Cisco Networking Fundamentals Quiz
43 Questions
101 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which connection provides a secure CLI session with encryption to a Cisco switch?

  • FTP
  • HTTP
  • SSH (correct)
  • Telnet

Why was the command rejected by the device: SanJose(config)# ip address 192.168.2.1 255.255.255.0?

The command is being entered from the wrong mode of operation.

What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

TCP

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

<p>It will discard the frame.</p> Signup and view all the answers

Which connection type should a medium-sized business choose for high-speed internet with dedicated, symmetric access?

<p>Leased line.</p> Signup and view all the answers

What is the purpose of having a converged network?

<p>To reduce the cost of deploying and maintaining the communication infrastructure.</p> Signup and view all the answers

What characteristic of a network enables it to quickly grow to support new users and applications without impacting performance?

<p>Scalability.</p> Signup and view all the answers

Where will configuration changes be stored after issuing the command 'copy running-configuration startup-configuration'?

<p>NVRAM.</p> Signup and view all the answers

What is the problem if the message-of-the-day banner does not appear correctly when using Telnet?

<p>The delimiting character appears in the banner message.</p> Signup and view all the answers

What are three characteristics of an SVI? (Select all that apply)

<p>It is associated with VLAN1 by default. (B), It provides a means to remotely manage a switch. (C)</p> Signup and view all the answers

What is the technician configuring with these commands: SwitchA(config)# interface vlan1, Switch A(config-if)#ip address 192.168.1.1 255.255.255.0, Switch A(config-if)# no shutdown?

<p>SVI.</p> Signup and view all the answers

What is the purpose of message encoding in computer communication?

<p>To convert information to the appropriate form for transmission.</p> Signup and view all the answers

What are two benefits of using a layered network model? (Select all that apply)

<p>It prevents technology in one layer from affecting other layers. (B), It assists in protocol design. (D)</p> Signup and view all the answers

What is the process of dividing a data stream into smaller pieces before transmission called?

<p>Segmentation.</p> Signup and view all the answers

Which property identifies the network and host portion of an IPv4 address?

<p>Subnet mask.</p> Signup and view all the answers

In which layer of the OSI model is distorted signal categorized?

<p>Physical layer.</p> Signup and view all the answers

Which three factors could influence differences in throughput on a network? (Choose three.)

<p>The amount of traffic crossing the network. (A), The type of traffic crossing the network. (B), The latency created by network devices. (D)</p> Signup and view all the answers

Which type of UTP cable is used to connect a PC to a switch port?

<p>Straight-through.</p> Signup and view all the answers

What is a characteristic of the LLC sublayer?

<p>It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.</p> Signup and view all the answers

What are the three primary functions provided by Layer 2 data encapsulation? (Select all that apply)

<p>Data link layer addressing. (B), Delimiting groups of bits into frames. (C), Detection of errors through CRC calculations. (D)</p> Signup and view all the answers

What are two actions performed by a Cisco switch?

<p>Using the source MAC addresses of frames to build and maintain a MAC address table, Utilizing the MAC address table to forward frames via the destination MAC address.</p> Signup and view all the answers

What are two examples of the cut-through switching method? (Select all that apply)

<p>Fast-forward switching. (A), Fragment-free switching. (C)</p> Signup and view all the answers

What are two services provided by the OSI network layer? (Select all that apply)

<p>Routing packets toward the destination. (A), Encapsulating PDUs from the transport layer. (B)</p> Signup and view all the answers

What information is added during encapsulation at OSI layer 3?

<p>Source and destination IP address.</p> Signup and view all the answers

What are two functions of NVRAM? (Select all that apply)

<p>To store the startup configuration file. (A), To retain contents when power is removed. (B)</p> Signup and view all the answers

Why does a layer 3 device perform the ANDing process on a destination IP address and subnet mask?

<p>To identify the network address of the destination network.</p> Signup and view all the answers

What are three ranges of IP addresses that are reserved for internal private use? (Select all that apply)

<p>192.168.0.0/16 (B), 10.0.0.0/8 (C), 172.16.0.0/12 (D)</p> Signup and view all the answers

Which addresses are valid public addresses? (Select all that apply)

<p>64.104.78.227 (A), 128.107.12.117 (E), 198.133.219.17 (F)</p> Signup and view all the answers

What type of IPv6 address is FE80::1?

<p>Link local.</p> Signup and view all the answers

Which subnet would include the address 192.168.1.96 as a usable host address?

<p>192.168.1.64/26.</p> Signup and view all the answers

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

<p>62 (D)</p> Signup and view all the answers

Each subnet is the same size in variable-length subnet masking.

<p>False (B)</p> Signup and view all the answers

In what two situations would UDP be the preferred transport protocol over TCP? (Select all that apply)

<p>When a faster delivery mechanism is needed. (A), When applications do not need to guarantee delivery of the data. (C)</p> Signup and view all the answers

What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?

<p>Destination and source port numbers.</p> Signup and view all the answers

What is the TCP mechanism used in congestion avoidance?

<p>Sliding window.</p> Signup and view all the answers

Which three statements characterize UDP? (Select all that apply)

<p>UDP provides basic connectionless transport layer functions. (A), UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. (D)</p> Signup and view all the answers

Which two tasks are functions of the presentation layer? (Select all that apply)

<p>Compression. (C), Encryption. (D)</p> Signup and view all the answers

Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Select all that apply)

<p>POP. (A), DNS. (D)</p> Signup and view all the answers

Which two roles can a computer assume in a peer-to-peer network where a file is being shared between two computers? (Select all that apply)

<p>Client. (C), Server. (D)</p> Signup and view all the answers

What is the function of the HTTP GET message?

<p>To request an HTML page from a web server.</p> Signup and view all the answers

What protocol would a wireless host use to request an IP address?

<p>DHCP.</p> Signup and view all the answers

Where should packet captures take place to assess network traffic for growth planning?

<p>On as many different network segments as possible.</p> Signup and view all the answers

Which command would help mitigate brute-force password attacks against a router?

<p>login block-for 60 attempts 5 within 60.</p> Signup and view all the answers

Study Notes

Networking Concepts and Protocols

  • An SSH connection provides a secure CLI session with encryption for configuring Cisco devices.
  • Incorrect operational mode can lead to command rejection in device configuration, highlighting the importance of the correct CLI mode.
  • TCP controls segment size and transmission rate between clients and servers, ensuring efficient data transfer.

Ethernet Frame Processing

  • Hosts discard frames with non-matching destination MAC addresses, maintaining network efficiency.
  • The SVI (Switch Virtual Interface) allows remote management of switches and operates on VLAN1 by default without a physical link.

Network Connectivity

  • Leased lines offer high-speed, dedicated, symmetric internet access suitable for medium-sized businesses.
  • A converged network reduces costs related to communication infrastructure deployment and maintenance.

Scalability and Configuration

  • Scalability enables networks to expand without performance degradation, essential for accommodating new users and applications.
  • NVRAM stores configuration changes when using the command copy running-configuration startup-configuration.

OSI Model and Encapsulation

  • Message encoding in communication converts information into a suitable form for transmission.
  • OSI Layer 3 adds source and destination IP addresses during encapsulation, crucial for packet routing.

IP Addressing and Subnetting

  • Subnet masks identify network and host portions of an IPv4 address, essential for proper addressing.
  • Private IP address ranges include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16, reserved for internal use.

Valid Public IP Addresses

  • Valid public IP addresses include 198.133.219.17, 128.107.12.117, and 64.104.78.227, while private addresses fall in specified ranges.

IPv6 and Subnetting

  • FE80::1 denotes a link-local IPv6 address, used for communication within a single network segment.
  • The subnet 192.168.1.64/26 includes 192.168.1.96 as a usable host address.

Host Address Calculations

  • A /26 subnet provides 62 valid host addresses, demonstrating efficient use of address space.

Variable Length Subnet Masking

  • Variable-length subnet masking allows for varied subnet sizes based on needs, optimizing IP address allocation.

UDP vs. TCP

  • UDP is preferred over TCP for faster delivery and when applications do not require guaranteed data delivery.
  • TCP/IP transport layer headers include destination and source port numbers to ensure communication with remote devices.

Network Protocol Characteristics

  • UDP is a connectionless protocol that offers basic transport functions, is low overhead, and relies on application protocols for error detection.
  • Key tasks of the presentation layer include data compression and encryption.

TCP/IP Protocol Stack

  • DNS and POP operate at the highest layers of the TCP/IP protocol stack, facilitating domain name resolution and email retrieval, respectively.

Peer-to-Peer Networking

  • In a peer-to-peer network, a computer can act as both a client and a server while sharing files.

HTTP and DHCP Protocols

  • HTTP GET requests an HTML page from a web server, while DHCP helps wireless hosts acquire IP addresses.

Network Growth Assessment

  • Network traffic assessments should occur on multiple segments to effectively plan for growth and bandwidth requirements.

Security Measures

  • The command "login block-for 60 attempts 5 within 60" mitigates brute-force password attacks on routers, enhancing network security.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on Cisco networking concepts, including secure connections and interface configurations. This quiz covers critical topics for network technicians, focusing on common commands and modes of operation. Challenge yourself and enhance your understanding of essential networking principles.

More Like This

Use Quizgecko on...
Browser
Browser