Chapter 8
How may a route be added to the routing table? SNMP message Administrator enters the route information manually Destination network is directly connected Dynamically via a routing protocol ICMP router discovery
-Administrator enters the route information manually -Destination network is directly connected -Dynamically via a routing protocol
What does a router do after receiving a frame on one of its interfaces? Encapsulates the frame to create a new packet Deencapsulates the frame to create a packet Deencapsulates the packet to create a segment Encapsulates the packet to create a new frame Encapsulates the segment to create a new packet
-Deencapsulates the frame to create a packet -Encapsulates the packet to create a new frame
Which of the following would be found in a routing table on a router? Metric Destination network MAC address Timestamp Next hop
-Metric -Destination network -Timestamp -Next hop
Which of the following is a characteristic of routing protocols? (Choose all that apply.) a. They populate routing tables statically. b. Network changes are reflected in the routing table automatically. c. They're not a good solution with redundant routes. d. They add routing table entries dynamically. e. You can't combine static routing with routing protocols in your internetwork.
-Network changes are reflected in the routing table automatically -They add routing table entries dynamially
Identify the information that is contained in the simulation's sample routing tables. (Choose all that apply.) Next hop Timestamp Destination network Metric How the route is derived
-Next hop -Destination network -Metric
In a network that requires high availability administrators often configure switches in a redundant topology ensuring that if one path to a destination is broken, another path can be used. There are two problems that must solved in this scenario. What are they?
-Problem 1 = Prevent a switching loop when all the links are up -Problem 2 = The switches must have some way of knowing when one of the links is down
Which of the following is not a characteristic of routing protocols? They're not a good solution with redundant routes They add routing table entries dynamically You can't combine static routing with routing protocols in your internetwork Network changes are reflected in the routing table automatically They populate routing tables statically
-They're not a good solution with redundant routes -You can't combine static routing with routing protocols in your internetwork -They populate routing tables statically
You have two eight-port switches. On each switch, seven stations are connected to ports, and the two switches are connected with the eighth port. How many collisions domains are there? a. 16 b. 15 c. 14 d. 8 e. 1
15
A value of _____ indicates that the address in the Network Destination column is a specific IP address rather than a network address, it's referred to as a "host route."
255.255.255.255
A router's final task when handling a packet is to send the packet on to its next and possibly final destination, this is referred to as packet _____
forwarding
The process of moving a packet from the incoming interface to the outgoing interface is called packet ________________.
forwarding
You learned that the route print command may be used to display your routing table. What other command produces the same result?
netstat -r
What command issued from a command prompt will display the routing table in Windows? a. route all b. route table c. route d. route -? e. route print
route print
When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called? dynamic router router on a stick link-state router multi-homed router VLAN trunk
router on a stick
What feature should you configure to prevent users on one subnet from accessing the Web server on another subnet? a. IPSec b. AP isolation c. Access control lists d. MAC filtering e. All of these choices
Access control lists
Identify the protocol(s) that send broadcast frames. (Choose all that apply.) ARP DNS DHCP FTP HTTP
All of these chioces
Switches that support VLANs enable you to configure one or more switch ports into separate _______ domains.
Broadcast
A(n) _____________ is a switching loop that occurs with broadcast packets.
Broadcast storm
The network address of a network to which the router can forward packets.
Destination network
Access control lists (ACL) can be configured based on what? (Choose all that apply) a. destination network b. protocol c. source MAC address d. destination MAC address e. source IP address
Destination network, protocol, source IP address
If you don't want wireless clients to view the name of your wireless network, what feature should you use? a. WEP b. Disabling SSID broadcasts c. MAC filtering d. AP isolation e. All of these choices
Disabling SSID broadcasts
(T/F) Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
False
(T/F) Communications through a router are noticeably faster than communications through a switch
False
(T/F) Cut-through switching reads enough to make sure the packets is not fragmented and then sends it out.
False
(T/F) Network switches always must be configured before they can be put into operation in a network.
False
(T/F) Physically breaking the loop by disconnecting a cable is a viable option in this situation.
False
(T/F) There can be only one MAC address per port in a switching table.
False
(T/F) One type of security for wireless networks involves entering a list of the physical addresses for the devices that are allowed to access the network and excluding all others. This is called IP filtering.
False - MAC filtering
(T/F) WPA is the strongest encryption protocol for wireless security.
False - WPA2
(T/F) When a switch is configured with VLANs, the switch needs to have a way to communicate between the VLANs. A uplink port is a port that is configured to carry all traffic.
False - trunk port
Explain how the routers detect that a link is down and what adjustments they make: _____ packets that are exchanged among the routers detect that the link is down and the routing ________ of each router automatically adjust to exclude the path containing the downed link./ RIP and tables When a packet must be sent to a router to get to its destination, it's called a(n) _____.
Hop
The total number of routers a packet must travel through is called the _____.
Hop count
On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? Hop count Link-state Traceroute Time-to-live Metric
Hop count and Metric
What metric is used by the Routing Information Protocol (RIP)?
Hop-count
Specifies how the route gets into the routing table.
How the route is derived
Which of the following accurately describes a distance-vector routing protocol? a. OSPF is an example. b. It learns from its neighbors. c. It sends the status of its interface links to other routers. d. It converges the fastest.
It learns from its neighbors
What does it mean if the first 24 bits of a MAC address are 01:00:5E? a. The NIC manufacturer is unknown. b. It's a multicast frame. c. It's a unicast frame. d. It's a broadcast frame. e. It's an Ethernet frame.
