Looks like no one added any tags here yet for you.
modem
Identify the Intermediary device.
telephone
modem
TV
printer
End Device
The source or destination of a message transmitted over the network.
Router
Intermediary device
End Device
Switch
WAN
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?
Intranet
WAN
LAN
Extranet
Denial of Service
These attacks slow or crash applications and processes on a network device.
Denial of Service
Spyware
Identity Theft
Virus
fiber-optic cable
When data is encoded as pulses of light, which media is being used to transmit the data?
UTP cable
fiber-optic cable
wireless
coaxial cable
Tab
To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
Tab
Ctrl-N
Up Arrow
Ctrl-P
banner motd # Keep out #
Which is the command to configure a banner to be displayed when connecting to a switch?
banner # Keep out #
display # Keep out /
banner motd # Keep out #
login banner @ Keep out #
Telnet/SSH
Which access method would be the most appropriate in-band access to the IOS over a network connection?
HTTP
Telnet/SSH
Aux
Console
Global Configuration Mode
Which IOS mode are you in if the Switch(config)# prompt is displayed?
Global Configuration Mode
Interface subconfiguration Mode
User EXEC Mode
Privileged EXEC Mode
the switch virtual interface
Which interface allows remote management of a Layer 2 switch?
the console port interface
the AUX interface
the switch virtual interface
the first Ethernet port interface
ICMPv4, ICMPv6
Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)
TCP
ICMPv4
ICMPv6
IPv4
segmentation
What is the process of dividing a large data stream into smaller pieces prior to transmission?
duplexing
sequencing
multiplexing
segmentation
False
True or false? The right-most part of an IP address is used to identify the network that a device belongs to.
Network layer addresses are either 32 or 128 bits in length.
Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits.
Data link layer addresses are physical and network layer addresses are logical.
Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.)
Network layer addresses are either 32 or 128 bits in length.
Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits.
Data link layer addresses are physical and network layer addresses are logical.
Data link layer addresses are logical and network layer addresses are physical.
Unicast
Which delivery method is used to transmit information to a single device?
Unicast
Anycast
Multicast
Broadcast
straight-through
Which type of UTP cable is used to connect a PC to a switch port?
console
straight-through
rollover
crossover
the distortion of the transmitted messages from signals carried in adjacent wires
Which characteristic describes crosstalk?
the loss of wireless signal over excessive distance from the access point
the distortion of the network signal from fluorescent lighting
the weakening of the network signal over long cable lengths
the distortion of the transmitted messages from signals carried in adjacent wires
cancellation
What is a characteristic of UTP cabling?
cancellation
woven copper braid or metallic foil
immunity to electrical hazards
cladding
IEEE
Which standards organization oversees development of wireless LAN standards?
ISO
IEEE
IANA
TIA
rollover
What type of cable is used to connect a workstation serial port to a Cisco router console port?
coaxial
rollover
straight-through
crossover
Data that is transmitted over the network flows in one direction at a time.
Which statement describes the half-duplex mode of data transmission?
Data that is transmitted over the network flows in one direction to many different destinations simultaneously.
Data that is transmitted over the network flows in both directions at the same time.
Data that is transmitted over the network can only flow in one direction.
Data that is transmitted over the network flows in one direction at a time.
CSMA/CA
What method is used to manage contention-based access on a wireless network?
priority ordering
token passing
CSMA/CA
CSMA/CD
to identify which network layer protocol is being used
Which is a function of the Logical Link Control (LLC) sublayer?
to identify which network layer protocol is being used
to accept segments and package them into data units that are called packets
to provide data link layer addressing
to define the media access processes that are performed by the hardware
Wireless broadband
Which feature uses the same cellular technology as a smart phone?
Video Communications
Wireless Broadband
Powerline
BYOD
Integrity
Assures users that the information has not been altered in transmission, from origin to destination.
Authentication
Availability
Confidentiality
Integrity
Virus, worm or Trojan Horse
Which option describes malicious code running on user devices?
