Chap 2 - Network Implementations Flashcards

1
Q

2-3: A WAP enables computers equipped with wireless networki interface adapters to function in which of the following topologies?

Star
Ad hoc
Bus
Infrastructure

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Infrastructure Wifi

A

standard wifi setup with devices communicating to a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ad Hoc Wifi

A

wireless computers communicate directly with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2-4: Ralph has been hired by a company to redesign its LAN. Right now, it has a single 100 Mbps Ethernet LAN with 40 users and 2 shared servers, all connected thru 3 hubs. The users on the network must be able to share files with each other and also access the shared servers. The users are complaining that the network is too slow. Mgmt states that cost is a factor that must be considered. Which of the following upgrade scenarios should Ralph recommend in this situation?

  • Split the network kinto smaller segments with dedicated hubs as opposed to shared hubs
  • Split the network into two rounded LANs with 20 users each
  • Replace the hubs with switches to define separate collosion domains and filter unneccesary traffic from each segment
  • Replace the hubs with a layer 3 switch and define 2 VLANS with 20 users each
A

Replace the hubs with switches to define separate collosion domains and filter unneccesary traffic from each segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2-5: WHich of the following devices can split a single network into two collision domains while maininting a single broadcast domain?

Hub
Bridge
Switch
Router
Repeater

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bridge

A

A bridge is a device used in networking to connect two separate networks, allowing traffic to pass between them.

The primary function of a bridge is to filter and forward network frames based on the MAC addresses of the devices (nodes) on the network.

A bridge operates at Layer 2, the Data Link Layer

traditional wired bridges have largely been replaced by network switches due to their enhanced functionality and efficiency, wireless bridges are still utilized in modern networking to extend or connect separate wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2-7: Which of the following devices operate at the physical layer of the OSI model? (Choose all that apply)

Routers
Hubs
Repeaters
Switches

A

Hubs

Repeaters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2-11: Which of the following terms us used to describe the method by which a firewall examins the port numbers in transport layer protocol headers?

IP address filtering
Service-dependent filtering
Deep Packet Inspection (DPI)
Next-Generation Firewall (NGF)

A

Service-dependent filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

2-12: Which of the following devices can also be described as a multiport repeater?

Hub
Bridge
Switch
Router

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2-13: Which of the following bridging types has never been used on Ethernet LANs?

Store and Forward
Transparent
Source route
Multiport

A

Source route

was used on Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2-14: Which of the following physicla network devices can be implemented as software in a computer’s OS? (Choose all that apply)

Hub
Switch
Router
Firewall

A

Router
Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2-17: Which of the following statements about hubs and switches are true? (Choose all that apply)

  • Hubs operate at the physical layer and switches operate at the network layer
  • All of the devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain
  • There are switches available with network layer functionality, but there are no hubs with that capability
  • Switches create a separate broadcast domain for each connected device, whereas hubs create a single broadcast domamin for all connected devices
A
  • All of the devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain
  • There are switches available with network layer functionality, but there are no hubs with that capability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2-18: Which of the following problems is STP intended to prevent? (Choose all that apply)

Broadcast storms
Late collisions
Bridging Loops
Crosstalk

A

Broadcast storms

Bridging Loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2-19: Which of the following devices perform essentially the same function? (Choose two)

Hubs
Bridges
Switches
Routers

A

Bridges
Switches

Switches are basically multiport Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

5 functional levels in a distributed control system, e.g.: SCADA

A

FDPSup&PP

  • Field Level
  • Direct Control
  • Plant Supervisory
  • Production Control
  • Production Scheduling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SCADA

A

Supervisory Control and Data Acquisition

It is a type of industrial control system (ICS) that is used to control infrastructure and facility-based processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2-21: Which of the following switch types immediately forwards frames after looking at only the destination address?

Cut-through
Source Router
Store-and-Forward
Destination

A

Cut-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Switch types

A

Cut-through: fast because it only looks at the first six bytes (destination MAC address) when forwarding a frame

Store-and-Forward: take in the entire frame and verify its contents by performing a CRC calculation before forwarding it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

2-24: SOHO networks typically use a multifunction connectivity device that can perform all but which one of the following functions?

DHCP
DNS
Switch
Router
Hub
NAT router
Access Point (AP)

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2-25: Which of the following is the correct term for the process by which STP on a switch evaulates the paths through the network and places each port forwarding or blocking state?

Assimilation
Convergence
Tree-building
Listening

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Convergence

A

Convergence: to the state where all routers in a network have consistent and updated routing information, ensuring that every router has the same view of the network topology.

Also, process by switch STP populates its database with info about each port in a switch and designates the ports as forwarding or blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

2-27: Which of the following is something that only a firewall capable of stateful packet inspection can do?

Filter traffic-based port numbers
Block traffic destined for specific IP addresses
Scan transport layer header fields for evidence of SYN floods
Block all TCP traffic from entering a network

A

Scan transport layer header fields for evidence of SYN floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2-28: In Local Area networking, which of the following is not a type of bridge?

