Term
| Which three options correctly associate a layer of hierarchical design model with its function? |
|
Definition
| Distribution-Traffic control and security policies Access-Interface for end devices Core-High speed backbone |
|
|
Term
| With respect to network design, what is convergence? |
|
Definition
| Combining conventional data with voice and video on a common network. |
|
|
Term
| Which three options are potential benefits of converged network? |
|
Definition
| Combines voice and data network staffs. Combines voice, video, and applications in one computer. Simplified network changes. |
|
|
Term
| Which four options describe data store and data server analysis actions? |
|
Definition
| Amount of server-to-server traffic. Amount of traffic for a SAN. Data backed up to tape. Network attached storage. |
|
|
Term
| What factor may complicate user community analysis? |
|
Definition
| Application usage is not always bound by department or physical location. |
|
|
Term
| Which two of the following pairings are accurate? |
|
Definition
| Forwarding- Process capabilities of a switch by quantifying performance of the switch by how much data it can process per second. Wire Speed- data rate that each port on the switch is capable of attaining. |
|
|
Term
| What would be the port capacity of a single port on a 48-port Gigabit Ethernet switch? |
|
Definition
|
|
Term
| A switch that uses MAC addresses to forward frames operates at which layer of the OSI model? |
|
Definition
|
|
Term
| What is a feature offered by all stackable switches? |
|
Definition
| Support for Gigabit connectivity |
|
|
Term
| What function is performed by a Cisco Catalyst access layer switch? |
|
Definition
|
|
Term
| Which three features are associated with the core layer of the hierarchical design model? |
|
Definition
| Layer 3 support Redundant components 10 Gigabit Ethernet |
|
|
Term
| Which two characteristics describe the core layer of the hierarchical network model? |
|
Definition
| Redundant Paths Rapid forwarding of traffic |
|
|
Term
| Fixed Configuratoin Switch |
|
Definition
| Ports cannot be added to the device |
|
|
Term
|
Definition
| Ratio of quantity of data to time |
|
|
Term
|
Definition
| Prioritization of network traffic |
|
|
Term
|
Definition
| Capability of a device to power another device using Ethernet |
|
|
Term
|
Definition
| Allows for the installation of line cards or modules. |
|
|
Term
|
Definition
| Binding together of distinct links for enhanced throughput |
|
|
Term
|
Definition
| Ratio of number of ports to number of switches |
|
|
Term
|
Definition
| Capable of interconnection via a special backplane cable. |
|
|
Term
|
Definition
| Capability to recover connectivity after a network failure. |
|
|
Term
| What does the following error message signify? |
|
Definition
| The data of one of the parameters is incorrect. |
|
|
Term
| What is the effect of entering the banner login #Authorized Personnel Only!# |
|
Definition
| Authorized Personnel Only! appears before the username and password login prompts for any connection. |
|
|
Term
| Which three options correctly associate the command with the paired behavior? |
|
Definition
| switchport port-security violation shutdown swtichport port-security mac-address sticky switchport port-security maximum |
|
|
Term
| An Ethernet has built the MAC address table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit? |
|
Definition
| Forward the frame out Interface 1 |
|
|
Term
| What can be determined from the following command output? |
|
Definition
| The system has 32 KB of NVRAM |
|
|
Term
| What advantage does the SSH offer over Telnet when remotely connecting to a device? |
|
Definition
|
|
Term
| How many collision and broadcast domains are displayed in the network? |
|
Definition
| 11 Collision, 4 broadcast |
|
|
Term
| Which option correctly associates the Layer 2 security attack with the description? |
|
Definition
| Telnet attack: Using brute force password attacks to gain access to a switch |
|
|
Term
| Which three statements are true about the CSMA/CD access method? |
|
Definition
| In an Ethernet LAN,, each station continuously listens for traffic on the medium to determine when gaps between frame transmissions occur and then sends the frame. In an Ethernet LAN, stations may begin transmitting anytime they detect that the network is quiet. (there is no traffic) If a collision occurs in an Ethernet LAN, transmitting stations stop transmitting and wait a random length of time before attempting to retransmit the frame. |
|
|
Term
| how does the Ethernet switch process the incoming traffic using port-based memory buffering? |
|
Definition
| The frames are stored in queues that are linked to specific incoming ports. |
|
|
Term
| What are two key features of an Ethernet switch with Layer 2 capabilities? |
|
Definition
| Full-duplex operation Filtering based MAC address |
|
|
Term
| The network administrator wants to configure an IP address on a Cisco switch. how does the network administrator assign the IP address? |
|
Definition
|
|
Term
| Why should a default gateway be assigned to a switch? |
|
Definition
| So that other networks can be accessed from the command prompt of the switch |
|
|
Term
| Which two tasks does autonegotiation in an Ethernet network accomplish? |
|
Definition
| Sets the link speed Sets the link duplex mode |
|
|
Term
| What is the effect of entering the SWI (config-if)# Duplex full command on a Fast Ethernet switch port>? |
|
Definition
| IF the connected device is also set for full duplex, it participates in collision-free communication |
|
|
Term
| Which term describes the time delay between a frame being sent from a source device and received on a destination device? |
