Final Exam Flashcards
The wireless device that is marked X in the following image is a ________. (has smart phone in image).
wireless access point
wireless router
wireless controller
wireless switch
wireless router
The strength of the electromagnetic waves being radiated from an antenna is referred to as gain, which involves a measurement of both direction and efficiency of a transmission. Gain is commonly measured using the dBi unit of measure.
True
False
True
When a wireless channel uses more than one frequency, the transmission method is called a ________ spectrum.
broad
multi
long
spread
spread
Which of the following is not a variation of spread-spectrum technology?
DSSS
FHSS
DFSS
OFDM
DFSS
Which of the following wireless standards operate at a maximum bandwidth of less than 20 Mbps? (Choose two.)
- 11
- 11a
- 11b
- 11g
- 11
802. 11b
WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________.
HBSS, BSS, ESS
IBSS, BSS, RSS
HBSS, BSS, IBSS
IBSS, BSS, ESS
IBSS, BSS, ESS
WLANs use a technology called carrier sense multiple access collision detection (CSMA/CD).
True
False
False
What is the 802.11 2.4-GHz band channel width?
22 MHz
40 MHz
5 MHz
12 MHz
22 MHz
Which channel is not one of the non-overlapping channels when using the 802.11 2.4-GHz band?
1
5
6
11
5
An omnidirectional antenna radiates power at relatively unequal power levels in all directions (somewhat similar to the theoretical isotropic antenna)
True
False
False
Which is not a security threat for WLANs?
Warchalking
Rogue access point
Wardialing
WEP and WPA security cracking
Wardialing
To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except what?
Enabling SSID broadcast
MAC address filtering
Preshared key
IEEE 802.1X
Enabling SSID broadcast
Which of the following is not a WLAN security standard?
WEP
WAP
WPA
WPA2
WAP
WPA2 uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) for integrity checking and Data Encryption Standard (DES) for encryption.
True
False
False
WLAN security based on a PSK technology is called ________ mode.
personal
private
home
WEP
personal
Which of the following are broad categories of wireless antenna that are based on coverage? (Choose two.)
WLAN SSID Omnidirectional Unidirectional Wired Equivalent Protocol (WEP)
Unidirectional
Omnidirectional
Which of the following is a variation of spread-spectrum technology use in wireless local-area networks? (Choose three.)
WEP Wi-Fi WPA - 2 Direct-sequence spread spectrum (DSSS) Frequency-hopping spread spectrum (FHSS) Orthogonal frequency-division multiplexing (OFDM)
Direct-sequence spread spectrum (DSSS)
Frequency-hopping spread spectrum (FHSS)
Orthogonal frequency-division multiplexing (OFDM)
What transmission method is used with IEEE 802.11ac?
DSS
FHSS
OFDM
FHDM
OFDM
Which IEEE standard is used to authenticate wireless clients?
- 11i
- 3ac
- 2af
- 1X
802.1X
What is the encryption mechanism that is used with the WPA2 security standard?
AES
RC4
SHA-1
MD5
AES
The following image is an example of what type of WAN connection? (3 buildings each with routers connecting to a cloud)
ISDN network, packet-switched connection
Frame Relay network, circuit-switched connection
Frame Relay network, packet-switched connection
ISDN network, circuit switched connection
Frame Relay network, packet-switched connection
The data rate for a T3 link is ________.
45.736 Mbps to 51.84 Mbps
44.736 Mbps to 52.84 Mbps
44.736 Mbps
40 Mbps to 50 Mbps
44.736 Mbps
Which of the following are not examples of wireless media?
Cellular phone
LTE
HSPA+
DSL
DSL
If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link?
155 Mbps
- 84 Mbps
- 52 Mbps
- 54 Mbps
155.52 Mbps
Asynchronous Transfer Mode (ATM), a cell-switched connection technology that uses 53-byte fixed-length cells, is often categorized as a packet-switched connection technology.
True
False
True
Which of the following is a common Layer 2 protocol that could run over a dedicated leased line?
Transmission Control Protocol (TCP)
Point-to-Point Protocol (PPP)
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
Routing Information Protocol (RIP)
Point-to-Point Protocol (PPP)
A service level agreement (SLA) is used to specify the specific performance metrics (for example, available bandwidth and maximum delay) that are guaranteed for a service over a certain percentage
True
False
True
Which type of ISDN circuit provides 23 B channels and 1 D channel?
BRI
IDSL
PRI
SDSL
PRI
What is the name of the digital modem device that is used to terminate a T1 circuit?
SmartJack
Network interface
CSU/DSU
ESU
CSU/DSU
What are the two different supported frame formats that are used when deploying a T1 leased line?
Super Frame
Extended Super Frame
Multi Frame
Distributed Frame
Super Frame
Extended Super Frame
A common Layer 2 protocol used on dedicated leased lines is ________.
PPP
CHAP
TCP/IP
IPsec
PPP
Which is not a primary feature offered by Link Control Protocol (LCP)?
