Ch. 3 Networking Devices

9 September 2022
4.7 (114 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
Which network component connects a device with the transmission media and allows it to send and receive messages? Client Network interface card Peripheral Protocol Server
answer
Network Interface card The network interface card (NIC) allows a device to send and receive messages over the transmission media.
question
What device sends signals from a computer onto a network? Transceiver Cable Gateway Router
answer
Transceiver A transceiver (short for transmitter/receiver) sends signals to and receives signals from the network. It translates the parallel data stream of the computer to the serial data stream of the network and vice versa. Most transceivers are now built into network interface cards (NICs).
question
Which of the following statements accurately describes how a modem works? (Select two)
answer
It modulates digital data from the PC into analog data and transmits it on a telephone network. It demodulates analog data from a telephone network into digital PC data. Modem is shorthand for modulator/demodulator. Its job is to convert (or modulate) digital data from a PC into analog telephone signals and transmit them through a telephone network.
question
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use? Repeater Hub Bridge Media converter Gateway
answer
Media converter Use a media converter to convert from one media type to another media type within the same architecture. Use a bridge to connect two devices that use different network architectures, for example to connect a wired network to wireless clients. A hub or a repeater connect devices using the same media type.
question
At which OSI model layer does a media converter operate?
answer
Layer 1 A media converter operates at the OSI model layer 1 (Physical layer). The media converter translates frames into bits and transmits them on the transmission medium. At layer 2, the MAC address is added to make the data into a frame. At layer 3, the IP address is added to the packet. A media converter does not alter or use the MAC address or the IP address.
question
What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two) OC-x SFP MPLS GBIC
answer
SFP GBIC Older network adapters used an external transceiver that matched the media type. While nearly all current network adapters come with a built-in transceiver type, new devices, such as switches and routers, use transceiver modules that allow you to modify the media type of a port by changing the transceiver. Transceiver modules include the following: GBIC (gigabit interface converter) is a larger-sized transceiver that fits in a port slot and is used for Gigabit media including copper and fiber optic. SFP (small form-factor pluggable) is similar to a GBIC but with a smaller size. An SFP is sometimes called a mini-GBIC XFP transceiver is similar in size to an SFP but is used for 10 Gigabit networking.
question
Which of the following is a valid MAC address? 34-9A-86-1G-B3-24 83-5A-5B-0B-31-55-F1 255.255.255.0 C0-34-FF-15-01-8E 73-99-12-61-15 192-168-12-15
answer
C0-34-FF-15-01-8E A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC address has a total of 12 hexadecimal numbers. Hexadecimal numbers contain the numbers 0 to 9 and letters A to F. Valid values in a MAC address range anywhere from 00 to FF. Note that one of the answers would be valid MAC address except it uses a G value, which is beyond the range of a hexadecimal number.
question
Which of the following is a valid MAC address? 95ABC2F4.ABC5.569D.43BF FABC.875E.9BG6 AB.07.CF.62.16.BD 145.65.254.10
answer
AB.07.CF.62.16.BD MAC addresses are comprised of 12 hexadecimal digits (ranging from 0-9 and A-F). They are typically represented as a three sets of four hexadecimal digits or six sets of two hexadecimal digits separated with periods. Regardless of the grouping and separator values, look for 12 hex digits for a valid MAC address.
question
Which of the following is true about the MAC address? (Select two) It is typically represented by octets of decimal numbers between 0-255 It is typically represented by hexadecimal numbers. It is a 64-bit address It is a 48-bit address It is a 32-bit address
answer
It is typically represented by hexadecimal numbers. It is a 48-bit address The MAC address identifies the physical address of the network adapter. The MAC address is a 12-digit (48-bit) hexadecimal number (each number ranges from 0-9 or A-F). The address is often written as 00-B0-D0-06-BC-AC OR 00B0.D006.BCAC, although dashes, periods, and colons can be used to divide the MAC address parts. An IPv4 address is 32-bits and uses octets of decimal numbers between 0-255. An IPv6 address is a 64-bit address that uses 32 hexadecimal numbers.
question
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? BOOTP ARP DNS DHCP IGMP ICMP
answer
ARP Hosts use the Address Resolution Protocol (ARP) to discover the hardware address of a host.
question
Which of the following hardware devices links multiple networks and directs traffic between networks? Router Repeater Hub Bridge
answer
Router A router is a device that links multiple networks and directs traffic between networks. Each network linked by routers has its own unique identifier called the "network number" or "network address."
question
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the Internet to provide users with Internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the Internet on three separate occasions. Router Switch Hub CSU/DSU Proxy server Firewall
answer
Firewall The role of a firewall is to provide a barrier between an organization's network and a public network, such as the Internet. Its job is to prevent unauthorized access into the organization's private network. To do this, the firewall examines incoming packets and determines whether they should be allowed to enter based on a set of rules defined by the network administrator.
question
Which of the following is the best device to deploy to protect your private network from a public untrusted network? Gateway Hub Firewall Router
answer
Firewall A firewall is the best device to deploy to protect your private network from a public untrusted network. Firewalls are used to control traffic entering and leaving your trusted network environment. Firewalls can manage traffic based on source or destination IP address, port number, service protocol, application or service type, user account, and even traffic content. Routers offer some packet-based access control, but not as extensive as that of a full-fledged firewall. Hubs and gateways are not sufficient for managing the interface between a trusted and an untrusted network.
question
Which of the following is a good reason to install a firewall?
answer
To prevent hackers from accessing your network. Firewalls prevent unauthorized users from accessing private networks connected to the internet. You should never allow public access to your DHCP server. A proxy server caches web pages. A NAT router or ICS translates Web addresses to private IP addresses. A proxy server and NAT software might be implemented on the same device as your firewall, but they are different concepts.
question
You are the administrator of your company's network. You want to prevent unauthorized access to your intranet from the Internet. Which of the following should you implement? Firewall ICS Packet Internet Groper Proxy server
answer
Firewall A firewall allows you to filter unwanted traffic from the Internet to your network. Packet Internet Groper is better known by its acronym, PING, a TCP/IP command. A proxy server caches web pages. ICS allows you to connect a small network to the Internet through a single connection.