Chap 2 - Network Implementations Flashcards
2-3: A WAP enables computers equipped with wireless networki interface adapters to function in which of the following topologies?
Star
Ad hoc
Bus
Infrastructure
Infrastructure
Infrastructure Wifi
standard wifi setup with devices communicating to a router
Ad Hoc Wifi
wireless computers communicate directly with each other
2-4: Ralph has been hired by a company to redesign its LAN. Right now, it has a single 100 Mbps Ethernet LAN with 40 users and 2 shared servers, all connected thru 3 hubs. The users on the network must be able to share files with each other and also access the shared servers. The users are complaining that the network is too slow. Mgmt states that cost is a factor that must be considered. Which of the following upgrade scenarios should Ralph recommend in this situation?
- Split the network kinto smaller segments with dedicated hubs as opposed to shared hubs
- Split the network into two rounded LANs with 20 users each
- Replace the hubs with switches to define separate collosion domains and filter unneccesary traffic from each segment
- Replace the hubs with a layer 3 switch and define 2 VLANS with 20 users each
Replace the hubs with switches to define separate collosion domains and filter unneccesary traffic from each segment
2-5: WHich of the following devices can split a single network into two collision domains while maininting a single broadcast domain?
Hub
Bridge
Switch
Router
Repeater
Bridge
Bridge
A bridge is a device used in networking to connect two separate networks, allowing traffic to pass between them.
The primary function of a bridge is to filter and forward network frames based on the MAC addresses of the devices (nodes) on the network.
A bridge operates at Layer 2, the Data Link Layer
traditional wired bridges have largely been replaced by network switches due to their enhanced functionality and efficiency, wireless bridges are still utilized in modern networking to extend or connect separate wireless networks
2-7: Which of the following devices operate at the physical layer of the OSI model? (Choose all that apply)
Routers
Hubs
Repeaters
Switches
Hubs
Repeaters
2-11: Which of the following terms us used to describe the method by which a firewall examins the port numbers in transport layer protocol headers?
IP address filtering
Service-dependent filtering
Deep Packet Inspection (DPI)
Next-Generation Firewall (NGF)
Service-dependent filtering
2-12: Which of the following devices can also be described as a multiport repeater?
Hub
Bridge
Switch
Router
Hub
2-13: Which of the following bridging types has never been used on Ethernet LANs?
Store and Forward
Transparent
Source route
Multiport
Source route
was used on Token Ring
2-14: Which of the following physicla network devices can be implemented as software in a computer’s OS? (Choose all that apply)
Hub
Switch
Router
Firewall
Router
Firewall
2-17: Which of the following statements about hubs and switches are true? (Choose all that apply)
- Hubs operate at the physical layer and switches operate at the network layer
- All of the devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain
- There are switches available with network layer functionality, but there are no hubs with that capability
- Switches create a separate broadcast domain for each connected device, whereas hubs create a single broadcast domamin for all connected devices
- All of the devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain
- There are switches available with network layer functionality, but there are no hubs with that capability
2-18: Which of the following problems is STP intended to prevent? (Choose all that apply)
Broadcast storms
Late collisions
Bridging Loops
Crosstalk
Broadcast storms
Bridging Loops
2-19: Which of the following devices perform essentially the same function? (Choose two)
Hubs
Bridges
Switches
Routers
Bridges
Switches
Switches are basically multiport Bridges
5 functional levels in a distributed control system, e.g.: SCADA
FDPSup&PP
- Field Level
- Direct Control
- Plant Supervisory
- Production Control
- Production Scheduling
SCADA
Supervisory Control and Data Acquisition
It is a type of industrial control system (ICS) that is used to control infrastructure and facility-based processes
2-21: Which of the following switch types immediately forwards frames after looking at only the destination address?
Cut-through
Source Router
Store-and-Forward
Destination
Cut-through
Switch types
Cut-through: fast because it only looks at the first six bytes (destination MAC address) when forwarding a frame
Store-and-Forward: take in the entire frame and verify its contents by performing a CRC calculation before forwarding it
2-24: SOHO networks typically use a multifunction connectivity device that can perform all but which one of the following functions?
DHCP
DNS
Switch
Router
Hub
NAT router
Access Point (AP)
Hub
2-25: Which of the following is the correct term for the process by which STP on a switch evaulates the paths through the network and places each port forwarding or blocking state?
Assimilation
Convergence
Tree-building
Listening
Convergence
Convergence
Convergence: to the state where all routers in a network have consistent and updated routing information, ensuring that every router has the same view of the network topology.
Also, process by switch STP populates its database with info about each port in a switch and designates the ports as forwarding or blocking
2-27: Which of the following is something that only a firewall capable of stateful packet inspection can do?
Filter traffic-based port numbers
Block traffic destined for specific IP addresses
Scan transport layer header fields for evidence of SYN floods
Block all TCP traffic from entering a network
Scan transport layer header fields for evidence of SYN floods
2-28: In Local Area networking, which of the following is not a type of bridge?
Store and Forward
Routing
Transparent
Multiport
Routing
Routers/Routing happens at Layer 3. Bridges are on Layer 2
2-29: Which of the following methods are typically used by IDSs to analyze incoming network traffic? (Choose all that apply)
Anomaly-based detection
Behavior-based detection
Signature-based detection
Statistic-based detection
Anomaly-based detection
Signature-based detection