MMT - Quiz mạng máy tính cơ sở - Công nghệ thông tin | Đại học Hoa Sen

MMT - Quiz mạng máy tính cơ sở - Công nghệ thông tin | Đại học Hoa Sen được sưu tầm và soạn thảo dưới dạng file PDF để gửi tới các bạn sinh viên cùng tham khảo, ôn tập đầy đủ kiến thức, chuẩn bị cho các buổi học thật tốt. Mời bạn đọc đón xem

MẠNG MÁY TÍNH CƠ SỞ
Week 9 :
Question1:
Match each factor that influences the transmission of radio waves to its correct description.
OccurswhenRFwavesaresoakedupbywalls absorption
OccurswhenRFwavesstrikeanunevensurfaceandarereflectedinmanydirections scattering
OccurswhenRFwavesbounceoffmetalorglasssurfaces reflection
Question2:
Match each of the following 802.11 topologies to its description.
Mobileclientsconnectdirectlywithoutanintermediateaccesspoint. Adhocmode
Thecommunicationdevicesuseasingleaccesspointforconnectivity
toeachotherortowirednetworkresources.
BasicServiceSet(BSS)
Thewirelesstopologyistwoormoreservicesetsconnectedbya
distributionsystem(DS)or,morecommonly,awiredinfrastructure.
ExtendedServicesSet(ESS)
Question3:
What is the most tangible benefit of wireless implementation?
a.Betterproductivity
b.Increasedmobility
c.Improvedsecurity
d. Cost reduction
Question4:
What method does a WLAN use to control transmissions?
a.CSMA/CD(carriersensemultipleaccesscollisiondetect)
b.CSMA/CW(carriersensemultipleaccesswithcollisionweighting)
c.CSMA/CR(carriersensemultipleaccesswithcollisionrejection)
d. CSMA/CA (carrier sense multiple access with collision avoidance)
Question5:
Which regulatory agency controls the 801.11 standard that governs WLANs?
a.WISC
b.EMA
c.Wi-FiAlliance
d. IEEE
Question6:
Which organization offers certification for interoperability among vendors of 802.11 products?
a.EMA
b.IEEE
c.WISC
d. Wi-Fi
Question7:
Which two are the unlicensed bands used by WLANs?
a.900-MHzband
b. 2.4-GHz band
c.900-GHzband
d.2.4-MHzband
e. 5-GHz band
Question8:
Which two of the 802.11 standards has the highest possible data rates?
a.802.11
b. 802.11a
c.802.11b
d.802.11d
e. 802.11g
Question9:
Which 802.11 standard transmits using the 5-GHz band?
a.802.11d
b. 802.11a
c.802.11
d.802.11b
e.802.11g
Question10:
Which is true about the Wi-Fi Alliance organization?
a.ItisaglobalstandardsorganizationthatcontrolsthecompatibilityofWi-Fiproducts.
b.ItoperatesonlyintheUnitedStatesandensuresthecompatibilityofWi-Fiproducts.
c.Itisaglobal,nonprofitindustrytradeassociationdevotedtopromotingtheinstallationofwireless
LANsinretaillocations.
d. It is a global, nonprofit industry trade association devoted to promoting the growth and
acceptance of wireless LANs.
Question11:
What is a rogue access point?
a.AnaccesspointthatisbroadcastingitsSSID
b.AnaccesspointthathashadahardwarefailurethatcausesittoendlesslybroadcastitsSSID
c. An unsecured access point that has been placed on a WLAN
d.AnaccesspointthathasanopenWEPkey
Question12:
Which three are the steps to secure a WLAN? (Choose three)
a. Encryption for providing privacy and confidentiality
b. Authentication to ensure that legitimate clients and users access the network via trusted access
points
c.Controlstotransmitpowertolimittheaccesspointaccessrangetothepropertyboundariesofthe
parentorganization
d. Protection from security risks and availability with intrusion detection and intrusion
protection systems for WLANs
Question13:
Which standard provides the strongest level of WLAN security?
a. 802.11i/WPA2
b.EAP
c.WPA
d.WEP
Question14:
What factor determines which access point a client associates with?
a.TheaccesspointwiththehighestSSID
b.TheaccesspointwiththelowestSSID
c.TheaccesspointwhoseSSIDisreceivedfirst
d. The access point that is received with the strongest signal
Question15:
When you are using 802.11x, how is the client authenticated?
a.Theaccesspointforwardsallnetworktraffictotheserverwhereitiseitherauthenticatedorblocked.
b.Theclientencapsulatesthe802.1xauthenticationtrafficbeforesendingittotheaccesspoint.This
causestheaccesspointtoforwardittotheserver.
c.Theclientisauthenticatedagainstalocaldatabasestoredontheaccesspoint.
d. The access point encapsulates any 802.1x traffic bound for the authentication server and sends
it to the server.
