CCNA Final Exam Flashcards
53 Questions
100 Views

CCNA Final Exam Flashcards

Created by
@TenaciousFeynman9892

Questions and Answers

What is a characteristic of a fault tolerant network?

A network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure.

If QoS is implemented on the network, what will be the priorities from highest to lowest of the different data types?

Audio conference, financial transactions, web page.

What is a benefit of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

What is the function of the shell in an OS?

<p>It interfaces between the users and the kernel.</p> Signup and view all the answers

Which connection provides a secure CLI session with encryption to a Cisco switch?

<p>An SSH connection.</p> Signup and view all the answers

What is the reason for the command being rejected when configuring an interface from the wrong mode of operation?

<p>The command is being entered from the wrong mode of operation.</p> Signup and view all the answers

What is the purpose of using the Ctrl-Shift-6 key combination on a switch after issuing the ping command?

<p>To interrupt the ping process.</p> Signup and view all the answers

Which password is needed to access user EXEC mode via a console connection?

<p>lineconin.</p> Signup and view all the answers

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

<p>VLAN 1.</p> Signup and view all the answers

What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

<p>TCP.</p> Signup and view all the answers

What is an advantage of using a protocol that is defined by an open standard?

<p>It encourages competition and promotes choices.</p> Signup and view all the answers

What are two benefits of using a layered network model? (Choose two.)

<p>It assists in protocol design.</p> Signup and view all the answers

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)

<p>Transport</p> Signup and view all the answers

What name is assigned to the transport layer PDU?

<p>Segment.</p> Signup and view all the answers

In which layer of the OSI model is the error categorized if the signals generated by the server NIC are distorted?

<p>Physical layer.</p> Signup and view all the answers

Which three factors could influence the differences in throughput? (Choose three.)

<p>The type of traffic that is crossing the network.</p> Signup and view all the answers

What is a characteristic of UTP cabling?

<p>Cancellation.</p> Signup and view all the answers

What are two characteristics of fiber-optic cable? (Choose two.)

<p>It is not affected by EMI or RFI.</p> Signup and view all the answers

What is a characteristic of the LLC sublayer?

<p>It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.</p> Signup and view all the answers

Which topology provides high availability and connects some, but not all, remote sites?

<p>Partial mesh.</p> Signup and view all the answers

What method is used to manage contention-based access on a wireless network?

<p>CSMA/CA.</p> Signup and view all the answers

What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

<p>Detection of errors through CRC calculations.</p> Signup and view all the answers

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

<p>It will discard the frame.</p> Signup and view all the answers

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

<p>Store-and-forward switching.</p> Signup and view all the answers

What will the destination address be in the frame when it leaves host A sending an IP packet to host B?

<p>BB:BB:BB:BB:BB:BB.</p> Signup and view all the answers

What addresses are mapped by ARP?

<p>Destination MAC address to a destination IPv4 address.</p> Signup and view all the answers

What are two services provided by the OSI network layer? (Choose two.)

<p>Encapsulating PDUs from the transport layer.</p> Signup and view all the answers

What are two functions of NVRAM? (Choose two.)

<p>To store the startup configuration file.</p> Signup and view all the answers

What will be the result of entering a configuration the next time a network administrator connects a console cable to the router?

<p>The administrator will be presented with the R1&gt; prompt.</p> Signup and view all the answers

What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?

<p>203.0.113.211.</p> Signup and view all the answers

What are three characteristics of multicast transmission? (Choose three.)

<p>Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255.</p> Signup and view all the answers

What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)

<p>172.16.0.0/12</p> Signup and view all the answers

What purpose does NAT64 serve in IPv6?

<p>It converts IPv6 packets into IPv4 packets.</p> Signup and view all the answers

What is the most compressed representation of the IPv6 address 2001:0000:0000:abcd:0000:0000:0000:0001?

<p>2001:0:0:abcd::1.</p> Signup and view all the answers

Which range of link-local addresses can be assigned to an IPv6-enabled interface?

<p>FE80::/10.</p> Signup and view all the answers

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

<ol start="62"> <li></li> </ol> Signup and view all the answers

Which subnet mask would be used to accommodate 126 hosts?

<p>255.255.255.128.</p> Signup and view all the answers

Which subnet includes the address 192.168.1.96 as a usable host address?

<p>192.168.1.64/26.</p> Signup and view all the answers

Which statement is true about variable-length subnet masking?

<p>False</p> Signup and view all the answers

Which scenario describes a function provided by the transport layer?

<p>A student has two web browser windows open to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.</p> Signup and view all the answers

Which information is used by the TCP/IP protocol stack to identify which of the three web browsers should receive the reply from the web server?

<p>The destination port number.</p> Signup and view all the answers

What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

<p>To identify missing segments at the destination.</p> Signup and view all the answers

Which two tasks are functions of the presentation layer? (Choose two.)

<p>Encryption.</p> Signup and view all the answers

What is a key characteristic of the peer-to-peer networking model?

<p>Resource sharing without a dedicated server.</p> Signup and view all the answers

Which software utility can a technician use to diagnose the problem if they can ping the IP address but not the URL of a web server?

<p>nslookup.</p> Signup and view all the answers

Which domain name would be an example of a top-level domain?

<p>.com.</p> Signup and view all the answers

What happens to the IP address configuration obtained from DHCP if the PC is taken off the network for repair?

<p>The address is returned to the pool for reuse when the lease expires.</p> Signup and view all the answers

What protocol would be used by a wireless host to request an IP address?

<p>DHCP.</p> Signup and view all the answers

Which command would help mitigate brute-force password attacks against a router?

<p>login block-for 60 attempts 5 within 60.</p> Signup and view all the answers

Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?

<p>show interfaces.</p> Signup and view all the answers

Which example of malicious code would be classified as a Trojan horse?

<p>Malware that was written to look like a video game.</p> Signup and view all the answers

Where are Cisco IOS debug output messages sent by default?

<p>Console line.</p> Signup and view all the answers

Match the description with the associated IOS mode:

<p>User EXEC mode = Basic access to router commands Privileged EXEC mode = Extended access for configuration Global Configuration mode = Allows configuration changes to the device</p> Signup and view all the answers

Study Notes

Fault Tolerant Networks

  • A fault tolerant network quickly recovers from failures and uses redundancy to minimize the impact of disruptions.

Quality of Service (QoS)

  • Data priorities in a corporate network with QoS: audio conference (highest), financial transactions, web browsing (lowest).

Cloud Computing Benefits

  • Cloud computing enhances network capabilities without the need for new infrastructure, personnel, or software investments.

Operating System Shell

  • The shell serves as the interface between users and the operating system kernel.

Secure CLI Connection

  • An SSH connection ensures a secure command-line interface (CLI) session with encryption for Cisco switches.

Configuration Commands

  • Commands can be rejected if entered from incorrect operation modes.

Interrupting Processes

  • Ctrl-Shift-6 interrupts ongoing processes such as a ping command on a network device.

Accessing User EXEC Mode

  • The password required for access via console connection to a switch is ‘lineconin’.

Remote Management

  • To manage a switch remotely, configure an IP address on VLAN 1.

TCP Protocol

  • TCP is responsible for segment control and data exchange rates between web clients and servers.

Open Standard Protocols

  • Protocols defined by open standards promote competition and provide users with more choices.

Layered Network Model Benefits

  • Advantages include better protocol design and isolation of technology between layers, preventing one layer's issues from affecting others.

OSI Model to TCP/IP Model Comparison

  • The network layer in OSI corresponds to the network layer in TCP/IP, while transport layer in OSI corresponds to the transport layer in TCP/IP.

Transport Layer PDU

  • The protocol data unit (PDU) at the transport layer is referred to as a segment.

Error Categorization

  • Distorted signal errors from a NIC fall under the physical layer in the OSI model.

Factors Influencing Network Throughput

  • Factors impacting throughput include traffic amount, type of traffic, and latency caused by multiple network devices.

UTP Cabling Characteristics

  • Unshielded Twisted Pair (UTP) cabling is known for its cancellation properties.

Fiber-Optic Cable Characteristics

  • Fiber-optic cables resist EMI/RFI interference and are more expensive than UTP cabling.

