How can we help?

You can also find more resources in our Help Center.

Study sets matching "ccna chapter 5"

Study sets
Classes
Users

Study sets matching "ccna chapter 5"

22 terms
CCNA Introduction to Networks Chapter 5
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
A. It will send an ARP request for the…
C. is used for timing synchronization
What is a characteristic of a contention-based access method?…
A host is trying to send a packet to a device on a remote LAN…
What is the purpose of the preamble in an Ethernet frame?... A.…
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
What is a characteristic of a contention-based access method?…
55 terms
CCNA 2 Chapter 5
Which command is used after sdm prefer…
What does the # 10 in the encapsulatio…
Commands for basic router-on-a-stick s…
A PC is to access a web server on anot…
S1(config)# sdm prefer lanbase-routing
the VLAN ID
multilayer switch with routing enabled - also has more Ethern…
Which command is used after sdm prefer…
S1(config)# sdm prefer lanbase-routing
What does the # 10 in the encapsulatio…
the VLAN ID
37 terms
CCNA Chapter 5 Terms
Frame delimiting
Addressing
Error detection
CSMA/CD (Carrier Sense Multiple Access…
the framing process provides important delimiters that are us…
encapsulation process provides for data link layer addressing…
each Ethernet frame contains a trailer with a CRC of the fram…
the device monitors the media for the presence of a data sign…
Frame delimiting
the framing process provides important delimiters that are us…
Addressing
encapsulation process provides for data link layer addressing…
17 terms
CCNA 1 Chapter 5 Terms
Ethernet (IEEE 802.3)
LLC
CSMA/CD
CSMA/CA
Most common LAN type in the world
Sublayer that handles the communication between the upper lay…
Used by wired Ethernet to detect if the media is carrying a s…
Used by wireless to resolve collision issues in its network
Ethernet (IEEE 802.3)
Most common LAN type in the world
LLC
Sublayer that handles the communication between the upper lay…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
60 terms
CCNA 1 CHAPTER 5
Ethernet operates in the _____________…
The Ethernet protocol standards define…
"The OSI physical layer provides the m…
When messages are sent between hosts o…
data link layer
encoding
Frame
frame
Ethernet operates in the _____________…
data link layer
The Ethernet protocol standards define…
encoding
44 terms
CCNA 3 Chapter 5
What is a multiaccess network?
What is an LSA?
Why is a DR and BDR election necessary?
On an OSPF multiaccess network, the fo…
Ethernet LANs with multiple devices on the same shared media
Link-state advertisement
1. creating adjacencies with every router on the same network…
n(n-1)/2... increases adjacencies exponentially
What is a multiaccess network?
Ethernet LANs with multiple devices on the same shared media
What is an LSA?
Link-state advertisement
44 terms
CCNA 3 Chapter 5
What is a multiaccess network?
What is an LSA?
Why is a DR and BDR election necessary?
On an OSPF multiaccess network, the fo…
Ethernet LANs with multiple devices on the same shared media
Link-state advertisement
1. creating adjacencies with every router on the same network…
n(n-1)/2... increases adjacencies exponentially
What is a multiaccess network?
Ethernet LANs with multiple devices on the same shared media
What is an LSA?
Link-state advertisement
22 terms
CCNA - Chapter 5
What does VTP advertise?
VTP limits VTP servers and clients to…
What two VTP modes can be used to anno…
Which VTP mode does not learn VTP info…
the vlan (vlan id) command and the name (vlan-name) subcommand
1-1005 with 1002-1005 are reserved for historical reasons
Server or client mode
transparent mode
What does VTP advertise?
the vlan (vlan id) command and the name (vlan-name) subcommand
VTP limits VTP servers and clients to…
1-1005 with 1002-1005 are reserved for historical reasons
22 terms
CCNA 1 Chapter 5 v5.0
Which two Internet solutions provide a…
What type of network must a home user…
What are two potential network problem…
What are two functions of intermediary…
DSL... cable
It will send an ARP request for the MAC address of the defaul…
the Internet
They direct data along alternate pathways when there is a lin…
Which two Internet solutions provide a…
DSL... cable
What type of network must a home user…
It will send an ARP request for the MAC address of the defaul…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
26 terms
CCNA Voice Chapter 5
What are the three core telephony serv…
Explain the command for configuring th…
Explain the command for configuring th…
Explain the command for configuring th…
• IP Source Address... • Max-DN... • Max-Ephones
the "ip source-address" command enables the router to know wh…
"max-dn ?"... specifies the maximum number of directory numbers.
