How can we help?

You can also find more resources in our Help Center.

Study sets matching "ccna 1 chapter 5"

Study sets
Classes
Users

Study sets matching "ccna 1 chapter 5"

17 terms
CCNA 1 Chapter 5 Terms
Ethernet (IEEE 802.3)
LLC
CSMA/CD
CSMA/CA
Most common LAN type in the world
Sublayer that handles the communication between the upper lay…
Used by wired Ethernet to detect if the media is carrying a s…
Used by wireless to resolve collision issues in its network
Ethernet (IEEE 802.3)
Most common LAN type in the world
LLC
Sublayer that handles the communication between the upper lay…
60 terms
CCNA 1 CHAPTER 5
Ethernet operates in the _____________…
The Ethernet protocol standards define…
"The OSI physical layer provides the m…
When messages are sent between hosts o…
data link layer
encoding
Frame
frame
Ethernet operates in the _____________…
data link layer
The Ethernet protocol standards define…
encoding
22 terms
CCNA 1 Chapter 5 v5.0
Which two Internet solutions provide a…
What type of network must a home user…
What are two potential network problem…
What are two functions of intermediary…
DSL... cable
It will send an ARP request for the MAC address of the defaul…
the Internet
They direct data along alternate pathways when there is a lin…
Which two Internet solutions provide a…
DSL... cable
What type of network must a home user…
It will send an ARP request for the MAC address of the defaul…
45 terms
CCNA 1 Chapter 5 Studyguide
What happens to runt frames received b…
What are the two sizes (minimum and ma…
What statement describes Ethernet?
Which two statements describe features…
The frame is dropped.
64 bytes... 1518 bytes
It defines the most common LAN type in the world.
Logical link control is implemented in software.... The data li…
What happens to runt frames received b…
The frame is dropped.
What are the two sizes (minimum and ma…
64 bytes... 1518 bytes
22 terms
CCNA Introduction to Networks Chapter 5
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
A. It will send an ARP request for the…
C. is used for timing synchronization
What is a characteristic of a contention-based access method?…
A host is trying to send a packet to a device on a remote LAN…
What is the purpose of the preamble in an Ethernet frame?... A.…
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
What is a characteristic of a contention-based access method?…
36 terms
Cisco CCNA 1 Chapter 5 2015
Which statement is true about MAC addr…
What is a characteristic of a contenti…
Which two statements describe features…
What is the purpose of the preamble in…
The first three bytes are used by the vendor assigned OUI.
It is a nondeterministic method.
Logical link control is implemented in software.... The data li…
is used for timing synchronization
Which statement is true about MAC addr…
The first three bytes are used by the vendor assigned OUI.
What is a characteristic of a contenti…
It is a nondeterministic method.
30 terms
ccna semester 1 chapter 5
As shown in the figure, the Ethernet M…
Data encapsulation provides three prim…
Media Access Control
contention-based
Data encapsulation... Media access control
Frame delimiting - The framing process provides important del…
Media access control is responsible for the placement of fram…
means that any device can try to transmit data across the sha…
As shown in the figure, the Ethernet M…
Data encapsulation... Media access control
Data encapsulation provides three prim…
Frame delimiting - The framing process provides important del…
37 terms
CCNA Chapter 5 Terms
Frame delimiting
Addressing
Error detection
CSMA/CD (Carrier Sense Multiple Access…
the framing process provides important delimiters that are us…
encapsulation process provides for data link layer addressing…
each Ethernet frame contains a trailer with a CRC of the fram…
the device monitors the media for the presence of a data sign…
Frame delimiting
the framing process provides important delimiters that are us…
Addressing
encapsulation process provides for data link layer addressing…
55 terms
CCNA 2 Chapter 5
Which command is used after sdm prefer…
What does the # 10 in the encapsulatio…
Commands for basic router-on-a-stick s…
A PC is to access a web server on anot…
S1(config)# sdm prefer lanbase-routing
the VLAN ID
multilayer switch with routing enabled - also has more Ethern…
Which command is used after sdm prefer…
S1(config)# sdm prefer lanbase-routing
What does the # 10 in the encapsulatio…
the VLAN ID
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
21 terms
CCNA Chapter 5 discovery 1
How large are IPv4 addresses?
