Term
What is an HTTP GET request?
- A message sent to a Cisco device at the start of in-band administration.
- A Hyper Text Transfer Protocol General Echo Time request.
- A message sent from a web client to a web server asking for a list of all available files.
- A message sent from a web client to a web server requesting that a file be sent to the client.
|
|
Definition
4. A message sent from a web client to a web server requesting that a file be sent to the client. |
|
|
Term
Which layer of the OSI model is associated with TCP and UDP?
- The Data Link layer.
- The Network Layer.
- The Transport Layer.
- The Session Layer.
|
|
Definition
|
|
Term
Which layer of the OSI model is associated with LAN hubs?
- The Network layer.
- The Data Link layer.
- The Physical layer.
- The Transport layer.
|
|
Definition
|
|
Term
What are the seven layers of the OSI model?
- Application, Presentation, Session, Transport, Network, Data Link, Physical.
- Application, Presentation, Session, TCP/IP, Data Link, Network, Physical.
- Application, Presentation, Session, Transport, Network Access, Data Link, Physical.
- Application, Presentation, Internet, Transport, Network, Data Link, Physical.
|
|
Definition
Application, Presentation, Session, Transport, Network, Data Link, Physical. |
|
|
Term
Which layer of the TCP/IP model equates most directly to the Transport Layer of the OSI model?
- Transport Layer.
- Internet Layer.
- Network Access Layer.
- Network Layer.
|
|
Definition
|
|
Term
Does 802.11g use DSSS?
- Yes, always.
- Yes, but only on non-overlapping channels.
- No
- Yes, but only if an 802.11b device is on the same network.
|
|
Definition
Yes, but only if an 802.11b device is on the same network. |
|
|
Term
What mode describes a Wi-fi connection where devices connect to each other via an access point, and are also capable of connecting to the internet or other networks?
- 802.11g mode
- Wi-fi protected mode with wide area network.
- Infrastructure
- Ad-hoc
|
|
Definition
|
|
Term
What is a DMZ LAN (Demilitarized Zone)?
- An area where devices which need to be accessed from outside the network with minimal or no security can be located.
- An area where email servers are located.
- An area where all devices which do note require user authentication must be located.
- An area where devices which do not require a very high level of security must be located.
|
|
Definition
An area where devices which need to be accessed from outside the network with minimal or no security can be located. |
|
|
Term
Which layer of the OSI model is associated with IP?
- The Transport layer.
- The Internet Layer.
- The Data Link layer.
- The Network layer.
|
|
Definition
|
|
Term
What does a socket consist of?
- A port number, an IP header, and a payload.
- An IP address, a transport layer protocol, and a port number.
- An IP address and a port number.
- An IP address, a MAC address, a transport layer protocol, and a port number.
|
|
Definition
An IP address, a transport layer protocol, and a port number. |
|
|
Term
Which layer of the OSI model is associated with authentication services?
- The Application layer.
- The Presentation layer.
- The Security layer.
- The Session layer.
|
|
Definition
|
|
Term
What is a Denial of Service (DoS) attack?
- An attack that prevents users from changing the settings on a PC.
- A attack whose main purpose is to break things or prevent them from working.
- An attack that makes a server return a No Access message to a client.
- An attempt to compromise a PC using DoS commands.
|
|
Definition
A attack whose main purpose is to break things or prevent them from working |
|
|
Term
What best describes Gigabit Ethernet?
- Networks made of fibre-optic or copper cables that have a maximum theoretical data transfer rate of 1Gbps.
- Networks made from equipment that is approved by the Wi-Fi Alliance.
- Networks made from copper cable that have a maximum theoretical data transfer rate of 1Gbps.
- Networks that comply with the IEEE 802.3u standard.
|
|
Definition
Networks made of fibre-optic or copper cables that have a maximum theoretical data transfer rate of 1Gbps. |
|
|
Term
Why do servers use well-known port numbers?
- So that no two applications attempt to use the same port number.
- So that application developers can set the port number up so that it is the same for all users of the application.
