Various Network Devices Flashcards
Which of the following is a VoIP signaling protocol used to set up, maintain,
and tear down VoIP phone calls?
a. MX
b. RJ-45
c. SIP
d. IMAP
Answer: c. SIP is a control protocol for VoIP that is responsible for call maintenance tasks.
Which network infrastructure device primarily makes forwarding decisions
based on Layer 2 MAC addresses?
a. Router
b. Switch
c. Hub
d. Multilayer switch
Answer: b. The best answer here is switch because, unlike a multilayer switch,
this device must use MAC addressing for frame forwarding.
A router operating at Layer 3 primarily makes its forwarding decisions based
on what address?
a. Destination MAC address
b. Source IP address
c. Source MAC address
d. Destination IP address
Answer: d. Routers make their forwarding decisions using IP addresses at
Layer 3 of the OSI model. Specifically, the destination IP address is the key
piece of information used by default.
Identify two differences between an Ethernet bridge and an Ethernet switch.
(Choose two.)
a. Switches use ASICs to make forwarding decisions, whereas bridges make
their forwarding decisions in software.
b. Bridges typically operate faster than switches.
c. Switches usually have higher port densities than bridges.
d. Bridges can base their forwarding decisions on logical network layer
addresses.
Answer: a, c. Bridges are slower than switches (typically) and tend to lack the
port density of switches.
In a router that has 12 ports, how many broadcast domains does the router
have?
a. None
b. 1
c. 2
d. 12
Answer: d. A router creates a broadcast domain on each of the router (Layer 3)
ports.
In a switch that has 12 ports, how many collision domains does the switch
have?
a. None
b. 1
c. 2
d. 12
Answer: d. A switch creates a collision domain on each port by default
What IoT technology is specialized for monitoring sensor data and is owned
by Garmin?
a. Z-Wave
b. ANT+
c. Bluetooth
d. RFID
Answer: b. ANT+ is an IoT technology that is specialized wireless for monitoring sensor data. Garmin helped create this technology.
What networking device often uses signatures to help protect a network from
known malicious attacks?
a. Wireless LAN controller
b. Media converter
c. Proxy server
d. IPS
Answer: d. An intrusion prevention system (IPS) typically uses signatures to
identify common network attacks.
What device can act as both a content cache and a URL filter and is typically
configured in the client browser of an end-user system?
a. Wireless LAN controller
b. Media converter
c. Proxy server
d. IPS
Answer: c. A proxy server caches content and improves performance. It can
also include permit and deny lists for Internet locations.
You are using a network firewall in your enterprise infrastructure. This firewall
requires you to define which connections are permitted outbound. Once you
do so, the appropriate and expected return data flows are dynamically allowed
through the firewall. What firewall characteristic does this scenario describe?
a. Stateless
b. Stateful
c. Deterministic
d. Zone-based
Answer: b. A stateful firewall has the ability to examine outbound connections
and dynamically permit the appropriate inbound responses.