Store and Forward
Routing
Transparent
Multiport

A

Routing

Routers/Routing happens at Layer 3. Bridges are on Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

2-29: Which of the following methods are typically used by IDSs to analyze incoming network traffic? (Choose all that apply)

Anomaly-based detection
Behavior-based detection
Signature-based detection
Statistic-based detection

A

Anomaly-based detection

Signature-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
2-31: Which of the following devices can you use to connect two multimode fiber optpic Ethernet networks running in buildings 2000 meters apart using a single-mode fiber optic cable segment running at the same speed, while maintaining a single collision domain? Bridge Switch Router Media Converter
Media Converter
26
2-33: Which of the following devices enables two computers to communicate when they are using different protocols at each layer of the OSI model? A router A switch A hub A gateway
A gateway
27
2-35: Which of the following statements are true about switches and routers? (Choose all that apply) * Routers operate at the network layer, whereas switches operate at the data link layer * All of the device connected to a switch are part of a single broadcast domain, whereas the networks connected to a router form separate broadcast domains * Routers can communicate with each other and share information but switches cannot * Switches forward packets based on their hardware address, whereas routers forward packets based on their IP Address
* Routers operate at the network layer, whereas switches operate at the data link layer * All of the device connected to a switch are part of a single broadcast domain, whereas the networks connected to a router form separate broadcast domains * Switches forward packets based on their hardware address, whereas routers forward packets based on their IP Address
28
Do Routers Forward Broadcasts?
No
29
2-40: Which of the following explains why splitting a large switched Ethernet LAN into two LANs by adding a router can help alleviate traffic congestion and improve performance? (Choose all that apply) Adding a router reduces the amount of broadcast traffic on each of the two LANs Adding a router reduces the amount of unicast traffic on each of the two LANs Adding a router diverts traffic to an alternate path thru the network Adding a router prevents computers on one LAN from communicating with computers on another LAN
Adding a router reduces the amount of broadcast traffic on each of the two LANs Adding a router reduces the amount of unicast traffic on each of the two LANs
30
2-41: A small business office currently has a 100Base-TX Ethernet network with a single 8-port hub. All of the hub ports are currently populated and the business owner wants to expand the network further. However, the hub does not have an uplink port. The owner has purchased a new hub, also with eight ports, which does have an uplink port, but he does not know how to connect them together. What must the owner do to install the new hub on the network? * Use a standard patch cable to connect a standard port on the existing hub to a standard port on the new hub * Use a standard patch cable to connect a standard port on the existing hub to the uplink port on the new hub * Purchase a crossover cable and use it to connect a standard port on the existing hub to the uplink port on the new hub * Purchase a second hub with an uplink port to replace the old one and use a standard patch cable to connect the two uplink ports together
Use a standard patch cable to connect a standard port on the existing hub to the uplink port on the new hub
31
Uplink Port
A hub's uplink port is a special port used to connect one hub to another hub, switch, or router without requiring a crossover cable.
32
Standard Patch Cable vs Crossover Cable
Standard Network Patch Cable (Straight-Through Cable): * wire arrangement is identical on both ends of the cable. This means that Pin 1 on one end connects to Pin 1 on the other end, Pin 2 to Pin 2, and so on. * This type of cable is used to connect a device to a switch, hub, or router. * It's the most common type of Ethernet cable used for connecting different types of devices in a network, such as a computer to a network switch. Network Crossover Cable: * has wires that "cross over" at one end. Typically, the transmit (TX) and receive (RX) pairs are swapped. For example, Pins 1 and 2 (transmitting pins on a standard Ethernet interface) on one end are connected to Pins 3 and 6 (receiving pins) on the other end, and vice versa. * Crossover cables are used to connect two similar devices directly, such as two computers without a switch or hub in between, or two switches to each other.
33
2-42: Which of the following task scan you perform to split a large switched LAN into multiple broadcast domains? (Choose all that apply) Replace one or more switches with hubs Install a firewall to filter broadcast traffic Enable STP on the switches Create VLANs in the switches Install routers on the network
Create VLANs in the switches Install routers on the network
34
2-43: Which of the following statements about bridges and switches is true? * Bridges and switches are network layer devices that use logical addressing to forward frames * Bridges and switches are data link layer devices that use MAC addresses to forward frames * Bridges and switches build their internal tables based on destination addresses and forward packets based on source address * Bridges and switches must support the network layer protocol implemented on the LAN * Each port on a bridge and a switch defines a separate broadcast domain
Bridges and switches are data link layer devices that use MAC addresses to forward frames
35
2-46: Which of the following is the primary reason why replacing hubs with switches on an Ethernet LAN improves its performance? Switches forward packets faster than hubs Switches do not forward broadcast transmissions Switches reduce the number of collisions on the network Switches read IP addresses of packets, not the hardware addresses
Switches reduce the number of collisions on the network
36
2-48: Which of the following terms are used to describe the device used to place calls on a VoIP installation? (Choose all that apply) Terminal Gateway Endpoint PBX
Terminal Endpoint
37
VoIP PBX
Voice over IP Private branch exchange device that switches calls between endpoints on the local IP network and provides access to external internet lines
38
Hubs
