Chap 2 - Network Implementations Flashcards
2-3: A WAP enables computers equipped with wireless networki interface adapters to function in which of the following topologies?
Star
Ad hoc
Bus
Infrastructure
Infrastructure
Infrastructure Wifi
standard wifi setup with devices communicating to a router
Ad Hoc Wifi
wireless computers communicate directly with each other
2-4: Ralph has been hired by a company to redesign its LAN. Right now, it has a single 100 Mbps Ethernet LAN with 40 users and 2 shared servers, all connected thru 3 hubs. The users on the network must be able to share files with each other and also access the shared servers. The users are complaining that the network is too slow. Mgmt states that cost is a factor that must be considered. Which of the following upgrade scenarios should Ralph recommend in this situation?
- Split the network kinto smaller segments with dedicated hubs as opposed to shared hubs
- Split the network into two rounded LANs with 20 users each
- Replace the hubs with switches to define separate collosion domains and filter unneccesary traffic from each segment
- Replace the hubs with a layer 3 switch and define 2 VLANS with 20 users each
Replace the hubs with switches to define separate collosion domains and filter unneccesary traffic from each segment
2-5: WHich of the following devices can split a single network into two collision domains while maininting a single broadcast domain?
Hub
Bridge
Switch
Router
Repeater
Bridge
Bridge
A bridge is a device used in networking to connect two separate networks, allowing traffic to pass between them.
The primary function of a bridge is to filter and forward network frames based on the MAC addresses of the devices (nodes) on the network.
A bridge operates at Layer 2, the Data Link Layer
traditional wired bridges have largely been replaced by network switches due to their enhanced functionality and efficiency, wireless bridges are still utilized in modern networking to extend or connect separate wireless networks
2-7: Which of the following devices operate at the physical layer of the OSI model? (Choose all that apply)
Routers
Hubs
Repeaters
Switches
Hubs
Repeaters
2-11: Which of the following terms us used to describe the method by which a firewall examins the port numbers in transport layer protocol headers?
IP address filtering
Service-dependent filtering
Deep Packet Inspection (DPI)
Next-Generation Firewall (NGF)
Service-dependent filtering
2-12: Which of the following devices can also be described as a multiport repeater?
Hub
Bridge
Switch
Router
Hub
2-13: Which of the following bridging types has never been used on Ethernet LANs?
Store and Forward
Transparent
Source route
Multiport
Source route
was used on Token Ring
2-14: Which of the following physicla network devices can be implemented as software in a computer’s OS? (Choose all that apply)
Hub
Switch
Router
Firewall
Router
Firewall
2-17: Which of the following statements about hubs and switches are true? (Choose all that apply)
- Hubs operate at the physical layer and switches operate at the network layer
- All of the devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain
- There are switches available with network layer functionality, but there are no hubs with that capability
- Switches create a separate broadcast domain for each connected device, whereas hubs create a single broadcast domamin for all connected devices
- All of the devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain
- There are switches available with network layer functionality, but there are no hubs with that capability
2-18: Which of the following problems is STP intended to prevent? (Choose all that apply)
Broadcast storms
Late collisions
Bridging Loops
Crosstalk
Broadcast storms
Bridging Loops
2-19: Which of the following devices perform essentially the same function? (Choose two)
Hubs
Bridges
Switches
Routers
Bridges
Switches
Switches are basically multiport Bridges
5 functional levels in a distributed control system, e.g.: SCADA
FDPSup&PP
- Field Level
- Direct Control
- Plant Supervisory
- Production Control
- Production Scheduling
SCADA
Supervisory Control and Data Acquisition
It is a type of industrial control system (ICS) that is used to control infrastructure and facility-based processes
2-21: Which of the following switch types immediately forwards frames after looking at only the destination address?
Cut-through
Source Router
Store-and-Forward
Destination
Cut-through
Switch types
Cut-through: fast because it only looks at the first six bytes (destination MAC address) when forwarding a frame
Store-and-Forward: take in the entire frame and verify its contents by performing a CRC calculation before forwarding it
2-24: SOHO networks typically use a multifunction connectivity device that can perform all but which one of the following functions?
DHCP
DNS
Switch
Router
Hub
NAT router
Access Point (AP)
Hub
2-25: Which of the following is the correct term for the process by which STP on a switch evaulates the paths through the network and places each port forwarding or blocking state?
