Routing And Switching 1, 2, & 6

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tiffshirk
T
Tiffshirk
Community Contributor
Quizzes Created: 5 | Total Attempts: 1,197
Questions: 20 | Attempts: 417

SettingsSettingsSettings
LAN Switching Quizzes & Trivia

Chapter 1, 2, and 6


Questions and Answers
  • 1. 

    Which type of network allows a customer to connect to a secure company website to check on a delivery date?

    • A.

      LAN

    • B.

      WAN

    • C.

      Intranet

    • D.

      Extranet

    Correct Answer
    D. Extranet
    Explanation
    An extranet is a type of network that allows external users, such as customers or partners, to securely access specific resources or services of a company. In this case, the customer is connecting to a secure company website to check on a delivery date, which suggests the use of an extranet. An extranet provides controlled access to certain parts of a company's internal network, allowing authorized users to interact and collaborate with the company's systems and data.

    Rate this question:

  • 2. 

    Which layer of the three-layer hierarchical design model is used to filter FTP traffic from a specific host?

    • A.

      Access

    • B.

      Distribution

    • C.

      Core

    • D.

      Aggregation

    Correct Answer
    B. Distribution
    Explanation
    The Distribution layer of the three-layer hierarchical design model is used to filter FTP traffic from a specific host. This layer is responsible for routing and filtering traffic between different network segments. By implementing access control lists (ACLs) or other filtering mechanisms at the Distribution layer, specific hosts or types of traffic can be allowed or denied. Therefore, the Distribution layer is the appropriate layer for filtering FTP traffic from a specific host.

    Rate this question:

  • 3. 

    In the ECNM, where should an IPS or IDS be configured.

    • A.

      Enterprise Edge

    • B.

      Enterprise Campuse

    • C.

      Service Provider Edge

    • D.

      WAN Edge

    Correct Answer
    A. Enterprise Edge
    Explanation
    An IPS or IDS should be configured in the Enterprise Edge. This is because the Enterprise Edge is the boundary between the internal network and the external network, where the organization's network connects to the internet or other external networks. By placing the IPS or IDS in the Enterprise Edge, it can monitor and analyze the incoming and outgoing traffic, detecting and preventing any potential security threats or attacks before they reach the internal network. This helps to protect the organization's network and sensitive data from unauthorized access or malicious activities.

    Rate this question:

  • 4. 

    In ECNM, where should QoS be implemented?

    • A.

      Building Access Module

    • B.

      Building Distribution Module

    • C.

      Campus Core module

    Correct Answer
    B. Building Distribution Module
    Explanation
    QoS (Quality of Service) should be implemented in the Building Distribution Module in ECNM (Enterprise Campus Network Module). The Building Distribution Module is responsible for connecting multiple Building Access Modules and aggregating their traffic before sending it to the Campus Core module. By implementing QoS in the Building Distribution Module, it allows for the prioritization and management of network traffic, ensuring that critical applications and services receive the necessary bandwidth and quality required for optimal performance. This helps in maintaining a consistent and reliable network experience for users throughout the enterprise campus network.

    Rate this question:

  • 5. 

    Which tool would enable a teleworker to communicate in real time with colleague?

    • A.

      FTP

    • B.

      E-mail

    • C.

      Chat

    • D.

      Telnet

    Correct Answer
    C. Chat
    Explanation
    The tool that would enable a teleworker to communicate in real time with a colleague is chat. Chat allows for instant messaging and real-time communication, allowing teleworkers to have quick and efficient conversations with their colleagues regardless of their physical location. FTP is a file transfer protocol, not a communication tool. Email allows for asynchronous communication and is not real-time. Telnet is a remote login protocol and does not provide real-time communication capabilities.

    Rate this question:

  • 6. 

    What type of traffic, if found on an enterprise WAN link, indicates a problem with the network design?

    • A.

      Departmental File Sharing

    • B.

      Printing

    • C.

      Internal Backup

    • D.

      Intracampus voice

    • E.

      All the above

    Correct Answer
    E. All the above
    Explanation
    If all of the listed types of traffic (departmental file sharing, printing, internal backup, and intracampus voice) are found on an enterprise WAN link, it indicates a problem with the network design. This is because these types of traffic should ideally be handled within the local network or through more efficient means such as dedicated servers or local backups. Having them traverse the WAN link can lead to increased network congestion, reduced performance, and unnecessary strain on the network infrastructure.

    Rate this question:

  • 7. 

    What information can find by using the show mac-address-table command on a Cisco Catalyst switch?

    • A.

      The Mac address of the console interface on the catalyst switch

    • B.

      Mac address of the hosts connected to the switch ports

    • C.

      The IP address of directly connected network devices

    • D.

      The mapping between MAC address and IP address for network hosts

    Correct Answer
    B. Mac address of the hosts connected to the switch ports
    Explanation
    The show mac-address-table command on a Cisco Catalyst switch can provide information about the MAC addresses of the hosts connected to the switch ports. This command allows network administrators to view the MAC addresses of devices that are connected to the switch, enabling them to identify and manage network traffic and troubleshoot connectivity issues. By knowing the MAC addresses of the hosts, administrators can also track and control network access for security purposes.

