Вы находитесь на странице: 1из 10

BASIC ASPECTS OF NETWORKING 1.

what forms of communication is a communication based on text in real time used between two or more appear in person than principally use text to communicate among them? R= Mensajera instantaneous. 2. what type of net it furnishes access limited to the client to the data of the corporation as in!entory list of abilities and re"uests? R= #xtranet. $. what balances the importance of the traffic and his characteristic in order to administering the data? R= #strategia %o&. '. what processes produce in the traffic of net so that the "uality of the strategies of ser!ices functions correctly? (mentions two) R= to ) the traffic it classifies in base to the "uality of the re"uirements of ser!ice *) assign priorities to each classification of the data of application. +. which are two components of the architecture of net? (mentions two) R= to ) the ser!ices programed and the protocols that mo!e the messages through the net *) ,he technologies that allow the communications of net. -. .hen it de!eloped to him /nternet why reason refused the technologies of commutation for circuit and found one0s bearings to the connection? (mentions three) R= to ) the first nets of commutation for circuits not established automatically alternati!e circuits in the case of a fault in the circuit. *) ,he technologies of commutation for circuits re"uired that is established an open circuit between the extreme points of the net still when the data not they transfered acti!ely between the locations. 1) ,he establishment of multiple simultaneous open circuits for tolerances of faults is expensi!e. 2. why three reason used a technology of communications of data without connection for commutation of pac3ages when you de!eloped to him internet? R= to ) can be adapted rapidly to the loss of installations of transmission of data. *) use effecti!ely the substructure of net to transfer data. 1) ,he datum pac3ages can tra!el simultaneously for !arying routes through the net. 4. which is the %o& function in a con!ergent net? R= establishes the priorities of deli!ery of the different types of communication in a net. 5. describe the characteristics of the architectures of net. R= to ) tolerance to faults6 be bounded the impact of hardware or the faults of software and furnishes mechanisms of reco!ery of faults. *) Escalabilidad6 allow the expansion of the substructure of net to allow new users and applications. 1) Quality of service6 furnish a le!el of deli!ery of constant and uninterrupted data to gi!e supports to the expectations of the users.

7) Seguridad6 /t protects the critical confidential and commercial information of robberies and alterations. 18. Mentions examples of the threats of security of net are already threaten against the substructure of the net or threaten against the content of the net. R= to ) threaten against the substructure of net 1) 9 guardian detaches a de!ice of main net. 2) 9 piratical inform:tico it connects to a de!ice of net and exchanges the configurations in the software of administration. $) ,he builders stop accidentally a cable of net while exca!ate. *) ,hreats against the content of the net 1) 9 ri!al accedes to confidential information through a wireless insecure net. 2) 9 discontent employee alters the information in the base of data of a client. $) 9 woman secretary sent confidential information in answer to an e;mail that falsely appears be of your chief. 11. what gelds <&/ is become a partner of the /= direccionamiento? R= 1apa $. 12. what type of direccionamiento it finds in the cloa3 2 of the model <&/? (mentions 2) R= to ) 7ireccionamiento physical. *) 7ireccionamiento M91. 1$. .hen a ser!ant answers a web solicitude what occurs following in the process of encapsulaci>n after that the data of the .eb page format and separate in ,1= segments? R= the ser!ant adds the /= direction of origin and destine to each header of segment to surrender the pac3ages to the destiny. 1'. what finish describes a specific group of rules that decides the format of the messages and the process of encapsulaci>n used to send data? R= =rotocolo. 1+. which of the following are the two protocols associated with the cloa3 ' of the model <&/? (mentions 2) R= ,< ) ,1=. *) ?7=. 1-. describe the terms. R= to ) segmentation6 7i!iding streamses of data in small pieces fited for the transmission. *) Encapsulacin6 ,he process of adding specific information of necessary cloa3s or labels to transmit data. 1) Multiplexacin6 /nterlacing streamses of multiple data in a canal of communication shared or intercede of net. 7) Protocolo6 /t rule formal that it describe the structure and the process of communication of net. #) PDU6 ,erm used for a pac3age of data fre"uently facing understand a cloa3 or protocol specific. 12. Mentions terms related with the exposed following.