Refer to the graphic. A user at the wo…
Refer to the graphic. NAT and DHCP are…
What is one of the benefits of using N…
32 bits.
The workstation and server are on different logical networks.
10.0.0.17
prevents external users from detecting the IP addresses used…
How large are IPv4 addresses?
32 bits.
Refer to the graphic. A user at the wo…
The workstation and server are on different logical networks.
22 terms
CCNA1 v5.1 Chapter 5
What happens to runt frames received b…
What are the two sizes (minimum and ma…
What statement describes Ethernet?
Which two statements describe features…
The frame is dropped.
64 bytes*... 1518 bytes*
It defines the most common LAN type in the world.
Logical link control is implemented in software.... The data lin…
What happens to runt frames received b…
The frame is dropped.
What are the two sizes (minimum and ma…
64 bytes*... 1518 bytes*
44 terms
CCNA 3 Chapter 5
What is a multiaccess network?
What is an LSA?
Why is a DR and BDR election necessary?
On an OSPF multiaccess network, the fo…
Ethernet LANs with multiple devices on the same shared media
Link-state advertisement
1. creating adjacencies with every router on the same network…
n(n-1)/2... increases adjacencies exponentially
What is a multiaccess network?
Ethernet LANs with multiple devices on the same shared media
What is an LSA?
Link-state advertisement
44 terms
CCNA 3 Chapter 5
What is a multiaccess network?
What is an LSA?
Why is a DR and BDR election necessary?
On an OSPF multiaccess network, the fo…
Ethernet LANs with multiple devices on the same shared media
Link-state advertisement
1. creating adjacencies with every router on the same network…
n(n-1)/2... increases adjacencies exponentially
What is a multiaccess network?
Ethernet LANs with multiple devices on the same shared media
What is an LSA?
Link-state advertisement
38 terms
1,001 CCNA Questions Chapter 5: Basic Router Configuration
162. You wish to disable the Fast Ethe…
163. Which of the following are encaps…
164. You would like to configure the F…
165. You wish to enable the Fast Ether…
A. router(config-if)#shutdown... In order to disable an interfac…
B. PPP... D. HDLC... You can configure the serial interfaces of a C…
A. Use the following commands:... R1#config term... R1(config)#int…
C. R1(config-if)#no shutdown... In order to enable an interface…
162. You wish to disable the Fast Ethe…
A. router(config-if)#shutdown... In order to disable an interfac…
163. Which of the following are encaps…
B. PPP... D. HDLC... You can configure the serial interfaces of a C…
20 terms
Cisco1: CCNA Chapter 5 Exam
Which three statements are true about…
In an IPv4 environment, what informati…
Which intermediary devices could be us…
What type of routing uses information…
-If the destination network is directly connected, the router…
-destination network address
-router... -firewall
-static
Which three statements are true about…
-If the destination network is directly connected, the router…
In an IPv4 environment, what informati…
-destination network address
20 terms
Cisco1: CCNA Chapter 5 Exam
Which three statements are true about…
In an IPv4 environment, what informati…
Which intermediary devices could be us…
What type of routing uses information…
-If the destination network is directly connected, the router…
-destination network address
-router... -firewall
-static
Which three statements are true about…
-If the destination network is directly connected, the router…
In an IPv4 environment, what informati…
-destination network address
20 terms
CCNA 1 Chapter 5 v5.0 Exam
A host is trying to send a packet to a…
Which address or combination of addres…
What are two potential network problem…
What destination address will PC1 incl…
It will send an ARP request for the MAC address of the defaul…
MAC and IP addresses
On large networks with low bandwidth, multiple ARP broadcasts…
0030.a3e5.0401
A host is trying to send a packet to a…
It will send an ARP request for the MAC address of the defaul…
Which address or combination of addres…
MAC and IP addresses
13 terms
CCNA ICND1 100-101 Chapter 5 Key Terms
Connection establishment
Error detection
Error recovery
Flow control
The process by which a connection oriented protocol creates a…
The process of discovering whether a datalink level frame was…
The process of noticing when some transmitted data was not su…
The process of regulating the amount of data sent by a sendin…
Connection establishment
The process by which a connection oriented protocol creates a…
Error detection
The process of discovering whether a datalink level frame was…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
44 terms
CCNA 3 Chapter 5
What is a multiaccess network?
What is an LSA?
Why is a DR and BDR election necessary?
On an OSPF multiaccess network, the fo…
Ethernet LANs with multiple devices on the same shared media
Link-state advertisement
1. creating adjacencies with every router on the same network…
n(n-1)/2... increases adjacencies exponentially
What is a multiaccess network?
Ethernet LANs with multiple devices on the same shared media
What is an LSA?
Link-state advertisement
22 terms
CCNA - Chapter 5
What does VTP advertise?
VTP limits VTP servers and clients to…
What two VTP modes can be used to anno…
Which VTP mode does not learn VTP info…
the vlan (vlan id) command and the name (vlan-name) subcommand
1-1005 with 1002-1005 are reserved for historical reasons
Server or client mode
transparent mode
What does VTP advertise?
the vlan (vlan id) command and the name (vlan-name) subcommand
VTP limits VTP servers and clients to…
1-1005 with 1002-1005 are reserved for historical reasons
22 terms
CCNA Introduction to Networks Chapter 5
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
A. It will send an ARP request for the…
C. is used for timing synchronization
What is a characteristic of a contention-based access method?…
A host is trying to send a packet to a device on a remote LAN…
What is the purpose of the preamble in an Ethernet frame?... A.…
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
What is a characteristic of a contention-based access method?…
27 terms
CCNA 2 Chapter 5 (SUNILYC)
Characteristics of router-on-a-stick:
Which command is used after sdm prefer…
A PC is to access a web server on anot…
Define inter-VLAN routing:
* a single physical router interface is configured as a trunk…
S1(config)# sdm prefer lanbase-routing
multilayer switch with routing enabled - also has more Ethern…
the process of forwarding network traffic from one VLAN to an…
Characteristics of router-on-a-stick:
* a single physical router interface is configured as a trunk…
Which command is used after sdm prefer…
S1(config)# sdm prefer lanbase-routing
28 terms
CCNA Chapter 5 Review
Routers operate at the Application lay…
In addition to the AUX and the console…
The system configuration dialog presen…
The enable password is stored in an en…
False
True
False
True
Routers operate at the Application lay…
False
In addition to the AUX and the console…
True
26 terms
CCNA Voice Chapter 5
What are the three core telephony serv…
Explain the command for configuring th…
Explain the command for configuring th…
Explain the command for configuring th…
• IP Source Address... • Max-DN... • Max-Ephones
the "ip source-address" command enables the router to know wh…
"max-dn ?"... specifies the maximum number of directory numbers.
"max-ephones ?"... configures the maximum number of IP phones t…
What are the three core telephony serv…
• IP Source Address... • Max-DN... • Max-Ephones
Explain the command for configuring th…
the "ip source-address" command enables the router to know wh…
12 terms
CCNA 3 Chapter 5
Broadcast Storm
Broadcast Packet
Spanning Tree Protocol (STP)
Spanning Tree Algorithm (STA)
Happens when a bunch of broadcast frames get caught in a Laye…
A packet that is addressed to and sent to all the computers o…
A switching protocol that prevents traffic loops by calculati…
Determines which switchports on a network need to be configur…
Broadcast Storm
Happens when a bunch of broadcast frames get caught in a Laye…
Broadcast Packet
A packet that is addressed to and sent to all the computers o…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
16 terms
CCNA Chapter 5
What happens to runt frames received a…
The minimum and maximum size of an Eth…
Ethernet
Features/functions of the logical link…
the frame is dropped
64 bytes; 1518 bytes
the most common LAN type in the world
logical link control is implemented in software, the data lin…
What happens to runt frames received a…
the frame is dropped
The minimum and maximum size of an Eth…
64 bytes; 1518 bytes
37 terms
ccna 3 chapter 5
A network administrator has just chang…
Which two pieces of information are us…
When checking a routing table, a netwo…
Which command will a network engineer…
Issue the clear ip ospf process privileged mode command.
