Question 1
Examples of IP addresses on private networks include __________.
194.22.128.1 and 174.22.128.1
172.16.10.10 and 10.254.128.13
10.128.16.1 and 172.14.0.1
192.168.0.1 and 194.22.128.1
Question 2
__________ is/are NOT a problem associated RIP.
Excessive bandwidth usage
A Lack of security features
Large computation and storage requirements
Difficulty in debugging
Question 3
A potential drawback of cut-through switching is __________.
variable latency
fixed latency
propagation delay
error propagation
Question 4
In the link-state routing algorithm, each router is aware of:
the entire network.
neighboring routers only.
the number of hops on a route.
a part of the network topology.
Question 5
IGRP is a proprietary protocol using distance-vector routing technology. It only runs on equipment from __________.
Motorola
Hewlett Packard
Cisco
Newbridge
Question 6
Autonomous Systems (AS) are grouped together on the Internet:
by organization.
by region.
according to interior gateway protocols.
by AS number.
Question 7
An acronym used in Information Security is AAA, which stands for Authentication, Authorization, and __________.
Administration
Architecture
Accounting
Application
Question 8
The standard tunneling protocol for VPNs is the __________.
Point-to-Point Protocol (PPP)
Layer 2 Forwarding Protocol (L2FP)
Layer 2 Tunneling Protocol (L2TP)
Network Access Service (NAS)
Question 9
IP masquerading is available for the Windows platform using the __________ product, as well as the Internet Connection Sharing feature of Windows.
spoof control
Road runner
Wingate
Windows firewall
Question 10
A technology used to support QoS (Quality of Service) in the LAN environment is __________.
Multi-Protocol Label Switching (MPLS)
the layer 3 switch
Inter-Domain Routing Protocol (IDRP)
Private Network-Network Interface (PNNI)
Question 11
A routing table can be created and maintained either statically or dynamically. Identify and discuss at least three differences between the static and the dynamic routing environment.
Question 12
Routing protocols operate at the Network Layer (Layer 3) of the TCP/IP and OSI protocol stacks to connect various types of networks to form one logical network. Many criteria influence the choice of which routing protocols to use. Please list criteria you feel are most important to the decision of which protocols to use.