Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please check my answers Questions from the PowerPoint slide questions (1 point e

ID: 3820526 • Letter: P

Question

Please check my answers

Questions from the PowerPoint slide questions (1 point each unless otherwise specified)

{C}1.       An internetwork managed by a single organization is known as an?

{C}a.       Sovereign system

{C}b.       Independent system

c.             Autonomous system

d.            Separate system

{C}2.       This hardware receives a frame on one of its ports, then forwards the frame out on another port enabling the frame to travel to its destination. Switch

                               

{C}3.       A switching table holds __________ that tell the switch where to forward a frame, based on the _____________.

{C}a.                   IP addresses/port pairs, destination IP address

{C}b.                   IP addresses/port pairs, destination MAC address

                                c.             MAC addresses/port pairs, destination MAC address

                                d.            OSI addresses/port pairs, destination OSI address

{C}4.       Occurs when two switches examine transmission parameters such as speed and flow control, then choose the highest performance transmission mode they both support

{C}a.       Flow-negotiate mode

b.    Auto-negotiate mode

c.     Performance-negotiate mode

d.    Parameter-negotiate mode

{C}5.       (choose true or false) When a switch is first turned on – it verifies its table entries and updates them as needed

6.            Which frame forwarding method allows the best chance that a frame will be forwarded without any errors?

a.            Store-and-forward switching

{C}a.       Fragment-free switching

c.             Cut-through switching

d.            Address free switching

7.            What is a key disadvantage of cut-through switching?

{C}a.       Slower transference rate

{C}b.       Ports may not all be recognized

{C}c.       Frames may be too large

d.            No error checking

8.            What is the term used as an advanced switch feature term, when a switch or switches continue to rebroadcast messages, flooding the network?

a.            Swapping loop

b.            Switching loop

c.             Interchanging loop

d.            Exchanging loop

9.            This advanced switch feature enables an administrator to limit which MAC addresses can connect to a port, is known as:

a.            VLAN port security

b.       Switch port security

c.             Hardware port security

d.            Contrasting port security

10.          Which hardware device connects separate logical networks to form an internetwork, creating fault tolerance and load sharing?

{C}a.       Switches

{C}b.       Front end processors

c.             Routers

d.            Flash drives

11.          When does a router consult its routing table to determine how to get a packet to its destination?

                                When the ip address not match.

12.                          What is the name of the term which describes the moving of a packet from the incoming interface to the outgoing interface?

a.       Packet distribution

b.            Packet forwarding

c.             Packet sending

d.            Packet delivery

13.          If a switch receives a frame from a device and the MAC address is already in its table, it brings up to date the tables entry with a new?

                a.            Scheme address update

                b.            Device stamp

                c.             Datestamp

d.            Timestamp

{C}14.   When is a Timestamp removed from a switches table? (in your answer discuss “again time”)

When the timestamp isn’t updated within the aging time.

{C}15.   The wireless security option that restricts which devices can connect to your AP is known as:

a.            Encryption

b.            AP isolation

c.             MAC filtering

d.            Authentication

16.          In reference to routing tables, the entry that stores how far the distance through to the destination network, is known as:

                a.            Timestamp

                b.            Next hop

                c.             Metric

                d.            Destination network

17.          In reference to Autonomous systems, what is the difference between interior and exterior gateway protocols?

IGP is used in an autonomous system whereas EGP is used between autonomous systems.

18.          An _____________ filters network traffic as it controls which packets are forwarded or blocked at the router's interfaces based on specified criteria.

a.            Entree control list

b.            Access control list

c.             Right of entry control list

d.            Entrance control list

19.          A wireless router is several devices in one. Two of the devices are:

a.            A wireless AP and a switch

b.            A wireless Entree Point and a switch

c.             A wireless AP and a switch

d.            A router and a port

20.          The ____________ is an alphanumeric character unique identifier acting as a password. It is part of a packets header, when it’s to be sent over a wireless local-area network

a.    Service Set Identifier (SSID)

b.    Provision Set Identifier (PSID)

{C}c.       Packet Set Identifier (PSID)

{C}d.       Wireless Set Identifier (WSID)

21.          The wireless security option that will place content into a coded form, which is hard to decipher if intercepted, is known as:

a.    Encryption

{C}b.       Authentication

c.       MAC filtering

d.      {C}AP isolation

22.          A credit card-size memory or I/O device that connects to a personal computer. Type I cards boost ROM or RAM and type II cards are used for modems, SCSI and LAN cards. This device is known as a:

a.       Personal Computer Card

{C}b.       Personal Computer Card enhancement

c.     Personal Computer Memory expansion card

d.    Personal Computer Memory Card International Association

23.       When selecting a network adapter, first identify the physical characteristics the card must match. Name two of these characteristics:

Type of bus, network technology, type or connector needed to connect to media.

