Chapter 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How may a route be added to the routing table? SNMP message Administrator enters the route information manually Destination network is directly connected Dynamically via a routing protocol ICMP router discovery

-Administrator enters the route information manually -Destination network is directly connected -Dynamically via a routing protocol

What does a router do after receiving a frame on one of its interfaces? Encapsulates the frame to create a new packet Deencapsulates the frame to create a packet Deencapsulates the packet to create a segment Encapsulates the packet to create a new frame Encapsulates the segment to create a new packet

-Deencapsulates the frame to create a packet -Encapsulates the packet to create a new frame

Which of the following would be found in a routing table on a router? Metric Destination network MAC address Timestamp Next hop

-Metric -Destination network -Timestamp -Next hop

Which of the following is a characteristic of routing protocols? (Choose all that apply.) a. They populate routing tables statically. b. Network changes are reflected in the routing table automatically. c. They're not a good solution with redundant routes. d. They add routing table entries dynamically. e. You can't combine static routing with routing protocols in your internetwork.

-Network changes are reflected in the routing table automatically -They add routing table entries dynamially

Identify the information that is contained in the simulation's sample routing tables. (Choose all that apply.) Next hop Timestamp Destination network Metric How the route is derived

-Next hop -Destination network -Metric

In a network that requires high availability administrators often configure switches in a redundant topology ensuring that if one path to a destination is broken, another path can be used. There are two problems that must solved in this scenario. What are they?

-Problem 1 = Prevent a switching loop when all the links are up -Problem 2 = The switches must have some way of knowing when one of the links is down

Which of the following is not a characteristic of routing protocols? They're not a good solution with redundant routes They add routing table entries dynamically You can't combine static routing with routing protocols in your internetwork Network changes are reflected in the routing table automatically They populate routing tables statically

-They're not a good solution with redundant routes -You can't combine static routing with routing protocols in your internetwork -They populate routing tables statically

You have two eight-port switches. On each switch, seven stations are connected to ports, and the two switches are connected with the eighth port. How many collisions domains are there? a. 16 b. 15 c. 14 d. 8 e. 1

15

A value of _____ indicates that the address in the Network Destination column is a specific IP address rather than a network address, it's referred to as a "host route."

255.255.255.255

A router's final task when handling a packet is to send the packet on to its next and possibly final destination, this is referred to as packet _____

forwarding

The process of moving a packet from the incoming interface to the outgoing interface is called packet ________________.

forwarding

You learned that the route print command may be used to display your routing table. What other command produces the same result?

netstat -r

What command issued from a command prompt will display the routing table in Windows? a. route all b. route table c. route d. route -? e. route print

route print

When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called? dynamic router router on a stick link-state router multi-homed router VLAN trunk

router on a stick

What feature should you configure to prevent users on one subnet from accessing the Web server on another subnet? a. IPSec b. AP isolation c. Access control lists d. MAC filtering e. All of these choices

Access control lists

Identify the protocol(s) that send broadcast frames. (Choose all that apply.) ARP DNS DHCP FTP HTTP

All of these chioces

Switches that support VLANs enable you to configure one or more switch ports into separate _______ domains.

Broadcast

A(n) _____________ is a switching loop that occurs with broadcast packets.

Broadcast storm

The network address of a network to which the router can forward packets.

Destination network

Access control lists (ACL) can be configured based on what? (Choose all that apply) a. destination network b. protocol c. source MAC address d. destination MAC address e. source IP address

Destination network, protocol, source IP address

If you don't want wireless clients to view the name of your wireless network, what feature should you use? a. WEP b. Disabling SSID broadcasts c. MAC filtering d. AP isolation e. All of these choices

Disabling SSID broadcasts

(T/F) Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.

False

(T/F) Communications through a router are noticeably faster than communications through a switch

False

(T/F) Cut-through switching reads enough to make sure the packets is not fragmented and then sends it out.

