CN

261 terms by Godsidiotson 

Ready to study?
Start with Flashcards

Create a new folder

Advertisement Upgrade to remove ads

The ____ layer of the TCP/IP model maps to both the Data Link & Physical layer s of the OSI reference model.

a. Transport
b. Internetwork
c. Network Interface
d. Application

C. Network Interface

The _____ layer in the TCP/IP model handles software, or logical, addressing.

a. Network Interface
b. Application
c. Transport
d. Internetwork

D. Internetwork

Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These tables are called _____.

C. ARP tables

_____ provides the same basic functionality as RARP.

a. DHCP
b. HTTP
c. SNMP
d. IP

A. DHCP

The _____ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network layer) connectivity.

a. Find
b. Path
c. Trace
d. Route

C. Trace

A(n) _____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device.

a. SYN flood
b. ICMP flood
c. Ping of Death
d. smurf attack

B. ICMP flood

_____ protocols allow the routers to be updated automatically.

a. Internetwork
b. MAP
c. Routing
d. smurf attack

C. Routing

_____ is the process of assigning unique IP addresses to devices on the network.

a. Virtual addressing
b. Network addressing
c. IP access
d. IP addressing

D. IP addressing

It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is reserved as the _____ address.

a. multicast
b. loopback
c. broadcast
d. unicast

B. Loopback

To determine how many digits are used for the network identifier, you must look at the _____, which is a required component for all IP hosts.

a. subnet mask
b. MAC mask
c. network mask
d. TCP/IP mask

A. Subnet mask

When the host portion of an IP address is all binary zeros, that address is the _____ identifier.

a. subnetwork
b. broadcast
c. class
d. multicast

A. Subnetwork

_____ is based on assigning IP addresses on criteria other than octet boundaries.

a. ARIN
b. IANNA
c. CIDR
d. VLSR

C. CIDR

_____ tell the computer or router which part of an IP address is the network portion & which part is the host portion.

a. CIDR tables
b. Summarization tables
c. Subnet masks
d. Router masks

C. Subnet masks

The decimal number 192 expressed in binary is _____.

a. 10000101
b. 11000000
c. 11010010
d. 11100100

B. 11000000

Although the base _____ numbering system seems foreign at first glance, largely due to the addition of letters, it really is an efficient way to express large numbers such as MAC & IPv6 addresses.

a. 2
b. 16
c. IP2
d. IPNext

B. 16

_____ is the most important layer 3 security protocol.

a. IPSec
b. ARP
c. DNS
d. NAT

A. IPSec

The ____ transition method involves enabling IPv6 on all routers, switches, & end nodes but not disabling IPv4--so both version 4 & version 6 stacks run at the same time.

a. scheduling
b.tunneling
c. dual stack
d. natting

C. Dual stack

Provides TCP/IP host name to IP address resolution.

DNS serivce

A distributed file system developed by Sun Microsystems that allows data to be shared across a network.

NFS

Indicates that a TCP connection is to be terminated without further interaction.

RST

Verifies connectivity between two points

Ping utility

A connectionless protocol that permits remote tracking & management of TCP/IP hosts.

SNMP

Used by TCP to establish a reliable connection between two points.

Three-way handshake

A portion of memory where the device store incoming packets until they can be processed.

Buffer

Contains enough information in its header to be routed through an internetwork.

Routed protocol

Provides IP address to MAC address resolution in a manner similar to that of ARP.

RARP

A classless routing protocol.

OSPF

The next generation of IP

IPv6

Indicates how much of the IP address represents the network or subnet.

Subnet mask

Also known as route aggregation.

Summarization

A global, government-independent entity with overall responsibility for the Internet.

ICANN

Four bits, which is half of a byte.

Nibble

Manages IP addresses in the United States.

ARIN

Developed to slow the exhaustion of IP addresses.

CIDR

A classful routing protocol.

RIP version 1

Routers operate at which layer of the OSI model?

a. Data Link
b. Presentation
c. Session
d. Network

D. Network

Bridges operate at which layer of the OSI model?

a. Network
b. Data Link
c. Session
d. Transport

B. Data Link

Which of the following is a reliable communications protocol?

a. UDP
b. TCP
c. IP
d. ICMP

B. TCP

Which of the following is used by the TFTP protocol?

a. UDP
b. TCP
c. ICMP
d. Telnet

A. UDP

Which of the following is a layer in the TCP/IP protocol? (Choose all that apply)

a. Application
b. Presentation
c. Physical
d. Data Link
e. Internetwork

A. Application
B. Presentation
E. Internetwork

Which of the following is a TCP/IP Application layer protocol? (Choose all that apply)

a. DNS
b. FTP
c. UDP
d. IP
E. ICMP

A. DNS
B. FTP

Which of the following is a TCP/IP Transport layer protocol? (Choose all that apply)

a. ARP
b. RARP
c. IP
d. UDP
e. TCP

D. UDP
E. TCP

What are the well known port numbers?

a. 1024 - 49151
b. 49152 - 65535
c. 0 - 1021
d. 1 - 1023

D. 1 -1023

What is the purpose of the three-way handshake?

