CONC – Flashcard
Unlock all answers in this set
Unlock answersquestion
            1. Name 3 benefits of networking communications systems. ST #2
answer
        Sharing Information Information Availability Access information from a distance
question
            2. What provides long haul data, voice, video, transport networks, services and is referred to as the backbone of the GIG? ST #3
answer
        Defense Information System network (DISN)
question
            3. What resides on a Motherboard? ST 37-12
answer
        Microprocessor, buses, memory, BIOS
question
            4. What computer bus allows hot-swappable peripheral connections? ST #9
answer
        Universal Serial Bus (USB)
question
            5. What type of computer memory has the goal to reduce data access time? ST #11
answer
        Cache memory
question
            6. What RAID level only increases access speed and does not provide redundancy? ST #13
answer
        RAID 0 (zero)
question
            7. What is the conceptual model that describes how information from one computer moves across a network to another computer system? ST #18
answer
        Open System Interconnection (OSI) model.
question
            8. What are the seven layers of the OSI model? ST #18
answer
        Application -7, Presentation-6, Session-5, Transport-4, Network-4, Data Link-4, Physical-1
question
            9. What are the two sections that the seven layer OSI model can be divided into? ST #18
answer
        Application (5-7) and Data Transport (1-4)
question
            10. What OSI layer is responsible for end-to-end connections? ST #18, CCNA #14&16
answer
        Transport
question
            11. What OSI layer uses logical IP addressing and makes best path determination? ST #18, CCNA #20-21.
answer
        Network
question
            12. What OSI layer uses Media Access Control (MAC) addresses and combines packets into frames? CCNA #23, 50-51
answer
        Data Link
question
            13. What OSI layer actually puts the binary bits on the transmission media? ST #18, CCNA #26
answer
        Physical
question
            14. List the 3 layers of the Cisco hierarchical model and briefly describe each. CCNA #64-67
answer
        Core: Backbone Distribution: Routing Access: Switching
question
            15. When a router or a switch first boots up, what operation takes place first? CCNA #210
answer
        Power on Self Test (POST)
question
            16. What metrics does EIGRP use to select the best possible path, and what is the default metric? CCNA #435
answer
        Bandwidth, Delay, Load, Reliability
question
            17. What switch or router command would display the information in the running configurations? CCNA #2246
answer
        Show running-config
question
            18. Router WAN connections are usually associated with what type of connection/transmission? CCNA 754
answer
        Serial Transmission
question
            19. What is the type of encapsulation that needs to be considered/selected when preparing a router WAN connection? CCNA #754
answer
        Point-to-Point Protocol (PPP) Encapsulation
question
            20. If you want to configure PPP authentication on a Cisco router WAN connection, what configuration steps must be set? CCNA 760
answer
        Hostname, Username, Password
question
            21. What is the Cisco default WAN encapsulation? CCNA 756
answer
        High Level Data Link Control (HDLC)
question
            22. What non-proprietary WAN encapsulation supports authentication? CCNA 757
answer
        Point-to-Point Protocol (PPP)
question
            23. What OSI layer uses data encryption, compression and transmission services to define data representation? CCNA #15
answer
        Presentation
question
            24. What device connects multiple single segment Ethernet segments together so they act like a single segment (one collision domain)? ST #19, CCNA #27
answer
        Hub
question
            25. What device maintains MAC address tables and uses these physical addresses to transmit data across a network? ST #20, CCNA #509
answer
        Switch
question
            26. Switches speed up a LAN by implementing full-duplex operations. Can a switch connect to a hub using full duplex? CCNA #45
answer
        NO
question
            27. What are the three types of RJ-45 connector cables we've talked about, and what connections do they make in our LAN? CCNA #57-58
answer
        Straight-through: Different Crossover: Same  Rolled: Console port
question
            28. What device works at the network layer to forward data using logical IP addresses? ST #20, CCNA #20-21
answer
        Router
question
            29. In a Cisco device, what command lets you advance from user mode to privileged mode? ST #28
answer
        Enable or EN
question
            30. From user mode (>), what command string would allow you to set a router's hostname to Keesler? (assume no passwords are set)? ST #33
answer
        Enable Config t Hostname Keesler
question
            31. When setting a message of the day (MOTD) banner, what must precede and follow the MOTD statement that you want displayed? ST #33
answer
        Delimitating character
question
            32. In a router lab environment often there are no DCE devices, so when two routers are connected via a serial connection, one router acts as a DCE device while the other router remains a DTE device. What special commands are applied to the DCE serial interface? ST #34, CCNA #242-243, 755