Question16:
Which is true when comparing WPA and WPA2?
a.WPAusespresharedkeyswhereasWPA2usesPSK.
b.WPAusesEAPauthenticationwhereasWPA2uses802.11x.
c.WPAusesaPersonalModewhereasWPA2usesanEnterpriseMode.
d. WPA uses TKIP/MIC encryption whereas WPA 2 uses AES-CCMP encryption.
Question17:
What does the physical area of radio frequency coverage provided by an access point define?
a.Theadhocservicearea
b.TheRFservicearea
c. The basic service area
d.Theextendedservicesarea
Question18:
When implementing Extended Service Areas, how much overlap is suggested?
a.25to30percent
b.5to10percent
c.15to20percent
d. 10 to 15 percent
Question19:
What strategy enables a client to communicate while moving?
a. The ability to shift data rates
b.Theabilitytomatchthetransmitleveltothereceivelevel
c.Theabilitytovarytransmitlevels
d.Theabilitytoperformerrorcorrectionasthesignallevelchanges
Question20:
Which three are basic wireless access point parameters?
a. SSID
b.Dataexchangerates
c.Transmitbandselection
d. Authentication
e. RF channel with optional power
Question21:
When implementing a WLAN, when should you use WEP?
a. Only if the hardware equipment does not support WPA
b.OnlyifanAAAserverisavailable
c.Whenyouareplanningtoenable802.11xauthentication
d.WhenyouneedtheincreasedsecurityofWEP
Week 10 :
Question1:
Which of the following contains routing information that helps a router in determining the routing
path? (Choose three.)
a. Routing protocol
b. IP address
c. Routing table
d.MACaddress
Question2:
Arrange the following steps of the routing process in the correct order.
Therouterreceivesapacketononeofitsinterfaces. Step1
Theoutgoinginterfaceprocessencapsulatesthepacketappropriatelytothemediaand
sendsthepacketontothenetworksegment.
Step5
Ifthedestinationnetworkisonadirectlyattachednetwork,therouterwillusethe
ARPprocesstoobtaintheMACaddressofthehostandforwardittothenetwork
segment.Ifthenetworkisreachablethroughanotherrouter,therouterwillusethe
MACaddressofthenext-hoprouterandforwardthepacketouttheinterface
indicatedintheroutingtable.
Step4
Therouterdeencapsulatestheframeandusestheprotocolinformationoftheframeto
determinethatthenetworklayerpacketwillpasstotheIPprocess.
Step2
TherouterchecksthedestinationaddressintheIPheader.Eitherthepacketis
destinedfortherouteritselforitneedstobeforwarded.Ifthepacketneedstobe
forwarded,theroutersearchesitsroutingtabletodeterminewheretosendthepacket.
Step3
Question3:
Match each of the following method of populating a routing table to its definition.
Thisentrycomesfromhavinginterfacesattachedtonetworksegments.
Thisentryisobviouslythemostcertain;iftheinterfacefailsoris
administrativelyshutdown,theentryforthatnetworkwillberemoved
fromtheroutingtable.
Directlyconnectednetwork
Theseroutesarelearnedbytherouter,andtheinformationisresponsive
tochangesinthenetworksothattherouterisconstantlybeingupdated.
Dynamicrouting
Theseroutesareenteredmanuallybyasystemadministratordirectlyinto
theconfigurationofarouter.
Staticrouting
Thisisanoptionalentrythatisusedwhennoexplicitpathtoa
destinationisfoundintheroutingtable.Thisentrycanbemanually
insertedorbepopulatedfromadynamicroutingprotocol.
