0% found this document useful (0 votes)
72 views7 pages

Examen 1-3

The document contains 27 multiple choice questions about networking concepts such as the TCP/IP model, encapsulation, network devices, and Cisco IOS. It tests knowledge of topics like layers, protocols, interfaces, addressing, passwords and configuration.

Uploaded by

Jhon Rojas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views7 pages

Examen 1-3

The document contains 27 multiple choice questions about networking concepts such as the TCP/IP model, encapsulation, network devices, and Cisco IOS. It tests knowledge of topics like layers, protocols, interfaces, addressing, passwords and configuration.

Uploaded by

Jhon Rojas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

WHICH STATEMENT ACCURATELY DESCRIBES A TCP/IP ENCAPSULATION PROCESS


WHEN A PC IS SENDING DATA TO THE NETWORK?

 Data is sent from the internet layer to the network access layer.
 Packets are sent from the network access layer to the transport layer.
 Segments are sent from the transport layer to the internet layer.
 Frames are sent from the network access layer to the internet layer

2. WHICH PDU FORMAT IS USED WHEN BITS ARE RECEIVED FROM THE NETWORK
MEDIUM BY THE NIC OF A HOST?

 file
 frame
 packet
 segment

3. WHAT LAYER IS RESPONSIBLE FOR ROUTING MESSAGES THROUGH AN


INTERNETWORK IN THE TCP/IP MODEL?

 internet
 transport
 network access
 sesión

4. WHAT IS A CHARACTERISTIC OF MULTICAST MESSAGES?

 They are sent to a select group of hosts.


 They are sent to all hosts on a network.
 They must be acknowledged.
 They are sent to a single destination

5. AT WHICH LAYER OF THE OSI MODEL WOULD A LOGICAL ADDRESS BE ADDED


DURING ENCAPSULATION?

 physical layer
 data link layer
 network layer
 transport layer

6. WHEN IPV4 ADDRESSING IS MANUALLY CONFIGURED ON A WEB SERVER, WHICH


PROPERTY OF THE IPV4 CONFIGURATION IDENTIFIES THE NETWORK AND HOST
PORTION FOR AN IPV4 ADDRESS?
 DNS server address
 subnet mask
 default gateway
 DHCP server address
7. WHICH NAME IS ASSIGNED TO THE TRANSPORT LAYER PDU?

 bits
 data
 frame
 packet
 segment

8. WHAT THREE APPLICATION LAYER PROTOCOLS ARE PART OF THE TCP/IP PROTOCOL
SUITE? (CHOOSE THREE.)

 ARP
 DHCP
 DNS
 FTP
 NAT
 PPP

9. A NETWORK ADMINISTRATOR ENTERS THE SERVICE PASSWORD-ENCRYPTION


COMMAND INTO THE CONFIGURATION MODE OF A ROUTER. WHAT DOES THIS
COMMAND ACCOMPLISH?

 This command encrypts passwords as they are transmitted across serial WAN
links.
 This command prevents someone from viewing the running configuration
passwords.
 This command enables a strong encryption algorithm for the enable secret
password command.
 This command automatically encrypts passwords in configuration files that are
currently stored in NVRAM.
 This command provides an exclusive encrypted password for external service
personnel who are required to do router maintenance.

10. WHAT FUNCTION DOES PRESSING THE TAB KEY HAVE WHEN ENTERING A
COMMAND IN IOS?

 It aborts the current command and returns to configuration mode.


 It exits configuration mode and returns to user EXEC mode.
 It moves the cursor to the beginning of the next line.
 It completes the remainder of a partially typed word in a command

11. WHAT COMMAND IS USED TO VERIFY THE CONDITION OF THE SWITCH INTERFACES,
INCLUDING THE STATUS OF THE INTERFACES AND A CONFIGURED IP ADDRESS?

 ipconfig
 ping
 traceroute
 show ip interface brief
12. WHAT ARE THREE CHARACTERISTICS OF AN SVI? (CHOOSE THREE.)

 It is designed as a security protocol to protect switch ports.


 It is not associated with any physical interface on a switch.
 It is a special interface that allows connectivity by different types of media.
 It is required to allow connectivity by any device at any location.
 It provides a means to remotely manage a switch.
 It is associated with VLAN1 by default

13. PASSWORDS CAN BE USED TO RESTRICT ACCESS TO ALL OR PARTS OF THE CISCO IOS.
SELECT THE MODES AND INTERFACES THAT CAN BE PROTECTED WITH PASSWORDS.
(CHOOSE THREE.)

