100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CNET-157 Final Exam Questions Answered Correctly Latest Version

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
25-12-2024
Written in
2024/2025

CNET-157 Final Exam Questions Answered Correctly Latest Version The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC sublayer. - Answers false The maximum transmission unit for Ethernet is 1518 bytes. - Answers true The Transport layer is the same in both the OSI model and the TCP/IP model. - Answers true One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP address. - Answers true You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem? - Answers Network layer device What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand? - Answers 6 At which layer would you find errors that were caused by EMI? - Answers physical One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called? - Answers access control Which layer is responsible for determining the best path a packet should travel across an internetwork? - Answers network How can you find out what your MAC address is? (Choose all that apply.) - Answers Open a command prompt and type the command ipconfig /all. Right-click on the Local Area Connection and choose status. Open a command prompt and type the command getmac. What is the IEEE standard that governs all forms of Ethernet media and interfaces? - Answers 802.3 What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device? - Answers sequence number Which is the strongest form of wireless security? - Answers WPA2 What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router? - Answers administrative distance All network switches require substantial configuration before they can be put into operation in a network. - Answers false Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks. - Answers false Which of the following is the switching protocol that is used to eliminate the possibility of switching loops? - Answers STP Each interface on a router must have an IP address and what else to be able to communicate on the network? - Answers MAC address What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks? - Answers wardriver Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive? - Answers preboot execution environment Which of the following is not a true statement regarding the function of a switch? - Answers It determines the path used based on the destination IP address. A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing table. - Answers true Which of the following is a common link-state protocol? - Answers OSPF The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what? - Answers convergence When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called? - Answers router on a stick Which of the following is not a function that would be found in a managed switch? - Answers the ability to transfer it's switching table with neighboring switches On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is called what? (Choose two.) - Answers hop count metric A security policy should clearly state the desired rules, even if they cannot be enforced. - Answers false You don't need to physically secure your servers as long as you use a good strong password for your accounts. - Answers false Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim? - Answers smurf attack Physically securing your switches isn't necessary because users will not know how to access them. - Answers false A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users. - Answers true Which of the following can be used to secure data on disk drives? (Choose all that apply.) - Answers BitLocker EFS TrueCrypt Which VPN implementation needs no additional configuration to be allowed access through a firewall? - Answers SSTP What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device? - Answers NAT What type of policy defines the methods involved when a user logs on to the network? - Answers authentication Which of the following is a protocol that centralizes authentication, authorization, and accounting? - Answers RADIUS Which protocol is used to encrypt data as it travels a network? - Answers IPsec What type of device should you install as a decoy to lure potential attackers? - Answers honeypot Which of the following is NOT a guideline of a security policy? - Answers uses legal terminology to protect the organization Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols. - Answers true Select the true statement regarding analog and digital signals. - Answers Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels. T-Carrier lines only require a CSU/DSU on the customer's side of the connection. - Answers false What would an Asynchronous Transfer Mode (ATM) network be best suited for? - Answers

Show more Read less
Institution
CNET-157
Course
CNET-157









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CNET-157
Course
CNET-157

Document information

Uploaded on
December 25, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CNET-157 Final Exam Questions Answered Correctly Latest Version 2024-2025

The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC sublayer. -
Answers false

The maximum transmission unit for Ethernet is 1518 bytes. - Answers true

The Transport layer is the same in both the OSI model and the TCP/IP model. - Answers true

One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP
address. - Answers true

You are working at the help desk and you get a message that a user cannot access the Internet. You
open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try
the Internet again. He does so with the same result— no connection. Which type of device is most likely
to be the problem? - Answers Network layer device

What layer is responsible for making sure that the data that it sends and receives is in a format that the
receiving and sending computers can understand? - Answers 6

At which layer would you find errors that were caused by EMI? - Answers physical

One job that a router performs is that of gatekeeper, which means that it can be configured to only
allow certain packets access into the network based on a list of rules. What is that process called? -
Answers access control

Which layer is responsible for determining the best path a packet should travel across an internetwork?
- Answers network

How can you find out what your MAC address is? (Choose all that apply.) - Answers Open a command
prompt and type the command ipconfig /all.

Right-click on the Local Area Connection and choose status.

Open a command prompt and type the command getmac.

What is the IEEE standard that governs all forms of Ethernet media and interfaces? - Answers 802.3

What does the Transport layer use to make sure that a message is reassembled correctly on the
receiving device? - Answers sequence number

Which is the strongest form of wireless security? - Answers WPA2

What is the name of the value assigned to a routing protocol to indicate its reliability compared with
other routing protocols that might be in use on the same router? - Answers administrative distance

All network switches require substantial configuration before they can be put into operation in a
network. - Answers false

, Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most
wireless networks. - Answers false

Which of the following is the switching protocol that is used to eliminate the possibility of switching
loops? - Answers STP

Each interface on a router must have an IP address and what else to be able to communicate on the
network? - Answers MAC address

What type of hacker uses a scanning device to find unsecured wireless networks and break into those
networks? - Answers wardriver

Which advanced feature of a NIC allows a computer to download an OS from the network instead of
from a local drive? - Answers preboot execution environment

Which of the following is not a true statement regarding the function of a switch? - Answers It
determines the path used based on the destination IP address.

A distance-vector protocol sends updates to its neighbors that include the entire contents of its routing
table. - Answers true

Which of the following is a common link-state protocol? - Answers OSPF

The time it takes for all the routing tables on every router in a network to be fully updated, either when
a change occurs or according to a schedule, is called the speed of what? - Answers convergence

When a router's interface is configured with multiple IP addresses with each address belonging to
different networks, what is it called? - Answers router on a stick

Which of the following is not a function that would be found in a managed switch? - Answers the ability
to transfer it's switching table with neighboring switches

On a router configured to use RIP, the number of routers a packet must travel between before it reaches
its destination is called what? (Choose two.) - Answers hop count

metric

A security policy should clearly state the desired rules, even if they cannot be enforced. - Answers false

You don't need to physically secure your servers as long as you use a good strong password for your
accounts. - Answers false

Which of the following is a type of denial-of-service attack that involves flooding the network with
broadcast messages that contain a spoofed source address of an intended victim? - Answers smurf
attack

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
347
Member since
1 year
Number of followers
16
Documents
28901
Last sold
4 days ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

55 reviews

5
19
4
14
3
12
2
0
1
10

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions