2023 1 Question TCO 2 is the layer in hierarchical network design that is concerned with switching | Assignment Collections
Computer Science 2023 NETW208 QUIZ
2023 1 Question TCO 2 is the layer in hierarchical network design that is concerned with switching | Assignment Collections
1. Question : (TCO 2) _____ is the layer in hierarchical network design that is concerned with switching packets as fast as possible.
Select Access Layer
Core Layer
Access Link
Core Link
Instructor Explanation: Chapter 1
2. Question : (TCO 2) The point at which the customer turns over control to the WAN service provider refers to the _____.
Select data circuit-terminating equipment
data terminal equipment
last mile
demarcation point
Instructor Explanation: Chapter 1
3. Question : (TCO 2) _____ is an industry-standard, switched data-link-layer protocol that handles multiple virtual circuits using HDLC encapsulation between connected devices.
Select Basic Rate Interface
Primary Rate Interface
Frame Relay
Cell
Instructor Explanation: Chapter 1
4. Question : (TCO 6) Asymmetric encryption is utilized in VPNs to
Select encrypt and decrypt using different keys.
encrypt and decrypt using a shared secret key.
create a number generated from a string of text, sometimes calledmessage digest.
utilize only numbers to secure information.
Instructor Explanation: Chapter 6
5. Question : (TCO 6) What contributes to data integrity and authentication by ensuring that unauthorized persons do not tamper with transmitted messages?
Select Encryption
Descryption
Hash
Tunneling
Instructor Explanation: Chapter 6
6. Question : (TCO 6) IEEE 802.16 is defined as
Select the IEEE WLAN standard for 11 Mbps at 2.4 GHz.
the IEEE WiMAX standard for 70 Mbps at ranges up to 30 miles in the 2–6 GHZ spectrum.
the IEEE WLAN standard for 54 Mbps at 2.4 GHz.
the IEEE WLAN standard for 248 Mbps at 2.4 or 5 GHZ.
Instructor Explanation: Chapter 6
7. Question : (TCO 3) _____ is used to establish and configure different network layer protocols.
Select Frame Relay
X.25
LCP
NCP
Instructor Explanation: Chapter 2 page 95
8. Question : (TCO 3) _____ is one of the PPP LCP options that peer routers use to identify fault conditions.
Select Compression
Error detection
Multilink
Authentication
Instructor Explanation: Chapter 2 page 89
9. Question : (TCO 3) The third phase of PPP establishment is
Select to test link quality.
to send link-establishment frames to negotiate options such as MTU size, compression, and authentication.
to negotiate Layer 3 protocol options.
to send confirmation-acknowledgement frames.
Instructor Explanation: Chapter 2 page 88
10. Question : (TCO 3) Which of the following is a characteristic of PAP?
Select Uses a one-way hash function
Periodic verification
Three-way handshake
Two-way handshake
Instructor Explanation: Chapter 2 page 110
1. Question : (TCO 4) What is the command that verifies that Frame Relay is running correctly?
Select show interfaces
encapsulation frame-relay
show frame-relay map
debug frame-relay
Instructor Explanation: Chapter 3
2. Question : (TCO 4) Frame Relay can partition a physical interface into multiple virtual interfaces called _____.
Select subinterfaces
multilinks
split horizons
broadcasts
Instructor Explanation: Chapter 3
3. Question : (TCO 4) The difference between a star topology and a frame relay star topology is that the latter has _____.
Select more routers
servers
VCs
more hubs
Instructor Explanation: Chapter 3
4. Question : (TCO 4) Which one of these answers is not an advantage of Frame Relay?
Select Greater bandwidth
Reliability
Less equipment
More complex
Instructor Explanation: Chapter 3
5. Question : (TCO 7) This person uses e-mail or another means to lure others into providing sensitive information, such as credit card numbers or passwords.
Select White hat
Phisher
Cracker
Spammer
Instructor Explanation: Chapter 4
6. Question : (TCO 7) Applying a specific algorithm to data to alter their appearance, making them incomprehensible to those who are not authorized to see the information, is known as
Select decryption.
a virus.
a worm.
encryption.
