request for a webpage to a web server. From the perspective of the client,
what is the correct order of the protocol stack that is used to prepare the request for transmission?
-They are the interface between humans and the communication network.
-local delivery
Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.)
-cellular
-satellite
What method can be used by two computers to ensure that packets are not dropped because too much
-flow control
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a
secure environment?
-Use the console port to locally access the switch from a serial or USB interface of the PC.
Which device performs the function of determining the path that messages should take through
internet works?
-a router
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three
-easy to create
What two criteria are used to help select a network medium from various network media? (Choose
two.)
Which two connection options provide an always-on, high-bandwidth Internet connection to computers
-DSL
-cable
An employee at a branch office is creating a quote for a customer. In order to do this, the employee
needs to access confidential pricing information from internal servers at the Head Office. What type of
-an intranet
What process is used to place one message inside another message for transfer from the source to the
destination?
-encapsulation
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file
contains an enable secret password but no console password. When the router boots up, which mode
will display?
Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to
the interface?
-no switchport
The Ethernet __________ sublayer is responsible for communicating directly with the physical layer.
-MAC
A network administrator needs to keep the user ID, password, and session contents private when
establishing remote CLI connectivity with a switch to manage it. Which access method should be
chosen?
-SSH
Which statement describes a characteristic of the frame header fields of the data link layer?
-The branch sites are connected to a central site through point-point links
What is the purpose of the physical link control field in a data link layer header?
Which two engineering organizations define open standards and protocols that apply to the data link
layer?
What type of communication will send a message to all devices on a local area network?
-broadcast
Which term describes the state of a network when the demand on the network resources exceeds the
available capacity?
-congestion
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks
the user to ping the IP address of the default gateway that is configured on the workstation. What is the
On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the _________ MAC
address
-broadcast
Which two statement describe broadcast transmissions on a wired network? (Choose two.)
-Limited broadcasts are only intended for the hosts on a local network
-Directed broadcasts are intended for all hosts on a local or remote network
Answer: FFFF.FFFF.FFFF
Which two functions or operations are performed by the MAC sublayer? (Choose two.)
Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this
prefix, how many bits are available for your organization to create subnetworks?
Answer: 16
Which type of IPv6 address is not routable and used for communication on a single subnet?
-link-local address
-Network
-Host
Which two components are added to the PDU at the network access layer? (Choose two.)
-Trailer
-frame header
What three functions are defined by network protocols to allow communication between known source
-delivery options
-message size
-data encoding
-They define how messages are exchanged between the sources and the destination
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
Answer: IEEE
-IOS
Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout
What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
Which message delivery option is used when all devices need to receive the same message
simultaneously?
-broadcast
A ______ address is defined as a reserved address that routes packets back to the host
-loopback
-Host
-Network
Which two statements are true of the deterministic access method?(Choose two.)
-light
-local delivery
Which two factors influence the method that is used for media access control? (Choose two.)
Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up.
Which TCP header field specifies the number of bytes that can be accepted before an acknowledgement
is required?
What are the primary purposes of the transport layer? (Choose three.)
-Tracking the individual communication between applications on the source and destination hosts
-Segmenting data for and reassembling segmented data into streams of application data at the
destination
-Low overhead
A client is downloading a large file from a server using FTP. Many of the segments are lost during transit.
-The FTP client responds to the server with a smaller window size in the TCP header.
What does UDP do when receiving messages that are more than one datagram in length?
-UDP reassembles that data in the order it was received and passes it to the application
What range of ports can either be used by TCP or UDP to identify the requested service on the
-Connectionless
What three protocols do email users and servers use to process email? (Choose three.)
-IMAP4
-SMTP
-POP3
The TCP/IP application layer effectively consists of which three OSI layers?
-Port
Answer: 0x0806
When transporting data from real-time applications, such as streaming audio and video, which field in
the IPv6 header can be used to inform the routers and switches to maintain the same path for the
-Flow Label
Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?
Which three fields are used in a UDP segment header? (Choose three.)
-Source Port
-Checksum
-Length
During troubleshooting procedures, from which location will most Cisco routers load a limited IOS
-ROM
Answer: 0x0800
How does one compute for the protocol overhead for Ethernet as a percentage?
In a ARP request frame what is the value of the destination mac address field?