Firewall
Zero day or Zero hour
Virtual Private Network
Virus, worm or Trojan Horse
Denial of Service
Which attack slows down or crashes equipment and programs?
Virus, worm or Trojan Horse
Denial of Service
Firewall
Zero day or Zero hour
hostname Switch-1-Floor
What is the command to assign the name "Switch-1-Floor" to a switch?
hostname Switch-1-Floor
host name Switch-1-Floor
host Switch-1-Floor
name Switch-1-Floor
configure terminal
From the privileged EXEC mode, access the global configuration mode by entering what command?
configure terminal
line console 0
secret
enable
192.168.0.1
Shell
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
Hardware
Shell
Software
Kernel
banner motd # Warning #
Which is the command to configure a banner to be displayed when connecting to a switch?
banner # Warning #
banner motd # Warning #
display # Warning #
login banner # Warning #
DHCP, DNS
Which two protocols belong in the TCP/IP model application layer?
OSPF
DHCP
EIGRP
DNS
Broadcast
Which delivery method is used to transmit information to all devices?
Multicast
Broadcast
Unicast
Anycast
encapsulation
What is the name of the process of adding protocol information to data as it moves down the protocol stack?
encapsulation
de-encapsulation
segmentation
sequencing
the amount of data that can flow from one place to another in a given amount of time
What is the definition of bandwidth?
the measure of usable data transferred over a given period of time
the amount of data that can flow from one place to another in a given amount of time
the speed at which bits travel on the network
the measure of the transfer of bits across the media over a given period of time
transmitting bits across the local media
What is the purpose of the OSI physical layer?
controlling access to media
transmitting bits across the local media
performing error detection on received frames d. exchanging frames between nodes over physical network media
the measure of the bits transferred across the media over a given period of time
What is indicated by the term throughput?
the measure of the usable data transferred across the media
the guaranteed data transfer rate offered by an ISP
the measure of the bits transferred across the media over a given period of time
the capacity of a particular medium to carry data
They allow for full-duplex connectivity.
Why are two strands of fiber used for a single fiber optic connection?
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.
The two strands allow the data to travel for longer distances without degrading.
It is able to carry signals much farther than copper cabling.
What is one advantage of using fiber optic cabling rather than copper cabling?
It is usually cheaper than copper cabling.
It is able to be installed around sharp bends.
It is easier to terminate and install than copper cabling.
It is able to carry signals much farther than copper cabling.
It accepts Layer 3 packets and encapsulates them into frames., It provides media access control and performs error detection.
What are two services performed by the data link layer of the OSI model? (Choose two.)
It determines the path to forward packets.
It accepts Layer 3 packets and encapsulates them into frames.
It encrypts data packets.
It provides media access control and performs error detection.
MAC address
What identifier is used at the data link layer to uniquely identify an Ethernet device?
IP address
sequence number
MAC address
TCP port number
MAC address
What attribute of a NIC would place it at the data link layer of the OSI model?
IP address
attached Ethernet cable
RJ-45 port
MAC address
International Organization for Standardization (ISO), Electronic Industries Alliance (EIA)
Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)
International Organization for Standardization (ISO)
Internet Assigned Numbers Authority (IANA)
International Telecommunication Union (ITU)
Electronic Industries Alliance (EIA)
Dial Up
An inexpensive option that uses any phone line and a modem and has low bandwidth
Cable
DSL
Dial Up
Satellite
Confidentiality
Means that only the intended and authorized recipients can access and read data.
Integrity
Availability
Authentication
Confidentiality
Cloud Computing
Which feature contains options such as Public, Private, Custom and Hybrid?
BYOD
Smart Home Technology
Cloud Computing
Video Communications
Console
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?
