CCNA 3: Chapter 2 - Basic Switching Concepts and Configuration

  1. What is the effect of entering the banner login #Authorized Personnel Only!# command?

    a) #Authorized Personnel Only!# appears after the user logs  in.
    b) Authorized Personnel Only! appears only when the user makes a Telnet connection.
    c) #Authorized Personell Only!# appears only when the user enters the global configuration mode.
    d) Authorized Personnel Only! appears before the username and password login prompts for any connection.
    d) Authorized Personnel Only! appears before the username and password login prompts for any connection.
  2. Nonvolatile memory that can be read, but not written to, by the microprocessor
    Read-Only Memory (ROM)
  3. A 3-byte hexadecimal number that IEEE Registration Authority assigns to any company that manufactures components under the ISO/IEC 8802 standard.
    Original Unique Identifier (OUI)
  4. Refers to the transmission of data just one direction at a time. At any given instant, the device can transmit or receive but not both simultaneously
    Half Duplex
  5. The capability of a port for simultaneous data transmission and reception
    Full Duplex
  6. When this feature is enabled, the switch detects the required cable type for copper Ethernet connections and configures the interface pin-outs accordingly, enabling the use of either a crossover cable or a straight-through cable for commections to a 10/100/1000 port on the switch, regardless of the type of device on the other end of the connection.
    Auto-MDIX
  7. The data trafficking technique used by switches in which traffic received on an interface is sent out to all the other interfaces of the switch.
    Flooding
  8. A group of hosts with a common set of requirements that communicate as if they were attached to the same sire, regardless of their physical location
    Virtual LAN (VLAN)
  9. The time lag between the departure of a signal from the source and the arival of the signal at the destination.
    Propagation Delay
  10. A technique in which frames are completely processed before being forwarded out the appropriate port. The processing includes calculating the CRC and checking the destination address. In addition, frames must be temporarily stored until network resources are available to forward the message.
    Store-and-forward Switching
  11. An Ethernet frame switching approach that streams data through a switch so that the leading edge of a packet exits the switch at the egress port before the packet finishes entering the ingress port.
    Cut-through Switching
  12. An environment that uses pictorial as well as textual representations of the input and output of applications and tha data structure in which info is stored.
    Graphical User Interface (GUI)
  13. Used to monitor and control network devices, and to manage configurations, statistics collection, performance, and security.
    Simple Network Management Protocol (SNMP)
  14. RAM that retains its contents when a device is powered off. Used to store configuration files.
    Nonvolative RAM (NVRAM)
  15. A simplified version of FTP that allows files to be transferred from one computer to another over a network in clear text without authentication.
    Trivial File Transfer Prolotoc (TFTP)
  16. The application of a specific algorithm to data so as to alter the appearance of the data, making it incomprehensible to those who are not authorzed to see the info.
    Encryption
  17. The act of a packet or frame being represented with a false source address to mask its true source. Designed to fail network security mechanisms such as filters and access lists.
    Spoofing
  18. A media-and-protocol-independent device-discovery protocol that runs on all Cisco-manufactured equipment, including routers, access servers, bridges, and switches. Using this, a device can advertise its existence to other devices and receive info about other devices on the same LAN or on the remote side of a WAN.
    Cisco Discovery Protocol (CDP)
  19. bidirectional data flow
    half-duplex communication
  20. A special set of rules used in Ethernet LANs operating in half-duplex mode
    CSMA/CD
  21. Unidirectional data flow
    full-duplex communication
  22. A frame is sent to a specific group of devices or clients
    multicast transmission
  23. the average amount of data that is actually transmitted as opposed to the rating of the port
    throughput
  24. the time a frame of a packet takes to travel from the source to the destination
    latency
  25. Layer 2 identifier for the frame's originating NIC
    Source MAC Address
  26. A type of checksum used to detect errors in a transmitted frame
    cyclical redundancy chech
  27. Time it takes to place a fron on the wire or read the frame off the wire.
    NIC delay
  28. Dedicated connection between two hosts
    microsegment
  29. Time it takes for a signal to travel through the media
    propagation delay
  30. the network area where frames originate and collide
    collision domain
  31. A fram is sent from one host to on specific destination
    unicast transmission
  32. A frame is send from one address to all other addresses
    broadcast transmission
  33. Integrated circuits that control the data paths through the switch
    switch fabric
  34. Layer 2 identifier for the intended recipient
    Destination MAC address
  35. Bounded by a router or a switch with VLANs
    broadcast domans
  36. Automatically detects the required cable type for copper Ethernet connections
    Auto-MDIX
  37. 7 Parts of an Ethernet frame and how many bits each
    • Preamble - 7
    • Start of Frame Delimiter - 1
    • Destination Address - 6
    • Source Address - 6
    • Length/Type- 2
    • 802.2 Header and Data - 46-1500
    • Frame check sequence - 4
Author
jal128
ID
170199
Card Set
CCNA 3: Chapter 2 - Basic Switching Concepts and Configuration
Description
CCNA3 CH2
Updated