Flashcards

Operating systems and networks - Set 1

Flashcards for quick repetition. Test your networks and operating systems knowledge.
Flashcards: 124 Played: 3883 times
What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)
to identify missing segments at the destination
to reassemble the segments at the remote location
to limit the number of segments that can be sent out of an interface at one time
to determine if the packet changed during transit
to identify missing segments at the destination
to reassemble the segments at the remote location
Which two tasks are functions of the presentation layer? (Choose two.)
addressing
authentication
encryption
session control
compression
encryption
compression
Which three statements characterize UDP? (Choose three.)
UDP relies on application layer protocols for error detection.
UDP provides basic connectionless transport layer functions.
UDP provides connection-oriented, fast transport of data at Layer 3.
UDP provides sophisticated flow control mechanisms.
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
UDP relies on application layer protocols for error detection.
UDP provides basic connectionless transport layer functions.
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
What is a key characteristic of the peer-to-peer networking model?
wireless networking
network printing using a print server
social networking without the Internet
resource sharing without a dedicated server
resource sharing without a dedicated server
A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?
nslookup
ipconfig
tracert
netstat
nslookup
Which domain name would be an example of a top-level domain?
cisco.com
.com
.com
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
The address is returned to the pool for reuse when the lease expires.
The configuration is permanent and nothing changes.
The configuration is held by the server to be reissued when the PC is returned.
The address is returned to the pool for reuse when the lease expires.
When planning for network growth, where in the network should packet captures take place to assess network traffic?
only on the busiest network segment
between hosts and the default gateway
on as many different network segments as possible
on as many different network segments as possible
A wireless host needs to request an IP address. What protocol would be used to process the request?
ICMP
HTTP
DHCP
FTP
DHCP
Which example of malicious code would be classified as a Trojan horse?
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that was written to look like a video game
malware that was written to look like a video game
When applied to a router, which command would help mitigate brute-force password attacks against the router?
exec-timeout 30
service password-encryption
login block-for 60 attempts 5 within 60*
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60*
A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?
show ip interface brief
show mac-address-table
show interfaces
show interfaces
Where are Cisco IOS debug output messages sent by default?
vty lines
Syslog server
console line
memory buffers
console line
Match the description with the associated IOS mode. (not all options are used.)
pytanie 74
Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)
pytanie 75

Other modes