Networking Fundamentals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What two sizes represent the minimum and maximum lengths of an Ethernet frame?

  • -64 bytes and -1518 bytes (correct)
  • -64 bytes and -128 bytes
  • -128 bytes and -1518 bytes
  • -56 bytes and -1024 bytes

On a Cisco router or switch, which memory location stores the startup configuration file?

  • ROM
  • RAM
  • Flash
  • NVRAM (correct)

If an IP address of 10.1.100.50 is used with a subnet mask of 255.255.0.0, to what subnet does the IP address belong?

  • 10.0.0.0
  • 10.1.100.32
  • 10.1.0.0 (correct)
  • 10.1.100.0

With an IP address of 10.1.100.50 and a subnet mask of 255.255.255.0, to what subnet does the IP address belong?

<p>10.1.100.0 (B)</p> Signup and view all the answers

An IP address of 10.1.100.50 is used with a subnet mask of 255.0.0.0. To what subnet does this IP address belong?

<p>10.0.0.0 (C)</p> Signup and view all the answers

What type of communication sends a message to all devices on a local area network?

<p>Broadcast (B)</p> Signup and view all the answers

Which type of communication sends a message to a select group of devices on a local area network?

<p>Multicast (D)</p> Signup and view all the answers

What type of communication sends a message to only one device on a local area network?

<p>Unicast (C)</p> Signup and view all the answers

Which of the following statements accurately describes a characteristic of multicast messages?

<p>They are sent to a select group of hosts. (B)</p> Signup and view all the answers

Which process is used to place one message inside another message for transfer from the source to the destination?

<p>Encapsulation (C)</p> Signup and view all the answers

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

<p>Transport (D)</p> Signup and view all the answers

Which characteristic of a network enables it to quickly grow to support new users and applications without negatively impacting existing service performance?

<p>Scalability (B)</p> Signup and view all the answers

Which field in an IPv4 packet header remains the same during its transmission?

<p>Destination Address (A)</p> Signup and view all the answers

What action does a Cisco Ethernet switch take when it receives runt frames?

<p>The frame is dropped. (C)</p> Signup and view all the answers

What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?

<p>203.0.113.211 (C)</p> Signup and view all the answers

Which identifier is used for the delivery of data to a remote network?

<p>Destination IP address (A)</p> Signup and view all the answers

Which type of UTP cable is used to connect a PC to a switch port?

<p>Straight-through (B)</p> Signup and view all the answers

Which of the following defines crosstalk in networking?

<p>The distortion of transmitted messages from signals carried in adjacent wires (B)</p> Signup and view all the answers

Which statement is incorrect regarding IPv4 and IPv6 addresses?

<p>IPv4 addresses are 4 bits in length. (D)</p> Signup and view all the answers

What is the function of Auto-MDIX?

<p>A feature that detects Ethernet cable type (D)</p> Signup and view all the answers

Which of the following is assigned to the first 24 bits of a multicast MAC address?

<p>01-00-5E (B)</p> Signup and view all the answers

Which access method is used to manage contention-based access on a wireless network?

<p>CSMA/CA (B)</p> Signup and view all the answers

What may be affected by Media Access Control?

<p>How nodes share the media (A)</p> Signup and view all the answers

What type of addresses are used for local delivery?

<p>Local delivery (B)</p> Signup and view all the answers

Which protocol functions at the internet layer?

<p>ICMP (C)</p> Signup and view all the answers

What is the purpose of protocols in data communications?

<p>Providing the rules required for a specific type of communication to occur (C)</p> Signup and view all the answers

Which of the following describes the proper meaning of throughput?

<p>The measure of the bits transferred across the media over a given period of time (D)</p> Signup and view all the answers

Which standards body developed wireless LAN standards?

<p>IEEE (D)</p> Signup and view all the answers

What service does DHCP provide?

<p>Automatic assignment of an IP address to each host (D)</p> Signup and view all the answers

What type of software secretly collects data about websites that were visited by users?

<p>Spyware (B)</p> Signup and view all the answers

The address 01-00-5E-0A-00-02 can reach what type of host?

<p>A specific group of hosts (D)</p> Signup and view all the answers

What is a PDU?

<p>A piece of data at any layer of a networking model (A)</p> Signup and view all the answers

Which IPv4 address can a host use to ping the loopback interface?

<p>127.0.0.1 (D)</p> Signup and view all the answers

What process is used to receive transmitted data and convert it into a readable message?

<p>Decoding (D)</p> Signup and view all the answers

What is done to an IP packet before it is transmitted over the physical medium?

<p>It is encapsulated in a Layer 2 frame. (C)</p> Signup and view all the answers

Which IPv4 address format was created for ease of use and is expressed as 201.192.1.14?