Defaultroute
Question4:
Which of the following components are common to routers, switches, and computers (Choose three.)
a. RAM
b. CPU
c. Motherboard
d.Keyboard
Question5:
Which of the following types of ports do routers have? (Choose two.)
a. Console
b.CD-ROM
c.Printer
d.USB
e. Network
Question6:
Which of the following statements best describe the functions of a router in a network? (Choose two.)
a.RoutersuseICMPtocommunicatenetworkinformationfromtheirownroutingtablewithother
routers.
b.Routersstrengthenthesignaloverlargedistancesinanetwork.
c. Routers use the routing table to determine where to forward packets.
d.Routerscreatelargercollisiondomains.
e. Routers maintain their routing tables and ensure that other routers know of changes in the
network.
Question7:
Which of the following statements about the path determination process are accurate? (Choose three.)
a.Dynamicroutingoccurswhenthenetworkadministratorconfiguresinformationoneachrouter.
b.Adefaultrouteholdsanexplicitroutetoeverynetwork.
c. The routing process uses metrics and administrative distances when evaluating network paths.
d.Theroutingtableholdsmultipleentriespernetwork.
e. Routers evaluate the available paths to a destination.
f. Dynamic routing occurs when information is learned using routing information that is
obtained from routing protocols.
Question8:
Which of the following statements describe the function of routing tables? (Choose three.)
a.RoutingtablesaremaintainedthroughthetransmissionofMACaddresses.
b.Althoughroutingprotocolsvary,routingmetricsdonot.
c. Routing table associations tell a router that a particular destination is either directly connected
to the router or that it can be reached through another router (the next-hop router) on the way to
the final destination.
d.Whenarouterreceivesanincomingpacket,itusesthesourceaddressandsearchestheroutingtable
tofindthebestpathforthedatafromthatsource.
e. Routing tables provide an ordered list of known network addresses.
f. Routing tables contain metrics that are used to determine the desirability of the route.
Question9:
Which of the following metrics are most commonly used by routing protocols to determine a network
path? (Choose three.)
a. Delay
b. Hop count
c.Distance
d. Bandwidth
e.Packetlength
f.Quantity
Week 11 :
Question1:
Match each type of WAN device to its function.
WANsusethesetoprovideaccess.
Othernetworking
devices
TheyprovideinternetworkingandWANaccessinterfaceports. Routers
Inanaloglines,theyconvertthedigitalsignalofthesendingdeviceintoanalog
formatfortransmissionoverananaloglineandthenconvertthesignalbackto
digitalformsothatthereceivingdevicecanreceiveandprocessthenetworksignal.
Modems
Theyconcentratedial-inanddial-outusercommunications.
Communication
servers
Question2:
Match each type of connection on a router to its function.
provideatext-basedconnectionfortheconfigurationandtroubleshootingofthe
router.
Managementports
allowtheroutertoconnecttotheLANmediathroughEthernetorsomeother
LANtechnologysuchasTokenRingorATM.
LANinterfaces
aremadethroughaWANinterfaceonaroutertoaserviceprovidertoadistant
siteortotheInternet.
WANinterfaces
Question3:
Match each type of communication link to its function in a WAN.
Dedicated
communicationlinks
Providesapre-establishedWANcommunicationspathfromthecustomer
premisesthroughtheprovidernetworktoaremotedestination
Packet-switched
communicationlinks
Transmitsdatainlabeledcells,frames,orpackets
Circuit-switched
communicationlinks
Dynamicallyestablishesadedicatedvirtualconnectionforvoiceordata
betweenasenderandareceiver
Question4:
Which three statements accurately describe WANs?
a.ThecompaniesinwhichWANsareimplementedusuallyowntheWANs.
b. WANs use serial connections of various types to provide access to bandwidth.
c.WANsconnectdevicesthatareinasmallgeographicarea.
d. WANs connect devices that are separated by wide geographic areas.
e. WANs use the services of carriers such as telephone companies, cable companies, satellite
systems, and network providers.
f.WANsgenerallycarrylimitedtypesofdataathighspeeds.
Question5:
Which three communications needs do WANs address?
a.Adepartmentneedstosharelargedatafilesquickly.
b.Administrativestaffwithinaschoolneedtosharescheduleinformationwiththeteachers.
c.Workersinasmallbusinessneedtobeabletocommunicateandsharedatawitheachother.
d. Organizations often want to share information with other organizations across large distances.
e. Workers within a branch of a large company need to share project data with each other.
f. Students need to do research for classes by accessing library indexes and publications located
in other parts of their country and in other parts of the world.
