1.
When many operating systems are required to manage a network, we call this what type of Operating System?
Correct Answer
B. Silo'd
Explanation
When many operating systems are required to manage a network, we call this a "Silo'd" operating system. In a silo'd operating system, each operating system functions independently and is responsible for managing a specific part of the network. This can result in a lack of interoperability and coordination between different operating systems, making it difficult to manage the network as a whole.
2.
How is the term used to describe traditional networking, known as "Legacy," referred to in contemporary contexts and current technology?
Correct Answer
C. Virtual
Explanation
The networking of the past, which is referred to as "Legacy," is now commonly known as "Virtual" in today's context. This term signifies the shift towards virtualized networking technologies and the use of virtual machines, software-defined networks, and network virtualization to create flexible and scalable network infrastructures.
3.
The Arista software known as EOS stands for what?
Correct Answer
D. Extensible Operating System
Explanation
The correct answer is "Extensible Operating System." Arista's software, known as EOS, is an operating system that can be easily extended and customized to meet the specific needs of different networks and environments. It provides flexibility and scalability, allowing users to add new features and functionality as required.
4.
The Arista’s Quality comes from three places: Architecture and Testing are two. What is the third?
Correct Answer
B. Culture
Explanation
Culture is the third source of Arista's quality. While architecture and testing play a significant role in ensuring quality, culture also plays a crucial part. A positive and collaborative culture within the organization promotes teamwork, innovation, and a commitment to delivering high-quality products. It influences the mindset and behaviors of employees, encouraging them to prioritize quality in their work. By fostering a culture that values quality, Arista can consistently deliver products that meet or exceed customer expectations.
5.
The Arista software known as EOS is also named?
Correct Answer
C. Cloud Vision
Explanation
The Arista software known as EOS is also named Cloud Vision because it provides a comprehensive and integrated approach to cloud networking. This software enables organizations to build and manage cloud networks efficiently and securely. It offers advanced features and capabilities for network automation, virtualization, and scalability, making it an ideal solution for cloud computing environments. By integrating cloud vision into their software, Arista ensures that their customers have a clear and holistic view of their cloud networks, allowing them to optimize performance and streamline operations.
6.
Arista EOS Architecture have many benefits.
Which below is not a benefit of the Arista EOS?
Correct Answer
C. Install RPMs with little downtime
Explanation
The Arista EOS architecture offers several benefits, including fault isolation, 3rd party integration, and fault repair. However, the installation of RPMs with little downtime is not listed as a benefit of Arista EOS.
7.
The Arista EOS is placed on what operating system?
Correct Answer
C. Linux
Explanation
The correct answer is Linux because the Arista EOS (Extensible Operating System) is specifically designed to run on Linux-based operating systems. It is a network operating system that provides advanced network functionality and management capabilities for Arista switches. By running on Linux, Arista EOS benefits from the stability, security, and flexibility of the Linux platform, allowing for efficient and reliable network operations.
8.
Cloud Networking compared with the older Legacy Networking allows Arista to get product and services to market faster than competitors. True or False?
Correct Answer
A. True
Explanation
Cloud networking allows for faster product and service deployment compared to legacy networking. This is because cloud networking leverages virtualization and automation technologies, enabling quick provisioning and scalability of resources. Arista, by adopting cloud networking, can take advantage of these benefits to bring their products and services to market faster than their competitors. Therefore, the statement is true.
9.
The Open Systems Interconnect (OSI) was created in what years?
Correct Answer
C. The 80's
Explanation
The correct answer is the 80's. The OSI (Open Systems Interconnect) model was created in the 1980s. This model is a conceptual framework that standardizes the functions of a communication system into seven different layers. It was developed by the International Organization for Standardization (ISO) to facilitate interoperability between different computer systems and networks.
10.
In OSI, Layer 2 is known as what?
Correct Answer
B. Switching
Explanation
Layer 2 in the OSI model is known as Switching. This layer is responsible for the efficient and reliable transfer of data between devices on a local area network (LAN). Switches operate at the data link layer and use MAC addresses to forward data packets to the correct destination. They make forwarding decisions based on the MAC address in the frame's header, allowing for efficient communication within a LAN. Switching helps to improve network performance by reducing collisions and optimizing the flow of data.
11.
The OSI Model has 7 layers. Which is layer 4?
