Question
5 How can you set both the enable password and the enable secret password? 6. The maximum length for UTP cable is _________________ 7. A
5 How can you set both the enable password and the enable secret password?
6. The maximum length for UTP cable is _________________
7. A ________ filters traffic between network segments by examining the destination MAC address.
8. Routers operate at the _______________ layer of the OSI model.
9. _______________ are commonly used to connect networks to the Internet
I 0. What is Encapsulation in computer networking?
11. What is Decapsulation in computer networking?
12. The _____________ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layers.
13. The __ ___________layer in the TCP/IP model handles software, or logical, addressing.
14. Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These tables are called________________________
15. A(n) ________________ supplies the MAC address of the destination host in a unicast packet.
16. What type of cable is used to connect a workstation serial port to a Cisco router console port? ___________________
17. A(n) _______________ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings)
18. A router references its ___________to determine which of its interfaces is connected to the destination network.
20. Ethernet uses __________________ to prevent data packets from colliding on the network.
21. Network administrators typically access the router directly through the console port (also known as the___________) located on the back of the router.
22 In __________________communications, devices can send and receive signals simultaneously.
23. User mode does not allow you to configure the router. To do this, you must go into the ________ EXEC mode.
24. If you want to remove the enable secret password, you can type __________at the global configuration mode
26. Use the ___________command in enable mode to configure the time.
a. clock set b. time set c. clock on d. time on
27. The startup configuration file for the router is stored in __ ______by default.
28. The TCP/IP __________ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control.
29. The command __ ____displays the current startup configuration file on the router, which is stored in NVRAM.
30. Encapsulated data defined by the Transport layer is ______________________
31. Encapsulated data defined by the Network layer is _______________________
32. Encapsulated data defined by the Data link layer is _______________________
33. Privileged EXEC mode is called___________________ mode because you must enter the enable command to access it.
34. What are the TCP/IP layers?
35. What is the purpose of the OSI physical layer?
Matching
Match each item with a statement below:
A. Attenuation B. Segment C. Broadcast frame D. Broadcast storm
E. Internetworks F. Broadcast domain
_____36. A group of network devices that will receive LAN broadcast traffic from each other
_____37. Networks connected by multiple routers
Match each item with a statement below:
a. NFS b. SNMP
c. DNS service d. Three-way handshake
e. RST f. Buffer
g. RARP h. Routed protocol
i. Ping utility
_____38. Provides TCP/IP host name to IP address resolution
_____39. indicates that a TCP connection is to be terminated without further interaction
_____40. used by TCP to establish a reliable connection between two points
_____41. contains enough information in its header to be routed through an internetwork
Match each item with a statement below:
a. Cisco IOS b. EXEC
c. CiscoWorks d. Global configuration mode
e. Interface configuration mode f. login command
g. Ctrl+A h. Banner
i. Interface description
___42. allows you to configure the Ethernet and serial interfaces on your router
___43. the software that interprets the Cisco IOS commands
___44. provides a command-line interface (CLI), which allows network operators to check the status of the router and network administrators to manage and configure the router
Short Answer
45. What are the seven layers of OSI Model?
46. What are the TCP/IP layers?
48 What are some of the tasks that can be performed at the privileged EXEC mode?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started