Formative 1

studied byStudied by 8 people
0.0(0)
get a hint
hint

modem

1 / 123

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

124 Terms

1

modem

Identify the Intermediary device.

  • telephone

  • modem

  • TV

  • printer

New cards
2

End Device

The source or destination of a message transmitted over the network.

  • Router

  • Intermediary device

  • End Device

  • Switch

New cards
3

WAN

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?

  • Intranet

  • WAN

  • LAN

  • Extranet

New cards
4

Denial of Service

These attacks slow or crash applications and processes on a network device.

  • Denial of Service

  • Spyware

  • Identity Theft

  • Virus

New cards
5

fiber-optic cable

When data is encoded as pulses of light, which media is being used to transmit the data?

  • UTP cable

  • fiber-optic cable

  • wireless

  • coaxial cable

New cards
6

Tab

To save time, IOS commands may be partially entered and then completed by typing which key or key combination?

  • Tab

  • Ctrl-N

  • Up Arrow

  • Ctrl-P

New cards
7

banner motd # Keep out #

Which is the command to configure a banner to be displayed when connecting to a switch?

  • banner # Keep out #

  • display # Keep out /

  • banner motd # Keep out #

  • login banner @ Keep out #

New cards
8

Telnet/SSH

Which access method would be the most appropriate in-band access to the IOS over a network connection?

  • HTTP

  • Telnet/SSH

  • Aux

  • Console

New cards
9

Global Configuration Mode

Which IOS mode are you in if the Switch(config)# prompt is displayed?

  • Global Configuration Mode

  • Interface subconfiguration Mode

  • User EXEC Mode

  • Privileged EXEC Mode

New cards
10

the switch virtual interface

Which interface allows remote management of a Layer 2 switch?

  • the console port interface

  • the AUX interface

  • the switch virtual interface

  • the first Ethernet port interface

New cards
11

ICMPv4, ICMPv6

Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)

  • TCP

  • ICMPv4

  • ICMPv6

  • IPv4

New cards
12

segmentation

What is the process of dividing a large data stream into smaller pieces prior to transmission?

  • duplexing

  • sequencing

  • multiplexing

  • segmentation

New cards
13

False

True or false? The right-most part of an IP address is used to identify the network that a device belongs to.

New cards
14

Network layer addresses are either 32 or 128 bits in length.

Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits.

Data link layer addresses are physical and network layer addresses are logical.

Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.)

  • Network layer addresses are either 32 or 128 bits in length.

  • Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits.

  • Data link layer addresses are physical and network layer addresses are logical.

  • Data link layer addresses are logical and network layer addresses are physical.

New cards
15

Unicast

Which delivery method is used to transmit information to a single device?

  • Unicast

  • Anycast

  • Multicast

  • Broadcast

New cards
16

straight-through

Which type of UTP cable is used to connect a PC to a switch port?

  • console

  • straight-through

  • rollover

  • crossover

New cards
17

the distortion of the transmitted messages from signals carried in adjacent wires

Which characteristic describes crosstalk?

  • the loss of wireless signal over excessive distance from the access point

  • the distortion of the network signal from fluorescent lighting

  • the weakening of the network signal over long cable lengths

  • the distortion of the transmitted messages from signals carried in adjacent wires

New cards
18

cancellation

What is a characteristic of UTP cabling?

  • cancellation

  • woven copper braid or metallic foil

  • immunity to electrical hazards

  • cladding

New cards
19

IEEE

Which standards organization oversees development of wireless LAN standards?

  • ISO

  • IEEE

  • IANA

  • TIA

New cards
20

rollover

What type of cable is used to connect a workstation serial port to a Cisco router console port?

  • coaxial

  • rollover

  • straight-through

  • crossover

New cards
21

Data that is transmitted over the network flows in one direction at a time.

Which statement describes the half-duplex mode of data transmission?

  • Data that is transmitted over the network flows in one direction to many different destinations simultaneously.