A. To establish a reliable connection between points.
B. To establish an unreliable connection between two points
C. To establish a relationship at the Application layer between two points.
D. To establish a relationship at the internetwork layer between two points.

A. To establish a reliable connection between points.

What is an ARP table?

a. Destination & source MAC addresses.
b. MAC & corresponding IP addresses.
c. Destination & Source IP addresses.
d. Routes to networks.

B. MAC & corresponding IP addresses.

What do computers do with the information in an ARP request when they are not the destination IP?

A. Update their ARP caches with the destination information.
B. Update the ARP caches with the source information.
C. Update their routing tables with the ARP information.
D. None of the above

B. Update the ARP caches with the source information.

An ARP request is a _____.

a. Multicast
b. Unicast
c. Broadcast
d. Anycast

C. Broadcast

The IEEE standard that defines port switching designed to shut down a switch port to all frames unless they are authentication frames.

802.1x

The IEEE standard that defines wireless networking in the unlicensed frequency bands 2.4 GHz and 5 GHz.

802.11

An ARP reply is a _____.

a. Multicast
b. Unicast
c. Broadcast
d. Anycast

B. Unicast

RARP has largely been replaced by?

a. BOOTP
b. ARP
c. DHCP
d. DNS

C. DHCP

Ping and Trace both reply on what protocol?

a. SMTP
b. DNS
c. ICMP
d. TFTP

C. ICMP

When sending packets to remote segments, router rely on information in _____.

a. ARP tables
b. Routing tables
c. Switching tables
d. ROM

B. Routing tables

Distance-Vector algorithms & Link-state algorithms are used in _____.

a. DHCP
b. ARP
c. Static Routing
d. Dynamic Routing

D. Dynamic Routing

True or False:

Each interface on a router represents an IP address on a different network.

True

The TCP acknowledgement process is _____.

a. Expectational
b. Sequential
c. Exceptional
d. Sesquicentennial

A. Expectational

Which of the following are not ICMP message types?

a. Echo & destination unreachable
b. Source quench & redirect
c. Relay & reroute
d. Parameter problem & information
e. Timestamp & time exceeded

C. Relay & Reroute

Which layer of Cisco's Three-Layer Hierarchial model provides services such as traffic control & security the network?

a. Access layer
b. Distribution layer
c. Core layer
d. All layers can provide these functions, traffic control & security are not addressed by this model.

B. Distribution layer

A fast ethernet implementation over multimode fiber-optic cabling. The maximum segment length is 412 meters.

100BaseFX

A 100-Mbps fast ethernet implementation that uses four pairs of either Caterory 3, 4, or 5 UTP cable. The maximum segment length is 100 meters.

100BaseT4

A fast ethernet implementation that use two pairs of either Category 5 unshielded twisted-pair (STP). It also operates at the 100 Mbps with a maximum segment distance of 100 meters.

100BaseTX

An IEEE 802.3z Gigabit Ethernet implementation that uses balanced copper cabling to achieve 1000 Mbps.

1000BaseCX

An IEEE 802.3z Gigabit Ethernet implementation that uses single-mode fiber to achieve 1000 Mbps.

1000BaseLX

An IEEE 802.3z Gigabit Ethernet implementation that uses multimode fiber to achieve 1000 Mbps.

1000BaseSX

An IEEE 802.3z Gigabit Ethernet implementation that uses all four pairs of Category 5 or better UTP cable to achieve 1000 Mbps.

1000BaseT

A device that connect multiple nodes and/or networks, is connected to external power, & repeats & regenerates signals on a network.

Active hub

A wireless mode where client devices connect directly to each other without an access point.

Ad hoc mode

Works with 802.1x to carry the authentication information between the user, the access point, & the security server.

Extensible Authentication Protocol (EAP)

True or False:

Routers can choose the best path across an internetwork using dynamic routing techniques.

True

True or False:

Routers work only with routable network protocols; most but not all protocols are routable.

True

A devices that connects network segments but does not perform signal regeneration.

Passive hub

A delay on a network caused by variety of factors, including the addition of devices.

Latency

A network device that uses LEDs or diode lasers to amplify optical signals.

Optical repeater

A 32-bit signal that is sent by the first station to detect a collision on an Ethernet network; ensure that all other stations are aware of the collision.

Jam signal

A wireless mode in which the access point is wired back into a switch so that the client has access to the LAN and WAN, not just the WLAN.

Infrastructure mode

A wireless network with m ultiple access points connected to switches. The access point are typically configured with the same network name (SSID) to facilitate roaming.

