Network Test 3 Study Guide

Similar documents
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Networking Test 4 Study Guide

SSVP SIP School VoIP Professional Certification

- Hubs vs. Switches vs. Routers -

SSVVP SIP School VVoIP Professional Certification

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Switching in an Enterprise Network

CCT vs. CCENT Skill Set Comparison

Networking 4 Voice and Video over IP (VVoIP)

Exhibit n.2: The layers of a hierarchical network

Data Communication and Computer Network

Layer 3 Routing User s Manual

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Securing end devices

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

GregSowell.com. Mikrotik Basics

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

LAN Switching and VLANs

Router and Routing Basics

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

COMPUTER NETWORK TECHNOLOGY (300)

BASIC ANALYSIS OF TCP/IP NETWORKS

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

hp ProLiant network adapter teaming

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Computer Networks I Laboratory Exercise 1

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

Internet Control Protocols Reading: Chapter 3

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Interconnecting Cisco Networking Devices Part 2

Overview of Routing between Virtual LANs

TestOut Network Pro English 4.0.x LESSON PLAN

How To Understand and Configure Your Network for IntraVUE

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Lab - Using IOS CLI with Switch MAC Address Tables

Network Protocol Configuration

Cisco 12 CCNA Certification

Building Secure Network Infrastructure For LANs

LANs and VLANs A Simplified Tutorial

Fundamentals of Switching

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

AT-S60 Version Management Software for the AT-8400 Series Switch. Software Release Notes

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

The Wireless Network Road Trip

9 Simple steps to secure your Wi-Fi Network.

COMPUTER NETWORK TECHNOLOGY (40)

O /27 [110/129] via , 00:00:05, Serial0/0/1

: Interconnecting Cisco Networking Devices Part 2 v1.1

RARP: Reverse Address Resolution Protocol

VLANs. Application Note

What is VLAN Routing?

IP SAN BEST PRACTICES

Cisco Networking Professional-6Months Project Based Training

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

Written examination in Computer Networks

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $

Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CONNECTING THE RASPBERRY PI TO A NETWORK

Chapter 1 Reading Organizer

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Leased Line + Remote Dial-in connectivity

Security Technology White Paper

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Domain 3.0 Networking... 1

101 Application Delivery Fundamentals

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Networking Devices. Lesson 6

Networked AV Systems Pretest

Part A:Background/Preparation

Technical Support Information Belkin internal use only

IP Routing Features. Contents

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

ProCurve Switch ProCurve Switch

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G

Preparing the Computers for TCP/IP Networking

Security Awareness. Wireless Network Security

Easy Smart Configuration Utility

! encor en etworks TM

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

IEEE a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. Software Release v

Transcription:

Name: Class: Date: Network Test 3 Study Guide Multiple Choice Identify the choice that best completes the statement or answers the question. 1. When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port? a. router b. switch c. repeater d. hub 2. Why would you need to use a repeater? a. You need to connect two networks together to make an internetwork. b. Your network is too large, and you need to decrease the size of the broadcast domain. c. You want to maximize the available bandwidth. d. You need to add a group of computers to your network, and the distance is too far for normal means of communication. 3. Which of the following is NOT a function of a hub? a. cleans up the signal b. transmits the signal to the correct port c. receives the signal from a connected computer on one of its ports d. regenerates the signal 4. How does a switch learn MAC addresses? a. All the MAC addresses must be entered manually. b. The switch comes loaded with the most frequently used addresses. c. The switch reads each frame and makes a note of where each MAC address came from. d. The switch uses a mathematical formula to determine what the MAC address would be for each computer connected to it. 5. Why is the use of a switch preferred over a hub? a. Devices on a hub have to share the available bandwidth. b. Switches are intelligent; they read the frame and determine where to send it. c. Switches can operate in full-duplex mode. d. All of the above. 6. What does a switch store in its switching table? a. the source MAC address of a frame and the port it was received on b. the destination MAC address of a frame and the port it was received on c. the source IP address of a frame and the port it was received on d. the destination IP address of a frame and the port it was received on 5

