Deck 8: Network Hardware in Depth

Full screen (f)
exit full mode
Question
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
Use Space or
up arrow
down arrow
to flip the card.
Question
What has occurred when all routers in a network have accurate information after a change in the network?

A) delivery
B) convergence
C) congestion
D) concurrence
Question
When a router's interface is configured to connect with a switch trunk port to route packets between VLANs, what is this called?

A) multi-homed router
B) dynamic router
C) link-state router
D) router on a stick
Question
Which of the following is NOT a true statement regarding the function of a switch?

A) It determines the path used based on the destination IP address.
B) It sends broadcast frames out all connected ports except the port where the frame was received.
C) Each port on a switch represents a separate collision domain.
D) Switches have the ability to operate in full-duplex mode.
Question
Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the frame?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
Question
Which of the following combinations will you find in a switching table?

A) application/destination port number
B) IP address/exit interface
C) destination network/next Hop
D) MAC address/switch port number
Question
Which of the following is the fastest switching mode?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
Question
More VLANs mean fewer logical networks, so the network is less complex.
Question
What category of routing protocol is used to route packets between autonomous systems?

A) distance-vector
B) link-state
C) EGP
D) IGP
Question
In which type of routing protocol is a router's routing table copied to neighboring routers to share internetwork information?

A) distance-state protocol
B) link-state protocol
C) hybrid protocol
D) distance-vector protocol
Question
Your colleagues are discussing the operation of a device in which packets are routed between VLANs on the device rather than having to exit the device to be routed. What type of device are they most likely discussing?

A) access point
B) managed switch
C) Layer 3 switch
D) router
Question
What type of hacker uses a scanning device to find unsecured wireless networks and breaks into those networks?

A) white hat
B) wardriver
C) script kiddy
D) phisher
Question
Routers can be used to control network access by inspecting the source and destination address information of packets.
Question
You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is connected to Switch D. Furthermore, Switch A and B are connected and Switch C and D are connected. One of the connections is in blocking mode. What protocol must be running on the switches?

A) RIP
B) SNMP
C) NTP
D) STP
Question
In general, what level of security should you use with your access points?

A) the easiest to configure
B) wireless encryption protocol
C) the most secure your systems supports
D) RADIUS
Question
What command issued from a command prompt will display the routing table in Windows?

A) route table
B) route print
C) route delete
D) route config
Question
Which of the following is NOT a function that would be found in a managed switch?

A) the ability to stop switching loops using STP
B) the ability to transfer its switching table with neighboring switches
C) the creation of VLANS to logically separate resources
D) to limit access to the network by enabling security on individual ports
Question
Which of the following is a common link-state routing protocol?

A) OSPF
B) RIPv2
C) EIGRP
D) BGP
Question
All network switches require substantial configuration before they can be put into operation in a network.
Question
A distance-vector protocol sends updates to its neighbors that include the contents of its routing table.
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
configured to carry VLAN traffic
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
routing protocol category in which the routing protocol is used to exchange routing information between autonomous systems
Question
Access control lists can be configured based on which of the following? (Choose all that apply.)

A) protocol
B) source MAC address
C) TCP port
D) destination MAC address
E) source IP address
Question
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

A) onboard coprocessor
B) advanced configuration power management interface
C) shared system memory
D) preboot execution environment
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
value that tells routers the best path to the destination network
Question
Which of the following would be found in a router's routing table? (Choose all that apply.)

A) timestamp
B) destination network
C) next hop
D) MAC address
E) metric
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
sends entire routing table to all routers at a scheduled time
Question
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
entire frame is read before forwarding it to the destination port
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
damaged frames do not get forwarded
Question
What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router?

A) metric
B) administrative distance
C) hop count
D) ACL
Question
When a switch receives a ____________ frame, it floods the frame out all ports.
Question
On a router configured to use RIP, the number of routers a packet must travel through before it reaches its destination is called what? (Choose two.)

A) metric
B) hop count
C) timestamp
D) aging time
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
designed to stop switching loops
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system
Question
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
Question
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
Question
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
frame is sent to the destination port immediately after reading the destination and source MAC address
Question
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
sends the status of all its interface links to all other routers in the internetwork
Question
Discuss disabling SSID broadcast as a security option on an access point.
Question
What are two ways a switch can process multicast frames?
Question
What are the most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?
Question
What are the three ways that a router can populate its routing table?
Question
What does the Spanning Tree Protocol do?
Question
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
Question
What is BGP and how is it used?
Question
Briefly describe an entry in a routing table from a router.
Question
What is a trunk port?
Question
Briefly describe the three types of switching methods.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Network Hardware in Depth
1
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
False
2
What has occurred when all routers in a network have accurate information after a change in the network?