It's a multicast frame
A(n) _________ routing protocol shares information with other routers by sending the status of all their interface links to other routers in the internetwork.
Link-state
A(n) ___________ routing protocol only sends out information to its neighbors when there is a change in the status.
Link-state
Which of the following combinations will you find in a switching table? MAC address/switch port number destination network/next Hop application/destination port number IP address/exit interface MAC address/IP address
MAC address/switch port number
Which access point (AP) feature enables you to restrict which devices can connect to your AP based on their physical address?
MAC filtering
Which of the following is not a function that would be found in a managed switch? The ability to transfer it's switching table with neighboring switches The ability to stop switching loops using STP None of these choices To limit access to the network by enabling security on individual ports The creation of VLANS to logically separate resources
The ability to transfer it's switching table with neghboring switches
Tells the router how long it has been since the routing protocol updated the dynamic route.
Timestamp
In a distance vector routing protocol where do routers send their routing table information? To all connected segments To their neighbors None of these choices To the next hop To their default gateway
To their neighbors
In a distance vector routing protocol, where do routers send their routing table information? a. to their neighbors b. to all connected segments c. to the next hop d. none of these choices e. to their default gateway
To their neighbors
(T/F) A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
True
(T/F) A route is added to the routing table in three main ways: The destination network is connected directly, an administrator enters the route information manually, or the route information is entered dynamically, via a routing protocol.
True
(T/F) It is best to change the SSID as a preventative measure to help strengthen your security.
True
(T/F) Of all switching methods, cut-through switching is the fastest, it reads the destination MAC address and sends the frame out
True
(T/F) The Spanning Tree Protocol is used to detect whether there is a possibility of a switching loop caused by redundant paths. If a loop is possible, it places one of the ports in blocking mode to prevent it.
True
(T/F) The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
True
(T/F) When a switch receives a broadcast frame, it floods the frame out all ports.
True
(T/F) When switches are connected together, the switch ports are put into a blocking mode that only allows the transmission of STP frames.
True
What should you configure on a switch that's connected to three broadcast domains? a. IGMP b. VLANS c. STP d. Collision detection e. All of these choices
VLANS
To prevent a wardriver from being able to interpret captured wireless network data, you should enable which of the following? a. MAC filtering b. AP isolation c. WPA or WPA2 d. Repeater mode e. All of these choices
WPA or WPA2
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks? All of these choices Script kiddy White hat Phisher Wardriver
Wardriver
Which security feature is offered by most access points (APs)? AP isolation MAC filtering Encryption Malware protection Authentication
-AP isolation -Encryption -MACN filtering -Authentication
Note that all of the packets are ARP requests sent to the Ethernet broadcast address (FF:FF:FF:FF:FF:FF). Detail the impact this switching loop/broadcast storm would have on network communication given what you have learned about Ethernet and CSMA/CD. (Choose all that apply.) A broadcast storm occurs when a broadcast frame is forwarded endlessly in a switching loop. The switching loop/broadcast storm continually occupies the medium, possibly preventing hosts from transmitting. Conditions worsen when hosts attempt to retransmit and wait longer and longer periods to do so (binary exponential backoff). Collisions are extremely likely given the number of packets. Under CSMA/CD, hosts must wait until the medium is not in use before transmitting.
All of these choices
Which of the following may be found in a routing table entry? Destination Network Timestamp Metric Source of the route Next Hop
All of these choices
When a switch attempts to set a port's operating mode to the highest performance setting, the connecting device that supports it is called ____________ mode.
Auto-negotiate
You just purchased some new switches for your company's network. Your junior technicians are doing most of the work connecting switches to workstations and to each other, and you don't want to confuse them by requiring them to use both patch cables and crossover cables. How can you test the switches to determine whether you need both types of cable, and what's the feature for using only one type of cable for all connections? a. Connect the switch to a PC NIC and configure different speeds on the NIC by using the NIC driver. You're okay if the switch links at all speeds. It's called auto-MDIX. b. Connect two switches by using a crossover cable. If the connection works, the switch supports auto-negotiate. c. Connect the switch to a PC NIC and configure different speeds on the NIC by using the NIC driver. You're okay if the switch links at all speeds. It's called auto-negotiate. d. Connect two switches by using a patch cable. If the connection works, the switch supports auto-MDIX.
Connect two switches by using a patch cable. If the connection works, the switch supports auto-MDIX.
A numeric value that tells the router how "far away" the destination network is.
Metric
Indicates an interface name or the address of the next router in the path to the destination.
Next hop
Which of the following is found in a routing table? Destination MAC address Next hop Port number Metric Domain name
Next hop and metric
The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what? None of these choices Advertisement Learning Concurrence Synchronization
None of these choices - Convergence
What is the PCI bus type that has the highest possible transfer rate? a. SATA b. PCMCIA c. PCI d. PCIe e. PCI-X
PCIe
Which PC bus uses up to 32 lanes to achieve very high data transfer rates? a. PCI b. PCI-X c. PCIe and PCI-X d. PCIe e. All of these choices
PCIe
________ cards are credit card-sized expansion cards used mainly to add functionality to laptop computers.
PCMCIA
Which NIC feature do you need to configure on a thin client? a. QoS b. PXE c. Auto-negotiate d. ACPI e. all of these choices
PXE
Besides a managed swtich, what is a high-end switch that offers features such as multicast processing and port security called? store-and-forward cut-through smart enterprise fragment-free
Smart