You are on page 1of 20

IT-6201B-2012S(UGRD) Data Communications &

Network1(CISCO 1) – FRANZ MABAIT


The operating system for the Cisco network device

=The operating system for the Cisco network device

What is a wiki?

=a web page that groups of people can edit and review


What command will display a list of keywords available for viewing the status of an IOS
switch?

=Switch# show?
Which of the following are disadvantages of peer-to-peer networking? (Choose two.)

=No centralized administration


=Scalability

Which devices would be considered end devices on a network? (Choose four.)

=Tablet computer
=Printer

=IP phone

=Server

What type of connection to a Cisco IOS switch is used to make the initial configuration?

=Console port
What is a group of web pages that groups of individuals can edit and view together called?

=wiki
What is a network infrastructure that provides access to other networks over a wide
geographic area?

=san
What is a fault-tolerant network?
= A network that can reroute traffic in case of device failure
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?

= SVI

In which scenario would the use of a WISP be recommended

= a farm in rural area without wired broadband access


What is a converged network?

= A network where voice, video, and data move over the same infrastructure
When the command “Switch(config)# hostname EaSt2+56” is entered in a Cisco IOS device
using the CLI, what will be returned in the CLI?

= EaSt-2+56(config)#
What is initially entered at the CLI of the Cisco IOS when typing a command sequence?

= Command
What is the primary defense against unauthorized remote access to network devices?

= Configuring a VTY password


Where is the configuration used during startup on Cisco IOS devices located?

= Startup config

When the command "Switch(config)# hostname EaSt-2+56" is entered in a Cisco IOS device using the
CLI, what will be returned in the CLI?

= EaSt-2+56(config)#

How is the Cisco IOS generally accessed and navigated?

= Through the CLI using a terminal emulator


What type of information would be found on a logical topology diagram?

= IP addressing scheme
Where is the configuration used during startup on Cisco IOS devices located?

= NVRAM

Which of the following are business-class Internet connection technologies normally


supplied by a service provider? (Choose two.)

= Leased lines
= Metro Ethernet

Which type of traffic must receive the highest priority from QoS?

= VoIP
During a routine inspection, a technician discovered that software that was installed on a
computer was secretly collecting data about websites that were visited by users of the
computer. Which type of threat is affecting this computer?

= spyware
Which technology would be best to provide a home user with a highspeed, always-on
Internet connection?

= DSL
What are the primary requirements of information security? (Choose three.)

= Availability
= Confidentiality

= Integrity
What is a group of web pages that groups of individuals can edit and view together called?

= Wiki

What is true of Tier 3 ISPs?

= They act as local providers of service directly to end users

What is the Cisco IOS?

= C. The operating system for the Cisco network device

What is the purpose of the following switch configuration?


s1(config)# interface vlan 1
s1(config-if)# ip address 192.168.122.222 255.255.255.0
s1(config-if)# no shutdown
s1(config-if)# exit
= Allows communication to manage the switch

What is the purpose of the following switch configuration

= Allows communication to manage the switch

From the CLI of a switch with an address of 192.168.1.44, what command would be used to verify end-
to-end connectivity to another host?

=ping 192.168.1.43

A technician configures a switch with these commands:

SwitchA(config)# interface vlan 1


SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown

What is the technician configuring?

=SVI

Why would a technician enter the command copy startup-config running-config?

=to copy an existing configuration into RAM

Which two statements are true regarding the user EXEC mode?

1. This is the default mode on an unconfigured router when first powered up.
2. Only some aspects of the router configuration can be viewed.

What will a network administrator use to modify a configuration on a Cisco router?

=IOS

What is encrypted with the enable secret command?

=the privileged executive mode password

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

=local router

Why would a network administrator use the CLI of the Cisco IOS?

=to add a password to a Cisco network device

To save time, IOS commands may be partially entered and then completed by typing which key or key
combination?

=Tab
What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?

=(config)# service password-encryption

What is a group of web pages that groups of individuals can edit and view together called?

=Wiki

Which devices would be considered end devices on a network? (Choose 4)

C. IP phone

D. Server

E. Tablet computer

B. Printer

What type of information would be found on a logical topology diagram?

=C. IP addressing scheme

Which of the following are business-class Internet connection technologies normally supplied by a
service provider? (Choose 2)

A. Leased lines

C. Metro Ethernet

Which technology would be best to provide a home user with a high-speed, always-on Internet
connection?

=B. DSL

The network that combines enterprise networks, individual users, and ISPs into a single global IP
network.

