Infrastructure (3) Flashcards

1
Q

Ed has been hired by a company to upgrade its network infrastructure. The current network is 10 Mbps Ethernet running on Category 5 (CAT5) twisted pair cable. There are 100 computers on the network, all of which have 10/100/1000 multispeed network interface adapters. The computers are all connected to hubs. Users are complaining that the network is too slow and connections are sometimes dropped. Management wants to upgrade to the fastest Ethernet standard possible, using the existing cabling, and still keep costs to a minimum. Which of the following implementations should Ed recommend to the client?

Upgrade to 1000Base-T and keep the existing hubs.

Upgrade to 100Base-FX and replace all of the hubs with switches.

Upgrade to 1000Base-T and replace all of the hubs with switches.

A

Upgrade to 1000Base-T and replace all of the hubs with switches.

The best solution in this scenario is to upgrade to 1000Base-T and replace the existing hubs with switches. 1000Base-T provides the fastest transfer speeds supported by the existing cable. Since users are complaining that the network is slow with the existing hubs, it makes sense to replace the shared hub environment with switches that offer dedicated bandwidth out each port. Any solution that does not replace the hubs would not address the users’ complaints. 100Base-TX would provide a speed increase, but it runs at one-tenth the speed of 1000Base-TX. Upgrading to 100Base-FX would require the cabling to be replaced with fiber optic, which would be very expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ralph has been hired by a company to redesign its local area network (LAN). Right now it has a single 100 Mbps Ethernet LAN with 40 users and 2 shared servers, all connected through 3 hubs. The users on the network must share files with one another and also access the shared servers to retrieve and store files. The users are complaining that the network is too slow. Management states that cost is a factor that must be considered. Which of the following upgrade scenarios should Ralph recommend in this situation?

Split the network into smaller segments with dedicated hubs as opposed to shared hubs.

Split the network into two routed LANs with 20 users each.

Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.

A

Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.

In this situation, the best choice is to replace the hubs with switches, since the network is relatively small and cost is an issue. In addition, all users must be able to share information directly with one another and to access the servers. On the existing network, all users share the same 100 Mbps communication channel, and each computer must take turns transmitting. By replacing the hubs with switches, you provide each computer with a dedicated 100 Mbps connection to the switch, while reducing unnecessary traffic and collisions on the network. There is no such thing as a dedicated hub. Splitting the network into two routed LANs with 20 users each is not the best solution, since all users must share information on a constant basis. Also, cost is a factor and routers are more expensive than switches. Replacing the hubs with a layer 3 switch and defining two VLANs with 20 users each is not a reasonable solution because layer 3 switches are very expensive. Layer 3 switches and VLANs are typically used in larger enterprise networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following devices can split a single network into two collision domains while maintaining a single broadcast domain?

Hub

Bridge

Switch

A

Bridge

A bridge can split a single network into two collision domains, because it forwards only the packets that are destined for the other side of the bridge. The bridge forwards all broadcast packets, so it maintains a single broadcast domain. A hub maintains a single collision domain and a single broadcast domain. A switch creates a separate collision domain for each port, and a single broadcast domain for the entire network. A router creates two collision domains, but it does not forward broadcasts, so there are two broadcast domains as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Alice has a network that consists of three virtual LANs (VLANs) defined on all of the network’s switches. VLAN 10 is the Sales VLAN, VLAN 20 is the Marketing VLAN, and VLAN 30 is the Accounting VLAN. Users are reporting that they can’t communicate with anyone outside of their own VLAN. What is the problem, and what must Alice do?

The problem is a faulty VLAN configuration on one of the switches. Alice needs to re-create the VLANs and configure each VLAN for routing.

One of the VLANs is configured to filter all other VLAN traffic for security purposes. Alice needs to change the filter on this VLAN.

VLANs are limited to data link layer communication only. To allow communication between VLANs, Alice must add a router or a layer 3 switch to the network and configure it to route traffic between the VLANs.

A

VLANs are limited to data link layer communication only. To allow communication between VLANs, Alice must add a router or a layer 3 switch to the network and configure it to route traffic between the VLANs.