Extended Service Set (ESS)

A device that functions as a bridge for nonroutable protocols & a router for routable protocols. Which operate at both the Data Link & Network layers.

Brouter

What is TCP port 20 7& 21?

FTP data transfer

What is TCP port 23?

Telnet

What is TCP port 25?

SMTP

What is TCP & UDP 53?

Domain Name System (DNS)

What is UDP port 67 & 68?

DHCP

What is TCP port 80?

Hypertext Transfer Protocol (HTTP) Web services

What is TCP & UDP port 123?

Network Time Protocol (NTP)

What is TCP port 110?

Post Office Protocol version 3 (POP3)

What is TCP port 119?

Network News Transfer Protocol (NNTP)

What is UDP port 69?

TFTP

What is UDP port 161?

Simple Network Management Protocol (SNMP)

Well known ports are those from ___ thru ____.

1 thru 1,023

Registered ports are those from _____ thru _____.

1,024 thru 49,151

Dynamic/Private ports are those from _____ thru _____.

49,152 thru 65,535

For a class B broadcast, which octets will be completely binary ones?

a. 2nd
b. 2nd & 3rd
c. 1st & 2nd
d. 3rd & 4th

D. 3rd & 4th

Which of the following is a Class A Broadcast?

a. 11.255.255.255
b. 127.75.255.255
c. 193.255.255.255
d. 14.25.255.255

A. 11.255.255.255

Which of the following address classes allows you to borrow a maximum of 14 bits to create a subnet mask?

a. Class A
b. Class B
c. Class C
d. None of the above

B. Class B

Assuming that the address 165.24.3.6 uses the correct default mask, what is the host identifier?

a. 165.24
b. 24.3.6
c. 3
d. 3.6

D. 3.6

What is True regarding IPv6? (Choose all the that apply).

a. Addresses are expressed in binary
b. Addresses are expressed in hexadecimal
c. Its difficult to transition to IPv6
d. IPv6 addresses are 64 bits rather than 32 bits like IPv4 addresses
e. Most Cisco systems support IPv6.

B. Addresses are expressed in hexadecimal
E. Most Cisco systems support IPv6

What are some reason to switch to IPv6?
(Choose all that apply).

a. The equipment costs less.
b. IPv6 is inherently more secure.
c. There is more address space available with IPv6
d. IPv6 will handle NAT configurations automatically
e. Broadcasting will be replaced with multicasting.

B. IPv6 is inherently more secure.
C. There is more address space available with IPv6.
E. Broadcasting will be replaced with multicasting.

True or False:

Routers are slower than other devices because they must analyze a data transmission from the Physical through the Network layer.

True

Network administrators typically access the router directly through the console port (also known as the _____) located on the back of the router.

a. DB-9
b. VTY
c. console
d. AUX

C. Console

The console port connects directly to a PC through a(n) _____ rollover cable.

a. RJ-45 to RJ-10
b. RJ-45 to RJ-45
c. RJ-9 to RJ-45
d. RJ-9 to RJ-10

B. RJ-45 to RJ-45

The _____ port allows a remote administrator to dial into the router through an external modem.

a. auxiliary
b. console
c. virtual
d. terminal

A. Auxiliary

User mode does noe allow you to configure the router. To do this, you must go into the _____ EXEC mode.

a. privileged
b. config
c. user
d. router

A. Privileged

To enter privileged EXEC, you cant type the _____ command at the user mode prompt.

a. sudo

b. setup
c. enable
d. privileged

C. Enable

With _____ configuration mode, you can configure the virtural terminals, console, and AUX lines that let you access the router.

a. global
b. interface
c. router
d. line

D. line

True or False:

The ststem configuration dialog presents a series of prompts that guide you through the inital configuration for the router.

True

True or False:

The content of ROM is maintained even when the router is rebooted.

True

True or False:

Most types of computer equipment perform some type of POST immediately after being turned on.

True

True or False:

There is no copy command that copies between flash and a running or startup configuration file.

True

True or False:

Using CDP can help you quickly determine the network topology.

True

The _____ command is typically used as a legal means of warning anyone who accesses the banner that they will be held accountable.

a. banner legal
b. legal motd
c. banner motd
d. motd on

C. Banner motd

You can configure a description for each of the interfaces physically attached to your router by using the ____ command.

a. banner
b, description
c. motd
d. interface

B. Description

_____ is a special type of RAM that is not cleared when the router is rebooted.

a. DRAM
b. Flash memory
c. ROM
d. NVRAM

D. NVRAM

_____ contains the working copy of the current Cisco IOS and is the component that initalize the IOS for normal router operations.

a. ROM
b. Flash memory
c. DRAM
NVRAM

B. Flash memory

A(n) _____ server is a computer, such as a PC, UNIX workstation, or laptop that is running TFTP server services.