- To make the server administrator's job easier.
- So that new clients can gain access to the appropriate service without first finding out which port is allocated to the required service .
|
|
Definition
So that new clients can gain access to the appropriate service without first finding out which port is allocated to the required service . |
|
|
Term
How many non-overlapping channels does 802.11g provide?
- none
- 7
- 3
- 11
|
|
Definition
|
|
Term
What is the World Wide Web?
- All the Cisco-qualified network technicians in the world.
- All the web servers in the world, plus all the web hosts that have web browsers.
- All the devices in the world that have an IP address.
- All the devices in the world that enable packets to be sent from one host to another (i.e., cables, routers, switches, etc).
|
|
Definition
All the web servers in the world, plus all the web hosts that have web browsers. |
|
|
Term
What is true about 10BASE-T?
- It uses copper cable and runs at 10Mbps.
- It uses copper cable and runs at 100Mbps.
- It uses a token-ring architecture.
- It uses copper cable and devices must always connect directly to a hub or switch.
|
|
Definition
- It uses copper cable and runs at 10Mbps.
|
|
|
Term
What are two reasons why CSMA/CD logic fails to make the best use of available Ethernet media?
- They attract and re-route packets which would otherwise be routed via hubs.
- It is a half-duplex system so packets cannot be sent and received at the same time.
- It requires the use of legacy equipment that cannot operate at the speed of modern media.
- It frequently arranges for all devices to remain silent (i.e. not send or receive packets) while a random timer expires.
|
|
Definition
It is a half-duplex system so packets cannot be sent and received at the same time.
It frequently arranges for all devices to remain silent (i.e. not send or receive packets) while a random timer expires. |
|
|
Term
What two sub-divisions exist within OSI layer 2?
- The MAC sublayer and the LLC sublayer.
- The CSU sublayer and the DSU sublayer.
- The physical sublayer and the binary sublayer.
- Analog and digital sublayers.
|
|
Definition
The MAC sublayer and the LLC sublayer. |
|
|
Term
Which three statements about network characteristics are true? (Choose three.)
- Speed is a measure of the data rate in bits per second of a given link in the network.
- Scalability indicates how many nodes are currently on the network.
- The logical topology is the arrangement of cables, network devices, and end systems.
- Availability is a measure of the probability that the network will be available for use when it is required.
- Reliability indicates the dependability of the components that make up the network.
|
|
Definition
Correct Answer -
- Speed is a measure of the data rate in bits per second of a given link in the network,
- Availability is a measure of the probability that the network will be available for use when it is required,
- Reliability indicates the dependability of the components that make up the network.
|
|
|
Term
Which two statements about the purpose of the OSI model are accurate? (Choose two.)
- defines the network functions that occur at each layer
- facilitates an understanding of how information travels throughout a network
- ensures reliable data delivery through its layered approach
- changes in one layer do not impact other layers
|
|
Definition
Correct Answer -
- defines the network functions that occur at each layer,
- facilitates an understanding of how information travels throughout a network
|
|
|
Term
Which statement about LAN switches is true?
- LAN switches include more broadcast domains than bridges.
- LAN switches supply each Ethernet station with deterministic shared bandwidth.
- LAN switches are the predecessor of multiport bridges.
- LAN switches reduce the scope of the collision domain.
|
|
Definition
Correct Answer -
LAN switches reduce the scope of the collision domain. |
|
|
Term
What port number is used for POP3?
- 25
- 110
- 161
- 143
|
|
Definition
|
|
Term
What is true of 1000BASE-LX?
- It specifies a maximum cable length of 1000 metres.
- It is a way of converting existing UTP cable so that speeds of up to 1000Mbps can be achieved.
- It is the luxury version of 1000BASE.
- It specifies the use of fibre-optic cable.
|
|
Definition
It specifies the use of fibre-optic cable. |
|
|
Term
When you connect two or more networks via a router and configure a logical networking addressing scheme you are creating ______.
- an internet
- a repeater
- a hub
- an internetwork
|
|
Definition
|
|
Term
_____ controller manages the wireless frames and the access points and provides the configuration and codes for access points
- Firewall
- Switch
- WLAN
- Router
|
|
Definition
|
|
Term
Which of the following OSI layers segments and reassembles data into a single data stream?
- Network Layer
- Data Link Layer
- Transport Layer
- Session Layer
|
|
Definition
|
|
Term
Segmenting broadcast domains is a benefit offered by _____.
- switches
- routers
- transporters
- ethernet
|
|
Definition
|
|
Term
_____ uses the Media Access Control that's burned into each and every Ethernet network interface card.
- Full duplex
- Ethernet frame
- Ethernet addressing
- Half duplex
|
|
Definition
|
|
Term
Which of the following is not a case where you should use a crossover Ethernet cable?
- switch to router connection
- switch to hub connection
- switch to switch connection
- router to router connection
|
|
Definition
Switch to router connection |
|
|
Term
TCPIP requires a set of Physical layer specifications thus it can't run on any future physical network.
- True
- False
|
|
Definition
|
|
Term
Which of the following important application allows us to resolve human names to IP addresses?
- DHCP
- APIPA
- DNS
- BOOTP
|
|
Definition
|
|
Term
Which of the following is true about the Host to Host UDP layer?
- great for emailing and file sharing
- connection oriented
- connectionless
- provides sequencing
|
|
Definition
|
|
Term
Which of the following is a characteristic of the Internet Protocol?
- all of these
- it has no data recovery features
- it operates at the internet layer of the TCP/IP stack
- it is a connectionless protocol
|
|
Definition
|
|
Term
Creating subnetworks is the act of taking bits from the host portion of the address and reserving them to define the subnet address instead.
- False
- True
|
|
Definition
|
|
Term
A subnet _____ allows the device that's receiving the IP packet to distinguish the network ID portion of the IP address from the host ID portion of the IP address
- class
- bit
- mask
- DNS
|
|
Definition
|
|
Term
Using _____. you can apply an IP Mask to a router interface using just the right amount of host bits, this prevents wasting IP addresses that are not used
- VLSM
- WAN
- SSH
- CLI
|
|
Definition
|
|
Term
VLSM can use different masks on different segments in the network by assigning different length masks on the router interface.
- false
- true
|
|
Definition
|
|
Term
Which of the following commands on the command line interfaces shows the active configuration file, how large it is, and the OS version?
- Show config
- copy run start
- startup-config
- show running-config
|
|
Definition
|
|
Term
All interfaces on a router are enabled by default, all interfaces on a switch are shut down by default.
- true
- false
|
|
Definition
|
|
Term
What command do you type on the command line interface to get to what's called global config?
- config-all
- configure terminal
- config IO
- config-if
|
|
Definition
|
|
Term
The _____ command encrypts all current and future passwords on your router switch, host names, banners, passwords and interface descriptions.
- service password-encryption
- enable password-encryption
- password-encryption
- encrypt password
|
|
Definition
service password-encryption |
|
|
Term
What command do you run to know which iOS version of the router you are on?
- router -V
- config router
- show running-config
- show router-version
|
|
Definition
|
|
Term
Which of the following router's software that is stored in the microcode of the ROM is used for testing and troubleshooting when the iOS fails to load?
- EEPROM
- Bootstrap
- power-on self-test
- ROM Monitor
|
|
Definition
|
|
Term
Which of the following commands will back up your configurations of your router to an ftp server?
- cp_lan-config
- back-up running-config tftp
- copy running-config tftp
- back-up config ttftp
|
|
Definition
|
|
Term
Which of the following steps do you take to configure a simple DHCP server in a router?
- all of these
- exclude the addresses
- create a pool for the LAN
- add the network, default gateway, and the DNS server
|
|
Definition
|
|
Term
Local seven is the syslog trap level by default.
- true
- false
|
|
Definition
|
|
Term
If a network isn't directly connected to the router, the router can use a _____ routing to communicate with neighboring routers about all the networks they know about.
