Friday, February 10, 2012

NETWORKING chapter 7

SG Network Hardware in Depth
Chapter 7

TRUE/FALSE

     1.   Network switches always must be configured before they can be put into operation in a network.

     2.   The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.

     3.   Communications through a router are noticeably faster than communications through a switch.

     4.   A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.

     5.   Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.

MULTIPLE CHOICE

     1.   Which of the following is not a true statement regarding the function of a switch?

a.
It determines the path used based on the destination IP address.
b.
It sends broadcast frames out all connected ports.
c.
Each port on a switch represents a separate collision domain.
d.
Switches have the ability to operate in full-duplex mode.


     2.   Which of the following combinations will you find in a switching table?

a.
application/destination port number
b.
IP address/exit interface
c.
destination network/next Hop
d.
MAC address/switch port number


     3.   Which of the following is the fastest switching mode?

a.
cut-through
b.
fragment-free
c.
store-and-forward
d.
auto-negotiate


     4.   Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called?

a.
intuitive
b.
executive
c.
smart
d.
enterprise


     5.   Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?

a.
RIP
b.
SNMP
c.
NTP
d.
STP


     6.   Which of the following is not a function that would be found in a managed switch?

a.
the ability to stop switching loops using STP
b.
the ability to transfer it’s switching table with neighboring switches
c.
the creation of VLANS to logically separate resources
d.
to limit access to the network by enabling security on individual ports


     7.   Each interface on a router must have an IP address and what else to be able to communicate on the network?

a.
network ID
b.
default gateway
c.
MAC address
d.
serial number


     8.   When a router’s interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?

a.
multi-homed router
b.
dynamic router
c.
link-state router
d.
router on a stick


     9.   What type of routing protocol are RIP and RIPv2?

a.
distance-state protocol
b.
link-state protocol
c.
hybrid protocol
d.
distance-vector protocol


   10.   The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?

a.
delivery
b.
convergence
c.
congestion
d.
concurrence


   11.   When an access control list is applied on a router’s interface, that interface is performing a specific function on the packets that it receives. What is that function called?

a.
packet filtering
b.
packet forwarding
c.
packet manipulating
d.
packet dispatching


   12.   What command issued from a command prompt will display the routing table in Windows?

a.
route table
b.
route print
c.
route delete
d.
route config


   13.   A wireless router is actually composed of three devices, a wireless access point and which two other devices?

a.
a router and a hub
b.
a switch and a bridge
c.
a router and a switch
d.
a router and a bridge


   14.   What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
a.
white hat
b.
wardriver
c.
script kiddy
d.
phisher


   15.   Which is the strongest form of wireless security?

a.
WEP
b.
WPA
c.
WPA2
d.
WAP2


   16.   Which is the PCI bus type that has the highest possible transfer rate?

a.
PCI
b.
PCIe
c.
PCI-X
d.
PCMCIA


   17.   Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

a.
onboard coprocessor
b.
advanced configuration power management interface
c.
shared system memory
d.
preboot execution environment


MULTIPLE RESPONSE

     1.   On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? (Choose all that apply.)
a.
metric
b.
hop count
c.
timestamp
d.
aging time


     2.   Which of the following would be found in a routing table on a router?

a.
timestamp
b.
destination network
c.
next hop
d.
MAC address
e.
metric


     3.   Access control lists can be configured based on which of the following? (Choose all that apply.)
a.
protocol
b.
source MAC address
c.
destination network
d.
destination MAC address
e.
source IP address


COMPLETION

     1.   When a switch receives a broadcast frame, it ____________ the frame out to all ports.

     2.   A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.

     3.   A router’s final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.

     4.   One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________.

     5.   A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit.

MATCHING


a.
distance-vector protocol
b.
fragment-free switching
c.
cut-through switching
d.
store-and-forward switching
e.
Spanning Tree Protocol
f.
trunk port
g.
broadcast storm
h.
link-state protocol
i.
metric
j.
Routing Information Protocol


     1.   frame is sent to the destination port immediately after reading the destination and source MAC address

     2.   configured to carry VLAN traffic

     3.   designed to stop switching loops

     4.   sends status to all routers whenever there is a change

     5.   sends entire routing table to all routers at a scheduled time

     6.   uses hop count to determine best path

     7.   damaged frames do not get forwarded

     8.   entire frame is read before forwarding it to the destination port

     9.   broadcast frames are forwarded in a continual loop

   10.   value that tells routers the best path to the destination network

           
SHORT ANSWER

     1.   Briefly describe the three types of switching methods.

     2.   What does the Spanning Tree Protocol do?

     3.   What is a trunk port?

     4.   What is a broadcast storm?

     5.   Briefly describe an entry in a routing table from a router.

     6.   What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?

     7.   What are the three ways that a router can populate its routing table?

     8.   Why should you change the SSID on your wireless router?

     9.   What are the three most common encryption protocols for wireless security? Which is the strongest?  Which is the weakest?

