Cisco Networking Fundamentals Quiz
43 Questions
101 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which connection provides a secure CLI session with encryption to a Cisco switch?

  • FTP
  • HTTP
  • SSH (correct)
  • Telnet
  • Why was the command rejected by the device: SanJose(config)# ip address 192.168.2.1 255.255.255.0?

    The command is being entered from the wrong mode of operation.

    What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

    TCP

    What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

    <p>It will discard the frame.</p> Signup and view all the answers

    Which connection type should a medium-sized business choose for high-speed internet with dedicated, symmetric access?

    <p>Leased line.</p> Signup and view all the answers

    What is the purpose of having a converged network?

    <p>To reduce the cost of deploying and maintaining the communication infrastructure.</p> Signup and view all the answers

    What characteristic of a network enables it to quickly grow to support new users and applications without impacting performance?

    <p>Scalability.</p> Signup and view all the answers

    Where will configuration changes be stored after issuing the command 'copy running-configuration startup-configuration'?

    <p>NVRAM.</p> Signup and view all the answers

    What is the problem if the message-of-the-day banner does not appear correctly when using Telnet?

    <p>The delimiting character appears in the banner message.</p> Signup and view all the answers

    What are three characteristics of an SVI? (Select all that apply)

    <p>It is associated with VLAN1 by default.</p> Signup and view all the answers

    What is the technician configuring with these commands: SwitchA(config)# interface vlan1, Switch A(config-if)#ip address 192.168.1.1 255.255.255.0, Switch A(config-if)# no shutdown?

    <p>SVI.</p> Signup and view all the answers

    What is the purpose of message encoding in computer communication?

    <p>To convert information to the appropriate form for transmission.</p> Signup and view all the answers

    What are two benefits of using a layered network model? (Select all that apply)

    <p>It prevents technology in one layer from affecting other layers.</p> Signup and view all the answers

    What is the process of dividing a data stream into smaller pieces before transmission called?

    <p>Segmentation.</p> Signup and view all the answers

    Which property identifies the network and host portion of an IPv4 address?

    <p>Subnet mask.</p> Signup and view all the answers

    In which layer of the OSI model is distorted signal categorized?

    <p>Physical layer.</p> Signup and view all the answers

    Which three factors could influence differences in throughput on a network? (Choose three.)

    <p>The amount of traffic crossing the network.</p> Signup and view all the answers

    Which type of UTP cable is used to connect a PC to a switch port?

    <p>Straight-through.</p> Signup and view all the answers

    What is a characteristic of the LLC sublayer?

    <p>It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.</p> Signup and view all the answers

    What are the three primary functions provided by Layer 2 data encapsulation? (Select all that apply)

    <p>Data link layer addressing.</p> Signup and view all the answers

    What are two actions performed by a Cisco switch?

    <p>Using the source MAC addresses of frames to build and maintain a MAC address table, Utilizing the MAC address table to forward frames via the destination MAC address.</p> Signup and view all the answers

    What are two examples of the cut-through switching method? (Select all that apply)

    <p>Fast-forward switching.</p> Signup and view all the answers

    What are two services provided by the OSI network layer? (Select all that apply)

    <p>Routing packets toward the destination.</p> Signup and view all the answers

    What information is added during encapsulation at OSI layer 3?

    <p>Source and destination IP address.</p> Signup and view all the answers

    What are two functions of NVRAM? (Select all that apply)

    <p>To store the startup configuration file.</p> Signup and view all the answers

    Why does a layer 3 device perform the ANDing process on a destination IP address and subnet mask?

    <p>To identify the network address of the destination network.</p> Signup and view all the answers

    What are three ranges of IP addresses that are reserved for internal private use? (Select all that apply)

    <p>192.168.0.0/16</p> Signup and view all the answers

    Which addresses are valid public addresses? (Select all that apply)

    <p>64.104.78.227</p> Signup and view all the answers

    What type of IPv6 address is FE80::1?

    <p>Link local.</p> Signup and view all the answers

    Which subnet would include the address 192.168.1.96 as a usable host address?

    <p>192.168.1.64/26.</p> Signup and view all the answers

    How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?

    <p>62</p> Signup and view all the answers

    Each subnet is the same size in variable-length subnet masking.

    <p>False</p> Signup and view all the answers

    In what two situations would UDP be the preferred transport protocol over TCP? (Select all that apply)

    <p>When a faster delivery mechanism is needed.</p> Signup and view all the answers

    What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?

    <p>Destination and source port numbers.</p> Signup and view all the answers

    What is the TCP mechanism used in congestion avoidance?