Question6:
Which two statements accurately describe the difference between LANs and WANs?
a. Whereas a LAN connects computers, peripherals, and other devices in a single building or
other small geographic area, a WAN transmits data across broad geographic distances.
b.AWANtransmitsdatafasterthanaLAN.
c.AcompanyororganizationusuallyownsthehardwareandsoftwarerequiredforWANs.
d.LANsspanlargegeographicareasifaLANadministratorconfiguresthemcorrectly.
e. A LAN transmits data faster than a WAN.
Question7:
At which OSI layer do WAN protocols describe how to provide electrical, mechanical, operational,
and functional connections to the services of a communications service provider?
a.Layer3
b.Layer2
c. Layer 1
d.Layer4
Question8:
At which OSI layer do WAN protocols define encapsulation of data for transmission toward a remote
location and the mechanisms for transferring the resulting frames?
a. Layer 2
b.Layer4
c.Layer3
d.Layer1
Question9:
Which two statements accurately describe data-link protocols in a WAN?
a. Many data link layer protocols use a framing mechanism similar to HDLC.
b. Data link layer protocols define how data is encapsulated for transmission to remote sites, and
also the mechanisms for transferring the resulting frames to establish the connection across the
communication line from the sending to the receiving device.
c.RIPisanexampleofadata-linkprotocol.
d.DatalinklayerprotocolsdeterminethecabletypetobeusedintheWAN.
e.ICMPisanexampleofadata-linkprotocol.
Question10:
Which three statements accurately describe the functions of a packet-switching WAN communication
link?
a. The cost of a packet-switched network to the customer is generally lower than with point-to-
point leased lines.
b. The route that the packets take to reach the destination site varies.
c.ThePSTNusespacketswitching.
d. Packet-switched networks send data packets over different routes of a shared public network
owned by a carrier to reach the same destination.
e.Packetswitchingisacommunicationmethodinwhichusershaveadedicatedpathbetweensource
anddestinationendpoints.
f.Inapacket-switchingnetwork,eachcustomerusesthefullbandwidthonitsvirtualcircuit.
Question11:
Which command displays information about static route configuration on a Cisco router?
a.showrouteipstatic
b.showiproutestatic
c.showrouteip
d. show ip route
Question12:
What does the command ip route 186.157.5.0 255.255.255.0 10.1.1.3 specify?
a. The router should use address 10.1.1.3 to get to devices on network 186.157.5.0.
b.Both186.157.5.0and10.1.1.3useamaskof255.255.255.0.
c.Youwanttheroutertotracearoutetonetwork186.157.5.0via10.1.1.3.
d.Theroutershouldusenetwork186.157.5.0togettoaddress10.1.1.3.
Question13:
Which of the following protocols is an example of an exterior gateway protocol?
a. BGP
b.IGRP
c.RIP
d.EIGRP
Question14:
In which situation is an administrative distance required?
a.Whendynamicroutingisenabled
b.Whenstaticroutesaredefined
c.Whenmultiplepathsareavailabletothesamedestinationandtheyarealllearnedviathesame
routingprotocol
d. When the same route is learned via multiple routing protocols
Question15:
When a router receives a packet with a destination address that is in an unknown subnetwork of a
directly attached network, what is the default behavior if the ip classless command is not enabled?
a.Forwardthepackettothedefaultroute
b. Drop the packet
c.Forwardthepackettothenexthopforthedirectlyattachednetwork
d.Broadcastthepacketthroughallinterfacesexcepttheoneonwhichitwasreceived
Question16:
How does a distance vector router learn about paths for networks that are not directly connected?
a. From neighboring routers
b.Fromthedestinationrouter
c.Fromthesourcerouter
d.Adistancevectorrouterlearnsonlyaboutdirectlyconnectednetworks
Question17:
What does a distance vector router send to its neighboring routers as part of a periodic routing table
update?
a.Informationaboutnewroutes
b.Informationaboutroutesthathavechanged
c.Informationaboutroutesthatnolongerexist
d. The entire routing table
Question18:
What is the maximum allowable hop count for RIP?
a. 15
b.6
c.30
d.60
Question19:
With RIP, load balancing is performed over multiple paths that have which characteristic?
a.Equalweight
b.Equalbandwidth
c. Equal cost
d.Equaldistance
Question20:
Which command correctly specifies RIP as the routing protocol?
a.Router(config)#rip
b.Router(config-router)#routerrip{ASno.}
c.Router(config-router)#rip{ASno.}
d. Router(config)#router rip
Question21:
What is the default value of the RIP hold-down timer?
a.30seconds
| 1/15

Preview text:

MẠNG MÁY TÍNH CƠ SỞ Week 9 : Question1:
Match each factor that influences the transmission of radio waves to its correct description.