answer
        Bandwidth, Clockrate
question
            33. What does the Cisco Discovery Protocol command: CDP timer 90 do? ST #35, CCNA #304
answer
        set rate in seconds at which CDP packets are sent
question
            34. What Cisco switch command are required to enable inter-VLAN trunking on interface FAO/23? ST #61
answer
        (config) FA0/23 (config-if)# switchport mode trunk
question
            35. What Cisco proprietary routing protocol is classless and will support VLSM networks? CCNA #428-429.
answer
        Enhanced Interior Gateway Routing Protocol (EIGRP)
question
            36. What router configuration technique supports inter-VLAN routing by allowing multiple IP addresses to be assigned to a single physical interface? CCNA #582
answer
        Sub-interfacing
question
            37. What routing option ensures that routing information is not advertised out the same port it was received? CCNA #391
answer
        Split Horizon
question
            38. What router options implements a list of conditions that will categorize and control network traffic? CCNA #609
answer
        Access Lists
question
            39. Give an example of a standard access list that would only permit 172.30.100.34 access and deny all other network traffic? CCNA #619
answer
        access-list 10 permit 172.30.100.34
question
            40. What are the three layer-2 switch functions? CCNA #509
answer
        Address Learning, Forward/Filter Decisions, Loop Avoidance
question
            41. Redundant switching topologies increase reliably, but what three problems can such a topology cause? CCNA #514
answer
        Broadcast Storms, MAC Address Table Instability, Multiple Frame Copies
question
            42. What switching protocol prevents network switching loops? CCNA #515
answer
        Spanning Tree Protocol (STP)
question
            43. With security concerns being paramount, what should you configure first in a Cisco Device? CCNA #???
answer
        Password
question
            44. Being able to identify the Cisco device is important, so after you configure the passwords, you should now name the device using what command? CCNA #???
answer
        Hostname
question
            45. To make global changes to your router's configuration, what command must be entered from the privileged mode prompt? CCNA #214
answer
        config t
question
            46. What switch commands would be necessary to allow remote management through an application such as telnet? CCNA #529
answer
        Setting IP information (Int vlan 1- IP address, default Gateway)
question
            47. What is the term that describes: When all ports on a switch have transitions to either the forwarding or blocking modes/states? CCNA #521
answer
        Convergence
question
            48. What kind of firewall is a Sidewinder? ST #88
answer
        Proxy firewall
question
            49. When configuring Sidewinder, why is Secure Shell preferred over talent? ST #85
answer
        Telnet is unsecure
question
            50. What protocol is designed to enable network administrators to manage performance, solve problems, and plan for growth? ST #94
answer
        Simple Network Management Protocol (SNMP)
question
            51. What protocol allows managed devices to collect and store information and forward the data to Network Management Systems? ST #94
answer
        Simple Network Management Protocol (SNMP)
question
            52. What standard specification enables network monitors and console systems to exchange network monitoring data? ST #97
answer
        Remote Monitoring (RMON)
question
            53. You find that an intruder has accessed your router via telnet what should you do to prevent future access, while not impeding traffic through your busy network? CCNA #609
answer
        Create or modify access lists
question
            54. What type of access list would be best to implement if a worker needs to be denied access into the accounting LAN or if you to deny entire TCP or UDP protocol like all ICMP traffic? CCNA #620
answer
        IP Extended Access List
question
            55. What does CITS use as its standard trouble ticketing software? ST #104
answer
        Remedy
question
            56. What technology does HP Openview use to ease configuration and display the network in a graphical manner? ST #101
answer
        Graphical User Interface (GUI)
question
            57. HO Openview addresses which specific levels of FCAPS? ST #101
answer
        Fault Management, Configuration, Performance
question
            58. What command would be best to check if a computer can send and receive data? ST #108
answer
        Packet Internet Groper (PING)
question
            59. Which command would you use from a command prompt to view the AMC address of a computer? ST #110
answer
        ipconfig /all
question
            60. What program running within a Windows domain controller will assign network devices dynamic IP addresses? ST #145