  • Data that is transmitted over the network flows in both directions at the same time.

  • Data that is transmitted over the network can only flow in one direction.

  • Data that is transmitted over the network flows in one direction at a time.

New cards
22

CSMA/CA

What method is used to manage contention-based access on a wireless network?

  • priority ordering

  • token passing

  • CSMA/CA

  • CSMA/CD

New cards
23

to identify which network layer protocol is being used

Which is a function of the Logical Link Control (LLC) sublayer?

  • to identify which network layer protocol is being used

  • to accept segments and package them into data units that are called packets

  • to provide data link layer addressing

  • to define the media access processes that are performed by the hardware

New cards
24

Wireless broadband

Which feature uses the same cellular technology as a smart phone?

  • Video Communications

  • Wireless Broadband

  • Powerline

  • BYOD

New cards
25

Integrity

Assures users that the information has not been altered in transmission, from origin to destination.

  • Authentication

  • Availability

  • Confidentiality

  • Integrity

New cards
26

Virus, worm or Trojan Horse

Which option describes malicious code running on user devices?

  • Firewall

  • Zero day or Zero hour

  • Virtual Private Network

  • Virus, worm or Trojan Horse

New cards
27

Denial of Service

Which attack slows down or crashes equipment and programs?

  • Virus, worm or Trojan Horse

  • Denial of Service

  • Firewall

  • Zero day or Zero hour

New cards
28

hostname Switch-1-Floor

What is the command to assign the name "Switch-1-Floor" to a switch?

  • hostname Switch-1-Floor

  • host name Switch-1-Floor

  • host Switch-1-Floor

  • name Switch-1-Floor

New cards
29

configure terminal

From the privileged EXEC mode, access the global configuration mode by entering what command?

  • configure terminal

  • line console 0

  • secret

  • enable

New cards
30

192.168.0.1

What is the correct format for IPv4 address?

192:168:1:4

192.168.0.1

aa.ab.cd.af

AB-CD-EF-10

New cards
31

Shell

The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

  • Hardware

  • Shell

  • Software

  • Kernel

New cards
32

banner motd # Warning #

Which is the command to configure a banner to be displayed when connecting to a switch?

  • banner # Warning #

  • banner motd # Warning #

  • display # Warning #

  • login banner # Warning #

New cards
33

DHCP, DNS

Which two protocols belong in the TCP/IP model application layer?

  • OSPF

  • DHCP

  • EIGRP

  • DNS

New cards
34

Broadcast

Which delivery method is used to transmit information to all devices?

  • Multicast

  • Broadcast

  • Unicast

  • Anycast

New cards
35

encapsulation

What is the name of the process of adding protocol information to data as it moves down the protocol stack?

  • encapsulation

  • de-encapsulation

  • segmentation

  • sequencing

New cards
36

the amount of data that can flow from one place to another in a given amount of time

What is the definition of bandwidth?

  • the measure of usable data transferred over a given period of time

  • the amount of data that can flow from one place to another in a given amount of time

  • the speed at which bits travel on the network

  • the measure of the transfer of bits across the media over a given period of time

New cards
37

transmitting bits across the local media

What is the purpose of the OSI physical layer?

  • controlling access to media

  • transmitting bits across the local media

  • performing error detection on received frames d. exchanging frames between nodes over physical network media

New cards
38

the measure of the bits transferred across the media over a given period of time

What is indicated by the term throughput?

  • the measure of the usable data transferred across the media

  • the guaranteed data transfer rate offered by an ISP

  • the measure of the bits transferred across the media over a given period of time

  • the capacity of a particular medium to carry data

New cards
39

They allow for full-duplex connectivity.

Why are two strands of fiber used for a single fiber optic connection?

  • They prevent crosstalk from causing interference on the connection.

  • They increase the speed at which the data can travel.

  • They allow for full-duplex connectivity.

