How can we help?

You can also find more resources in our Help Center.

Study sets matching "cisco ccna chapter 7"

Study sets
Classes
Users

Study sets matching "cisco ccna chapter 7"

CISCO CCNA Chapter 7
Dual Stack
Tunneling
Translation
Bits in an IPv4 Address
Allows IPv4 and IPv6 to coexist on the same network. Devices…
Method of transporting an IPv6 packet over an IPv4 network... IP…
NAT64... Allows IPv6-enabled devices to communicate with IPv4-en…
32
Dual Stack
Allows IPv4 and IPv6 to coexist on the same network. Devices…
Tunneling
Method of transporting an IPv6 packet over an IPv4 network... IP…
22 terms
Cisco CCNA 1 Chapter 7 2015
What is a socket?... A the combination…
A host device needs to send a large vi…
A host device sends a data packet to a…
What is a beneficial feature of the UD…
B the combination of a source IP address and port number or a…
multiplexing
destination port number
fewer delays in transmission
What is a socket?... A the combination…
B the combination of a source IP address and port number or a…
A host device needs to send a large vi…
multiplexing
19 terms
Cisco CCNA Chapter 1 & 3
What is a wiki?
Which statement describes a network th…
The farther you are from the central o…
A "_______" network is able to expand…
a web page that groups of people can edit and review
The network provides predictable levels of service to differe…
slower
scalable
What is a wiki?
a web page that groups of people can edit and review
Which statement describes a network th…
The network provides predictable levels of service to differe…
24 terms
Cisco1: CCNA Chapter 3 Exam
What application layer protocol is com…
What are 2 forms of application layer…
A network administrator is designing a…
What 3 protocols operate at the Applic…
FTP
1. Applications... 2. Services
1. Centralized administration... 2. Security is easier to enfore
• DNS... • SMTP... • POP
What application layer protocol is com…
FTP
What are 2 forms of application layer…
1. Applications... 2. Services
24 terms
Cisco1: CCNA Chapter 3 Exam
What application layer protocol is com…
What are 2 forms of application layer…
A network administrator is designing a…
What 3 protocols operate at the Applic…
FTP
1. Applications... 2. Services
1. Centralized administration... 2. Security is easier to enfore
• DNS... • SMTP... • POP
What application layer protocol is com…
FTP
What are 2 forms of application layer…
1. Applications... 2. Services
CISCO CCNA Chapter 6
NVRAM
RAM
TFTP Port
Telnet Port
Holds startup configuration
Holds running configuration
69
23
NVRAM
Holds startup configuration
RAM
Holds running configuration
125 terms
CCNA Chapter 7
The ________________ is responsible fo…
The ___________ layer provides for the…
In _________, these segmentation and r…
The ___________ layer uses ports to id…
Transport Layer
Transport
TCP/IP
Transport Layer
The ________________ is responsible fo…
Transport Layer
The ___________ layer provides for the…
Transport
39 terms
cisco chapter 7
A PC is downloading a large file from…
A host device needs to send a large vi…
A technician wishes to use TFTP to tra…
Which scenario describes a function pr…
10 segments
multiplexing
The file is segmented and then reassembled in the correct ord…
A student has two web browser windows open in order to access…
A PC is downloading a large file from…
10 segments
A host device needs to send a large vi…
multiplexing
50 terms
CCNA 2 Chapter 7
Which algorithm is used by the OSPF ro…
The acronym for the link-state routing…
What are the 4 main components of dyna…
What is the primary benefit of using d…
Dijkstra's algorithm
OSPFv3
1. data structures - routing tables... 2. messages (incoming & o…
routers exchange routing information when the topology change…
Which algorithm is used by the OSPF ro…
Dijkstra's algorithm
The acronym for the link-state routing…
OSPFv3
32 terms
Cisco Chapter 7
Wozu wird in einer TCP-Kommunikation e…
Welche Aktion setzt ein Client, wenn e…
Welche 3 Felder werden in einem UDP Se…
Welche zwei Applikationen nutzen UDP a…
Um den Überblick über multiple Konversationen zwischen Geräte…
Der Client wählt eine zufällige Portnummer.
Länge... Source Port... Checksum/Prüfsumme
DNS-Anfragen... DHCP
Wozu wird in einer TCP-Kommunikation e…
Um den Überblick über multiple Konversationen zwischen Geräte…
Welche Aktion setzt ein Client, wenn e…
Der Client wählt eine zufällige Portnummer.