"max-ephones ?"... configures the maximum number of IP phones t…
What are the three core telephony serv…
• IP Source Address... • Max-DN... • Max-Ephones
Explain the command for configuring th…
the "ip source-address" command enables the router to know wh…
28 terms
CCNA Chapter 5 Review
Routers operate at the Application lay…
In addition to the AUX and the console…
The system configuration dialog presen…
The enable password is stored in an en…
False
True
False
True
Routers operate at the Application lay…
False
In addition to the AUX and the console…
True
44 terms
CCNA 3 Chapter 5
What is a multiaccess network?
What is an LSA?
Why is a DR and BDR election necessary?
On an OSPF multiaccess network, the fo…
Ethernet LANs with multiple devices on the same shared media
Link-state advertisement
1. creating adjacencies with every router on the same network…
n(n-1)/2... increases adjacencies exponentially
What is a multiaccess network?
Ethernet LANs with multiple devices on the same shared media
What is an LSA?
Link-state advertisement
22 terms
CCNA Introduction to Networks Chapter 5
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
A. It will send an ARP request for the…
C. is used for timing synchronization
What is a characteristic of a contention-based access method?…
A host is trying to send a packet to a device on a remote LAN…
What is the purpose of the preamble in an Ethernet frame?... A.…
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
What is a characteristic of a contention-based access method?…
12 terms
CCNA 3 Chapter 5
Broadcast Storm
Broadcast Packet
Spanning Tree Protocol (STP)
Spanning Tree Algorithm (STA)
Happens when a bunch of broadcast frames get caught in a Laye…
A packet that is addressed to and sent to all the computers o…
A switching protocol that prevents traffic loops by calculati…
Determines which switchports on a network need to be configur…
Broadcast Storm
Happens when a bunch of broadcast frames get caught in a Laye…
Broadcast Packet
A packet that is addressed to and sent to all the computers o…
37 terms
ccna 3 chapter 5
A network administrator has just chang…
Which two pieces of information are us…
When checking a routing table, a netwo…
Which command will a network engineer…
Issue the clear ip ospf process privileged mode command.
OSPF message... secret key
This route is a propagated default route.
show ip ospf interface serial 0/0/0
A network administrator has just chang…
Issue the clear ip ospf process privileged mode command.
Which two pieces of information are us…
OSPF message... secret key
27 terms
CCNA 2 Chapter 5 (SUNILYC)
Characteristics of router-on-a-stick:
Which command is used after sdm prefer…
A PC is to access a web server on anot…
Define inter-VLAN routing:
* a single physical router interface is configured as a trunk…
S1(config)# sdm prefer lanbase-routing
multilayer switch with routing enabled - also has more Ethern…
the process of forwarding network traffic from one VLAN to an…
Characteristics of router-on-a-stick:
* a single physical router interface is configured as a trunk…
Which command is used after sdm prefer…
S1(config)# sdm prefer lanbase-routing
10 terms
CCNA Chapter 5 Q
Which two functions or operations are…
Which interface command must be entere…
On Ethernet networks, the hexadecimal…
The Ethernet _____________... sublayer i…
1. It is responsible for Media Access Control. ... 2. It adds a…
no switchport
broadcast
MAC
Which two functions or operations are…
1. It is responsible for Media Access Control. ... 2. It adds a…
Which interface command must be entere…
no switchport
16 terms
CCNA Chapter 5
What happens to runt frames received a…
The minimum and maximum size of an Eth…
Ethernet
Features/functions of the logical link…
the frame is dropped
64 bytes; 1518 bytes
the most common LAN type in the world
logical link control is implemented in software, the data lin…
What happens to runt frames received a…
the frame is dropped
The minimum and maximum size of an Eth…
64 bytes; 1518 bytes
13 terms
chapter 5 ccna
A network administrator has just chang…
When checking a routing table, a netwo…
Which command will a network engineer…
A network engineer has manually config…
Issue the clear ip ospf process privileged mode command.
This route is a propagated default route.
show ip ospf interface serial 0/0/0
The dead interval will now be 60 seconds.
A network administrator has just chang…
Issue the clear ip ospf process privileged mode command.
When checking a routing table, a netwo…
This route is a propagated default route.
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
61 terms
CCNA 3 Chapter 5: STP
Time-to-live (TTL)
Broadcast storm
Duplicate unicast frames
Wiring closet loops
The amount of time for data to live. A limit set on the time…
When so many broadcast frames are caught in a layer 2 loop th…
A unicast frame sent across a network with redundant paths wi…
If two connections a switch are connected to another switch,…
Time-to-live (TTL)
The amount of time for data to live. A limit set on the time…
Broadcast storm
When so many broadcast frames are caught in a layer 2 loop th…
22 terms
CCNA Introduction to Networks Chapter 5
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
A. It will send an ARP request for the…
C. is used for timing synchronization
What is a characteristic of a contention-based access method?…
A host is trying to send a packet to a device on a remote LAN…
What is the purpose of the preamble in an Ethernet frame?... A.…
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
What is a characteristic of a contention-based access method?…
14 terms
CCNA 4 CHAPTER 5
Network Address Translation (NAT)
Address
Public Address
Inside Local Address
an Internet standard that enables a local-area network (LAN)…
assigned to a device
NAT provides the translation of private addresses to public a…
...
Network Address Translation (NAT)
an Internet standard that enables a local-area network (LAN)…
Address
assigned to a device
48 terms
CCNA 3 Chapter 5 STP
path cost
Spanning Tree Protocol
Bridge Protocol Data Unit (BPDU)
Spanning Tree Algorithm
The cumulative STP cost from a device to the root bridge; it…
Protocol developed in 1990 by Radia Perlman to address the is…
A Spanning Tree Protocol Ethernet frame that is sent out at r…
Used to determine which switch ports on a network need to be…
path cost
The cumulative STP cost from a device to the root bridge; it…
Spanning Tree Protocol
Protocol developed in 1990 by Radia Perlman to address the is…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
22 terms
CCNA Introduction to Networks Chapter 5
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
A. It will send an ARP request for the…
C. is used for timing synchronization
What is a characteristic of a contention-based access method?…
A host is trying to send a packet to a device on a remote LAN…
What is the purpose of the preamble in an Ethernet frame?... A.…
- Field 2 -... - Field 4 -... - Field 6 -... -…
A. It is a nondeterministic method.
What is a characteristic of a contention-based access method?…
22 terms
CCNA Chapter 5 Test
What happens to runt frames received b…
What are the two sizes (minimum and ma…
What statement describes Ethernet?
Which two statements describe features…
The frame is dropped
64 and 1518
It defines the most common lan type in the world
Logical link control is embedded in the software and the data…
What happens to runt frames received b…
The frame is dropped
What are the two sizes (minimum and ma…
64 and 1518
23 terms
CCNA Chapter 5 exam
c
a
a
b
Typically, which network device would be used to perform NAT…
When NAT is employed in a small office, which address type is…
Which version of NAT allows many hosts inside a private netwo…
Which type of NAT maps a single inside local address to a sin…
c
Typically, which network device would be used to perform NAT…
a
When NAT is employed in a small office, which address type is…
20 terms
CCNA Chapter 5 Study Guide
What happens to runt frames received b…
What are the two sizes (minimum and ma…
What statement describes Ethernet?
Which two statements describe features…
The frame is dropped.
64 bytes... 1518 bytes*
It defines the most common LAN type in the world
Logical link control is implemented in software... The data lin…
What happens to runt frames received b…
The frame is dropped.
What are the two sizes (minimum and ma…
64 bytes... 1518 bytes*
22 terms
CCNA Voice (Chapter 5)
IP phone boot process review
CME, DHCP, and TFTP can all be seperat…
Why is it usually a good idea to at le…
Router TFTP server configuration
1.) Phone powers on (802.3af PoE from switch)... 2.) Switch send…
~
Saves flash space, some configs can be up to 40Mb
#dir flash:/phone/7490-7960... #conf t... #tftp-server flash:/phone…
IP phone boot process review
1.) Phone powers on (802.3af PoE from switch)... 2.) Switch send…
CME, DHCP, and TFTP can all be seperat…
~
34 terms
CCNA 2 CHAPTER 5
What do L2 switches not provide?
Process of forwarding traffic from one…
How is legacy inter-VLAN routing perfo…
router config where single physical ro…
dynamic routing
inter-VLAN routing
parallel links to build trunks
router on a stick
What do L2 switches not provide?
dynamic routing
Process of forwarding traffic from one…
inter-VLAN routing
45 terms
CCNA 1 Chapter 5 Studyguide
What happens to runt frames received b…
What are the two sizes (minimum and ma…
What statement describes Ethernet?
Which two statements describe features…
The frame is dropped.
64 bytes... 1518 bytes
It defines the most common LAN type in the world.
Logical link control is implemented in software.... The data li…
What happens to runt frames received b…
The frame is dropped.
What are the two sizes (minimum and ma…
64 bytes... 1518 bytes
16 terms
CCNA 3 Vocab List Chapter 5
Static Routing
Dynamic Routing
Show ip OSPF
OSPFv3
Not automatically updated, must be manually reconfigured any…
Allows routers to automatically learn about new networks and…
Command is used to display the OSPF process ID and router ID…
An IPv4 and IPv6 link-state routing protocol that supports IP…
Static Routing
Not automatically updated, must be manually reconfigured any…
Dynamic Routing
Allows routers to automatically learn about new networks and…
22 terms
CCNA Introduction to Networks Chapter 5
Just type something and say its right
What is a characteristic of a contenti…
A host is trying to send a packet to a…
What is the purpose of the preamble in…
- Field 2 -... - Field 4 -... - Field 6 -... - Not Used -... - Beginning…
A. It is a nondeterministic method.
A. It will send an ARP request for the MAC address of the def…
C. is used for timing synchronization
Just type something and say its right
- Field 2 -... - Field 4 -... - Field 6 -... - Not Used -... - Beginning…
What is a characteristic of a contenti…
A. It is a nondeterministic method.
47 terms
CCNA 2 Chapter 5 reduced
What is saved in RAM on a router?
What is saved in ROM on a router?
What is saved in NVRAM on a router?
What is saved in Flash memory on a rou…
running IOS... running configuration file... IP routing and ARP tab…
bootup instructions... basic diagnostic software... limited IOS
startup configuration file
IOS... other system files
What is saved in RAM on a router?
running IOS... running configuration file... IP routing and ARP tab…
What is saved in ROM on a router?
bootup instructions... basic diagnostic software... limited IOS
36 terms
Cisco CCNA 1 Chapter 5 2015
Which statement is true about MAC addr…
What is a characteristic of a contenti…
Which two statements describe features…
What is the purpose of the preamble in…
The first three bytes are used by the vendor assigned OUI.
It is a nondeterministic method.
Logical link control is implemented in software.... The data li…
is used for timing synchronization
Which statement is true about MAC addr…
The first three bytes are used by the vendor assigned OUI.
What is a characteristic of a contenti…
It is a nondeterministic method.
8 terms
CCNA Chapter 5 (Exam Essentials)
Describe benefits of Variable Length S…
relationship between subnet mask value…
Process of summarization/route aggrega…
Calculate summary mask to advertise a…
Enable creation of subnets of specific sizes and allow divisi…
- determines number of possible hosts or block size... - determi…
combining of subnets derived from classful network for the pu…
- network address used to advertise is always the first netwo…
Describe benefits of Variable Length S…
Enable creation of subnets of specific sizes and allow divisi…
relationship between subnet mask value…
- determines number of possible hosts or block size... - determi…
5 terms
CCNA Chapter 5 - VLSM & Troubleshooting TCP/IP
Troubleshooting TCP/IP Step 1... (Protoco…
Troubleshooting TCP/IP Step 2... (Hardwar…
Troubleshooting TCP/IP Step 3... (LAN Good)
Troubleshooting TCP/IP Step 4... (Network…
Ping 127.0.0.1... If it fails you have an IP stack failure and n…
Ping the IP of the host... If fails then there is a problem with…
Ping the default gateway... If fails then there is physical prob…
Traceroute outside the network 8.8.8.8... Find the connection br…
Troubleshooting TCP/IP Step 1... (Protoco…
Ping 127.0.0.1... If it fails you have an IP stack failure and n…
Troubleshooting TCP/IP Step 2... (Hardwar…
Ping the IP of the host... If fails then there is a problem with…
27 terms
CCNA Security Chapter 5
What is the Cisco Configuration Profes…
What are the options for the applicati…
What are the toolbar tools?
