1.
802.11i is attractive compared with WPA because?
Correct Answer
B. 802.11i offers stronger security
Explanation
802.11i is more attractive compared to WPA because it offers stronger security. This means that it provides better protection against unauthorized access and ensures the confidentiality and integrity of the data being transmitted over the wireless network. This is crucial in today's digital age where cybersecurity threats are prevalent. Upgrading to 802.11i would enhance the overall security posture of the network, making it a preferred choice over WPA. Additionally, the fact that 802.11i was standardized by the Wi-Fi Alliance further adds to its credibility and trustworthiness.
2.
What is the strongest security protocol for 802.11 today?
Correct Answer
B. 802.11i
Explanation
802.11i is the strongest security protocol for 802.11 today. It is also known as WPA2 (Wi-Fi Protected Access 2) and provides enhanced security features compared to its predecessor, WPA (Wi-Fi Protected Access). 802.11i uses the Advanced Encryption Standard (AES) algorithm, which is considered highly secure. It also supports mutual authentication, data integrity checks, and dynamic encryption key management, making it more resistant to attacks and ensuring a higher level of security for wireless networks.
3.
What damage can an evil twin access point do?
Correct Answer
D. All of the above
Explanation
An evil twin access point can cause various damages. It can eavesdrop on communication, meaning it can intercept and listen to the data being transmitted between the client and the network. It can also steal important keys or other sensitive information that is being transmitted by the client, such as passwords or credit card details. Additionally, it can launch attacks against corporate servers, potentially causing disruption or unauthorized access to sensitive data. Therefore, all of the given options are correct, making "All of the above" the correct answer.
4.
Which of the folowing secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
Correct Answer
B. VPNs
Explanation
VPNs (Virtual Private Networks) secure communication between a wireless computer and the server against evil twin attacks. Evil twin attacks involve creating a malicious network that appears to be legitimate, tricking users into connecting to it. By using a VPN, all data transmitted between the computer and the server is encrypted, ensuring that even if an attacker intercepts the communication, they won't be able to decipher it. VPNs create a private and secure tunnel for data transmission, protecting against potential threats and ensuring the confidentiality and integrity of the communication.
5.
What security protocol originally came with 802.11 equipment?
Correct Answer
C. WEP
Explanation
WEP (Wired Equivalent Privacy) was the original security protocol that came with 802.11 equipment. It was introduced in 1997 as a way to provide basic security for wireless networks. However, WEP has been widely criticized for its vulnerabilities and is no longer considered secure. It has been replaced by more advanced protocols such as WPA and WPA2.
6.
The Network part of an IP address is ____________ bits long?
Correct Answer
E. The size of the network part varies.
Explanation
The network part of an IP address refers to the portion of the address that identifies the network to which the device belongs. The size of the network part can vary depending on the subnet mask used. A subnet mask is used to divide an IP address into network and host portions. It determines the number of bits used for the network part. Therefore, the size of the network part can vary depending on the specific network configuration.
7.
A mask has __________ bits?
Correct Answer
E. The number of bits varies.
8.
In a network mask, the 1's correspond to the ____________?
Correct Answer
B. Network part
Explanation
The 1's in a network mask correspond to the network part. The network part of an IP address is used to identify the network to which the IP address belongs. It is a portion of the IP address that remains constant within a particular network. The network mask is used to determine which part of an IP address represents the network part and which part represents the host part.
9.
In the subnet mask the 1's correspond to the ____________?
Correct Answer
D. None of the above.
Explanation
In the subnet mask, the 1's correspond to the network part. The subnet part and host part are represented by 0's in the subnet mask.
10.
If /14 is the network mask, how many bits are there in the subnet part?
Correct Answer
E. We cannot say.
Explanation
The question provides the network mask "/14" but does not specify the subnet part. Therefore, it is not possible to determine the number of bits in the subnet part based on the given information.
11.
If /14 is the network mask, how many bits are there in the host part?
Correct Answer
E. We cannot say.
Explanation
The correct answer is "we cannot say." The reason for this is that the given network mask "/14" does not provide enough information to determine the number of bits in the host part. The network mask only specifies the number of bits in the network part, but the host part can vary depending on the specific network configuration. Therefore, without additional information, it is not possible to determine the number of bits in the host part.
12.
If /14 is a subnet mask, how many bits are there in the host part?
Correct Answer
C. 18
13.
The default row ___________?
Correct Answer
B. Will always match the IP address of an incoming packet
Explanation
The default row in a routing table will always match the IP address of an incoming packet. This is because the default row is used when there is no specific match found for the destination IP address in the routing table. The default row acts as a catch-all and is used when no other more specific routes are available. Therefore, any incoming packet that does not have a matching entry in the routing table will be matched by the default row.
14.
Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /14 and the cost metric 10. Which row will the router choose if both are matches?
