CH2 Flashcards
What type of traffic always goes to all devices in a subnet?
Unicast
Multicast
Broadcast
Allcast
Broadcast
Broadcast traffic is sent from one device to all other devices in a subnet.
Unicast goes from one device to another device only.
Multicast goes from one device to many devices.
There is no such thing as Allcast.
A switch blocks broadcasts?
True
False
False
A Switch passes broadcast.
What is the difference between a Switch and a Router?
Nothing. They are the Same.
Switches do not pass broadcasts, but routers do.
A switch connects devices together, and a router connects subnets together.
A switch connects subnets together, and a router connects devices together.
A switch connects devices together, and a router connects subnets together.
Switches pass broadcasts, but routers do not pass broadcasts.
Bridges can connect dissimilar physical topologies?
True
False
True
Bridges can connect dissimilar physical topologies such as twisted pair on one network with fiber-optic connections on another network.
A Firewall uses _______ to filter both inbound and outbound traffic?
Rules
The most basic hardware- or network-based firewall is simply a router with rules. These rules control both inbound and outbound traffic.
A network-based firewall is a hardware device that provides protection for a network. What is a host-based Firewall?
A software component that provides protection for a single system.
Network-based firewalls include both hardware and software.
A Crossover Cable is used to connect a computer to a switch?
True
False
False
A Crossover Cable is used to connect similar devices such as a switch to a switch, or a switch to a router.
A Straight-Through Cable is used to connect a computer to a switch.
Which of the following standards define how twisted-pair cables should be wired?
IEEE 802.3
RFC 791
Extranet Wiring Practices
T568B
T568B
Defines the standard color code for twisted-pair cables.
A Company wants to host a web server for Internet users. The web server should be placed in ________?
a perimeter network or (DMZ).
A Perimeter network provides a layer of protection for systems that are accessible from the Internet.
What is used to provide access to a company’s resources via the Internet to trusted partners?
An Extranet
An Extranet is accessible via the internet but only to trusted entities.