LLC Sublayer Functionality

  • The Logical Link Control (LLC) sublayer allows multiple Layer 3 protocols to utilize the same interface and media.

Partial Mesh Topology

  • A partial mesh topology provides high availability while connecting some remote sites to a central location.

Wireless Network Access Method

  • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is used in wireless networks to manage contention-based access.

Layer 2 Data Encapsulation Functions

  • Key functions include data link layer addressing, error detection via CRC, and delimiting bit groups into frames.

Ethernet Frame Handling

  • An Ethernet host discards frames with unmatching destination MAC addresses.

Frame Forwarding Method

  • Store-and-forward switching waits for the entire frame and performs a CRC check before forwarding.

ARP Functionality

  • Address Resolution Protocol (ARP) maps destination MAC addresses to IPv4 addresses.

OSI Network Layer Services

  • Primary services include routing packets and encapsulating transport layer Protocol Data Units.

NVRAM Functions

  • Non-volatile Random Access Memory (NVRAM) retains data when powered down and stores the startup configuration file.

Console Connection Configuration

  • Console cable connections will prompt the R1> prompt after configuration.

IPv4 Dotted Decimal Conversion

  • The IPv4 address 11001011.00000000.01110001.11010011 corresponds to 203.0.113.211.

Multicast Transmission Characteristics

  • Multicast allows a single packet to target multiple hosts and is utilized by routers for routing information.

Private IP Address Ranges

  • Internal private use IP ranges include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

NAT64 Purpose

  • NAT64 is designed to convert IPv6 packets into IPv4 packets.

Compressed IPv6 Representation

  • The most compressed form of the IPv6 address 2001:0000:0000:abcd:0000:0000:0000:0001 is 2001:0:0:abcd::1.
  • The range of link-local addresses for IPv6 interfaces is FE80::/10.

Valid Host Addresses Calculation

  • A /26 subnet mask allows for 62 valid host addresses.

Subnet Mask for Host Accommodation

  • The subnet mask 255.255.255.128 can accommodate 126 hosts.

Usable Host Address Subnet

  • The subnet 192.168.1.64/26 includes 192.168.1.96 as a usable address.

Variable-Length Subnet Masking

  • Variable-length subnet masking allows different subnet sizes based on specific needs.

Transport Layer Function Scenario

  • The transport layer ensures accurate delivery of web pages to the correct browser in instances with multiple browser windows.

TCP/IP Reply Identification

  • In TCP/IP, the destination port number is used to determine which web browser receives a server reply.

TCP Sequence Number Usage

  • Sequence numbers are used to identify missing segments and for segment reassembly.

Presentation Layer Functions

  • Tasks of the presentation layer include data compression and encryption.

Peer-to-Peer Networking Model

  • Peer-to-peer allows resource sharing among users without a dedicated server.

Network Diagnostic Tools

  • The nslookup utility can diagnose issues when a web server's IP address can be pinged but not its URL.

Example of a Top-Level Domain

  • Domains that fall under top-level domains include .com.

DHCP IP Address Handling

  • An IP address from a DHCP server is returned to the pool for reuse after the lease period expires when a PC is taken offline.

DHCP for IP Address Requests

  • Dynamic Host Configuration Protocol (DHCP) is used for requesting IP addresses in wireless networks.

Router Security Command

  • The command login block-for 60 attempts 5 within 60 is effective for mitigating brute-force password attacks on routers.

Switch Port Details Command

  • The show interfaces command reveals Layer 1 and Layer 2 details of a switch port.

Trojan Horse Definition

  • A Trojan horse is a type of malware disguised as a legitimate application, such as a video game.

Debug Output Location

  • By default, Cisco IOS debug output messages are displayed on the console line.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

These flashcards cover essential concepts for the CCNA Final Exam, focusing on network characteristics and scenarios. Test your knowledge on fault tolerance, network reliability, and practical applications of networking principles. Perfect for final review!

More Quizzes Like This

Practical Byzantine Fault Tolerance
10 questions
FDDI Network Architecture Quiz
9 questions
FHRP Overview and Concepts
17 questions
Use Quizgecko on...
Browser
Browser