Correct Answer
C. Transport
Explanation
The correct answer is Transport. The OSI Model consists of 7 layers, and layer 4 is known as the Transport layer. This layer is responsible for end-to-end communication between hosts and ensures reliable and error-free delivery of data. It establishes connections, manages flow control, and provides error recovery mechanisms.
12.
A sniffer trace on an HTTP request has how many transactions before completing the request?
Correct Answer
D. Usually between 10 and 100
Explanation
The correct answer is usually between 10 and 100. When an HTTP request is made, it often passes through multiple computers or servers before reaching its destination. Each of these intermediate points can be considered as a transaction in the sniffer trace. Therefore, it is common for there to be between 10 and 100 transactions recorded in the sniffer trace before the request is completed.
13.
Which below is most accurate about Data Packets below?
Correct Answer
B. Data is sent in many small packets wrapped by headers
Explanation
Data is sent in many small packets wrapped by headers. This is the most accurate statement about data packets. When data is transmitted over a network, it is divided into smaller packets. Each packet contains a portion of the data along with additional information in the form of headers. These headers contain important details such as the source and destination addresses, sequence numbers, and error-checking information. The packets are then sent individually across the network and reassembled at the receiving end to reconstruct the original data. This packet-based transmission allows for efficient and reliable data transfer.
14.
Network data is what?
Correct Answer
D. All zeros and ones
Explanation
Network data is represented in binary form, which consists of only zeros and ones. This binary representation is used to transmit and store information in computer networks. Each zero or one represents a bit, and combinations of these bits are used to represent different types of data such as text, images, and videos. Therefore, the correct answer is that network data is made up of all zeros and ones.
15.
In addition to IP addresses, what other address is important in identifying data?
Correct Answer
C. The MAC address
Explanation
The MAC address is important in identifying data, in addition to IP addresses. MAC address stands for Media Access Control address and it is a unique identifier assigned to network interfaces. It is used at the data link layer of a network to uniquely identify devices on a local network. Unlike IP addresses, which can change or be assigned dynamically, MAC addresses are typically assigned permanently to a device's network interface. Therefore, the MAC address is crucial in identifying data as it helps in determining the source and destination of network traffic within a local network.
16.
The speed of a response using http requests is based on what factor below?
Correct Answer
C. The speed and traffic between the beginning and end of the journey the data takes
Explanation
The speed of a response using HTTP requests is based on the speed and traffic between the beginning and end of the journey the data takes. This means that the time it takes for a response to be received depends on the network conditions, including the speed of the internet connection and any congestion or delays along the route the data travels. The speed of the computer or router, as well as the firewall blocking mechanism, may have an impact on the overall performance of the system, but they are not directly responsible for the speed of the response in this context.
17.
DARPA was involved in the development of the Ethernet.
True or False?
Correct Answer
A. True
Explanation
The statement is true. DARPA (Defense Advanced Research Projects Agency) was indeed involved in the development of Ethernet. In the 1970s, DARPA funded the research and development of the ARPANET, which was a precursor to the modern internet. Ethernet, a widely used networking technology, was developed as part of the ARPANET project. Therefore, DARPA can be credited as being instrumental in the early stages of Ethernet's development.
18.
Which of the following companies no longer have networking software that runs over ethernet?
Correct Answer
B. Novell
Explanation
Novell no longer has networking software that runs over ethernet. This means that Novell has either discontinued or phased out their networking software that was compatible with ethernet connections.
19.
The MAC address is a combination of vendor assigned information and hardware assigned information.
True or False?
Correct Answer
A. True
Explanation
The MAC address, also known as the Media Access Control address, is a unique identifier assigned to network interfaces for communication on a network. It consists of a combination of vendor assigned information, which identifies the manufacturer of the network interface, and hardware assigned information, which is unique to each network interface. Therefore, the statement that the MAC address is a combination of vendor assigned information and hardware assigned information is true.
20.
Regarding IP, the following traffic types exist except one below. Which one is incorrect?
Correct Answer
B. Anycast
Explanation
Anycast is not a type of traffic in the context of IP. Unicast refers to the transmission of data from one sender to one receiver, Multicast refers to the transmission of data from one sender to multiple receivers, and Broadcast refers to the transmission of data from one sender to all receivers in a network. However, Anycast refers to the routing of data to the nearest or best destination out of a group of potential destinations.
21.
In a network, servers, routers and switches are doing what below all the time?
