100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CNET 157 Final Exam Questions and Answers $12.49   Add to cart

Exam (elaborations)

CNET 157 Final Exam Questions and Answers

 0 view  0 purchase
  • Course
  • Prep Tests
  • Institution
  • Prep Tests

CNET 157 Final Exam Questions and Answers In general, what level of security should use with your access points? - ANSWER-wireless encryption protocol A router's final task when handling a packet is to send the packet onto its next and possibly final destination; this is referred to as packet ...

[Show more]

Preview 4 out of 31  pages

  • November 10, 2024
  • 31
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Prep Tests
  • Prep Tests
avatar-seller
OliviaWest
Copyright © OLIVIAWEST 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED




CNET 157 Final Exam Questions and

Answers


In general, what level of security should use with your access points? - ANSWER✔✔-wireless encryption

protocol


A router's final task when handling a packet is to send the packet onto its next and possibly final

destination; this is referred to as packet _____. - ANSWER✔✔-forwarding


T/F


One type of security for wireless networks involves entering a list of the MAC addresses for the devices

that are allowed to access the network and excluding all others. This is called MAC filtering. -

ANSWER✔✔-True


T/F


Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most

wireless networks. - ANSWER✔✔-False


You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is connected to

switch D. Furthermore, Switch A and B are connected and Switch C and D are connected. One of the

connections is in blocking mode. What protocol must be running on the switches? - ANSWER✔✔-STP


What command issued from a command prompt will display the routing table in windows? -

ANSWER✔✔-route print



Copyright ©Stuvia International BV 2010-2024 Page 1/31

, Copyright © OLIVIAWEST 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED


T/F


Routers can be used to control network access by inspecting the source and destination address

information of packets. - ANSWER✔✔-True


Which of the following us NOT a true statement regarding the function of a switch?


A) It determines the path used based on the destination IP address


B) it sends broadcast frames out all connected ports except the port where the frame was received


C) Each port on a switch represents a separate collision domain


D) Switches have the ability to operate in full-duplex mode - ANSWER✔✔-It determines the path used

based on the destination IP address


What type of hacker uses a scanning device to find unsecured wireless networks and breaks into those

networks? - ANSWER✔✔-wardriver


Access control lists can be configured based on what? - ANSWER✔✔-protocol


TCP port


souces IP address


T/F


All network switches require substantial configuration before they can be put into operation in a

network. - ANSWER✔✔-False


What combination will you find in a switching table? - ANSWER✔✔-MAC address/switch port number




Copyright ©Stuvia International BV 2010-2024 Page 2/31

, Copyright © OLIVIAWEST 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED


On a router configures to use RIP, the number of routers a packet must travel through before it reaches

its destination is called what? - ANSWER✔✔-metric


hop count


What is NOT a function that would be found in a managed switch? - ANSWER✔✔-the ability to transfer

its switching table with neighboring switches


Your colleagues are discussing the operation of a device in which packets are routed between VLANs on

the device rather than having to exit the device to be routed. What type of device are they most likely

descussing? - ANSWER✔✔-Layer 3 switch


When a router's interface is configured to connect with a switch trunk port to route packets between

VLANs, what is this called? - ANSWER✔✔-router on a stick


What is the fastest switching mode? - ANSWER✔✔-cut-through


T/F


When a switch receives a broadcast frame, it floods the frame out all ports. - ANSWER✔✔-True


Which advanced feature of a NIC allows a computer to download an OS from the network instead of

from a local drive? - ANSWER✔✔-preboot execution environment


What has occurred when all routers in a network have accurate information after a change in the

network? - ANSWER✔✔-convergence


T/F


A bus is used to make connections between the network interface card and the other vital components

of the computer, such as the central processing unit. - ANSWER✔✔-True


Copyright ©Stuvia International BV 2010-2024 Page 3/31

, Copyright © OLIVIAWEST 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED


What is the name of the value assigned to a routing protocol to indicate its reliability compared with

other routing protocols that might be in use on the same router? - ANSWER✔✔-administrative distance


What category of routing protocol is used to route packets between autonomous systems? -

ANSWER✔✔-Exterior Gateway Protocol or EGP


What would be found in a router's routing table? - ANSWER✔✔-timestamp


destination network


next hop


metric


What is a common link-state routing protocol? - ANSWER✔✔-Open Shortest Path First or OSPF


T/F


A distance vector protocol sends updates to its neighbors that include the contents of its routing table. -

ANSWER✔✔-True


T/F


More VLANs mean fewer logical networks, so the network is less complex. - ANSWER✔✔-False


Which switching method reads a minimum of 64-bytes of an Ethernet frame before forwarding the

frame? - ANSWER✔✔-fragment-free


In which type of routing protocol is a router's routing table copied to neighboring routers to share

internetwork information? - ANSWER✔✔-distance-vector protocol


T/F



Copyright ©Stuvia International BV 2010-2024 Page 4/31

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller OliviaWest. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80796 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart