A ___ address is defined as a reserved address that routes packets back to the host
loopbackCorrect
A ___ network is able to expand to accept new devices and applications without affecting performance.
scalableCorrect
A bus topology is connected via a single cable only.
TrueCorrect
False
A client is downloading a large file from a server using FTP. Many of the segments are lost during transit. What will most likely happen?
The FTP client responds to the server with a smaller window size in the TCP header.Correct
A collision fragment, also known as a ___ frame, is a frame of fewer than 64 bytes in length.
runtCorrect
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
· lacks centralized administration · less cost to implement · easy to createCorrect
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation?
virtualizationCorrect
A LAN can span a small room with limited amount of computers
TrueCorrect
False
A MAN can span across cities and smaller than a WAN.
TrueCorrect
False
A network administer has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly?
Type the command and then press the? keyCorrect
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
SSHCorrect
A network administrator notices that the default gateway devices sends an ICMP Redirect message to the workstation when the workstation tries to connect to file server on another network. What is the purpose for this ICMP message?
To notify the workstation, that another router on the same network, is the better defaultgateway to reach the remote serverCorrect
A network connection between two or more LAN over a potentially large geographic distance.
LAN
MAN
WANCorrect
Topologies
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
user EXEC modeCorrect
A router is considered as a layer-2 device.
True
FalseCorrect
A special address used to send data to all hosts in the network is called the network address
True
FalseCorrect
A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)#ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?
SVICorrect
A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?
experimentalCorrect
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this command?
to test if the workstation can communicate on the networkCorrect
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, EthernetCorrect
An ___ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization
intranetCorrect
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.Correct
An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain
latencyCorrect
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
an intranetCorrect
An IP address has two parts, the Network Number and the Host Number.
TrueCorrect
False
Application layer is the 6th layer in the Open Systems Interconnection (OSI) model
True
FalseCorrect
At which layers of the OSI model does Ethernet function? (Choose two.)
· Physical · Data linkCorrect
Circuit Switchinga method which pre-allocates dedicated network bandwidth specifically for each communication session, each having a constant bit rate and latency between nodes.
TrueCorrect
False
Data Conversion is the conversion of information or data into a usable format
TrueCorrect
False
Decryption is the process of encoding message or information in such a way that only authorized parties can access it.
True
FalseCorrect
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer
spywareCorrect
During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?
flashCorrect
During troubleshooting procedures, from which location will most Cisco routers load a limited IOS
ROMCorrect
Encryption is used to compress the message and using its source coding, or bit-rate reduction which involves encoding information using fewer bits than the original representation.
True
FalseCorrect
Enterprise Router are the more sophisticated type of router.
TrueCorrect
False
For which three reasons was a packet switched connectionless data communications technology used when developing the Internet (Choose three.)
· it can rapidly adapt to the failure of network devices and communication links · Data packets can travel through the network using multiple different paths · Network devices dynamically decide on the best available path to forward each packet.Correct
FTP can be Passive Mode only.
True
FalseCorrect
FTP is a standard network protocol used for the transfer of computer files from a server to a client using the Client-server model on a computer network.
TrueCorrect
False
FTP stands for File transfer protocol
TrueCorrect
False
hich term describes the state of a network when the demand on the network resources exceeds the available capacity?
congestionCorrect
How does the network layer use the MTU value?
The MTU is passed to the network layer by the data link layerCorrect
How is the Cisco IOS generally accessed and navigated?
Through the CLI using a terminal emulatorCorrect
HTTP stands for Hyper Text Transfer protocol
TrueCorrect
False
In a server client model, the client requests Information from the server
TrueCorrect
False
In a subnet mask, 255 represents the network while 0 represents the host
TrueCorrect
False
In Computer Network, it is not possible that the information to be congested within a network.
True
FalseCorrect
In data link layer frames, which of among the following is not included?
Source and Destination addresses
Data flow controlCorrect
Data length
Start Signal
In fiber optic meda, the signals are represented as patterns of
lightCorrect
In Host IP address, it cannot be all 0's
TrueCorrect
False
In the OSI Model, the physical layer provides services to exchange the individual pieces of data over the network between identified network devices.
True
FalseCorrect
In the OSI model, the presentation layer provides proper common data format that is sent across Application Layer services.
TrueCorrect
False
In the TCP/IP Model, this layer controls the hardware devices and media that make up the network.
Transport Layer
Internet Layer
Application Layer
Network Access LayerCorrect
In the TCP/IP model, this supports communication between diverse devices across diverse networks
Transport LayerCorrect
Application Layer
Network Access Layer
Internet Layer
In which scenario would the use of a WISP be recommended
a farm in rural area without wired broadband accessCorrect
In which scenario would the use of a WISP be recommended?
a farm in a rural area without wired broadband accessCorrect
Internet Protocol version 6 (IPv6) is the most recent version of IP address.
TrueCorrect
False
IP address is written in binary
True
FalseCorrect
IP addresses are written in 0s and 1s.
TrueCorrect
False
IP stands for Intermission protocol.
True
FalseCorrect
It is a collection of computing devices that are connected in various ways in order to communicate using electronic means.
Computer NetworksCorrect
Hub
Router
End-devices
It is a Common protocol that governs interaction between web server and a web client.
HTTPCorrect
IP
TCP
Multiple Protocols
It is the first layer of the OSI Model.
Data Link Layer
MAC
Physical LayerCorrect
Logical Link Control Layer
It provides information and services, like e-mail or web pages, to other hosts on the network.
Client-Server Model
ServersCorrect
Network Topologies
Network Protocols
It refers to the sublayer that identify who is allowed to access the media at any one time Application Layer
Ethernet
MACCorrect
USB
Logical Link
LAN stands for Local Area Network.
TrueCorrect
False
Layer 2 of the TCP/IP Model is the Internet Layer.
TrueCorrect
False
MAN stands for Many Area Networks
True
FalseCorrect
Message forwarding is one of the functions of Network Layer.
TrueCorrect
False
Multiplexing is the combination of different signals for transmission utilizing single medium, or transmission path which provide multiple endpoints on a single node
TrueCorrect
False
On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represent the___ MAC address
broadcastCorrect
One of the services of Transport layer is the Flow control wherein Nodes are transmitted from one point to another, it should be properly managed to prevent a fast transmission of data from sending it more data that can be supported by the receiving data buffer causing a buffer overrun.
TrueCorrect
False
OSI Model stands for Open Systems Interconnect
TrueCorrect
False
Packet mode communication may be implemented with or without intermediate forwarding nodes like packet switches.
TrueCorrect
False
Packet switching is the transit of logically addressed network packets from one network interface to another.
True
FalseCorrect
Presentation Layer is responsible for Data Encryption/Decryption.