|
Definition
|
|
Term
| Which option correctly associates the command with the description? |
|
Definition
| copy running-config startup config- save the current running configuration to the startup configuration |
|
|
Term
| Which three options correctly associate the command with the description? |
|
Definition
| line console 0 password cisco login |
|
|
Term
|
Definition
| The access layer in the three-layer hierarchical network model describes the portion of the network where devices connect to the network and includes controls for allowing devices to communicate on the network. |
|
|
Term
|
Definition
| An optional feature of Catalyst switches. |
|
|
Term
| Cisco Discovery Protocol (CDP) |
|
Definition
| A media- and protocol-independent device-discovery protocol that runs on all Cisco=-manufactured equipment, including router, access servers, bridges and switches. |
|
|
Term
|
Definition
| The speed and capability of a group of switches running STP to agree on a loop-free Layer 2 topology for a switched LAN |
|
|
Term
|
Definition
| The backbone of a switched LAN. |
|
|
Term
|
Definition
| An Ethernet frame switching approach that streams data through a switch so the the leading edge of a packet exits the switch at the egress port before the packet finishes entering the ingress port. |
|
|
Term
|
Definition
| In the three-layer hierarchical network design model, the distribution layer is the layer that invokes policy and routing control. Typically, VLANS are defined at this layer. |
|
|
Term
|
Definition
| The application of specific algorithm to data so as to alter the apperance of the data, making it incomprehensible to those who are no authorized to see the information. |
|
|
Term
|
Definition
| A data-trafficking technique used by switches in which traffic receives on a n interface is sent out all the other interfaces of the switch. |
|
|
Term
|
Definition
| The capability of a port for simultaneous data transmission and reception. |
|
|
Term
| graphical user interface (GUI) |
|
Definition
| An environment that uses pictorial as well as textual representations of the input and output of applications and the data structure in which information in which information is stored. |
|
|
Term
|
Definition
| Refers to the transmission of data in just one direction at a time. At any given instant, the device can transmit or receive, but not both simultaneously. |
|
|
Term
|
Definition
| A measure of the lack of difficulty in keeping network devices and associated software in working order. |
|
|
Term
|
Definition
| A measure of the lack of difficulty in managing network devices using network management software and protocols. |
|
|
Term
|
Definition
| A multilayer switch filters and forwards packets based on OSI Layer 2 through Layer 7 information at wire-speed by utilizing dedicated hardware that stores data structures mirroring routing table, ARP table, and ACL information. |
|
|
Term
|
Definition
| RAM that retains its contents when a device is powered off. In Cisco products, NVRAM is used to store configuration information. |
|
|
Term
| organizational unique identifier (OUI) |
|
Definition
| A 3-byte hexadecimal number that is IEEE Registration Authority assigns to any company the manufacturers components under the ISO/IEC 8803 standard. |
|
|
Term
|
Definition
| A loosely defined networking measure based on throughput and error rates. |
|
|
Term
| Power over Ethernet (PoE) |
|
Definition
| The powering of network devices over Ethernet cable. |
|
|
Term
| private branch exchange (PBX) |
|
Definition
| A digital or analog telephone switchboard located on the subscriber premises and used to connect private and public telephone networks. |
|
|
Term
|
Definition
| The time lag between the departure of a signal from the source and the arrival of the signal at the destination. |
|
|
Term
|
Definition
| A measure of performance for a transmission system that reflects its transmission quality and service available |
|
|
Term
|
Definition
| Nonvolatile memory that can be read, but not written to, by microprocessor. |
|
|
Term
|
Definition
| The duplication of devices, services, or connections so that, in the even of a failure, the redundant devices, services or connections can perform the work of those that failed. |
|
|
Term
|
Definition
| A desirable property of a network to handle growing amounts of traffic in a graceful manner. A scalable network is readily enlarged. |
|
|
Term
|
Definition
| An encompassing term describing the prevention and means of prevention of unauthorized access to an entity, location, or system. |
|
|
Term
| Simple Network Management Protocol (SNMP) |
|
Definition
| Used to monitor and control network devices, and to manage configurations, statistics collection, performance,and security. |
|
|
Term
|
Definition
| The act of a packet or frame being represented with a false source address to mask its true source. Spoofing is designed to foil network security mechanisms such as filters and access lists. |
|
|
Term
| store-and-forward switching |
|
Definition
| A technique in which frames are completely processes before being forwarded out the appropriate port. |
|
|
Term
| Trivial File Transfer Protocol (TFTP) |
|
Definition
| A simplified version of FTP that allows to be transferred from one computer to another over a network in clear text without authentication. |
|
|
Term
|
Definition
| A group of hosts with a common set of requirement that communicate as if they were attached tot he same wire, regardless of their physical location. |
|
|
Term
|
Definition
| The capability to carry voice traffic over an IP-based network with POTS-like functionality, reliability, and voice quality. |
|
|