Friday, February 10, 2012

NETWORKING chapter 7

SG Network Hardware in Depth
Chapter 7

TRUE/FALSE

     1.   Network switches always must be configured before they can be put into operation in a network.

     2.   The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.

     3.   Communications through a router are noticeably faster than communications through a switch.

     4.   A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.

     5.   Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.

MULTIPLE CHOICE

     1.   Which of the following is not a true statement regarding the function of a switch?

a.
It determines the path used based on the destination IP address.
b.
It sends broadcast frames out all connected ports.
c.
Each port on a switch represents a separate collision domain.
d.
Switches have the ability to operate in full-duplex mode.


     2.   Which of the following combinations will you find in a switching table?

a.
application/destination port number
b.
IP address/exit interface
c.
destination network/next Hop
d.
MAC address/switch port number


     3.   Which of the following is the fastest switching mode?

a.
cut-through
b.
fragment-free
c.
store-and-forward
d.
auto-negotiate


     4.   Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called?

a.
intuitive
b.
executive
c.
smart
d.
enterprise


     5.   Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?

a.
RIP
b.
SNMP
c.
NTP
d.
STP


     6.   Which of the following is not a function that would be found in a managed switch?

a.
the ability to stop switching loops using STP
b.
the ability to transfer it’s switching table with neighboring switches
c.
the creation of VLANS to logically separate resources
d.
to limit access to the network by enabling security on individual ports


     7.   Each interface on a router must have an IP address and what else to be able to communicate on the network?

a.
network ID
b.
default gateway
c.
MAC address
d.
serial number


     8.   When a router’s interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?

a.
multi-homed router
b.
dynamic router
c.
link-state router
d.
router on a stick


     9.   What type of routing protocol are RIP and RIPv2?

a.
distance-state protocol
b.
link-state protocol
c.
hybrid protocol
d.
distance-vector protocol


   10.   The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?

a.
delivery
b.
convergence
c.
congestion
d.
concurrence


   11.   When an access control list is applied on a router’s interface, that interface is performing a specific function on the packets that it receives. What is that function called?

a.
packet filtering
b.
packet forwarding
c.
packet manipulating
d.
packet dispatching


   12.   What command issued from a command prompt will display the routing table in Windows?

a.
route table
b.
route print
c.
route delete
d.
route config


   13.   A wireless router is actually composed of three devices, a wireless access point and which two other devices?

a.
a router and a hub
b.
a switch and a bridge
c.
a router and a switch
d.
a router and a bridge


   14.   What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
a.
white hat
b.
wardriver
c.
script kiddy
d.
phisher


   15.   Which is the strongest form of wireless security?

a.
WEP
b.
WPA
c.
WPA2
d.
WAP2


   16.   Which is the PCI bus type that has the highest possible transfer rate?

a.
PCI
b.
PCIe
c.
PCI-X
d.
PCMCIA


   17.   Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

a.
onboard coprocessor
b.
advanced configuration power management interface
c.
shared system memory
d.
preboot execution environment


MULTIPLE RESPONSE

     1.   On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? (Choose all that apply.)
a.
metric
b.
hop count
c.
timestamp
d.
aging time


     2.   Which of the following would be found in a routing table on a router?

a.
timestamp
b.
destination network
c.
next hop
d.
MAC address
e.
metric


     3.   Access control lists can be configured based on which of the following? (Choose all that apply.)
a.
protocol
b.
source MAC address
c.
destination network
d.
destination MAC address
e.
source IP address


COMPLETION

     1.   When a switch receives a broadcast frame, it ____________ the frame out to all ports.

     2.   A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.

     3.   A router’s final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.

     4.   One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.

     5.   A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.

MATCHING


a.
distance-vector protocol
b.
fragment-free switching
c.
cut-through switching
d.
store-and-forward switching
e.
Spanning Tree Protocol
f.
trunk port
g.
broadcast storm
h.
link-state protocol
i.
metric
j.
Routing Information Protocol


     1.   frame is sent to the destination port immediately after reading the destination and source MAC address

     2.   configured to carry VLAN traffic

     3.   designed to stop switching loops

     4.   sends status to all routers whenever there is a change

     5.   sends entire routing table to all routers at a scheduled time

     6.   uses hop count to determine best path

     7.   damaged frames do not get forwarded

     8.   entire frame is read before forwarding it to the destination port

     9.   broadcast frames are forwarded in a continual loop

   10.   value that tells routers the best path to the destination network

           
SHORT ANSWER

     1.   Briefly describe the three types of switching methods.

     2.   What does the Spanning Tree Protocol do?

     3.   What is a trunk port?

     4.   What is a broadcast storm?

     5.   Briefly describe an entry in a routing table from a router.

     6.   What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?

     7.   What are the three ways that a router can populate its routing table?

     8.   Why should you change the SSID on your wireless router?

     9.   What are the three most common encryption protocols for wireless security? Which is the strongest?  Which is the weakest?

   10.   What physical characteristics must you take into account when shopping for a new NIC?

No comments:

Post a Comment