95 questions
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
better security
easy to create
better device performance when acting as both client and server
lacks centralized administration
less cost to implement
Which device performs the function of determining the path that messages should take through internetworks?
a router
a firewall
a web server
a DSL modem
What two criteria are used to help select a network medium from various network media? (Choose two.)
the types of data that need to be prioritized
the cost of the end devices utilized in the network
the distance the selected medium can successfully carry a signal
the number of intermediary devices installed in the network
the environment where the selected medium is to be installed
Which two statements describe intermediary devices? (Choose two.)
Intermediary devices generate data content.
Intermediary devices alter data content.
Intermediary devices direct the path of the data.
Intermediary devices connect individual hosts to the network.
Intermediary devices initiate the encapsulation process
What are two functions of end devices on a network? (Choose two.)
They originate the data that flows through the network.
They direct data over alternate paths in the event of link failures.
They filter the flow of data to enhance security.
They are the interface between humans and the communication network.
They provide the channel over which the network message travels
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?
extranet
intranet
wired LAN
wireless LAN
wireless WAN
What type of network must a home user access in order to do online shopping?
an intranet
the Internet
an extranet
a local area network
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
an intranet
the Internet
an extranet
a local area network
Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)
cellular
DSL
satellite
cable
dial-up telephone
Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
DSL
cellular
satellite
dialup
dedicated leased line
Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
convergence
congestion
optimization
synchronization
What type of network traffic requires QoS?
on-line purchasing
video conferencing
wiki
Which expression accurately defines the term bandwidth?
a method of limiting the impact of a hardware or software failure on the network
a measure of the data carrying capacity of the media
a state where the demand on the network resources exceeds the available capacity
a set of techniques to manage the utilization of network resources
A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?
data integrity
data quality
data confidentiality
data redundancy
Which statement describes a characteristic of cloud computing?
A business can connect directly to the Internet without the use of an ISP.
Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.
Devices can connect to the Internet through existing electrical wiring.
Investment in new infrastructure is required in order to access the cloud
What is the Internet?
It is a network based on Ethernet technology.
It provides network access for mobile devices.
It provides connections through interconnected global networks.
It is a private network for an organization with LAN and WAN connections
Which statement describes the use of powerline networking technology?
New “smart” electrical cabling is used to extend an existing home LAN.
A home LAN is installed without the use of physical cabling.
A device connects to an existing home LAN using an adapter and an existing electrical outlet.
Wireless access points use powerline adapters to distribute data through the home LAN
What security violation would cause the most amount of damage to the life of a home user?
denial of service to your email server
replication of worms and viruses in your computer
capturing of personal data that leads to identity theft
spyware that leads to spam emails
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)
implementing a firewall
installing a wireless network
installing antivirus software
implementing an intrusion detection system
adding a dedicated intrusion prevention device
A _________________ network is capable of delivering voice, video, text, and graphics over the same communication channels.
converged
synchronized
LAN
WAN
The acronym ______________ refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.
BYOD
BYOC
IRC
ADW
interactive websites where people create and share user-generated content with friends and family
wiki
podcast
social media
blog
Web pages that groups of people can edit and view together
wiki
social media
podcast
blog
an audio-based medium that allows people to deliver their recordings to a wide audience
instant messaging
blog
wiki
podcast
real-time communication of between two or more people
podcast
social media
instant messaging
wiki
web pages that give anyone a means to communicate their thoughts to a global audience without technical knowledge of web design
wiki
blog
social media
instant messaging
Not suited for heavily wooded areas
cable
DSL
satellite
dedicated leased line
uses coaxial cable as a medium
DSL
cable
dialup
satellite
typically has very low bandwidth
dedicated leased line
cable
dialup
DSL
high bandwidth connection that runs over telephone line
DSL
dedicated leased line
cable
dialup
typically uses a T1/E1 or T3/E3 circuit
satellite
DSL
dedicated leased line
cable
only the intended recipients can access and read the data
ensuring availability
maintaining integrity
ensuring confidentiality
the assurance that the information has not been altered during transmission
ensuring availability
maintaining integrity
ensuring confidentiality
the assurance of timely and reliable access to data
ensuring availability
maintaining integrity
ensuring confidentiality
Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?
BYOD
cloud computing
video conferencing
powerline networking
What is a characteristic of a converged network?
A converged network requires a separate network infrastructure for each type of communication technology
it delivers data, voice, and video over the same network infrastructure
it limits the impact of a failure by minimizing the number of devices affected
it provides only one path between the source and destination of a message
What is the function of the kernel of an operating software?