a. Web
b. TCP
c. SSH
d. TFTP

D. TFTP

Somethines the _____ file is referred to as the backup configuration because it is the saved version of the configuration file.

a. rom-config
b. startup-config
c. tftp-config
d. router-config

B. Startup-config

If you want to see your working or running configuration, type _____ at the enable prompt.

a. run running-config
b. show rom-config
d. show running-config

D. show running-config

The command _____ copies the configuration from the TFTP server to the startup configuration.

a. copy run start
b. copy tftp running-config
c. copy tftp startpu-config
d. copy start run

C. copy tftp startup-config

Trace use _____ messages to verify that the desitination host is reachable, and if not give possible reason for the problem.

a. TFTP
b. HTTP
c. IP
d. ICMP

D. ICMP

You can chek the configuration of a specific interface from the encable mode prompt with the ____ command.

a. show interface
b. show ip
c. interfaces ip
d. show interface-config

A. show interface

You can use the _____ command in enable mode to retrieve the statistics that CDP will report on the local router's interfaces.

a. show cdp running
b. show cdp startup
c. show cdp config
d. show cdp interface

D. show cdp interface

You can examine the configuration register by typing _____ at either the enable mode or user mode prompt.

a. show configuration
b. show reg
c. show version
d. show register

C. show version

Specifies that users must log in when they access the console line.

login command

Helps you remember which network the interface services.

Interface description

Network management software used to manage Cisco routers.

Cisco Works

Allow you to configure the Ethernet & serial interfaces on your router.

Interface configuration mode

Editing command that moves the cursor to the geginning ot the current line.

Ctrl + A

The software that interprets the Cisco IOS commands.

EXEC

Basic configuration mode in Cisco IOS

Global configuration mode

Provides a command-line interface (CLI), which allows network operators to check the status of the router and network administrators to manage and configure the router.

Cisco IOS

Message that you can configure to display each time someone attempts to log in to the router.

Banner

The routner configuration file that loads during the boot process.

startup-config

Copies the IOS in flash memory to a TFTP server.

copy flash tftp

Verifies connectivity at the Internetwork layer of the TCP/IP model.

Ping

A simple connection less potocol that is less complex than FTP.

TFTP

One of the most powerful tools you can use to obtain information from your router.

debug command

Diagnostic test that determines if the hardware is opearint correctly.

POST

Cisco proprietary Data Link layer protocol that shares configuration information between Cisco devices that are connected directly to each other.

CDP

Copies the working configuration file in RAM to the startup configuration file in NVRAM.

copy run start

Utility that connects at the highest layer of the OSI model and provides remote access to other devices.

Telnet

The running configuration is also known as the _____.
(Choose all that apply)

a. Startup configuration
b. Working configuration
c. Current configuration
d. Backup configuration

B. Working configuration
C. Current configuration

If you type E? at the router(config) # prompt, What is the result of the command?

A. You will sell a list of usable commands at the Global configuration mode prompt.
B. You will see a list of usable commands at the Global configuration mode prompt that begins with the letter "E".
C. You will see a list of usable commands at any prompt that begins with the letter "E".
D. You will see the configuration register settings.

B. You will see a list of usable commands at the Global configuration mode prompt that begin with the letter "E".

If you need to abort a command in the middle of execution, which key sequence should you press simultaneously?

a. Ctrl + Esc
b. Ctrl + X
c. Ctrl + Shift + 6
d. Ctrl + Alt + Del

C. Ctrl + Shift + 6

Which of the following commands will alllow you to type a banner for your router:

a. Router(config-if)# banner message$
b. Router(config)#banner motd@
c. Router(config)#banner msg#
d. Router#banner config !
e. Router#banner motd#

B. Router(config)#banner motd @

By default, which of the router's components stores the backup configuartion file.

a. ROM
B. Flash
c. ISO
d. NVRAM

D. NVRAM

If you are in global configuration mode, which router prompt will you see?

a. Global#
b. Router(config) #
c. Router(config-if)#
d. Router#
e. Router(config-gl) #

B. Router(config)#

By default (During normal boot operations), Where does the router look first for a working version of the Cisco IOS?

a. NVRAM
b. TFTP
c. Flash
d. ROM

C. Flash

What three commands can you use in privideged EXEC mode to alter the router configuration?

a. setup, erase, & copy
b. Enable, setup, & TFTP
c. setup, show version, and shown burrers
d. erase, copy, & show run

A. setup, erase & copy

From which of the following prompts can your modify the terminal VTY passwrd?

a. Router(config-line)#
b. Router#
c. Router>
d. Router(config)>

A. Router (config-line)#

What does VTY1 stand for?

a. the first virtual Y connector
b. Virtural termainal one
c. Virtural test connection yes on 1 V-Modem terminal 1

B. Virtual terminal one

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set