Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

5 How can you set both the enable password and the enable secret password? 6. The maximum length for UTP cable is _________________ 7. A

5 How can you set both the enable password and the enable secret password?

6. The maximum length for UTP cable is _________________

7. A ________ filters traffic between network segments by examining the destination MAC address.

8. Routers operate at the _______________ layer of the OSI model.

9. _______________ are commonly used to connect networks to the Internet

I 0. What is Encapsulation in computer networking?

11. What is Decapsulation in computer networking?

12. The _____________ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layers.

13. The __ ___________layer in the TCP/IP model handles software, or logical, addressing.

14. Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These tables are called________________________

15. A(n) ________________ supplies the MAC address of the destination host in a unicast packet.

16. What type of cable is used to connect a workstation serial port to a Cisco router console port? ___________________

17. A(n) _______________ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings)

18. A router references its ___________to determine which of its interfaces is connected to the destination network.

20. Ethernet uses __________________ to prevent data packets from colliding on the network.

21. Network administrators typically access the router directly through the console port (also known as the___________) located on the back of the router.

22 In __________________communications, devices can send and receive signals simultaneously.

23. User mode does not allow you to configure the router. To do this, you must go into the ________ EXEC mode.

24. If you want to remove the enable secret password, you can type __________at the global configuration mode

26. Use the ___________command in enable mode to configure the time.

a. clock set b. time set c. clock on d. time on

27. The startup configuration file for the router is stored in __ ______by default.

28. The TCP/IP __________ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control.

29. The command __ ____displays the current startup configuration file on the router, which is stored in NVRAM.

30. Encapsulated data defined by the Transport layer is ______________________

31. Encapsulated data defined by the Network layer is _______________________

32. Encapsulated data defined by the Data link layer is _______________________

33. Privileged EXEC mode is called___________________ mode because you must enter the enable command to access it.

34. What are the TCP/IP layers?

35. What is the purpose of the OSI physical layer?

Matching

Match each item with a statement below:

A. Attenuation B. Segment C. Broadcast frame D. Broadcast storm

E. Internetworks F. Broadcast domain

_____36. A group of network devices that will receive LAN broadcast traffic from each other

_____37. Networks connected by multiple routers

Match each item with a statement below:

a. NFS b. SNMP

c. DNS service d. Three-way handshake

e. RST f. Buffer

g. RARP h. Routed protocol

i. Ping utility

_____38. Provides TCP/IP host name to IP address resolution

_____39. indicates that a TCP connection is to be terminated without further interaction

_____40. used by TCP to establish a reliable connection between two points

_____41. contains enough information in its header to be routed through an internetwork

Match each item with a statement below:

a. Cisco IOS b. EXEC

c. CiscoWorks d. Global configuration mode

e. Interface configuration mode f. login command

g. Ctrl+A h. Banner

i. Interface description

___42. allows you to configure the Ethernet and serial interfaces on your router

___43. the software that interprets the Cisco IOS commands

___44. provides a command-line interface (CLI), which allows network operators to check the status of the router and network administrators to manage and configure the router

Short Answer

45. What are the seven layers of OSI Model?

46. What are the TCP/IP layers?

48 What are some of the tasks that can be performed at the privileged EXEC mode?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Analytics Systems Engineering Cybersecurity Project Management

Authors: Christopher Greco

1st Edition

168392648X, 978-1683926481

More Books

Students also viewed these Databases questions