Sie sind auf Seite 1von 4

Chapter 2:

Which two functions are provided to users by the context-sensitive help feature of the Cisco
IOS CLI? (Choose two.)
 determining which option, keyword, or argument is available for the entered command
 displaying a list of all available commands within the current mode

The component of the operating software that provides the user interface is called the?
 shell
Which device acts as a gateway to allow hosts to send traffic to remote IP networks?
 local router

When a hostname is configured through the Cisco CLI, which three naming conventions are
part of the guidelines? (Choose three.)
 the hostname should be fewer than 64 characters in length
 the hostname should contain no spaces
 the hostname should begin with a letter

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes
and interfaces that can be protected with passwords. (Choose three.)
 VTY interface
 console interface
 privileged EXEC mode

To save time, IOS commands may be partially entered and then completed by typing which key
or key combination?
 Tab

In order to test end-to-end connectivity, you would use the (choose only 1)
 ping
 trace
 traceroute
 tracert

What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file?
 (config)# service password-encryption

How is SSH different from Telnet?


 SSH provides security to remote sessions by encrypting messages and using user authentication.
Telnet is considered insecure and sends messages in plaintext.
True or False?
Mobile devices do not require IP addresses to communicate on the Internet.

 False
All devices that communicate over data networks need unique IP addresses.
A technician configures a switch with these commands:

SwitchA(config)# interface vlan 1


SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown

What is the technician configuring?


 SVI
For a switch to have an IP address, a switch virtual interface must be configured. This allows
the switch to be managed remotely over the network.
An IT technician has manually configured an IP address on a laptop for a new employee. Each
time the employee tries to connect to the LAN, the employee receives a duplicate IP address
error message. What can the company do to prevent this situation from arising again?
 Use DHCP to automatically assign addresses.

An administrator has just changed the IP address of an interface on an IOS device. What else
must be done in order to apply those changes to the device?

 Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the
command is typed correctly and the Enter key has been pressed.

Why would a technician enter the command copy startup-config running-config?

 to copy an existing configuration into RAM

Which two statements are true regarding the user EXEC mode?
 The device prompt for this mode ends with the ">" symbol.
 Only some aspects of the router configuration can be viewed.

Chapter 4:

What is a characteristic of a WAN hub-and-spoke topology?


 The branch sites are connected to a central site through point-to-point links.

What makes fiber preferable to copper cabling for interconnecting buildings?


 greater distances per cable run
 limited susceptibility to EMI/RFI
 greater bandwidth potential

What type of cable is used to connect a workstation serial port to a Cisco router console port?
 Rollover

What is the purpose of the OSI physical layer?


 transmitting bits across the local media
A network administrator is designing a new network infrastructure that includes both wired
and wireless connectivity. Under which situation would a wireless connection be
recommended?

 The end-user device needs mobility when connecting to the network.

Match each type of frame field to its function.

addressing - This field helps to direct the frame toward its destination.

error detection - This field checks if the frame has been damaged during the transfer.

type - This field is used by the LLC to identify the Layer 3 protocol.

frame start - This field identifies the beginning of a frame.

In fiber optic media, the signals are represented as patterns of


 Light

A network team is comparing topologies for connecting on a shared media. Which physical
topology is an example of a hybrid topology for a LAN?

 extended star

Refer to the exhibit. What is the maximum possible throughput between the PC and the
server?

 128 kb/s
The maximum throughput between any two nodes on a network is determined by the slowest
link between those nodes.

Match the description with the media.

STP - This type of copper media is used in industrial or similar environments where there is a lot of
interference

Wireless - This type of media provides the most mobility options

Optical Fiber - This type of media is used for high transmission speed and can also transfer data
over long distances

Coaxial - Traditionally used for television but can now be used in a network to connect the customer
location to the wiring of the customer premises

Which method of data transfer allows information to be sent and received at the same time?

 full duplex
Which two factors influence the method that is used for media access control?

 how the connection between nodes appears to the data link layer
 how nodes share the media

What method is used to manage contention-based access on a wireless network?

 CSMA/CA
Carrier sense multiple access with collision avoidance (CSMA/CA) is used with wireless
networking technology to mediate media contention. Carrier sense multiple access with
collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media
contention. Priority ordering and token passing are not used (or not a method) for media
access control.

Which statement correctly describes frame encoding?

 It converts bits into a predefined code in order to provide a predictable pattern to help distinguish
data bits from control bits.

Refer to the exhibit. One end of the cable is terminated as displayed, and the other end is
terminated in accordance with the T568A standard. What type of cable would be created in
this manner?
 straight-through
A straight-through cable can have either a T568A or T568B standard termination at one
end and the same at the other end. A crossover cable has a T568A standard termination
at one end and a T568B standard at the other end. A rollover cable can have either a
T568A or T568B standard termination at one end, and at the other end have the same
standard, but with the wires connected in reverse order. A fiber-optic cable is not
terminated using RJ-45 connectors.

Which is a function of the Logical Link Control (LLC) sublayer?

 to identify which network layer protocol is being used

Which statement describes a characteristic of the frame header fields of the data link layer?

 They vary depending on protocols.


All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame.
However, the structure of the frame and the fields that are contained in the header vary
according to the protocol. Different data link layer protocols may use different fields, like
priority/quality of service, logical connection control, physical link control, flow control, and
congestion control.

Das könnte Ihnen auch gefallen