Deck 7: Network Hardware in Depth

Full screen (f)
exit full mode
Question
Network switches always must be configured before they can be put into operation in a network.
Use Space or
up arrow
down arrow
to flip the card.
Question
When an access control list is applied on a router's interface, that interface is performing a specific function on the packets that it receives. What is that function called?

A) packet filtering
B) packet forwarding
C) packet manipulating
D) packet dispatching
Question
A wireless router is actually composed of three devices, a wireless access point and which two other devices?

A) a router and a hub
B) a switch and a bridge
C) a router and a switch
D) a router and a bridge
Question
A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
Question
Which of the following is the fastest switching mode?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
Question
The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
Question
Which is the strongest form of wireless security?

A) WEP
B) WPA
C) WPA2
D) WAP2
Question
Which of the following is not a function that would be found in a managed switch?

A) the ability to stop switching loops using STP
B) the ability to transfer it's switching table with neighboring switches
C) the creation of VLANS to logically separate resources
D) to limit access to the network by enabling security on individual ports
Question
What command issued from a command prompt will display the routing table in Windows?

A) route table
B) route print
C) route delete
D) route config
Question
Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?

A) RIP
B) SNMP
C) NTP
D) STP
Question
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
Question
Which of the following is not a true statement regarding the function of a switch?

A) It determines the path used based on the destination IP address.
B) It sends broadcast frames out all connected ports.
C) Each port on a switch represents a separate collision domain.
D) Switches have the ability to operate in full-duplex mode.
Question
The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?

A) delivery
B) convergence
C) congestion
D) concurrence
Question
Which of the following combinations will you find in a switching table?

A) application/destination port number
B) IP address/exit interface
C) destination network/next Hop
D) MAC address/switch port number
Question
When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?

A) multi-homed router
B) dynamic router
C) link-state router
D) router on a stick
Question
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?

A) white hat
B) wardriver
C) script kiddy
D) phisher
Question
Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called?

A) intuitive
B) executive
C) smart
D) enterprise
Question
Each interface on a router must have an IP address and what else to be able to communicate on the network?

A) network ID
B) default gateway
C) MAC address
D) serial number
Question
What type of routing protocol are RIP and RIPv2?

A) distance-state protocol
B) link-state protocol
C) hybrid protocol
D) distance-vector protocol
Question
Communications through a router are noticeably faster than communications through a switch.
Question
What is a trunk port?
Question
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
Question
Why should you change the SSID on your wireless router?
Question
When a switch receives a broadcast frame, it ____________ the frame out to all ports.
Question
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
Question
Access control lists can be configured based on which of the following? (Choose all that apply.)

A) protocol
B) source MAC address
C) destination network
D) destination MAC address
E) source IP address
Question
What does the Spanning Tree Protocol do?
Question
What is a broadcast storm?
Question
What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?
Question
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

A) onboard coprocessor
B) advanced configuration power management interface
C) shared system memory
D) preboot execution environment
Question
Which is the PCI bus type that has the highest possible transfer rate?

A) PCI
B) PCIe
C) PCI-X
D) PCMCIA
Question
On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? (Choose all that apply.)

A) metric
B) hop count
C) timestamp
D) aging time
Question
MATCHING:
MATCHING:  <div style=padding-top: 35px>
Question
What are the three ways that a router can populate its routing table?
Question
Briefly describe an entry in a routing table from a router.
Question
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
Question
Briefly describe the three types of switching methods.
Question
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
Question
Which of the following would be found in a routing table on a router?

A) timestamp
B) destination network
C) next hop
D) MAC address
E) metric
Question
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
Question
What physical characteristics must you take into account when shopping for a new NIC?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Network Hardware in Depth
1
Network switches always must be configured before they can be put into operation in a network.
False
2
When an access control list is applied on a router's interface, that interface is performing a specific function on the packets that it receives. What is that function called?

A) packet filtering
B) packet forwarding
C) packet manipulating
D) packet dispatching
A
3
A wireless router is actually composed of three devices, a wireless access point and which two other devices?

A) a router and a hub
B) a switch and a bridge
C) a router and a switch
D) a router and a bridge
C
4
A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is the fastest switching mode?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
Which is the strongest form of wireless security?

A) WEP
B) WPA
C) WPA2
D) WAP2
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not a function that would be found in a managed switch?

A) the ability to stop switching loops using STP
B) the ability to transfer it's switching table with neighboring switches
C) the creation of VLANS to logically separate resources
D) to limit access to the network by enabling security on individual ports
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
What command issued from a command prompt will display the routing table in Windows?

A) route table
B) route print
C) route delete
D) route config
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?

A) RIP
B) SNMP
C) NTP
D) STP
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is not a true statement regarding the function of a switch?

A) It determines the path used based on the destination IP address.
B) It sends broadcast frames out all connected ports.
C) Each port on a switch represents a separate collision domain.
D) Switches have the ability to operate in full-duplex mode.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?

A) delivery
B) convergence
C) congestion
D) concurrence
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following combinations will you find in a switching table?

A) application/destination port number
B) IP address/exit interface
C) destination network/next Hop
D) MAC address/switch port number
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?

A) multi-homed router
B) dynamic router
C) link-state router
D) router on a stick
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?

A) white hat
B) wardriver
C) script kiddy
D) phisher
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called?

A) intuitive
B) executive
C) smart
D) enterprise
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
Each interface on a router must have an IP address and what else to be able to communicate on the network?

A) network ID
B) default gateway
C) MAC address
D) serial number
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
What type of routing protocol are RIP and RIPv2?

A) distance-state protocol
B) link-state protocol
C) hybrid protocol
D) distance-vector protocol
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
Communications through a router are noticeably faster than communications through a switch.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
What is a trunk port?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
Why should you change the SSID on your wireless router?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
When a switch receives a broadcast frame, it ____________ the frame out to all ports.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
Access control lists can be configured based on which of the following? (Choose all that apply.)

A) protocol
B) source MAC address
C) destination network
D) destination MAC address
E) source IP address
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
What does the Spanning Tree Protocol do?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
What is a broadcast storm?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

A) onboard coprocessor
B) advanced configuration power management interface
C) shared system memory
D) preboot execution environment
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
Which is the PCI bus type that has the highest possible transfer rate?

A) PCI
B) PCIe
C) PCI-X
D) PCMCIA
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? (Choose all that apply.)

A) metric
B) hop count
C) timestamp
D) aging time
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING:
MATCHING:
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
What are the three ways that a router can populate its routing table?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
Briefly describe an entry in a routing table from a router.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
Briefly describe the three types of switching methods.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following would be found in a routing table on a router?

A) timestamp
B) destination network
C) next hop
D) MAC address
E) metric
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
What physical characteristics must you take into account when shopping for a new NIC?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 41 flashcards in this deck.