44 terms
CCNA Guide to Cisco Networking Chp 7-8
1) What command injects a default rout…
2) Classless routing protocols carry s…
3) The process ID must match on all ro…
4) What command switches RIP to versio…
Default-information originate
True
False
version 2
1) What command injects a default rout…
Default-information originate
2) Classless routing protocols carry s…
True
8 terms
cisco chapter 5 ccna2
Nevýhody u router-on-a-stick
jak bude nastaven provoz mezi více vla…
Refer: v tomto návrhu sítě, které spoj…
charakteristika starších inter-VLAN
nepodporuje 50 vlan
provoz je routován přes interní VLAN rozhraní
no link
každá VLAN vyžaduje Ethernetové spojení
Nevýhody u router-on-a-stick
nepodporuje 50 vlan
jak bude nastaven provoz mezi více vla…
provoz je routován přes interní VLAN rozhraní
37 terms
Cisco CCNA 1 Chapter 2 2015
Which two features are characteristics…
A network administrator is planning an…
Which procedure is used to access a Ci…
A network administrator needs to keep…
Flash provides nonvolatile storage.... The contents of flash ma…
What models of routers and switches require upgrades?... Do the…
Use the console port to locally access the switch from a seri…
SSH
Which two features are characteristics…
Flash provides nonvolatile storage.... The contents of flash ma…
A network administrator is planning an…
What models of routers and switches require upgrades?... Do the…
36 terms
Cisco CCNA 1 Chapter 5 2015
Which statement is true about MAC addr…
What is a characteristic of a contenti…
Which two statements describe features…
What is the purpose of the preamble in…
The first three bytes are used by the vendor assigned OUI.
It is a nondeterministic method.
Logical link control is implemented in software.... The data li…
is used for timing synchronization
Which statement is true about MAC addr…
The first three bytes are used by the vendor assigned OUI.
What is a characteristic of a contenti…
It is a nondeterministic method.
9 terms
CCNA - Chapter 7
Boot ROM
Configuration Register
Flash
Ping
Used in routers to put the router into bootstrap mode. Bootst…
A 16-bit configurable value stored in hardware or software th…
Electronically Erasable Programmable Read-Only Memory (EEPROM…
packet Internet groper: A Unix-based Internet diagnostic tool…
Boot ROM
Used in routers to put the router into bootstrap mode. Bootst…
Configuration Register
A 16-bit configurable value stored in hardware or software th…
24 terms
Cisco1: CCNA Chapter 3 Exam
What application layer protocol is com…
What are 2 forms of application layer…
A network administrator is designing a…
What 3 protocols operate at the Applic…
FTP
1. Applications... 2. Services
1. Centralized administration... 2. Security is easier to enfore
• DNS... • SMTP... • POP
What application layer protocol is com…
FTP
What are 2 forms of application layer…
1. Applications... 2. Services
64 terms
Cisco Chapter 7
Classless Inter-Domain Routing (CIDR,…
Internet Assigned Numbers Authority (I…
Regional Internet Registries (RIRs)
Allocating IP addresses to ISPs who in…
What is CIDR?
What does IANA stand for?
What does RIRs stand for?
What is an RIR responsible for?
Classless Inter-Domain Routing (CIDR,…
What is CIDR?
Internet Assigned Numbers Authority (I…
What does IANA stand for?
20 terms
Cisco1: CCNA Chapter 6 Exam
How many bits make up an IPv4 address?…
Refer to the exhibit. A network admini…
Refer to the exhibit. The network admi…
Refer to the exhibit. Which network pr…
32
255.255.255.192
IP address: 192.168.10.38 ... subnet mask: 255.255.255.248 ... defa…
/27
How many bits make up an IPv4 address?…
32
Refer to the exhibit. A network admini…
255.255.255.192
21 terms
Cisco CCNA 1 Chapter 6 2015
When connectionless protocols are impl…
Which IPv4 header field is responsible…
Why is NAT not needed in IPv6??... Beca…
What is a service provided by the Flow…
upper-layer connection-oriented protocols
differentiated services
Any host or user can get a public IPv6 network address becaus…
It informs network devices to maintain the same path for real…
When connectionless protocols are impl…
upper-layer connection-oriented protocols
Which IPv4 header field is responsible…
differentiated services
7 terms
Cisco Chapter 7 Vocabulary
Transport Layer ITN 154 Chapter 7 Voca…
Transmission Control Protocol (TCP)
UDP
Segmentation
Connection-Oriented conversation by establishing sessions, re…
Best effort transport protocol. Lightweight transport that of…
...