=internet

Infrastructure historically used by businesses to record and manage the business systems. Data
networks have evolved to enable the transmission of many different types of information services,
including email, video, messaging, and telephony.

=Data Networks

A reference to adding devices of all types onto the Internet. IOE brings together, people, process, data,
and things to make networked connections more relevant and valuable.

=Internet of Everything (IoE)

Transmission and receipt of information.

=Communication
The creation of a document or documents that can be edited by more than one person in real time
across a network.

=Collaboration

A logical classroom environment created as a collaboration space without physical restraints.

=Virtual Classroom

An environment, physical or virtual, to promote collaborative learning.

=Learning Spaces

An environment supporting learning. This may be physical or virtual.

=Mobile Learning

Communities consist of people who share common experiences and hobbies who exchange ideas and
information. Communities allow for social interaction that is independent of location or time zone.

=Communities

What command will prevent all


(config) # service unencrypted passwords from
password-encryption displaying in plain text in a
configuration file?
Which type of network design
combines voice, video, and data
a converged network
on the same communication
channel?
a farm in a rural area
In which scenario would the use
without wired
of a WISP be recommended?
broadband access
a web page that
groups of people can What is a wiki?
edit and review
an address that
What type of address is 01-00-5E-
reaches a specific 
0A-00-02?
group of hosts
An employee at a branch office is
creating a quote for a customer. In
order to do this, the employee
needs to access confidential
an intranet
pricing information from internal
servers at the Head Office. What
type of network would the
employee access?
What type of communication will
broadcast send a message to all devices on a
local area network?
Which message delivery option is
used when all devices need to
broadcast
receive the same message
simultaneously?
Which two Internet connection
options do not require that
cellular, Satellite
physical cables be run to the
building? (Choose two.)
congestion Which term describes the state of
a network when the demand on
the network resources exceeds
the available capacity?
What three functions are defined
data encoding, by network protocols to allow
message size, communication between known
delivery options source and destination IP
addresses? (Choose three.)
Which logical address is used for
destination IP
delivery of data to a remote
address
network?
Which two connection options
provide an always-on, high-
DSL, cable bandwidth Internet connection to
computers in a home office?
(Choose two.)
A company is contemplating
easy to create, lacks
whether to use a client/server or a
centralized
peer-to-peer network. What are
administration, less
three characteristics of a peer-to-
cost to implement
peer network? (Choose three.)
What process is used to place one
message inside another message
encapsulation
for transfer from the source to the
destination?
Which command or key
combination allows a user to
exit
return to the previous level in the
command hierarchy?
What method can be used by two
computers to ensure that packets
flow control are not dropped because too
much data is being sent too
quickly?
how connection
between nodes Which two factors influence the
appears to the data method that is used for media
link layer, how nodes access control? (Choose two.)
share the media
A web client is sending a request
for a webpage to a web server.
From the perspective of the client,
HTTP, TCP,
what is the correct order of the
IP, Ethernet
protocol stack that is used to
prepare the request for
transmission?
Which organization develops the
IEEE 802 family of standard for wired
and wireless LANs and MANs?
Intermediary devices
direct the path of the
Which two statements describe
data., Intermediary
intermediary devices? (Choose
devices connect
two.)
individual hosts to
the network.
Which two engineering
International
organizations define open
Telecommunication
standards and protocols that
Union (ITU)
apply to the data link layer?
is a private connection of LANs
and WANs that belongs to an
organization, and is designed to
Intranet be accessible only by the
members and employees of the
organization, or others with
authorization.
What will a network administrator
IOS use to modify a configuration on a
Cisco router?
it can rapidly adapt For which three reasons was a
to the failure of packet switched connectionless
network devices and data communications technology
communication links, used when developing the
Data packets can
travel through the
network using
multiple different
paths, Network
Internet (Choose three.)
devices dynamically
decide on the best
available path to
forward each packet.
Which statement describes a
It does not allow
feature of an IOS host name
spaces
configuration?
It is as
What is a characteristic of a
nondeterministic
contention-based access method?
method
An administrator measured the
transfer of usable data across a
100 Mb/s physical channel over a
latency given period of time and obtained
60 Mb/s. Which kind of
measurement did the
administrator obtain
In fiber optic meda, the signals are
light
represented as patterns of
local delivery What type of delivery uses data
link layer addresses?
Which device acts as gateway to
local router allow hosts to send traffic to
remote IP networks?
address is defined as a reserved
loopback address that routes packets back
to the host
sublayer is responsible for
mac communicating directly with the
physical layer.
Which interface command must