Answer: FFFF.FFFF.FFFF
Which two files are loaded into RAM by the router when it boots? (Choose two.)
-startup configuration
-IOS image
-The MTU is passed to the network layer by the data link layer
When a client connects to an HTTP server by the use of a randomly generated source port number, what
destination port number will the HTTP server use when building a response?
-the original source port number that was randomly generated by the client
A collision fragment, also known as __________ frame, is a frame of fewer than 64 bytes in length.
-runt
Which entities are involve in a temporary communication that is established by the transport layer?
-applications
What could be calculated from the formula "Efficiency x Net bit rate"?
-Throughput
What are two functions that are provided by the network layer? (Choose two.)
-Channel utilization
It is the rate of how much data can be processed per second by a switch.
-forwarding rate
Within a production network, what is the purpose of configuring a switch with a default gateway
address?
-The default gateway address is used to forward packets originating from the switch to remote
networks.
During the boot process, in what memory location will the router bootstrap program look for the IOS
-flash
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a
packet?
-Time-to-Live
Which standard specifies the Ethernet MAC sublayer functionality in a computer NIC?
-IEEE 802.2
Answer: 192.168.1.1:80
A user is unable to access the company server from a computer. On issuing the ipconfig command, the
user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?
-experimental
What is the minimum and maximum Ethernet frame size as defined by IEEE 802.3?
Which statement is true about an interface that is configured with the IPv6 address command?
Answer: 01-00-5E-00-00-C8
-SMTP
What are the primary functions associated with data encapsulation at the Ethernet MAC sublayer?
(Choose three.)
-Frame delimiting
-Error detection
-Addressing
Answer: 10.15.25.254
-The vendor is responsible for assigning the last 24 bits of the MAC address.
A network administrator notices that the default gateway devices sends an ICMP Redirect message to
the workstation when the workstation tries to connect to file server on another network. What is the
-To notify the workstation, that another router on the same network, is the better default-gateway to
Answer: FF-FF-FF-FF-FF-FF
At which layers of the OSI model does Ethernet function? (Choose two.)
-Physical
-Data link
Answer: 2001:DB8:0:1470::200
-Frame
What is a group of web pages that groups of individuals can edit and view together called?
-Wiki
-Confidentiality
-Availability
-Integrity
What is a network infrastructure that provides access to other networks over a wide geographic area?
-WAN
What is the primary defense against unauthorized remote access to network devices?
Which of the following are business-class Internet connection technologies normally supplied by a
-Leased lines
-Metro Ethernet
What type of connection to a Cisco IOS switch is used to make the initial configuration?
-Console port
Why would a technician enter the command copy startup-config running config?
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
-Command
A data center has recently updated a physical server to host multiple operating systems on a single CPU.
The data center can now provide each customer with a separate web server without having to allocate
an actual discrete server for each customer. What is the network trend that is being implemented by the
-virtualization
An administrator has just changed the IP address of an interface on an IOS device. What else must be
-Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the
command is typed correctly and the Enter key has been pressed.
A network administer has forgotten the argument of an IOS command. How would the administrator get
-Printer
-Tablet computer
-IP phone
-Server
To save time, IOS commands may be partially entered and then completed by typing which key or key
combination?
-Tab
SwitchA(config-if)# no shutdown
-SVI
An ____________is a private connection of LANs and WANs that belongs to an organization, and is
designed to be accessible only by the members and employees of the organization, or others with
authorization.
-Intranet
Which type of traffic must receive the highest priority from QoS?
-VOIP
What command will display a list of keywords available for viewing the status of an IOS Switch
Switch# show?
A _______ network is able to expand to accept new devices and applications without affecting
performance.
-scalable
When the command "Switch(config)# hostname EaSt-2+56" is entered in a Cisco IOS device using the
EaSt-2+56(config)#
The farther you are from the central office when utilizing a DSL connection, the_______ the connection
speed.
-slower
Which device acts as gateway to allow hosts to send traffic to remote IP networks?
-local router
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
Which technology would be best to provide a home user with a highspeed, always-on Internet
connection?
-DSL
During a routine inspection, a technician discovered that software that was installed on a computer was
secretly collecting data about websites that were visited by users of the computer. Which type of threat
-spyware
What is a wiki?
