CNET 157 Final Exam UPDATED Questions and CORRECT Answers
0 view 0 purchase
Course
CNET 157
Institution
CNET 157
CNET 157 Final Exam UPDATED
Questions and CORRECT Answers
In general, what level of security should use with your access points? - CORRECT
ANSWER- wireless encryption protocol
A router's final task when handling a packet is to send the packet onto its next and possibly
final destination; thi...
CNET 157 Final Exam UPDATED
Questions and CORRECT Answers
In general, what level of security should use with your access points? - CORRECT
ANSWER✔✔- wireless encryption protocol
A router's final task when handling a packet is to send the packet onto its next and possibly
final destination; this is referred to as packet _____. - CORRECT ANSWER✔✔- forwarding
T/F
One type of security for wireless networks involves entering a list of the MAC addresses for
the devices that are allowed to access the network and excluding all others. This is called
MAC filtering. - CORRECT ANSWER✔✔- True
T/F
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for
most wireless networks. - CORRECT ANSWER✔✔- False
You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is
connected to switch D. Furthermore, Switch A and B are connected and Switch C and D are
connected. One of the connections is in blocking mode. What protocol must be running on
the switches? - CORRECT ANSWER✔✔- STP
What command issued from a command prompt will display the routing table in windows? -
CORRECT ANSWER✔✔- route print
T/F
Routers can be used to control network access by inspecting the source and destination
address information of packets. - CORRECT ANSWER✔✔- True
Which of the following us NOT a true statement regarding the function of a switch?
A) It determines the path used based on the destination IP address
B) it sends broadcast frames out all connected ports except the port where the frame was
received
,C) Each port on a switch represents a separate collision domain
D) Switches have the ability to operate in full-duplex mode - CORRECT ANSWER✔✔- It
determines the path used based on the destination IP address
What type of hacker uses a scanning device to find unsecured wireless networks and breaks
into those networks? - CORRECT ANSWER✔✔- wardriver
Access control lists can be configured based on what? - CORRECT ANSWER✔✔- protocol
TCP port
souces IP address
T/F
All network switches require substantial configuration before they can be put into operation
in a network. - CORRECT ANSWER✔✔- False
What combination will you find in a switching table? - CORRECT ANSWER✔✔- MAC
address/switch port number
On a router configures to use RIP, the number of routers a packet must travel through before
it reaches its destination is called what? - CORRECT ANSWER✔✔- metric
hop count
What is NOT a function that would be found in a managed switch? - CORRECT
ANSWER✔✔- the ability to transfer its switching table with neighboring switches
Your colleagues are discussing the operation of a device in which packets are routed between
VLANs on the device rather than having to exit the device to be routed. What type of device
are they most likely descussing? - CORRECT ANSWER✔✔- Layer 3 switch
When a router's interface is configured to connect with a switch trunk port to route packets
between VLANs, what is this called? - CORRECT ANSWER✔✔- router on a stick
What is the fastest switching mode? - CORRECT ANSWER✔✔- cut-through
, T/F
When a switch receives a broadcast frame, it floods the frame out all ports. - CORRECT
ANSWER✔✔- True
Which advanced feature of a NIC allows a computer to download an OS from the network
instead of from a local drive? - CORRECT ANSWER✔✔- preboot execution environment
What has occurred when all routers in a network have accurate information after a change in
the network? - CORRECT ANSWER✔✔- convergence
T/F
A bus is used to make connections between the network interface card and the other vital
components of the computer, such as the central processing unit. - CORRECT ANSWER✔✔-
True
What is the name of the value assigned to a routing protocol to indicate its reliability
compared with other routing protocols that might be in use on the same router? - CORRECT
ANSWER✔✔- administrative distance
What category of routing protocol is used to route packets between autonomous systems? -
CORRECT ANSWER✔✔- Exterior Gateway Protocol or EGP
What would be found in a router's routing table? - CORRECT ANSWER✔✔- timestamp
destination network
next hop
metric
What is a common link-state routing protocol? - CORRECT ANSWER✔✔- Open Shortest
Path First or OSPF
T/F
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.