What xDSL standard is the most popular?
 
 
 
a. 

 
b. 

 
c. 

 
d. 

a. ADSL

A MAN connection is also known as which two terms below?
 
a. 

 
b. 

 
c. 

 
d. 

B. Ethernet MAN and c. Metro ethernet

A rollback is also known by what two terms below?
 
a. 

 
b. 

 
c. 

 
d. 

c. downgrading and d backleveling

 

Which of the following is not a good reason to subnet a network?

 
a. 

To reduce the number of routing table entries by combining several entries

 
b. 

To reduce the number of hosts on the same network

 
c. 

To segment a network

 
d. 

To increase the number of unique networks available

a. 

To reduce the number of routing table entries by combining several entries

 

 
 
What type of VLAN automatically receives all untagged frames?
   
 
a. 

 
b. 

 
c. 

 
d. 

d. Native VLAN

 

Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24?
 
a. 

 
b. 

 
c. 

 
d. 

 

d. 

 

What two items make up a Bridge ID?
   
 
a. 

 
b. 

 
c. 

 
d. 

d. MAC address and b. 2 byte priority field
A centrally managed DHCP server can provide DHCP to multiple VLANs by configuring a _________________.
DHCP relay agent

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?
   
 
a. 

 
b. 

 
c. 

 
d. 

c. 802.1Q

 

In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?
 
a. 

 
b. 

 
c. 

 
d. 

b. Carrier Ethernet Transport

What two network protocols below rely on virtual circuits?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. ATM and d. frame relay

 

Which version of DOCSIS provides 38 Mbps per channel and requires a minimum of 4 channels to be used?
 
 
 
a. 

 
b. 

 
c. 

 
d. 

d. DOCSIS 3

 

The ________________ distributes signals to multiple endpoints via fiber-optic cable, in the case of FTTP, or via copper or coax cable.

Optical Network Unit (ONU)

With which network connection type does the VM obtain IP addressing information from its host?

   
 
a. 

Host-only mode

 
b. 

Managed mode

 
c. 

Bridged mode

 
d. 

NAT mode

d. NAT mode
The carrier’s endpoint on a WAN is called the Data Communications Equipment (DCE). (T/F)
True
A switch is typically preconfigured with one _______________ that includes all its ports.
Default VLAN

What type of VLAN automatically receives all untagged frames?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. Native VLAN

In order to allow communication between VLANs for exchange of data, what must be used?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. a router

A rollback is also known by what two terms below?
   
 
a. 

 
b. 

 
c. 

 
d. 

c. backleveling and d. downgrading

 

How can VLAN hopping attacks be prevented on a network?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. Disable auto trunking and move native VLANs to unused VLANs.

 

What IEEE committee established WiMAX technologies?

   
 
a. 

802.16

 
b. 

802.5

 
c. 

802.11

 
d. 

802.3

a. 802.16

 

When using frame relay, what is the name of the identifier that routers use to determine which circuit to send frames to?
 
a. 

 
b. 

 
c. 

 
d. 

d. data link connection identifier.

In an ISDN connection, what is the size throughput did a single B channel provide?
   
 
a. 

 
b. 

 
c. 

 
d. 

d. 64 Kbps

 

The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?
   
 
a. 

 
b. 

 
c. 

 
d. 

d. out-of-band management

 

A switch is typically preconfigured with one _______________ that includes all its ports.

defualt VLAN

 

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?
   
 
a. 

 
b. 

 
c. 

 
d. 

d. 802.1Q

The first iteration of STP was defined in what IEEE standard below?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. 802.1d

What is the formula for determining the number of possible hosts on a network?

 
 
 
a. 

2n = Y

 
b. 

2n – 2 = Y

 
c. 

2h = Z

 
d. 

2h – 2 = Z

 

d. 2^h -2 = Z

 

What two standards below have been developed to replace the Spanning Tree Protocol?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. TRILL and d. SPB

A network with 6 bits remaining for the host portion will have how many usable host addresses?
   
 
a. 

 
b. 

 
c. 

 
d. 

a. 62

 

If the line between the carrier and the customer experiences significant errors on a T-1, a ____________ will report this fact to the carrier.

smart jack
The customer’s endpoint device on the WAN is called the __________________.
Data Terminal Equipment (DTE)

 

To eliminate the possibility of traffic loops on switches and bridges, the ________________ is used.

Spanning Tree Protocol (STP)

 

Network segmentation decreases both performance and security on a network.

False

Which network type allows a vNIC to access a network directly using the host machine’s NIC?
 
a. 

 
b. 

 
c. 

 
d. 

d. bridged mode

 

In a PON system, an OLT contains a splitter that splits each port into how many logical channels?
 
a. 

 
b. 

 
c. 

 
d. 

b. 32

 

Which network type allows a vNIC to access a network directly using the host machine’s NIC?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. bridged mode

 

What protocol is used to provide a common language between virtualized service applications and a network’s physical devices?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. OpenFlow

 

What two network protocols below rely on virtual circuits?
   
 
a. 

 
b. 

 
c. 

 
d. 

frame relay and ATM

When copper cabling is used to carry T-1 traffic, what kind of connector is used?
   
 
a. 

 
b. 

 
c. 

 
d. 

RJ-48

 

In an ISDN connection, what is the size throughput did a single B channel provide?
   
 
a. 

 
b. 

 
c. 

 
d. 

64 Kbps

 

What IEEE committee established WiMAX technologies?

   
 
a. 

802.3

 
b. 

802.5

 
c. 

802.16

 
d. 

802.11

802.16

 

A _________________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.

VLAN Hopping attack

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>