The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC sublayer. -
Answers false
The maximum transmission unit for Ethernet is 1518 bytes. - Answers true
The Transport layer is the same in both the OSI model and the TCP/IP model. - Answers true
One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP
address. - Answers true
You are working at the help desk and you get a message that a user cannot access the Internet. You
open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try
the Internet again. He does so with the same result— no connection. Which type of device is most likely
to be the problem? - Answers Network layer device
What layer is responsible for making sure that the data that it sends and receives is in a format that the
receiving and sending computers can understand? - Answers 6
At which layer would you find errors that were caused by EMI? - Answers physical
One job that a router performs is that of gatekeeper, which means that it can be configured to only
allow certain packets access into the network based on a list of rules. What is that process called? -
Answers access control
Which layer is responsible for determining the best path a packet should travel across an internetwork?
- Answers network
How can you find out what your MAC address is? (Choose all that apply.) - Answers Open a command
prompt and type the command ipconfig /all.
Right-click on the Local Area Connection and choose status.
Open a command prompt and type the command getmac.
What is the IEEE standard that governs all forms of Ethernet media and interfaces? - Answers 802.3
What does the Transport layer use to make sure that a message is reassembled correctly on the
receiving device? - Answers sequence number
Which is the strongest form of wireless security? - Answers WPA2
What is the name of the value assigned to a routing protocol to indicate its reliability compared with
other routing protocols that might be in use on the same router? - Answers administrative distance
All network switches require substantial configuration before they can be put into operation in a
network. - Answers false
, Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most
wireless networks. - Answers false
Which of the following is the switching protocol that is used to eliminate the possibility of switching
loops? - Answers STP
Each interface on a router must have an IP address and what else to be able to communicate on the
network? - Answers MAC address
What type of hacker uses a scanning device to find unsecured wireless networks and break into those
networks? - Answers wardriver
Which advanced feature of a NIC allows a computer to download an OS from the network instead of
from a local drive? - Answers preboot execution environment
Which of the following is not a true statement regarding the function of a switch? - Answers It
determines the path used based on the destination IP address.
A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing
table. - Answers true
Which of the following is a common link-state protocol? - Answers OSPF
The time it takes for all the routing tables on every router in a network to be fully updated, either when
a change occurs or according to a schedule, is called the speed of what? - Answers convergence
When a router's interface is configured with multiple IP addresses with each address belonging to
different networks, what is it called? - Answers router on a stick
Which of the following is not a function that would be found in a managed switch? - Answers the ability
to transfer it's switching table with neighboring switches
On a router configured to use RIP, the number of routers a packet must travel between before it reaches
its destination is called what? (Choose two.) - Answers hop count
metric
A security policy should clearly state the desired rules, even if they cannot be enforced. - Answers false
You don't need to physically secure your servers as long as you use a good strong password for your
accounts. - Answers false
Which of the following is a type of denial-of-service attack that involves flooding the network with
broadcast messages that contain a spoofed source address of an intended victim? - Answers smurf
attack