Download Network Test 3 Study Guide

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

IEEE 1355 wikipedia , lookup

Deep packet inspection wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Network tap wikipedia , lookup

Computer network wikipedia , lookup

Wireless security wikipedia , lookup

AppleTalk wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Nonblocking minimal spanning switch wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Name: ________________________ Class: ___________________ Date: __________
ID: A
Network Test 3 Study Guide
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____
1. When a frame is received, which component reads the source and destination MAC addresses, looks up the
destination to determine where to send the frame, and forwards it out the correct port?
a.
b.
c.
d.
____
2. Why would you need to use a repeater?
a.
b.
c.
d.
____
All the MAC addresses must be entered manually.
The switch comes loaded with the most frequently used addresses.
The switch reads each frame and makes a note of where each MAC address came from.
The switch uses a mathematical formula to determine what the MAC address would be
for each computer connected to it.
5. Why is the use of a switch preferred over a hub?
a.
b.
c.
d.
____
cleans up the signal
transmits the signal to the correct port
receives the signal from a connected computer on one of its ports
regenerates the signal
4. How does a switch “learn” MAC addresses?
a.
b.
c.
d.
____
You need to connect two networks together to make an internetwork.
Your network is too large, and you need to decrease the size of the broadcast domain.
You want to maximize the available bandwidth.
You need to add a group of computers to your network, and the distance is too far for
normal means of communication.
3. Which of the following is NOT a function of a hub?
a.
b.
c.
d.
____
router
switch
repeater
hub
Devices on a hub have to share the available bandwidth.
Switches are intelligent; they read the frame and determine where to send it.
Switches can operate in full-duplex mode.
All of the above.
6. What does a switch store in its switching table?
a.
b.
c.
d.
the source MAC address of a frame and the port it was received on
the destination MAC address of a frame and the port it was received on
the source IP address of a frame and the port it was received on
the destination IP address of a frame and the port it was received on
5
Name: ________________________
____
7. What is a packet called that is intended for only one individual computer?
a.
b.
c.
d.
____
broadcast
unicast
multicast
anycast
8. Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol
does your computer use to learn MAC addresses?
a.
b.
c.
d.
____
ID: A
ARP
ICMP
DHCP
IP
9. What does it usually mean when the activity light on a switch is blinking?
a.
b.
c.
d.
It is malfunctioning.
It is ready to receive data.
It is communicating with the network.
A collision is imminent.
____ 10. What component of the computer provides it with a MAC address?
a. motherboard
b. NIC
c. CPU
d. BIOS
____ 11. A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?
a.
b.
c.
d.
It’s a unique serial number assigned by the manufacturer.
It’s the address it uses for a multicast packet.
It’s the decryption key used for security purposes.
It’s the organizationally unique identifier for the manufacturer of the device.
____ 12. What command issued from the command prompt will show the route that a packet travels from the issuing
computer to another computer?
a.
b.
c.
d.
route
tracert
ipconfig
arp
____ 13. What is the purpose of the default route?
a.
b.
c.
d.
It serves as a guideline for how to configure routes.
It’s a route set by Microsoft so that all information comes to their servers first.
It’s where the router sends all packets with destinations of which it has no knowledge.
None of the above
2
Name: ________________________
ID: A
____ 14. A wireless access point is most like which other network device, in that all computers send signals
through it to communicate with other computers?
a.
b.
c.
d.
switch
router
hub
modem
____ 15. When referring to network bandwidth, what is the basic unit of measurement?
a.
b.
c.
d.
bytes per second
bits per second
bandwidth per second
bytes per minute
____ 16. Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to
the AP?
a.
b.
c.
d.
RTS
ARP
CTS
DNS
____ 17. The SSID is configured on which of the following so that it can be distinguished from other available wireless
networks?
a.
b.
c.
d.
router
access point
switch
repeater
____ 18. What command would you issue from the command prompt to test whether your computer has connectivity to
the network?
a.
b.
c.
d.
ping IPaddress
arp -d IPaddress
ipconfig IPaddress
ipconfig /all
____ 19. Which of the following is not a true statement regarding the function of a switch?
a.
b.
c.
d.
It determines the path used based on the destination IP address.
It sends broadcast frames out all connected ports.