- dynamic
- OSPF
- packet
- static
|
|
Definition
|
|
Term
When Host A sends a packet to Host B, the destination hardware address used is the default gateway's Ethernet interface.
- true
- false
|
|
Definition
|
|
Term
Classful routing protocols include the subnet mask with the route advertisements and allow us to do things like VLSM.
- true
- false
|
|
Definition
|
|
Term
Which of the following is not true about Routing Information Protocol (RIP)?
- It relies on hop count as a metric to determine the best path to a remote network
- It is a true distance vector routing protocol
- It has a maximum allowable hop count of 16 by default
- It doesn't even look at the bandwidth
|
|
Definition
It has a maximum allowable hop count of 16 by default |
|
|
Term
_____ switching increases bandwidth for each user because each connection or interface into the switch is its own, self contained collision domain.
- RIP
- Layer 2
- Layer 1
- Catalyst
|
|
Definition
|
|
Term
Which of the following is not true about port security?
- It helps set static MAC addresses
- It is not needed for unused ports since they're disabled by default
- It helps limit the number of MAC addresses that are assigned to a port
- It helps shut down unused ports because they're enabled by default
|
|
Definition
It is not needed for unused ports since they're disabled by default |
|
|
Term
Which of the following port security violation modes drops the frames and protects the port without any administrative overhead?
- security violation restrict mode
- security violation protect mode
- security violation shutdown mode
- security violation maximum mode
|
|
Definition
security violation protect mode |
|
|
Term
A logical grouping of network users and resources connected to administratively defined ports on a switch is called a _____.
- VLAN
- NAT
- IVR
- WAN
|
|
Definition
|
|
Term
Configuring a logical interface on the backplane of the Layer 3 switch is called _____ routing.
- Layer 3
- NAT
- Inter-VLAN
- dynamic
|
|
Definition
|
|
Term
Simply put, an access list is essentially a list of conditions that categorize packets to be either permitted or denied.
- true
- false
|
|
Definition
|
|
Term
A standard access list is much more efficient than an Extended access list because it blocks just what you want and not the whole router and packets coming in.
- true
- false
|
|
Definition
|
|
Term
Which of the following commands will put an access list on a VTY line.
- access extended-list Save_My_VTY
- permit standard Save_My_VTY
- ip access-list standard Save_My_VTY
- ip permit-list standard Save_My_VTY
|
|
Definition
ip access-list standard Save_My_VTY |
|
|
Term
Which of the following is not true about NAT?
- it is a useful tool for network migrations
- it is originally intended to slow the depletion of available IP address space
- it keeps track of end to end IP traceability
- it remedies address overlap events
|
|
Definition
it keeps track of end to end IP traceability |
|
|
Term
Which of the following NATs is a one to one address mapping?
- Dynamic NAT
- PAT
- Static NAT
- IPv6
|
|
Definition
|
|
Term
____ NAT really means we have a pool of addresses that we'll use to provide real IP addresses to a group of users on the inside.
- PAT
- static
- IPv4
- dyanmic
|
|
Definition
|
|
Term
What is true about the following command? ip nat inside source list 1 interface Gi0/1 overload.
- it uses the source port number of the host
- all of these
- it will not just create a dynamic NAT
- it lets everyone use the same IP address to get out
|
|
Definition
|
|
Term
IPv6 was originally created as the solution to IPv4's address exhaustion crisis.
- true
- false
|
|
Definition
|
|
Term
In the following example of IPv6 Address, which of the following fields represent the Host? 2001:0DB8:010F:0001:0000:0000:0000:0ACD
- 2001:0DB8:010F:0001
- 0DB8
- 0000:0000:0000:0ACD
- 0ACD
|
|
Definition
|
|
Term
Stateless autoconfiguration uses a DHCv6 server to assign IPv6 addresses and more parameters.
- true
- false
|
|
Definition
|
|
Term
Which of the following is not true about IPv6 headers?
- they have a fixed length
- they use an extension header
- they vary in length
- they eliminate the checksum field that IPv4 used
|
|
Definition
|
|
Term
ICMPv6 prevents IPv6 from doing any fragmentation through an ICMPv6 process called MTU Discovery.
- true
- false
|
|
Definition
|
|
Term
What frequency does 802.11g operate at?
- 54Mbps
- 2.4GHz
- 5GHz
- 25GHz
|
|
Definition
|
|
Term
Which statement best describes VPNs?
- VPNs are no longer required as encryption algorithms are now so complex that they provide adequate security over a conventional network.
- VPN is the most secure encryption method available because it uses self-signed certificates known only to the enterprise which is running the VPN.
- VPNs authenticate endpoints and encrypt packets.
- VPNs can only be set up between hosts running Linux or Unix operating systems.
|
|
Definition
VPNs authenticate endpoints and encrypt packets. |
|
|
Term
Which layer(s) of the OSI model equate most directly to the Internet layer of the TCP/IP model?
- The Network Layer.
- The IPX layer.
- The Transport Layer.
- All the layers of the OSI model.
|
|
Definition
|
|
Term
What port number is used for HTTP?
- 80
- 8
- 160
- 25
|
|
Definition
|
|
Term
Which layer(s) of the TCP/IP model equates most directly to the Data Link and Physical layers of the OSI model?
- Network Access Layer.
- The MAC and LLC layers.
- Transport Layer.
- IPX Layer
|
|
Definition
|
|
Term
Which answer is true about an Ethernet crossover cable?
- Pin 1 at one end connects to pin 3 at the other.
Pin 2 at one end connects to pin 6 at the other.
- Pin 1 at one end connects to pin 2 at the other.
Pin 2 at one end connects to pin 1 at the other.
- Pin 1 at one end connects to pin 1 at the other.
Pin 2 at one end connects to pin 2 at the other.
- Pin 1 at one end connects to pin 4 at the other.
Pin 2 at one end connects to pin 5 at the other.
- The word "crossover" is always written on the cable.
|
|
Definition
Pin 1 at one end connects to pin 3 at the other. Pin 2 at one end connects to pin 6 at the other. |
|
|
Term
What is a DMZ LAN (Demilitarized Zone)?
- An area where all devices which do note require user authentication must be located.
- An area where email servers are located.
- An area where devices which need to be accessed from outside the network with minimal or no security can be located.
- An area where devices which do not require a very high level of security must be located.
|
|
Definition
An area where devices which need to be accessed from outside the network with minimal or no security can be located. |
|
|
Term
What term is used to describe a communication between one layer of a networking model and the layer immediate above or below?
- Layer 1 interaction.
- OSI interaction.
- Adjacent layer interaction.
- Client/server interaction.
|
|
Definition
Adjacent layer interaction. |
|
|
Term
Which layer of the OSI model defines how a forwarding decision is taken based on a unique hardware address?
- The Physical layer.
- The Network layer.
- The Transport layer.
- The Data Link layer.
|
|
Definition
|
|
Term
Some colleagues are discussing QoS, and are interested in jitter. What is jitter?
- Jitter is a flickering effect sometimes seen on streaming video.
- Jitter is a predefined settings package that provides optimal QoS for IP telephony use.
- Jitter refers to the variation in delay experienced by packets.
- Jitter is a clicking noise that can be heard on some VoIP calls. It is caused by loss of UDP packets.
|
|
Definition
Jitter refers to the variation in delay experienced by packets. |
|
|
Term
What is an NIC?
- A Network Interpreter Card.
- A Network Interface Card.
- A Network Interpolation Chiller.
- A Network Interface Container.
|
|
Definition
A Network Interface Card. |
|
|
Term
Which layer of the OSI model breaks large blocks or streams of data into smaller chunks that are suitable for transmission over the internet?
- The Internet layer.
- The Network layer.
- The Transport Layer.
- The Session layer.
|
|
Definition
|
|
Term
IDS and IPS are both types of network security tool. Which two statements are true?