It provides a user interface that allows users to request a specific task
The kernel links the hardware drivers with the underlying electronics of a computer.
It is an application that allows the initial configuration of a Cisco device.
The kernel provisions hardware resources to meet software requirements
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
Telnet
Console
AUX
SSH
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Use Telnet to remotely access the switch through the network.
Use the console port to locally access the switch from a serial or USB interface of the PC.
Use Secure Shell to remotely access the switch through the network.
Use the AUX port to locally access the switch from a serial or USB interface of the PC
Which command or key combination allows a user to return to the previous level in the command hierarchy?
end
exit
Ctrl-Z
Ctrl-C
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
global configuration mode
setup mode
privileged EXEC mode
user EXEC mode
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
providing an error message when a wrong command is submitted
displaying a list of all available commands within the current mode
allowing the user to complete the remainder of an abbreviated command with the TAB key
determining which option, keyword, or argument is available for the entered command
selecting the best command to accomplish a task
Which information does the show startup-config command display?
the IOS image copied into RAM
the bootstrap program in the ROM
the contents of the current running configuration file in the RAM
the contents of the saved configuration file in the NVRAM
Why is it important to configure a hostname on a device?
a Cisco router or switch only begins to operate when its hostname is set
a hostname must be configured before any other parameters
to identify the device during remote access (SSH or telnet)
to allow local access to the device through the console port
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)
Branch2!
RM-3-Switch-2A4
Floor(15)
HO Floor 17
SwBranch799
How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords as they are sent across the network.
It encrypts passwords that are stored in router or switch configuration files.
It requires that a user type encrypted passwords to gain console access to a router or switch.
It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet
Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?
to display a message when a user accesses the switch
to configure switch SW1 so that only the users in the Admin group can telnet into SW1
to force users of the Admin group to enter a password for authentication
to configure switch SW1 so that the message will display when a user enters the enable command
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration.
Delete the vlan.dat file and reboot the device.
Close and reopen the terminal emulation software.
Issue the copy startup-config running-config command
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified.
It is stored in NVRAM.
It should be deleted using the erase running-config command.
It is automatically saved when the router reboots.
What are two characteristics of RAM on a Cisco device? (Choose two.)
RAM provides nonvolatile storage.
The configuration that is actively running on the device is stored in RAM.
The contents of RAM are lost during a power cycle.
RAM is a component in Cisco switches but not in Cisco routers.
RAM is able to store multiple versions of IOS and configuration files
Which interface allows remote management of a Layer 2 switch?
the AUX interface
the console port interface
the switch virtual interface
the first Ethernet port interface
Which interface is the default SVI on a Cisco switch?
FastEthernet 0/1
GigabitEthernet 0/1
VLAN 1
VLAN 99
Why would a Layer 2 switch need an IP address?
to enable the switch to send broadcast frames to attached PCs
to enable the switch to function as a default gateway
to enable the switch to be managed remotely
to enable the switch to receive frames from attached PCs
What command can be used on a Windows PC to see the IP configuration of that computer?
ping
ipconfig
show interfaces
show ip interface brief
A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?
The PC does not require any additional information to function on the network.
The PC came preconfigured with IP addressing information from the factory.
The PC was preconfigured to use DHCP.
The PC used DNS to automatically receive IP addressing information from a server.
The PC virtual interface is compatible with any network.
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
if the TCP/IP stack is functioning on the PC without putting traffic on the wire
if there is connectivity with the destination device
the path that traffic will take to reach the destination
what type of device is at the destination
Refer to the exhibit. A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with? (Choose two.)
connectivity: switch 2
connectivity: PC-D
no connectivity: switch 1
no connectivity: switch 2
no connectivity: PC-C
Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)
Two physical interfaces have been configured.
The switch can be remotely managed.
One device is attached to a physical interface.
Two devices are attached to the switch.
The default SVI has been configured
An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)
-first mode -interface configuration mode
-second mode -privileged EXEC mode
-third mode -line configuration mode
-final mode -global configuration mode
-user EXEC mode
first mode - user EXEC mode
second mode - global configuration mode
third mode - interface configuration mode
final mode - line configuration mode
first mode - user EXEC mode
second mode - privileged EXEC mode
third mode - global configuration mode
final mode - line configuration mode
first mode - user EXEC mode
second mode - privileged EXEC mode
third mode - line configuration mode
final mode - interface configuration mode
first mode - global configuration mode
second mode - line configuration mode
third mode - user EXEC mode
final mode - privileged EXEC mode
displays the next screen
up arrow
?
