Network System Basics chapter 7-14

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Computers operate at this layer.

Application Layer

Switches operate at this layer.

Data Link Layer

monopolizes network services or network bandwidth

Denial of Service

routing protocol category in which the routing protocol is used to exchange routing information between autonomous systems

EGP

used to discover breaches in security

IDS

routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system

IGP

This sublayer is responsible for error recovery.

Logical Link Control sublayer

This sublayer manages access to the physical medium.

Media Access Control sublayer

Routers operate at this layer.

Network Layer

This is the general framework for how networking systems should operate.

OSI reference model

Hubs operate at this layer.

Physical Layer

This layer handles data formatting and translation.

Presentation Layer

This layer handles communication setup and teardown.

Sesion layer

designed to stop switching loops

Spanning Tree Protocol

This layer uses port numbers as source and destination identifiers.

Transport layer

Which of the following is NOT a true statement regarding the function of a switch? a. It determines the path used based on the destination IP address. b. It sends broadcast frames out all connected ports except the port where the frame was received. c. Each port on a switch represents a separate collision domain. d. Switches have the ability to operate in full-duplex mode

a. It determines the path used based on the destination IP address.

Which Windows domain-based protocol provides mutual authentication between devices? a. Kerberos b. TACACS+ c. EAP d. RADIUS

a. Kerberos

What does the Transport layer use to determine the size of a segment? a. MTU b. LLC. c. PDU d. TCP

a. MTU

You are using tracert to determine the path a packet takes across your internetwork. Which OSI Model layer are you examining? a. Network b. Transport c. Session d. Data Link

a. Network

Which of the following is a common link-state routing protocol? a. OSPF b. RIPv2 c. EIGRP d. BGP

a. OSPF

How can you find out what your MAC address is? (Choose all that apply.) a. Right-click on the Local Area Connection and choose status. b. Open a command prompt and type the command arp -d. c. Open a command prompt and type the command getmac. d. Open a command prompt and type the command ipconfig /all.

a. Right-click on the Local Area Connection and choose status. c. Open a command prompt and type the command getmac. d. Open a command prompt and type the command ipconfig /all.

When a switch receives a broadcast frame, it floods the frame out all ports. a. True b. False

a. True

Which of the following is the fastest switching mode? a. cut-through b. fragment-free c. store-and-forward d. auto-negotiate

a. cut-through

At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this process called? a. encapsulation b. deencapsulation c. packetization d. checkpointing

a. encapsulation

Which facet of securing access to network data makes data unusable to anyone except authorized users? a. encryption b. authentication c. malware protection d. securit devices

a. encryption

What type of device should you install as a decoy to lure potential attackers? a. honeypot b. Trojan c. IPS d. HIDS

a. honeypot

On a router configured to use RIP, the number of routers a packet must travel through before it reaches its destination is called what? (Choose two.) a. metric b. hop count c. timestamp d. aging time

a. metric b. hop count

You have been asked to determine what services are accessible on your network so you can close those that are not necessary. What tool should you use? a. port scanner b. protocol finder c. ping scanner d. trace route

a. port scanner

Access control lists can be configured based on which of the following? (Choose all that apply.) a. protocol b. source MAC address c. TCP port d. destination MAC address e. Source IP address

a. protocol c. TCP port e. Source IP address

Which of the following would be found in a router's routing table? (Choose all that apply.) a. timestamp b. destination network c. next hop d. MAC address e. Metric

a. timestamp b. destination network c. next hop e. Metric

A bus is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit. a. true b. false

a. true

A distance-vector protocol sends updates to its neighbors that include the contents of its routing table. a. true b. false

a. true

A switch that is configured to use the Spanning Tree Protocol will place a port in blocking mode if sending traffic to it may cause a switching loop. a. true b. false

a. true

One of the problems that can occur in the Network layer is the incorrect configuration of a host's IP address. a. true b. false

a. true

One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC filtering. a. true b. false