Aux
Console
Telnet
SSH
banner motd # Keep out #
Which is the command to configure a banner to be displayed when connecting to a switch?
banner motd # Keep out #
banner # Keep out #
login banner # Keep out #
display # Keep out #
hostname Sw-Floor-2
What is the command to assign the name "Sw-Floor-2" to a switch?
name Sw-Floor-2
hostname Sw-Floor-2
host Sw-Floor-2
host name Sw-Floor-2
data link
Which protocol stack layer encapsulates data into frames?
transport
network
application
data link
IETF
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. Acronym
Internet Research Task Force (IRTF)
Internet Architecture Board (IAB)
Internet Society (ISOC)
Internet Engineering Task Force (IETF)
subnet mask
What is used to determine the network portion of an IPv4 address?
MAC address
subnet mask
right-most part of the IP address
left-most part of the MAC address
transport
UDP and TCP belong to which layer of the TCP/IP protocol?
network access
application
internet
transport
The end-user device needs mobility when connecting to the network.
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
The end-user device requires a dedicated connection because of performance requirements.
The end-user device needs mobility when connecting to the network.
The end-user device area has a high concentration of RFI.
The end-user device only has an Ethernet NIC.
data link
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
transport
physical
application
data link
to identify which network layer protocol is being used
Which is a function of the Logical Link Control (LLC) sublayer?
to provide data link layer addressing
to define the media access processes that are performed by the hardware
to accept segments and package them into data units that are called packets
to identify which network layer protocol is being used
determines the best path
What does a router do after de-encapsulating a received frame?
determines the best path
de-encapsulates the frame
re-encapsulates the packet into a new frame
forwards the new frame onto the network medium
Powerline
Which feature is being used when connecting a device to the network using an electrical outlet?
Video Communications
Smart Home Technology
BYOD
Powerline
Quality of Service
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?
Fault Tolerance
Security
Scalability
Quality of Service (QoS)
Extranet
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data?
Intranet
WAN
LAN
Extranet
Use the console port to locally access the switch from a serial or USB interface of the PC.
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Use the console port to locally access the switch from a serial or USB interface of the PC.
Use the AUX port to locally access the switch from a serial or USB interface of the PC.
Use Telnet to remotely access the switch through the network.
Use Secure Shell to remotely access the switch through the network.
user EXEC mode
A switch with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the switch boots up, which mode will display?
privileged EXEC mode
global configuration mode
setup mode
user EXEC mode
Kernel
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Software
Hardware
Shell
Kernel
show running-config
What privileged EXEC mode command will you use to show the current configurations that you made?
show latest-config
show startup-config
show bootup-config
show running-config
Multicast
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?
Unicast
Broadcast
Anycast
Multicast
Encoding
What is the process of converting information into the proper form for transmission?
Decoding
Formatting
Encapsulation
Encoding
Ethernet
Which protocol operates at the network access layer of the TCP/IP model?
IP
Ethernet
HTTP
DNS
Next
segment
What is the PDU associated with the transport layer?
bits
segment
packet
frame
DNS, DHCP
Which two protocols are service discovery protocols? (Choose two.)
SSH
TCP
DNS
DHCP
the distortion of the transmitted messages from signals carried in adjacent wires
Which characteristic describes crosstalk?
the distortion of the network signal from fluorescent lighting
the distortion of the transmitted messages from signals carried in adjacent wires
the loss of wireless signal over excessive distance from the access point
the weakening of the network signal over long cable lengths
physical layer
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
data link layer
presentation layer
network layer
physical layer
Logical topologies refer to how a network transfers data between devices.
What is true concerning physical and logical topologies?
Logical topologies refer to how a network transfers data between devices.
Physical topologies are concerned with how a network transfers frames.
Physical topologies display the IP addressing scheme of each network.
The logical topology is always the same as the physical topology.
mesh
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
mesh
hierarchical
bus
ring
MAC, LLC
What are the two sublayers of the OSI model data link layer? (Choose two.)