Correct Answer
D. Listening
Explanation
Servers, routers, and switches in a network are constantly listening. Listening refers to the act of passively receiving and processing incoming data packets or signals. These network devices are designed to constantly monitor the network for any incoming data or signals that they need to process or forward. By listening, these devices can effectively perform their roles in the network by receiving and processing data, allowing for efficient communication and data transfer between devices connected to the network.
22.
In an IP header, which of the following is not part of this header?
Correct Answer
C. IMP
Explanation
The IMP (Internet Message Protocol) is not part of an IP (Internet Protocol) header. The IP header contains various fields such as the checksum, destination address, and IHL (Internet Header Length), which specifies the length of the IP header in 32-bit words. However, the IMP is not a standard field in the IP header and is not used in the routing or delivery of IP packets.
23.
Regarding IP addresses, which of the following correctly identifies the format?
Correct Answer
B. Binary
Explanation
Binary is the correct format for identifying IP addresses. IP addresses are made up of a series of numbers, and in binary format, these numbers are represented using only two digits, 0 and 1. Each section of the IP address is divided into 8 bits, resulting in a total of 32 bits for the entire address. This binary representation allows for efficient data transmission and routing on computer networks.
24.
Subnetting evolved when mainframes began to be replaced by pc’s. In a subnet, what devices do NOT pass broadcast traffic in a network?
Correct Answer
A. Routers
Explanation
Routers do not pass broadcast traffic in a network. Routers are used to connect different networks together and they operate at the network layer of the OSI model. When a broadcast message is sent within a network, routers do not forward it to other networks. Instead, they use routing tables to determine the best path for the message to reach its destination. This helps in reducing network congestion and improving network performance.
25.
What concept is critical to the job of a network engineer at all stages of growth?
Correct Answer
B. Binary System
Explanation
The concept of the binary system is critical to the job of a network engineer at all stages of growth. The binary system is the foundation of all digital communication and networking. It is used to represent and manipulate data in the form of 0s and 1s, which is essential for understanding and configuring network devices, addressing schemes, subnetting, and troubleshooting network connectivity. Network engineers need to have a strong understanding of the binary system to effectively design, implement, and maintain network infrastructure.
26.
This binary number, 11001000, has what value?
Correct Answer
C. 200
Explanation
The binary number 11001000 can be converted to its decimal equivalent by multiplying each digit by its corresponding power of 2 and adding them together. In this case, the calculation would be: 1 * 2^7 + 1 * 2^6 + 0 * 2^5 + 0 * 2^4 + 1 * 2^3 + 0 * 2^2 + 0 * 2^1 + 0 * 2^0 = 128 + 64 + 0 + 0 + 8 + 0 + 0 + 0 = 200. Therefore, the value of the binary number 11001000 is 200.
27.
Data Checksum is required with both TCP and UDP.
True or False?
Correct Answer
B. False
Explanation
Data Checksum is only required with TCP and not with UDP. TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable and ordered delivery of data packets. It uses a checksum to verify the integrity of the data being transmitted. On the other hand, UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee reliable delivery or order of data packets. It does not use a checksum for data integrity. Therefore, the statement "Data Checksum is required with both TCP and UDP" is false.
28.
The Service, POP3, commonly used in email service providers has a port number of what?
Correct Answer
C. 110
Explanation
POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server. It operates on port number 110. This port allows email clients to connect to the email server and retrieve incoming messages. Therefore, the correct answer is 110.
29.
Ethernet traffic doesn’t travel at the same speeds due to many interferences and heavy traffic periods.
Ethernet handles this inconsistent speed with something known as what?
Correct Answer
B. Buffering
Explanation
Ethernet traffic doesn't travel at the same speeds due to various interferences and heavy traffic periods. To handle this inconsistent speed, Ethernet uses a technique called buffering. Buffering allows the data to be temporarily stored in a buffer before being transmitted, ensuring a smooth and continuous flow of data. This helps to prevent data loss or delays caused by variations in network conditions.
30.
DHCP and BOOTP are methods of making requests on a network and pass traffic.
Routers do not pass what kind of traffic?
Correct Answer
C. Broadcast traffic
Explanation
Routers do not pass broadcast traffic. Broadcast traffic is a type of network traffic where a packet is sent to all devices on a network. Routers, on the other hand, are designed to forward packets between different networks or subnets. They do not forward broadcast packets because it would result in unnecessary network congestion and potential security risks. Instead, routers use routing tables to determine the best path for forwarding packets to their destination.
