Network + Flash Cards Deck 2

1
Q

(Routing Loop Strategies)

____ works by preventing the router from advertising a route
back to the other router from which it was learned. This prevents two
nodes from bouncing packets back and forth between them, creating a
loop.

A

Split horizon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Routing Loop Strategies)

dictates that the route is advertised back on the interface from which it
was learned, but it has a hop count of infinity, which tells the node that
the route is unreachable.

A

Poison reverse (also called split horizon with poison reverse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ExamAlert

The term well-known ports identifies the ports ranging from 0 to 1023. When
CompTIA says to “identify the well-known ports,” this is what it refers t

A

ExamAlert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. As the network administrator, you decide to block port 80. Which of the following
    services will be unavailable for network users?
    ❍ A. DNS
    ❍ B. POP3
    ❍ C. FTP
    ❍ D. HTTP
A
  1. D. The HTTP service uses port 80, so blocking port 80 prevents users from using
    the HTTP service. Answer A is incorrect because DNS uses port 53. Answer B is
    incorrect because POP3 uses port 110. Answer C is incorrect because FTP uses
    port 21.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. D. The HTTP service uses port 80, so blocking port 80 prevents users from using
    the HTTP service. Answer A is incorrect because DNS uses port 53. Answer B is
    incorrect because POP3 uses port 110. Answer C is incorrect because FTP uses
    port 21.
A
  1. B. The most commonly used port for FTP in modern implementations is 21.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
1. Port mirroring enables administrators to monitor which traffic to the switch?
❍ A. Inbound only
❍ B. Outbound only
❍ C. Inbound and outbound
❍ D. Neither inbound nor outbound
A
  1. C. Port mirroring enables administrators to monitor the traffic outbound and
    inbound to the switch.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What are the most common distance-vector routing protocols?
A
  1. Distance-vector routing protocols include RIP, RIPv2, BGP, and EIGRP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is the difference between an active and passive hub?
A
  1. Hubs can be either active or passive. Hubs are considered active when
    they regenerate a signal before forwarding it to all the ports on the device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following best describes the function of the default gateway?
    ❍ A. It provides the route for destinations outside the local network.
    ❍ B. It enables a single Internet connection to be used by several users.
    ❍ C. It identifies the local subnet and formulates a routing table.
    ❍ D. It is used to communicate in a multiple-platform environment.
A
  1. A. The default gateway enables systems on one local subnet to access those on
    another. Answer B does not accurately describe the role of the default gateway.
    Answers C and D don’t describe the main function of a default gateway, which is
    to provide the route for destinations outside the local network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which technology enables electrical power to transmit over twisted-pair
    Ethernet cable?
A
  1. Power over Ethernet (PoE) is the technology that enables electrical power
    to transmit over twisted-pair Ethernet cable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. True or False: With the help of FSL, STP avoids or eliminates loops on
    Layer 2 bridges.
A
  1. False. With the help of Spanning Tree Algorithm (STA), STP avoids or
    eliminates loops on a Layer 2 bridge.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What are the most common link-state protocols?
A
  1. Link-state protocols include OSPF and IS-IS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is the major difference between a hub and a switch?
A
  1. Rather than forwarding data to all the connected ports, a switch forwards
    data only to the port on which the destination system is connected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
2. What is the term used for the number of hops necessary to reach a node?
❍ A. Jump list
❍ B. Link stops
❍ C. Connections
❍ D. Hop count
A
  1. D. The hop count is the number of hops necessary to reach a node.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following is NOT used to avoid redundant paths and potential loops
    within ports?
A
  1. D. The common methods to avoid redundant paths and potential loops within
    ports include blocking, disabled, forwarding, learning, and listening. Jamming is
    not one of the methods employed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. D. The common methods to avoid redundant paths and potential loops within
    ports include blocking, disabled, forwarding, learning, and listening. Jamming is
    not one of the methods employed.
A
  1. Hubs and switches have two types of ports: Medium-Dependent Interface
    (MDI) and Medium-Dependent Interface Crossed (MDI-X).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. What is convergence?
A
  1. Convergence represents the time it takes routers to detect change on the
    network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ are used in networks that use twisted-pair cabling to connect devices. They also
can be joined to create larger networks. They are simple devices that direct
data packets to all devices connected to the hub, regardless of whether the
data package is destined for the device.

A

hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ are used to divide larger networks into smaller sections. They
accomplish this by sitting between two physical network segments and managing
the flow of data between the two.

A

bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____ assigns IP addresses, eliminating the need to individually assign IP addresses and making
the job of network administrators considerably easier. When a ___ server runs on a network, the workstation boots up and requests an IP address from the server. The server responds to the request and automatically assigns an IP address to the computer for a given period of time, known as a lease. The workstation acknowledges the receipt of the IP address, and the workstation has all the information it needs to become part of the network.

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_____ are used to route information outside the network, such as on the Internet. On the Internet, an it is required. It is also a distance-vector protocol commonly used between hosts on the Internet to exchange routing table information. BGP is an example this.

A

Exterior Gateway Protocols

EGPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____ is a distance-vector routing protocol. It is
limited to a maximum of 15 hops. One of the downsides of the protocol
is that the original specification required router updates to be transmitted
every 30 seconds. On smaller networks this is acceptable; however,
this can result in a huge traffic load on larger networks

A

Routing Information Protocol (RIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ is a protocol that enables routers to exchange information more
efficiently than earlier network protocols. It uses its neighbors to
help determine routing information. Routers configured to use it
keep copies of their neighbors’ routing information and query these
tables to help find the best possible route for transmissions to follow.
It also uses Diffusing Update Algorithm (DUAL) to determine the best
route to a destination.

