Exam 8: Network Hardware in Depth
Exam 1: Introduction to Computer Networks50 Questions
Exam 2: Network Hardware Essentials49 Questions
Exam 3: Network Topologies and Techapter: Nologies48 Questions
Exam 4: Network Media49 Questions
Exam 5: Network Protocols49 Questions
Exam 6: Ip Addressing50 Questions
Exam 7: Network Reference Models and Standards48 Questions
Exam 8: Network Hardware in Depth50 Questions
Exam 9: Introduction to Network Security50 Questions
Exam 10: Wide Area Networking and Cloud Computing50 Questions
Exam 11: Network Operating System Fundamentals50 Questions
Exam 12: Network Management and Administration50 Questions
Exam 13: The Internet of Things50 Questions
Exam 14: Troubleshooting and Support50 Questions
Select questions type
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
-routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system
Free
(Essay)
4.9/5
(41)
Correct Answer:
j
What has occurred when all routers in a network have accurate information after a change in the network?
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
B
Routers can be used to control network access by inspecting the source and destination address information of packets.
Free
(True/False)
4.8/5
(34)
Correct Answer:
True
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
-damaged frames do not get forwarded
(Essay)
4.9/5
(37)
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
-frame is sent to the destination port immediately after reading the destination and source MAC address
(Essay)
4.8/5
(37)
On a router configured to use RIP, the number of routers a packet must travel through before it reaches its destination is called what? (Choose two.)
(Multiple Choice)
4.7/5
(27)
Which of the following combinations will you find in a switching table?
(Multiple Choice)
4.8/5
(29)
What command issued from a command prompt will display the routing table in Windows?
(Multiple Choice)
4.8/5
(27)
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
(Short Answer)
4.7/5
(27)
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
(Short Answer)
4.9/5
(37)
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
-designed to stop switching loops
(Essay)
4.7/5
(36)
What type of hacker uses a scanning device to find unsecured wireless networks and breaks into those networks?
(Multiple Choice)
4.9/5
(33)
Which of the following is NOT a function that would be found in a managed switch?
(Multiple Choice)
4.7/5
(43)
What category of routing protocol is used to route packets between autonomous systems?
(Multiple Choice)
4.8/5
(28)
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
-value that tells routers the best path to the destination network
(Essay)
4.8/5
(40)
When a router's interface is configured to connect with a switch trunk port to route packets between VLANs, what is this called?
(Multiple Choice)
4.9/5
(32)
In general, what level of security should you use with your access points?
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)