MAC
internet
physical
LLC
smart phone
Identify the end device.
hub
smart phone
switch
router
Virtual Private Network
Which option creates a secure connection for remote workers?
Firewall
Virus, worm or Trojan Horse
Virtual Private Network
Zero day or Zero hour
Cable
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
Satellite
Cable
DSL
Cellular
BYOD
Which feature describes using personal tools to access information and communicate across a business or campus network?
Video Communications
Cloud Computing
BYOD
Smart Home Technology
User EXEC Mode
Which IOS mode are you in if the Switch> prompt is displayed?
Global Configuration Mode
User EXEC Mode
Interface subconfiguration Mode
Privileged EXEC Mode
keyword
This is a specific parameter defined in the operating system
argument
syntax
code
keyword
The kernel provisions hardware resources to meet software requirements.
What is the function of the kernel of an operating system?
It provides a user interface that allows users to request a specific task.
The kernel provisions hardware resources to meet software requirements.
It is an application that allows the initial configuration of a Cisco device.
The kernel links the hardware drivers with the underlying electronics of a computer.
electric wiring and connectors
What types of standards are developed by the Electronics Industries Alliance (EIA)?
electric wiring and connectors
video compression and broadband communications
radio equipment and cell towers
Voice over IP (VoIP) and satellite communications
twisting opposing circuit wire pairs together
Which procedure is used to reduce the effect of crosstalk in copper cables?
twisting opposing circuit wire pairs together
wrapping the bundle of wires with metallic shielding
designing a cable infrastructure to avoid crosstalk interference
requiring proper grounding connections
the use of full-duplex capable Layer 2 switches
Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?
the use of CSMA/CA
the use of full-duplex capable Layer 2 switches
the development of half-duplex switch operation
the virtually unlimited availability of IPv6 addresses
Satellite
This type of Internet connection is use in areas that would otherwise have no internet connectivity at all.
DSL
Cellular
Cable
Satellite
DSL
Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line.
Satellite
Cable
DSL
Cellular
No centralized administration
What is the disadvantages of peer-to-peer networking
Easy to set up
No centralized administration
Less complex
Less complex
Data interception and theft
This attack captures private information from an organization's network.
Identity Theft
Denial of Service
Data interception and theft
Virus
local router
Which device acts as a gateway to allow hosts to send traffic to remote IP networks?
local switch
local router
DNS server
DHCP server
Global Configuration Mode
Which IOS mode are you in if the Switch(config)# prompt is displayed?
Privileged EXEC Mode
Global Configuration Mode
User EXEC Mode
Interface subconfiguration Mode
It affects the operation of the device immediately when modified.
Which statement is true about the running configuration file in a Cisco IOS device?
It should be deleted using the erase running-config command.
It is automatically saved when the router reboots.
It is stored in NVRAM.
It affects the operation of the device immediately when modified.
dotted-decimal format
What is the structure of an IPv4 address called?
dotted-decimal format
dotted-hexadecimal format
b.dotted-octal format
enable
To move from user EXEC mode to privileged EXEC mode, What command should you use?
secret
configure terminal
enable
line console 0
TCP
This protocol is responsible for guaranteeing the reliable delivery of information.
IP
HTTP
TCP
Ethernet
Routing Protocols, Internet Protocol, Messaging
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)
Routing Protocols
Internet Protocol
File Transfer
Messaging
It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
Which statement correctly describes frame encoding?
It transmits data signals along with a clock signal which occurs at evenly spaced time durations.
It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
It generates the electrical, optical, or wireless signals that represent the binary numbers of the frame.
It uses the characteristic of one wave to modify another wave.
Spyware and Adware
These are types of software which are installed on a user's device. The software then secretly collects information about the user.
Virtual Private Network
Zero day or Zero hour
Firewall
Spyware and Adware
laptop
Identify the end device.
router
switch
laptop
hub
Dedicated Leased Line
Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate
Satellite
Metro Ethernet
Dedicated Leased Line
Business DSL