chapter 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which statement describes the treatment of ARP requests on the local link?

They are received and processed by every device on the local network.

What is the aim of an ARP spoofing attack?

to associate IP addresses to the wrong MAC address

On a Cisco switch, ________ memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports.

port-based

ARP____ is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses.

spoofing

Which switching method uses the CRC value in a frame?

store-and-forward*

When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.

true

What happens to runt frames received by a Cisco Ethernet switch?

The frame is dropped.

What addressing information is recorded by a switch to build its MAC address table?

the source Layer 2 address of incoming frames*

What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?

64 bytes

What are the two sizes (minimum and maximum) of an Ethernet frame?

64 bytes 1518 bytes

Which destination address is used in an ARP request frame?

FFFF.FFFF.FFFF*

What is a characteristic of port-based memory buffering?

Frames are buffered in queues linked to specific ports.

What statement describes Ethernet?

It defines the most common LAN type in the world.

The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address*

Which two statements describe features or functions of the logical link control sub-layer in Ethernet standards?

Logical link control is implemented in software. The data link layer uses LLC to communicate with the upper layers of the protocol suite.

What are two potential network problems that can result from ARP operation?

On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?

PC2 will send an ARP reply with its MAC address.*

A collision fragment, also known as a ______ frame, is a frame of fewer than 64 bytes in length.

RUNT

Which statement is true about MAC addresses?

The first three bytes are used by the vendor assigned OUI.*

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

The switch will forward the frame to all ports except port 4.

What statement describes a characteristic of MAC addresses?

They must be globally unique.

What is auto-MDIX?

a feature that detects Ethernet cable type*


Conjuntos de estudio relacionados

Chapter 12 Quiz Answers - Stereotypes, Prejudice, & Discrimination

View Set

1. Behavior is largely a product of its immediate environment.

View Set

Ch.16- Costs for Decision Making

View Set

NCLEX PASSPOINT HEALTH PROMOTION & MAINTENANCE

View Set

The Bank of Happiness in Tallinn

View Set

Introducing Lifespan Development

View Set