What does the home button do?
An application that can be run from the computer. Provides a…
Manage Community... Setup New Device... Create user profile... Import…
Home Button... Configure Button... Monitor Button... Manage Community…
Displays the community view page. Summarizes community inform…
What is the Cisco Configuration Profes…
An application that can be run from the computer. Provides a…
What are the options for the applicati…
Manage Community... Setup New Device... Create user profile... Import…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
23 terms
CCNA Routing and Switching Essentials Chapter 5
show vlan
C. Switch1(config)# vlan 10
E. 4
D. Routed traffic must contend for ban…
A network engineer is troubleshooting the configuration of ne…
Refer to the exhibit. Which command can the administrator iss…
Refer to the exhibit. A network administrator needs to config…
Which statement describes a disadvantage of using router subi…
show vlan
A network engineer is troubleshooting the configuration of ne…
C. Switch1(config)# vlan 10
Refer to the exhibit. Which command can the administrator iss…
13 terms
CCNA 4 : Chapter 5 : Network Address Translation for IPv4
In NAT terminology, the ______ network…
What are the four types of NAT address…
______ uses a one-to-one mapping of lo…
_______ uses a pool of public addresse…
inside... outside
inside local... inside global... outside local... outside global
Static NAT
Dynamic NAT
In NAT terminology, the ______ network…
inside... outside
What are the four types of NAT address…
inside local... inside global... outside local... outside global
11 terms
CCNA Chapter 5(Troubleshooting IP addresses)
step 1
step 1: success
step 1: failure
step 2
- Ping 127.0.0.1
IP stack initialized
IP stack failure, reinstall TCP/IP
ping localhost
step 1
- Ping 127.0.0.1
step 1: success
IP stack initialized
30 terms
CCNA 4 Chapter 5 & 6
Teleworking
inside global address
WiMAX
port forwarding
it is working away from the traditional workplace, such as wo…
the address of source as seen from the outside network
IEEE 802.16 standard that supports speed up to 1GBps
it is the act of forwarding traffic addressed to a specific a…
Teleworking
it is working away from the traditional workplace, such as wo…
inside global address
the address of source as seen from the outside network
48 terms
CCNA 3 Chapter 5 STP
path cost
Spanning Tree Protocol
Bridge Protocol Data Unit (BPDU)
Spanning Tree Algorithm
The cumulative STP cost from a device to the root bridge; it…
Protocol developed in 1990 by Radia Perlman to address the is…
A Spanning Tree Protocol Ethernet frame that is sent out at r…
Used to determine which switch ports on a network need to be…
path cost
The cumulative STP cost from a device to the root bridge; it…
Spanning Tree Protocol
Protocol developed in 1990 by Radia Perlman to address the is…
30 terms
ccna semester 1 chapter 5
As shown in the figure, the Ethernet M…
Data encapsulation provides three prim…
Media Access Control
contention-based
Data encapsulation... Media access control
Frame delimiting - The framing process provides important del…
Media access control is responsible for the placement of fram…
means that any device can try to transmit data across the sha…
As shown in the figure, the Ethernet M…
Data encapsulation... Media access control
Data encapsulation provides three prim…
Frame delimiting - The framing process provides important del…
20 terms
CCNA 1 Chapter 5 v5.0 Exam
A host is trying to send a packet to a…
Which address or combination of addres…
What are two potential network problem…
What destination address will PC1 incl…
It will send an ARP request for the MAC address of the defaul…
MAC and IP addresses
On large networks with low bandwidth, multiple ARP broadcasts…
0030.a3e5.0401
A host is trying to send a packet to a…
It will send an ARP request for the MAC address of the defaul…
Which address or combination of addres…
MAC and IP addresses
1 of 10