answer
        Dynamic Host Configuration Protocol (DHCP)
question
            61. What type of devices are commonly configured to be DHCP clients? ST #145
answer
        Windows clients and servers who don't require static addresses
question
            62. What allows you to issue more IP addressed than you have available in your subnet? ST #150
answer
        Superscope
question
            63. For your DHCP server to be valid in your network, the server must be ________________ by the active directory service? ST #146
answer
        Authorized
question
            64. What allows a DHCP configuration option allow a device to always get the same dynamic IP address? ST #149
answer
        Reservation
question
            65. The range of allowed DHCP addresses a server can distribute is otherwise referred to as a DHCP____________________. ST #146
answer
        Scope
question
            66. What are the two primary goals of network management systems? ST #101
answer
        Reduce cost, Provide reliable/consistent service
question
            67. The CORE layer of the CITS model is designed to provide a _________________________. ST #167
answer
        High-speed switching backbone
question
            68. Using class-full ideology and given IP address 172.20.101.67, which part is network and which part is host?
answer
        172.20 (network) 101.67 (host)
question
            69. Using full-class ideology and given IP address 125.2.10.7, which part is network and which part is host?
answer
        125 (network) 2.10.7 (host)
question
            70. Using full-class ideology and given IP address 193.15.1.88, which part is network and which part is host?
answer
        193.15.1 (network) 88 (host)
question
            71. How many subnets are possible with a Class C address with a subnet of mask?
answer
        62
question
            72. How many hosts are possible with a Class C address with a subnet of mask 255.255.255.252?
answer
        2
question
            73. How many subnets are possible with a Class B address with a subnet of mask 255.255.248.0?
answer
        30
question
            74. How many hosts are possible with a Class C address with a subnet of mask 255.255.255.248.0?
answer
        2
question
            75. What is the class of the following IP addresses?
answer
        172.50.30.1 - B 195.60.21.3 - C 20.69.1.1 - A
question
            76. Given IP address 191.243.36.43 and the subnet mask 255.255.255.224, what is the subnet?
answer
        191.243.36.32
question
            77. Given IP address 171.23.30.43 and the subnet mask 255.255.248.0, what is the subnet address?
answer
        171.23.24.0
question
            78. Given IP address 91.27.57.43 and the subnet mask 255.252.0.0, what is the subnet address?
answer
        91.24.0.0
question
            79. How many bits is an IPV6 address and what common format is used to represent the binary number? CCNA 78-719
answer
        128 bits, 8 groups of hexadecimal code
question
            80. What type of IPv6 addresses are not meant to be routed and serve the purpose as IPv4 private or reserved addresses?
answer
        Link-local and unique local addresses
question
            81. What type IPV6 address is self assigned using the neighbor discovery protocol? Slideshow
answer
        Link-local addresses
question
            82. How many IPV6 64-bit Extended Unique Identifier (EUI-64) employ the devices MAC address in its IPV6 address? CCNA #724
answer
        Padding the device MAC address by inserting FFFE between the MAC organizational identified and the manufacturer's serial number and then adding it to the network prefix
question
            83. What type of IPV6 address types is publically routable across the World Wide Web, and using prefix notation? What is the address range? CCNA #721
answer
        Global unicast address, 2000::/3
question
            84. What services do local communications commonly include? ST #2
answer
        SIPRNet, NIPRNet, e-mail, telephone networks, LANS, & VTC
question
            85. What are the three main advantages of wireless networking? ST #71
answer
        Mobility, Ease of Installation, Lower Cost
question
            86. Wireless LAN authentication can be provided by what 802.1 protocol? ST #76
answer
        IEEE 802.1X
question
            87. What wireless LAN signaling characteristic distinguishes one wireless LAN from another wireless LAN? ST #79
answer
        Service Set Identified (SSID)
question
            88. What countermeasures can you use to secure your home wireless network? ST #80
answer
        Change default password, change SSID, disable SSID broadcast, use WPA encryption,& Enable MAC Filtering
question
            89. What does TELNET allow a user to do? CCNA #87-88
answer
        It allows a user on a remote client machine (Telnet client) to access resources of another machine (Telnet )server