OccurswhenRFwavesaresoakedupbywalls absorption
OccurswhenRFwavesstrikeanunevensurfaceandarereflectedinmanydirections scattering
OccurswhenRFwavesbounceoffmetalorglasssurfaces reflection Question2:
Match each of the following 802.11 topologies to its description.
Mobileclientsconnectdirectlywithoutanintermediateaccesspoint. Adhocmode
Thecommunicationdevicesuseasingleaccesspointforconnectivity BasicServiceSet(BSS)
toeachotherortowirednetworkresources.
Thewirelesstopologyistwoormoreservicesetsconnectedbya
ExtendedServicesSet(ESS)
distributionsystem(DS)or,morecommonly,awiredinfrastructure. Question3:
What is the most tangible benefit of wireless implementation? a.Betterproductivity b.Increasedmobility c.Improvedsecurity d. Cost reduction Question4:
What method does a WLAN use to control transmissions?
a.CSMA/CD(carriersensemultipleaccesscollisiondetect)
b.CSMA/CW(carriersensemultipleaccesswithcollisionweighting)
c.CSMA/CR(carriersensemultipleaccesswithcollisionrejection)
d. CSMA/CA (carrier sense multiple access with collision avoidance) Question5:
Which regulatory agency controls the 801.11 standard that governs WLANs? a.WISC b.EMA c.Wi-FiAlliance d. IEEE Question6:
Which organization offers certification for interoperability among vendors of 802.11 products? a.EMA b.IEEE c.WISC d. Wi-Fi Question7:
Which two are the unlicensed bands used by WLANs? a.900-MHzband b. 2.4-GHz band c.900-GHzband d.2.4-MHzband e. 5-GHz band Question8:
Which two of the 802.11 standards has the highest possible data rates? a.802.11 b. 802.11a c.802.11b d.802.11d e. 802.11g Question9:
Which 802.11 standard transmits using the 5-GHz band? a.802.11d b. 802.11a c.802.11 d.802.11b e.802.11g Question10:
Which is true about the Wi-Fi Alliance organization?
a.ItisaglobalstandardsorganizationthatcontrolsthecompatibilityofWi-Fiproducts.
b.ItoperatesonlyintheUnitedStatesandensuresthecompatibilityofWi-Fiproducts.
c.Itisaglobal,nonprofitindustrytradeassociationdevotedtopromotingtheinstallationofwireless
LANsinretaillocations.
d. It is a global, nonprofit industry trade association devoted to promoting the growth and
acceptance of wireless LANs.
Question11:
What is a rogue access point?
a.AnaccesspointthatisbroadcastingitsSSID
b.AnaccesspointthathashadahardwarefailurethatcausesittoendlesslybroadcastitsSSID
c. An unsecured access point that has been placed on a WLAN
d.AnaccesspointthathasanopenWEPkey Question12:
Which three are the steps to secure a WLAN? (Choose three)
a. Encryption for providing privacy and confidentiality
b. Authentication to ensure that legitimate clients and users access the network via trusted access points
c.Controlstotransmitpowertolimittheaccesspointaccessrangetothepropertyboundariesofthe parentorganization
d. Protection from security risks and availability with intrusion detection and intrusion
protection systems for WLANs
Question13:
Which standard provides the strongest level of WLAN security? a. 802.11i/WPA2 b.EAP c.WPA d.WEP Question14:
What factor determines which access point a client associates with?
a.TheaccesspointwiththehighestSSID
b.TheaccesspointwiththelowestSSID
c.TheaccesspointwhoseSSIDisreceivedfirst
d. The access point that is received with the strongest signal Question15:
When you are using 802.11x, how is the client authenticated?