False

(T/F) Network switches always must be configured before they can be put into operation in a network.

False

(T/F) Physically breaking the loop by disconnecting a cable is a viable option in this situation.

False

(T/F) There can be only one MAC address per port in a switching table.

False

(T/F) One type of security for wireless networks involves entering a list of the physical addresses for the devices that are allowed to access the network and excluding all others. This is called IP filtering.

False - MAC filtering

(T/F) WPA is the strongest encryption protocol for wireless security.

False - WPA2

(T/F) When a switch is configured with VLANs, the switch needs to have a way to communicate between the VLANs. A uplink port is a port that is configured to carry all traffic.

False - trunk port

Explain how the routers detect that a link is down and what adjustments they make: _____ packets that are exchanged among the routers detect that the link is down and the routing ________ of each router automatically adjust to exclude the path containing the downed link./ RIP and tables When a packet must be sent to a router to get to its destination, it's called a(n) _____.

Hop

The total number of routers a packet must travel through is called the _____.

Hop count

On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? Hop count Link-state Traceroute Time-to-live Metric

Hop count and Metric

What metric is used by the Routing Information Protocol (RIP)?

Hop-count

Specifies how the route gets into the routing table.

How the route is derived

Which of the following accurately describes a distance-vector routing protocol? a. OSPF is an example. b. It learns from its neighbors. c. It sends the status of its interface links to other routers. d. It converges the fastest.

It learns from its neighbors

What does it mean if the first 24 bits of a MAC address are 01:00:5E? a. The NIC manufacturer is unknown. b. It's a multicast frame. c. It's a unicast frame. d. It's a broadcast frame. e. It's an Ethernet frame.

It's a multicast frame

A(n) _________ routing protocol shares information with other routers by sending the status of all their interface links to other routers in the internetwork.

Link-state

A(n) ___________ routing protocol only sends out information to its neighbors when there is a change in the status.

Link-state

Which of the following combinations will you find in a switching table? MAC address/switch port number destination network/next Hop application/destination port number IP address/exit interface MAC address/IP address

MAC address/switch port number

Which access point (AP) feature enables you to restrict which devices can connect to your AP based on their physical address?

MAC filtering

Which of the following is not a function that would be found in a managed switch? The ability to transfer it's switching table with neighboring switches The ability to stop switching loops using STP None of these choices To limit access to the network by enabling security on individual ports The creation of VLANS to logically separate resources

The ability to transfer it's switching table with neghboring switches

Tells the router how long it has been since the routing protocol updated the dynamic route.

Timestamp

In a distance vector routing protocol where do routers send their routing table information? To all connected segments To their neighbors None of these choices To the next hop To their default gateway

To their neighbors

In a distance vector routing protocol, where do routers send their routing table information? a. to their neighbors b. to all connected segments c. to the next hop d. none of these choices e. to their default gateway

To their neighbors

(T/F) A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.

True

(T/F) A route is added to the routing table in three main ways: The destination network is connected directly, an administrator enters the route information manually, or the route information is entered dynamically, via a routing protocol.

True

(T/F) It is best to change the SSID as a preventative measure to help strengthen your security.

True

(T/F) Of all switching methods, cut-through switching is the fastest, it reads the destination MAC address and sends the frame out

True

(T/F) The Spanning Tree Protocol is used to detect whether there is a possibility of a switching loop caused by redundant paths. If a loop is possible, it places one of the ports in blocking mode to prevent it.

True

(T/F) The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.

True

(T/F) When a switch receives a broadcast frame, it floods the frame out all ports.

True

(T/F) When switches are connected together, the switch ports are put into a blocking mode that only allows the transmission of STP frames.