24.       Several hardware enhancement options represent advanced features of a NIC. Which of the following refers to the NIC containing additional onboard memory?

a.         Shared adapter memory

b.         Shared system memory

c.         RAM buffering

d.         Shared on-board RAM

25.          An advanced wireless networking setting which provides quality of service settings for streaming video is known as:

a. Wi-Fi multimedia

b.    Adjustable transmit power

c.     AP modes

d.    Traffic priority

Part 4 - Additional Questions

Please complete the following questions. (1 point each)

At what layer of the OSI model do switches operate?

Data link layer.

Switches that support which of the following enable you to configure one or more switch ports into separate broadcast domains?

{C}•         multicast

{C}•         Spanning Tree Protocol

{C}•         VLANs

{C}•         port security

3.      What term is used to describe the total number of routers a packet must travel through?

{C}a.       metric

{C}b.      {C}hop count

{C}c.       next hop count

{C}d.      TTL

4.      Which type of routing protocol shares information with other routers by sending the status of all their interface links to other routers in the internetwork?

Distance vector protocols.

Part 5

Please complete the following questions from pages 354-358. (1 point each)

1.     Which of the following is found in a routing table?

a.     Destination MAC address

b.     Port number

c.     Metric & Next hop

e.     Domain name

2.     If you don’t want wireless clients to view the name of your wireless network, what feature should you use?

a.     WEP

b.     Disabling SSID broadcasts

c.     MAC filtering

d.     AP isolation

3.     To prevent a wardriver from being able to interpret captured wireless network data, you should enable which of the following?

a.     MAC filtering

b.     AP isolation

c.     WPA or WPA2

d.     Repeater mode

Part 6

Please open the following web site (3 points). View the contents of: “Security of the WEP algorithm”. Then answer the following questions: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

1.      What algorithm is used to protect wireless communication from eavesdropping?

WEP- wired equivalent privacy.

2.      What is the purpose of the secret key that WEP relies on?

The purpose of the secret key is to encrypt packets before they are transmitted. An integrity check is used to endure that packets are not modified in transit.

3.      (choose true or false) Even though it’s difficult to decode a 2.4GHz digital signal, you can buy hardware to listen to 802.11 transmissions.

False

Explanation / Answer

1. An internetwork managed by a single organization is known as an?

a) Atonomous system.

2. This hardware receives a frame on one of its ports, then forwards the frame out on another port enabling the frame to travel to its destination.

Ans: Switch

3)   c. MAC addresses/port pairs, destination MAC address

4. Auto-negotiate mode

5. When a switch is first turned on – it verifies its table entries and updates them as needed

True

6. a. Store-and-forward switching

7.   d. No error checking

8. b. Switching loop

9. VLAN port security

10. c. Routers

11. when the ip address not match.

12. b.Packet forwarding

13. d. time stamp

14. When the timestamp isn’t updated within the aging time.

15, Mac filtering

16. c. metric

17.IGP is used in an autonomous system whereas EGP is used between autonomous systems.

18. Access control list

19. a. A wireless AP and a switch

20. a.Service Set Identifier (SSID)

21. d. {C}AP isolation

22. d. Personal Computer Memory Card International Association

23. Type of bus, network technology, type or connector needed to connect to media.

24. shared system memory

25. a. Wi-Fi multimedia

1. Data link layer

2. vlan

3. Hop count

4. distance vector protocol.

c.

1. metric and next hop

2. disabling SSI broadcasts

3. WPA and WPA 2

part 6

WEP- wired equivalent privacy.

2. The purpose of the secret key is to encrypt packets before they are transmitted. An integrity check is used to endure that packets are not modified in transit.

3. false