<p>Dotted decimal (B)</p> Signup and view all the answers

Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format?

<p>236.17.12.10 (A)</p> Signup and view all the answers

What is the decimal equivalent of 0xC9?

<p>201 (D)</p> Signup and view all the answers

What identifier is used at the data link layer to uniquely identify an Ethernet device?

<p>MAC address (A)</p> Signup and view all the answers

Which attribute of a NIC would place it at the data link layer of the OSI model?

<p>MAC address (E)</p> Signup and view all the answers

What type of physical topology is created when all Ethernet cables connect to a central device?

<p>Star (B)</p> Signup and view all the answers

Which statement describes a characteristic of MAC addresses?

<p>They must be globally unique. (A)</p> Signup and view all the answers

What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address?

<p>It will discard the frame. (D)</p> Signup and view all the answers

Which network device makes forwarding decisions based on the destination MAC address in the frame?

<p>Switch (A)</p> Signup and view all the answers

Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table?

<p>Switch (A)</p> Signup and view all the answers

Which function or operation is performed by the LLC sublayer?

<p>It communicates with upper protocol layers. (C)</p> Signup and view all the answers

Flashcards

Ethernet frame sizes

Minimum of 64 bytes, maximum of 1518 bytes.

Cisco startup config location

NVRAM stores the startup configuration file.

Subnet of IP address 10.1.100.50 with subnet mask 255.255.0.0

10.1.0.0

Subnet of IP address 10.1.100.50 with subnet mask 255.255.255.0

10.1.100.0

Signup and view all the flashcards

Subnet with subnet mask 255.0.0.0

10.0.0.0

Signup and view all the flashcards

Communication type for all devices

Broadcast sends a message to all devices on a local area network.

Signup and view all the flashcards

Communication type for some devices

Multicast sends a message to some group of devices on a local area network

Signup and view all the flashcards

Communication type to only one device

Unicast sends a message to only one device on a local area network

Signup and view all the flashcards

Characteristic of multicast messages

Multicast messages are sent to a select group of hosts.

Signup and view all the flashcards

Process of Message Wrapping

Encapsulation places one message inside another message.

Signup and view all the flashcards

OSI layer for data segmentation

Transport layer segments and reassembles data for individual communications.

Signup and view all the flashcards

Network Growth Characteristic

Scalability enables a network to quickly grow and support new users.

Signup and view all the flashcards

IPv4 packet header field Invariant

Destination Address will typically stay the same during transmission.

Signup and view all the flashcards

Cisco switch behavior - runt frames

Runt frames are dropped when received by a Cisco Ethernet switch.

Signup and view all the flashcards

Dotted decimal representation to IPv4 to 11001011.00000000.01110001.11010011

203.0.113.211

Signup and view all the flashcards

Address for Remote Delivery

Destination IP address is used for delivery of data to a remote network.

Signup and view all the flashcards

Connector Cable for PC to Switch

Straight-through UTP cable is used to connect a PC to a switch port.

Signup and view all the flashcards

Interference in Adjacent Signals

Crosstalk is the distortion of the transmitted messages from signals carried in adjacent wires.

Signup and view all the flashcards

false IP Address statement

Incorrect: IPv4 addresses are 4 bits in length

Signup and view all the flashcards

IPv4 and IPv6 address lengths

IPv4 addresses are 32 bits in length and IPv6 addresses are 128 bits in length.

Signup and view all the flashcards

Address Notation

Dotted decimal numbers represent IPv4 addresses, hexadecimal numbers represent IPv6.

Signup and view all the flashcards

Function of Auto-MDIX

Auto-MDIX detects Ethernet cable type.

Signup and view all the flashcards

24 bits of multicast MAC Address Code

01-00-5E is assigned to the first 24 bits of a multicast MAC address

Signup and view all the flashcards

managing Wireless Network contention

CSMA/CA is used to manage contention-based access on a wireless network

Signup and view all the flashcards

MAC affected by media sharing

Media access control may affected by how nodes share the media.

Signup and view all the flashcards

Network Layer Requirement

Data link layer addresses are used data link layer addresses

Signup and view all the flashcards

Data Link Procedure

Local delivery uses data link layer addresses

Signup and view all the flashcards

Internet Layer Protocol

ICMP is protocol that functions at the internet layer.

Signup and view all the flashcards

Purpose of Communications Protocol

Providing the rules required.

Signup and view all the flashcards

Key Performance Measure

Throughput measures Bits transferred over time.

Signup and view all the flashcards

Wireless LAN standards by Who.

IEEE

Signup and view all the flashcards

Network IP Provisioning

DHCP provides automatic IP addresses.

