Exam 7: Network Hardware in Depth

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?

(Essay)
4.7/5
(31)

A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.

(Short Answer)
4.7/5
(40)

A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.

(Short Answer)
4.7/5
(31)

MATCHING: MATCHING:

(Essay)
4.9/5
(28)

What are the three ways that a router can populate its routing table?

(Essay)
5.0/5
(34)

A wireless router is actually composed of three devices, a wireless access point and which two other devices?

(Multiple Choice)
4.8/5
(35)

Which of the following combinations will you find in a switching table?

(Multiple Choice)
4.9/5
(33)

What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?

(Essay)
4.7/5
(31)

Communications through a router are noticeably faster than communications through a switch.

(True/False)
4.8/5
(33)

A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.

(Short Answer)
4.9/5
(35)

What does the Spanning Tree Protocol do?

(Essay)
4.8/5
(30)

What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?

(Multiple Choice)
4.9/5
(37)

What is a broadcast storm?

(Essay)
4.8/5
(27)

Briefly describe the three types of switching methods.

(Essay)
4.9/5
(27)

Which of the following is the fastest switching mode?

(Multiple Choice)
4.8/5
(37)

What is a trunk port?

(Essay)
4.9/5
(45)

Which is the strongest form of wireless security?

(Multiple Choice)
4.8/5
(30)

The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.

(True/False)
4.8/5
(34)

One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.

(Short Answer)
4.9/5
(40)

A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.

(True/False)
4.8/5
(25)
Showing 21 - 40 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)