Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

correct and descriptive answer will recieve 5+ ratings Question 29 A switchs CLI

ID: 3557226 • Letter: C

Question

correct and descriptive answer will recieve 5+ ratings

Question 29

A switchs CLI can only be accessed by using the console port.

True

False

1 points   

Question 30

Devices connecting through the switch must all work at the same speed

True

False

1 points   

Question 31

Switching tables contain source MAC and the corresponding switch port

True

False

1 points   

Question 32

You can obtain an IP address for a switch using DHCP.

True

False

1 points   

Question 33

ATM is considered a packet swithcing service

True

False

1 points   

Question 34

SMTP uses UDP

True

False

1 points   

Question 35

SSID is an identifier for a wireless network.

True

False

1 points   

Question 36

Enterprise switches are capable of forwarding ___________ of Ethernet frames per second.

tens of thousands

hundreds of thousands

thousands

millions

1 points   

Question 37

A trunk connection between two switches located in two different rooms in the same building (select the best response):

need to be connected via an ISP and CSU/DSU

must be fiber optic

must be crossover Ethernet cables

none of the above

1 points   

Question 38

When configuring a switch from the factory you must:

define a default gateway for the switch

A, B correct

issue a no shutdown command because the interface is disabled

Configure the VLAN 1 interface

assign an IP address and a subnet mask

All are correct

1 points   

Question 39

Being cheap and using an Ethernet cable that is too long can result in:

collisions

jabber

late counter increase

none of the above

1 points   

Question 40

Select the correct response regarding subnets;

two different subnets must be attached to the same switch

a subnet cannot be a private address range

none are true

subnets must be connected by routers

1 points   

Question 41

Regarding IPv4, select the incorrect response

IP packets can be fragmented

IP packets cannot exceed 64K in length

all are correct

IP packets can be directed not to fragment

1 points   

Question 42

Select the incorrect statement regarding TCP:

assures reliability

is a connectionless transport scheme

can multiplex using ports

all are correct

1 points   

Question 43

An unauthorized AP in the workplace is referred to as:

none of the above

war driving

a rogue AP

SWAN device

1 points   

Question 44

If a switch receives an incoming frame with unknown MAC address, it (select correct answer)

none of the above

switches the frame on all interfaces except the incoming interface

ignores the frame

switches the frame on all interfaces

1 points   

Question 45

From a PCs perspective, routing is based on (select the most appropriate):

the gateways IP address

the ARP table entry

The destination IP address

The network mask

1 points   

Question 46

To find another PC on the same network, which is used (select the most appropriate)

ARP table

all of the above

gateway address

DNS

1 points   

Question 47

Select the correct response regarding the privileged EXEC mode:

enable password actual-password will require a password to get to privileged mode

none are correct

enable secret actual-password stores the password in clear text

if enable password and enable secret are used, both passwords are usable to get to privileged mode

1 points   

Question 48

192.168.0.0/26 allows for __________ hosts in the subnet

64

62

32

30

1 points   

Question 49

VoIP uses:

TCP for catching packet errors

UDP (application catches errors)

proprietary Layer 4 protocol

UDP (no error correction)

1 points   

Question 50

Jabber is defined as:

Late arrivals of frames

A problem with the Wocky protocol

excessive collisions

sending non-stop frames without breaks between frames

1 points   

Question 51

SYN requests are:

C and D are true

a way of attacking a host

A , B and C are true

None are true

a way to synchronize sequence numbers

should be blocked

the way to let another TCP/IP app know its trying to be reached

1 points   

Question 52

Hitting the MODE button on a switch allows you to determine a port(s):

all of the above

speed of the port

status

full or half duplex status

1 points   

Question 53

Switch methods include all, except for:

Store and forward

Fragment free

all are methods

Cut through

1 points   

Question 54

Regarding a transparent bridge, select the incorrect statement:

destination mac is used to decide on whether to forward a frame

all are correct

STP is used to create a loop free environment

they learn mac addresses by examining the destination mac of each frame received

1 points   

Question 55

Select the correct response regarding what makes up a socket

a port number and an IP address

mac address, IP address and port number

Port number and a protocol

port, IP address and protocol

1 points   

Question 56

Regarding SSID cloaking, which is correct?

all are correct

clients listen for beacons on ALL channels

Beaconing can hide the SSID

client associates with the closest AP

1 points   

Question 57

Select the correct statement regarding Sliding Windows

UDP controls window sizes by using the Window field

a window field in the TCP header dictates how many unacknowledged bytes can be in the connection at any time

IP cannot transport any protocol which uses Sliding Windows

window sizes are fixed

1 points   

Question 58

Select the incorrect statement(s)

A T1 can combine 24 DS0s

Voice calls require at least 64Kbps

T1 lines are 1.544 Mbps

A T3 line is equivalent to 24 T1 lines

1 points   

Question 59

From the telco/providers perspective, which of the following devices are considered CPE?

ernterprise router

none

WAN switch

enterprise switch

1 points   

Question 60

Reasons for using VLANs or the effect of using VLANs include (select all correct responses):

segregate IP traffic by classification (VoIP vs data)

reduce overhead by decreasing broadcast domain sizes

STP workload is increased

makes it difficult to group users or departments

security can possibly be increased

a.

tens of thousands

b.

hundreds of thousands

c.

thousands

d.

millions

Explanation / Answer

29 true

30 false

31 false

32 true

33 true

34 false

35 false

36 D

37 B

38 A

39 D

40 B

41 D

42 B

43 D

44 D

45 B

46 D

47 D

48 C

49 C

50 A

51 B

52 D

53 A

54 A

55 A

56 B

57 D

58 A

59 B

60 A