A

Enhanced Interior Gateway Routing

Protocol (EIGRP)

24
Q

_____ is the router’s IP address, which is the pathway to any and
all remote networks. To get a packet of information from one network to
another, the packet is sent to the _____, which helps forward the
packet to its destination network.

A

DEFAULT GATEWAY

25
Q

A ___ is a networking device, either hardware- or software-based, that
controls access to your organization’s network. This controlled access is
designed to protect data and resources from an outside threat.

A

firewall

26
Q

A link-state protocol that discovers the shortest path for data to travel using the
shortest path first (SPF) algorithm

A

Intermediate System-to-Intermediate System (IS-IS):

27
Q

A link-state routing protocol basedon the SPF (Shortest Path First) algorithm to find the least-cost path to any destination in the network.

A

Open Shortest Path First (OSPF):

28
Q

A routing protocol often associated with the Internet. ___ can be
used between gateway hosts on the Internet. It examines the routing
table, which contains a list of known routers, the addresses they can
reach, and a cost metric associated with the path to each router so that
the best available route is chosen. It communicates between the
routers using TCP.

A

Border Gateway Protocol (BGP)

29
Q

An ___ identifies the protocols used to exchange routing information between
routers within a LAN or interconnected LANs. It is not a protocol itself but describes a category of link-state routing protocols that support a single, confined geographic area such as a LAN. IGPs fall into two categories: distance-vector protocols, which include RIP and IGRP, and link-state protocols, which include OSPF and IS-IS.

A

Interior Gateway Protocols (IGP)

30
Q

As a heads-up, talking about STP refers to Layer 2 of the OSI model. Both bridges
and switches work at Layer 2. Routers work at Layer 3.

A

KNOW THIS

31
Q

As discussed in Chapter 2, “OSI and TCP/IP Models and Network
Protocols,” the term ____ is used to describe the logical grouping of data at
the data link layer. A bridge works at Layer 2 (the data link layer) of the OSI
model

A

frame

32
Q

authenticating users on a port-byport basis.

A

Port Authentication

33
Q

Before a data packet is forwarded, a chart is reviewed to determine the best
possible path for the data to reach its destination. This chart is the computer’s
_____.

A

Routing Tables

34
Q

enables a bridge or switch to dynamically work around loops in a network’s
topology.

A

Spanning Tree Algorithm (STA)

35
Q

ExamAlert:

If a change in the routing is made, it takes some time for the routers to detect and
accommodate this change. This is known as convergence.

A

KNOW THIS

36
Q

ExamAlert

Because hubs don’t perform any processing, they do little except enable communication
between connected devices. For today’s high-demand network applications,
something with a little more intelligence is required. That’s where switches come in.

A

KNOW THIS

37
Q

ExamAlert

Know that “next hop” in routing is the next closest router that a packet can go
through.

A

KNOW THIS

38
Q

ExamAlert

Remember that a firewall can protect internal networks from public networks and
control access between specific network segments.

A

KNOW THIS

39
Q

ExamAlert
STP actively monitors the network, searching for redundant links. When it finds
some, it shuts them down to prevent switching loops. STP uses STA to create a
topology database to find and then remove the redundant links. With STP operating
from the switch, data is forwarded on approved paths, which limits the potential
for loops.

A

KNOW THIS

40
Q

ExamAlert
Today, bridges are falling out of favor. Ethernet switches offer similar functionality;
they can provide logical divisions, or segments, in the network. Switches are sometimes
called multiport bridges because of how they operate

A

KNOW THIS

41
Q

having more than one path between two switches in a network is called:

A

switching loops

42
Q

In a ___ switching environment, the packet
begins to be forwarded as soon as it is received. This method is fast, but
it creates the possibility of errors being propagated through the network,
because no error checking occurs.

A

cut-through

43
Q

In a _____ environment, routers use special routing protocols to
communicate. The purpose of these protocols is simple: They enable routers
to pass on information about themselves to other routers so that other routers
can build routing tables

A

dynamic routing

44
Q

n a ____switching environment, enough of the packet is read so
that the switch can determine whether the packet has been involved in a
collision. As soon as the collision status has been determined, the packet
is forwarded.

A

FragmentFree

45
Q

In Bridge Placements, bridges should be positioned in the network using the ____ rule. This rule dictates that __ of the data should be local and the other 20% should be destined for devices on the other side of
the bridge.

A

80/20

80%

20%

46
Q

In computer networking, the term _____ refers to the use of multiple network
cables or ports in parallel to increase the link speed beyond the limits of
any one cable or port

A

trunking

47
Q

In Dynamic Routing, Two types of routing protocols are used They are:

A

distance-vector protocols and link-state protocols.

48
Q

In environments that use ____ , routes and route information are manually
entered into the routing tables.

A

static routing

49
Q

So what’s the difference between OSPF and IS-IS protocols?

A

OSPF (a network layer protocol) is more often used in medium to large enterprise networks because of its specialtunneling features.

IS-IS is more often used in large ISP networks because of its stability features and that it can support more router

50
Q

STP uses _______ to identify the status of ports
and bridges across the network. These are simple data messages exchanged
between switches. They contain information on ports and provide the status
of those ports to other switches.

A

bridge protocol data units (BPDUs)

51
Q

Terms:

specifies the maximum packet size permitted for Internet transmission.

A

specifies the maximum packet size permitted for Internet transmission.

52
Q

TERMS:

the amount of time it takes for a packet to travel from one
location to another.

A

Latency

53
Q

Terms:

the number of hops necessary to reach a node. A hop
count of infinity means the route is unreachable

A

Hop counts

54
Q

Terms:

the numbers associated with traveling from point A to point B
(often hops). The lower the total costs (the less links in the route), the
more that route should be favored.

A

Costs

55
Q

The _____ command adds a static route to the routing table. The route
add command with the ____ switch makes the static route persistent.

A

route add

-P