    <p>Sliding window.</p> Signup and view all the answers

    Which three statements characterize UDP? (Select all that apply)

    <p>UDP provides basic connectionless transport layer functions.</p> Signup and view all the answers

    Which two tasks are functions of the presentation layer? (Select all that apply)

    <p>Compression.</p> Signup and view all the answers

    Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Select all that apply)

    <p>POP.</p> Signup and view all the answers

    Which two roles can a computer assume in a peer-to-peer network where a file is being shared between two computers? (Select all that apply)

    <p>Client.</p> Signup and view all the answers

    What is the function of the HTTP GET message?

    <p>To request an HTML page from a web server.</p> Signup and view all the answers

    What protocol would a wireless host use to request an IP address?

    <p>DHCP.</p> Signup and view all the answers

    Where should packet captures take place to assess network traffic for growth planning?

    <p>On as many different network segments as possible.</p> Signup and view all the answers

    Which command would help mitigate brute-force password attacks against a router?

    <p>login block-for 60 attempts 5 within 60.</p> Signup and view all the answers

    Study Notes

    Networking Concepts and Protocols

    • An SSH connection provides a secure CLI session with encryption for configuring Cisco devices.
    • Incorrect operational mode can lead to command rejection in device configuration, highlighting the importance of the correct CLI mode.
    • TCP controls segment size and transmission rate between clients and servers, ensuring efficient data transfer.

    Ethernet Frame Processing

    • Hosts discard frames with non-matching destination MAC addresses, maintaining network efficiency.
    • The SVI (Switch Virtual Interface) allows remote management of switches and operates on VLAN1 by default without a physical link.

    Network Connectivity

    • Leased lines offer high-speed, dedicated, symmetric internet access suitable for medium-sized businesses.
    • A converged network reduces costs related to communication infrastructure deployment and maintenance.

    Scalability and Configuration

    • Scalability enables networks to expand without performance degradation, essential for accommodating new users and applications.
    • NVRAM stores configuration changes when using the command copy running-configuration startup-configuration.

    OSI Model and Encapsulation

    • Message encoding in communication converts information into a suitable form for transmission.
    • OSI Layer 3 adds source and destination IP addresses during encapsulation, crucial for packet routing.

    IP Addressing and Subnetting

    • Subnet masks identify network and host portions of an IPv4 address, essential for proper addressing.
    • Private IP address ranges include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16, reserved for internal use.

    Valid Public IP Addresses

    • Valid public IP addresses include 198.133.219.17, 128.107.12.117, and 64.104.78.227, while private addresses fall in specified ranges.

    IPv6 and Subnetting

    • FE80::1 denotes a link-local IPv6 address, used for communication within a single network segment.
    • The subnet 192.168.1.64/26 includes 192.168.1.96 as a usable host address.

    Host Address Calculations

    • A /26 subnet provides 62 valid host addresses, demonstrating efficient use of address space.

    Variable Length Subnet Masking

    • Variable-length subnet masking allows for varied subnet sizes based on needs, optimizing IP address allocation.

    UDP vs. TCP

    • UDP is preferred over TCP for faster delivery and when applications do not require guaranteed data delivery.
    • TCP/IP transport layer headers include destination and source port numbers to ensure communication with remote devices.

    Network Protocol Characteristics

    • UDP is a connectionless protocol that offers basic transport functions, is low overhead, and relies on application protocols for error detection.
    • Key tasks of the presentation layer include data compression and encryption.

    TCP/IP Protocol Stack

    • DNS and POP operate at the highest layers of the TCP/IP protocol stack, facilitating domain name resolution and email retrieval, respectively.

    Peer-to-Peer Networking

    • In a peer-to-peer network, a computer can act as both a client and a server while sharing files.

    HTTP and DHCP Protocols

    • HTTP GET requests an HTML page from a web server, while DHCP helps wireless hosts acquire IP addresses.

    Network Growth Assessment

    • Network traffic assessments should occur on multiple segments to effectively plan for growth and bandwidth requirements.

    Security Measures

    • The command "login block-for 60 attempts 5 within 60" mitigates brute-force password attacks on routers, enhancing network security.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on Cisco networking concepts, including secure connections and interface configurations. This quiz covers critical topics for network technicians, focusing on common commands and modes of operation. Challenge yourself and enhance your understanding of essential networking principles.

    More Like This

    Cisco Networking Fundamentals
    7 questions
    CISCO Networking Quiz
    10 questions
    Cisco Networking Academy Overview
    10 questions
    Use Quizgecko on...
    Browser
    Browser