question
            90. What is the name of the contention media that allow all hosts on a network to share the same bandwidth? CCNA #43
answer
        Ethernet
question
            91. What cable would you use to connect a switch to a switch? CCNA #57
answer
        Crossover
question
            92. The _____________ layer using switching to control user and workgroup access to internetwork resources? CCNA #67
answer
        Access
question
            93. If a router boots up with no startup configuration in NVRAM, what mode does the router enter? CCNA #212
answer
        Setup Mode
question
            94. What can be used to display a security notice to people logging into your Cisco device?
answer
        MOTD Banner
question
            95. What command would set your devices encrypted password to J3""y, and what mode does this password protect? CCNA #228
answer
        Enable Secret J3^^y (privileged/enable mode)
question
            96. When showing an interface, is it possible for the line be down and the protocol to be up? CCNA #252
answer
        NO, the condition is not possible
question
            97. How does spanning tree protocol (STP) keep track of switches? CCNA #516
answer
        Bridge ID
question
            98. What are the three VLAN trunking protocol (VTP) modes? CCNA #576
answer
        Client, Server& Transparent
question
            99. Where is trunking enabled (command: switchport mode trunk) when setting up inter-VLAN routing CCNA # 583
answer
        Layer 2 switch
question
            100. What are the three ways to gain management access to a router? CCNA # 208
answer
        Console  Auxillary  Telnet
question
            101. In order, what are the four STP port states? CCNA page 520
answer
        Blocking Listening Learning Forwarding
question
            102. What digital service is designed to run over existing phone lines? CCNA # 746
answer
        Integrated Services Digital Network (ISDN)
question
            103. What command would you use to set a router interface to the clock rate of 64Kbps? CCNA 243-244
answer
        Clockrate 64000
question
            104. When developing an access list, how should you order your entries? CCNA # 611
answer
        Place most specific tests entries at the beginning and broad tests entries at the end
question
            105. What management software enables automation and management of internal and external service and support processes? ST # 105
answer
        Remedy
question
            106. How does HPOV test connectivity? ST # 107
answer
        Ping Status poll SNMPWalk Trace Route Poll node Capability Poll
question
            107. What tool helps diagnose network problems by allowing you to track the number of hops necessary for a packet to get to its destination? CCNA # 191-192
answer
        Trace Route
question
            108. What defines a collection of one or more domain that share common schema/global catalog
answer
        Forest
question
            109. Why do we define sites in active directory? ST page 125
answer
        Control Replication Traffic Make Authentication Faster Locate the nearest server providing directory enable services
question
            110. What can be used to stipulate how long users can use a computer after they logon?
answer
        Service Agreement
question
            111. What ensures every active duty and reserve base has an infrastructure to link future voice, data, video, imagery, and sensory systems via high capacity transport media? ST # 168
answer
        Information Transport System (ITS)
question
            112. When configuring a Cisco device, what are 3 different types of passwords are used to control access? SW #s 31-32
answer
        Enable Secret Password Console Password Virtual Terminal Password
question
            113. When initially configuring a router, what cable would you choose to console to a switch or router from your computer's serial port? CCNA # 58
answer
        Rolled
question
            114. Frame Relay, Point-to-Point Protocol (PPP), High-level Data-Link (HDLC) are what kind of protocols? CCNA 746
answer
        WAN Protocols
question
            115. What are the 4 SNMP communication commands? ST # 95
answer
        Read, Write, Trap, & Traversal operations
question
            116. What SNMP communication reports managed device events to a Network Management System (NMS)? ST # 95, CCNA # 91
answer
        Trap
question
            117. What security device prevents unauthorized users from gaining networks access or from monitoring data transfers? ST # 85
answer
        Firewall
question
            118. What server application resolves names to IP addresses? ST # 135
answer
        Domain Name System (DNS) Server