* physical layer (Layer 1) devices * amplify and repeat signals out all ports, regardless of destination except where the data's source port * physical connect systems in star topology * Typically provide an internal croosover circuit connection * Have uplink ports to extend the distance of a star network, forming a hierarchical star
39
2-51: Which of the following hub types are supported by the 100Base-TX physical layer specification? (Choose all that apply) Class I Class II Class III Class IV
Class I: * perform signal translation * network can only have one per collision domain Class II * cannot peform signal translation * network can only have two per collision domain
40
2-52: Which of the following statements about routers is not true? * Routers can connect two or more networks with dissimilar data link protocols and media * Routers can connect two or more networks with the same data link protocols and media * Routers store and maintain route information in a local text file * Servers with multiple network interfaces can be configured to function as software routers * Routers can learn and populate their routing tables thru static and dynamic routing
Routers store and maintain route information in a local text file is false Routers store route information in memory
41
2-53: The network admin for a small business is installing a computer to function as a firewall protecting their internetwork from Internet intrusion. At which of the following locations should the administrator install the firewall system? Anywhere on the private internetwork as long as the internet is accessible Between the internet access router and the ISPs network At the ISPs network site Between the internet access router and the rest of private internetwork
Between the internet access router and the rest of private internetwork
42
Internetwork
An internetwork, or inter-network, is a collection of individual networks, connected by intermediate networking devices, that functions as a single, large network. The most well-known example of an internetwork is the Internet. Internetworking allows for the connection and communication between different network types and architectures through the use of routing technologies. It enables data packets to traverse from one network to another, making global communication possible.
43
Intranet
A private network that is contained within an enterprise or organization. It uses web technologies (such as HTTP and web browsers) to provide a secure environment for the organization's members to communicate, share information, collaborate, and access internal resources. An intranet is typically protected from outside access by a network security system such as a firewall. It is designed for internal use and is not accessible to the public.
44
2-55: Proxy servers operate at which layer of the OSI reference model? Data link Network Transport Application
Application
45
2-57: Which of the following statements about conent filtering in firewalls is true? Content filters examine the source IP address of packets to locate potential threats Content filters enable switches to direct packets out thru the correct port Content filters examine the data carried within packets for potentially objectionable materials Content filters use frequently updated signatures to locate packets containing malware
Content filters examine the data carried within packets for potentially objectionable materials
46
2-60: Which of the following devices enable users on a private network to access the internet by substitiuting a registered IP address for their private addresses? (Choose all that apply) NAT Router RADIUS Server Proxy Server UTM appliance
NAT Router Proxy Server
47
2-61: HVAC systems can use IoT to monitor which of the following? (Choose all that apply) Temperature Pressure Humidity Printers Occupancy Camera Door locks
Temperature Pressure Humidity Occupancy
48
2-62: A VPN Headend is an advance type of which of the following devices? Switch Router Gateway Bridge
Router
49
VPN headend
* server(s) that manages connections, encryption, and the routing of VPN traffic * acts as the endpoint for VPN clients, handling the initiation, maintenance, and termination of VPN connections * responsible for the aggregation of multiple VPN connections * ensures that data transmitted over the VPN is secure and properly routed to its destination within a private network * Handles authentication of users, encryption of data, and the assignment of IP addresses to VPN clients. * It is considered an advanced type of router
50
2-64: Ralph, the admin of a 500-node private internetwork is devising a plan to connect the network to the Internet. The primary objective of the project is to provide allof the network users with access to the web and email services while keeping the client computers safe from unauthorized users on the Internet. The secondary objectives of the project are to avoid having to manually configure the IP addresses of each one of the client computers individually and to provide a means of monitoring and regulating the users' access to the Internet. Ralph submits a proposal calling for the user of private IP addresses on the client computers and a series of proxy servers with public, registered, IP addresses, connected to the Internet using multiple T-1 lines. Which of the following statement about Ralph's proposed Internet access solution is true? * The proposal failes to satisfy both the primary and the secondary objectives * The proposal satisfies the primary objective but neither of the secondary objectives * The proposal satisfies the primary objective and one of the secondary objectives * The proposal satisfies the primary objective and both of the secondary objectives
The proposal satisfies the primary objective and one of the secondary objectives Proxy servers cannot assign IP addresses, and the proposal makes no mention of DHCP or any other TCP/IP addressing/assignment mechanism
51
2-65: Which of the following protocols can be used by wireless controllers to communicate with the APs on a WLAN? Choose all that apply CAPWAP LWAPP LDAP PPTP
CAPWAP LWAPP
52
CAPWAP
* CAPWAP, which stands for Control And Provisioning of Wireless Access Points, is a protocol that enables a central controller to manage a collection of wireless access points (WAPs). * CAPWAP separates the control and data traffic between access points and the controller. * The control plane, which carries administrative and management traffic, allows the controller to manage the access points, including their configuration, firmware updates, and network information. * The data plane, on the other hand, handles the actual user data traffic.
