Term
Which three options correctly associate a layer of hierarchical design model with its function? |
|
Definition
Distribution-Traffic control and security policies Access-Interface for end devices Core-High speed backbone |
|
|
Term
With respect to network design, what is convergence? |
|
Definition
Combining conventional data with voice and video on a common network. |
|
|
Term
Which three options are potential benefits of converged network? |
|
Definition
Combines voice and data network staffs. Combines voice, video, and applications in one computer. Simplified network changes. |
|
|
Term
Which four options describe data store and data server analysis actions? |
|
Definition
Amount of server-to-server traffic. Amount of traffic for a SAN. Data backed up to tape. Network attached storage. |
|
|
Term
What factor may complicate user community analysis? |
|
Definition
Application usage is not always bound by department or physical location. |
|
|
Term
Which two of the following pairings are accurate? |
|
Definition
Forwarding- Process capabilities of a switch by quantifying performance of the switch by how much data it can process per second. Wire Speed- data rate that each port on the switch is capable of attaining. |
|
|
Term
What would be the port capacity of a single port on a 48-port Gigabit Ethernet switch? |
|
Definition
|
|
Term
A switch that uses MAC addresses to forward frames operates at which layer of the OSI model? |
|
Definition
|
|
Term
What is a feature offered by all stackable switches? |
|
Definition
Support for Gigabit connectivity |
|
|
Term
What function is performed by a Cisco Catalyst access layer switch? |
|
Definition
|
|
Term
Which three features are associated with the core layer of the hierarchical design model? |
|
Definition
Layer 3 support Redundant components 10 Gigabit Ethernet |
|
|
Term
Which two characteristics describe the core layer of the hierarchical network model? |
|
Definition
Redundant Paths Rapid forwarding of traffic |
|
|
Term
Fixed Configuratoin Switch |
|
Definition
Ports cannot be added to the device |
|
|
Term
|
Definition
Ratio of quantity of data to time |
|
|
Term
|
Definition
Prioritization of network traffic |
|
|
Term
|
Definition
Capability of a device to power another device using Ethernet |
|
|
Term
|
Definition
Allows for the installation of line cards or modules. |
|
|
Term
|
Definition
Binding together of distinct links for enhanced throughput |
|
|
Term
|
Definition
Ratio of number of ports to number of switches |
|
|
Term
|
Definition
Capable of interconnection via a special backplane cable. |
|
|
Term
|
Definition
Capability to recover connectivity after a network failure. |
|
|
Term
What does the following error message signify? |
|
Definition
The data of one of the parameters is incorrect. |
|
|
Term
What is the effect of entering the banner login #Authorized Personnel Only!# |
|
Definition
Authorized Personnel Only! appears before the username and password login prompts for any connection. |
|
|
Term
Which three options correctly associate the command with the paired behavior? |
|
Definition
switchport port-security violation shutdown swtichport port-security mac-address sticky switchport port-security maximum |
|
|
Term
An Ethernet has built the MAC address table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit? |
|
Definition
Forward the frame out Interface 1 |
|
|
Term
What can be determined from the following command output? |
|
Definition
The system has 32 KB of NVRAM |
|
|
Term
What advantage does the SSH offer over Telnet when remotely connecting to a device? |
|
Definition
|
|
Term
How many collision and broadcast domains are displayed in the network? |
|
Definition
11 Collision, 4 broadcast |
|
|
Term
Which option correctly associates the Layer 2 security attack with the description? |
|
Definition
Telnet attack: Using brute force password attacks to gain access to a switch |
|
|
Term
Which three statements are true about the CSMA/CD access method? |
|
Definition
In an Ethernet LAN,, each station continuously listens for traffic on the medium to determine when gaps between frame transmissions occur and then sends the frame. In an Ethernet LAN, stations may begin transmitting anytime they detect that the network is quiet. (there is no traffic) If a collision occurs in an Ethernet LAN, transmitting stations stop transmitting and wait a random length of time before attempting to retransmit the frame. |
|
|
Term
how does the Ethernet switch process the incoming traffic using port-based memory buffering? |
|
Definition
The frames are stored in queues that are linked to specific incoming ports. |
|
|
Term
What are two key features of an Ethernet switch with Layer 2 capabilities? |
|
Definition
Full-duplex operation Filtering based MAC address |
|
|
Term
The network administrator wants to configure an IP address on a Cisco switch. how does the network administrator assign the IP address? |
|
Definition
|
|
Term
Why should a default gateway be assigned to a switch? |
|
Definition
So that other networks can be accessed from the command prompt of the switch |
|
|
Term
Which two tasks does autonegotiation in an Ethernet network accomplish? |
|
Definition
Sets the link speed Sets the link duplex mode |
|
|
Term
What is the effect of entering the SWI (config-if)# Duplex full command on a Fast Ethernet switch port>? |
|
Definition
IF the connected device is also set for full duplex, it participates in collision-free communication |
|
|
Term
Which term describes the time delay between a frame being sent from a source device and received on a destination device? |