Instructor Explanation: Chapter 4
7. Question : (TCO 7) Over the years the types and methods of security attacks have evolved. What kind of network attack became prevalent starting around 1985?
Select Password guessing and code replication
Password cracking and war dialing
Viruses, including the ILOVEYOU worm, Nimda, and Code Red
Trojan horses such as Back Orifice
Instructor Explanation: Chapter 4 page 191
8. Question : (TCO 7) Securing router network services most commonly needs to be done at what IOS layer?
Select Network
Application
Physical
Data link
Instructor Explanation: Chapter 3
9. Question : (TCO 7) What type of attack uses a compromised host to pass traffic through a firewall that would otherwise be dropped or blocked?
Select Reconnaissance attack
Password attack
Port redirection
DoS attack
Instructor Explanation: Chapter 4 page 210
10. Question : (TCO 7) Which network policy defines the standards for connecting to the internal network from outside the organization?
Select Account-access-request policy
Remote-access policy
Risk-assessment policy
Audit policy
Instructor Explanation: Chapter 4 page 231
1. Question : (TCO 1) Which of the following choices displays IPv6 neighbor discovery cache information?
Select show ipv6 neighbor
show ipv6 neighbors
show neighbors
ipv6 neighbors
Instructor Explanation: Chapter 7
2. Question : (TCO 1) _____ is an integration method in which a node has implementation and connectivity to both an IPv4 and IPv6 network.
Select Tunneling
Dual stacking
A 6to4 tunnel
A Teredo tunnel
Instructor Explanation: Chapter 7
3. Question : (TCO 1) Dynamic NAT maps private IP addresses to public addresses drawn from a
Select pool.
NAT pool.
interface.
source.
Instructor Explanation: Chapter 7
4. Question : (TCO 1) When IPv6 is implemented, the routing protocol RIPng will have these features, but it
Select uses IPv6 for transport.
sends updates on UPD port 521.
includes the IPv6 prefix and next-hop IPv6 address.
is limited in multicasting.
Instructor Explanation: Chapter 7
5. Question : (TCO 1) The command to display information about the total amount of active NAT translations, NAT configuration parameters, how many addresses are in the poll, and how many have been allocated is
Select show nat statistics.
show ip nat statistic.
show ip nat stats.
show ip nat statistics.
Instructor Explanation: Chapter 7
6. Question : (TCO 5) _____ control(s) access to a network by analyzing the incoming and outgoing packets and passing or halting them based on stated criteria.
Select IDS
Packet filtering
Circuit switching
Packet switching
Instructor Explanation: Chapter 5
7. Question : (TCO 5) Some of the ways that ACLs should be placed in a network include all of the following except
Select using ACLs in firewall routers positioned between two parts of your network and an external network, such as the Internet.
using ACLs on a router positioned between two parts of your network to control traffic entering or exiting a specific part of your internal network.
configuring ACLs for each network protocol configured on the border router interfaces. You can configure ACLs on an interface to filter inbound traffic, outbound traffic, or both.
configuring ACLs on border routers only, or routers situated at the edges of the networks.
Instructor Explanation: Chapter 5
8. Question : (TCO 5) To configure a numbered ACL-designated 5 that would permit network 192.168.10.0/24, you would enter _____.
Select R1(config)# access-list 5 permit 192.168.10.0/24
R1(config)# access-list 5 permit 192.168.10.0 0.0.0.255
R1# access-list 5 permit 192.168.10.0
R1(config)# access-list permit 192.168.10.0
Instructor Explanation: Chapter 5
9. Question : (TCO 5) The established parameter in the extended ACL configuration means it
Select indicates an established connection for TCP protocol only.
indicates an established connection for IP protocol only.
indicates an established connection for UDP protocol only.
indicates an established connection for IPX protocol only.
Instructor Explanation: Chapter 5
10. Question : (TCO 5) access-list 100 permit tcp 192.168.20.5 0.0.0.0 0.0.0.0 255.255.255.255 eq 80
Base on the access list above, to what destinations will the source device be allowed to web browse?
Select 0.0.0.0
192.168.20.5
any
255.255.255.255
Instructor Explanation: Chapter 5
We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.