R= to ) transports. 1) @umbers of port. 2) @umbers of se"uence. $) &egments. *) @et. 1) /= direction. 2) =ac3ages. $) 7ireccionamiento logical. 1) Ain3 of data. 1) .efts. 2) 7ireccionamiento physical. $) M91 direction. 14. describe the functions of the cloa3s of the model <&/. R= to ) gelds of application6 define the interfaces between the software of application. *) Cloak of presentation6 /t to standardiBe the formats of data between systems. 1) Cloak of session6 administer the dialogues and the sessions of user. 7) Cloak of transport6 7eli!ery the messages from beginning to end for the net. #) Cloak of net6 #nruta the pac3ages according to a direction of only net. C) Cloak of link of data6 /t defines procedures to accede to the halfbac3. D) P ysical cloa36 codify the signals of the physical media. ,his gelds understands the ma3ing into a cable the !oltages the bits and the speed of transmission of data. 15. what three cloa3s of the model <&/ integrates the cloa3 of application of the model ,1=E/=? R= to ) gelds of application. *) 1loa3 of presentation. 1) 1loa3 of session. 28. what protocol it uses to transfer .eb pages from the ser!ant to the client? R= F,,=. 21. what term it is applied to a transference of done data from client to ser!ant? R= loads. 22. what protocols use authentication and encriptaci>n to secure the data that it is transported between the client and the ser!ant? (mentions two) R= ,< ) F,,=&#& *) &&F 2$. is which the dominion of superior le!el of the ?RA6 !""###$cisco$com"#eb"learning"netacad"index$ tml ttp R=.com 2'. describe the types of register of dnses resources. R= ,< ) %&6 7irection of final de!ice. *) 'S6 &er!ant of authoritati!e name. 1) C'(ME6 @ame of master completely "ualified or ideal for an alias. 7) M)6 assign a name of dominion to a list of ser!ants of interchange of

post for that dominion. 2+. /t mentions functions related with the exposed terms following. 9) M,9 1) /t sent posts between ser!ants by means of &M,=. 2) Recei!es posts of the client. *) M79 1) /t carries out real deli!ery to the mailbox of the user. 2) resol!e problems of final deli!ery. 1) M<< 1) /t reco!ers posts by means of =<=. 2) /t uses it the client to accede and read the post. 2-. 9 manager of trade net to accede to ###$cisco$com. on write the /= direction of the web ser!ant in the explorer the .eb page it acti!es successful what protocol of application is the responsible thing of the fault? R= 7@&. 22. mention the number of agreed port to the protocol. R= ,< ) F,,=6 48 *) ,elnet6 2$ 1) C,=6 28 7) &M,=6 2+ 24. Mention agreed characteristics to the protocol. R= ,< ) ,1=. 1) Reliable. 2) turn to send which did not recei!e to him. $) /t reensamblas the messages in the host of destiny. ') Cound one0s bearings to the connection. *) ?7=. 1) Aittle reliable. 2) .ithout connection. $) 7on0t reensambla the incoming messages. ') .ithout control of flux. 25. /n the cloa3 of transport what type of control it uses to a!oid that a transmitting host o!erloads the bGferses of the recei!ing host? R= 1ontrol of flux. $8. ,he final systems use numbers of port to select the appropriate application. which is the smaller number of port that a host system can assign in a dynamic way? R= 182'. $1. which are the responsibilities of the recei!ing host during the transference of data? (mentions two) R= to ) accuses of receipt. *) Reensamblaje. $2. in what cloa3 of the model ,1=E/= operates upon ,1=? R= 1apa of transport. $$. what decides the "uantity of data that it can transmit an emitting station that executes ,1=E/= before recei!ing an ac3nowledgment of receipt?

R= the siBe of window. $'. which is the aim of the number of se"uence in the ,1= header? R= reensamblars the segments in the data. $+. which is the aim of the numbers of ,1=E?7= port? R= trac3s the different con!ersations that cross the net to the same time. $-. what protocol furnishes ser!ices of cloa3 of net without connection? R= /=. $2. what part of a direction of cloa3 of net uses the router during the determination of route? R= the direction of net. $4. what de!ice of cloa3 of net can separate a net in different dominions of broadcast? R= Router. $5. what problem of cloa3 of net a!oids to him or reduces for the use of direccionamiento from beginning to end coherent? R= reduces unnecessary broadcastses. '8. what commands can be use to see a table of routing of hostses? (mentions two) R= to ) netstat;r. *) =R/@, route. '1. what data on a router it figures in a table of enrutamiento (routing)? (mentions three) R= to ) following leap. *) Metrics. 1) 7irection of net of destiny. '2. what class of problems are occasioned for excessi!e traffic of broadcastses in a segment of net? (mentions three) R= to ) consummate of bandwidth of net. *) augment the expense in net. 1) /nterruption of the functions of other host. '$. which are the 3ey factors that they must 3eep in mind when grouping hostses in a common net? (mentions three) R= to ) aim. *) Deographical location. 1) =roperty. ''. which are the differences between the binary number and the decimals? (mentions two) R= to ) the binary numbers are based on powers of 2 and the decimals in powers of 18. *) ,he computers use binary numbers and the peoples generally decimal numbers. '+. what portion of the /= direction represents the prefix? R= the portion of net. '2. what type of direction it has all the bits of the shaped host in 8? R= 7irecci>n of net. '2. what type of direction it has all the bits of the shaped host in 1?

R= 7irecci>n of broadcast. '4. how much bits there is in an /=!- direction? R= 124. '5. which is the main reason for the /=!- de!elopment? R= #xpansi>n of the capacitances of direccionamiento. +8. obser!e the following directions of net with your respecti!e mas3 of sub;net and mentions a 3ey characteristic. R= ,< ) 122.14.12+.-E286 Cour borrowed bits of subredeses with class. *) 122.$1.1-.124E156 #ight subredeses of a net with class. 1) 152.1-4.1-.152E$86 ,wo usable hostses for subreds. 7) 152.1-4.42.212E2'6 9 net with class. #) 122.22.-'.54E2$6 +12 directions for subreds. +1. what excel of weft is created for a node of origin and used for a node of destiny to secure that a signal of data transmitted has not been altered for interference distortion or loss of signal? R= 1ampo of se"uence of !erification of weft. +2. what outline of direccionamiento of cloa3 of lin3 of data it uses in a logical topologa 3nitted to point? R= is not necessary the direccionamiento of cloa3 of lin3 of data for this topologa. +$. why use the hostses of net the directions of cloa3 of lin3 of data? R= to surrendering "uarters. +'. what three di!ide basic are common to all the types of weft allowed for the cloa3 of lin3 of data? (mentions three) R= to ) header. *) 7ata. 1) ,r:iler. ++. /t mentions two characteristics of the method of access to the halfbac3 controled R= to ) it is 3nown li3e a method of determinist access. *) .hen it is in use this type of method there is not collisions. +-. which of the following options are subcapases of the cloa3 of lin3 of data? R= M91 AA1. +2. Mentions two detail character actors of the encapsulaci>n of the cloa3 of lin3 of data. R= to ) add a header and a tr:iler. *) ,he pac3ages place in wefts. +4. what it is successful by means of the process of encapsulaci>n in the cloa3 of lin3 of data? R= that the pac3ages they gets placed in wefts. +5. Mention characteristics or terms related to the type of access to the halfbac3. R= to ) controled access. 1) 7eterminist. 2) <nly it can transmit a station at the same time. $) .ithout collisions. ') &tep of to3ens.

*) 9ccess based on the containment. 1) @ot determinist. 2) #thernet. $) ,he stations can transmit in any moment. ') /t use more efficient of the bandwidth. -8. Mention characteristics or terms related to the topologa. R= to ) dot to point. 1) /t connects two nodes directly. 2) Hirtual circuit logician. *) Multiple access. 1) 1&M9E17. 2) &hared media. 1) Ring( it forms into rings ). 1) &tep of to3ens. 2) 7eterminist. -1. /n a connection of +-4* type ?,= cable what numbers of cables it occupies the following colors? R= to ) c est*nut colored6 2 and 4. *) (naran+ado6 1 and 2. 1) ,erde6 $ and -. 7) (-ul6 ' and +. -2. which is the aim of the codification? R= represents the bits of data with different !oltages owners of light or electromagnetic wa!es according to are located in the physical halfbac3. -$. describe the aim of the physical cloa3. R= defines the functional specifications for the lin3 between final systems and the electric signals optical and of radius. -'. through what prosecute the ?,= cable helps to a!oid the crosstal3? R= ,renBado of placentas. -+. which are the ad!antages of using cable of optical fiber instead of cable of copper? (mentions three) R= to ) immunity to the electromagnetic interference. *) Maximum longitude of the more long cable. 1) =otential of superior bandwidth. --. what type of cable it must use to him to connect directly a computer to other? R= /nterconexi>n crossed. -2. which is the aim of the coating in the cables of optical fiber? R= a!oids the loss of light. -4. describe the function of the fields of weft of #thernet. R= to ) eader and data6 1ontains the encapsulated data of a superior cloa3. *) Direction of destiny6 identify the corresponding recei!er. 1) .ongitud"%ipo6 indicate the protocol of encapsulated. 7) Preamble and delimitador of start*up of #eft 6 /t uses for the synchroniBation between the emitting and recei!ing de!ices. #) Se/uence of c ecksum of #eft6 /t uses to detect errors in a weft. C) Direction of origin6 identify the @/1 of origin of the weft or the interface.

