Ch 2 -Network Infrastructure and Technologies Flashcards
2. You are trying to explain the different network topologies most commonly used in wired networks. Which of the following topologies is more commonly seen in modern networks as a redundant backbone structure? A. Ring B. Star C. Bus D. Mesh
A. A ring topology is often used in modern networks to provide a redundant backbone infrastructure.
- Which of the following would result in a logical bus topology? (Choose two.)
A. Several hosts connected to a single cable.
B. Several hosts connected to a Multistation Access Unit.
C. Several hosts connected via a hub.
D. Several hosts connected to a router.
A, C. Several hosts connected to a single cable, and several hosts connected via a hub would both provide a logical bus topology.
4. You need to install a device on the the network that allows traffic to flow between the local network and a remote network. Which device would you need to install? A. VPN cocentrator B. Hub C. Switch D. Router
D. A router allows traffic to flow between a local and a remote network.
5. Which of the following devices us the hardware or MAC address to manage and communicate with host? (Choose two.) A. Router B. Bridge C. Switch D. Hub
B, C. Both bridges and switches, working at layer 2 of the OSI model, use the hardware (MAC) address to manage and communicate with hosts connected to them.
- A technician has recently updated the configuration on the company firewall. After several users complain that they can no longer access the firewall configuration. Which of the following would prevent users from accessing any Internet resources?
A. A default deny rule at the very top of the ruleset.
B. A default allow rule at the top of the ruleset.
C. A default allow rule at the very bottom of the ruleset.
D. A default dent rule at the very bottom of the ruleset.
A. A default deny rule at the very top of the ruleset would block all traffic coming into the network, including replies to user requests, because all traffic would match it first before any other rules are processed.
7. Which of the following devices could be used to translate different network protocols between tow networks? A. VPN concentrator B. Firewall C. Proxy server D. Gateway
D. A gateway is used to translate different network protocols between networks.
8. Which of the following devices require another device for its configuration management and security functions? A. Autonomous Access Point B. Wireless Lan controller C. Lightweight Access Point D. Layer 3 switch
C, A lightweight access point requires a wireless LAN controller to manage its configuration and security functions.
9. Which network topology allows multiple redundant paths of communication between hosts, and is frequently used in wireless networks? A. Ring B. Star C. Bus D. Mesh
D. A mesh topology provides multiple redundant paths between hosts, and can often be found in wireless networks.
10. You are designing a network and are trying to determine what some of the limiting factors are that would influence your network topology design. Which of the following are design consideration in choosing a network topology? (Choose two.) A. Size B. TCP ports C. Application layer protocols D. Physical enviroment
A, D. Both size (numbers of hosts as well as physical space) and physical environment are factors that would influence network topology design.
11. Which of the following is a simple security architecture that involves a host with two interfaces connection to different networks and filtering traffic between them? A. DMZ B. Bastion host C. Extranet D. Intranet
B. A bastion host is a computer or device with two interfaces connecting different networks and filtering traffic between them.
- All of the following are reasons to deploy a Demilitarized Zone network EXCEPT:
A. Separation of internal and external networks.
B. Allowing external users to access certain corporate resources.
C. Preventing external users from accessing restricted internal resources.
D. Allowing external users to access certain restricted internal resources.
D. Allowing external users to access certain restricted internal resources is not a valid reason for deploying a DMZ architecture because this scenario actually actually lessens security. All other reasons help to tighten and enforce network security
13. Which of the following IP address classes has a default subnet mask of 16 bits? A. Class E B. Class C C. Class B D. Class A
C. A Class B IP address has a default subnet mask that uses 16 bits (The first two octets) to delineate network IDs from host IDs.
14. You are designing an IP addressing scheme for a medium-sized network that has approximately 30 networks and a few hundred hosts. Which address class would work best for this network? A. Class E B. Class B C. Class C D. Class D
B. Class B network, subnetted correctly, would satisfy the requirements for those numbers of networks and hosts. All other classes listed don’t support those numbers of hosts or networks.
B. A Class B network, subnetted correctly, would satisfy the requirements for those number of networks and hosts. All other classes listed don’t support those number of hosts or networks.
1. Your supervisor has asked you to select network devices to be used in a new project that involves designing and building a small network for a client. Which of the following devices would you choose to connect several host together in a small network? A. Hub B. Switch C. Router D. Gareway
B. A switch can be used to connect a small network together while still providing some basic security and traffic management functions.
15. Your network has been assigned a single class B address of 171.24.0.0. Because this only gives one network range and many possible host IDs, you decide to subnet it. You would like to have at least 150 to 200 network IDs, with at least 200 host IDs per network. Which of the following bit sizes for a network mask would fit your needs? A. 16 B. 24 C. 32 D. 8
B. a 24-bit subnet mask, using the first three octets, would break up the single class B IP address into 254 networks, each having 254 hosts available to it.