Signup and view all the flashcards

What does DHCP Provide

Automatic IP Hosts Address

Signup and view all the flashcards

Web tracking - Type of Attack

Secretly Collecting data Websites is spying activity.

Signup and view all the flashcards

What IP adresses does the address 01-00-5E-0A-00-02 canreach.

01-00-5E-0A-00-02

Signup and view all the flashcards

PDU is piece data

Network Piece of Data.

Signup and view all the flashcards

What IPv4 Pings

Ping Loop

Signup and view all the flashcards

What IPv4 Loop address

127.0.0.1.

Signup and view all the flashcards

Transmission Communication - Receiving Data

Decoding Receives transmitted Data

Signup and view all the flashcards

IPv4 format the easiest format

Dotted decimal is easy to understand.

Signup and view all the flashcards

Study Notes

Ethernet Frame Sizes

  • The minimum size of an Ethernet frame is 64 bytes.
  • The maximum size of an Ethernet frame is 1518 bytes.

NVRAM on Cisco Devices

  • NVRAM is a memory location on a Cisco router or switch.
  • NVRAM stores the startup configuration file.

Subnet Masking

  • An IP address of 10.1.100.50 with a subnet mask of 255.255.0.0 belongs to the 10.1.0.0 subnet
  • An IP address of 10.1.100.50 with a subnet mask of 255.255.255.0 belongs to the 10.1.100.0 subnet.
  • An IP address of 10.1.100.50 with a subnet mask of 255.0.0.0 belongs to the 10.0.0.0 subnet.

Types of Network Communication

  • Broadcast communication sends a message to all devices on a local area network (one-to-all).
  • Multicast communication sends a message to some group of devices on a local area network (one-to-group).
  • Unicast communication sends a message to only one device on a local area network (one-to-one).

Multicast Messages

  • Multicast messages are sent to a select group of hosts.

Encapsulation

  • Encapsulation places one message inside another for transfer from source to destination.

OSI Model - Segmentation and Reassembly

  • The transport layer of the OSI model defines services to segment and reassemble data for individual communications between end devices.
  • Data is segmented and reassembled in the transport layer.

Network Scalability

  • Scalability enables a network to quickly grow to support new users and applications.
  • Scalability does not impact the performance of the service being delivered to existing users.

IPv4 Packet Header - Destination Address

  • The destination address field in an IPv4 packet header typically stays the same during its transmission.

Runt Frames

  • Runt frames are dropped by a Cisco Ethernet switch

IPv4 Address Representation

  • The dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011 is 203.0.113.211.

Remote Data Delivery

  • The destination IP address delivers data to a remote network.

UTP Cable Connections

  • Straight-through UTP cables connect a PC to a switch port.

Crosstalk

  • Crosstalk is the distortion of transmitted messages from signals carried in adjacent wires.

IPv4 vs IPv6 Addresses Length

  • IPv4 addresses are 32 bits in length.
  • IPv6 addresses are 128 bits in length.

IPv4 vs IPv6 Address Representation

  • IPv6 addresses are represented by hexadecimal numbers.
  • IPv4 addresses are represented by dotted decimal numbers.

Auto-MDIX

  • Auto-MDIX detects the Ethernet cable type.

Multicast MAC Address

  • The address 01-00-5E is assigned to the first 24 bits of a multicast MAC address.

CSMA/CA

  • CSMA/CA manages contention-based access on a wireless network.

Media Access Control

  • Media access control may be affected by how nodes share the media.
  • The data link layer addresses are used for local delivery.

Internet Layer Protocol

  • ICMP functions as a protocol at the internet layer.

Protocols in Data Communications

  • Protocols in data communications provide the rules required for a specific type of communication to occur.

Throughput

  • Throughput measures the bits transferred across the media over a given period of time.

Wireless LAN Standards

  • IEEE develops wireless LAN standards.

DHCP

  • DHCP provides the automatic assignment of an IP address to each host.

Spyware

  • Spyware secretly collects website data visited by users.

Multicast Address Reach

  • The address 01-00-5E-0A-00-02 reaches a specific group of hosts.

Layering of Networking Model - Piece of Data

  • PDU is the piece of data at any layer of a networking model.

Loopback Interface

  • An IPv4 address of 127.0.0.1 is used to ping the loopback interface.

Message Reception

  • Decoding process receives transmitted data and converts it into a readable message.

IP Packet Transmission

  • An IP packet is encapsulated in a Layer 2 frame before transmission over the physical medium.

IPv4 Address Format

  • The IPv4 address format created for ease of use is dotted decimal.

Binary Address Representation

  • The dotted decimal format of the binary address 11101100 00010001 00001100 00001010 is 236.17.12.10.