    Rate this question:

  • 8. 

    What troubleshooting a network problem, the network administrator issues the show version command on a router.  What information can be found using this command?

    • A.

      The amount of NVRAM, DRAM, and flash memory installed on the router

    • B.

      The bandwidth encapsulation, and I/O statistics on the interfaces

    • C.

      Difference between the backup configuration and the current configuration

    • D.

      The version of the routing protocols running on the router.

    Correct Answer
    A. The amount of NVRAM, DRAM, and flash memory installed on the router
    Explanation
    The show version command on a router provides information about the amount of NVRAM, DRAM, and flash memory installed on the router. It does not provide information about bandwidth encapsulation, I/O statistics on the interfaces, the difference between backup and current configuration, or the version of routing protocols running on the router.

    Rate this question:

  • 9. 

    After gathering a through list of network applications, the traffic generated by these applications, and the priority of this traffic, a network engineer wants to integrate this information into a single document for analysis.  How can this  be accomplished?

    • A.

      Create a physical topology map of the network and annotate it with the network application data.

    • B.

      Create a logical topology map of the network and annotate it with the network application data

    • C.

      Create a blueprint of the facility including network cable and telecommunications rooms, and annotate it with the network application data.

    • D.

      Take a photograph of the facility, and annotate it with the network application data.

    Correct Answer
    B. Create a logical topology map of the network and annotate it with the network application data
    Explanation
    The network engineer can accomplish this by creating a logical topology map of the network and annotating it with the network application data. This will provide a visual representation of the network and its applications, allowing for easy analysis and identification of traffic priorities.

    Rate this question:

  • 10. 

    One evening a network administrator attempted to access a recently deployed website and received a “page not found” error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was hundreds of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude?

    • A.

      It is normal web surfing activity.

    • B.

      It is likely that someone attempted a DoS attack.

    • C.

      The link to the website does not have enough capacity and needs to be increased.

    • D.

      The web server was turned off and not able to service requests.

    Correct Answer
    B. It is likely that someone attempted a DoS attack.
    Explanation
    Based on the information provided, the network administrator can conclude that someone likely attempted a DoS (Denial of Service) attack on the website. The fact that there were hundreds of requests for the website home page originating from the same IP address during the hour when the site failed to load suggests a deliberate attempt to overload the server and disrupt its functionality. This pattern of activity is indicative of a DoS attack rather than normal web surfing activity or server capacity issues. The possibility of the web server being turned off is not supported by the given information.

    Rate this question:

  • 11. 

    What type of media typically connects a MDF switch to an IDF switch in another building?

    • A.

      Fiber-optic

    • B.

      Coaxial-cable

    • C.

      Unsheilded twisted pair

    • D.

      Shielded twisted pair

    Correct Answer
    A. Fiber-optic
    Explanation
    Fiber-optic cables are typically used to connect a Main Distribution Frame (MDF) switch to an Intermediate Distribution Frame (IDF) switch in another building. Fiber-optic cables use strands of glass or plastic fibers to transmit data using light signals, allowing for high-speed and long-distance communication. This type of media is preferred for long-distance connections between buildings due to its ability to provide high bandwidth, immunity to electromagnetic interference, and low signal loss.

    Rate this question:

  • 12. 

    Which the following devices can receive power over the same twisted pair Ethernet cable that carries data? 

    • A.

      Wireless access point

    • B.

      Monitors

    • C.

      Web camera

    • D.

      IP Phone

    • E.

      Network switches

    • F.

      Laptops

    • G.

      Wireless access points, Web cameras, IP phone

    Correct Answer
    G. Wireless access points, Web cameras, IP phone
    Explanation
    Wireless access points, web cameras, and IP phones can receive power over the same twisted pair Ethernet cable that carries data. This is possible through a technology called Power over Ethernet (PoE), which allows devices to receive power through the same cable used for data transmission. This eliminates the need for separate power cables and simplifies the installation process.

    Rate this question:

  • 13. 

    Which of the following protocols can be used to access a Cisco router for in-band management? 

    • A.

      ARP

    • B.

      SSH

    • C.

      FTP

    • D.

      SMTP

    • E.

      Telnet

    • F.

      SSH & Telnet

    Correct Answer
    F. SSH & Telnet
    Explanation
    SSH (Secure Shell) and Telnet are both protocols that can be used for in-band management of a Cisco router. In-band management refers to the ability to manage and configure a network device using the same network infrastructure that is used for regular data traffic. SSH is a secure protocol that provides encrypted communication between the management device and the router, ensuring confidentiality and integrity of the management session. Telnet, on the other hand, is an older protocol that does not provide encryption and is considered less secure. However, it can still be used for in-band management if security is not a major concern.

    Rate this question:

  • 14. 

    A network analyst is documenting the existing network at ABC Corporation. The analyst decides to start at the core router to identify and document the Cisco network devices attached to the core. Which command executed on the core router provides the required information?

    • A.

      Show version

    • B.

      Show IP route

    • C.

      Show tech-support

    • D.