VLANs are data link layer local area networks (LANs) defined within switches. Only devices (and users) connected to ports belonging to the same VLAN can communicate with each other until a layer 3 device, such as a router or a layer 3 switch, is added to the network. Re-creating and reconfiguring the VLANs will not correct this problem. Traffic filters are usually implemented on routers. VLANs do not have to use the same data link protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following functions is the multifunction device on a home or small office network known as a broadband router least likely to provide?

Wireless access point

Switch

Proxy server

A

Proxy server

Broadband routers generally do not function as proxy servers, which are application layer devices used to regulate access to the Internet. Many broadband routers are also wireless access points, enabling users to construct a LAN without a complicated and expensive cable installation. Many broadband routers have switched ports for connections to wired devices, such as printers and computers. Most broadband routers use DHCP to assign IP addresses to devices on the private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the true definition of the term modem?

A device that connects a computer to the Public Switched Telephone Network (PSTN)

A device that connects a local area network (LAN) to the Internet

A device that converts analog signals to digital signals and back again

A

A device that converts analog signals to digital signals and back again

A modulator/demodulator is any device that converts analog signals to digital signals and digital signals back to analog signals. The digital device does not have to be a computer, and the analog device does not have to be the PSTN. There are many devices that are incorrectly referred to as modems, such as devices that connect a digital LAN to a digital WAN or all-digital devices that connect computers to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following devices is used to physically connect computers in the same VLAN?

A bridge

A hub

A switch

A

A switch

Replacing routers with switches turns an internetwork into a single large subnet, and VLANs exist as logical elements on top of the switching fabric. Although VLANs are the functional equivalent of network layer subnets, the systems in a single VLAN are still connected by switches, not routers. Bridges connect network segments at the data link layer and selectively forward traffic between the segments. However, bridges do not provide a dedicated connection between two systems like a switch does, and they do not make it possible to convert a large routed internetwork into a single switched network. Therefore, they have no role in implementing VLANs. Hubs are physical layer devices that propagate all incoming traffic out through all of their ports. Replacing the routers on an internetwork with hubs would create a single shared network with huge amounts of traffic and collisions. Hubs, therefore, do not connect the computers in a VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best describes the function of a firewall?

A device located between two networks that enables administrators to restrict incoming and outgoing traffic

A device that connects two networks together, forwarding traffic between them as needed

A device that enables Internet network clients with private IP addresses to access the Internet

A

A device located between two networks that enables administrators to restrict incoming and outgoing traffic

A firewall is a filter that can prevent dangerous traffic originating on one network from passing through to another network. A device that connects two networks together and forwards traffic between them is a router, not a firewall. A device that enables Internet network clients with private IP addresses to access the Internet is a description of a NAT router or a proxy server, not a firewall. A device that caches Internet data is a proxy server or caching engine, not a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following terms is used to describe the method by which a firewall examines the port numbers in transport layer protocol headers?

IP address filtering

Service-dependent filtering

Deep packet inspection

A

Service-dependent filtering

Service-dependent filtering blocks traffic based on the port numbers specified in the transport layer header fields. Because port numbers represent specific applications, you can use them to prevent traffic generated by these applications from reaching a network. IP address filtering operates at the network layer. Deep packet inspection (DPI) scans the contents of packets, rather than their headers. Next generation firewall (NGFW) defines a device with advanced protection capabilities; port number scanning is a basic firewall function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following devices can also be described as a multiport repeater?

Hub

Bridge

Switch

A

Hub

A repeater is a physical layer device that regenerates incoming signals and retransmits them. A hub is a type of repeater that receives data through any one of its multiple ports and retransmits the data out through all of its other ports. Bridges and switches are data link layer devices, and routers are network layer devices. None of these three can be described as multiport repeaters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following bridging types has never been used on Ethernet local area networks (LANs)?

Store and forward

Transparent

Source route

A

Source route

Source route bridging was a technique used on Token Ring (and not Ethernet) networks, in which a Routing Information Field (RIF) in the packet header identified the network segments the packet should follow to reach its destination. Store and forward, transparent, and multiport bridges have all been used on Ethernet networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following physical network devices can conceivably be implemented as software in a computer’s operating system? (Choose all correct answers.)