a.Theaccesspointforwardsallnetworktraffictotheserverwhereitiseitherauthenticatedorblocked.
b.Theclientencapsulatesthe802.1xauthenticationtrafficbeforesendingittotheaccesspoint.This
causestheaccesspointtoforwardittotheserver.
c.Theclientisauthenticatedagainstalocaldatabasestoredontheaccesspoint.
d. The access point encapsulates any 802.1x traffic bound for the authentication server and sends it to the server. Question16:
Which is true when comparing WPA and WPA2?
a.WPAusespresharedkeyswhereasWPA2usesPSK.
b.WPAusesEAPauthenticationwhereasWPA2uses802.11x.
c.WPAusesaPersonalModewhereasWPA2usesanEnterpriseMode.
d. WPA uses TKIP/MIC encryption whereas WPA 2 uses AES-CCMP encryption. Question17:
What does the physical area of radio frequency coverage provided by an access point define?
a.Theadhocservicearea b.TheRFservicearea c. The basic service area
d.Theextendedservicesarea Question18:
When implementing Extended Service Areas, how much overlap is suggested?
a.25to30percent b.5to10percent c.15to20percent d. 10 to 15 percent Question19:
What strategy enables a client to communicate while moving?
a. The ability to shift data rates
b.Theabilitytomatchthetransmitleveltothereceivelevel
c.Theabilitytovarytransmitlevels
d.Theabilitytoperformerrorcorrectionasthesignallevelchanges Question20:
Which three are basic wireless access point parameters? a. SSID
b.Dataexchangerates
c.Transmitbandselection d. Authentication
e. RF channel with optional power
Question21:
When implementing a WLAN, when should you use WEP?
a. Only if the hardware equipment does not support WPA
b.OnlyifanAAAserverisavailable
c.Whenyouareplanningtoenable802.11xauthentication
d.WhenyouneedtheincreasedsecurityofWEP Week 10 : Question1:
Which of the following contains routing information that helps a router in determining the routing path? (Choose three.) a. Routing protocol b. IP address c. Routing table d.MACaddress Question2:
Arrange the following steps of the routing process in the correct order.
Therouterreceivesapacketononeofitsinterfaces. Step1
Theoutgoinginterfaceprocessencapsulatesthepacketappropriatelytothemediaand Step5
sendsthepacketontothenetworksegment.
Ifthedestinationnetworkisonadirectlyattachednetwork,therouterwillusethe
ARPprocesstoobtaintheMACaddressofthehostandforwardittothenetwork
segment.Ifthenetworkisreachablethroughanotherrouter,therouterwillusethe Step4
MACaddressofthenext-hoprouterandforwardthepacketouttheinterface
indicatedintheroutingtable.
Therouterdeencapsulatestheframeandusestheprotocolinformationoftheframeto Step2
determinethatthenetworklayerpacketwillpasstotheIPprocess.
TherouterchecksthedestinationaddressintheIPheader.Eitherthepacketis
destinedfortherouteritselforitneedstobeforwarded.Ifthepacketneedstobe Step3
forwarded,theroutersearchesitsroutingtabletodeterminewheretosendthepacket. Question3:
Match each of the following method of populating a routing table to its definition.
Thisentrycomesfromhavinginterfacesattachedtonetworksegments.
Thisentryisobviouslythemostcertain;iftheinterfacefailsoris
Directlyconnectednetwork
administrativelyshutdown,theentryforthatnetworkwillberemoved fromtheroutingtable.
Theseroutesarelearnedbytherouter,andtheinformationisresponsive Dynamicrouting
tochangesinthenetworksothattherouterisconstantlybeingupdated.
Theseroutesareenteredmanuallybyasystemadministratordirectlyinto Staticrouting
theconfigurationofarouter.
