Exam 8: Network Hardware in Depth

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What does the Spanning Tree Protocol do?

(Essay)
5.0/5
(36)

What are the most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?

(Essay)
4.8/5
(28)

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -sends entire routing table to all routers at a scheduled time

(Essay)
4.7/5
(32)

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -sends the status of all its interface links to all other routers in the internetwork

(Essay)
4.9/5
(36)

Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the frame?

(Multiple Choice)
4.8/5
(33)

What is a trunk port?

(Essay)
4.7/5
(36)

Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.

(True/False)
4.8/5
(27)

Access control lists can be configured based on which of the following? (Choose all that apply.)

(Multiple Choice)
4.9/5
(37)

You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is connected to Switch D. Furthermore, Switch A and B are connected and Switch C and D are connected. One of the connections is in blocking mode. What protocol must be running on the switches?

(Multiple Choice)
4.7/5
(42)

Which of the following is a common link-state routing protocol?

(Multiple Choice)
4.8/5
(30)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)