- An IPS passes information about suspect packets to another device which can be programmed by an administrator to take specific actions.
- An IPS identifies suspect packets and takes direct action against them.
- IPS devices are considered to be slower at reacting to threats than IDS devices.
- An IDS is not usually located in the direct path of packets and works by examining copies of packets.
|
|
Definition
An IPS identifies suspect packets and takes direct action against them.
An IDS is not usually located in the direct path of packets and works by examining copies of packets |
|
|
Term
How does a host discover the IP address of a website if it only knows the hostname.
- Using DNS.
- Using NTS.
- Using NDP.
- Using DDT.
|
|
Definition
|
|
Term
What does Network Access Control attempt to do?
- Detect viruses before they are installed and become active.
- Ensure that packets not intended for a network are sent to the default gateway.
- Ensure that all network users have a valid username and password.
- Prevent rouge employees from stealing data.
|
|
Definition
Ensure that all network users have a valid username and password. |
|
|
Term
|
Definition
Will forward the frame out fa0/3 and add 0000.00bb.bbbb to the MAC address table.
When a switch receives a frame it will look up the destination mac address on its mac address table, then will forward the frame out the single port that received that mac address before. |
|
|
Term
You need to configure a default gateway for management access to a switch. Select the command you would type in the switch CLI to learn the ip address of an attached router.
Show neighbor
Show cdp neighbor detail
Show peripherals
Show ip neighbor
show iptables
|
|
Definition
|
|
Term
The network with ip address 192.168.100.0/27 is to be used on a router. If ip subnet-zero is configured, which statement describe the resulting number of available subnets and hosts?
7 usable subnets, each with 32 host addresses
8 usable subnets, each with 30 host addresses
8 usable subnets, each with 27 host addresses
7 usable subnets, each with 24 host addresses
9 usable subnets, each with 24 host addresses |
|
Definition
8 usable subnets, each with 30 host addresses
Because subnet zero is configured and we have a class C address (192.168.100.0) then the network portion will have 3 bits so 8 subnets will be available. The rest of the bits, 5, represent the available hosts, so 2^5=32, but only 30 are available, 0 and 31 are network and broadcast respectively. |
|
|
Term
"Which of the following are true regarding passwords on a Cisco router?
a) All passwords can be encrypted
b) All passwords can be entered using the set-up dialogue
c) A password can be set before a user can enter the privileged mode
d) A password can be set for individual lines
e) TACACS or Radius password authentication can be used."
- a, b, and c
- a,c,d, and e
- a only
- none of the above
- b,c,d, and e
|
|
Definition
|
|
Term
Which of the following steps is not required to reset the router to the default state?
- erase startup -config in NVRAM
- erase vlan database file stored in flash
- copy running -config to startup -config
- issue a reload command
|
|
Definition
copy running -config to startup -config |
|
|
Term
_____ attacks are hard to detect, and can include things that you wouldn't think are dangerous, such as eavesdropping, traffic analysis, or tapping, whereby someone may be monitoring transmissions.
- Spoofed
- Passive
- Active
- Smurf
|
|
Definition
|
|
Term
A _____ attack where there are efforts to interrupt or suspend services for any length of time.
- Smurf
- Spoof
- Cache Poisoning
- Denial of Service
|
|
Definition
|
|
Term
A _____ is a security hole in a piece of software, hardware, or operating system that provides a potential angle to attack a system.
- Spoof
- Risk
- Vulnerability
- Threat
|
|
Definition
|
|
Term
A standard network protocol that is used to access directories and files, and transfer files from one host to another over a TCP-based network, reliably and efficiently.
- ARP
- FTP
- ICMP
- DNS
|
|
Definition
|
|
Term
A switch table is used to associate _____.
- Subnet Masks
- Virtual LAN interface
- IP Addresses
- MAC address
|
|
Definition
|
|
Term
Built within Wireshark is the Expert System. The color indicates the severity of errors, if any. _____ means Warning, such as a connection problem.