Thisisanoptionalentrythatisusedwhennoexplicitpathtoa
destinationisfoundintheroutingtable.Thisentrycanbemanually Defaultroute
insertedorbepopulatedfromadynamicroutingprotocol. Question4:
Which of the following components are common to routers, switches, and computers (Choose three.) a. RAM b. CPU c. Motherboard d.Keyboard Question5:
Which of the following types of ports do routers have? (Choose two.) a. Console b.CD-ROM c.Printer d.USB e. Network Question6:
Which of the following statements best describe the functions of a router in a network? (Choose two.)
a.RoutersuseICMPtocommunicatenetworkinformationfromtheirownroutingtablewithother routers.
b.Routersstrengthenthesignaloverlargedistancesinanetwork.
c. Routers use the routing table to determine where to forward packets.
d.Routerscreatelargercollisiondomains.
e. Routers maintain their routing tables and ensure that other routers know of changes in the network. Question7:
Which of the following statements about the path determination process are accurate? (Choose three.)
a.Dynamicroutingoccurswhenthenetworkadministratorconfiguresinformationoneachrouter.
b.Adefaultrouteholdsanexplicitroutetoeverynetwork.
c. The routing process uses metrics and administrative distances when evaluating network paths.
d.Theroutingtableholdsmultipleentriespernetwork.
e. Routers evaluate the available paths to a destination.
f. Dynamic routing occurs when information is learned using routing information that is
obtained from routing protocols.
Question8:
Which of the following statements describe the function of routing tables? (Choose three.)
a.RoutingtablesaremaintainedthroughthetransmissionofMACaddresses.
b.Althoughroutingprotocolsvary,routingmetricsdonot.
c. Routing table associations tell a router that a particular destination is either directly connected
to the router or that it can be reached through another router (the next-hop router) on the way to the final destination.
d.Whenarouterreceivesanincomingpacket,itusesthesourceaddressandsearchestheroutingtable
tofindthebestpathforthedatafromthatsource.
e. Routing tables provide an ordered list of known network addresses.
f. Routing tables contain metrics that are used to determine the desirability of the route.
Question9:
Which of the following metrics are most commonly used by routing protocols to determine a network path? (Choose three.) a. Delay b. Hop count c.Distance d. Bandwidth e.Packetlength f.Quantity Week 11 : Question1:
Match each type of WAN device to its function. Othernetworking
WANsusethesetoprovideaccess. devices
TheyprovideinternetworkingandWANaccessinterfaceports. Routers
Inanaloglines,theyconvertthedigitalsignalofthesendingdeviceintoanalog
formatfortransmissionoverananaloglineandthenconvertthesignalbackto Modems
digitalformsothatthereceivingdevicecanreceiveandprocessthenetworksignal. Communication
Theyconcentratedial-inanddial-outusercommunications. servers Question2:
Match each type of connection on a router to its function.
provideatext-basedconnectionfortheconfigurationandtroubleshootingofthe Managementports router.
allowtheroutertoconnecttotheLANmediathroughEthernetorsomeother LANinterfaces
LANtechnologysuchasTokenRingorATM.
aremadethroughaWANinterfaceonaroutertoaserviceprovidertoadistant WANinterfaces
siteortotheInternet. Question3:
Match each type of communication link to its function in a WAN. Dedicated
Providesapre-establishedWANcommunicationspathfromthecustomer communicationlinks
premisesthroughtheprovidernetworktoaremotedestination Packet-switched
Transmitsdatainlabeledcells,frames,orpackets communicationlinks Circuit-switched
Dynamicallyestablishesadedicatedvirtualconnectionforvoiceordata communicationlinks
betweenasenderandareceiver Question4:
Which three statements accurately describe WANs?
a.ThecompaniesinwhichWANsareimplementedusuallyowntheWANs.
b. WANs use serial connections of various types to provide access to bandwidth.
c.WANsconnectdevicesthatareinasmallgeographicarea.
d. WANs connect devices that are separated by wide geographic areas.
e. WANs use the services of carriers such as telephone companies, cable companies, satellite
systems, and network providers.
f.WANsgenerallycarrylimitedtypesofdataathighspeeds. Question5:
Which three communications needs do WANs address?
a.Adepartmentneedstosharelargedatafilesquickly.
b.Administrativestaffwithinaschoolneedtosharescheduleinformationwiththeteachers.
c.Workersinasmallbusinessneedtobeabletocommunicateandsharedatawitheachother.
d. Organizations often want to share information with other organizations across large distances.
e. Workers within a branch of a large company need to share project data with each other.
f. Students need to do research for classes by accessing library indexes and publications located
in other parts of their country and in other parts of the world.
