* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Network Test 3 Study Guide
Airborne Networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Network tap wikipedia , lookup
Computer network wikipedia , lookup
Wireless security wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Nonblocking minimal spanning switch wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Name: ________________________ Class: ___________________ Date: __________ ID: A Network Test 3 Study Guide Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port? a. b. c. d. ____ 2. Why would you need to use a repeater? a. b. c. d. ____ All the MAC addresses must be entered manually. The switch comes loaded with the most frequently used addresses. The switch reads each frame and makes a note of where each MAC address came from. The switch uses a mathematical formula to determine what the MAC address would be for each computer connected to it. 5. Why is the use of a switch preferred over a hub? a. b. c. d. ____ cleans up the signal transmits the signal to the correct port receives the signal from a connected computer on one of its ports regenerates the signal 4. How does a switch “learn” MAC addresses? a. b. c. d. ____ You need to connect two networks together to make an internetwork. Your network is too large, and you need to decrease the size of the broadcast domain. You want to maximize the available bandwidth. You need to add a group of computers to your network, and the distance is too far for normal means of communication. 3. Which of the following is NOT a function of a hub? a. b. c. d. ____ router switch repeater hub Devices on a hub have to share the available bandwidth. Switches are intelligent; they read the frame and determine where to send it. Switches can operate in full-duplex mode. All of the above. 6. What does a switch store in its switching table? a. b. c. d. the source MAC address of a frame and the port it was received on the destination MAC address of a frame and the port it was received on the source IP address of a frame and the port it was received on the destination IP address of a frame and the port it was received on 5 Name: ________________________ ____ 7. What is a packet called that is intended for only one individual computer? a. b. c. d. ____ broadcast unicast multicast anycast 8. Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses? a. b. c. d. ____ ID: A ARP ICMP DHCP IP 9. What does it usually mean when the activity light on a switch is blinking? a. b. c. d. It is malfunctioning. It is ready to receive data. It is communicating with the network. A collision is imminent. ____ 10. What component of the computer provides it with a MAC address? a. motherboard b. NIC c. CPU d. BIOS ____ 11. A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent? a. b. c. d. It’s a unique serial number assigned by the manufacturer. It’s the address it uses for a multicast packet. It’s the decryption key used for security purposes. It’s the organizationally unique identifier for the manufacturer of the device. ____ 12. What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer? a. b. c. d. route tracert ipconfig arp ____ 13. What is the purpose of the default route? a. b. c. d. It serves as a guideline for how to configure routes. It’s a route set by Microsoft so that all information comes to their servers first. It’s where the router sends all packets with destinations of which it has no knowledge. None of the above 2 Name: ________________________ ID: A ____ 14. A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers? a. b. c. d. switch router hub modem ____ 15. When referring to network bandwidth, what is the basic unit of measurement? a. b. c. d. bytes per second bits per second bandwidth per second bytes per minute ____ 16. Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP? a. b. c. d. RTS ARP CTS DNS ____ 17. The SSID is configured on which of the following so that it can be distinguished from other available wireless networks? a. b. c. d. router access point switch repeater ____ 18. What command would you issue from the command prompt to test whether your computer has connectivity to the network? a. b. c. d. ping IPaddress arp -d IPaddress ipconfig IPaddress ipconfig /all ____ 19. Which of the following is not a true statement regarding the function of a switch? a. b. c. d. It determines the path used based on the destination IP address. It sends broadcast frames out all connected ports. Each port on a switch represents a separate collision domain. Switches have the ability to operate in full-duplex mode. 3 Name: ________________________ ID: A ____ 20. Which of the following combinations will you find in a switching table? a. b. c. d. application/destination port number IP address/exit interface destination network/next Hop MAC address/switch port number ____ 21. Which of the following is the fastest switching mode? a. b. c. d. cut-through fragment-free store-and-forward auto-negotiate ____ 22. Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called? a. b. c. d. intuitive executive smart enterprise ____ 23. Which of the following is the switching protocol that is used to eliminate the possibility of switching loops? a. b. c. d. RIP SNMP NTP STP ____ 24. Which of the following is not a function that would be found in a managed switch? a. b. c. d. the ability to stop switching loops using STP the ability to transfer it’s switching table with neighboring switches the creation of VLANS to logically separate resources to limit access to the network by enabling security on individual ports ____ 25. Each interface on a router must have an IP address and what else to be able to communicate on the network? a. b. c. d. network ID default gateway MAC address serial number ____ 26. When a router’s interface is configured with multiple IP addresses with each address belonging to different networks, what is it called? a. b. c. d. multi-homed router dynamic