- Yellow
- Cyan
- Red
- Gray
|
|
Definition
|
|
Term
Full duplex mode on the switch allows for incoming and outgoing traffic at the same time.
- true
- false
|
|
Definition
|
|
Term
The command "enable password" automatically encrypts the chosen password.
- true
- false
|
|
Definition
|
|
Term
You are working with an Internet Service Provider (ISP) as network manager. A corporate client approaches you to lease a public IP subnet that can accommodate 250 users. You have assigned him the 192.25.27.0 subnet.
What subnet mask should be assigned to this IP address so that it can accommodate the number of users required by the corporate client?
255.255.255.128
255.255.255.252
255.255.255.0
255.255.255.224
|
|
Definition
|
|
Term
Which layer in the Open Systems Interconnection (OSI) model defines an Internet Protocol (IP) address that helps in selecting the route to the destination?
Network
Transport
Application
Data Link
|
|
Definition
|
|
Term
You are the network administrator for your company. The network at the company's office is due to be upgraded, and you have been assigned the responsibility of identifying the requirements for designing the network. You need to provide network connectivity to 200 client computers that will reside in the same sub network, and each client computer must be allocated dedicated bandwidth.
Which device should you use to accomplish the task?
switch
firewall
hub
router |
|
Definition
|
|
Term
Which type of Category 5 unshielded twisted-pair (UTP) cable is used to work as a trunk between two switches?
RJ-11 straight-through
RJ-45 crossover
RJ-45 straight-through
RJ-41 crossover |
|
Definition
|
|
Term
You have been assigned a network ID of 172.16.0.0/26. If you utilize the first network resulting from this ID, what would be the last legitimate host address in this subnet?
172.16.0.65
172.16.0.64
172.16.0.62
172.16.0.63
|
|
Definition
|
|
Term
With the following equipment list, which of the following network scenarios could be supported?
Two IP subnets of 255.255.255.0
Seven 48-port switches
Two router interfaces
300 workstations in a single broadcast domain, each workstation in its own collision domain
300 workstations, with 150 workstations in two broadcast domains and each workstation in its own collision domain
600 workstations, with 300 workstations in two broadcast domains and each workstation in its own collision domain
300 workstations, with 150 workstations in two broadcast domains and all workstations in the same collision domain |
|
Definition
|
|
Term
Which layer in the Open Systems Interconnection (OSI) model enables coding and conversion functions for application layer data?
Physical layer
Application layer
Session layer
Presentation layer
|
|
Definition
|
|
Term
Which of these applications uses the IMAP protocol to transfer information between a server and a host?
Telnet
E-mail
Web browser
FTP
|
|
Definition
|
|
Term
Which of the following should be a characteristic of the core layer in the Cisco three-layer hierarchical model?
emphasis on high speed
PoE
redundant components
QoS |
|
Definition
|
|
Term
Which of the following topologies is used in Wide Area Networks (WANs)?
FDDI
SONET
Token Ring
CDDI
|
|
Definition
|
|
Term
What is the Cisco IOS command for user mode? |
|
Definition
|
|
Term
What is the Cisco IOS command for Enter Privilege mode? |
|
Definition
|
|
Term
What is the Cisco IOS command for Privileged mode? |
|
Definition
|
|
Term
What is the Cisco IOS command for Enter configuration mode? |
|
Definition
|
|
Term
What is the Cisco IOS command for Global Config mode? |
|
Definition
|
|
Term
What is the Cisco IOS command for Enter Interface mode? |
|
Definition
Switch(config)#interface fa0/1 |
|
|
Term
What is the Cisco IOS command for Interface mode? |
|
Definition
|
|
Term
What is the Cisco IOS command for Return to global configuration |
|
Definition
|
|
Term
What is the Cisco IOS command for Exit Global Config mode? |
|
Definition
|
|
Term
What is the Cisco IOS command for Return to use mode? |
|
Definition
|
|
Term
What is the Cisco IOS command for Logout? |
|
Definition
|
|
Term
What is the Cisco Keyboard shortcut for Recall Previous command? |
|
Definition
|
|