space bar
tab
Scrolls backwards through previously entered commands
ctrl-c
tab
ctrl-shift-6
up arrow
provides context-sensitive help
tab
?
ctrl-c
space bar
completes abbreviated commands and parameters
up arrow
?
space bar
tab
aborts commands such as trace and ping
up arrow
space bar
ctrl-c
ctrl-shift-6
cancels any command currently being entered and returns directly to privileged EXEC mode
ctrl-c
ctrl-shift-6
tab
up arrow
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
encapsulation
flow control
access method
response timeout
What type of communication will send a message to all devices on a local area network?
broadcast
multicast
unicast
allcast
What process is used to place one message inside another message for transfer from the source to the destination?
access control
decoding
encapsulation
flow control
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, IP, TCP, Ethernet
HTTP, TCP, IP, Ethernet
Ethernet, TCP, IP, HTTP
Ethernet, IP, TCP, HTTP
Which statement is correct about network protocols?
Network protocols define the type of hardware that is used and how it is mounted in racks.
They define how messages are exchanged between the source and the destination.
They all function in the network access layer of TCP/IP.
They are only required for exchange of messages between devices on remote networks
Which statement is true about the TCP/IP and OSI models?
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
The TCP/IP network access layer has similar functions to the OSI network layer.
The OSI Layer 7 and the TCP/IP application layer provide identical functions.
The first three OSI layers describe general services that are also provided by the TCP/IP internet layer
What is an advantage of using standards to develop and implement protocols?
A particular protocol can only be implemented by one manufacturer.
Products from different manufacturers can interoperate successfully.
Different manufacturers are free to apply different requirements when implementing a protocol.
Standards provide flexibility for manufacturers to create devices that comply with unique requirements
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
ARP
DHCP
DNS
FTP
NAT
What are proprietary protocols?
protocols developed by private organizations to operate on any vendor hardware
protocols that can be freely used by any organization or vendor
protocols developed by organizations who have control over their definition and operation
a collection of protocols known as the TCP/IP protocol suite
What is an advantage of network devices using open standard protocols?
Network communications is confined to data transfers between devices from the same vendor.
A client host and a server running different operating systems can successfully exchange data.
Internet access can be controlled by a single ISP in each market.
Competition and innovation are limited to specific types of products.
Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?
only application and Internet layers
only Internet and network access layers
only application, Internet, and network access layers
application, transport, Internet, and network access layers
application, session, transport, network, data link, and physical layers
Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)
application
presentation
session
transport
data link
At which layer of the OSI model would a logical address be encapsulated?
physical layer
data link layer
network layer
transport layer
Which PDU format is used when bits are received from the network medium by the NIC of a host?
file
frame
packet
segment
Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
bits
frame
packet
segment
Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)
A packet with the destination IP address of RouterB.
A frame with the destination MAC address of SwitchA.
A frame with the destination MAC address of RouterA
A packet with the destination IP address of RouterA.
A packet with the destination IP address of ServerB.
Which address does a NIC use when deciding whether to accept a frame?
source IP address
source MAC address
destination IP address
destination MAC address
source Ethernet address
What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful
Which characteristic describes the default gateway of a host computer?
the logical address of the router interface on the same network as the host computer
the physical address of the switch interface connected to the host computer
the physical address of the router interface on the same network as the host computer
the logical address assigned to the switch interface connected to the router
the process of converting information from one format into another acceptable for transmission
message encoding
message encapsulation
message sizing
the process of placing one message format inside another message format
message encoding
message encapsulation
message sizing
the process of breaking up a long message into individual pieces before being sent over the network
message encoding
message encapsulation
message sizing
governing the way a web server and a web client interact
application protocol
internet protocol
network access protocol
transport protocol
taking the segments from transport protocol, encapsulating them into packets, and assigning them with appropriate addresses
application protocol
internet protocol
network access protocol
transport protocol
preparing packets to be transmitted over the network media
application protocol
internet protocol
network access protocol
transport protocol
managing the individual conversations between web servers and web clients
application protocol
internet protocol
network access protocol
transport protocol
this organization promotes the open development, evolution, and use of the Internet throughout the world
ISOC
ICANN
EIA
ISO
this organization is the largest developer of international standards in the world for a wide variety of products and services. It is know for its Open Systems Interconnection (OSI) reference model
ISO
IANA
ICANN
ISOC
This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers
ICANN
IANA
EIA
ISOC
This organization is an international standards and trade organization for electronics organizations. It is best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.
ISOC
ICANN
IANA
EIA