Transport Layer ITN 154 Chapter 7 Voca…
Transmission Control Protocol (TCP)
Connection-Oriented conversation by establishing sessions, re…
19 terms
Cisco Chapter 7
Network Segment
Peer
Network Interface Card
American National Standards Institute
a part of a computer network that every device communicates w…
A host or node that participates in some form of group.
Computer hardware designed to allow computers to communicate…
Private non-profit organization that oversees the development…
Network Segment
a part of a computer network that every device communicates w…
Peer
A host or node that participates in some form of group.
36 terms
Cisco CCNA 1 Chapter 3 2015
A computer in a given network is commu…
Who just joined QUIZLET team in Octobe…
What method can be used by two compute…
Which protocol is responsible for cont…
multicast
Elaine Yang
flow control
TCP
A computer in a given network is commu…
multicast
Who just joined QUIZLET team in Octobe…
Elaine Yang
34 terms
Cisco CCNA 1 Chapter 4 2015
Which layer of the OSI model is respon…
Which statement describes signaling at…
What are two reasons for physical laye…
The throughput of a FastEthernet netwo…
data link
Sending the signals asynchronously means that they are transm…
to distinguish data bits from control bits... to identify where…
65 Mb/s
Which layer of the OSI model is respon…
data link
Which statement describes signaling at…
Sending the signals asynchronously means that they are transm…
35 terms
Cisco CCNA 1 Chapter 1 2015
What two criteria are used to help sel…
What are two functions of intermediary…
Which device performs the function of…
Refer to the exhibit. Which set of dev…
the distance the media can successfully carry a signal;... the…
They direct data along alternate pathways when there is a lin…
a router
A, B, D, G
What two criteria are used to help sel…
the distance the media can successfully carry a signal;... the…
What are two functions of intermediary…
They direct data along alternate pathways when there is a lin…
310 terms
CCNA Guide to Cisco Networking Review Questions Chapters 7-14
1) What is the administrative distance…
2) Link-state routing protocols ______…
3) RIP has a maximum hop count of ____…
4) Which command enables RIP on a rout…
C. 120
A. Use link-state advertisements to notify neighbor routers o…
C. 15
B. router rip
1) What is the administrative distance…
C. 120
2) Link-state routing protocols ______…
A. Use link-state advertisements to notify neighbor routers o…
48 terms
CCNA 3 Chapter 7
What is reliable transport protocol (R…
Which protocols use RTP?
What 5 kinds of packets does EIGRP use?
What is an EIGRP Hello packet?
RTP is used for reliable (requires ACK) and unreliable delive…
only EIGRP uses RTP to deliver packets to neighbors.
Hello... Update... Acknowledgement... Query... Reply
multicast packet sent every 5 seconds via unreliable delivery…
What is reliable transport protocol (R…
RTP is used for reliable (requires ACK) and unreliable delive…
Which protocols use RTP?
only EIGRP uses RTP to deliver packets to neighbors.
21 terms
Cisco1: CCNA Chapter 4 Exam
Refer to the exhibit. What two pieces…
After a web browser makes a request to…
Which information is found in both the…
Which is an important characteristic o…
* The local host is using three client sessions.... * The local…
* 80
* source and destination
* minimal delays in data delivery
Refer to the exhibit. What two pieces…
* The local host is using three client sessions.... * The local…
After a web browser makes a request to…
* 80
20 terms
Cisco1: CCNA Chapter 6 Exam
How many bits make up an IPv4 address?…
Refer to the exhibit. A network admini…
Refer to the exhibit. The network admi…
Refer to the exhibit. Which network pr…
32
255.255.255.192
IP address: 192.168.10.38 ... subnet mask: 255.255.255.248 ... defa…
/27
How many bits make up an IPv4 address?…
32
Refer to the exhibit. A network admini…
255.255.255.192
9 terms
Cisco Chapter 7 TCP
The primary responsibilities of transp…
What is the Role of the Transport Layer?
What applications use TCP?
What applications use UDP?
1 )Tracking the individual communication between applications…
1) Segmenting Data and Reassembling Segments... 2) Identifying…
FTP... HTTP... SMTP
DNS... TFTP
The primary responsibilities of transp…
1 )Tracking the individual communication between applications…
What is the Role of the Transport Layer?