Each port on a switch represents a separate collision domain.
Switches have the ability to operate in full-duplex mode.
3
Name: ________________________
ID: A
____ 20. Which of the following combinations will you find in a switching table?
a.
b.
c.
d.
application/destination port number
IP address/exit interface
destination network/next Hop
MAC address/switch port number
____ 21. Which of the following is the fastest switching mode?
a.
b.
c.
d.
cut-through
fragment-free
store-and-forward
auto-negotiate
____ 22. Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port
security called?
a.
b.
c.
d.
intuitive
executive
smart
enterprise
____ 23. Which of the following is the switching protocol that is used to eliminate the possibility of switching loops?
a.
b.
c.
d.
RIP
SNMP
NTP
STP
____ 24. Which of the following is not a function that would be found in a managed switch?
a.
b.
c.
d.
the ability to stop switching loops using STP
the ability to transfer it’s switching table with neighboring switches
the creation of VLANS to logically separate resources
to limit access to the network by enabling security on individual ports
____ 25. Each interface on a router must have an IP address and what else to be able to communicate on the network?
a.
b.
c.
d.
network ID
default gateway
MAC address
serial number
____ 26. When a router’s interface is configured with multiple IP addresses with each address belonging to different
networks, what is it called?
a.
b.
c.
d.
multi-homed router
dynamic router
link-state router
router on a stick
4
Name: ________________________
ID: A
____ 27. What type of routing protocol are RIP and RIPv2?
a.
b.
c.
d.
distance-state protocol
link-state protocol
hybrid protocol
distance-vector protocol
____ 28. The time it takes for all the routing tables on every router in a network to be fully updated, either when a
change occurs or according to a schedule, is called the speed of what?
a.
b.
c.
d.
delivery
convergence
congestion
concurrence
____ 29. When an access control list is applied on a router’s interface, that interface is performing a specific function
on the packets that it receives. What is that function called?
a.
b.
c.
d.
packet filtering
packet forwarding
packet manipulating
packet dispatching
____ 30. What command issued from a command prompt will display the routing table in Windows?
a.
b.
c.
d.
route table
route print
route delete
route config
____ 31. A wireless router is actually composed of three devices, a wireless access point and which two other devices?
a.
b.
c.
d.
a router and a hub
a switch and a bridge
a router and a switch
a router and a bridge
____ 32. What type of hacker uses a scanning device to find unsecured wireless networks and break into those
networks?
a. white hat
b. wardriver
c. script kiddy
d. phisher
____ 33. Which is the strongest form of wireless security?
a.
b.
c.
d.
WEP
WPA
WPA2
WAP2
5
Name: ________________________
ID: A
____ 34. Which is the PCI bus type that has the highest possible transfer rate?
a.
b.
c.
d.
PCI
PCIe
PCI-X
PCMCIA
____ 35. Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a
local drive?
a.
b.
c.
d.
onboard coprocessor
advanced configuration power management interface
shared system memory
preboot execution environment
Completion
Complete each statement.
36. The “Locally Administered Address” can be used to override the burned-in __________ address.
37. In a computer’s IP address settings, the _____________ gateway is the address of the router to which a
computer sends all packets that are intended for networks outside of its own.
38. A __________ frame is a message that is intended to be processed by all devices on the LAN.
39. The network ____________ is a measurement of the amount of data that can pass through a network in a
certain period of time.
40. A switch operating in ___________ mode can send and receive data at the same time.
41. When a switch receives a broadcast frame, it ____________ the frame out to all ports.
42. A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if
sending traffic to it may cause a switching loop.
43. A router’s final task when handling a packet is to send the packet on to its next and possibly final destination;
this is referred to as packet ____________.
44. One type of security for wireless networks involves entering a list of the MAC addresses for the devices that
are allowed to access the network and excluding all others. This is called MAC ____________.
45. A ____________ is used to make connections between the network interface card and the other vital
components of the computer, such as the central processing unit.