Assimilation
Convergence
Tree-building
Listening
Convergence
Convergence
Convergence: to the state where all routers in a network have consistent and updated routing information, ensuring that every router has the same view of the network topology.
Also, process by switch STP populates its database with info about each port in a switch and designates the ports as forwarding or blocking
2-27: Which of the following is something that only a firewall capable of stateful packet inspection can do?
Filter traffic-based port numbers
Block traffic destined for specific IP addresses
Scan transport layer header fields for evidence of SYN floods
Block all TCP traffic from entering a network
Scan transport layer header fields for evidence of SYN floods
2-28: In Local Area networking, which of the following is not a type of bridge?
Store and Forward
Routing
Transparent
Multiport
Routing
Routers/Routing happens at Layer 3. Bridges are on Layer 2
2-29: Which of the following methods are typically used by IDSs to analyze incoming network traffic? (Choose all that apply)
Anomaly-based detection
Behavior-based detection
Signature-based detection
Statistic-based detection
Anomaly-based detection
Signature-based detection
2-31: Which of the following devices can you use to connect two multimode fiber optpic Ethernet networks running in buildings 2000 meters apart using a single-mode fiber optic cable segment running at the same speed, while maintaining a single collision domain?
Bridge
Switch
Router
Media Converter
Media Converter
2-33: Which of the following devices enables two computers to communicate when they are using different protocols at each layer of the OSI model?
A router
A switch
A hub
A gateway
A gateway
2-35: Which of the following statements are true about switches and routers? (Choose all that apply)
- Routers operate at the network layer, whereas switches operate at the data link layer
- All of the device connected to a switch are part of a single broadcast domain, whereas the networks connected to a router form separate broadcast domains
- Routers can communicate with each other and share information but switches cannot
- Switches forward packets based on their hardware address, whereas routers forward packets based on their IP Address
- Routers operate at the network layer, whereas switches operate at the data link layer
- All of the device connected to a switch are part of a single broadcast domain, whereas the networks connected to a router form separate broadcast domains
- Switches forward packets based on their hardware address, whereas routers forward packets based on their IP Address
Do Routers Forward Broadcasts?
No
2-40: Which of the following explains why splitting a large switched Ethernet LAN into two LANs by adding a router can help alleviate traffic congestion and improve performance? (Choose all that apply)
Adding a router reduces the amount of broadcast traffic on each of the two LANs
Adding a router reduces the amount of unicast traffic on each of the two LANs
Adding a router diverts traffic to an alternate path thru the network
Adding a router prevents computers on one LAN from communicating with computers on another LAN
Adding a router reduces the amount of broadcast traffic on each of the two LANs
Adding a router reduces the amount of unicast traffic on each of the two LANs
2-41: A small business office currently has a 100Base-TX Ethernet network with a single 8-port hub. All of the hub ports are currently populated and the business owner wants to expand the network further. However, the hub does not have an uplink port. The owner has purchased a new hub, also with eight ports, which does have an uplink port, but he does not know how to connect them together. What must the owner do to install the new hub on the network?
- Use a standard patch cable to connect a standard port on the existing hub to a standard port on the new hub
- Use a standard patch cable to connect a standard port on the existing hub to the uplink port on the new hub
- Purchase a crossover cable and use it to connect a standard port on the existing hub to the uplink port on the new hub
- Purchase a second hub with an uplink port to replace the old one and use a standard patch cable to connect the two uplink ports together
Use a standard patch cable to connect a standard port on the existing hub to the uplink port on the new hub
Uplink Port
A hub’s uplink port is a special port used to connect one hub to another hub, switch, or router without requiring a crossover cable.
Standard Patch Cable vs Crossover Cable
Standard Network Patch Cable (Straight-Through Cable):
- wire arrangement is identical on both ends of the cable. This means that Pin 1 on one end connects to Pin 1 on the other end, Pin 2 to Pin 2, and so on.
- This type of cable is used to connect a device to a switch, hub, or router.
- It’s the most common type of Ethernet cable used for connecting different types of devices in a network, such as a computer to a network switch.
Network Crossover Cable:
- has wires that “cross over” at one end. Typically, the transmit (TX) and receive (RX) pairs are swapped. For example, Pins 1 and 2 (transmitting pins on a standard Ethernet interface) on one end are connected to Pins 3 and 6 (receiving pins) on the other end, and vice versa.
- Crossover cables are used to connect two similar devices directly, such as two computers without a switch or hub in between, or two switches to each other.
2-42: Which of the following task scan you perform to split a large switched LAN into multiple broadcast domains? (Choose all that apply)
Replace one or more switches with hubs
Install a firewall to filter broadcast traffic
Enable STP on the switches
Create VLANs in the switches
Install routers on the network
Create VLANs in the switches
Install routers on the network
2-43: Which of the following statements about bridges and switches is true?
- Bridges and switches are network layer devices that use logical addressing to forward frames
- Bridges and switches are data link layer devices that use MAC addresses to forward frames
- Bridges and switches build their internal tables based on destination addresses and forward packets based on source address
- Bridges and switches must support the network layer protocol implemented on the LAN
- Each port on a bridge and a switch defines a separate broadcast domain
Bridges and switches are data link layer devices that use MAC addresses to forward frames
2-46: Which of the following is the primary reason why replacing hubs with switches on an Ethernet LAN improves its performance?
Switches forward packets faster than hubs
Switches do not forward broadcast transmissions
Switches reduce the number of collisions on the network
Switches read IP addresses of packets, not the hardware addresses
Switches reduce the number of collisions on the network
2-48: Which of the following terms are used to describe the device used to place calls on a VoIP installation? (Choose all that apply)
Terminal
Gateway
Endpoint
PBX
Terminal
Endpoint
VoIP PBX
Voice over IP Private branch exchange
device that switches calls between endpoints on the local IP network and provides access to external internet lines
Hubs
- physical layer (Layer 1) devices
- amplify and repeat signals out all ports, regardless of destination except where the data’s source port
- physical connect systems in star topology
- Typically provide an internal croosover circuit connection
- Have uplink ports to extend the distance of a star network, forming a hierarchical star
2-51: Which of the following hub types are supported by the 100Base-TX physical layer specification? (Choose all that apply)
Class I
Class II
Class III
Class IV
Class I:
* perform signal translation
* network can only have one per collision domain
Class II
* cannot peform signal translation
* network can only have two per collision domain
2-52: Which of the following statements about routers is not true?
- Routers can connect two or more networks with dissimilar data link protocols and media
- Routers can connect two or more networks with the same data link protocols and media
- Routers store and maintain route information in a local text file
- Servers with multiple network interfaces can be configured to function as software routers
- Routers can learn and populate their routing tables thru static and dynamic routing
Routers store and maintain route information in a local text file
is false
Routers store route information in memory
2-53: The network admin for a small business is installing a computer to function as a firewall protecting their internetwork from Internet intrusion. At which of the following locations should the administrator install the firewall system?
Anywhere on the private internetwork as long as the internet is accessible
Between the internet access router and the ISPs network
At the ISPs network site
Between the internet access router and the rest of private internetwork
Between the internet access router and the rest of private internetwork
Internetwork
An internetwork, or inter-network, is a collection of individual networks, connected by intermediate networking devices, that functions as a single, large network.
The most well-known example of an internetwork is the Internet. Internetworking allows for the connection and communication between different network types and architectures through the use of routing technologies. It enables data packets to traverse from one network to another, making global communication possible.
Intranet
A private network that is contained within an enterprise or organization.
It uses web technologies (such as HTTP and web browsers) to provide a secure environment for the organization’s members to communicate, share information, collaborate, and access internal resources.
An intranet is typically protected from outside access by a network security system such as a firewall. It is designed for internal use and is not accessible to the public.
2-55: Proxy servers operate at which layer of the OSI reference model?
Data link
Network
Transport
Application
Application
2-57: Which of the following statements about conent filtering in firewalls is true?
Content filters examine the source IP address of packets to locate potential threats
Content filters enable switches to direct packets out thru the correct port
Content filters examine the data carried within packets for potentially objectionable materials
Content filters use frequently updated signatures to locate packets containing malware
Content filters examine the data carried within packets for potentially objectionable materials
2-60: Which of the following devices enable users on a private network to access the internet by substitiuting a registered IP address for their private addresses? (Choose all that apply)
NAT Router
RADIUS Server
Proxy Server
UTM appliance
NAT Router
Proxy Server
2-61: HVAC systems can use IoT to monitor which of the following? (Choose all that apply)
Temperature
Pressure
Humidity
Printers
Occupancy
Camera
Door locks
Temperature
Pressure
Humidity
Occupancy
2-62: A VPN Headend is an advance type of which of the following devices?