router link-state router router on a stick 4 Name: ________________________ ID: A ____ 27. What type of routing protocol are RIP and RIPv2? a. b. c. d. distance-state protocol link-state protocol hybrid protocol distance-vector protocol ____ 28. The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what? a. b. c. d. delivery convergence congestion concurrence ____ 29. When an access control list is applied on a router’s interface, that interface is performing a specific function on the packets that it receives. What is that function called? a. b. c. d. packet filtering packet forwarding packet manipulating packet dispatching ____ 30. What command issued from a command prompt will display the routing table in Windows? a. b. c. d. route table route print route delete route config ____ 31. A wireless router is actually composed of three devices, a wireless access point and which two other devices? a. b. c. d. a router and a hub a switch and a bridge a router and a switch a router and a bridge ____ 32. What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks? a. white hat b. wardriver c. script kiddy d. phisher ____ 33. Which is the strongest form of wireless security? a. b. c. d. WEP WPA WPA2 WAP2 5 Name: ________________________ ID: A ____ 34. Which is the PCI bus type that has the highest possible transfer rate? a. b. c. d. PCI PCIe PCI-X PCMCIA ____ 35. Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive? a. b. c. d. onboard coprocessor advanced configuration power management interface shared system memory preboot execution environment Completion Complete each statement. 36. The “Locally Administered Address” can be used to override the burned-in __________ address. 37. In a computer’s IP address settings, the _____________ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own. 38. A __________ frame is a message that is intended to be processed by all devices on the LAN. 39. The network ____________ is a measurement of the amount of data that can pass through a network in a certain period of time. 40. A switch operating in ___________ mode can send and receive data at the same time. 41. When a switch receives a broadcast frame, it ____________ the frame out to all ports. 42. A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it may cause a switching loop. 43. A router’s final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet ____________. 44. One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC ____________. 45. A ____________ is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit. 6 Name: ________________________ ID: A Short Answer 46. Why is the NIC considered the “gatekeeper”? 47. What are the major differences between a hub and a switch? 48. List the steps that a switch performs for each frame. 49. What is a broadcast frame? 50. What is the difference between a switch and a router? 51. What does a router keep in its routing table? 52. What is the importance of a default route? 53. What is a default gateway? 54. What are the major tasks that a NIC performs? 55. What is the MAC address of a computer? 56. Briefly describe the three types of switching methods. 57. What does the Spanning Tree Protocol do? 58. What is a trunk port? 59. What is a broadcast storm? 60. Briefly describe an entry in a routing table from a router. 61. What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks? 62. What are the three ways that a router can populate its routing table? 63. Why should you change the SSID on your wireless router? 64. What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest? 65. What physical characteristics must you take into account when shopping for a new NIC? 7 ID: A Network Test 3 Study Guide Answer Section MULTIPLE CHOICE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: B D B C D A B A C B D B C C B A B A A D A C D B C D D B A B C B C B D PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 1 Page 67 Page 63 Page 64 Page 66 Pages 66-68 Page 67 Page 81 Page 74 Page 76 Page 80 Page 81 Page 98 Page 95 Page 77 Page 64 Page 78 Page 84 Page 73 Page 290 Page 292 Page 293 Page 294 Page 295 Pages 294-296 Page 302 Page 303 Page 306 Page 307 Page 308 Page 309 Page 310 Page 312 Page 312 Page 317 Page 318 ID: A COMPLETION 36. ANS: MAC PTS: 1 37. ANS: default REF: Page 88 PTS: 1 38. ANS: broadcast REF: Page 96 PTS: 1 39. ANS: bandwidth REF: Page 81 PTS: 1 40. ANS: full-duplex REF: Page 64 PTS: 1 41. ANS: floods REF: Page 68 PTS: 1 42. ANS: blocking REF: Page 290 PTS: 1 43. ANS: forwarding REF: Page 295 PTS: 1 44. ANS: filtering REF: Page 302 PTS: 1 45. ANS: bus REF: Page 313 PTS: 1 REF: Page 314 SHORT ANSWER 46. ANS: The NIC’s responsibility is to examine every frame that is received and either allow it access to the computer or reject it. In order for the frame to be accepted, the destination MAC address must match the NIC’s MAC address, or it is refused. There are two exceptions to this rule. If the destination MAC address is a broadcast, then the NIC accepts it. If the NIC is put in promiscuous mode, then it will accept all frames. PTS: 1 REF: Page 81 2 ID: A 47. ANS: The major difference is that switches are intelligent. They examine each frame that they receive for the destination MAC address and then send the frame out the correct port for that address. A hub simply accepts a frame from one of its ports and then sends it out all ports. A switch also keeps a table of MAC addresses so that it knows where to send a frame. Because a switch can control where it sends a frame, devices that are connected to a switch can communicate at the same time, allowing each device to access the full network bandwidth. With a hub, only one device can transmit at a time so the bandwidth is shared among all connected devices. Also, because a switch controls the flow of frames, there is little chance of a collision. In a hub, collisions might occur frequently when under heavy use. PTS: 1 REF: Pages 66-69 48. ANS: First, the switch