-5. which is a main function of 1&M9E17 in an #thernet net? R= furnishes a method to decide when and how the hostses accede to the #thernet halfbac3. 28. for the adaptation of what technology is designed specifically the standard /### 482.$ac? R= Redes of local !irtual area. 21. which is the aim of the control of access to the halfbac3? R= decide to which of the stations of wor3 that finds to him in a A9R of media shared allows you to transmit to him data. 22. how to detect the collisions in an #thernet net? R= due to that the amplitude of the signal in the media of networ3ing ma3es to him more high than it normal. 2$. what subcapa of the cloa3 2 furnish ser!ices to the cloa3 of net of the model <&/? R= AA1. 2'. /t mentions three fields contained in an #thernet 482.$ weft. R= to ) physical direction of origin. *) =hysical direction of destiny. 1) &e"uence of !erification of weft. 2+. what type of direction it uses a switch to ta3e decisions of selecti!e return? R= M91 of destiny. 2-. 1lassifies someone of the subredeses of the net 288.188.+8.8E24 as usable or not usable for directions of host. R= to ) can be use for direction of host. 1) 288.188.+8.2+. 2) 288.188.+8.128. $) 288.188.+8.58. ') 288.188.+8.188. *) 1annot be use for direction of host. 1) 288.188.+8.25. 2) 288.188.+8.48. $) 288.188.+8.284. ') 288.188.+88.1'$. 22. when a cable is used of direct connection in a net? R= when a host is connected to a switch (that is to say when it is connected two dispositi!e different ). 24. 9 router that executes in a wans serial lin3 is typical a dispositi!e 7,#. in what circumstanciates a router is must shape li3e a dispositi!e 71#? R= when a situation is carried out of consecuti!e router in a test en!ironment. 25. /t mentions three examples of pri!ate /= directions. R= ,< ) 18.1.1.1. *) 122.1-.'.'. 1) 152.1-4.+.+. 48. 9ccording to the number of mas3 it writes a number of format of diagonal bar with which is feasible create a subreds with the last octet. R= ,< ) 0126 E2+

*) 1316 E$8 1) 1146 E22 7) 56 E2' #) 1426 E25 C) 0616 E2D) 1456 E24 41. what longitudes of ?,= cable it specifies the 9@&/E,/9E#/9;+-4;* norms? (mentions three) R= to ) total longitude from beginning to end of until 188 meters. *) ForiBontal ma3ing into a cable maximum of 58 meters. 1) ?ntil + meters to interconectar the panels of connection. 42. what main factor it must consider before using wireless technology? R= identify and if you are possible to minimiBe the sources of RC/. 4$. #nlista and describes the necessary commands or lines to 3eep a copy of the file of configuration to a ,C,= ser!ant. R= to ) Enable6 enter to the pri!ileged mode. *) Copy tftp run6 1opy the configuration to a ,C,= ser!ant. 1) 061$072$18$36 enter the location of the ser!ant. 7) 9outer*config6 enter the name of the file of destiny. 4'. what se"uence of commands it will permit the access to fi!e terminal !irtual lines with a password of culm? R= Router Iline (config) 8 ' !t Router( config;flax field ) Ilogin Router( config;flax field ) Ipassword soil 4+. what command acti!ates an interface of router? R= Router( config;if ) Ino shutdown 4-. which is the aim of the secret enable ioses command? R= permit to an user it introduce a password that is gone to code. 42. what command sample the statisticses for all the interfaces shaped in the router? R= &how interfaces. 44. what command permits spread out a list of the a!ailable commands to see the state of the router? R= RouterIshow? 45. 9 manager shapes a new router and calls it &9@J<&#. ,he manager must fix a password that it is as3ed for to establish a session of console in the router. what commands must broadcast the manager to fix the password of console according to culm? R= &9@J<&# Iline (config) with 8 &9@J<&#( config;flax field ) Ilogin &9@J<&#( config;flax field ) Ipassword 1/&1< 58. 9 manager of net must shape a serial interface with an /=. direction the configuration also must identify the remote place to the one that the interface is connected. what joined of commands it fulfills these re"uirements? R= 1hicago Iinterface serial8E8 (config) 1hicago( config;if ) Iip;addresses 152.1-4.28'.5 2++.2++.2++.2+2

1hicago( config;if ) Idescription saint Jose ,1 51. what is important when the ping command returns a result of K.K? R= the limit is con"uered of time while waiting the answer of echo. 52. what utility shows the route that follows a pac3age to reach to your destiny? R= ,raceroute.

Вам также может понравиться