a. true

Permissions define the level of access a user has to the file system, ranging from read access to full control. a. true b. false

a. true

Routers can be used to control network access by inspecting the source and destination address information of packets. a. true b. false

a. true

Someone who wants to send encrypted data must acquire a digital certificate from a certification authority. a. true b. false

a. true

The IEEE 802 networking standards provide detailed implementation specifications for a number of networking technologies a. true b. false

a. true

The PDU at the Data Link layer is called a frame. a. true b. false

a. true

The Transport layer is the same in both the OSI model and the TCP/IP model. a. true b. false

a. true

The application layer of the TCP/IP model combines the top three layers of the OSI model into one layer. a. true b. False

a. true

The maximum transmission unit for Ethernet is 1518 bytes. a. true b. false

a. true

The physical layer is the bottom layer, whose job it is to convert bits into signals and vice versa. a. true b. false

a. true

Which layer is responsible for the encoding of signals? a. 3. b. 1 c. 5 d. 7

b. 1

What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand? a. 7 b. 6 c. 5 d. 4

b. 6

What is the IEEE standard that governs all forms of Ethernet media and interfaces? a. 802.11 b. 802.3 c. 802.15 d. 802.2

b. 802.3

At what layer do NICs operate? a. Transport b. Data link c. Physical d. Network

b. Data link

Which of the following are protocols that you find at the Application layer of the OSI model? a. TCP b. FTP c. ARP d. ICMP e. DHCP i. SNMP

b. FTP e. DHCP i. SNMP

Which layer of the OSI model is responsible for protocol conversion, if necessary? a. Application b. Presentation c. Session d. Transport

b. Presentation

Which layer is responsible for establishing communication setup between the source and destination computers? a. Application b. Session c. Transport d. Presentation.

b. Session

If the minimum password length on a Windows system is set to zero, what does that mean? a. The user never has to change the password. b. The user can use a blank password. c. The user has to change the password every day. d. The user account is disabled.

b. The user can use a blank password.

What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router? a. metric b. administrative distance c. hop count d. ACL

b. administrative distance

What has occurred when all routers in a network have accurate information after a change in the network? a. delivery b. convergence c. congestion d. concurrence

b. convergence

What function does the Logical Link Control sublayer of the Data Link layer provide? a. coordinates communication between applications b. error recovery and flow control c. physical device addressing d. controls access to network media

b. error recovery and flow control

A rootkit is a self-replicating program that masks itself as a useful program but is actually a type of malware. a. true b. false

b. false

All network switches require substantial configuration before they can be put into operation in a network. a. true b. false

b. false

Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks. a. true b. false

b. false

More VLANs mean fewer logical networks, so the network is less complex. a. true b. false

b. false

The IEEE separated the OSI model Physical layer into the LLC sublayer and the MAC sublayer. a. true b. false

b. false

The Network layer communicates with the Data Link layer and the Session layer. a. true b. false

b. false

The process of stripping the header and trailer from a PDU is called encapsulation. a. true b. false

b. false

Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the frame? a. cut-through b. fragment-free c. store-and-forward d. auto-negotiate

b. fragment-free

What command issued from a command prompt will display the routing table in Windows? a. route table b. route print c. route delete d. route config

b. route print

Which of the following is NOT a function that would be found in a managed switch? a. the ability to stop switching loops using STP b. the ability to transfer its switching table with neighboring switches c. the creation of VLANS to logically separate resources d. to limit access to the network by enabling security on individual ports

b. the ability to transfer its switching table with neighboring switches

What type of hacker uses a scanning device to find unsecured wireless networks and breaks into those networks? a. white hat b. wardriver c. script kiddy d. phisher

b. wardriver

permits access to computer, bypasses normal authentication

backdoor

What category of routing protocol is used to route packets between autonomous systems? a. Distance-vector b. link-state c. EGP d. IGP

c. EGP

What is a PDU? a. It is an Application layer protocol that handles delivery of messages. b. It is a unit of measurement for the maximum amount of data that can be transferred. c. It is the name given to the unit of information used by each layer. d. It is a Network layer protocol that handles path determination

c. It is the name given to the unit of information used by each layer.