1) Segmenting Data and Reassembling Segments... 2) Identifying…
19 terms
CCNA Introduction to Networks Chapter 7
Fill in the blank.... During a TCP sessio…
Which transport layer feature is used…
Which scenario describes a function pr…
Compared to UDP, what factor causes ad…
SYN
TCP 3-way handshake
A student has two web browser windows open in order to access…
network traffic that is caused by retransmissions
Fill in the blank.... During a TCP sessio…
SYN
Which transport layer feature is used…
TCP 3-way handshake
20 terms
Cisco1: CCNA Chapter 5 Exam
Which three statements are true about…
In an IPv4 environment, what informati…
Which intermediary devices could be us…
What type of routing uses information…
-If the destination network is directly connected, the router…
-destination network address
-router... -firewall
-static
Which three statements are true about…
-If the destination network is directly connected, the router…
In an IPv4 environment, what informati…
-destination network address
7 terms
CCNA Routing and Switching Essentials Chapter 7
Routing protocols
routing protocol
A. Data structures
C. Algorithm
__________ are used to facilitate the exchange of routing inf…
A __________ is a set of processes, algorithms, and messages…
Match following descriptions... Routing protocols typically use…
Match following descriptions... A(n) __________ is a finite list…
Routing protocols
__________ are used to facilitate the exchange of routing inf…
routing protocol
A __________ is a set of processes, algorithms, and messages…
21 terms
Cisco1: CCNA Chapter 2 Exam
1. Which two layers of the OSI model h…
What is a primary function of the trai…
During the encapsulation process, what…
What device is considered an intermedi…
• Physical... • Data Link
• supports error detection
• The physical address is added
• switch
1. Which two layers of the OSI model h…
• Physical... • Data Link
What is a primary function of the trai…
• supports error detection
28 terms
cisco chapter 7 words
Laptop
PC Card
Express Card
Pointing stick
a computer that is portable and suitable for use while travel…
a printed circuit board
an interface to connect peripheral devices to a computer
a movable stub embedded in a laptop keyboard that is manipula…
Laptop
a computer that is portable and suitable for use while travel…
PC Card
a printed circuit board
55 terms
Cisco Chapter 7.1
Bluetooth status LED (Top View of Virt…
Battery Status LED (Top View of Virtua…
Standby LED (Top View of Virtual Laptop)
Battery bay (Rear view of a laptop)
indicates when the Bluetooth wireless transceiver is enabled.…
indicates the status of the battery. A laptop computer can us…
indicates whether the laptop is in standby or not. Standby mo…
is a connector that is used to attach a laptop battery.
Bluetooth status LED (Top View of Virt…
indicates when the Bluetooth wireless transceiver is enabled.…
Battery Status LED (Top View of Virtua…
indicates the status of the battery. A laptop computer can us…
22 terms
CCNA Chapter 7 Exam
the combination of a source IP address…
multiplexing
destination port number
fewer delays in transmission
What is a socket?
A host device needs to send a large video file across the net…
A host device sends a data packet to a web server via the HTT…
What is a beneficial feature of the UDP transport protocol?
the combination of a source IP address…
What is a socket?
multiplexing
A host device needs to send a large video file across the net…
26 terms
CCNA Chapter 7 Review
Peer-to-peer networks pass packets bet…
NetBEUI cannot scale into large intern…
IPX/SPX can be routed across the Inter…
Routers use metrics to determine which…
False
True
False
True
Peer-to-peer networks pass packets bet…
False
NetBEUI cannot scale into large intern…
True
13 terms
CCNA Chapter 7 Terms
Transport layer
Application
Conversation
Ports
responsible for establishing a temporary communication sessio…
generates data that is sent from a program on a source host t…
each particular se of data flowing between a source applicati…
number assigned at the transport layer to identify the applic…
Transport layer
responsible for establishing a temporary communication sessio…
Application
generates data that is sent from a program on a source host t…
310 terms
CCNA Guide to Cisco Networking Review Questions Chapters 7-14
1) What is the administrative distance…
2) Link-state routing protocols ______…
3) RIP has a maximum hop count of ____…
4) Which command enables RIP on a rout…
C. 120
A. Use link-state advertisements to notify neighbor routers o…
C. 15
B. router rip
1) What is the administrative distance…
C. 120
2) Link-state routing protocols ______…
A. Use link-state advertisements to notify neighbor routers o…
22 terms
CCNA Routing and Switching Essentials Chapter 7
A. sends subnet mask information in ro…
C. R1, R3, R5, R7
C. contain an exit interface... E. contai…
B. uses Dijkstra's algorithm to build…
Which two statements are true regarding classless routing pro…
Refer to the exhibit. OSPF is used in the network. Which path…
Which two requirements are used to determine if a route can b…
Which two statements describe the OSPF routing protocol? (Cho…
A. sends subnet mask information in ro…
Which two statements are true regarding classless routing pro…
C. R1, R3, R5, R7
Refer to the exhibit. OSPF is used in the network. Which path…
20 terms
Cisco1: CCNA Chapter 5 Exam
Which three statements are true about…
In an IPv4 environment, what informati…
Which intermediary devices could be us…
What type of routing uses information…
-If the destination network is directly connected, the router…
-destination network address
-router... -firewall
-static
Which three statements are true about…
-If the destination network is directly connected, the router…
In an IPv4 environment, what informati…
-destination network address
15 terms
cisco chapter 7
b
c
a,d
d
A network administrator has examined the routing table of a r…
Refer to the exhibit. All hosts and router interfaces are con…
What are two functions of dynamic routing protocols? (Choose…
What is the purpose of classifying Cisco IP routing table ent…
b
A network administrator has examined the routing table of a r…
c
Refer to the exhibit. All hosts and router interfaces are con…
14 terms
Cisco Chapter 7
A network administrator has examined t…
Refers to the exhibit. All hosts and r…
What are two functions of dynamic rout…
What is the purpose of classifying Cis…
The route source was learned dynamically.