Decimal Equivalent

  • 201 is the decimal equivalent of 0xC9.

Ethernet Identifier

  • MAC address identifies data uniquely at the data link layer of an Ethernet device.

NIC Attribute

  • MAC address is an attribute of a NIC that would place it at the data link layer of the OSI model.

Full-Duplex Mode

  • Full-duplex mode transmits data over the network in both directions at the same time.

LLC sublayer Function

  • The LLC sublayer identifies which network layer protocol is being used.
  • MAC and LLC are the two sublayers of the OSI model data link layer.

OSI Model Layer of Encapsulation

  • The data link layer of the OSI model specifies the encapsulation method used for specific types of media.

Ethernet Cables Topology

  • By connecting all Ethernet cables to a central device, the type of physical topology created is a star.

MAC Address Characteristic

  • MAC addresses must be globally unique.

Ethernet Frame Host Reception

  • A host on an ethernet network discards Ethernet frames that it recieves when the destination MAC address doesn't match its own.

Destination MAC Address

  • Devices forward network traffic through MAC address.
  • Switches make forwarding decisions, based on the destination MAC address.

LLC Sublayer Functions

  • Interacts with upper protocol layers.
  • Responsible for media access control.
  • Adds a header and a trailer to form an OSI Layer 2 PDU.

Source Layer 2 Address

  • Switches record the source Layer 2 address of incoming frames to build up its MAC address table.

Frame Address

  • An address of 01-00-5E-0A-00-02 represents a specific group of hosts.

MAC Address Assignment

  • The first three bytes of a MAC addresses are used by the vendor assigned OUI.

Online Shopping Network Access

  • In order to do online shopping a home user must access the Internet.

Secure Remote Access

  • A VPN, would allow an employee to gain secure remote access to a company network.

Internet Connection

  • Cellular and satellite are two Internet connection options that do not require physical cables.

The Internet

  • The Internet provides connections through interconnected global networks.

WISP - Rural Broadband Access

  • The use of WISP is recommended in A farm in a rural area without wired broadband access

Large Geographic Networks

  • MAN covers large geographic areas (districts, cities).

Guided Media

  • Wireless LAN is not a guided media.

Default SVI on Cisco Switch

  • VLAN1 is the default SVI on a Cisco switch.

Cisco Router Security

  • Privileged EXEC is the type of access secured on a Cisco router or switch with the enable secret command.

Volatile Memory Location

  • RAM is the memory location on a Cisco router or switch that loses all content when the device is restarted.

Security Threat

  • A software secretly collecting data about visited web sites is a spyware.

Secure Corporate Network

  • Extranet provides secure access to the corporate offices by suppliers, customers and collaborators

Large Corporations and Device Access

  • When a large corporation allows users to network resources from personal devices, bring your own device is used.

Organization for Individuals

  • Individual access the Internet though ISP.

Confidential Pricing Information

  • Intranet provides confidential pricing information.

Connect Existing Devices

  • Powerline networking technology connects existing home LAN using an adapter and an existing electrical outlet.

Security Breaches

  • A network that allows patients to see others' records violates security.

Criteria to Select Medium

  • Distance
  • Environment

QoS network traffic

  • Video conferencing requires QoS

Office Security

  • Firewalls
  • Antivirus software

Passwords in IOS

  • VTY Interface
  • Console Interface
  • Privileged EXEC mode

L2 Switch Mode

_ The switch virtual interface allows remote management of a Layer 2 switch.

Process in Partial Type Word

  • You can complete a partially typed word in IOS with hitting the Tab key.

NVRAM

  • A technician can issue a reload command without saving the running configuration in NVRAM.

Key Strokes to Ping Command

  • The Ctrl-Shift-6 interrupts the ping process command on the switch.

Device in IOS

  • RAM is a Cisco Device.

Secure SVI

  • It is not associated with any physical interface on a switch.
  • It provides the same wireless.
  • And LAN defualt, and is default to SVI.

Interface Condition

  • show ip interface brief is used to verify the condition of the device and including configured the Ip adresses.

Unencrypted Passwords

  • The (config)# service password-encryption will prevent all unencrypted passwords.

Encapsulation

  • Encapsulation is a flow control that is used by two computers.

TCP/IP Model

  • Through segmentation is sending data on segments.

Layer in Protocol

  • FTP
  • DHCP
  • Transport Layer

Actions Performed By Cisco Switch

  • Building MAC and IP address when building.
  • Using source and destination addresses.

Function of Sublayer

  • auto-MDIX enables the interface to automatically configure a straight.

1/ Cut Through

  • lower density.

Multicast MAC Address

  • 5E

Fiber or Coper

  • Fiber is better due to the loss of signal
  • Run greater distances

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser