Final Exam Flashcards

1
Q

The wireless device that is marked X in the following image is a ________. (has smart phone in image).

wireless access point
wireless router
wireless controller
wireless switch

A

wireless router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The strength of the electromagnetic waves being radiated from an antenna is referred to as gain, which involves a measurement of both direction and efficiency of a transmission. Gain is commonly measured using the dBi unit of measure.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a wireless channel uses more than one frequency, the transmission method is called a ________ spectrum.

broad
multi
long
spread

A

spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not a variation of spread-spectrum technology?

DSSS
FHSS
DFSS
OFDM

A

DFSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following wireless standards operate at a maximum bandwidth of less than 20 Mbps? (Choose two.)

  1. 11
  2. 11a
  3. 11b
  4. 11g
A
  1. 11

802. 11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________.

HBSS, BSS, ESS
IBSS, BSS, RSS
HBSS, BSS, IBSS
IBSS, BSS, ESS

A

IBSS, BSS, ESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WLANs use a technology called carrier sense multiple access collision detection (CSMA/CD).

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the 802.11 2.4-GHz band channel width?

22 MHz
40 MHz
5 MHz
12 MHz

A

22 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which channel is not one of the non-overlapping channels when using the 802.11 2.4-GHz band?

1
5
6
11

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An omnidirectional antenna radiates power at relatively unequal power levels in all directions (somewhat similar to the theoretical isotropic antenna)

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is not a security threat for WLANs?

Warchalking
Rogue access point
Wardialing
WEP and WPA security cracking

A

Wardialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except what?

Enabling SSID broadcast
MAC address filtering
Preshared key
IEEE 802.1X

A

Enabling SSID broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not a WLAN security standard?

WEP
WAP
WPA
WPA2

A

WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA2 uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) for integrity checking and Data Encryption Standard (DES) for encryption.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WLAN security based on a PSK technology is called ________ mode.

personal
private
home
WEP

A

personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are broad categories of wireless antenna that are based on coverage? (Choose two.)

WLAN
SSID
Omnidirectional
Unidirectional
Wired Equivalent Protocol (WEP)
A

Unidirectional

Omnidirectional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a variation of spread-spectrum technology use in wireless local-area networks? (Choose three.)

WEP
Wi-Fi
WPA - 2
Direct-sequence spread spectrum (DSSS)
Frequency-hopping spread spectrum (FHSS)
Orthogonal frequency-division multiplexing (OFDM)
A

Direct-sequence spread spectrum (DSSS)
Frequency-hopping spread spectrum (FHSS)
Orthogonal frequency-division multiplexing (OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What transmission method is used with IEEE 802.11ac?

DSS
FHSS
OFDM
FHDM

A

OFDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which IEEE standard is used to authenticate wireless clients?

  1. 11i
  2. 3ac
  3. 2af
  4. 1X
A

802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the encryption mechanism that is used with the WPA2 security standard?

AES
RC4
SHA-1
MD5

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The following image is an example of what type of WAN connection? (3 buildings each with routers connecting to a cloud)

ISDN network, packet-switched connection
Frame Relay network, circuit-switched connection
Frame Relay network, packet-switched connection
ISDN network, circuit switched connection

A

Frame Relay network, packet-switched connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The data rate for a T3 link is ________.

45.736 Mbps to 51.84 Mbps
44.736 Mbps to 52.84 Mbps
44.736 Mbps
40 Mbps to 50 Mbps

A

44.736 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following are not examples of wireless media?

Cellular phone
LTE
HSPA+
DSL

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link?

155 Mbps

  1. 84 Mbps
  2. 52 Mbps
  3. 54 Mbps
A

155.52 Mbps

25
Q

Asynchronous Transfer Mode (ATM), a cell-switched connection technology that uses 53-byte fixed-length cells, is often categorized as a packet-switched connection technology.

True
False

A

True

26
Q

Which of the following is a common Layer 2 protocol that could run over a dedicated leased line?

Transmission Control Protocol (TCP)
Point-to-Point Protocol (PPP)
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
Routing Information Protocol (RIP)

A

Point-to-Point Protocol (PPP)

27
Q

A service level agreement (SLA) is used to specify the specific performance metrics (for example, available bandwidth and maximum delay) that are guaranteed for a service over a certain percentage

True
False

A

True

28
Q

Which type of ISDN circuit provides 23 B channels and 1 D channel?

BRI
IDSL
PRI
SDSL

A

PRI

29
Q

What is the name of the digital modem device that is used to terminate a T1 circuit?

SmartJack
Network interface
CSU/DSU
ESU

A

CSU/DSU

30
Q

What are the two different supported frame formats that are used when deploying a T1 leased line?

Super Frame
Extended Super Frame
Multi Frame
Distributed Frame

A

Super Frame

Extended Super Frame

31
Q

A common Layer 2 protocol used on dedicated leased lines is ________.

PPP
CHAP
TCP/IP
IPsec

A

PPP

32
Q

Which is not a primary feature offered by Link Control Protocol (LCP)?

Looped-link detection
Error detection
Authentication
Packet detection

A

Packet detection

33
Q

A demarc is the point in a telephone network where the maintenance responsibility passes from a telephone company to the subscriber (unless the subscriber has purchased inside wiring maintenance).