OSPF message... secret key
This route is a propagated default route.
show ip ospf interface serial 0/0/0
A network administrator has just chang…
Issue the clear ip ospf process privileged mode command.
Which two pieces of information are us…
OSPF message... secret key
22 terms
CCNA Introduction to Networks Chapter 5
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
A. It will send an ARP request for the…
C. is used for timing synchronization
What is a characteristic of a contention-based access method?…
A host is trying to send a packet to a device on a remote LAN…
What is the purpose of the preamble in an Ethernet frame?... A.…
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
What is a characteristic of a contention-based access method?…
18 terms
CCNA 1 CH 5
A host is trying to send a packet to a…
Which address or combination of addres…
What are two potential network problem…
How does adding an Ethernet line card…
It will send an ARP request for the MAC address of the defaul…
MAC and IP addresses
On large networks with low bandwidth, multiple ARP broadcasts…
by expanding the port density*
A host is trying to send a packet to a…
It will send an ARP request for the MAC address of the defaul…
Which address or combination of addres…
MAC and IP addresses
10 terms
CCNA Chapter 5 Q
Which two functions or operations are…
Which interface command must be entere…
On Ethernet networks, the hexadecimal…
The Ethernet _____________... sublayer i…
1. It is responsible for Media Access Control. ... 2. It adds a…
no switchport
broadcast
MAC
Which two functions or operations are…
1. It is responsible for Media Access Control. ... 2. It adds a…
Which interface command must be entere…
no switchport
48 terms
CCNA 3 Chapter 5 STP
path cost
Spanning Tree Protocol
Bridge Protocol Data Unit (BPDU)
Spanning Tree Algorithm
The cumulative STP cost from a device to the root bridge; it…
Protocol developed in 1990 by Radia Perlman to address the is…
A Spanning Tree Protocol Ethernet frame that is sent out at r…
Used to determine which switch ports on a network need to be…
path cost
The cumulative STP cost from a device to the root bridge; it…
Spanning Tree Protocol
Protocol developed in 1990 by Radia Perlman to address the is…
14 terms
CCNA 4 CHAPTER 5
Network Address Translation (NAT)
Address
Public Address
Inside Local Address
an Internet standard that enables a local-area network (LAN)…
assigned to a device
NAT provides the translation of private addresses to public a…
...
Network Address Translation (NAT)
an Internet standard that enables a local-area network (LAN)…
Address
assigned to a device
13 terms
chapter 5 ccna
A network administrator has just chang…
When checking a routing table, a netwo…
Which command will a network engineer…
A network engineer has manually config…
Issue the clear ip ospf process privileged mode command.
This route is a propagated default route.
show ip ospf interface serial 0/0/0
The dead interval will now be 60 seconds.
A network administrator has just chang…
Issue the clear ip ospf process privileged mode command.
When checking a routing table, a netwo…
This route is a propagated default route.
22 terms
CCNA Introduction to Networks Chapter 5
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
A. It will send an ARP request for the…
C. is used for timing synchronization
What is a characteristic of a contention-based access method?…
A host is trying to send a packet to a device on a remote LAN…
What is the purpose of the preamble in an Ethernet frame?... A.…
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
What is a characteristic of a contention-based access method?…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
48 terms
Cisco CCENT/CCNA ICND1 100-101 Chapter 5
What are some of the important functio…
What is the key difference between TCP…
What are the advantages of UDP?
What are some of TCP/IP Transport Laye…
error recovery and flow control
TCP provides a wide variety of services to applications, wher…
By providing fewer services, UDP needs fewer bytes in its hea…
Multiplexing using ports... Error recovery (reliability) ... Flow…
What are some of the important functio…
error recovery and flow control
What is the key difference between TCP…
TCP provides a wide variety of services to applications, wher…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
61 terms
CCNA 3 Chapter 5: STP
Time-to-live (TTL)
Broadcast storm
Duplicate unicast frames
Wiring closet loops
The amount of time for data to live. A limit set on the time…
When so many broadcast frames are caught in a layer 2 loop th…
A unicast frame sent across a network with redundant paths wi…
If two connections a switch are connected to another switch,…
Time-to-live (TTL)
The amount of time for data to live. A limit set on the time…
Broadcast storm
When so many broadcast frames are caught in a layer 2 loop th…
22 terms
CCNA Voice (Chapter 5)
IP phone boot process review
CME, DHCP, and TFTP can all be seperat…
Why is it usually a good idea to at le…
Router TFTP server configuration
1.) Phone powers on (802.3af PoE from switch)... 2.) Switch send…
~
Saves flash space, some configs can be up to 40Mb
#dir flash:/phone/7490-7960... #conf t... #tftp-server flash:/phone…
IP phone boot process review
1.) Phone powers on (802.3af PoE from switch)... 2.) Switch send…
CME, DHCP, and TFTP can all be seperat…
~
34 terms
CCNA 2 CHAPTER 5
What do L2 switches not provide?
Process of forwarding traffic from one…
How is legacy inter-VLAN routing perfo…
router config where single physical ro…
dynamic routing
inter-VLAN routing
parallel links to build trunks
router on a stick
What do L2 switches not provide?
dynamic routing
Process of forwarding traffic from one…
inter-VLAN routing
21 terms
CCNA 1 Chapter 1 Vocabulary
Congestion
Blog
Collaboration Tool
Podcast
Describes the state of a network when the demand on the netwo…
Type of websites that gives anyone a means to communicate the…
Something that helps people work together on a particular fil…
Audio-based medium that allows people to deliver their record…
Congestion
Describes the state of a network when the demand on the netwo…
Blog
Type of websites that gives anyone a means to communicate the…
22 terms
CCNA Introduction to Networks Chapter 5
Just type something and say its right
What is a characteristic of a contenti…
A host is trying to send a packet to a…
What is the purpose of the preamble in…
- Field 2 -... - Field 4 -... - Field 6 -... - Not Used -... - Beginning…
A. It is a nondeterministic method.
A. It will send an ARP request for the MAC address of the def…
C. is used for timing synchronization
Just type something and say its right
- Field 2 -... - Field 4 -... - Field 6 -... - Not Used -... - Beginning…
What is a characteristic of a contenti…
A. It is a nondeterministic method.
22 terms
CCNA Chapter 5 Test
What happens to runt frames received b…
What are the two sizes (minimum and ma…
What statement describes Ethernet?
Which two statements describe features…
The frame is dropped
64 and 1518
It defines the most common lan type in the world
Logical link control is embedded in the software and the data…
What happens to runt frames received b…
The frame is dropped
What are the two sizes (minimum and ma…
64 and 1518
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
20 terms
CCNA Chapter 5 Study Guide
What happens to runt frames received b…
What are the two sizes (minimum and ma…
What statement describes Ethernet?
Which two statements describe features…
The frame is dropped.
64 bytes... 1518 bytes*
It defines the most common LAN type in the world
Logical link control is implemented in software... The data lin…
What happens to runt frames received b…
The frame is dropped.
What are the two sizes (minimum and ma…
64 bytes... 1518 bytes*
27 terms
CCNA Security Chapter 5
What is the Cisco Configuration Profes…
What are the options for the applicati…
What are the toolbar tools?
What does the home button do?
An application that can be run from the computer. Provides a…
Manage Community... Setup New Device... Create user profile... Import…
Home Button... Configure Button... Monitor Button... Manage Community…
Displays the community view page. Summarizes community inform…
What is the Cisco Configuration Profes…
An application that can be run from the computer. Provides a…
What are the options for the applicati…
Manage Community... Setup New Device... Create user profile... Import…
1 of 10