31.
Address Resolution Protocol (ARP) handles interaction between L2 and L3.
It is technically a L2 Protocol and does not use what?
Correct Answer
B. IP
Explanation
ARP is a Layer 2 protocol that is used to map an IP address to a MAC address on a local network. It does not use IP addresses because it is responsible for resolving IP addresses to MAC addresses. ARP uses Ethernet frames to send and receive ARP messages between devices on the network.
32.
It is not possible to send data or requests to a host that no longer exists on the network.
True or False?
Correct Answer
B. False
Explanation
It is possible to send data or requests to a host that no longer exists on the network. This can happen if the host was temporarily disconnected or turned off, but it may still exist on the network. Additionally, it is also possible to send data or requests to a host that has been permanently removed from the network, but the sender may not receive a response.
33.
If during an ARP, a match does not occur, what does a router do to the packet?
Correct Answer
D. Discards it
Explanation
If during an ARP (Address Resolution Protocol) process, a match does not occur, a router will discard the packet. This means that the router will not forward the packet to its intended destination and will instead drop it. This could happen if the router is unable to find the appropriate MAC address for the IP address in the ARP table. By discarding the packet, the router ensures that it does not send the packet to an incorrect or unknown destination.
34.
The movement from Mainframes to PC’s to Servers caused the world to migrate to what concept?
Correct Answer
B. Data Centers
Explanation
The movement from Mainframes to PC's to Servers caused the world to migrate to the concept of Data Centers. As technology advanced, the need for centralized storage and processing of data became crucial. Data Centers emerged as large-scale facilities that house computer systems and associated components, such as servers, networking equipment, and storage systems. They provide a secure and controlled environment for data management and processing, enabling organizations to efficiently store, manage, and distribute their data. The shift to Data Centers allowed for better scalability, reliability, and accessibility of data, leading to significant advancements in various industries.
35.
In the past 15-20 years, what product changed the networking landscape for companies which provided roaming computing power?
Correct Answer
B. Laptops
Explanation
Laptops changed the networking landscape for companies by providing roaming computing power. With the advent of laptops, employees were no longer tied to their desks and could work from anywhere, enabling greater flexibility and productivity. Laptops allowed for easy access to company networks and resources while on the go, revolutionizing the way businesses operated and communicated.
36.
Some would argue it is already here, but what is the “next stage” of networking?
Correct Answer
D. The Internet of Everything
Explanation
The Internet of Everything refers to the concept of connecting not only devices, but also people, data, and processes, creating a network where everything is interconnected. This next stage of networking goes beyond just mobile devices and smart devices, as it encompasses a broader range of connections and interactions. With the Internet of Everything, there will be a seamless integration of various technologies and systems, enabling greater automation, efficiency, and collaboration.
37.
In the mid 80’s, what was the networking device that brought devices together to access group resources, like servers and printers?
Correct Answer
C. Hub
Explanation
In the mid 80's, the networking device that brought devices together to access group resources, like servers and printers, was a hub. A hub is a simple networking device that connects multiple devices in a network, allowing them to communicate with each other. It operates at the physical layer of the network and broadcasts all incoming data to all connected devices. However, hubs have limitations in terms of bandwidth and security, which led to the development of more advanced networking devices like switches.
38.
In the late 80’s, what product eliminated network collisions altogether?
Correct Answer
B. Switch
Explanation
In the late 80's, the product that eliminated network collisions altogether was a switch. Unlike a hub, which broadcasts data to all connected devices, a switch intelligently directs data only to the intended recipient. This prevents collisions and allows for simultaneous communication between multiple devices on a network. A router, on the other hand, is responsible for connecting multiple networks and directing traffic between them. Bridging refers to the process of connecting two separate networks to create a larger network.
39.
In switches and routers, what is used to manage where traffic is sent?
Correct Answer
D. Tables
Explanation
In switches and routers, tables are used to manage where traffic is sent. These tables contain information about the network and its connected devices, such as MAC addresses and IP addresses. By referencing these tables, switches and routers can determine the appropriate destination for incoming traffic and forward it accordingly. This allows for efficient and effective routing of network traffic.
40.
Since switches basically broadcast all traffic to all other switches, what was the next invention that gave the network a boundary to control this excessive traffic?
