CCNA Guide to Cisco Networking

Two computers connected by a wire form a network.

TRUE

In 1954, the International Organization for Standardization (ISO) presented the Open Systems Interconnection (OSI) model.

FALSE

Computers must use a common protocol to communicate properly.

TRUE

Peer communication allows error checking to occur on two separate layers simultaneously.

TRUE

Many LANs and WANs contain several segments. Dividing a network into segments reduces performance.

FALSE

The number of nodes on a network and the length of cable used influence the quality of communication on the network.

TRUE

Repeaters and hubs reformat data structures, so they can connect networks that require different types of frames.

FALSE

The IEEE standard for WLANs use unlicensed, but not unregulated, radio frequencies.

TRUE

Bridges operate at the Network layer of the OSI model.

FALSE

Like bridges, switches operate at the Network layer of the OSI model.

FALSE

The term _____ refers to the wire cabling, such as coaxial or the more commonly used twisted-pair, that form the connections in most networks.

Media

_____ networks have computers that are servers and computers that act as clients to those servers.

Client/server

A _____ is contained within a company or department and located in a single geographic area, usually a building or part of a building

LAN

A _____ spans multiple geographic areas and is usually connected by common telecommunication carriers.

WAN

The term _____ refers to the intermediate stage between a LAN and a WAN.

MAN

The term _____ refers to a series of storage devices, such as tapes, hard drives, and CDs, that are networked together to provide very fast data storage for a network or sub-network.

SAN

The part of the company's network that allows access to non employees is called the _____, which is accessed over or through the Internet.

Extranet

The part of the company's network that allows access to employees is called the _____, which is completely separate from the Internet.

Intranet

The seven layers of the OSI reference model communicate with one another via _____ communication.

Peer

The OSI model _____ layer defines the mechanical, electrical, and procedural events that occur during the physical transmission of electronic signals on the wire.

Physical

The _____ is information that is used to determine whether data was corrupted during transmission.

CRC

The _____ sub-layer of the Data Link layer defines how data is packaged for the network.

LLC

The _____ sub-layer of the Data Link layer defines the media access method and provides a unique identifier for the network card.

MAC

A(n) _____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production.

MAC

Because the MAC address is added during the manufacturing process, it is a permanent marking. For this reason, the address is also known as a _____.

BIA

The protocols at the Network layer allow computers to route packets to remote networks using a _____ address.

Logical

_____ protocols, such as TCP, require an acknowledgement (ACK) of the receipt of data packets.

Connection-oriented

_____ protocols such as User Datagram Protocol (UDP), do not require an ACK.

Connectionless

Data sent by a connectionless transport is called a _____.

Datagram

Each layer in a protocol stack may add a(n) _____ to the data as it is passed down the layers.

PDU

A(n) _____, which is also known as a header or a trailer, is specific information that is sent from one layer on the source computer to the same layer on the destination computer.

PDU

On analog networks, devices that boost the signal are called _____.

Amplifiers

Devices that "see" the traffic of other devices are said to be on the same _____ as those devices.

Collision domain

If a single access point is available in infrastructure mode, then the mode is said to be a(n) _____.

Basic Service Set (BSS)

Typically WLANs involve multiple access points connected to various switches in the network. This type of infrastructure mode is known as a(n) _____.

Extended Service Set (ESS)

A _____ filters traffic between network segments by examining the destination MAC address.

Bridge

_____ increase network performance by reducing the number of frames transmitted to the rest of the network.

Switches

Switches filter based on _____ addresses.

MAC

_____ provide filtering and network traffic control on LANs and WANs. These devices can connect multiple segments and multiple networks.

Routers

Routers operate at the _____ layer of the OSI model.

Network

When TCP/IP is used on an internetwork, the logical address is known as a(n) _____ address.

IP

_____ are commonly used to connect networks to the Internet.

Routers

A(n) _____ functions as both a bridge for nonroutable protocols and a router for routable protocols.

Brouter

A(n) _____ is usually a combination of hardware and software. Its purpose is to translate between different protocol suites.

Gateway

_____ have the most negative effect on network performance.

Gateways

_____ is a network access method (or media access method) originated by the University of Hawaii.

Ethernet

Ethernet uses _____ to prevent data packets from colliding on the network.

CSMA/CD

A _____ is the physical area in which a frame collision might occur.

Collision domain

_____ Ethernet uses the same network access method (CSMA/CD) as common 10BaseT Ethernet, but provides 10 times the data transmission rate.

Fast

Fast Ethernet is defined under the IEEE _____ standard.

802.3u

In _____ communications, devices can send and receive signals, but not at the same time.

Half-duplex

In _____ communications, devices can send and receive signals simultaneously.

Full-duplex

The TCP/IP model explains how the protocol suite works to provide communications.

TRUE

The Trivia File Transfer Protocol (TFTP) sends data using a reliable connection.

FALSE

Both TCP and UDP use port number for communication between hosts.

TRUE

The size of the TCP window determines the number of acknowledgements sent for a given data transfer.

TRUE

A small TCP window size produces few acknowledgements.

FALSE

The invention and evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite resulted from a coordinated effort by the U.S. _________.

DOD

The _________ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layer.

Application

The _________ layer in the TCP/IP model determines the connectionless or connection-oriented services

Transport

The _________ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.

Internetwork

The _________ layer of the TCP/IP model maps to both the Data Link and Physical layers of the OSI reference model.

Network Interface

______ is a connection-oriented protocol that allows you to connect your computer to other computers on the Internet and view Web page content.

HTTP

The TCP/IP _____ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control.

Transport

____ is a communication method for network devices that is designed to reduce the flow of packets from their source.

Congestion avoidance

The _____ layer in the TCP/IP model handles software, or logical, addressing.

Internetwork

The _____ protocol provides a connectionless delivery services

IP

Many network devices maintain tables of the MAC and IP addresses of other devices on the network . These tables are called ______.

ARP tables

A (n) _____ supplies the MAC address of the destination host in a unicast packet.

ARP reply

_______ provides the same basic functionality as RARP

DHCP

Network administrators and support personnel commonly use the _______ utility to verify connectivity between two points.

Ping

The ______ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network layer) connectivity.

Trace

Trace shows the exact path a packet takes from the source to destination. This is accomplished through the use of the _____ counter.

TTL

A (n) _______ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (ping) to a target device in an attempt to crash or greatly reduce the performance of the target device.

ICMP flood

A router references its _____ to determine which of its interfaces is connected to the destination network.

routing table

______ protocols allow the routers to be updated automatically.

Routing

The Cisco _____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow.

Three-Layer Hierarchical

______ is the process of assigning unique IP addresses to devices on the network.

IP addressing