Your colleagues are discussing the operation of a device in which packets are routed between VLANs on the device rather than having to exit the device to be routed. What type of device are they most likely discussing? a. access point b. managed switch c. Layer 3 switch d. router

c. Layer 3 switch

You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result-no connection. Which type of device is most likely to be the problem? a. Physical layer device b. Data Link layer device c. Network Layer device d. Presentation layer device.

c. Network Layer device

At which layer would you find errors that were caused by EMI? a. Data link b. Transport c. Physical d. Network

c. Physical

Which of the following is the correct order of the layers of the OSI model from layer 1 to layer 7? a. Application, Presentation, Session, Transport, Network, Data Link, Physical b. Application, Session, Transport, Presentation, Network, Data Link, Physical c. Physical, Data Link, Network, Transport, Session, Presentation, Application d. Physical, Session, Network, Data Link, Transport, Presentation, Application

c. Physical, Data Link, Network, Transport, Session, Presentation, Application

One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called? a. media control b. packet forwarding c. access control d. signal bounce

c. access control

In general, what level of security should you use with your access points? a. the easiest to configure b. wireless encryption protocol c. the most secure your systems supports d. RADIUS

c. the most secure your systems supports

frame is sent to the destination port immediately after reading the destination and source MAC address

cut-through switching

What is the IEEE standard that sets the standards for wireless networking? a. 802.16 b. 802.3 c. 802.15 d. 802.11

d. 802.11

Which of the following combinations will you find in a switching table? a. application/destination port number b. IP address/exit interface c. destination network/next Hop d. MAC address/switch port number

d. MAC address/switch port number

You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is connected to Switch D. Furthermore, Switch A and B are connected and Switch C and D are connected. One of the connections is in blocking mode. What protocol must be running on the switches? a. RIP b. SNMP c. NTP d. STP

d. STP

In which type of routing protocol is a router's routing table copied to neighboring routers to share internetwork information? a. distance-state protocol b. link-state protocol c. hybrid protocol d. distance-vector protocol

d. distance-vector protocol

Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive? a. onboard coprocessor b. advanced configuration power management interface c. shared system memory d. preboot execution environment

d. preboot execution environment

Which form of authentication involves the exchange of a password-like key that must be entered on both devices? a. Kerberos authentication b. digital certificate c. GNU privacy guard d. preshared key

d. preshared key

When a router's interface is configured to connect with a switch trunk port to route packets between VLANs, what is this called? a. multi-homed router b. dynamic router c. link-state router d. router on a stick

d. router on a stick

What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device? a. source port number b. window Size c. destination port number d. sequence number

d. sequence number

What information would you find in the header of a Transport layer PDU? a. destination IP address b. cyclic redundancy check c. source MAC address d. window size

d. window size

documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority

digital certificates

sends entire routing table to all routers at a scheduled time

distance-vector protocol

inspects packets as they go into and out of the network

firewall

A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.

forwarding

damaged frames do not get forwarded

fragment-free switching

sends the status of all its interface links to all other routers in the internetwork

link-state protocal

malware that's activated when a particular event occurs

logic bomb

value that tells routers the best path to the destination network

metric

A common guideline about network security is that if there's ____________ access to the equipment, there's no security.

physical

a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity

preshared key

packets are denied on context as well as packet properties

stateful packet inspection

entire frame is read before forwarding it to the destination port

store-and-forward switching

configured to carry VLAN traffic

trunk port

spreads by replicating itself into programs or documents

virus

a self-contained, self-replicating program

worm


Kaugnay na mga set ng pag-aaral

Chapter 51: Assessment and Management of Patients With Diabetes (Exam 2)

View Set