      Show running-config

    • E.

      Show CDP neighbors detail

    Correct Answer
    E. Show CDP neighbors detail
    Explanation
    The command "show CDP neighbors detail" provides the required information because it displays detailed information about the neighboring Cisco devices connected to the core router using the Cisco Discovery Protocol (CDP). This command will show the device ID, local interface, capability, platform, and port ID of each neighboring device, allowing the network analyst to identify and document the Cisco network devices attached to the core.

    Rate this question:

  • 15. 

    A network administrator suspects that there is a problem with the configuration of the RIP routing protocol. She investigates the interfaces and finds that all interfaces are up/up. Which of the following commands could help to identify the problem? 

    • A.

      Show cdp neighbors

    • B.

      Show ip route

    • C.

      Show sessions

    • D.

      Show ip protocols

    • E.

      Show version

    • F.

      Show IP route & Show IP protocols

    Correct Answer
    F. Show IP route & Show IP protocols
    Explanation
    The "show ip route" command displays the routing table of the device, which includes all the routes learned by the RIP routing protocol. By examining the routes, the network administrator can identify any inconsistencies or errors in the routing information being advertised by RIP.

    The "show ip protocols" command provides information about the active routing protocols on the device, including RIP. It displays the configuration parameters and status of the RIP protocol, allowing the administrator to check if there are any issues with the RIP configuration.

    Using both commands together can help the administrator identify any problems with the RIP routing protocol and its configuration.

    Rate this question:

  • 16. 

    As a network technician, you are troubleshooting a router configuration. You want to get a concise display of the status of the router interfaces. You also want to verify the IP address of each interface and the subnet mask in slash format (/XX). Which command would you use?

    • A.

      Show protocols

    • B.

      Show ip route

    • C.

      Show running-config

    • D.

      Show ip protocols

    • E.

      Show ip interfaces brief

    Correct Answer
    A. Show protocols
    Explanation
    The correct answer is "show protocols". This command displays the status of the router interfaces, including the IP address and subnet mask in slash format. The other options do not provide the specific information required for this troubleshooting task.

    Rate this question:

  • 17. 

    Which of the following is not a type of network protection device or technique to help security?

    • A.

      DoS

    • B.

      Firewall

    • C.

      ACL

    • D.

      IDS

    • E.

      IPS

    • F.

      DMZ

    • G.

      VPN

    Correct Answer
    A. DoS
    Explanation
    A DoS (Denial of Service) attack is not a type of network protection device or technique to help security. Instead, it is a malicious attack where an attacker overwhelms a network or website with excessive traffic or requests, causing it to become inaccessible to legitimate users. Network protection devices and techniques such as firewalls, ACLs (Access Control Lists), IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), DMZ (Demilitarized Zone), and VPN (Virtual Private Network) are implemented to enhance network security and protect against various threats and attacks.

    Rate this question:

  • 18. 

    What attribute is associated with link-state routing protocols? 

    • A.

      Hop Count

    • B.

      Poison reverse

    • C.

      Low processor overhead

    • D.

      Shortest path first calculation

    Correct Answer
    D. Shortest path first calculation
    Explanation
    Link-state routing protocols, such as OSPF and IS-IS, use the concept of shortest path first calculation. This means that each router in the network calculates the shortest path to every other router based on the information it has about the network topology. This information is then shared with other routers in the network, allowing them to build a complete map of the network and determine the best path for forwarding packets. This approach ensures efficient and optimal routing decisions, as it takes into account factors like link costs and network congestion.

    Rate this question:

  • 19. 

    Which two statements are true regarding the cost calculation for link in OSPF?

    • A.

      It can be set with ip ospf cost command

    • B.

      It is set to 1544 by default for all OSPF interfaces

    • C.

      The configuration loopback addresses map link cost

    • D.

      It may be calculated using the formula Reference bandwidth / Bandwidth

    • E.

      A & D

    Correct Answer
    E. A & D
    Explanation
    The cost calculation for a link in OSPF can be set with the "ip ospf cost" command and it may be calculated using the formula "Reference bandwidth / Bandwidth".

    Rate this question:

  • 20. 

    For what two reason would network administrator choose to enable MD5 authentication and encryption for OSPF exchanges?

    • A.

      To prevent routing information from being falsified

    • B.

      To reduce OSPF information from being captured

    • C.

      To keep routing information from being captured and deciphered

    • D.

      To encrypt routing tables to prevent unauthorized viewing

    • E.

      To ensure OSPF routing information takes priority over RIP or EIGRP

    • F.

      A & C

    Correct Answer
    F. A & C
    Explanation
    The network administrator would choose to enable MD5 authentication and encryption for OSPF exchanges for two reasons. Firstly, it is done to prevent routing information from being falsified, ensuring the integrity and reliability of the network. Secondly, it is done to keep routing information from being captured and deciphered by unauthorized individuals, thus maintaining the confidentiality of the network. By enabling MD5 authentication and encryption, the administrator can secure the OSPF exchanges and protect the network from potential threats.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 18, 2013
    Quiz Created by
    Tiffshirk
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.