Question6:
Which two statements accurately describe the difference between LANs and WANs?
a. Whereas a LAN connects computers, peripherals, and other devices in a single building or
other small geographic area, a WAN transmits data across broad geographic distances.
b.AWANtransmitsdatafasterthanaLAN.
c.AcompanyororganizationusuallyownsthehardwareandsoftwarerequiredforWANs.
d.LANsspanlargegeographicareasifaLANadministratorconfiguresthemcorrectly.
e. A LAN transmits data faster than a WAN. Question7:
At which OSI layer do WAN protocols describe how to provide electrical, mechanical, operational,
and functional connections to the services of a communications service provider?
a.Layer3 b.Layer2 c. Layer 1 d.Layer4 Question8:
At which OSI layer do WAN protocols define encapsulation of data for transmission toward a remote
location and the mechanisms for transferring the resulting frames?
a. Layer 2 b.Layer4 c.Layer3 d.Layer1 Question9:
Which two statements accurately describe data-link protocols in a WAN?
a. Many data link layer protocols use a framing mechanism similar to HDLC.
b. Data link layer protocols define how data is encapsulated for transmission to remote sites, and
also the mechanisms for transferring the resulting frames to establish the connection across the
communication line from the sending to the receiving device.
c.RIPisanexampleofadata-linkprotocol.
d.DatalinklayerprotocolsdeterminethecabletypetobeusedintheWAN.
e.ICMPisanexampleofadata-linkprotocol. Question10:
Which three statements accurately describe the functions of a packet-switching WAN communication link?
a. The cost of a packet-switched network to the customer is generally lower than with point-to- point leased lines.
b. The route that the packets take to reach the destination site varies.
c.ThePSTNusespacketswitching.
d. Packet-switched networks send data packets over different routes of a shared public network
owned by a carrier to reach the same destination.
e.Packetswitchingisacommunicationmethodinwhichusershaveadedicatedpathbetweensource anddestinationendpoints.
f.Inapacket-switchingnetwork,eachcustomerusesthefullbandwidthonitsvirtualcircuit. Question11:
Which command displays information about static route configuration on a Cisco router?
a.showrouteipstatic
b.showiproutestatic c.showrouteip d. show ip route Question12:
What does the command ip route 186.157.5.0 255.255.255.0 10.1.1.3 specify?
a. The router should use address 10.1.1.3 to get to devices on network 186.157.5.0.
b.Both186.157.5.0and10.1.1.3useamaskof255.255.255.0.
c.Youwanttheroutertotracearoutetonetwork186.157.5.0via10.1.1.3.
d.Theroutershouldusenetwork186.157.5.0togettoaddress10.1.1.3. Question13:
Which of the following protocols is an example of an exterior gateway protocol? a. BGP b.IGRP c.RIP d.EIGRP Question14:
In which situation is an administrative distance required?
a.Whendynamicroutingisenabled
b.Whenstaticroutesaredefined
c.Whenmultiplepathsareavailabletothesamedestinationandtheyarealllearnedviathesame routingprotocol
d. When the same route is learned via multiple routing protocols Question15:
When a router receives a packet with a destination address that is in an unknown subnetwork of a
directly attached network, what is the default behavior if the ip classless command is not enabled?

a.Forwardthepackettothedefaultroute b. Drop the packet
c.Forwardthepackettothenexthopforthedirectlyattachednetwork
d.Broadcastthepacketthroughallinterfacesexcepttheoneonwhichitwasreceived Question16:
How does a distance vector router learn about paths for networks that are not directly connected?
a. From neighboring routers
b.Fromthedestinationrouter
c.Fromthesourcerouter
d.Adistancevectorrouterlearnsonlyaboutdirectlyconnectednetworks Question17:
What does a distance vector router send to its neighboring routers as part of a periodic routing table update?
a.Informationaboutnewroutes
b.Informationaboutroutesthathavechanged
c.Informationaboutroutesthatnolongerexist
d. The entire routing table Question18:
What is the maximum allowable hop count for RIP? a. 15 b.6 c.30 d.60 Question19:
With RIP, load balancing is performed over multiple paths that have which characteristic? a.Equalweight b.Equalbandwidth c. Equal cost d.Equaldistance Question20:
Which command correctly specifies RIP as the routing protocol? a.Router(config)#rip
b.Router(config-router)#routerrip{ASno.}
c.Router(config-router)#rip{ASno.}
d. Router(config)#router rip Question21:
What is the default value of the RIP hold-down timer? a.30seconds