Switch
Router
Gateway
Bridge
Router
VPN headend
- server(s) that manages connections, encryption, and the routing of VPN traffic
- acts as the endpoint for VPN clients, handling the initiation, maintenance, and termination of VPN connections
- responsible for the aggregation of multiple VPN connections
- ensures that data transmitted over the VPN is secure and properly routed to its destination within a private network
- Handles authentication of users, encryption of data, and the assignment of IP addresses to VPN clients.
- It is considered an advanced type of router
2-64: Ralph, the admin of a 500-node private internetwork is devising a plan to connect the network to the Internet. The primary objective of the project is to provide allof the network users with access to the web and email services while keeping the client computers safe from unauthorized users on the Internet. The secondary objectives of the project are to avoid having to manually configure the IP addresses of each one of the client computers individually and to provide a means of monitoring and regulating the users’ access to the Internet. Ralph submits a proposal calling for the user of private IP addresses on the client computers and a series of proxy servers with public, registered, IP addresses, connected to the Internet using multiple T-1 lines. Which of the following statement about Ralph’s proposed Internet access solution is true?
- The proposal failes to satisfy both the primary and the secondary objectives
- The proposal satisfies the primary objective but neither of the secondary objectives
- The proposal satisfies the primary objective and one of the secondary objectives
- The proposal satisfies the primary objective and both of the secondary objectives
The proposal satisfies the primary objective and one of the secondary objectives
Proxy servers cannot assign IP addresses, and the proposal makes no mention of DHCP or any other TCP/IP addressing/assignment mechanism
2-65: Which of the following protocols can be used by wireless controllers to communicate with the APs on a WLAN? Choose all that apply
CAPWAP
LWAPP
LDAP
PPTP
CAPWAP
LWAPP
CAPWAP
- CAPWAP, which stands for Control And Provisioning of Wireless Access Points, is a protocol that enables a central controller to manage a collection of wireless access points (WAPs).
- CAPWAP separates the control and data traffic between access points and the controller.
- The control plane, which carries administrative and management traffic, allows the controller to manage the access points, including their configuration, firmware updates, and network information.
- The data plane, on the other hand, handles the actual user data traffic.
LWAPP
- Lightweight Access Point Protocol
- was used to control multiple Wi-Fi wireless access points at once.
- Was superseeded by CAPWAP
At which OSI model layers does a multilayer switch operate?
Layer 2: Data Link - operates like normal switch, creating individual collisiion domains and able to create VLANs
Layer 3: Network - provides routing capabilites by forwarding packets in between VLANs
Layer 4: Transport - (only some devices) distinguish between TCP and UDP traffic using port numbers to forward traffic
PPTP
- PPTP, or Point-to-Point Tunneling Protocol, is a method used for implementing virtual private networks (VPNs).
- One of the oldest VPN protocols developed and has been widely used since its introduction in the late 1990s.
- PPTP encapsulates network protocol data packets within an IP envelope, using a modified version of the Generic Routing Encapsulation (GRE) protocol.
- This encapsulation allows data packets to be transmitted over a public network (like the Internet) while maintaining privacy, thus creating a “tunnel” through which secure communication can occur between remote users and private networks.
- Considered obselete
NLB
Network Load Balancing
group of servers all running the same application that distribute incoming traffic among themselves
2-69: A load balancer is a type of which of the following devices?
Switch
Router
Gateway
Firewall
Router
2-73: Which of the following statements about proxy servers and NAT servers are true? (Choose all that apply)
- NAT servers and proxy servers can both provide internet access to clients running any application
- NAT servers and proxy servers both use public IP addresses
- NAT servers and proxy servers both access Internet servers and relay the responses to network clients
- Both NAT and proxy server cache web data for later use
- NAT servers and proxy servers both use public IP addresses
- NAT servers and proxy servers both access Internet servers and relay the responses to network clients
Proxy Servers operate at Layer 7, Application, and can only provide internet access to specific applications.
NAT Servers operate at Layer 3, Network
RAS
- Remote Access Service
- a feature provided by many operating systems that allows users and administrators to connect to a network from a remote location.
- This service enables access to network resources, applications, and data as if the user were physically connected to the network. RAS can use various communication protocols, including the Internet or direct dial-up connections via telephone lines.
2-76: Which of the following is not a function that is typically provided by a UTM (Unified Threat Management) appliance?
VPN
Network Firewall
Packet forwarding
Antivirus protection
Packet forwarding