Correct Answer
A. Layer 3
Explanation
Layer 3 is the correct answer because it introduced the concept of routing, which allowed networks to be divided into smaller, more manageable segments. By using Layer 3, networks could control the flow of traffic and reduce the amount of unnecessary broadcast traffic that switches were generating. This helped to improve network efficiency and performance.
41.
When Layer 3 was brought into the switch world, what process or term became the next generation of network control?
Correct Answer
D. Routing
Explanation
When Layer 3 was introduced in the switch world, the next generation of network control became routing. Routing is the process of selecting the best path for network traffic to travel from one network to another. It involves analyzing the destination address of packets and determining the most efficient route for them to reach their destination. Routing plays a crucial role in directing network traffic and ensuring efficient communication between different networks.
42.
In this script example, Arista-RTR2(config)#ip route 3.3.3.0/24 E4, the 3.3.3.0 represents what?
Correct Answer
A. Destination IP
Explanation
In the given script example, "3.3.3.0" represents the destination IP. This is because the "ip route" command is used to configure a static route in a network device, and the destination IP is specified in the command to indicate the network or host to which the route should be directed.
43.
The Routing table really has two different tables. One is the Routing Information Base (RIB) and the other is what type of Information Base?
Correct Answer
D. Forwarding
Explanation
The Routing table consists of two different tables: the Routing Information Base (RIB) and the Forwarding Information Base (FIB). The RIB contains all the routes learned by the router through various routing protocols, while the FIB is a subset of the RIB and is used for actual packet forwarding. It contains only the routes that are actively used for forwarding packets. Therefore, the correct answer is Forwarding.
44.
If a “match” is not found in a Routing Table, then what happens to packets; they are what?
Correct Answer
C. Dropped
Explanation
If a "match" is not found in a Routing Table, then the packets are dropped. This means that the packets are not forwarded to any destination and are discarded by the router.
45.
Cabling is not a simple decision due to cost vs latest cabling vs future upgrade costs.
True or False?
Correct Answer
A. True
Explanation
The statement suggests that deciding on cabling is not an easy task because it involves considering factors such as cost, the latest cabling options, and potential future upgrade costs. This implies that the decision-making process for cabling is complex and requires careful consideration. Therefore, the correct answer is true.
46.
PoE came along that changed the cabling needs going forward allowing devices to connect to the ethernet or phone.
What is it that was brought over the ethernet that changed all of this?
Correct Answer
A. Signaling
Explanation
The introduction of Power over Ethernet (PoE) brought the ability for devices to transmit both data and power over a single Ethernet cable. This eliminated the need for separate power cables and allowed devices to connect to the Ethernet or phone network using only one cable. Therefore, the correct answer is "Signaling" as it refers to the transmission of data and power over the Ethernet.
47.
Fiber Optics provides improvement over Cabling with speed, longer signal strength and what other major benefit?
Correct Answer
A. Crosstalk is eliminated
Explanation
Fiber optics provides improvement over cabling by eliminating crosstalk. Crosstalk is the interference caused by signals from adjacent cables interfering with each other. By using fiber optics, which transmit data using light signals instead of electrical signals, this interference is eliminated. This results in a clearer and more reliable signal transmission.
48.
What IEEE standard for wireless was put in place in 1997. What was this standard?
Correct Answer
C. 802.11
Explanation
In 1997, the IEEE standard for wireless communication was introduced and it was known as 802.11. This standard revolutionized wireless networking by providing specifications for wireless local area networks (WLANs). It defined the protocols and technologies used for wireless communication, including the popular Wi-Fi.
49.
In Arista’s EOS CLI mode, all commands are case sensitive.
True or False?
Correct Answer
B. False
Explanation
In Arista's EOS CLI mode, all commands are not case sensitive. This means that whether you enter a command in uppercase or lowercase, it will still be recognized and executed correctly.
50.
The Command Mode of Arista’s EOS CLI has different levels of control.
This level structure is known as what?
Correct Answer
C. Hierarchy
Explanation
The Command Mode of Arista's EOS CLI has different levels of control, which are organized in a hierarchical structure. This structure allows users to navigate through different levels of commands and configurations, providing a clear and organized way to manage the network environment. The levels of control in the Command Mode are designed to offer different levels of access and functionality, ensuring that users can perform the necessary tasks while maintaining control and security.