6
Name: ________________________
ID: A
Short Answer
46. Why is the NIC considered the “gatekeeper”?
47. What are the major differences between a hub and a switch?
48. List the steps that a switch performs for each frame.
49. What is a broadcast frame?
50. What is the difference between a switch and a router?
51. What does a router keep in its routing table?
52. What is the importance of a default route?
53. What is a default gateway?
54. What are the major tasks that a NIC performs?
55. What is the MAC address of a computer?
56. Briefly describe the three types of switching methods.
57. What does the Spanning Tree Protocol do?
58. What is a trunk port?
59. What is a broadcast storm?
60. Briefly describe an entry in a routing table from a router.
61. What is the difference between the way that a distance-vector routing protocol and a link-state routing
protocol update their networks?
62. What are the three ways that a router can populate its routing table?
63. Why should you change the SSID on your wireless router?
64. What are the three most common encryption protocols for wireless security? Which is the strongest? Which
is the weakest?
65. What physical characteristics must you take into account when shopping for a new NIC?
7
ID: A
Network Test 3 Study Guide
Answer Section
MULTIPLE CHOICE
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
B
D
B
C
D
A
B
A
C
B
D
B
C
C
B
A
B
A
A
D
A
C
D
B
C
D
D
B
A
B
C
B
C
B
D
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
PTS:
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
REF:
1
Page 67
Page 63
Page 64
Page 66
Pages 66-68
Page 67
Page 81
Page 74
Page 76
Page 80
Page 81
Page 98
Page 95
Page 77
Page 64
Page 78
Page 84
Page 73
Page 290
Page 292
Page 293
Page 294
Page 295
Pages 294-296
Page 302
Page 303
Page 306
Page 307
Page 308
Page 309
Page 310
Page 312
Page 312
Page 317
Page 318
ID: A
COMPLETION
36. ANS: MAC
PTS: 1
37. ANS: default
REF: Page 88
PTS: 1
38. ANS: broadcast
REF: Page 96
PTS: 1
39. ANS: bandwidth
REF: Page 81
PTS: 1
40. ANS: full-duplex
REF: Page 64
PTS: 1
41. ANS: floods
REF: Page 68
PTS: 1
42. ANS: blocking
REF: Page 290
PTS: 1
43. ANS: forwarding
REF: Page 295
PTS: 1
44. ANS: filtering
REF: Page 302
PTS: 1
45. ANS: bus
REF: Page 313
PTS: 1
REF: Page 314
SHORT ANSWER
46. ANS:
The NIC’s responsibility is to examine every frame that is received and either allow it access to the computer
or reject it. In order for the frame to be accepted, the destination MAC address must match the NIC’s MAC
address, or it is refused. There are two exceptions to this rule. If the destination MAC address is a broadcast,
then the NIC accepts it. If the NIC is put in promiscuous mode, then it will accept all frames.
PTS: 1
REF: Page 81
2
ID: A
47. ANS:
The major difference is that switches are intelligent. They examine each frame that they receive for the
destination MAC address and then send the frame out the correct port for that address. A hub simply accepts a
frame from one of its ports and then sends it out all ports. A switch also keeps a table of MAC addresses so
that it knows where to send a frame. Because a switch can control where it sends a frame, devices that are
connected to a switch can communicate at the same time, allowing each device to access the full network
bandwidth. With a hub, only one device can transmit at a time so the bandwidth is shared among all
connected devices. Also, because a switch controls the flow of frames, there is little chance of a collision. In a
hub, collisions might occur frequently when under heavy use.
PTS: 1
REF: Pages 66-69
48. ANS:
First, the switch receives a frame. It examines the frame for the source and destination MAC addresses. Then
the switch looks up the destination MAC address in its switching table. In the switching table, the MAC
address will be listed with the port number where the destination device can be found. The switch then will
forward the frame out the appropriate port. The switch also updates its switching table with the source MAC
address.
PTS: 1
REF: Page 67
49. ANS:
A broadcast frame is a frame that has a destination MAC address of all binary 1s, which in hexadecimal
notation reads as FF-FF-FF-FF-FF-FF. Broadcast frames carry messages that are intended for all devices on a
network. Broadcast frames are forwarded by hubs and switches but not by routers.
PTS: 1
REF: Page 81
50. ANS:
Routers are used to connect LANs together. A switch is used to connect computers and other devices together
to form a LAN. Routers are intelligent just like a switch, but routers deal with IP addresses instead of MAC
addresses and packets instead of frames. Switches forward broadcast messages to all devices on a LAN, but
routers separate LANs so they do not forward broadcast messages.