Hub

Switch

Router

Firewall

A

Router

Firewall

Most operating systems are capable of functioning as routers or firewalls. To route traffic, the system must have two network connections. A software firewall can be part of a computer’s routing functionality, or it can be a stand-alone firewall that protects only the local system. Computers cannot function as hubs or switches because multiple ports would be required and standard network adapters don’t implement those functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following criteria does a firewall capable of service dependent filtering use to block traffic?

Hardware addresses

IP addresses

Port numbers

A

Port numbers

Service-dependent filtering blocks traffic based on the port numbers specified in the transport layer header fields. Because port numbers represent specific applications, you can use them to prevent traffic generated by these applications from reaching a network. IP address filtering enables you to limit network access to specific computers; it is not service dependent. Filtering based on hardware addresses provides the same basic functionality as IP address filtering, but it is more difficult to spoof hardware addresses than IP addresses. Filtering by protocol identifier enables you to block all traffic using TCP or UDP; it is not service dependent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ralph is a freelance network consultant installing a three-node small business network. The computers are all in the same room and use wired Ethernet to connect to the switched ports of a multifunction device. The device also functions as a network address translation (NAT) router for a cable modem connection to the Internet and uses DHCP to assign private IP addresses to the computers. Although NAT provides a measure of security, Ralph wants to be sure that the computers on the network are protected from unauthorized Internet traffic and attacks against open ports. Which of the following solutions would enable Ralph to accomplish this goal with the minimum cost to the client?

Install a hardware firewall between the multifunction device and the cable modem.

Install an intrusion prevention system (IPS) between the multifunction device and the cable modem.

Install a personal firewall on each of the computers.

A

Install a personal firewall on each of the computers.

A personal firewall is an inexpensive way to protect an individual computer from Internet incursions. Three copies of the product are much less expensive than any of the other suggested solutions. Installing a hardware firewall is a complex and expensive solution, not suitable for a small network. An IPS is a relatively expensive solution, suitable for larger networks. An IDS is a relatively expensive solution, and connecting it to a switched port would not enable it to protect the other computers on the network. A port scanner is a device that performs scans on demand. It does not continuously monitor ports, and it does nothing to protect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following statements about hubs and switches are true? (Choose all correct answers.)

Hubs operate at the physical layer, whereas switches operate at the network layer.

All of the devices connected to a hub are part of a single-collision domain, whereas each device connected to a switch has its own collision domain.

There are switches available with network layer functionality, but there are no hubs with that capability.

Switches create a separate broadcast domain for each collected device, whereas hubs create a single broadcast domain for all of the connected devices.

A

All of the devices connected to a hub are part of a single-collision domain, whereas each device connected to a switch has its own collision domain.

There are switches available with network layer functionality, but there are no hubs with that capability.

Hubs operate at the physical layer and switches at the data link layer. Hubs and switches both create a single broadcast domain for all of the connected devices. Switches create a separate collision domain for each connected device, whereas hubs create a single-collision domain. There are switches (but not hubs) with network layer (layer 3) functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following problems is the Spanning Tree Protocol (STP) intended to prevent? (Choose all correct answers.)

Broadcast storms

Late collisions

Bridging loops

Crosstalk

A

Broadcast storms

Bridging loops

STP disables redundant links between switches that can allow packets to circulate endlessly around the network. This is called a bridging loop. As a result of a bridging loop, the network can be flooded with broadcast traffic, which is called a broadcast storm. STP does nothing to prevent late collisions, which is an Ethernet timing problem, or crosstalk, which is a cabling fault

17
Q

Which two of the following devices perform essentially the same function? (Choose two correct answers.)

Hubs

Bridges

Switches

Routers

A

Bridges

Switches

A switch is essentially a multiport bridge. Both switches and bridges process incoming packets by scanning their data link layer hardware addresses and forwarding the packets out the port connected to the destination system. The primary difference between them is that switches have many ports, whereas bridges have only two. Hubs and routers are physical layer and network layer devices, respectively, and perform different functions

18
Q

Which of the following is the term for the area between two firewalls, on which web and email servers are typically found? (Choose all correct answers.)

