Ch 2 -Network Infrastructure and Technologies Flashcards

1
Q
2. You are trying to explain the different network topologies most commonly used in wired networks. Which of the following topologies is more commonly seen in modern networks as a redundant backbone structure?
A. Ring
B. Star
C. Bus
D. Mesh
A

A. A ring topology is often used in modern networks to provide a redundant backbone infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following would result in a logical bus topology? (Choose two.)
    A. Several hosts connected to a single cable.
    B. Several hosts connected to a Multistation Access Unit.
    C. Several hosts connected via a hub.
    D. Several hosts connected to a router.
A

A, C. Several hosts connected to a single cable, and several hosts connected via a hub would both provide a logical bus topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
4. You need to install a device on the the network that allows traffic to flow between the local network and a remote network. Which device would you need to install?
A. VPN cocentrator
B. Hub
C. Switch
D. Router
A

D. A router allows traffic to flow between a local and a remote network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
5. Which of the following devices us the hardware or MAC address to manage and communicate with host? (Choose two.)
A. Router
B. Bridge
C. Switch
D. Hub
A

B, C. Both bridges and switches, working at layer 2 of the OSI model, use the hardware (MAC) address to manage and communicate with hosts connected to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A technician has recently updated the configuration on the company firewall. After several users complain that they can no longer access the firewall configuration. Which of the following would prevent users from accessing any Internet resources?
    A. A default deny rule at the very top of the ruleset.
    B. A default allow rule at the top of the ruleset.
    C. A default allow rule at the very bottom of the ruleset.
    D. A default dent rule at the very bottom of the ruleset.
A

A. A default deny rule at the very top of the ruleset would block all traffic coming into the network, including replies to user requests, because all traffic would match it first before any other rules are processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
7. Which of the following devices could be used to translate different network protocols between tow networks?
A. VPN concentrator
B. Firewall
C. Proxy server
D. Gateway
A

D. A gateway is used to translate different network protocols between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
8. Which of the following devices require another device for its configuration management and security functions?
A. Autonomous Access Point
B. Wireless Lan controller
C. Lightweight  Access Point
D. Layer 3 switch
A

C, A lightweight access point requires a wireless LAN controller to manage its configuration and security functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
9. Which network topology allows multiple redundant paths of communication  between hosts, and is frequently used in wireless networks?
A. Ring
B. Star
C. Bus
D. Mesh
A

D. A mesh topology provides multiple redundant paths between hosts, and can often be found in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
10. You are designing a network and are trying to determine what some of the limiting factors are that would influence your network topology design. Which of the following are design consideration in choosing a network topology? (Choose two.)
A. Size
B. TCP ports
C. Application layer protocols
D. Physical enviroment
A

A, D. Both size (numbers of hosts as well as physical space) and physical environment are factors that would influence network topology design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
11. Which of the following is a simple security architecture that involves a host with two interfaces connection to different networks and filtering traffic between them?
A. DMZ
B. Bastion host
C. Extranet
D. Intranet
A

B. A bastion host is a computer or device with two interfaces connecting different networks and filtering traffic between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. All of the following are reasons to deploy a Demilitarized Zone network EXCEPT:
    A. Separation of internal and external networks.
    B. Allowing external users to access certain corporate resources.
    C. Preventing external users from accessing restricted internal resources.
    D. Allowing external users to access certain restricted internal resources.
A

D. Allowing external users to access certain restricted internal resources is not a valid reason for deploying a DMZ architecture because this scenario actually actually lessens security. All other reasons help to tighten and enforce network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
13. Which of the following IP address classes has a default subnet mask of 16 bits?
A. Class E
B. Class C
C. Class B
D. Class A
A

C. A Class B IP address has a default subnet mask that uses 16 bits (The first two octets) to delineate network IDs from host IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
14. You are designing an IP addressing scheme for a medium-sized network that has approximately 30 networks and a few hundred hosts. Which address class would work best for this network?
A. Class E
B. Class B
C. Class C
D. Class D
A

B. Class B network, subnetted correctly, would satisfy the requirements for those numbers of networks and hosts. All other classes listed don’t support those numbers of hosts or networks.

B. A Class B network, subnetted correctly, would satisfy the requirements for those number of networks and hosts. All other classes listed don’t support those number of hosts or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
1. Your supervisor has asked you to select network devices to be used in a new project that involves designing and building a small network for a client. Which of the following devices would you choose to connect several host  together in a small network?
A. Hub
B. Switch
C. Router
D. Gareway
A

B. A switch can be used to connect a small network together while still providing some basic security and traffic management functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
15. Your network has been assigned a single class B address of 171.24.0.0. Because this only gives one network range and many possible host IDs, you decide to subnet it. You would like to have at least 150 to 200 network IDs, with at least 200 host IDs per network. Which of the following bit sizes for a network mask would fit your needs?
A. 16
B. 24
C. 32
D. 8
A

B. a 24-bit subnet mask, using the first three octets, would break up the single class B IP address into 254 networks, each having 254 hosts available to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
16. Which of the following technologies allows you to maintain a larger private IP address space on your internal network, while only using a single public IP address on the external side of your network?
A. VLAN
B. NAT
C. DNS
D. DHCP
A

B. Network Address Translation (NAT) allows you to use a private IP address space for the internal network while using a single public IP address for for the external side of the network.

17
Q
  1. Which of the following are advantages to using virtual LANs? (Choose two.)
    A. Combining multiple IP ranged into a single range.
    B. Elimination of broadcast domains.
    C. Segmentation of sensitive hosts and traffic.
    D. Elimination of collision domains
A

B, C. Virtual LANs allow you to eliminate broadcast domains, something that routers normally do, and also allow you to segment sensitive hosts and traffic into different logical subnets.

18
Q
18. Which of the following is a network bandwidth management techniques that allow administrator to priortize and route important network traffic?
A. Bridging
B. Routing
C. Traffic shaping
D. NAT
A

C. Traffic shaping is a bandwidth management technique that can prioritize and route critical traffic along the best path.

19
Q
19. All of the following are components of SNMP EXCEPT?
A. LWAPP
B. MIB
C. Agents
D. Network Management Server
A

A. The Lightweight Access Point Protocol (LWAPP) is not a component of SNMP.

20
Q
20. Which of the following types of cable does PoE use to deliver power and data to remote network devices?
A. Serial cable
B. Ethernet Category 3 or higher
C Fiber optic cable
D. Ethernet Category 5 or higher
A

D. Power over Ethernet (PoE) uses an Ethernet cable that must be Category 5 or higher-quality cable to be able to deliver both power and data to remote devices.