A) delivery
B) convergence
C) congestion
D) concurrence
B
3
When a router's interface is configured to connect with a switch trunk port to route packets between VLANs, what is this called?

A) multi-homed router
B) dynamic router
C) link-state router
D) router on a stick
D
4
Which of the following is NOT a true statement regarding the function of a switch?

A) It determines the path used based on the destination IP address.
B) It sends broadcast frames out all connected ports except the port where the frame was received.
C) Each port on a switch represents a separate collision domain.
D) Switches have the ability to operate in full-duplex mode.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the frame?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following combinations will you find in a switching table?

A) application/destination port number
B) IP address/exit interface
C) destination network/next Hop
D) MAC address/switch port number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is the fastest switching mode?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
More VLANs mean fewer logical networks, so the network is less complex.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What category of routing protocol is used to route packets between autonomous systems?

A) distance-vector
B) link-state
C) EGP
D) IGP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
In which type of routing protocol is a router's routing table copied to neighboring routers to share internetwork information?

A) distance-state protocol
B) link-state protocol
C) hybrid protocol
D) distance-vector protocol
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Your colleagues are discussing the operation of a device in which packets are routed between VLANs on the device rather than having to exit the device to be routed. What type of device are they most likely discussing?

A) access point
B) managed switch
C) Layer 3 switch
D) router
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What type of hacker uses a scanning device to find unsecured wireless networks and breaks into those networks?

A) white hat
B) wardriver
C) script kiddy
D) phisher
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Routers can be used to control network access by inspecting the source and destination address information of packets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is connected to Switch D. Furthermore, Switch A and B are connected and Switch C and D are connected. One of the connections is in blocking mode. What protocol must be running on the switches?

A) RIP
B) SNMP
C) NTP
D) STP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
In general, what level of security should you use with your access points?

A) the easiest to configure
B) wireless encryption protocol
C) the most secure your systems supports
D) RADIUS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What command issued from a command prompt will display the routing table in Windows?

A) route table
B) route print
C) route delete
D) route config
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a function that would be found in a managed switch?

A) the ability to stop switching loops using STP
B) the ability to transfer its switching table with neighboring switches
C) the creation of VLANS to logically separate resources
D) to limit access to the network by enabling security on individual ports
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is a common link-state routing protocol?

A) OSPF
B) RIPv2
C) EIGRP
D) BGP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
All network switches require substantial configuration before they can be put into operation in a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A distance-vector protocol sends updates to its neighbors that include the contents of its routing table.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
configured to carry VLAN traffic
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
routing protocol category in which the routing protocol is used to exchange routing information between autonomous systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Access control lists can be configured based on which of the following? (Choose all that apply.)

A) protocol
B) source MAC address
C) TCP port
D) destination MAC address
E) source IP address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

A) onboard coprocessor
B) advanced configuration power management interface
C) shared system memory
D) preboot execution environment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
value that tells routers the best path to the destination network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following would be found in a router's routing table? (Choose all that apply.)

A) timestamp
B) destination network
C) next hop
D) MAC address
E) metric
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
sends entire routing table to all routers at a scheduled time
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
entire frame is read before forwarding it to the destination port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
damaged frames do not get forwarded
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router?

A) metric
B) administrative distance
C) hop count
D) ACL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
When a switch receives a ____________ frame, it floods the frame out all ports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
On a router configured to use RIP, the number of routers a packet must travel through before it reaches its destination is called what? (Choose two.)

A) metric
B) hop count
C) timestamp
D) aging time
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
designed to stop switching loops
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
frame is sent to the destination port immediately after reading the destination and source MAC address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below.
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
sends the status of all its interface links to all other routers in the internetwork
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss disabling SSID broadcast as a security option on an access point.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What are two ways a switch can process multicast frames?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What are the three ways that a router can populate its routing table?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What does the Spanning Tree Protocol do?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is BGP and how is it used?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Briefly describe an entry in a routing table from a router.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is a trunk port?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Briefly describe the three types of switching methods.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.