Students also studied
Study guides
Practice questions for this set
1. Source IP address
2. Protocol
3. Destination network
Access control lists can be configured based on which of the following?
Which of the following is not a function that would be found in a managed switch?
Which is the strongest size of wireless security?
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks
Access control lists can be configured based on which of the following?
1. Source IP address
2. Protocol
3. Destination network
A distance-vector protocol sends updates to tướng its neighbors that include the entire contents of its routing table
Which of the following combinations will you find in a switching table?
MAC address/switch port number
The major disadvantage to tướng using store-and-forward switching in a large network is that it will slow down the tốc độ of network traffic
Which of the following would be found in a routing table on a router?
1. Destination network
2. Metric
3. Next hop
4. Timestamp
What command issued from a command prompt will display the routing table in Windows?
Which of the following is not a function that would be found in a managed switch?
The ability to tướng transfer its switching table with neighboring switches
Which of the following is the switching protocol that is used to tướng eliminate the possibility of switching loops?
Communications through a router are noticeably faster phàn nàn communications through a switch
Which is the strongest size of wireless security?
What is the name of the value assigned to tướng a routing protocol to tướng indicate its reliability compared with other routing protocols that might be in use on the same router?
What type of hacker uses a scanning device to tướng find unsecured wireless networks and break into those networks?
Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks
Which of the following is a common link-state protocol?
Which switching method reads a minimum of 64 bytes on an Ethernet frame before forwarding the frame?