  • The two strands allow the data to travel for longer distances without degrading.

New cards
40

It is able to carry signals much farther than copper cabling.

What is one advantage of using fiber optic cabling rather than copper cabling?

  • It is usually cheaper than copper cabling.

  • It is able to be installed around sharp bends.

  • It is easier to terminate and install than copper cabling.

  • It is able to carry signals much farther than copper cabling.

New cards
41

It accepts Layer 3 packets and encapsulates them into frames., It provides media access control and performs error detection.

What are two services performed by the data link layer of the OSI model? (Choose two.)

  • It determines the path to forward packets.

  • It accepts Layer 3 packets and encapsulates them into frames.

  • It encrypts data packets.

  • It provides media access control and performs error detection.

New cards
42

MAC address

What identifier is used at the data link layer to uniquely identify an Ethernet device?

  • IP address

  • sequence number

  • MAC address

  • TCP port number

New cards
43

MAC address

What attribute of a NIC would place it at the data link layer of the OSI model?

  • IP address

  • attached Ethernet cable

  • RJ-45 port

  • MAC address

New cards
44

International Organization for Standardization (ISO), Electronic Industries Alliance (EIA)

Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)

  • International Organization for Standardization (ISO)

  • Internet Assigned Numbers Authority (IANA)

  • International Telecommunication Union (ITU)

  • Electronic Industries Alliance (EIA)

New cards
45

Dial Up

An inexpensive option that uses any phone line and a modem and has low bandwidth

  • Cable

  • DSL

  • Dial Up

  • Satellite

New cards
46

Confidentiality

Means that only the intended and authorized recipients can access and read data.

  • Integrity

  • Availability

  • Authentication

  • Confidentiality

New cards
47

Cloud Computing

Which feature contains options such as Public, Private, Custom and Hybrid?

  • BYOD

  • Smart Home Technology

  • Cloud Computing

  • Video Communications

New cards
48

Console

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?

  • Aux

  • Console

  • Telnet

  • SSH

New cards
49

banner motd # Keep out #

Which is the command to configure a banner to be displayed when connecting to a switch?

  • banner motd # Keep out #

  • banner # Keep out #

  • login banner # Keep out #

  • display # Keep out #

New cards
50

hostname Sw-Floor-2

What is the command to assign the name "Sw-Floor-2" to a switch?

  • name Sw-Floor-2

  • hostname Sw-Floor-2

  • host Sw-Floor-2

  • host name Sw-Floor-2

New cards
51

data link

Which protocol stack layer encapsulates data into frames?

  • transport

  • network

  • application

  • data link

New cards
52

IETF

This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones. Acronym

  • Internet Research Task Force (IRTF)

  • Internet Architecture Board (IAB)

  • Internet Society (ISOC)

  • Internet Engineering Task Force (IETF)

New cards
53

subnet mask

What is used to determine the network portion of an IPv4 address?

  • MAC address

  • subnet mask

  • right-most part of the IP address

  • left-most part of the MAC address

New cards
54

transport

UDP and TCP belong to which layer of the TCP/IP protocol?

  • network access

  • application

  • internet

  • transport

New cards
55

The end-user device needs mobility when connecting to the network.

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

  • The end-user device requires a dedicated connection because of performance requirements.

  • The end-user device needs mobility when connecting to the network.

  • The end-user device area has a high concentration of RFI.

  • The end-user device only has an Ethernet NIC.

New cards
56

data link

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

  • transport

  • physical

  • application

  • data link

New cards
57

to identify which network layer protocol is being used

Which is a function of the Logical Link Control (LLC) sublayer?

  • to provide data link layer addressing

  • to define the media access processes that are performed by the hardware

  • to accept segments and package them into data units that are called packets

  • to identify which network layer protocol is being used

New cards
58

determines the best path

What does a router do after de-encapsulating a received frame?