receives a frame. It examines the frame for the source and destination MAC addresses. Then the switch looks up the destination MAC address in its switching table. In the switching table, the MAC address will be listed with the port number where the destination device can be found. The switch then will forward the frame out the appropriate port. The switch also updates its switching table with the source MAC address. PTS: 1 REF: Page 67 49. ANS: A broadcast frame is a frame that has a destination MAC address of all binary 1s, which in hexadecimal notation reads as FF-FF-FF-FF-FF-FF. Broadcast frames carry messages that are intended for all devices on a network. Broadcast frames are forwarded by hubs and switches but not by routers. PTS: 1 REF: Page 81 50. ANS: Routers are used to connect LANs together. A switch is used to connect computers and other devices together to form a LAN. Routers are intelligent just like a switch, but routers deal with IP addresses instead of MAC addresses and packets instead of frames. Switches forward broadcast messages to all devices on a LAN, but routers separate LANs so they do not forward broadcast messages. PTS: 1 REF: Page 88-93 51. ANS: Each interface of a router is a connection to a different network. The router needs to keep a record of the networks that are attached to it so that it can forward the packets it receives to the correct network. So, a routing table consists of a list of what network is available via which interface. PTS: 1 REF: Page 93 52. ANS: When a router receives a packet, it looks at the destination IP address to determine where to send the packet. If the router has an entry for the network that the packet is intended for, then everything is fine, and it forwards the packet. However, if there is no entry in the routing table and no default route, then the router does not keep the packet; it simply discards it. If a default route is entered, then the router forwards the packet out the interface listed in the routing table so the packet is not discarded. PTS: 1 REF: Page 95 3 ID: A 53. ANS: A computer on a LAN can communicate with other devices on the same LAN because a switch uses the computer’s physical address. However, when a computer wants to communicate with a device on another network, it must send the packet to the router so the computer needs to know the address of the router. The address of the router is considered the default gateway. It is where all packets sent from the computer to destinations other than its own network are sent. This address is included in a computer’s IP configuration. PTS: 1 REF: Page 96 54. ANS: A NIC, along with its driver, provides your computer with a connection to the network medium. When a NIC receives a packet from the network protocol, it encapsulates the packet with the source and destination in a new header and the CRC in a trailer. Then it converts the frame into bits and sends it to the network medium. When the NIC receives a message, it does the reverse, converts the bits into a frame. Then the NIC checks the destination MAC to make sure that it is the same as its own or a broadcast address. It then removes the header and trailer and sends the packet on up to the network protocol. PTS: 1 REF: Page 79 55. ANS: The MAC address is a number that is burned into the memory of each NIC. It is a unique number assigned by the manufacturer. It is 48 bits and is usually expressed in six two-digit hexadecimal numbers. The first 24 bits are an ID number for the manufacturer, called the OUI, and the last 24 bits are a serial number assigned by the manufacturer. PTS: 1 REF: Pages 80-81 56. ANS: Cut-through switching is the fastest; it reads the destination MAC address and sends the frame out. Store-and-forward switching is the slowest; it stores the entire message and then sends it to the correct port. Fragment-free switching is the middle man; it reads enough to make sure the packet is not fragmented and then sends it out. PTS: 1 REF: Page 293 57. ANS: The Spanning Tree Protocol is used to detect whether there is a possibility of a switching loop caused by redundant paths. If a loop is possible, it places one of the ports in blocking mode to prevent it. PTS: 1 REF: Pages 294-296 58. ANS: When a switch is configured with VLANs, the switch needs to have a way to communicate between the VLANs. A trunk port is a port that is configured to carry all traffic. PTS: 1 REF: Pages 297-298 59. ANS: A broadcast storm is a switching loop that occurs with broadcast packets. PTS: 1 REF: Page 295 4 ID: A 60. ANS: The first value describes how the router learned about the route. The next value is the destination network of the route followed by the metric. Next is the address of the next hop and then the timestamp. Finally, the interface out of which the packet will be forwarded is listed. PTS: 1 OBJ: Page 304 61. ANS: A distance-vector routing protocol sends out information about the network’s status to all of its neighbors on a set schedule. A link-state protocol only sends out information to its neighbors when there is a change in the status. PTS: 1 REF: Pages 306-307 62. ANS: It knows about networks that are directly connected to it. A static route can be manually entered. The router can be configured to use a routing protocol, and routes will be entered dynamically. PTS: 1 REF: Page 304 63. ANS: The SSID is always set to a default value by the manufacturer. These SSIDs, along with their passwords, are readily available on the Internet. It is best to change the SSID as a preventative measure to help strengthen your security. PTS: 1 REF: Page 312 64. ANS: They are WEP, WPA, and WPA2. WEP is the weakest, and WPA2 is the strongest. PTS: 1 REF: Page 312 65. ANS: First, you need to find out what type of bus is available for the additional card. Then, you need to check what type of medium is being used and what type of connector is required to connect to that medium. PTS: 1 REF: Page 317 5