53
LWAPP
* Lightweight Access Point Protocol * was used to control multiple Wi-Fi wireless access points at once. * Was superseeded by CAPWAP
54
At which OSI model layers does a multilayer switch operate?
Layer 2: Data Link - operates like normal switch, creating individual collisiion domains and able to create VLANs Layer 3: Network - provides routing capabilites by forwarding packets in between VLANs Layer 4: Transport - (only some devices) distinguish between TCP and UDP traffic using port numbers to forward traffic
55
PPTP
* PPTP, or Point-to-Point Tunneling Protocol, is a method used for implementing virtual private networks (VPNs). * One of the oldest VPN protocols developed and has been widely used since its introduction in the late 1990s. * PPTP encapsulates network protocol data packets within an IP envelope, using a modified version of the Generic Routing Encapsulation (GRE) protocol. * This encapsulation allows data packets to be transmitted over a public network (like the Internet) while maintaining privacy, thus creating a "tunnel" through which secure communication can occur between remote users and private networks. * Considered obselete
56
NLB
Network Load Balancing group of servers all running the same application that distribute incoming traffic among themselves
57
2-69: A load balancer is a type of which of the following devices? Switch Router Gateway Firewall
Router
58
2-73: Which of the following statements about proxy servers and NAT servers are true? (Choose all that apply) * NAT servers and proxy servers can both provide internet access to clients running any application * NAT servers and proxy servers both use public IP addresses * NAT servers and proxy servers both access Internet servers and relay the responses to network clients * Both NAT and proxy server cache web data for later use
* NAT servers and proxy servers both use public IP addresses * NAT servers and proxy servers both access Internet servers and relay the responses to network clients Proxy Servers operate at Layer 7, Application, and can only provide internet access to specific applications. NAT Servers operate at Layer 3, Network
59
RAS
* **Remote Access Service** * a feature provided by many operating systems that allows users and administrators to connect to a network from a remote location. * This service enables access to network resources, applications, and data as if the user were physically connected to the network. RAS can use various communication protocols, including the Internet or direct dial-up connections via telephone lines.
60
2-76: Which of the following is not a function that is typically provided by a UTM (Unified Threat Management) appliance? VPN Network Firewall Packet forwarding Antivirus protection
Packet forwarding
61
2-77: Which of the following features enables an IDS to monitor all of the traffic on a switched network? Stateful packet inspection Port mirroring Trunking Service Dependent filtering
Port mirroring
62
RIPv1
Routing Information Protocol * **a classful, distance-vector routing protocol** * **uses hop count as its metric** * **maximum of 15 hops** * **lacks support for VLSM/CIDR** * broadcasts routing updates every 30 seconds * does not include subnet masks in network advertisements * is not suitable for large or complex networks. * max number of routes in a broadcast packet: 25, more than 25 and another packet must be generated
63
RIPv2
RIPv2 enhances RIPv1 by * max number of routes in a broadcast packet: 25, more than 25 and another packet must be generated * supporting CIDR/VLSM * using multicast for updates * offering route authentication and tagging. * Distance vector protocol * It retains the distance-vector mechanism and 15-hop limit, making it more suitable than RIPv1 for medium-sized networks * Distance vector protocol
64
OSPF
Open Shortest Path First * link-state routing protocol for IP networks * VLSM/CIDR support, and authentication * It uses cost as a routing metric and employs designated routers * Uses Dijkstra's algorithm
65
EIGRP
* Enhanced Interior Gateway Routing Protocol * **Distance Vector** * **Supports VLSM/CIDR for flexible IP addressing** * **hybrid: having qualities of both link state and distance vector** * **Protocol-independent, supporting multiple IP-based protocols** * **Offers MD5 authentication for secure routing information exchange** * Rapid convergence with DUAL algorithm * Efficient bandwidth use via partial updates * Unique unequal-cost load balancing capability * Scalable for both small and large networks, primarily used on Cisco devices
66
BGP
Border Gateway Protocol * **Core internet routing protocol** * **Path Vector mechanism for routing** * **edge gateway protocol** * Operates across autonomous systems (ASes) * Enables policy-based routing decisions * Uses attributes (AS_PATH, NEXT_HOP) for route selection * Essential for ISP and large network routing
67
2-81: Which of the following statements about EIGRP is not true? EIGRP does not support classless IPv4 addresses. EIGRP is a hybrid routing protocol EIGRP can only transmit incremental routing table updates EIGRP shared routes within an autonomous system
EIGRP does not support classless IPv4 addresses.
68
2-84: Which of the following statements about RIPv1 is true? (Choose all that apply) * RIPv1 broadcasts the entire contents of the routing table every 30 seconds * RIPv1 advertises the subnet mask along with the destination network * RIPv1 broadcasts only the elements in the routing table that have changed every 60 seconds * RIPv1 does not include the subnet mask in its network advertisements
* RIPv1 broadcasts the entire contents of the routing table every 30 seconds * RIPv1 does not include the subnet mask in its network advertisements
69
Traffic Shaping
means of prioritizing network traffic by means of delaying packets at the application layer
70
CoS
* **Class of Service** * type of **QoS** mechanism * operates at **data link layer (layer 2)** * adds a **3-bit Priority Code Point (PCP) value** to the ethernet frame
71
Diffserv
Differentiated Services type of QoS mechanism, works by classifying traffic types using a 6-bit value in the DS (Differentiated Services) field of the IP header
72