RIPv2 is misconfigured on router R2.
To maintain routing tables... To discover the network
To explain the operation of the heirarchical structure of the…
A network administrator has examined t…
The route source was learned dynamically.
Refers to the exhibit. All hosts and r…
RIPv2 is misconfigured on router R2.
Cisco CCNA 1 Chapter 4 2015
Which layer of the OSI model is respon…
Which statement describes signaling at…
What are two reasons for physical laye…
The throughput of a FastEthernet netwo…
data link
Sending the signals asynchronously means that they are transm…
to distinguish data bits from control bits... to identify where…
65 Mb/s
Which layer of the OSI model is respon…
data link
Which statement describes signaling at…
Sending the signals asynchronously means that they are transm…
25 terms
Chapter 7 Cisco vocab
Transport layer
TCP
UDP
Segmentation
Responsible for establishing a temporary communication sessio…
Considered a reliable transport protocol, which means the TCP…
Provides just the basic functions for delivering data segment…
Facilitates data transport by the lower network layers.
Transport layer
Responsible for establishing a temporary communication sessio…
TCP
Considered a reliable transport protocol, which means the TCP…
18 terms
Cisco Chapter 7
Transport layer
TCP
UDP
Segmentation
responsible for establishing a temporary communication sessio…
Transmission Control Protocol: ... 1. Tracking transmitted data…
User Datagram Protocol:... 1. Best effort protocol... 2. No transpo…
to divide the data into smaller, more manageable pieces to se…
Transport layer
responsible for establishing a temporary communication sessio…
TCP
Transmission Control Protocol: ... 1. Tracking transmitted data…
23 terms
Chapter 7 cisco
32
network portion... host portion
host address
to determine the subnet to which the h…
How many bits are in an IPv4 address?
Which two parts are components of an IPv4 address? (Choose tw…
What does the IP address 172.17.4.250/24 represent?
What is the purpose of the subnet mask in conjunction with an…
32
How many bits are in an IPv4 address?
network portion... host portion
Which two parts are components of an IPv4 address? (Choose tw…
18 terms
CISCO CHAPTER 7 VOCAB
Transport layer
TCP
UDP
Segmentation
responsible for establishing a temporary communication sessio…
considered a reliable transport protocol, tracked from source…
provides just the basic functions for delivering data segment…
breaking data into small, manageable pieces
Transport layer
responsible for establishing a temporary communication sessio…
TCP
considered a reliable transport protocol, tracked from source…
24 terms
Cisco1: CCNA Chapter 3 Exam
What application layer protocol is com…
What are 2 forms of application layer…
A network administrator is designing a…
What 3 protocols operate at the Applic…
FTP
1. Applications... 2. Services
1. Centralized administration... 2. Security is easier to enfore
• DNS... • SMTP... • POP
What application layer protocol is com…
FTP
What are 2 forms of application layer…
1. Applications... 2. Services
38 terms
cisco252 chapter 7
PSK
IKE
SHA
RSA
A pre-set, shared secret key for use over symmetric VPN chann…
A standard key-exchange method used for secure, authenticated…
HMAC algorithm which uses a 160-bit secret key for authentica…
A digital certificate exchange process used to authenticate u…
PSK
A pre-set, shared secret key for use over symmetric VPN chann…
IKE
A standard key-exchange method used for secure, authenticated…
1 of 10