Correct Answer
A. 2707
Explanation
The router will choose row 2707 because it has a higher reliability metric of 20 compared to row 4400 which has a cost metric of 10.
15.
Row 2707 has the mask /16 and the speed metric 20. Row 4400 has the mask /16 and the speed metric 10. Which row with the router choose if both are matches?
Correct Answer
A. 2707
Explanation
The router will choose row 2707 because it has a higher speed metric of 20 compared to row 4400 which has a speed metric of 10.
16.
Routers send packets out ________?
Correct Answer
D. Interfaces
Explanation
Routers send packets out through interfaces. Interfaces are the physical or virtual connections that allow a router to connect to other devices or networks. They serve as the entry and exit points for data packets, enabling the router to transmit and receive information across different networks. By using interfaces, routers can effectively direct packets to their intended destinations, ensuring efficient communication between devices.
17.
To deliver an arriving packet to a destination host on a subnet connected to router, the router needs to know the destination host's __________?
Correct Answer
C. Both A and B
Explanation
To deliver an arriving packet to a destination host on a subnet connected to a router, the router needs to know both the destination host's IP address and data link layer address. The IP address is required for routing the packet to the correct subnet, while the data link layer address is necessary for delivering the packet directly to the intended host on that subnet.
18.
Fragmentation is __________?
Correct Answer
A. Suspicious because it is often used by hackers
Explanation
Fragmentation is suspicious because it is often used by hackers. Fragmentation refers to the practice of dividing data into smaller pieces or fragments, which can make it difficult for security systems to detect and analyze. Hackers may use fragmentation techniques to bypass security measures, hide malicious code within the fragments, or evade detection. Therefore, the suspicious nature of fragmentation stems from its association with hacking activities.
19.
A (n)_________specifies a particular application on a particular host.
Correct Answer
A. Socket
Explanation
A socket is a communication endpoint that allows different computers to connect and exchange data with each other. It is a combination of an IP address and a port number, which together specify a particular application running on a particular host. Therefore, a socket is the correct answer as it accurately describes the concept of specifying a particular application on a particular host.
20.
Which TCP/IP interior dynamic routing protocol is simple to manage?
Correct Answer
B. RIP
Explanation
RIP (Routing Information Protocol) is a TCP/IP interior dynamic routing protocol that is considered simple to manage. It is a distance-vector protocol that uses hop count as the metric for determining the best path to a destination. RIP is relatively easy to configure and requires minimal administrative effort, making it a popular choice for small to medium-sized networks. It is not as scalable or efficient as other protocols like OSPF or BGP, but its simplicity and ease of management make it a suitable choice for certain network environments.
21.
Which interior dynamic routing protocol is good for large internets?
Correct Answer
B. OSPF
Explanation
OSPF (Open Shortest Path First) is a good interior dynamic routing protocol for large internets. This is because OSPF is designed to scale well and can handle large networks with thousands of routers. It uses a link-state routing algorithm, which allows for efficient and accurate routing table updates. OSPF also supports hierarchical routing, which further enhances scalability by dividing the network into smaller areas. Additionally, OSPF provides fast convergence and supports load balancing, making it suitable for large internets with high traffic volumes.
22.
___________is used for supervisory messages at the internet layer.
Correct Answer
D. ICMP
Explanation
ICMP (Internet Control Message Protocol) is used for supervisory messages at the internet layer. ICMP is responsible for reporting errors and providing diagnostic information related to IP packet processing. It is commonly used by network devices to communicate error messages, such as destination unreachable or time exceeded, back to the source IP address. ICMP is also used for network troubleshooting and network management purposes.
23.
In MPLS, the interface to send the packet back out will be decided ___________?
Correct Answer
B. Before the packet arrives
Explanation
The interface to send the packet back out in MPLS is decided before the packet arrives. This means that the decision on which interface to use for forwarding the packet is made in advance, based on the information available in the MPLS header. This allows for faster and more efficient routing, as the decision is already made and the packet can be quickly forwarded without the need for further processing during the router's routing process.
24.
Label-switching router base their decisions on a packet's__________?
Correct Answer
A. Label number
Explanation
Label-switching routers base their decisions on a packet's label number. This is because label switching is a technique used in MPLS (Multiprotocol Label Switching) networks, where labels are assigned to packets to determine their forwarding path. The label number serves as an identifier for the packet and allows the router to make forwarding decisions based on the label's value. IP addresses may still be used within the packet, but the primary factor for routing decisions in label-switching routers is the label number. Therefore, the correct answer is "label number."
25.
In MPLS, the __________adds the label to the packet.
Correct Answer
B. First label-switching router
Explanation
In MPLS, the first label-switching router adds the label to the packet. This is because MPLS uses labels to route packets through the network. The first label-switching router is responsible for assigning a label to the packet based on the destination address and forwarding it to the next hop in the network. This process allows for efficient and fast routing of packets in MPLS networks.