Network + Flash Cards Deck 2
(Routing Loop Strategies)
____ works by preventing the router from advertising a route
back to the other router from which it was learned. This prevents two
nodes from bouncing packets back and forth between them, creating a
loop.
Split horizon
(Routing Loop Strategies)
dictates that the route is advertised back on the interface from which it
was learned, but it has a hop count of infinity, which tells the node that
the route is unreachable.
Poison reverse (also called split horizon with poison reverse)
ExamAlert
The term well-known ports identifies the ports ranging from 0 to 1023. When
CompTIA says to “identify the well-known ports,” this is what it refers t
ExamAlert
- As the network administrator, you decide to block port 80. Which of the following
services will be unavailable for network users?
❍ A. DNS
❍ B. POP3
❍ C. FTP
❍ D. HTTP
- D. The HTTP service uses port 80, so blocking port 80 prevents users from using
the HTTP service. Answer A is incorrect because DNS uses port 53. Answer B is
incorrect because POP3 uses port 110. Answer C is incorrect because FTP uses
port 21.
- D. The HTTP service uses port 80, so blocking port 80 prevents users from using
the HTTP service. Answer A is incorrect because DNS uses port 53. Answer B is
incorrect because POP3 uses port 110. Answer C is incorrect because FTP uses
port 21.
- B. The most commonly used port for FTP in modern implementations is 21.
1. Port mirroring enables administrators to monitor which traffic to the switch? ❍ A. Inbound only ❍ B. Outbound only ❍ C. Inbound and outbound ❍ D. Neither inbound nor outbound
- C. Port mirroring enables administrators to monitor the traffic outbound and
inbound to the switch.
- What are the most common distance-vector routing protocols?
- Distance-vector routing protocols include RIP, RIPv2, BGP, and EIGRP.
- What is the difference between an active and passive hub?
- Hubs can be either active or passive. Hubs are considered active when
they regenerate a signal before forwarding it to all the ports on the device.
- Which of the following best describes the function of the default gateway?
❍ A. It provides the route for destinations outside the local network.
❍ B. It enables a single Internet connection to be used by several users.
❍ C. It identifies the local subnet and formulates a routing table.
❍ D. It is used to communicate in a multiple-platform environment.
- A. The default gateway enables systems on one local subnet to access those on
another. Answer B does not accurately describe the role of the default gateway.
Answers C and D don’t describe the main function of a default gateway, which is
to provide the route for destinations outside the local network.
- Which technology enables electrical power to transmit over twisted-pair
Ethernet cable?
- Power over Ethernet (PoE) is the technology that enables electrical power
to transmit over twisted-pair Ethernet cable.
- True or False: With the help of FSL, STP avoids or eliminates loops on
Layer 2 bridges.
- False. With the help of Spanning Tree Algorithm (STA), STP avoids or
eliminates loops on a Layer 2 bridge.
- What are the most common link-state protocols?
- Link-state protocols include OSPF and IS-IS.
- What is the major difference between a hub and a switch?
- Rather than forwarding data to all the connected ports, a switch forwards
data only to the port on which the destination system is connected.
2. What is the term used for the number of hops necessary to reach a node? ❍ A. Jump list ❍ B. Link stops ❍ C. Connections ❍ D. Hop count
- D. The hop count is the number of hops necessary to reach a node.
- Which of the following is NOT used to avoid redundant paths and potential loops
within ports?
- D. The common methods to avoid redundant paths and potential loops within
ports include blocking, disabled, forwarding, learning, and listening. Jamming is
not one of the methods employed.
- D. The common methods to avoid redundant paths and potential loops within
ports include blocking, disabled, forwarding, learning, and listening. Jamming is
not one of the methods employed.
- Hubs and switches have two types of ports: Medium-Dependent Interface
(MDI) and Medium-Dependent Interface Crossed (MDI-X).
- What is convergence?
- Convergence represents the time it takes routers to detect change on the
network.
____ are used in networks that use twisted-pair cabling to connect devices. They also
can be joined to create larger networks. They are simple devices that direct
data packets to all devices connected to the hub, regardless of whether the
data package is destined for the device.
hubs
____ are used to divide larger networks into smaller sections. They
accomplish this by sitting between two physical network segments and managing
the flow of data between the two.
bridges
____ assigns IP addresses, eliminating the need to individually assign IP addresses and making
the job of network administrators considerably easier. When a ___ server runs on a network, the workstation boots up and requests an IP address from the server. The server responds to the request and automatically assigns an IP address to the computer for a given period of time, known as a lease. The workstation acknowledges the receipt of the IP address, and the workstation has all the information it needs to become part of the network.
Dynamic Host Configuration Protocol (DHCP)
_____ are used to route information outside the network, such as on the Internet. On the Internet, an it is required. It is also a distance-vector protocol commonly used between hosts on the Internet to exchange routing table information. BGP is an example this.
Exterior Gateway Protocols
EGPs
_____ is a distance-vector routing protocol. It is
limited to a maximum of 15 hops. One of the downsides of the protocol
is that the original specification required router updates to be transmitted
every 30 seconds. On smaller networks this is acceptable; however,
this can result in a huge traffic load on larger networks
Routing Information Protocol (RIP)