Exam 8: Network Hardware in Depth

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system

Free
(Essay)
4.9/5
(41)
Correct Answer:
Verified

j

What has occurred when all routers in a network have accurate information after a change in the network?

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

B

Routers can be used to control network access by inspecting the source and destination address information of packets.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

True

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -damaged frames do not get forwarded

(Essay)
4.9/5
(37)

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -frame is sent to the destination port immediately after reading the destination and source MAC address

(Essay)
4.8/5
(37)

On a router configured to use RIP, the number of routers a packet must travel through before it reaches its destination is called what? (Choose two.)

(Multiple Choice)
4.7/5
(27)

Which of the following combinations will you find in a switching table?

(Multiple Choice)
4.8/5
(29)

What is BGP and how is it used?

(Essay)
4.7/5
(36)

What command issued from a command prompt will display the routing table in Windows?

(Multiple Choice)
4.8/5
(27)

One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.

(Short Answer)
4.7/5
(27)

Which of the following is the fastest switching mode?

(Multiple Choice)
4.8/5
(33)

A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.

(Short Answer)
4.9/5
(37)

Briefly describe the three types of switching methods.

(Essay)
4.8/5
(28)

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -designed to stop switching loops

(Essay)
4.7/5
(36)

What type of hacker uses a scanning device to find unsecured wireless networks and breaks into those networks?

(Multiple Choice)
4.9/5
(33)

Which of the following is NOT a function that would be found in a managed switch?

(Multiple Choice)
4.7/5
(43)

What category of routing protocol is used to route packets between autonomous systems?

(Multiple Choice)
4.8/5
(28)

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -value that tells routers the best path to the destination network

(Essay)
4.8/5
(40)

When a router's interface is configured to connect with a switch trunk port to route packets between VLANs, what is this called?

(Multiple Choice)
4.9/5
(32)

In general, what level of security should you use with your access points?

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)