Exam 7: Network Hardware in Depth
Exam 1: Introduction to Computer Networks41 Questions
Exam 2: Network Hardware Essentials41 Questions
Exam 3: Network Topologies and Technologies41 Questions
Exam 4: Network Media41 Questions
Exam 5: Network Protocols41 Questions
Exam 6: Network Reference Models and Standards39 Questions
Exam 7: Network Hardware in Depth41 Questions
Exam 8: Network Operating System Fundamentals40 Questions
Exam 9: Server Management and Administration40 Questions
Exam 10: Introduction to Network Security41 Questions
Exam 11: Supporting a Small Business Network41 Questions
Exam 12: Wide Area Network Essentials41 Questions
Exam 13: Troubleshooting and Support41 Questions
Select questions type
What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?
(Essay)
4.7/5
(31)
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
(Short Answer)
4.7/5
(40)
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
(Short Answer)
4.7/5
(31)
What are the three ways that a router can populate its routing table?
(Essay)
5.0/5
(34)
A wireless router is actually composed of three devices, a wireless access point and which two other devices?
(Multiple Choice)
4.8/5
(35)
Which of the following combinations will you find in a switching table?
(Multiple Choice)
4.9/5
(33)
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
(Essay)
4.7/5
(31)
Communications through a router are noticeably faster than communications through a switch.
(True/False)
4.8/5
(33)
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
(Short Answer)
4.9/5
(35)
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
(Multiple Choice)
4.9/5
(37)
The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
(True/False)
4.8/5
(34)
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
(Short Answer)
4.9/5
(40)
A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
(True/False)
4.8/5
(25)
Showing 21 - 40 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)