Filters
Question type

Study Flashcards

Access control lists can be configured based on which of the following? (Choose all that apply.)


A) protocol
B) source MAC address
C) TCP port
D) destination MAC address
E) source IP address

Correct Answer

verifed

verified

Which of the following is a common link-state routing protocol?


A) OSPF
B) RIPv2
C) EIGRP
D) BGP

Correct Answer

verifed

verified

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -sends the status of all its interface links to all other routers in the internetwork

Correct Answer

verifed

verified

Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the frame?


A) cut-through
B) fragment-free
C) store-and-forward
D) auto-negotiate

Correct Answer

verifed

verified

You have four switches, A, B, C, and D. Switch A is connected to Switch C and Switch B is connected to Switch D. Furthermore, Switch A and B are connected and Switch C and D are connected. One of the connections is in blocking mode. What protocol must be running on the switches?


A) RIP
B) SNMP
C) NTP
D) STP

Correct Answer

verifed

verified

What is a trunk port?

Correct Answer

verifed

verified

When a switch is configured wi...

View Answer

What are the most common encryption protocols for wireless security? Which is the strongest? Which is the weakest?

Correct Answer

verifed

verified

They are WEP, WPA, W...

View Answer

Match each item with a statement below. a.distance-vector protocol b.fragment-free switching c.cut-through switching d.store-and-forward switching e.Spanning Tree Protocol f.trunk port g.EGP h.link-state protocol i.metric j.IGP -sends entire routing table to all routers at a scheduled time

Correct Answer

verifed

verified

Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.

Correct Answer

verifed

verified

What does the Spanning Tree Protocol do?

Correct Answer

verifed

verified

The Spanning Tree Protocol is used to de...

View Answer

Showing 41 - 50 of 50

Related Exams

Show Answer