be entered in a Layer 3 switch
no switchport
before IPv4 address can be
assigned to the interface?
Nothing must be
done. Changes to the
configuration on an An administrator has just changed
IOS device take effect the IP address of an interface on
as soon as the an IOS device. What else must be
command is typed done in order to apply those
correctly and the changes to the device?
Enter key has been
pressed.
Products from What is an advantage of using
different
manufacturers can standards to develop and
interoperate implement protocols?
successfully
providing a richer e-
learning What are two benefits of
environment, collaboration and video-on-
providing better demand applications? (Choose
social media two.)
opportunities
providing the rules
required for a specific What is the purpose
type of of protocols in data
communication to communications?
occur
Which two message timing
response timeout,
mechanisms are used in data
flow control
communication? (Choose two.)
Which device performs the
function of determining the path
router
that messages should take
through internet works?
Scalable network is able to expand to
accept new devices and
applications without affecting
performance.
Which PDU is processed when a
host computer is de-encapsulating
segment
a message at the transport
layer of the TCP/IP model?
The farther you are from the
slower central office when utilizing a DSL
connection, the
During a routine inspection, a
technician discovered that
software that was installed on a
computer was secretly collecting
spyware
data about websites that were
visited by users of the computer.
Which type of threat is affecting
this computer
A network administrator needs to
keep the user ID, password, and
session contents private when
SSH establishing remote CLI
connectivity with a switch to
manage it. Which access method
should be chosen?
A technician configures a switch
SVI
with these commands:
To save time, IOS commands may
be partially entered and then
Tab
completed by typing which key or
key combination?
The branch sites are
connected to a What is a characteristic of a WAN
central site through hub-and-spoke topology?
point-point links
the distance the
selected medium can
What two criteria are used to help
successfully carry a
select a network medium from
signal, the
various network media? (Choose
environment where
two.)
the selected medium
is to be installed
The host portion of What happens when two devices
the IP addresses will on the same subnet are
be different communicating?
The kernel provisions
hardware resources What is the function of the kernel
to meet software of an operating software?
requirements.
The network provides
predictable levels of Which statement describes a
service to different network that supports QoS?
types of traffic
the privileged
What is encrypted with the enable
executive mode
secret command?
password
The throughput is
Which two statements are true of
predictable, Devices
the deterministic access method?
take turns
(Choose two.)
transmitting
They define how
messages are
Which statement is correct about
exchanged between
network protocols?
the source and the
destination.
They define how
messages are
Which statement is correct about
exchanged between
network protocols?
the sources and the
destination
They originate the What are two functions of end
data that flows devices on a network? (Choose
through the two.)
network., They are
the interface
between humans and
the communication
network.
Which statement describes a
They vary depending
characteristic of the frame header
on protocols
fields of the data link layer?
This is the default
mode on an
unconfigured router
Which two statements are true
when first powered
regarding the user EXEC mode?
up., Only some
(Choose two.)
aspects of the router
configuration can be
viewed
to add a password to Why would a network
a Cisco network administrator use the CLI of the
device Cisco IOS?
to copy an existing Why would a technician enter the
configuration into command copy startup-config
RAM running config?
to establish the What is the purpose of the
media link physical link control field in a data
link layer header?
to identify
which network Which is a function of the Logical
layer protocol is Link Control (LLC) sublayer?
being used
Which two components are added
Trailer, frame header to the PDU at the network
access layer? (Choose two.)
A network administer has
forgotten the argument of an IOS
Type the command
command. How would the
and then press the?
administrator get help from the
key
IOS CLI to complete the command
correctly?
Use the console port
Which procedure is used to access
to locally access the
a Cisco 2960 switch when
switch from a serial
performing an initial configuration
or USB interface of
in a secure environment?
the PC.
user EXEC mode A router has a valid operating
system and a configuration file
stored in NVRAM. The
configuration file contains an
enable secret password but no
console password. When the
router boots up, which mode will
display?
A data center has recently
updated a physical server to host
multiple operating systems on a
single CPU. The data center can
now provide each customer with a
virtualization separate web server without
having to allocate an actual
discrete server for each customer.
What is the network trend that is
being implemented by the data
center in this situation?
when the end-user
device will run an
When is a wired connection
application that
preffered to a wireless connection
requires a dedicated
by an end-user device?
connection to the
network
wireless LAN Which area of the network would
a college IT staff most likely have
to redesign as a direct result of
many students bringing their own
tablets and smartphones to school
to access school resources?

You might also like