CI112 Networking Fundamentals - HW 6

***Note: All fields are required to be filled in before submitting!***

Name:


MVCC Email:



Instructor
Ronny Bull
Jake Mihevc


Complete the following 20 questions then press submit.

1. Which of the following utilities could you use to force the NIC on your Linux server to use full-duplex transmission?:
A. ipconfig
B. ifconfig
C. iftool
D. ethtool

2. Which of the following is a significant advantage to using an SFP interface on a router rather than an on-board NIC?:
A. The SFP will be capable of higher throughputs.
B. The SFP can be added or removed without affecting operations, thus allowing for customization and future upgrades.
C. The SFP can accept multiple types of connectors, allowing the router to connect two disparate network types.
D. The SFP promises greater security, as it can encrypt and decrypt data.

3. You and a friend decide to set up Fast Ethernet networks in your respective houses to connect a half-dozen computers at each location. Both of you will connect your networks to high-speed Internet connections. As the connectivity device for end nodes, you purchase a router, whereas your friend uses an old, but functional, 12-port hub he found at a garage sale. Which of the following will your network do that your friend's network won't do?:
A. Filter traffic based on IP address.
B. Transmit data from any one of the connected computers to any other.
C. Create a VLAN out of some of the computers to isolate their transmissions and prevent them from affecting other connections.
D. Allow other connectivity devices to be added to the network in the future.

4. You are a network technician working on a 100Base-T network. A coworker has been having trouble logging on to the server and asks whether you can quickly tell her if her workstation's NIC is operating properly. You do not have the NIC's utility disk on hand, but you look at the back of her workstation and learn that although the NIC is properly installed and connected to the network, something's wrong with it. What might you have seen that causes you to come to this conclusion?:
A. Its activity LED is blinking green.
B. Its loopback plug is improperly terminated.
C. It has two types of receptacles2014SC and RJ-452014and the wrong one is in use.
D. None of its LEDs are lit.

5. How do bridges keep track of whether they should forward or filter frames?:
A. From each frame they receive, they extract source addresses; those frames whose source addresses don't belong to the bridge's broadcast domain are filtered.
B. They hold each frame until it is requested by the destination node, at which time the bridge forwards the data to the correct segment based on its MAC address. c. They maintain a filtering database that identifies which frames can be filtered and which should be forwarded, based on their destination MAC address.
C. They maintain a filtering database that identifies which frames can be filtered and which should be forwarded, based on their destination MAC address.
D. They compare the incoming frame's network address to known addresses on both segments and filter those that don't belong to either.

6. Which of the following distinguishes switches from repeating devices, such as hubs?:
A. Switches separate collision domains.
B. Switches separate broadcast domains.
C. Switches can alert the network administrator to high data collision rates.
D. Switches do not examine Network layer protocol information, which makes them faster than repeating devices.

7. In cut-through switching, which frame field does the switch never read?:
A. Start frame delimiter
B. Source address
C. Frame check sequence
D. Protocol type

8. What potential problem does STP (Spanning Tree Protocol) address?:
A. An excess of erroneously short packets
B. A broadcast storm
C. Network congestion due to a router failure
D. Slow convergence time

9. You are asked to configure a backbone switch that connects servers supplying oceanic and atmospheric data to mariners and pilots around the world. Your network's traffic load is very high at all times, day and night. What type of switching do you configure the switch to use?:
A. Bypass switching
B. Store-and-forward switching
C. Cut-through switching
D. Message switching

10. Suppose your company's network contains two separate VLANs. Computer A is on the Customer Service VLAN and Computer B is on the Warehouse VLAN. Besides a Layer 2 switch, what device is required for Computer A and Computer B to exchange data?:
A. Repeater
B. Bridge
C. Multiplexer
D. Router

11. In STP, what device acts as a guide to setting the best paths between switches?:
A. Root bridge
B. Workgroup bridge
C. Parent bridge
D. Link bridge

12. What switching technique allows you to funnel traffic belonging to more than one VLAN through a single switch interface?:
A. Jamming
B. Route capturing
C. Trunking
D. Multiplexing

13 Which of the following identifies the VLAN to which each piece of data belongs?:
A. A shim added to each packet's header
B. An envelope that encapsulates each packet
C. A tag added to each frame's header
D. A FCS added to each packet's header

14. Which of the following routing protocols is used on the Internet's backbone?:
A. EIGRP
B. OSPF
C. BGP
D. RIP

15 Which of the following types of routing protocols allows routers to exchange information about best paths with their neighboring routers only?:
A. Link-state
B. Hybrid
C. Distance-vector
D. All of the above

16. Why is a large, busy network more likely to use dynamic routing?:
A. Because dynamic routing is the default option on most routers, and it is difficult to configure routers to use static routing
B. Because dynamic routing is the only routing method compatible with the BGP routing protocol, which is necessary for routing between WANs
C. Because dynamic routing allows for stricter IP filtering and, therefore, offers greater data security than static routing
D. Because dynamic routing automatically selects the most efficient route between nodes, reducing the possibility for human error

17. A packet on a network using the RIP routing method has been passed from one connectivity device to another 15 times. What happens when it gets passed to one more device?:
A. It is returned to the node that originally transmitted it.
B. It is encapsulated by the routing protocol and retransmitted.
C. It is forwarded to its destination by the last device.
D. It is discarded.

18. Which of the following factors is not considered when OSPF determines the best path for a packet?:
A. Link failure
B. Number of hops
C. Throughput
D. Latency

19. What is a router's convergence time?:
A. The time a router takes to interpret Layer 2 addressing information for any given frame
B. The maximum amount of time a router is allowed for choosing the best path
C. The time it takes for a router to recognize a best path in the event of a change or network outage
D. The time it takes for border routers to exchange routing table information

20. At which layers of the OSI model are gateways capable of functioning?:
A. Layers 1 and 2
B. Layers 2 and 3
C. Layers 1, 2, and 3
D. At all layers