Name: 7. What is a packet called that is intended for only one individual computer? a. broadcast b. unicast c. multicast d. anycast 8. Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses? a. ARP b. ICMP c. DHCP d. IP 9. What does it usually mean when the activity light on a switch is blinking? a. It is malfunctioning. b. It is ready to receive data. c. It is communicating with the network. d. A collision is imminent. 10. What component of the computer provides it with a MAC address? a. motherboard b. NIC c. CPU d. BIOS 11. A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent? a. It s a unique serial number assigned by the manufacturer. b. It s the address it uses for a multicast packet. c. It s the decryption key used for security purposes. d. It s the organizationally unique identifier for the manufacturer of the device. 12. What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer? a. route b. tracert c. ipconfig d. arp 13. What is the purpose of the default route? a. It serves as a guideline for how to configure routes. b. It s a route set by Microsoft so that all information comes to their servers first. c. It s where the router sends all packets with destinations of which it has no knowledge. d. None of the above 2

Name: 14. A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers? a. switch b. router c. hub d. modem 15. When referring to network bandwidth, what is the basic unit of measurement? a. bytes per second b. bits per second c. bandwidth per second d. bytes per minute 16. Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP? a. RTS b. ARP c. CTS d. DNS 17. The SSID is configured on which of the following so that it can be distinguished from other available wireless networks? a. router b. access point c. switch d. repeater 18. What command would you issue from the command prompt to test whether your computer has connectivity to the network? a. ping IPaddress b. arp -d IPaddress c. ipconfig IPaddress d. ipconfig /all 19. Which of the following is not a true statement regarding the function of a switch? a. It determines the path used based on the destination IP address. b. It sends broadcast frames out all connected ports. c. Each port on a switch represents a separate collision domain. d. Switches have the ability to operate in full-duplex mode. 3

Name: 20. Which of the following combinations will you find in a switching table? a. application/destination port number b. IP address/exit interface c. destination network/next Hop d. MAC address/switch port number 21. Which of the following is the fastest switching mode? a. cut-through b. fragment-free c. store-and-forward d. auto-negotiate 22. Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called? a. intuitive b. executive c. smart d. enterprise 23. Which of the following is the switching protocol that is used to eliminate the possibility of switching loops? a. RIP b. SNMP c. NTP d. STP 24. Which of the following is not a function that would be found in a managed switch? a. the ability to stop switching loops using STP b. the ability to transfer it s switching table with neighboring switches c. the creation of VLANS to logically separate resources d. to limit access to the network by enabling security on individual ports 25. Each interface on a router must have an IP address and what else to be able to communicate on the network? a. network ID b. default gateway c. MAC address d. serial number 26. When a router s interface is configured with multiple IP addresses with each address belonging to different networks, what is it called? a. multi-homed router b. dynamic router c. link-state router d. router on a stick 4

Name: 27. What type of routing protocol are RIP and RIPv2? a. distance-state protocol b. link-state protocol c. hybrid protocol d. distance-vector protocol 28. The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what? a. delivery b. convergence c. congestion d. concurrence 29. When an access control list is applied on a router s interface, that interface is performing a specific function on the packets that it receives. What is that function called? a. packet filtering b. packet forwarding c. packet manipulating d. packet dispatching 30. What command issued from a command prompt will display the routing table in Windows? a. route table b. route print c. route delete d. route config 31. A wireless router is actually composed of three devices, a wireless access point and which two other devices? a. a router and a hub b. a switch and a bridge c. a router and a switch d. a router and a bridge 32. What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks? a. white hat b. wardriver c. script kiddy d. phisher 33. Which is the strongest form of wireless security? a. WEP b. WPA c. WPA2 d. WAP2 5

Name: 34. Which is the PCI bus type that has the highest possible transfer rate? a. PCI b. PCIe c. PCI-X d. PCMCIA 35. Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive? a. onboard coprocessor b. advanced configuration power management interface c. shared system memory d. preboot execution environment Completion Complete each statement. 36. The Locally Administered Address can be used to override the burned-in address. 37. In a computer s IP address settings, the _ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own. 38. A frame is a message that is intended to be processed by all devices on the LAN. 39. The network is a measurement of the amount of data that can pass through a network in a certain period of time. 40. A switch operating in mode can send and receive data at the same time. 41. When a switch receives a broadcast frame, it the frame out to all ports. 42. A switch that is configured to use the Spanning Tree Protocol will place a port in mode if sending traffic to it may cause a switching loop. 43. A router s final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet. 44. One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC. 45. A is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit. 6

Name: Short Answer 46. Why is the NIC considered the gatekeeper? 47. What are the major differences between a hub and a switch? 48. List the steps that a switch performs for each frame. 49. What is a broadcast frame? 50. What is the difference between a switch and a router? 51. What does a router keep in its routing table? 52. What is the importance of a default route? 53. What is a default gateway? 54. What are the major tasks that a NIC performs? 55. What is the MAC address of a computer? 56. Briefly describe the three types of switching methods. 57. What does the Spanning Tree Protocol do? 58. What is a trunk port? 59. What is a broadcast storm? 60. Briefly describe an entry in a routing table from a router. 61. What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks? 62. What are the three ways that a router can populate its routing table? 63. Why should you change the SSID on your wireless router? 64. What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest? 65. What physical characteristics must you take into account when shopping for a new NIC? 7