True

What should you configure on a switch that's connected to three broadcast domains? a. IGMP b. VLANS c. STP d. Collision detection e. All of these choices

VLANS

To prevent a wardriver from being able to interpret captured wireless network data, you should enable which of the following? a. MAC filtering b. AP isolation c. WPA or WPA2 d. Repeater mode e. All of these choices

WPA or WPA2

What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks? All of these choices Script kiddy White hat Phisher Wardriver

Wardriver

Which security feature is offered by most access points (APs)? AP isolation MAC filtering Encryption Malware protection Authentication

-AP isolation -Encryption -MACN filtering -Authentication

Note that all of the packets are ARP requests sent to the Ethernet broadcast address (FF:FF:FF:FF:FF:FF). Detail the impact this switching loop/broadcast storm would have on network communication given what you have learned about Ethernet and CSMA/CD. (Choose all that apply.) A broadcast storm occurs when a broadcast frame is forwarded endlessly in a switching loop. The switching loop/broadcast storm continually occupies the medium, possibly preventing hosts from transmitting. Conditions worsen when hosts attempt to retransmit and wait longer and longer periods to do so (binary exponential backoff). Collisions are extremely likely given the number of packets. Under CSMA/CD, hosts must wait until the medium is not in use before transmitting.

All of these choices

Which of the following may be found in a routing table entry? Destination Network Timestamp Metric Source of the route Next Hop

All of these choices

When a switch attempts to set a port's operating mode to the highest performance setting, the connecting device that supports it is called ____________ mode.

Auto-negotiate

You just purchased some new switches for your company's network. Your junior technicians are doing most of the work connecting switches to workstations and to each other, and you don't want to confuse them by requiring them to use both patch cables and crossover cables. How can you test the switches to determine whether you need both types of cable, and what's the feature for using only one type of cable for all connections? a. Connect the switch to a PC NIC and configure different speeds on the NIC by using the NIC driver. You're okay if the switch links at all speeds. It's called auto-MDIX. b. Connect two switches by using a crossover cable. If the connection works, the switch supports auto-negotiate. c. Connect the switch to a PC NIC and configure different speeds on the NIC by using the NIC driver. You're okay if the switch links at all speeds. It's called auto-negotiate. d. Connect two switches by using a patch cable. If the connection works, the switch supports auto-MDIX.

Connect two switches by using a patch cable. If the connection works, the switch supports auto-MDIX.

A numeric value that tells the router how "far away" the destination network is.

Metric

Indicates an interface name or the address of the next router in the path to the destination.

Next hop

Which of the following is found in a routing table? Destination MAC address Next hop Port number Metric Domain name

Next hop and metric

The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what? None of these choices Advertisement Learning Concurrence Synchronization

None of these choices - Convergence

What is the PCI bus type that has the highest possible transfer rate? a. SATA b. PCMCIA c. PCI d. PCIe e. PCI-X

PCIe

Which PC bus uses up to 32 lanes to achieve very high data transfer rates? a. PCI b. PCI-X c. PCIe and PCI-X d. PCIe e. All of these choices

PCIe

________ cards are credit card-sized expansion cards used mainly to add functionality to laptop computers.

PCMCIA

Which NIC feature do you need to configure on a thin client? a. QoS b. PXE c. Auto-negotiate d. ACPI e. all of these choices

PXE

Besides a managed swtich, what is a high-end switch that offers features such as multicast processing and port security called? store-and-forward cut-through smart enterprise fragment-free

Smart


संबंधित स्टडी सेट्स

Fundamentals of Nursing: Chapter 40: Fluid, Electrolyte, and Acid-Base Balance

View Set

Foundations of Nursing Ch 7 "Asepsis and Infection Control"

View Set

Chap 5-Therapeutic Relationships

View Set

CIS Study Set Structuring and Storing Data

View Set

YouTube Channel Growth Certification - Course 6

View Set

Managerial Accounting - Traditional Costing & ABC

View Set

Multiple choice Certified Ethical Hacker Book

View Set

The Awakening by Kate Chopin Multiple Choice Questions

View Set

Term Sheet #3: The Reformation and Religious Wars

View Set