« Home « Kết quả tìm kiếm

CCNA Cisco Certified Network Associate_ Study Guide


Tóm tắt Xem thử

- SYBEX is not the agent or principal of the Owner(s), and SYBEX is in no way responsible for pro- viding any support for the Software, nor is it liable or responsible for any support provided, or not provided, by the Owner(s)..
- C reating the Acknowledgments is the most difficult part of the book- writing process.
- Cisco is the king of routing and switching, the Microsoft of the internet- working world.
- By deciding that you want to become Cisco certified, you are saying that you want to be the best—the best at routing and the best at switching.
- Cisco calls these “the old alphabet soup products.”.
- Building upon the base level of the CCDA technical knowledge.
- Determine the number of the exam you want to take.
- This question looks correct because most people refer to the port number (23) and think, “Yes, that’s the port used for Telnet.” The catch is that you can’t filter IP on port numbers (only TCP and UDP)..
- The answers appear at the end of the exam..
- All of the following tools should be loaded on your work- station when studying for the test..
- As a bonus, you get a second complete book—the Sybex Dictionary of Net- working, by Peter Dyson—on the CD included with this book.
- Which of the following is a valid SAP filter 1010 placed on Ethernet 0?.
- Which of the following is the valid host range for the IP address .
- Which of the following commands will show you the IPX address of an interface? (Choose all that apply.).
- By using all 1s in place of the network and mask.
- By defining a static route and using all 0s in place of the network and mask.
- By using 255 in place of the network and mask D.
- What is the broadcast address of the subnet address .
- What is the subnet address of the IP address .
- Which of the following is true? (Choose all that apply.) A.
- IP address of the neighbor router B.
- Speed of the link.
- Which of the following would you not implement at the distribution layer?.
- Which of the following will you find in a routing table? (Choose all that apply.).
- Which of the following is a valid IP extended access list?.
- Which of the following is true about the enable passwords? (Choose all that apply.).
- Which of the following is true regarding the isdn switch-type command?.
- The command hostname (one word) is used to set the name of the router.
- Default routes are created by using all 0s in place of the network and mask IDs.
- See Appendix B for an explanation of the 1900 switch commands..
- See Appendix B for an expla- nation of the 1900 switch commands..
- Describe the main benefit of the OSI reference model.
- Different types of devices are specified at different layers of the OSI model.
- The benefits of the OSI and Cisco models include, but are not limited to, the following:.
- That is the responsibility of the four bottom layers, which are shown in Figure 1.2..
- The International Organization for Standardization (ISO) is the Emily Post of the network protocol world.
- Figure 1.3 shows the functions defined at each layer of the OSI model.
- The Application layer of the OSI model is where users communicate to the computer.
- This means that the signal has to run from end to end of the network.
- I will discuss all four of the available Ethernet frames in the upcoming sections..
- Figure 1.12 shows how the LLC header information is added to the data portion of the frame..
- in the data field of the header, so we know what the upper-layer protocol is.) Here is the frame:.
- Each PDU is attached to the data by encapsulating it at each layer of the OSI model.
- The header control information is attached to the header of the data field.
- The definition of the layers is logical, not physical..
- Now, let’s take a closer look at each of the layers..
- The core layer is literally the core of the network.
- The only purpose of the network’s core layer is to switch traffic as fast as possible.
- The following are some of the functions to be included at the access layer:.
- Figure 1.18 shows the pinouts of the straight- through cable..
- In the implementation of a crossover, the wires on each end of the cable are crossed.
- “out of the network.” Telnet is considered in-band..
- Figure 1.21 shows some of the router products Cisco sells..
- Fill in the blanks with the appropriate layer of the OSI or hub, switch, or router device..
- PDUs at the Network layer of the OSI are called what?.
- Segmentation of a data stream happens at which layer of the OSI model?.
- For which of the following would you not need to provide a crossover cable?.
- At which layer of the OSI are 1s and 0s converted to a digital signal?.
- Bridges are defined at what layer of the OSI model?.
- Which layer of the OSI provides translation of data?.
- Routers can provide which of the following functions? (Choose all that apply.).
- Physical address filtering of the local network.
- Routers are typically used at which layer of the Cisco three-layer model?.
- Which of the following is not an advantage of a layer model?.
- Protocol Data Units are used to define data at each layer of the OSI model.
- Routers are defined at the distribution layer of the OSI model..
- Routers are defined at the Network layer of the OSI..
- The only layer of the OSI that can actually change data is the Pre- sentation layer..
- Some of the most serious problems are discussed in the following list..
- To determine the root bridge, the priorities of the bridge and the MAC address are combined.
- Layer-2 switching provides which of the following?.
- Cost of the links attached to the switch C.
- T he DoD model is a condensed version of the OSI model.
- Figure 3.1 shows a comparison of the DoD model and the OSI reference model.
- (We’ll be looking closely at those protocols in the next part of this chapter.) The Process/Application layer defines protocols for node-to-node application communication and also controls user-interface specifications..
- At the bottom of the model, the Network Access layer monitors the data exchange between the host and the network.
- The equivalent of the Data Link.
- The Trivial File Transfer Protocol (TFTP) is the stripped-down, stock ver- sion of FTP, but it’s the protocol of choice if you know exactly what you want and where to find it.
- Few sites support it because of the inherent security risks..
- The Host-to-Host layer’s main purpose is to shield the upper-layer applica- tions from the complexities of the network.
- Source port Is the port number of the host sending the data.
- Destination port Is the port number of the application requested on the destination host..
- Source port Port number of the host sending the data.
- Destination port Port number of the application requested on the desti- nation host.
- The complex and important task of routing is the job of the Internet.
- Each datagram is assigned the IP address of the sender and of the recipient.
- Total length Length of the packet including header and data..
- An IP address is a software address, not a hardware address—the latter is hard- coded on a network interface card (NIC) and used for finding hosts on a local network.
- To start, here are a few of the most important:.
- 1 0 Summary of the three classes of networks.
- Add the value of the bits that are turned on:.
- Some of the benefits of subnetting include the following:.
- For the subnet address scheme to work, every machine on the network must know which part of the host address will be used as the subnet address.
- The following table shows you the subnet, valid host, and broadcast address of the first three and last three subnets in the Class C subnet..
- You can determine the subnet value by looking at the decimal value of the fourth octet.
- So, if you have an IP address of using the subnet mask, you know it is in the range of the 0 subnet and the 128-bit must be off.
- First, determine the subnet and broadcast address of the above IP address..
- The address falls between the two subnets and must be part of the subnet.
- (Remember that the broadcast address of a subnet is always the number right before the next subnet.) The valid host range is .
- Table 3.9 shows some examples of the host ranges.

Xem thử không khả dụng, vui lòng xem tại trang nguồn
hoặc xem Tóm tắt