You are on page 1of 2

1. A network administrator is troubleshooting connectivity issues on a server.

Using a tester,
the administrator notices that the signals generated by the server NIC are distorted and
not usable. In which layer of the OSI model is the error categorized?

2. presentation layer
3. network layer
4. physical layer
5. data link layer

2. Which characteristic of the network layer in the OSI model allows carrying packets for
multiple types of communications amongmany hosts?

 the de-encapsulation of headers from lower layers


 the selection of paths for and direct packets toward the destination
 the ability to operate without regard to the data that is carried in each packet
 the ability to manage the data transport between processes running on hosts

What will a Layer 2 switch do when the destination MAC address of a received frame is
not in the MAC table?
 It initiates an ARP request.
 It broadcasts the frame out of all ports on the switch.
 It notifies the sending host that the frame cannot be delivered.
 It forwards the frame out of all ports except for the port at which the frame was
received.

Transport layer is a segment, at the Network layer is a packet, and at the Data Link layer is a
frame.

What is the purpose of the subnet mask in conjunction with an IP address ?


ANS; With the IPv4 address, a subnet mask is also necessary. A subnet mask is
a special type of IPv4 address that coupled with the IP address determines
the subnet of which the device is a member

A technician is manually configuring a computer with the necessary IP parameters


to communicate over the corporate network. The computer already has an IP
address, a subnet mask, and a DNS server. What else has to be configured for
Internet access?
 the WINS server address
 the default gateway address
 the MAC address
 the domain name of the organization
Which one is the engineering organizations define open standards and protocols that apply to the
data link layer?
IEEE

A large corporation has modified its network to allow users to access network
resources from their personal laptops and smart phones. Which networking trend
does this describe?
 cloud computing
 online collaboration
 bring your own device
 video conferencing
How does the service password-encryption command enhance password
security on Cisco routers and switches? 
It encrypts passwords as they are sent across the network.

Which CLI mode allows users to access all device commands, such as those used for
configuration, management, and troubleshooting?
 user EXEC mode
 privileged EXEC mode
 global configuration mode
 interface configuration mode

You might also like