PTS: 1
REF: Page 88-93
51. ANS:
Each interface of a router is a connection to a different network. The router needs to keep a record of the
networks that are attached to it so that it can forward the packets it receives to the correct network. So, a
routing table consists of a list of what network is available via which interface.
PTS: 1
REF: Page 93
52. ANS:
When a router receives a packet, it looks at the destination IP address to determine where to send the packet.
If the router has an entry for the network that the packet is intended for, then everything is fine, and it
forwards the packet. However, if there is no entry in the routing table and no default route, then the router
does not keep the packet; it simply discards it. If a default route is entered, then the router forwards the packet
out the interface listed in the routing table so the packet is not discarded.
PTS: 1
REF: Page 95
3
ID: A
53. ANS:
A computer on a LAN can communicate with other devices on the same LAN because a switch uses the
computer’s physical address. However, when a computer wants to communicate with a device on another
network, it must send the packet to the router so the computer needs to know the address of the router. The
address of the router is considered the default gateway. It is where all packets sent from the computer to
destinations other than its own network are sent. This address is included in a computer’s IP configuration.
PTS: 1
REF: Page 96
54. ANS:
A NIC, along with its driver, provides your computer with a connection to the network medium. When a NIC
receives a packet from the network protocol, it encapsulates the packet with the source and destination in a
new header and the CRC in a trailer. Then it converts the frame into bits and sends it to the network medium.
When the NIC receives a message, it does the reverse, converts the bits into a frame. Then the NIC checks the
destination MAC to make sure that it is the same as its own or a broadcast address. It then removes the header
and trailer and sends the packet on up to the network protocol.
PTS: 1
REF: Page 79
55. ANS:
The MAC address is a number that is burned into the memory of each NIC. It is a unique number assigned by
the manufacturer. It is 48 bits and is usually expressed in six two-digit hexadecimal numbers. The first 24 bits
are an ID number for the manufacturer, called the OUI, and the last 24 bits are a serial number assigned by the
manufacturer.
PTS: 1
REF: Pages 80-81
56. ANS:
Cut-through switching is the fastest; it reads the destination MAC address and sends the frame out.
Store-and-forward switching is the slowest; it stores the entire message and then sends it to the correct port.
Fragment-free switching is the middle man; it reads enough to make sure the packet is not fragmented and
then sends it out.
PTS: 1
REF: Page 293
57. ANS:
The Spanning Tree Protocol is used to detect whether there is a possibility of a switching loop caused by
redundant paths. If a loop is possible, it places one of the ports in blocking mode to prevent it.
PTS: 1
REF: Pages 294-296
58. ANS:
When a switch is configured with VLANs, the switch needs to have a way to communicate between the
VLANs. A trunk port is a port that is configured to carry all traffic.
PTS: 1
REF: Pages 297-298
59. ANS:
A broadcast storm is a switching loop that occurs with broadcast packets.
PTS: 1
REF: Page 295
4
ID: A
60. ANS:
The first value describes how the router learned about the route. The next value is the destination network of
the route followed by the metric. Next is the address of the next hop and then the timestamp. Finally, the
interface out of which the packet will be forwarded is listed.
PTS: 1
OBJ: Page 304
61. ANS:
A distance-vector routing protocol sends out information about the network’s status to all of its neighbors on
a set schedule. A link-state protocol only sends out information to its neighbors when there is a change in the
status.
PTS: 1
REF: Pages 306-307
62. ANS:
It knows about networks that are directly connected to it. A static route can be manually entered. The router
can be configured to use a routing protocol, and routes will be entered dynamically.
PTS: 1
REF: Page 304
63. ANS:
The SSID is always set to a default value by the manufacturer. These SSIDs, along with their passwords, are
readily available on the Internet. It is best to change the SSID as a preventative measure to help strengthen
your security.
PTS: 1
REF: Page 312
64. ANS:
They are WEP, WPA, and WPA2. WEP is the weakest, and WPA2 is the strongest.
PTS: 1
REF: Page 312
65. ANS:
First, you need to find out what type of bus is available for the additional card. Then, you need to check what
type of medium is being used and what type of connector is required to connect to that medium.
PTS: 1
REF: Page 317
5