2-86: Which of the following statements about static routing are true? (Choose all of the above) * Static routes are manually configured routes that admins must add, modify or delete when a change in the network occurs * Static routes are automatically added to the routing table by routing protocols when a new network path becomes available * Static routes adapt to changes in the network infrastructure automatically * Static routes are an recommedned solution for large internetworks with redundant paths to each destination network * Static routes are an recommedned solution for small internetworks with a single path to each destination network
* Static routes are manually configured routes that admins must add, modify or delete when a change in the network occurs * Static routes are an recommedned solution for small internetworks with a single path to each destination network
73
2-88: Which of the following terms refers to a routing protocol that does not rely on hop counts to measure the efficiency of routes? Interior gateway protocol Edge gateway protocol Distance vector protocol Link state protocol
Link state protocol
74
Link state protocol
* **Routing protocol for optimal data paths** * **Employs SPF algorithm for shortest path calculation** * **Examples include OSPF and IS-IS** * **Does not relay solely on hop count** * **Maintains complete network topology map** * Uses LSAs for router-to-router information exchange * Rapid convergence due to immediate topology awareness * Scalable through network division into hierarchical areas * Efficient bandwidth usage with updates only on changes
75
Distance vector protocol
* Determines best path based on distance and direction. * Uses hop count as the primary metric for path selection. * Operates on "routing by rumor," sharing tables with immediate neighbors. * Sends periodic updates, broadcasting the entire routing table to neighbors. * Implements route poisoning and a maximum hop count to prevent loops. * Examples include RIP (Routing Information Protocol). * Suitable for smaller networks, with slower convergence and less scalability compared to link-state protocols.
76
Edge gateway protocol
* Refers to protocols used by edge devices for network connectivity and security. * Commonly involves: * BGP (Border Gateway Protocol) for routing between autonomous systems. * IoT Protocols like MQTT and CoAP for connecting IoT devices. * VPN Protocols (IPsec, SSL/TLS) for secure remote access. * NAT Protocols for IP address translation at network boundaries. * Facilitates data flow, security, and connectivity between diverse networks or network segments.
77
Interior gateway protocol
* Routing protocol used within a single autonomous system (AS). * Types: Includes Distance Vector (e.g., RIP) and Link State (e.g., OSPF, IS-IS) protocols. * Function: Facilitates efficient routing and data packet exchange within an AS. * Features: Rapid convergence to adapt to network changes, with varying scalability and efficiency among different IGPs.
78
AS
* Autonomous System (AS): Collection of IP networks under a single administrative domain. * Unique ASN: Identified by an Autonomous System Number for routing. * Routing Policies: Defines its own policies for route selection and advertisement. * Uses BGP: Exchanges routing information with other ASes via Border Gateway Protocol. * Types: Includes Tier 1 (global reach without transit costs), Tier 2 (transits between ASes), and Tier 3 (end-user ISPs). * Internet Peering: ASes may peer with others to exchange traffic, improving performance. * Operational Autonomy: Manages internal routing and infrastructure independently.
79
2-90: Which of the following routing protocols can you use on a TCP/IP internetwork with segments running at different speeds, making hop counts an inaccurate measure of route efficiency? (Choose all that apply) EIGRP RIP OSPF BGP
EIGRP OSPF
80
2-91: Which of the following statements are true about OSPF routing protocol? (Choose all that apply) OSFP is an interior gateway protocol OSFP is a link state protocol OSFP does not support Classless Inter-Domain Routing (CIDR) OSFP shares routes within an AS
OSFP is an interior gateway protocol OSFP is a link state protocol OSFP shares routes within an AS
81
2-92: Which is the term for the process by which dynamic routing protocols update other routers with routing table information? Convergence Distance vectoring Redistribution Dissemination
Convergence
82
2-94: Which of the following types of routing protocols route datagrams between AS's? EGP RIP IGP OSPF
EGP - Edge Gateway Protocol
83
2-96: Which of the following command-line tools can you use to create and modify static routes on a Unix or Linux system? (Choose all that apply) route ifconfig traceroute ip
route ip
84
2-97: Routers that use OSPF routing protocol calculate the relative costs of routes thru the network by exchanging which of the following specifications for each interface with other routers? Transmission speed Data link layer protocol Network medium IP address
Transmission Speed
85
2-98: Which of the following statements about BGP is not true? BGP is an exterior gateway protocol BGP is a link state routing protocol BGP supports Classless Inter-Domain Routing (CIDR) BGP shares routes among AS's
BGP is a link state routing protocol
86
CIDR
* CIDR (Classless Inter-Domain Routing): Efficient IP address allocation and routing method. * Supports supernetting: Aggregates multiple IP addresses into fewer routing entries. * Uses Variable-Length Subnet Masking (VLSM) for flexible IP address allocation. * Notation: IP address followed by a slash and a prefix length (e.g., 192.0.2.0/24). * Enhances IP address utilization, reducing wastage. * Facilitates route aggregation, simplifying and shrinking routing tables. * Helps conserve IPv4 address space, extending its viability.
87
VLSM
* VLSM (Variable Length Subnet Masking): Technique for efficient IP address allocation. * Allows creation of subnets of different sizes to match specific network requirements. * Minimizes IP address wastage by tailoring subnet sizes to actual needs. * Supports hierarchical network structures, simplifying management and routing. * Used with CIDR for route aggregation and improved routing efficiency. * Requires support from routing protocols (e.g., OSPF, EIGRP, RIPv2) for full functionality.
88
2-101: Which of the following routing protocols has both interior and exterior designations, based on whether it is used for routing within an AS or on the Internet? RIP OSPF EIGRP BGP
BGP
89
2-102: Which of the following network layer protocols includes a Time to Live (TTL) field? (Choose all that apply) IPv4 IPv6 ICMP IGMP
IPv4 IPv6
90
WAN Optimization