DMZ

Berlin wall

Peripheral network

Perimeter network

A

DMZ

Perimeter network

Servers that must be accessible to clients on the Internet, such as web and email servers, are typically isolated from the internal network by one firewall and from the Internet by a second firewall. The area where these servers reside is often called a perimeter network, or a demilitarized zone (DMZ). It is not called a peripheral network or a Berlin wall

19
Q

Which of the following switch types immediately forwards frames after looking at only the destination address?

Cut-through

Source route

Store-and-forward

A

Cut-through

Cut-through switches are fast because they look at only the first six bytes (the destination media access control, or MAC, address) when forwarding a frame. They do not perform a cyclical redundancy check (CRC) on the entire frame’s contents prior to forwarding it out a port leading to the destination. Source route is a bridging technique in which the source host, not the switch, determines the path a frame will take through a network to reach a destination. Store-and-forward switches take in the entire frame and verify its contents by performing a CRC calculation before forwarding it. There is no switch called a destination switch

20
Q

Which of the following statements about the Spanning Tree Protocol (STP) is not true?

STP operates at the data link layer of the OSI model.

STP prevents traffic from circulating endless around a network.

STP compiles a database containing the IP addresses of connected devices.

A

STP compiles a database containing the IP addresses of connected devices.

STP operates at the data link layer of the OSI model, so it works with hardware addresses, not IP addresses. Switches use STP to prevent redundant links from causing traffic loops on the network

21
Q

Which of the following is the correct term for the process by which the Spanning Tree Protocol (STP) on a switch evaluates the paths through the network and places each port in the forwarding or blocking state?

Assimilation

Convergence

Tree-building

A

Convergence

The process by which STP populates its database with information about each port in a switch and designates the ports as forwarding or blocking is called convergence

22
Q

Which of the following technologies would you be less likely to find on the average home or small office network?

NAT

DHCP

10GBase-T

VLAN

A

10GBase-T

VLAN

Home and small office networks typically consist of a single subnet and require only a basic switch without the advanced virtual LAN capabilities that enable administrators to create separate subnets. Most home and small office networks have a DHCP server that assigns IP addresses and other TCP/IP configuration settings to clients. The DHCP server can be integrated into a broadband router or another Internet access sharing solution. Most home and small office networks support network address translation, enabling them to use private IP addresses and still access the Internet. 10GBase-T is the designation for UTP-based 10 Gigabit Ethernet, which is an advanced standard for network interface adapters often found in servers

23
Q

Which of the following is something that only a firewall capable of stateful packet inspection can do?

Scan transport layer header fields for evidence of SYN floods

Filter traffic based on port numbers

Block traffic destined for specific IP addresses

A

Scan transport layer header fields for evidence of SYN floods

A firewall that supports stateful packet inspection examines other network and transport layer header fields, looking for patterns that indicate damaging behaviors, such as IP spoofing, SYN floods, and teardrop attacks. Port number filtering is the most commonly used form of packet filtering; it is not the same as stateful packet inspection. Blocking traffic based on IP addresses prevents specific systems from accessing a network; stateful packet inspection is a much more complicated operation. Packet filtering based on protocol identifiers enables you to block TCP traffic; this is not stateful packet inspection

24
Q

In local area networking, which of the following is not a type of bridge?

Store and forward

Routing

Transparent

A

Routing

Bridges are data link layer (layer 2) devices. Routing is a network layer (layer 3) function, so it is not a type of bridge. A store-and-forward, or simple, bridge examines each packet and decides whether to forward it to the connected network. A transparent bridge compiles a database of forwarding information, based on the packets it has processed previously. A multiport bridge provides connections to multiple networks; a switch is a type of multiport bridge

25
Q

VLANs create the administrative boundaries on a switched network that are otherwise provided by which of the following devices?

Hubs

Routers

Firewalls

A

Routers

Connecting subnets with routers at the network layer maintains the data link layer administrative boundaries that prevent broadcast transmissions from being propagated throughout the entire internetwork. Switching eliminates those data link layer boundaries, and administrators can use VLANs to simulate them. Because hubs propagate all of the traffic they receive out through all of their ports indiscriminately, they create no administrative boundaries. Firewalls are filtering devices that protect networks against malicious traffic. Their functions are not related to VLANs. Switches are essentially multiport bridges that forward incoming traffic only to the device for which it is destined. Therefore, bridges are more closely related to eliminating administrative boundaries than to establishing them