  • determines the best path

  • de-encapsulates the frame

  • re-encapsulates the packet into a new frame

  • forwards the new frame onto the network medium

New cards
59

Powerline

Which feature is being used when connecting a device to the network using an electrical outlet?

  • Video Communications

  • Smart Home Technology

  • BYOD

  • Powerline

New cards
60

Quality of Service

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

  • Fault Tolerance

  • Security

  • Scalability

  • Quality of Service (QoS)

New cards
61

Extranet

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data?

  • Intranet

  • WAN

  • LAN

  • Extranet

New cards
62

Use the console port to locally access the switch from a serial or USB interface of the PC.

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

  • Use the console port to locally access the switch from a serial or USB interface of the PC.

  • Use the AUX port to locally access the switch from a serial or USB interface of the PC.

  • Use Telnet to remotely access the switch through the network.

  • Use Secure Shell to remotely access the switch through the network.

New cards
63

user EXEC mode

A switch with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the switch boots up, which mode will display?

  • privileged EXEC mode

  • global configuration mode

  • setup mode

  • user EXEC mode

New cards
64

Kernel

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

  • Software

  • Hardware

  • Shell

  • Kernel

New cards
65

show running-config

What privileged EXEC mode command will you use to show the current configurations that you made?

  • show latest-config

  • show startup-config

  • show bootup-config

  • show running-config

New cards
66

Multicast

Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?

  • Unicast

  • Broadcast

  • Anycast

  • Multicast

New cards
67

Encoding

What is the process of converting information into the proper form for transmission?

  • Decoding

  • Formatting

  • Encapsulation

  • Encoding

New cards
68

Ethernet

Which protocol operates at the network access layer of the TCP/IP model?

  • IP

  • Ethernet

  • HTTP

  • DNS

  • Next

New cards
69

segment

What is the PDU associated with the transport layer?

  • bits

  • segment

  • packet

  • frame

New cards
70

DNS, DHCP

Which two protocols are service discovery protocols? (Choose two.)

  • SSH

  • TCP

  • DNS

  • DHCP

New cards
71

the distortion of the transmitted messages from signals carried in adjacent wires

Which characteristic describes crosstalk?

  • the distortion of the network signal from fluorescent lighting

  • the distortion of the transmitted messages from signals carried in adjacent wires

  • the loss of wireless signal over excessive distance from the access point

  • the weakening of the network signal over long cable lengths

New cards
72

physical layer

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

  • data link layer

  • presentation layer

  • network layer

  • physical layer

New cards
73

Logical topologies refer to how a network transfers data between devices.

What is true concerning physical and logical topologies?

  • Logical topologies refer to how a network transfers data between devices.

  • Physical topologies are concerned with how a network transfers frames.

  • Physical topologies display the IP addressing scheme of each network.

  • The logical topology is always the same as the physical topology.

New cards
74

mesh

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

  • mesh

  • hierarchical

  • bus

  • ring

New cards
75

MAC, LLC

What are the two sublayers of the OSI model data link layer? (Choose two.)

  • MAC

  • internet

  • physical

  • LLC

New cards
76

smart phone

Identify the end device.

  • hub

  • smart phone

  • switch

  • router

New cards
77

Virtual Private Network

Which option creates a secure connection for remote workers?

  • Firewall

  • Virus, worm or Trojan Horse

  • Virtual Private Network

  • Zero day or Zero hour

New cards
78

Cable

Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.

  • Satellite

  • Cable

  • DSL

  • Cellular

New cards
79

BYOD

Which feature describes using personal tools to access information and communicate across a business or campus network?

  1. Video Communications

  2. Cloud Computing

  3. BYOD

  4. Smart Home Technology

New cards
80

User EXEC Mode

Which IOS mode are you in if the Switch> prompt is displayed?

  • Global Configuration Mode

  • User EXEC Mode

  • Interface subconfiguration Mode

  • Privileged EXEC Mode

New cards
81

keyword

This is a specific parameter defined in the operating system

  • argument

  • syntax

  • code

  • keyword

New cards
82

The kernel provisions hardware resources to meet software requirements.

