Chapter 9-12 quizzes
What is a VoIP signaling protocol used to set up, maintain, and tear down VoIP phone calls?
Session Initiation Protocol (SIP)
You are using a network firewall in your enterprise infrastructure. This firewall requires you to define which connections are permitted outbound. Once you do so, the appropriate and expected return data flows are dynamically allowed through the fire wall. Which characteristic does this scenario describe?
Stateful
What device can act as both a content cache and a URL filter and is configured in the client browser of an end-user system?
Proxy Server
What are the two major differences between Ethernet Bridge and an Ethernet Switch?
1. Switches usually have higher port densities than bridges 2. Switches use ASICs to make forwarding decisions, whereas bridges make their forwarding decisions in software.
name two things about VLANs
1. has a single broadcast domain for traffic to pass between two 2. VLANs, the traffic must be routed.
What is the distance limitation of a 1000BASE-T Ethernet network?
100 m
In a router that has 12 ports, how many broadcast domains?
12
how many collisions domains do the switch with 12 ports have?
12
What is the IEEE open-standard version of link aggregation?
802.3ad
Which Internet of Things (IoT) technology is specialized for monitoring sensor data and is owned by Garmin?
ANT+
Which IEEE 802.1X component checks the credentials of a device wanting to gain access to a network?
Authentication server
In the absence of a Spanning Tree Protocol (STP), what two issues might result from a Layer 2 loop in a network?
MAC address table corruption Broadcast storms
What kind of media is used by 100GBASE-SR10 Ethernet?
MMF
What name is given to a VLAN on a IEEE 802.1Q trunk whose frames are not tagged?
Native VLAN
A router operating at layer 3 primarily makes it forwarding decisions based on what address?
Destination IP address
If two devices simultaneously transmit data on a Ethernet network and a collision occurs, what does each station do in an attempt to resend the data and avoid another collision?
Each device sets a random back-off timer, and a device attempts retransmission after the timer expires.
Which network infrastructure device primarily makes forwarding decisions based on layer 2 MAC addresses?
Switch
Which configuration on a layer 2 switch is used to define broadcast domains where they would not exist naturally on their own?
VLAN
In a topology running STP. every network segment has a single ________ port, which is the port on that segment that is closest to the root bridge in terms
designated
What networking device often uses signatures to help protect a network from known malicious attacks?
intrusion prevention system (IPS)