Collection of techniques to improve data transfer efficiency across a Wide Area Network. * **Data Deduplication**: Eliminates redundant data transmissions, reducing bandwidth usage. * **Compression**: Shrinks data size to speed up transfer rates. * Latency Optimization: Uses protocol spoofing and TCP optimization to minimize delays. * **Caching**: Stores frequently accessed data locally to avoid repeated WAN transfers. * **Traffic Shaping**: Prioritizes critical application traffic to ensure bandwidth availability.
91
Flow Control
Technique for regulating a systems's transmission speed
92
Distributed Switching
a hierarchical switching architecture in which remote switches (sometimes related to a department/division, but not always) handle most of the network traffic, with a host switch used only for traffic between remote locations
93
Are Full Duplex port connections subject to collisions?
No. Additionally, Full-Duplex connections do not define separate collision domains
94
Half-Duplex
Half-duplex is a type of communication in which data transmission can occur in both directions, but not simultaneously. In a half-duplex system, a device can either send or receive data at any given time, but not both.
95
Full-Duplex
Full-duplex refers to a type of communication where data transmission can occur simultaneously in both directions. \ Unlike half-duplex, full-duplex allows for the sending and receiving of information at the same time between devices.
96
2-106: Which of the following could be a valid MAC address for a network interface adapter? 10.124.25.43 FF:FF:FF:FF:FF:FF 00:1A:6B:31:9A:4E 03:AE:16:3H:5B:11 fe80::89a5:9ed4:a9d0:9ed7
00:1A:6B:31:9A:4E the rest are obviously wrong, except for the 4th anwser which is not hexidemical because it has an H in it
97
2-108: Which of the following cable types can be used to connect an MDI port on a workstation to an Auto-MDI-X port on an Ethernet switch? (Choose all that apply) A crossover UTP cable A straight-thru UTP cable A coaxial cable A single-mode fibre optic cable A multimode fibre optic cable
A crossover UTP cable A straight-thru UTP cable
98
Auto-MDI-X port
Auto-MDI-X, short for Automatic Medium-Dependent Interface Crossover * Ethernet port that can automatically detect and configure the appropriate MDI or MDIX mode to establish a connection * eliminates need for crossover cables
99
MDI
Medium-Dependent Interface Refers to the standard Ethernet port found on devices like routers, switches, and network cards
100
NDP
* **Neighbor Discovery Protocol** * **network layer protocol (3)** * **defines the new ICMPv6 packet types** which enable IPv6 systems to locate resources on the network, such as routers or DNS servers * Also can autoconfigure and detect duplicate IPv6 addresses
101
2-109: Which of the following is a network layer protocol that uses ICMPv6 messages to locate routers, DNS servers, and other nodes on an IPv6 network? BGP NDP OSPF PoE
NDP
102
IEEE 802.1Q
standard defining a mechanism (called Ethernet trunking by some manufacturers) that identifies the VLAN to which a packet belongs by inserting an extra 32-bit field into its Ethernet frame
103
IEEE 802.1AB
* **LLDP** - Link Layer Discovery Protocol * Vendor-neutral protocol for advertising identity, capabilities, and neighbors on a local area network
104
IEEE 802.1P
defines a mechanims for implementing QoS by adding a 3-bit field into the Ethernet frame
105
IEEE 802.1X
* authentication method called Port-based Network Access Control (PNAC) * a security feature that controls access to the network at the port level * used to prevent unauthorized devices from connecting to a network by enforcing authentication and authorization mechanisms before granting access
106
IEEE 802.1AX
* Link Aggregation Control Protocol (LACP) * mechanism for combining physical ports into a single logical channel
107
2-111: Each of the following CSMA/CD events occurs on an Ethernet network when two stations transmit simutaneously, although not in the order listed. Which of the following events occurs immediately after the collision? The two stations observe a random backoff interval The two stations transmit a jam signal The two stations stop transmitting The two stations listen to see if the channel is idle The two stations begin retransmitting their frames
The two stations stop transmitting
108
CSMA/CD collision steps
**CSJBRM** * **Collision Detection**: Devices detect a collision by observing mismatched data on the network cable. * **Stop Transmitting**: both devices stop transmitting * **Jam Signal**: Transmitting devices send a jam signal to ensure all network devices recognize the collision. * **Backoff Algorithm**: Devices wait for a random period based on the exponential backoff algorithm to reduce collision chances. * **Retry Transmission**: Devices check if the network is idle before retrying to transmit their data. * **Maximum Attempts**: After a certain number of failed attempts (typically 15 or 16), the device stops trying and reports a failure.
109
2-112: For CSMA/CD mechanism to function properly on an Ethernet network, host systems must be able to detect when a collisiion occurs, so they can react to it. Which of the following cabling errors can prevent the collision detection process from functioning properly? Excessively long cable segments Incorrect wiring pinouts Too many systems on a network An excessive number of collisions
Excessively long cable segments
110
Late Collisions
Occur when two or more packets collide after one has finished transmitting. This is an abnormal occurence
111
2-118: Which of the following about VLANs are true? (Choose all that apply) * All of the devices in a particular VLAN must be physicall connected to the same switch * A VLAN creates a limited broadcast domain on a switched network * You must have VLANs on a switched network for communication between computers on different cable segments to occur * A router is required for communication between VLANs
* A VLAN creates a limited broadcast domain on a switched network * A router is required for communication between VLANs
112
2-119: Which of the following elements can be used to identify the devices in a particualr VLAN? (Choose all that apply) Hardware addresses IP addresses DNS names Switch Port numbers
Hardware addresses Switch Port numbers Since Switches are Layer 2 devices, they cannot see IP addresses (layer 3) or DNS names (layer 7)
113
2-120: Alice has a network that consists of three VLANs defined on all of the network's switches: VLAN10 for Sales, VLAN20 for Marketing and VLAN30 for Accounting. Users are reporting that they cannot communicate with anyone outside of their own department/VLAN. What is the problem and what must Alice do? * The probelm is a faulty VLAN configuration on one of the switches. Alice needs to re-create the VLANs and configure each VLAN for routing * One of the VLANs is configured to filter all other VLAN traffic for security purposes. Alice needs to change the the filter on this VLAN * VLANs are limited to data link layer communication only. To allow communication between VLANs, Alice must add a router, or a layer 3 switch to the network and configure it to route traffic between the VLANs * The VLANs are using different data link layer protocols. VLANs must use the same data link layer protocol
VLANs are limited to data link layer communication only. To allow communication between VLANs, Alice must add a router, or a layer 3 switch to the network and configure it to route traffic between the VLANs
114
2-123: Which of the following modifications occur when you configure the native VLAN on your network switches to use 802.11q tagging? (Choose all that apply) Double tagged packets are prevented BPDU guards are applied Root guards are applied Trunk traffic is routed, not switched
Double tagged packets are prevented BPDU guards are applied
115
BPDU
* **Bridge Protocol Data Unit** * **detect loops in network topologies** * **They are Layer 2 frames** It describes the attributes of a switch port, such as its MAC address, priority, and cost to reach, and enables switches to gather information about each other in the context of the spanning tree protocol (STP)
116
IEEE 802.3X
* defines the mechanism for flow control on full-duplex Ethernet links * issued in 1997
117
2-125: Which of the following best explains how tagging the native VLAN traffic can improve in-band switch management security? By renaming the default VLAN By preventing double tagged packets By encrypting in-band management traffic By moving in-band management traffic off the native VLAN
By preventing double tagged packets
118
Double-tagged packets
Double-tagged packets, or double tagging, is a network attack method where an unauthorized party inserts a second VLAN tag into a data packet to gain access to VLANs, potentially compromising network security.
119
2-128: Port security on an Ethernet switch is implemented through the use of which of the following methods? Blacklisted MAC addresses Whitelisted MAC addresses Port-by-port MAC address filtering Spoofed MAC addresses
Port-by-port MAC address filtering
120
2-129: Which of the following best explains why networks using VoIP often have separate voice and data VLANs? To prevent voice and data packet conflicts To encrypt voice traffic To encrypt data traffic To prioritize voice traffic
To prioritize voice traffic
121
2-130: Which of the following protocols uses a form of flow control called the sliding window technique? UDP HTTP TCP DNS
TCP
122
2-133: Which of the following features helps to protect network switches from attacks related to STP? (Choose all that apply) BPDU guard Root guard DHCP snooping Geofencing
BPDU guard Root guard
123
2-134: Which of the following IEEE standard calls for the use of the CSMA/CA for MAC addresses mechanism? 802.11ac 802.1X 802.3 All of the above
802.11ac All wifi standards in 802.11 family use CSMA/CA for MAC addresses
124
CSMA/CA
* Carrier Sense Multiple Access with Collision Avoidance * protocol used in wireless networks, particularly in 802.11 networks, to minimize the potential for collisions. * operates at the data link layer * designed to balance the efficient use of the shared channel with the need to avoid collisions
125
2-136: Which of the following components are required for two computers to communicate using an IEEE 802.11 wireless LAN in an ad hoc topology? A router connected to the internet a WAP An external antenna None of the above
None of the above For ad-hoc mode, all your need is a wireless NIC. This is a BULLSHIT question as an external antenna could be mistaken with a wireless NIC
126
Wifi Standards and frequncies and speeds and ranges?
* 802.11a: wifi2; 5 Ghz; 54 Mbps; released: 1999; range: 125 feet indoors (38 meters) and 390 feet outdoors (120 meters). * 802.11b; wifi1; 2.4Ghz; 11 Mbps; Released: 1999; range: 125 feet indoors (38 meters) and 460 feet outdoors (140 meters). * 802.11g; wifi3; 2.4 Ghz; 54 Mbps; released in 2003; range 125 feet indoors (38 meters) and 460 feet outdoors (140 meters), it provides reliable coverage. * 802.11n; wifi4; 2.4/5 Ghz; 600 mbps; released in 2013; range 230 feet indoors (70 meters) and 820 feet outdoors (250 meters) * 802.11ac (Wave 1); wifi5; 5 Ghz; 1.73 Gbps; 2013; range 125 feet indoors (38 meters) and 390 feet outdoors (120 meters) * 802.11ac (Wave 2); Wifi5; 5Ghz; 3.47 Gbps; 2016; range 125 feet indoors (38 meters) and 390 feet outdoors (120 meters) * 802.11ax; wifi6; 2.4/5 Ghz/6ghz; 14 Gbps; 2019; range 59-200 feet indoors (18-61 meters), and 390 feet outdoors (120 meters)
127
2.4 Ghz
* **industrial, scientific and medical (ISM) band** * **14 channels, 22 Mhz wide** * shouldn't do adajacent channels to avoid congestion * try to avoid same channel to avoid interference * **channels used: 1, 6 and 11** * this does not need licensing/monitoring by the FCC * **microwave ovens can interfere, old wireless telephone handsets**
128
5 Ghz
* unlicensed national information infrastructure band * Channels are 20 Mhz wide and do not overlap * 36, 40, 44, 48, 52, 56, 60, 64 * Channel bonding: bond two channels together to get a 40 Mhz channel; 4 channels to a 80 Mhz, or all channels to 160 Mhz * Dynamic Frequency Selection - fancy term for radar avodance, switch channels when theres interference
129
Channel Bonding
* combines multiple channels * to increase bandwidth/throughput * problems: decrease available channels; could also have cross channel interference * highest possible is 160 Mhz using 20 Mhz bonded channels
130
MU-MIMO
multi-user, multiple input, multiple output * uses a single channel * uses multiple antenna * spread data across multiple antenna * does not decrease channel availability supported on: * IEEE 802.11n * IEEE 802.11ac * IEEE 802.11ax
131
2-138: Which of the following wifi standards is capable of supporting speeds of 54 Mbps and is also backwards compatible with IEEE 802.11b? IEEE 802.11a IEEE 802.11g IEEE 802.11n Bluetooth IEEE 802.11
IEEE 802.11g
132
2-140: Which of the following is a cellular communication technology that is virtually obsolete in the US? GSM CDMA TDMA LTE
TDMA
133
DSSS
* **Direct Sequence Spread Spectrum** * a modulation technique that **spreads a signal over a wider frequency band** * **enhanced resistance to interference** * **improved security** used by 802.11b