 VTY interface
 console interface
 Ethernet interface
 boot IOS mode
 privileged EXEC mode
 router configuration mode

14. WHICH TWO HOST NAMES FOLLOW THE GUIDELINES FOR NAMING CONVENTIONS
ON CISCO IOS DEVICES? (CHOOSE TWO.)

 Branch2!
 RM-3-Switch-2A4
 Floor(15)
 HO Floor 17
 SwBranch799

15. WHAT ARE TWO CHARACTERISTICS OF RAM ON A CISCO DEVICE? (CHOOSE TWO.)

 RAM provides nonvolatile storage.


 The configuration that is actively running on the device is stored in RAM.
 The contents of RAM are lost during a power cycle.
 RAM is a component in Cisco switches but not in Cisco routers.
 RAM is able to store multiple versions of IOS and configuration files

16. WHICH DEVICE PERFORMS THE FUNCTION OF DETERMINING THE PATH


THAT MESSAGES SHOULD TAKE THROUGH INTERNETWORKS?
 a router
 a firewall
 a web server
 a DSL modem
17. Match the description with the associated IOS mode. (Not all options are
used.)

18. IN THE SHOW RUNNING-CONFIG COMMAND, WHICH PART OF THE


SYNTAX IS REPRESENTED BY RUNNING-CONFIG?

 the command
 a keyword
 a variable
 a prompt

19. AN ADMINISTRATOR USES THE CTRL-SHIFT-6 KEY COMBINATION ON A SWITCH


AFTER ISSUING THE PING COMMAND. WHAT IS THE PURPOSE OF USING THESE
KEYSTROKES?

 to restart the ping process


 to interrupt the ping process
 to exit to a different configuration mode
 to allow the user to complete the command
20. WHAT METHOD CAN BE USED BY TWO COMPUTERS TO ENSURE THAT
PACKETS ARE NOT DROPPED BECAUSE TOO MUCH DATA IS BEING SENT
TOO QUICKLY?

 encapsulation
 flow control
 access method
 response timeout

21. AN ADMINISTRATOR IS CONFIGURING A SWITCH CONSOLE PORT WITH A


PASSWORD. IN WHAT ORDER WILL THE ADMINISTRATOR TRAVEL THROUGH THE IOS
MODES OF OPERATION IN ORDER TO REACH THE MODE IN WHICH THE
CONFIGURATION COMMANDS WILL BE ENTERED? (NOT ALL OPTIONS ARE USED.)

22. AN EMPLOYEE AT A BRANCH OFFICE IS CREATING A QUOTE FOR A


CUSTOMER. IN ORDER TO DO THIS, THE EMPLOYEE NEEDS TO ACCESS
CONFIDENTIAL PRICING INFORMATION FROM INTERNAL SERVERS AT
THE HEAD OFFICE. WHAT TYPE OF NETWORK WOULD THE EMPLOYEE
ACCESS?

 an intranet
 the Internet
 an extranet
 a local area network

23. What method can be used by two computers to ensure that packets are not dropped
because too much data is being sent too quickly?

 encapsulation
 flow control
 access method
 response timeout
24. Match each characteristic to its corresponding Internet connectivity type.
(Not all options are used.)

25. A NETWORKING TECHNICIAN IS WORKING ON THE WIRELESS NETWORK AT A


MEDICAL CLINIC. THE TECHNICIAN ACCIDENTALLY SETS UP THE WIRELESS NETWORK
SO THAT PATIENTS CAN SEE THE MEDICAL RECORDS DATA OF OTHER PATIENTS.
WHICH OF THE FOUR NETWORK CHARACTERISTICS HAS BEEN VIOLATED IN THIS
SITUATION?

 fault tolerance
 scalability
 security
 Quality of Service (QoS)
 Reliability

26. A NETWORKING TECHNICIAN IS WORKING ON THE WIRELESS NETWORK


AT A MEDICAL CLINIC. THE TECHNICIAN ACCIDENTALLY SETS UP THE
WIRELESS NETWORK SO THAT PATIENTS CAN SEE THE MEDICAL
RECORDS DATA OF OTHER PATIENTS. WHICH OF THE FOUR NETWORK
CHARACTERISTICS HAS BEEN VIOLATED IN THIS SITUATION?

 fault tolerance
 scalability
 security
 Quality of Service (QoS)
 reliability

27. REFER TO THE EXHIBIT. AN ADMINISTRATOR IS TRYING TO CONFIGURE


THE SWITCH BUT RECEIVES THE ERROR MESSAGE THAT IS DISPLAYED IN
THE EXHIBIT. WHAT IS THE PROBLEM?

 The entire command, configure terminal, must be used.


 The administrator is already in global configuration mode.
 The administrator must first enter privileged EXEC mode before issuing the
command.
 The administrator must connect via the console port to access global configuration
mode.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy