Deck 8: Network Hardware in Depth

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not a function that would be found in a managed switch?

A) the ability to stop switching loops using STP
B) the ability to transfer it's switching table with neighboring switches
C) the creation of VLANS to logically separate resources
D) to limit access to the network by enabling security on individual ports
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Communications through a router are noticeably faster than communications through a switch.
سؤال
When a router's interface is configured with multiple IP addresses with each address belonging to different networks,what is it called?

A) multi-homed router
B) dynamic router
C) link-state router
D) router on a stick
سؤال
Which of the following is not a true statement regarding the function of a switch?

A) It determines the path used based on the destination IP address.
B) It sends broadcast frames out all connected ports.
C) Each port on a switch represents a separate collision domain.
D) Switches have the ability to operate in full-duplex mode.
سؤال
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?

A) white hat
B) wardriver
C) script kiddy
D) phisher
سؤال
What is an example of an EGP?

A) IS-IS
B) OSPF
C) BGP
D) RIPv2
سؤال
Which is the strongest form of wireless security?

A) WEP
B) IGP
C) WPA2
D) RADIUS
سؤال
Each interface on a router must have an IP address and what else to be able to communicate on the network?

A) network ID
B) default gateway
C) MAC address
D) serial number
سؤال
The time it takes for all the routing tables on every router in a network to be fully updated,either when a change occurs or according to a schedule,is called the speed of what?

A) delivery
B) convergence
C) congestion
D) concurrence
سؤال
Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?

A) RIP
B) SNMP
C) NTP
D) STP
سؤال
Which of the following is a common link-state protocol?

A) OSPF
B) RIPv2
C) EIGRP
D) BGP
سؤال
Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the frame?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
سؤال
What type of routing protocol are RIP and RIPv2?

A) distance-state protocol
B) link-state protocol
C) hybrid protocol
D) distance-vector protocol
سؤال
A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
سؤال
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
سؤال
The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
سؤال
All network switches require substantial configuration before they can be put into operation in a network.
سؤال
What command issued from a command prompt will display the routing table in Windows?

A) route table
B) route print
C) route delete
D) route config
سؤال
Which of the following is the fastest switching mode?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
سؤال
Which of the following combinations will you find in a switching table?

A) application/destination port number
B) IP address/exit interface
C) destination network/next Hop
D) MAC address/switch port number
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
frame is sent to the destination port immediately after reading the destination and source MAC address
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
sends entire routing table to all routers at a scheduled time
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
value that tells routers the best path to the destination network
سؤال
Which of the following would be found in a routing table on a router? (Choose all that apply.)

A) timestamp
B) destination network
C) next hop
D) MAC address
E) metric
سؤال
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others.This is called MAC ____________.
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
designed to stop switching loops
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system.
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
damaged frames do not get forwarded
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
routing protocol category in which the routing protocol is used to exchange routing information between autonomous systems
سؤال
When a switch receives a broadcast frame,it ____________ the frame out all ports.
سؤال
Access control lists can be configured based on which of the following? (Choose all that apply.)

A) protocol
B) source MAC address
C) destination network
D) destination MAC address
E) source IP address
سؤال
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

A) onboard coprocessor
B) advanced configuration power management interface
C) shared system memory
D) preboot execution environment
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
sends status to all routers whenever there is a change
سؤال
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
سؤال
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
سؤال
A ____________ is used to make connections between the network interface card and the other vital components of the computer,such as the central processing unit.
سؤال
What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router?

A) metric
B) administrative distance
C) hop count
D) ACL
سؤال
On a router configured to use RIP,the number of routers a packet must travel between before it reaches its destination is called what? (Choose two.)

A) metric
B) hop count
C) timestamp
D) aging time
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
configured to carry VLAN traffic
سؤال
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
entire frame is read before forwarding it to the destination port
سؤال
What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?
سؤال
Briefly describe the three types of switching methods.
سؤال
What is BGP and how is it used?
سؤال
Briefly describe an entry in a routing table from a router.
سؤال
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
سؤال
What are the three ways that a router can populate its routing table?
سؤال
What is a broadcast storm?
سؤال
Why should you change the SSID on your wireless router?
سؤال
What is a trunk port?
سؤال
What does the Spanning Tree Protocol do?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Network Hardware in Depth
1
Which of the following is not a function that would be found in a managed switch?