   10.   What physical characteristics must you take into account when shopping for a new NIC?

NETWORKING chapter 6

SG Network Reference Models and Standards
Chapter 6

TRUE/FALSE

     1.   The Transport layer is the same in both the OSI model and the TCP/IP model.

     2.   The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC sublayer.

     3.   The Network layer communicates with the Data Link layer and the Session layer.

     4.   The maximum transmission unit for Ethernet is 1518 bytes.

     5.   One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP address.

MULTIPLE CHOICE

     1.   Which layer is responsible for establishing a connection between the source and destination?

a.
Application
b.
Session
c.
Transport
d.
Presentation


     2.   Which layer of the OSI model is responsible for encryption and decryption?

a.
Application
b.
Presentation
c.
Session
d.
Transport


     3.   Put the layers of the OSI model in order from layer 7 to layer 1.

a.   Presentation
b.   Network
c.   Physical
d.   Data Link
e.   Transport
f.    Application
g.   Session

a.
a., g., f., b., e., d., c.
b.
f., a., g., e., b., d., c.
c.
f., g., a., b., e., c., d.
d.
f., a., g., b., e., d., c.


     4.   What is a PDU?

a.
It is an Application layer protocol that handles delivery of messages.
b.
It is a unit of measurement for the maximum amount of data that can be transferred.
c.
It is the name given to the unit of information used by each layer.
d.
It is a Network layer protocol that handles path determination


     5.   What information would you find in the header of a Transport layer PDU?

a.
destination IP address
b.
cyclic redundancy check
c.
source MAC address
d.
window size


     6.   At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this process called?

a.
encapsulation
b.
deencapsulation
c.
packetization
d.
checkpointing


     7.   What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?

a.
source port number
b.
window Size
c.
destination port number
d.
sequence number


     8.   What is the IEEE standard that governs all forms of Ethernet media?

a.
802.11
b.
802.3
c.
802.15
d.
802.2


     9.   Which is the IEEE standard that sets the standards for wireless networking?

a.
802.16
b.
802.3
c.
802.15
d.
802.11


   10.   Which layer is responsible for determining the best path a packet should travel across an internetwork?

a.
Network
b.
Transport
c.
Session
d.
Data Link


   11.   One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called?

a.
media control
b.
packet forwarding
c.
access control
d.
signal bounce


   12.   You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation’s IP address, and get a response.  You ask the user to try the Internet again. He does so with the same result— no connection.  Which type of device is most likely to be the problem?

a.
Physical layer device
b.
Data Link layer device
c.
Network layer device
d.
Presentation layer device


   13.   Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control sublayer?

a.
Physical
b.
Data Link
c.
Network
d.
Transport


   14.   What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand?

a.
7
b.
6
c.
5
d.
4


   15.   At what layer do NICs operate?

a.
Transport
b.
Data Link
c.
Physical
d.
Network


   16.   Which layer is responsible for the encoding of signals?

a.
3
b.
1
c.
5
d.
7


   17.   The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?

a.
MTU
b.
LLC
c.
PDU
d.
TCP


   18.   At which layer would you find errors that were caused by EMI?

a.
Data Link
b.
Transport
c.
Physical
d.
Network


MULTIPLE RESPONSE

     1.   How can you find out what your MAC address is? (Choose all that apply.)

a.
Right-click on the Local Area Connection and choose status.
b.
Open a command prompt and type the command arp -d.
c.
Open a command prompt and type the command getmac.
d.
Open a command prompt and type the command ipconfig /all.


     2.   Which of the following are protocols that you find at the Application layer of the OSI model?

a.
TCP
b.
FTP
c.
ARP
d.
ICMP
e.
DHCP
f.
SNMP


COMPLETION

     1.   The ____________ reference model is a general framework for networking systems that uses a layered approach to reduce its complexity.

     2.   The ____________ layer is the bottom layer, whose job it is to convert bits into signals and vice versa.

     3.   The process of stripping the header and trailer from a PDU is called ____________.

     4.   The PDU at the Data Link layer is called a ____________.

     5.   The ____________ layer of the TCP/IP model combines the top three layers of the OSI model into one layer.

MATCHING


a.
Application layer
b.
Presentation layer
c.
Session layer
d.
Transport layer
e.
Network layer
f.
Data Link layer
g.
Physical layer
h.
Media Access Control sublayer
i.
Logical Link Control sublayer
j.
OSI reference model


     1.   Switches operate at this layer.

     2.   Hubs operate at this layer.

     3.   Sublayer manages access to the physical medium.

     4.   Computers operate at this layer.

     5.   This sublayer is responsible for some error recovery.

     6.   This is the general framework for how networking systems should operate.

     7.   Routers operate at this layer.

     8.   This layer handles data formatting and translation.

     9.   This uses port numbers as source and destination identifiers

   10.   This handles communication setup and teardown.

SHORT ANSWER

     1.   What are the benefits to using a layered approach?

     2.   List the layers of the OSI model from the top down, along with their counterparts in the TCP/IP model.

     3.   Name the PDU at each layer of the OSI model.

     4.   What does “802” refer to in the IEEE 802 standard?

     5.   The Transport layer PDU includes a field for window size. What is the “window size”?

     6.   How does window size provide flow control?

     7.   What does the Data Link layer do with a frame after it receives it?

     8.   What is encoding, and where does it take place?

     9.   In regards to the OSI Reference Model, what is peer communication?

   10.   What are the sublayers of the Data Link layer, and what do they do?