What is the function of the kernel of an operating system?

  • It provides a user interface that allows users to request a specific task.

  • The kernel provisions hardware resources to meet software requirements.

  • It is an application that allows the initial configuration of a Cisco device.

  • The kernel links the hardware drivers with the underlying electronics of a computer.

New cards
83

electric wiring and connectors

What types of standards are developed by the Electronics Industries Alliance (EIA)?

  • electric wiring and connectors

  • video compression and broadband communications

  • radio equipment and cell towers

  • Voice over IP (VoIP) and satellite communications

New cards
84

twisting opposing circuit wire pairs together

Which procedure is used to reduce the effect of crosstalk in copper cables?

  • twisting opposing circuit wire pairs together

  • wrapping the bundle of wires with metallic shielding

  • designing a cable infrastructure to avoid crosstalk interference

  • requiring proper grounding connections

New cards
85

the use of full-duplex capable Layer 2 switches

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?

  • the use of CSMA/CA

  • the use of full-duplex capable Layer 2 switches

  • the development of half-duplex switch operation

  • the virtually unlimited availability of IPv6 addresses

New cards
86

Satellite

This type of Internet connection is use in areas that would otherwise have no internet connectivity at all.

  • DSL

  • Cellular

  • Cable

  • Satellite

New cards
87

DSL

Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line.

  • Satellite

  • Cable

  • DSL

  • Cellular

New cards
88

No centralized administration

What is the disadvantages of peer-to-peer networking

  • Easy to set up

  • No centralized administration

  • Less complex

  • Less complex

New cards
89

Data interception and theft

This attack captures private information from an organization's network.

  • Identity Theft

  • Denial of Service

  • Data interception and theft

  • Virus

New cards
90

local router

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

  • local switch

  • local router

  • DNS server

  • DHCP server

New cards
91

Global Configuration Mode

Which IOS mode are you in if the Switch(config)# prompt is displayed?

  • Privileged EXEC Mode

  • Global Configuration Mode

  • User EXEC Mode

  • Interface subconfiguration Mode

New cards
92

It affects the operation of the device immediately when modified.

Which statement is true about the running configuration file in a Cisco IOS device?

  • It should be deleted using the erase running-config command.

  • It is automatically saved when the router reboots.

  • It is stored in NVRAM.

  • It affects the operation of the device immediately when modified.

New cards
93

dotted-decimal format

What is the structure of an IPv4 address called?

  • dotted-decimal format

  • dotted-hexadecimal format
    b.dotted-octal format

New cards
94

enable

To move from user EXEC mode to privileged EXEC mode, What command should you use?

  • secret

  • configure terminal

  • enable

  • line console 0

New cards
95

TCP

This protocol is responsible for guaranteeing the reliable delivery of information.

  • IP

  • HTTP

  • TCP

  • Ethernet

New cards
96

Routing Protocols, Internet Protocol, Messaging

Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)

  • Routing Protocols

  • Internet Protocol

  • File Transfer

  • Messaging

New cards
97

It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.

Which statement correctly describes frame encoding?

  • It transmits data signals along with a clock signal which occurs at evenly spaced time durations.

  • It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.

  • It generates the electrical, optical, or wireless signals that represent the binary numbers of the frame.

  • It uses the characteristic of one wave to modify another wave.

New cards
98

Spyware and Adware

These are types of software which are installed on a user's device. The software then secretly collects information about the user.

  • Virtual Private Network

  • Zero day or Zero hour

  • Firewall

  • Spyware and Adware

New cards
99

laptop

Identify the end device.

  • router

  • switch

  • laptop

  • hub

New cards
100

Dedicated Leased Line

Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate

  • Satellite

  • Metro Ethernet

  • Dedicated Leased Line

  • Business DSL

New cards