Question
Please check my answers Questions from the PowerPoint slide questions (1 point each unless otherwise specified) {C}1. An internetwork managed by a single organization is
Please check my answers
Questions from the PowerPoint slide questions (1 point each unless otherwise specified)
{C}1. An internetwork managed by a single organization is known as an?
{C}a. Sovereign system
{C}b. Independent system
c. Autonomous system
d. Separate system
{C}2. This hardware receives a frame on one of its ports, then forwards the frame out on another port enabling the frame to travel to its destination. Switch
{C}3. A switching table holds __________ that tell the switch where to forward a frame, based on the _____________.
{C}a. IP addresses/port pairs, destination IP address
{C}b. IP addresses/port pairs, destination MAC address
c. MAC addresses/port pairs, destination MAC address
d. OSI addresses/port pairs, destination OSI address
{C}4. Occurs when two switches examine transmission parameters such as speed and flow control, then choose the highest performance transmission mode they both support
{C}a. Flow-negotiate mode
b. Auto-negotiate mode
c. Performance-negotiate mode
d. Parameter-negotiate mode
{C}5. (choose true or false) When a switch is first turned on it verifies its table entries and updates them as needed
6. Which frame forwarding method allows the best chance that a frame will be forwarded without any errors?
a. Store-and-forward switching
{C}a. Fragment-free switching
c. Cut-through switching
d. Address free switching
7. What is a key disadvantage of cut-through switching?
{C}a. Slower transference rate
{C}b. Ports may not all be recognized
{C}c. Frames may be too large
d. No error checking
8. What is the term used as an advanced switch feature term, when a switch or switches continue to rebroadcast messages, flooding the network?
a. Swapping loop
b. Switching loop
c. Interchanging loop
d. Exchanging loop
9. This advanced switch feature enables an administrator to limit which MAC addresses can connect to a port, is known as:
a. VLAN port security
b. Switch port security
c. Hardware port security
d. Contrasting port security
10. Which hardware device connects separate logical networks to form an internetwork, creating fault tolerance and load sharing?
{C}a. Switches
{C}b. Front end processors
c. Routers
d. Flash drives
11. When does a router consult its routing table to determine how to get a packet to its destination?
When the ip address not match.
12. What is the name of the term which describes the moving of a packet from the incoming interface to the outgoing interface?
a. Packet distribution
b. Packet forwarding
c. Packet sending
d. Packet delivery
13. If a switch receives a frame from a device and the MAC address is already in its table, it brings up to date the tables entry with a new?
a. Scheme address update
b. Device stamp
c. Datestamp
d. Timestamp
{C}14. When is a Timestamp removed from a switches table? (in your answer discuss again time)
When the timestamp isnt updated within the aging time.
{C}15. The wireless security option that restricts which devices can connect to your AP is known as:
a. Encryption
b. AP isolation
c. MAC filtering
d. Authentication
16. In reference to routing tables, the entry that stores how far the distance through to the destination network, is known as:
a. Timestamp
b. Next hop
c. Metric
d. Destination network
17. In reference to Autonomous systems, what is the difference between interior and exterior gateway protocols?
IGP is used in an autonomous system whereas EGP is used between autonomous systems.
18. An _____________ filters network traffic as it controls which packets are forwarded or blocked at the router's interfaces based on specified criteria.
a. Entree control list
b. Access control list
c. Right of entry control list
d. Entrance control list
19. A wireless router is several devices in one. Two of the devices are:
a. A wireless AP and a switch
b. A wireless Entree Point and a switch
c. A wireless AP and a switch
d. A router and a port
20. The ____________ is an alphanumeric character unique identifier acting as a password. It is part of a packets header, when its to be sent over a wireless local-area network
a. Service Set Identifier (SSID)
b. Provision Set Identifier (PSID)
{C}c. Packet Set Identifier (PSID)
{C}d. Wireless Set Identifier (WSID)
21. The wireless security option that will place content into a coded form, which is hard to decipher if intercepted, is known as:
a. Encryption
{C}b. Authentication
c. MAC filtering
d. {C}AP isolation
22. A credit card-size memory or I/O device that connects to a personal computer. Type I cards boost ROM or RAM and type II cards are used for modems, SCSI and LAN cards. This device is known as a:
a. Personal Computer Card
{C}b. Personal Computer Card enhancement
c. Personal Computer Memory expansion card
d. Personal Computer Memory Card International Association
23. When selecting a network adapter, first identify the physical characteristics the card must match. Name two of these characteristics:
Type of bus, network technology, type or connector needed to connect to media.
24. Several hardware enhancement options represent advanced features of a NIC. Which of the following refers to the NIC containing additional onboard memory?
a. Shared adapter memory
b. Shared system memory
c. RAM buffering
d. Shared on-board RAM
25. An advanced wireless networking setting which provides quality of service settings for streaming video is known as:
a. Wi-Fi multimedia
b. Adjustable transmit power
c. AP modes
d. Traffic priority
Part 4 - Additional Questions
Please complete the following questions. (1 point each)
At what layer of the OSI model do switches operate?
Data link layer.
Switches that support which of the following enable you to configure one or more switch ports into separate broadcast domains?
{C} multicast
{C} Spanning Tree Protocol
{C} VLANs
{C} port security
3. What term is used to describe the total number of routers a packet must travel through?
{C}a. metric
{C}b. {C}hop count
{C}c. next hop count
{C}d. TTL
4. Which type of routing protocol shares information with other routers by sending the status of all their interface links to other routers in the internetwork?
Distance vector protocols.
Part 5
Please complete the following questions from pages 354-358. (1 point each)
1. Which of the following is found in a routing table?
a. Destination MAC address
b. Port number
c. Metric & Next hop
e. Domain name
2. If you dont want wireless clients to view the name of your wireless network, what feature should you use?
a. WEP
b. Disabling SSID broadcasts
c. MAC filtering
d. AP isolation
3. To prevent a wardriver from being able to interpret captured wireless network data, you should enable which of the following?
a. MAC filtering
b. AP isolation
c. WPA or WPA2
d. Repeater mode
Part 6
Please open the following web site (3 points). View the contents of: Security of the WEP algorithm. Then answer the following questions: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
1. What algorithm is used to protect wireless communication from eavesdropping?
WEP- wired equivalent privacy.
2. What is the purpose of the secret key that WEP relies on?
The purpose of the secret key is to encrypt packets before they are transmitted. An integrity check is used to endure that packets are not modified in transit.
3. (choose true or false) Even though its difficult to decode a 2.4GHz digital signal, you can buy hardware to listen to 802.11 transmissions.
False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started