134
OFDM
Orthogonal Frequency-Division Multiplexing (OFDM) a modulation technique that divides a signal into multiple sub-signals to transmit simultaneously, reducing interference and efficiently using bandwidth. Used by everything 802.11 wifi standards
135
2-142: When designing a wireless LAN installation, which of the following are valid rasons to install a unidirectional antenna in an AP, rather than an omnidirection one? (Choose all that apply) * The AP will be located against a wall * There are many interior walls between the AP and the most distant workstation * A unidirectional antenna can be focused to a specific signal pattern width * All of the above
All of the above
136
2-143: How do wireless networking devices conforming to the IEEE 802.11n and 802.11ac standard achieve transmission speeds greater than 72.2 Mbps * By using DSSS modulation * By using mulitple antenna to transmit several data streams simultaneously * By using freqencies in the 5 Ghz range * By sacrificing transmission range for speed
By using mulitple antenna to transmit several data streams simultaneously
137
2-144: Which of the following are possible reasons why the 5 Ghz frequency tends to perform better than the 2.4 Ghz frequency on a wireless LAN? (Choose all that apply) * The 5 Ghz frequency has more channels than the 2.4 Ghz Frequency * The 5 Ghz frequency supports longer ranges than the 2.4 Ghz freqency * The 5 Ghz frequency conflicts with fewer common household devices than the 2.4 Ghz frequency * The 5 Ghz frequency transmits at faster speeds than the 2.4 Ghz frequency
* The 5 Ghz frequency has more channels than the 2.4 Ghz Frequency * The 5 Ghz frequency conflicts with fewer common household devices than the 2.4 Ghz frequency * The 5 Ghz frequency transmits at faster speeds than the 2.4 Ghz frequency
138
2-148: On an IEEE 802.11b/g/n wifi network running at 2.4 Ghz with multiple APs, the traditional best practice is to use channels 1, 6 and 11 with no two adjacent APs configured to use the same channel. Which of the following is the real reason why that is a good plan? * Channels 1, 6 and 11 are the only channels with freqencies that do not overlap * Channels 1, 6 and 11 have more bandwidth than the other channels * Channels 1, 6 and 11 have greater ranges than the other channels * Channels 1, 6 and 11 are the default settings on most routers
Channels 1, 6 and 11 are the only channels with freqencies that do not overlap
139
2-155: What is the maximum number of transmit and receive antenna supported by the currently ratified IEEE 802.11 wireless LAN standards? 2 4 8 16
8
140
2-157: Whichof the following IEEE wireless LAN standards define devies with a maximum aggregate channel width of 20 Mhz? (Choose all that apply) 802.11a 802.11g 802.11n 802.11ac
802.11a 802.11g the others use bonded channels 802.11n: 2 channels for 40 Mhz 802.11ac: 8 channels for 160 Mhz
141
Wifi Security Standards and things to remember
WEP: Wireless equivalent privacy * weak static key * between 64 and 128-bit * same for all devices WPA: wifi protected access * weak * uses TPIK (temporal key integrity protocol * every frame gets a new key, aka per-packet encryption WPA2: wifi protected access 2 * stronger encryption * CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol) replaced TPIK * added/switched to AES encryption * 128-bit key WPA3: wifi protected access 3 * uses SAE: simultaneous authenitcation of equals * 128-bit for home, 192-bit for enterprise * in enterprise setups, usually paired with a RADIUS server for AAA WPS: Wifi protected setup * very insecure * push a button to put AP into association mode * router has PIN, gives to device
142
2-163: When WPA wireless security protocl was release to replace WEP, it include TKIP for encryption. Which of the following was not one of the improvements that WPA and TPIK provide over WEP? TPIK enlarges the WEP encryption key TPIK modifies the encryption key for every packet WPA does not require a hardware upgrade for WEP devices TPIK eliminates the use of Pre-Shared Keys (PSKs)
TPIK eliminates the use of Pre-Shared Keys (PSKs)
143
2-165: upgrading a wifi network from WEP to WPA enables it to use TPIK for encryption which generates a unique key for each packet. Which of the following types of attacks does this capability prevent? DoS attacks Brute force attacks Replay attacks Deauthentication attacks
Replay attacks
144
2-172: Which of the following wireless security protocols can enable network users to authenticate using smartcards? WEP WPA2 EAP AES
EAP
145
2-173: Which of the following forms of WPA and WPA2 protocols require a RADIUS server? (Choose all that apply) WPA-Personal WPA-PSK WPA-Enterprise WPA-802.11X
WPA-Enterprise WPA-802.11X
146
EAP
EAP (Extensible Authentication Protocol) framework that provides flexible authentication in * wireless networks * point-to-point connections * provides various methods for secure user or device verification.
147
2-174: Which of the following forms of WPA and WPA2 protocols call for the use of a Pre-Shared Key (PSK)? WPA-Personal WPA-Enterprise WPA-EAP WPA-802.11X
WPA-Personal
148
2-181: WHich of the following wireless network security protocols provides open and shared key authentication options? WPA WEP WPA2 EAP
WEP
149
2-183: Which of the following is not a factor that weakens security of WEP used on early IEEE 802.11 Wireless LANs? 40-bit encryption keys 24-bit intialization vectors Static shared secret Open System Authentication
Open System Authentication
150
2-187: Which of the following is the maximum theoretical download speed for a 5G celluar network? 42 Mbps 150 Mbps 1 Gbps 10 Gbps 100 Gbps
10 Gbps
151
2-188: Which of the following statements about 5G cellular networks are true? (choose all apply) 5G networks can operate on three frequency bands 5G networks wiht the highest speeds also have a more limited range 4G devices can connect to 5G networks at reduced speeds On a 5G network, the lower frequency bands provide the highest speeds
5G networks can operate on three frequency bands 5G networks wiht the highest speeds also have a more limited range
152
2-192: On a network carrying both voice and data traffic, separate VLANs enable the voice traffic to be assigned a higher priority than the data traffic. Which of the following are methods for identifying the packets carrying voice traffic, so the switches can assign them to the voice VLAN? (Choose all that apply) MAC addresses VLAN tags IP addresses DNS Names
MAC addresses VLAN tags