|
Definition
|
|
Term
Which option correctly associates the command with the description? |
|
Definition
copy running-config startup config- save the current running configuration to the startup configuration |
|
|
Term
Which three options correctly associate the command with the description? |
|
Definition
line console 0 password cisco login |
|
|
Term
|
Definition
The access layer in the three-layer hierarchical network model describes the portion of the network where devices connect to the network and includes controls for allowing devices to communicate on the network. |
|
|
Term
|
Definition
An optional feature of Catalyst switches. |
|
|
Term
Cisco Discovery Protocol (CDP) |
|
Definition
A media- and protocol-independent device-discovery protocol that runs on all Cisco=-manufactured equipment, including router, access servers, bridges and switches. |
|
|
Term
|
Definition
The speed and capability of a group of switches running STP to agree on a loop-free Layer 2 topology for a switched LAN |
|
|
Term
|
Definition
The backbone of a switched LAN. |
|
|
Term
|
Definition
An Ethernet frame switching approach that streams data through a switch so the the leading edge of a packet exits the switch at the egress port before the packet finishes entering the ingress port. |
|
|
Term
|
Definition
In the three-layer hierarchical network design model, the distribution layer is the layer that invokes policy and routing control. Typically, VLANS are defined at this layer. |
|
|
Term
|
Definition
The application of specific algorithm to data so as to alter the apperance of the data, making it incomprehensible to those who are no authorized to see the information. |
|
|
Term
|
Definition
A data-trafficking technique used by switches in which traffic receives on a n interface is sent out all the other interfaces of the switch. |
|
|
Term
|
Definition
The capability of a port for simultaneous data transmission and reception. |
|
|
Term
graphical user interface (GUI) |
|
Definition
An environment that uses pictorial as well as textual representations of the input and output of applications and the data structure in which information in which information is stored. |
|
|
Term
|
Definition
Refers to the transmission of data in just one direction at a time. At any given instant, the device can transmit or receive, but not both simultaneously. |
|
|
Term
|
Definition
A measure of the lack of difficulty in keeping network devices and associated software in working order. |
|
|
Term
|
Definition
A measure of the lack of difficulty in managing network devices using network management software and protocols. |
|
|
Term
|
Definition
A multilayer switch filters and forwards packets based on OSI Layer 2 through Layer 7 information at wire-speed by utilizing dedicated hardware that stores data structures mirroring routing table, ARP table, and ACL information. |
|
|
Term
|
Definition
RAM that retains its contents when a device is powered off. In Cisco products, NVRAM is used to store configuration information. |
|
|
Term
organizational unique identifier (OUI) |
|
Definition
A 3-byte hexadecimal number that is IEEE Registration Authority assigns to any company the manufacturers components under the ISO/IEC 8803 standard. |
|
|
Term
|
Definition
A loosely defined networking measure based on throughput and error rates. |
|
|
Term
Power over Ethernet (PoE) |
|
Definition
The powering of network devices over Ethernet cable. |
|
|
Term
private branch exchange (PBX) |
|
Definition
A digital or analog telephone switchboard located on the subscriber premises and used to connect private and public telephone networks. |
|
|
Term
|
Definition
The time lag between the departure of a signal from the source and the arrival of the signal at the destination. |
|
|
Term
|
Definition
A measure of performance for a transmission system that reflects its transmission quality and service available |
|
|
Term
|
Definition
Nonvolatile memory that can be read, but not written to, by microprocessor. |
|
|
Term
|
Definition
The duplication of devices, services, or connections so that, in the even of a failure, the redundant devices, services or connections can perform the work of those that failed. |
|
|
Term
|
Definition
A desirable property of a network to handle growing amounts of traffic in a graceful manner. A scalable network is readily enlarged. |
|
|
Term
|
Definition
An encompassing term describing the prevention and means of prevention of unauthorized access to an entity, location, or system. |
|
|
Term
Simple Network Management Protocol (SNMP) |
|
Definition
Used to monitor and control network devices, and to manage configurations, statistics collection, performance,and security. |
|
|
Term
|
Definition
The act of a packet or frame being represented with a false source address to mask its true source. Spoofing is designed to foil network security mechanisms such as filters and access lists. |
|
|
Term
store-and-forward switching |
|
Definition
A technique in which frames are completely processes before being forwarded out the appropriate port. |
|
|
Term
Trivial File Transfer Protocol (TFTP) |
|
Definition
A simplified version of FTP that allows to be transferred from one computer to another over a network in clear text without authentication. |
|
|
Term
|
Definition
A group of hosts with a common set of requirement that communicate as if they were attached tot he same wire, regardless of their physical location. |
|
|
Term
|
Definition
The capability to carry voice traffic over an IP-based network with POTS-like functionality, reliability, and voice quality. |
|
|