Looped-link detection
Error detection
Authentication
Packet detection
Packet detection
A demarc is the point in a telephone network where the maintenance responsibility passes from a telephone company to the subscriber (unless the subscriber has purchased inside wiring maintenance).
True
False
True
MPLS inserts a 32-bit header between Layer 2 and Layer 3 headers. Because this header is ________ between the Layer 2 and Layer 3 headers, it is sometimes referred to as a(n) ________ header.
inserted, insert
added, addon
inserted, proxy
shimmed, shim
shimmed, shim
What are the two commonly available PPP authentication mechanisms?
PAP
RADIUS
TACACS+
CHAP
PAP
CHAP
What is the name of the protocol that is commonly used to authenticate devices that connect via DSL?
SLIP
PPPoE
PPP
ROAM
PPPoE
What is the maximum distance that an ADSL modem (client) can be from a provider’s DSLAM?
14,000 feet
15,000 feet
18,000 feet
22,000 feet
18,000 feet
What is the theoretical maximum downstream speed of ADSL?
4 Mbps
1.544 Mbps
52 Mbps
8 Mbps
8 Mbps
What is the name of the specification that indicates the frequencies that are dedicated for data transmission over cable lines?
DOCSIS
EIA/TIA 568a
SONET
IEEE 802.6
DOCSIS
Both PC1 and Server 1 have a default gateway. What is the purpose of a default gateway?
Block packets
Forward frames
Route packets to a different subnet
Route packets to the same subnet
Route packets to a different subnet
What is the purpose of ARP?
ARP resolves the MAC address to a NetBIOS name.
ARP resolves an IP address to a hostname.
ARP locates the default gateway of the network.
ARP resolves the IP address of a Host to its MAC address.
ARP resolves the IP address of a Host to its MAC address.
The routes on R1 and R2 are directly connected routes.
True
False
True
At the moment, PC1 cannot reach the Internet. You add a static default route to R1 that sends all traffic to an unknown destination out S1/1 and add a static default route to R2 that sends all traffic to unknown destination out S1/0. Can a user on PC1 access the Internet?
Yes, PC1 has Internet access.
No, packets will not make it past R1.
No, packets can make it to the Internet, but they will never make it back to PC1.
No, packets will stop at R2
No, packets can make it to the Internet, but they will never make it back to PC1.
What is the administrative distance of a directly connected network?
0
90
110
170
0
What is the administrative distance for an internal EIGRP route?
1
90
110
170
90
What are the two methods used to prevent loops in a distance vector routing protocol?
Split horizon and hold-down timer
Split horizon and poison reverse
Poison reverse and hop count
Split horizon and hop count
Split horizon and poison reverse
Which of the following is an exterior gateway protocol?
BGP
RIP
OSPF
EIGRP
BGP
Which of the following is a distance vector routing protocol that uses a metric of hops?
IS-IS
OSPF
EIGRP
Correct RIP
RIP
Match the type of NAT on the left with the correct definition on the right.
a) Inside local
b) Inside global
c) Outside local
d) Outside global
- A public IP address referencing an outside device
- A public IP address referencing an inside device
- A private IP address referencing an outside device
- A private IP address referencing an inside device
A1 B2 C3 D4
A4 B2 C3 D1
A3 B2 C4 D1
A2 B1 C4 D3
A4 B2 C3 D1
For static NAT to work, how many inside global addresses are needed for inside local addresses?
One inside global addresses for unlimited inside local addresses
Two inside global addresses for every inside local address
Ten inside global addresses for unlimited inside local addresses
One inside global address for every inside local address
One inside global address for every inside local address
R1 is using both NAT and PAT. What is the purpose of the port numbers in the translation table?
Basic NAT uses the port numbers to track separate communication flows.
PAT uses the port numbers to track separate communication flows.
The port numbers are not used.
PAT only uses the destination port to track separate communication flows.
PAT uses the port numbers to track separate communication flows.
Which of the following is a multicast routing protocol?
PIM
IGMP
IS-IS
OSPF
PIM
What is the hop count that is used by RIP to indicate an unreachable metric?
16
0
15
255
16
What factors are used to calculate the OSPF cost?
Bandwidth, delay
Bandwidth
Delay
Bandwidth, MTU
Bandwidth
What factors are used in the calculation of the default EIGRP metric?
Delay
Bandwidth
Bandwidth, delay
Bandwidth, MTU
Bandwidth, delay
Which message type was added with IGMP Version 2?
Join
Prune
Combine
Leave
Leave
Which feature was added with IGMPv3 that allowed a client to specify the joining of a group and a specific source server?
SSM
SRM
SME
SMJ
SSM
Which mode of PIM uses a source distribution tree?
Sparse mode
Dense mode
Broadcast mode
Source mode
Dense mode
Which mode of PIM uses a rendezvous point (RP)?
Broadcast mode
Dense mode
Sparse mode
Source mode
Sparse mode