Network Test 3 Study Guide Answer Section MULTIPLE CHOICE 1. ANS: B PTS: 1 REF: Page 67 2. ANS: D PTS: 1 REF: Page 63 3. ANS: B PTS: 1 REF: Page 64 4. ANS: C PTS: 1 REF: Page 66 5. ANS: D PTS: 1 REF: Pages 66-68 6. ANS: A PTS: 1 REF: Page 67 7. ANS: B PTS: 1 REF: Page 81 8. ANS: A PTS: 1 REF: Page 74 9. ANS: C PTS: 1 REF: Page 76 10. ANS: B PTS: 1 REF: Page 80 11. ANS: D PTS: 1 REF: Page 81 12. ANS: B PTS: 1 REF: Page 98 13. ANS: C PTS: 1 REF: Page 95 14. ANS: C PTS: 1 REF: Page 77 15. ANS: B PTS: 1 REF: Page 64 16. ANS: A PTS: 1 REF: Page 78 17. ANS: B PTS: 1 REF: Page 84 18. ANS: A PTS: 1 REF: Page 73 19. ANS: A PTS: 1 REF: Page 290 20. ANS: D PTS: 1 REF: Page 292 21. ANS: A PTS: 1 REF: Page 293 22. ANS: C PTS: 1 REF: Page 294 23. ANS: D PTS: 1 REF: Page 295 24. ANS: B PTS: 1 REF: Pages 294-296 25. ANS: C PTS: 1 REF: Page 302 26. ANS: D PTS: 1 REF: Page 303 27. ANS: D PTS: 1 REF: Page 306 28. ANS: B PTS: 1 REF: Page 307 29. ANS: A PTS: 1 REF: Page 308 30. ANS: B PTS: 1 REF: Page 309 31. ANS: C PTS: 1 REF: Page 310 32. ANS: B PTS: 1 REF: Page 312 33. ANS: C PTS: 1 REF: Page 312 34. ANS: B PTS: 1 REF: Page 317 35. ANS: D PTS: 1 REF: Page 318 1

COMPLETION 36. ANS: MAC PTS: 1 REF: Page 88 37. ANS: default PTS: 1 REF: Page 96 38. ANS: broadcast PTS: 1 REF: Page 81 39. ANS: bandwidth PTS: 1 REF: Page 64 40. ANS: full-duplex PTS: 1 REF: Page 68 41. ANS: floods PTS: 1 REF: Page 290 42. ANS: blocking PTS: 1 REF: Page 295 43. ANS: forwarding PTS: 1 REF: Page 302 44. ANS: filtering PTS: 1 REF: Page 313 45. ANS: bus PTS: 1 REF: Page 314 SHORT ANSWER 46. ANS: The NIC s responsibility is to examine every frame that is received and either allow it access to the computer or reject it. In order for the frame to be accepted, the destination MAC address must match the NIC s MAC address, or it is refused. There are two exceptions to this rule. If the destination MAC address is a broadcast, then the NIC accepts it. If the NIC is put in promiscuous mode, then it will accept all frames. PTS: 1 REF: Page 81 2

47. ANS: The major difference is that switches are intelligent. They examine each frame that they receive for the destination MAC address and then send the frame out the correct port for that address. A hub simply accepts a frame from one of its ports and then sends it out all ports. A switch also keeps a table of MAC addresses so that it knows where to send a frame. Because a switch can control where it sends a frame, devices that are connected to a switch can communicate at the same time, allowing each device to access the full network bandwidth. With a hub, only one device can transmit at a time so the bandwidth is shared among all connected devices. Also, because a switch controls the flow of frames, there is little chance of a collision. In a hub, collisions might occur frequently when under heavy use. PTS: 1 REF: Pages 66-69 48. ANS: First, the switch receives a frame. It examines the frame for the source and destination MAC addresses. Then the switch looks up the destination MAC address in its switching table. In the switching table, the MAC address will be listed with the port number where the destination device can be found. The switch then will forward the frame out the appropriate port. The switch also updates its switching table with the source MAC address. PTS: 1 REF: Page 67 49. ANS: A broadcast frame is a frame that has a destination MAC address of all binary 1s, which in hexadecimal notation reads as FF-FF-FF-FF-FF-FF. Broadcast frames carry messages that are intended for all devices on a network. Broadcast frames are forwarded by hubs and switches but not by routers. PTS: 1 REF: Page 81 50. ANS: Routers are used to connect LANs together. A switch is used to connect computers and other devices together to form a LAN. Routers are intelligent just like a switch, but routers deal with IP addresses instead of MAC addresses and packets instead of frames. Switches forward broadcast messages to all devices on a LAN, but routers separate LANs so they do not forward broadcast messages. PTS: 1 REF: Page 88-93 51. ANS: Each interface of a router is a connection to a different network. The router needs to keep a record of the networks that are attached to it so that it can forward the packets it receives to the correct network. So, a routing table consists of a list of what network is available via which interface. PTS: 1 REF: Page 93 52. ANS: When a router receives a packet, it looks at the destination IP address to determine where to send the packet. If the router has an entry for the network that the packet is intended for, then everything is fine, and it forwards the packet. However, if there is no entry in the routing table and no default route, then the router does not keep the packet; it simply discards it. If a default route is entered, then the router forwards the packet out the interface listed in the routing table so the packet is not discarded. PTS: 1 REF: Page 95 3

53. ANS: A computer on a LAN can communicate with other devices on the same LAN because a switch uses the computer s physical address. However, when a computer wants to communicate with a device on another network, it must send the packet to the router so the computer needs to know the address of the router. The address of the router is considered the default gateway. It is where all packets sent from the computer to destinations other than its own network are sent. This address is included in a computer s IP configuration. PTS: 1 REF: Page 96 54. ANS: A NIC, along with its driver, provides your computer with a connection to the network medium. When a NIC receives a packet from the network protocol, it encapsulates the packet with the source and destination in a new header and the CRC in a trailer. Then it converts the frame into bits and sends it to the network medium. When the NIC receives a message, it does the reverse, converts the bits into a frame. Then the NIC checks the destination MAC to make sure that it is the same as its own or a broadcast address. It then removes the header and trailer and sends the packet on up to the network protocol. PTS: 1 REF: Page 79 55. ANS: The MAC address is a number that is burned into the memory of each NIC. It is a unique number assigned by the manufacturer. It is 48 bits and is usually expressed in six two-digit hexadecimal numbers. The first 24 bits are an ID number for the manufacturer, called the OUI, and the last 24 bits are a serial number assigned by the manufacturer. PTS: 1 REF: Pages 80-81 56. ANS: Cut-through switching is the fastest; it reads the destination MAC address and sends the frame out. Store-and-forward switching is the slowest; it stores the entire message and then sends it to the correct port. Fragment-free switching is the middle man; it reads enough to make sure the packet is not fragmented and then sends it out. PTS: 1 REF: Page 293 57. ANS: The Spanning Tree Protocol is used to detect whether there is a possibility of a switching loop caused by redundant paths. If a loop is possible, it places one of the ports in blocking mode to prevent it. PTS: 1 REF: Pages 294-296 58. ANS: When a switch is configured with VLANs, the switch needs to have a way to communicate between the VLANs. A trunk port is a port that is configured to carry all traffic. PTS: 1 REF: Pages 297-298 59. ANS: A broadcast storm is a switching loop that occurs with broadcast packets. PTS: 1 REF: Page 295 4

60. ANS: The first value describes how the router learned about the route. The next value is the destination network of the route followed by the metric. Next is the address of the next hop and then the timestamp. Finally, the interface out of which the packet will be forwarded is listed. PTS: 1 OBJ: Page 304 61. ANS: A distance-vector routing protocol sends out information about the network s status to all of its neighbors on a set schedule. A link-state protocol only sends out information to its neighbors when there is a change in the status. PTS: 1 REF: Pages 306-307 62. ANS: It knows about networks that are directly connected to it. A static route can be manually entered. The router can be configured to use a routing protocol, and routes will be entered dynamically. PTS: 1 REF: Page 304 63. ANS: The SSID is always set to a default value by the manufacturer. These SSIDs, along with their passwords, are readily available on the Internet. It is best to change the SSID as a preventative measure to help strengthen your security. PTS: 1 REF: Page 312 64. ANS: They are WEP, WPA, and WPA2. WEP is the weakest, and WPA2 is the strongest. PTS: 1 REF: Page 312 65. ANS: First, you need to find out what type of bus is available for the additional card. Then, you need to check what type of medium is being used and what type of connector is required to connect to that medium. PTS: 1 REF: Page 317 5