Which type of network design combines voice, video, and data on the same communication channel?
-a converged network
Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up.
Which message timing factor impacts how much information can be sent and the speed at which it can
be delivered?
-Flow control
Which of the following elements do both human and computer communication systems have in
-Receiver
Which of the following OSI model layers have the same functionality as the network access layer in the
-Data link
-physical
What happens when two devices on the same subnet are communicating?
-They define how messages are exchanged between the sources and the destination
Which application layer protocol allows users on one network to reliably transfer files to and from a host
on another network?
-FTP
Which OSI reference model layer is responsible for common representation of the data transferred
-Physical (wrong)
-Segment
-Multicast
-Novell NetWare
-AppleTalk
Which two factors influence the method that is used for media access control? (Choose two.)
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
-IEEE
function?
-Protocol suite
What happens to frames that are too long or too short for the channel used?
What organization is responsible for the overall management and development of Internet standards?
-IAB
Which two components are added to the PDU at the network access layer? (Choose two.)
-Trailer
-frame header
Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout
Which organization is responsible for the standard that defines Media Access Control for wired
Ethernet?
-IEEE
Which TCP/IP model layer is responsible for providing the best path through the network?
-Internet
-IOS
What three functions are defined by network protocols to allow communication between known source
-data encoding
-message size
-delivery options
What type of protocol describes communication over a data link and the physical transmission of data
devices?
-destination ip address
What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
Which message delivery option is used when all devices need to receive the same message
simultaneously?
-broadcast
A ___________ address is defined as a reserved address that routes packets back to the host
-try loop-back
Which two statements are true of the deterministic access method?(Choose two.)
Which of the following TCP/IP protocols exist at the transport layer of the TCP/IP reference model?
(Choose two.)
-TCP
-UDP
For which three reasons was a packet switched connectionless data communications technology used
-Data packets can travel through the network using multiple different paths
-it can rapidly adapt to the failure of network devices and communication links
-Network devices dynamically decide on the best available path to forward each packet.
Where is the configuration used during startup on Cisco IOS devices located?
-Startup config
-Scalability
When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device using the CLI,
-EaSt-2+56(config)#
What command will display a list of keywords available for viewing the status of an IOS switch?
-Switch# show?
-when the end-user device will run an application that requires a dedicated connection to the network
An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given
period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain
-goodput
Which command or key combination allows a user to return to the previous level in the command
hierarchy?
-exit
Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of
-segment
Which area of the network would a college IT staff most likely have to redesign as a direct result of many
students bringing their own tablets and smartphones to school to access school resources?
-wireless LAN
A web client is sending a request for a webpage to a web server. From the perspective of the client,
what is the correct order of the protocol stack that is used to prepare the request for transmission?
-They are the interface between humans and the communication network.
-local delivery
Which two Internet connection options do not require that physical cables be run to the building?
(Choose two.)
-cellular
-satellite
What method can be used by two computers to ensure that packets are not dropped because too much
-flow control
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a
secure environment?
-Use the console port to locally access the switch from a serial or USB interface of the PC.
Which device performs the function of determining the path that messages should take through
internet works?
-a router
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three
-easy to create
What two criteria are used to help select a network medium from various network media? (Choose
two.)
Which two connection options provide an always-on, high-bandwidth Internet connection to computers
-cable
An employee at a branch office is creating a quote for a customer. In order to do this, the employee
needs to access confidential pricing information from internal servers at the Head Office. What type of
-an intranet
What process is used to place one message inside another message for transfer from the source to the
destination?
-encapsulation
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file
contains an enable secret password but no console password. When the router boots up, which mode
will display?
Which interface command must be entered in a Layer 3 switch before IPv4 address can be assigned to
the interface?
-no switchport
The Ethernet __________ sublayer is responsible for communicating directly with the physical layer.
-MAC
A network administrator needs to keep the user ID, password, and session contents private when
establishing remote CLI connectivity with a switch to manage it. Which access method should be
chosen?
-SSH
Which statement describes a characteristic of the frame header fields of the data link layer?
-The branch sites are connected to a central site through point-point links
What is the purpose of the physical link control field in a data link layer header?
Which two engineering organizations define open standards and protocols that apply to the data link
layer?
What type of communication will send a message to all devices on a local area network?
