Network Fundamentals Flashcards

(20 cards)

1
Q

What is the function of a firewall?

A

monitor and control the incoming and outgoing network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two statements about interface labels are true? (Choose two.)

An interface label is part of the physical topology diagram.

An interface label includes information about the interface type.

An interface label is its IPv4 address.

An interface label is used only when a device has more than one interface.

An interface label can be arbitrarily selected by the device administrator.

A

An interface label is part of the physical topology diagram.

An interface label includes information about the interface type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the availability percentage over a one-year period of a network that is not available for 15 minutes each month?

A

99.9657 percent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which network characteristic indicates the general expense to purchase, install, and maintain network components?

A

cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To which ISO OSI model layer or layers does the TCP/IP model application layer correspond?

network

transport

session

session, presentation, and application

A

session, presentation, and application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are given a physical network diagram. Which two statements about the logical diagram for the same network are true? (Choose two.)

The logical diagram is obvious from the physical diagram.

The logical diagram can be drawn by adding device model information to the physical diagram.

The logical diagram can be drawn by examining device configurations.

The logical diagram can be drawn by analyzing data flows in the network.

The logical diagram is always different to the physical diagram.

A

The logical diagram can be drawn by examining device configurations.

The logical diagram can be drawn by analyzing data flows in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Match the PDU with its description.

a Link layer PDU

an Internet layer PDU

the general term for the PDU that is used at the application layer

a Transport layer PDU

A

Link = Frame

Internet = Packet

The general term for the PDU that is used at the application layer = Data

Transport = segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which ISO OSI layer defines services to segment the data?

presentation layer

session layer

transport layer

network layer

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two statements about the layered model of communication are true? (Choose two.)

Layering makes communication itself less complex.

Layer processes on a host logically communicate with the same layer processes on another host.

Layer processes on a host are independent and communicate with any of the other layers.

Layering facilitates troubleshooting by making it possible to diagnose and narrow a cause to specific layers.

Layering of functions is only theoretical and not implemented in real-world.

A

Layering makes communication itself less complex.

Layer processes on a host logically communicate with the same layer processes on another host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which statement is false regarding the encapsulation process?

Encapsulation is the process used by the sending device to remove one or more of the protocol headers.

Segment is the PDU of the transport layer.

The encapsulation process is performed from top to bottom layer.

Encapsulation increases the size of the PDU.

A

Encapsulation is the process used by the sending device to remove one or more of the protocol headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which ISO OSI layer ensures that the application layer of the receiving system will be able to read the information that the application layer of another system has sent?

A

presentation layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which option is available to a network engineer to interact with a network device?

A network engineer communicates directly with the device operating system using machine programming languages.

A shell program exposes operating system services and can be accessed via CLI or GUI.

A hardware input device, such as mouse, can be used to directly interact with the device.

The operating system can only communicate with the user through light indicators present on the outside of the hardware.

A

A shell program exposes operating system services and can be accessed via CLI or GUI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Cisco IOS Software, what are the two EXEC access levels?

admin EXEC

user EXEC

privileged EXEC

basic EXEC

advanced EXEC

A

user EXEC and privileged EXEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are three examples of remote access locations? (Choose three.)

branch offices

head office

small office/home office

main office

a network in an airport lounge

A

branch offices, small office/home office, and a network in an airport lounge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the expected result of the show running-config | exclude ! command executed on the Cisco IOS device?

CLI will display the negated versions of the commands in the running configuration file.

CLI will display the running configuration file but without any lines containing “!” in them

CLI will display only the lines copied from the external source.

CLI will display only the lines different to the lines in the startup-config file.

A

CLI will display the running configuration file but without any lines containing “!” in them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In which type of applications does the user need to wait for a response when performing actions such as inventory lookup or a database update?

batch applications

real-time applications

interactive applications

human-to-human applications

A

interactive applications.

11
Q

How does the Privileged EXEC Mode restrict the access to the configuration CLI commands?

The Privileged EXEC Mode provides access security by adding an additional password when trying to reach the configuration modes.

By default, the Privileged EXEC Mode asks users to enter passwords for entering the Global Configuration Mode.

Access to the Privileged EXEC Mode can be password protected to allow only authorized users to execute the privileged set of commands

Commands entered in the Privileged EXEC Mode intentionally show false device information for unauthorized users.

A

Access to the Privileged EXEC Mode can be password protected to allow only authorized users to execute the privileged set of commands.

12
Q

What is the function of a WLAN controller?

monitor and control the incoming and outgoing network traffic

automatically handle the configuration of wireless access point

allow wireless devices to connect to a wired network

connect networks and intelligently choose the best paths between networks

A

automatically handle the configuration of wireless access point.

13
Q

Which three of the following commands can be used to exit the user EXEC mode in a Cisco CLI session? (Choose three.)

exit

end

disable

quit

logout

escape

A

exit, disable, and logout

13
Q

Which Cisco IOS command do you use to change from user EXEC mode into privileged EXEC mode?

enable

disable

admin

configure

configure terminal