A) the ability to stop switching loops using STP
B) the ability to transfer it's switching table with neighboring switches
C) the creation of VLANS to logically separate resources
D) to limit access to the network by enabling security on individual ports
B
2
Communications through a router are noticeably faster than communications through a switch.
False
3
When a router's interface is configured with multiple IP addresses with each address belonging to different networks,what is it called?

A) multi-homed router
B) dynamic router
C) link-state router
D) router on a stick
D
4
Which of the following is not a true statement regarding the function of a switch?

A) It determines the path used based on the destination IP address.
B) It sends broadcast frames out all connected ports.
C) Each port on a switch represents a separate collision domain.
D) Switches have the ability to operate in full-duplex mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?

A) white hat
B) wardriver
C) script kiddy
D) phisher
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is an example of an EGP?

A) IS-IS
B) OSPF
C) BGP
D) RIPv2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which is the strongest form of wireless security?

A) WEP
B) IGP
C) WPA2
D) RADIUS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Each interface on a router must have an IP address and what else to be able to communicate on the network?

A) network ID
B) default gateway
C) MAC address
D) serial number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The time it takes for all the routing tables on every router in a network to be fully updated,either when a change occurs or according to a schedule,is called the speed of what?

A) delivery
B) convergence
C) congestion
D) concurrence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?

A) RIP
B) SNMP
C) NTP
D) STP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is a common link-state protocol?

A) OSPF
B) RIPv2
C) EIGRP
D) BGP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the frame?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What type of routing protocol are RIP and RIPv2?

A) distance-state protocol
B) link-state protocol
C) hybrid protocol
D) distance-vector protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
The major disadvantage to using store-and-forward switching in a large network is that it will slow down the speed of network traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
All network switches require substantial configuration before they can be put into operation in a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What command issued from a command prompt will display the routing table in Windows?

A) route table
B) route print
C) route delete
D) route config
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is the fastest switching mode?

A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following combinations will you find in a switching table?

A) application/destination port number
B) IP address/exit interface
C) destination network/next Hop
D) MAC address/switch port number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
frame is sent to the destination port immediately after reading the destination and source MAC address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
sends entire routing table to all routers at a scheduled time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
value that tells routers the best path to the destination network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following would be found in a routing table on a router? (Choose all that apply.)

A) timestamp
B) destination network
C) next hop
D) MAC address
E) metric
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others.This is called MAC ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
designed to stop switching loops
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
routing protocol category in which the routing protocol is used to exchange routing information within an autonomous system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
damaged frames do not get forwarded
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
routing protocol category in which the routing protocol is used to exchange routing information between autonomous systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
When a switch receives a broadcast frame,it ____________ the frame out all ports.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Access control lists can be configured based on which of the following? (Choose all that apply.)

A) protocol
B) source MAC address
C) destination network
D) destination MAC address
E) source IP address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?

A) onboard coprocessor
B) advanced configuration power management interface
C) shared system memory
D) preboot execution environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
sends status to all routers whenever there is a change
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
A router's final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
A ____________ is used to make connections between the network interface card and the other vital components of the computer,such as the central processing unit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router?

A) metric
B) administrative distance
C) hop count
D) ACL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
On a router configured to use RIP,the number of routers a packet must travel between before it reaches its destination is called what? (Choose two.)

A) metric
B) hop count
C) timestamp
D) aging time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
configured to carry VLAN traffic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match each item with a statement below.​
a.distance-vector protocol
b.fragment-free switching
c.cut-through switching
d.store-and-forward switching
e.Spanning Tree Protocol
f.trunk port
g.EGP
h.link-state protocol
i.metric
j.IGP
entire frame is read before forwarding it to the destination port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Briefly describe the three types of switching methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What is BGP and how is it used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Briefly describe an entry in a routing table from a router.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are the three ways that a router can populate its routing table?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is a broadcast storm?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Why should you change the SSID on your wireless router?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is a trunk port?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What does the Spanning Tree Protocol do?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.