-broadcast
Which term describes the state of a network when the demand on the network resources exceeds the
available capacity?
-congestion
Which two statements are true regarding the user EXEC mode? (Choose two.)
-This is the default mode on an unconfigured router when first powered up.
be delivered?
-Flow control
Which of the following elements do both human and computer communication systems have in
- Source
-Receiver
Which of the following OSI model layers have the same functionality as the network access layer in the
-Data link
-physical
What happens when two devices on the same subnet are communicating?
-They define how messages are exchanged between the sources and the destination
Which application layer protocol allows users on one network to reliably transfer files to and from a host
on another network?
-FTP
Which OSI reference model layer is responsible for common representation of the data transferred
-Segment
-Multicast
-Novell NetWare
-AppleTalk
Which two factors influence the method that is used for media access control? (Choose two.)
Which organization develops the 802 family of standard for wired and wireless LANs and MANs?
-IEEE
function?
-Protocol suite
What happens to frames that are too long or too short for the channel used?
What organization is responsible for the overall management and development of Internet standards?
-IAB
Which two components are added to the PDU at the network access layer? (Choose two.)
-Trailer
-frame header
Which two message timing mechanisms are used in data communication? (Choose two.)
-flow control
-response timeout
Which organization is responsible for the standard that defines Media Access Control for wired
Ethernet?
-IEEE
Which TCP/IP model layer is responsible for providing the best path through the network?
-Internet
-IOS
What three functions are defined by network protocols to allow communication between known source
-message size
-delivery options
What type of protocol describes communication over a data link and the physical transmission of data
Which organization is responsible for developing communications standards for Voice over IP (VoIP)
devices?
-destination ip address
What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
Which message delivery option is used when all devices need to receive the same message
simultaneously?
broadcast
A ___________ address is defined as a reserved address that routes packets back to the host
-try loop-back
Which two statements are true of the deterministic access method?(Choose two.)
(Choose two.)
-TCP
-UDP
-light
What is a group of web pages that groups of individuals can edit and view together called?
-Wiki
-Confidentiality
-Availability
-Integrity
What is a network infrastructure that provides access to other networks over a wide geographic area?
-WAN
What is the primary defense against unauthorized remote access to network devices?
Which of the following are business-class Internet connection technologies normally supplied by a
-Leased lines
-Metro Ethernet
Why would a network administrator use the CLI of the Cisco IOS?
What type of connection to a Cisco IOS switch is used to make the initial configuration?
-Console port
Why would a technician enter the command copy startup-config running config?
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?
-Command
A data center has recently updated a physical server to host multiple operating systems on a single CPU.
The data center can now provide each customer with a separate web server without having to allocate
an actual discrete server for each customer. What is the network trend that is being implemented by the
-virtualization
An administrator has just changed the IP address of an interface on an IOS device. What else must be
-Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the
command is typed correctly and the Enter key has been pressed.
Which statement describes a feature of an IOS host name configuration?
A network administer has forgotten the argument of an IOS command. How would the administrator get
-Printer
-Tablet computer
-IP phone
-Server
To save time, IOS commands may be partially entered and then completed by typing which key or key
combination?
-Tab
SwitchA(config-if)# no shutdown
-A network where voice, video, and data move over the same infrastructure
An ____________is a private connection of LANs and WANs that belongs to an organization, and is
designed to be accessible only by the members and employees of the organization, or others with
authorization.
-intranet
Which type of traffic must receive the highest priority from QoS?
-VOIP
What command will display a list of keywords available for viewing the status of an IOS Switch
Switch# show?
A _______ network is able to expand to accept new devices and applications without affecting
performance.
-scalable
When the command "Switch(config)# hostname EaSt-2+56" is entered in a Cisco IOS device using the
EaSt-2+56(config)#
The farther you are from the central office when utilizing a DSL connection, the_______ the connection
speed.
slower
-local router
What are two benefits of collaboration and video-on-demand applications? (Choose two.)
Which technology would be best to provide a home user with a highspeed, always-on Internet
connection?
-DSL
During a routine inspection, a technician discovered that software that was installed on a computer was
secretly collecting data about websites that were visited by users of the computer. Which type of threat
spyware
What is a wiki?
Which type of network design combines voice, video, and data on the same communication channel?
a converged network