True
False

A

True

34
Q

MPLS inserts a 32-bit header between Layer 2 and Layer 3 headers. Because this header is ________ between the Layer 2 and Layer 3 headers, it is sometimes referred to as a(n) ________ header.

inserted, insert
added, addon
inserted, proxy
shimmed, shim

A

shimmed, shim

35
Q

What are the two commonly available PPP authentication mechanisms?

PAP
RADIUS
TACACS+
CHAP

A

PAP

CHAP

36
Q

What is the name of the protocol that is commonly used to authenticate devices that connect via DSL?

SLIP
PPPoE
PPP
ROAM

A

PPPoE

37
Q

What is the maximum distance that an ADSL modem (client) can be from a provider’s DSLAM?

14,000 feet
15,000 feet
18,000 feet
22,000 feet

A

18,000 feet

38
Q

What is the theoretical maximum downstream speed of ADSL?

4 Mbps
1.544 Mbps
52 Mbps
8 Mbps

A

8 Mbps

39
Q

What is the name of the specification that indicates the frequencies that are dedicated for data transmission over cable lines?

DOCSIS
EIA/TIA 568a
SONET
IEEE 802.6

A

DOCSIS

40
Q

Both PC1 and Server 1 have a default gateway. What is the purpose of a default gateway?

Block packets
Forward frames
Route packets to a different subnet
Route packets to the same subnet

A

Route packets to a different subnet

41
Q

What is the purpose of ARP?

ARP resolves the MAC address to a NetBIOS name.
ARP resolves an IP address to a hostname.
ARP locates the default gateway of the network.
ARP resolves the IP address of a Host to its MAC address.

A

ARP resolves the IP address of a Host to its MAC address.

42
Q

The routes on R1 and R2 are directly connected routes.

True
False

A

True

43
Q

At the moment, PC1 cannot reach the Internet. You add a static default route to R1 that sends all traffic to an unknown destination out S1/1 and add a static default route to R2 that sends all traffic to unknown destination out S1/0. Can a user on PC1 access the Internet?

Yes, PC1 has Internet access.
No, packets will not make it past R1.
No, packets can make it to the Internet, but they will never make it back to PC1.
No, packets will stop at R2

A

No, packets can make it to the Internet, but they will never make it back to PC1.

44
Q

What is the administrative distance of a directly connected network?

0
90
110
170

A

0

45
Q

What is the administrative distance for an internal EIGRP route?

1
90
110
170

A

90

46
Q

What are the two methods used to prevent loops in a distance vector routing protocol?

Split horizon and hold-down timer
Split horizon and poison reverse
Poison reverse and hop count
Split horizon and hop count

A

Split horizon and poison reverse

47
Q

Which of the following is an exterior gateway protocol?

BGP
RIP
OSPF
EIGRP

A

BGP

48
Q

Which of the following is a distance vector routing protocol that uses a metric of hops?

IS-IS
OSPF
EIGRP
Correct RIP

A

RIP

49
Q

Match the type of NAT on the left with the correct definition on the right.

a) Inside local
b) Inside global
c) Outside local
d) Outside global

  1. A public IP address referencing an outside device
  2. A public IP address referencing an inside device
  3. A private IP address referencing an outside device
  4. A private IP address referencing an inside device

A1 B2 C3 D4
A4 B2 C3 D1
A3 B2 C4 D1
A2 B1 C4 D3

A

A4 B2 C3 D1

50
Q

For static NAT to work, how many inside global addresses are needed for inside local addresses?

One inside global addresses for unlimited inside local addresses
Two inside global addresses for every inside local address
Ten inside global addresses for unlimited inside local addresses
One inside global address for every inside local address

A

One inside global address for every inside local address

51
Q

R1 is using both NAT and PAT. What is the purpose of the port numbers in the translation table?

Basic NAT uses the port numbers to track separate communication flows.
PAT uses the port numbers to track separate communication flows.
The port numbers are not used.
PAT only uses the destination port to track separate communication flows.

A

PAT uses the port numbers to track separate communication flows.

52
Q

Which of the following is a multicast routing protocol?

PIM
IGMP
IS-IS
OSPF

A

PIM

53
Q

What is the hop count that is used by RIP to indicate an unreachable metric?

16
0
15
255

A

16

54
Q

What factors are used to calculate the OSPF cost?

Bandwidth, delay
Bandwidth
Delay
Bandwidth, MTU

A

Bandwidth

55
Q

What factors are used in the calculation of the default EIGRP metric?

Delay
Bandwidth
Bandwidth, delay
Bandwidth, MTU

A

Bandwidth, delay

56
Q

Which message type was added with IGMP Version 2?

Join
Prune
Combine
Leave

A

Leave

57
Q

Which feature was added with IGMPv3 that allowed a client to specify the joining of a group and a specific source server?

SSM
SRM
SME
SMJ

A

SSM

58
Q

Which mode of PIM uses a source distribution tree?

Sparse mode
Dense mode
Broadcast mode
Source mode

A

Dense mode

59
Q

Which mode of PIM uses a rendezvous point (RP)?

Broadcast mode
Dense mode
Sparse mode
Source mode

A

Sparse mode