Module 11: Network Communication Devices Quiz Answers

1. For which discovery mode will an AP generate the most traffic on a WLAN?

  • open mode
  • passive mode
  • mixed mode
  • active mode

Explanation: The two discovery modes are passive and active. When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and open mode refers to security parameter settings.

2. Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?

  • ad hoc
  • ESS
  • BESS
  • SSID

Explanation: The SSID is used to name a wireless network. This parameter is required in order for a wireless client to attach to a wireless AP.

3. Which two protocols are considered distance vector routing protocols? (Choose two.)

  • BGP
  • ISIS
  • RIP
  • OSPF

Explanation: RIP and EIGRP are both considered distance vector routing protocols. OSPF and ISIS are link-state routing protocols. BGP is a path vector routing protocol.

4. What information does an Ethernet switch examine and use to build its address table?

  • source MAC address
  • destination IP address
  • source IP address
  • destination MAC address

Explanation: An Ethernet switch examines the source MAC address of an incoming frame. If the source MAC address is not in the MAC address table, the switch will add it to the table with the associated ingress Ethernet port.

5. Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments?

  • Layer 7
  • Layer 3
  • Layer 2
  • Layer 4

Explanation: When a router forwards traffic between LAN segments it encapsulates the Layer 2 frame to determine the Layer 3 path. Once the Layer 3 path is determined, the router encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2 addressing infomation for the destination LAN segment.

6. At what layer of the OSI model do routers operate?

  • Layer 4
  • Layer 3
  • Layer 5
  • Layer 2

Explanation: Routers operate at Layer 3 of the OSI model and forward packets between logical networks.

7. Which wireless parameter refers to the frequency bands used to transmit data to a wireless access point?

  • security mode
  • channel settings
  • scanning mode
  • SSID

Explanation: An access point can be manually set to a specific frequency band or channel in order to avoid interference with other wireless devices in the area.

8. What is a role of an intermediary device on a network?

  • forms the interface between the human network and the underlying communication network
  • determines the path and directs data along the way to its final destination
  • runs applications that support collaboration for business
  • functions as the primary source of information for end devices

Explanation: Processes running on the intermediary network devices perform functions like regenerating and re-transmitting data signals, maintaining information about what pathways exist through the network and internetwork, directing data along alternate pathways when there is a link failure, and permitting or denying the flow of data, based on security settings.

9. What information does an Ethernet switch examine and use to forward a frame?

  • destination IP address
  • destination MAC address
  • source IP address
  • source MAC address

Explanation: A switch is a Layer 2 device that uses source MAC addresses to build a MAC address table (a CAM table) and destination MAC addresses to forward frames.

10. Which device can control and manage a large number of corporate APs?

  • router
  • LWAP
  • WLC
  • switch

Explanation: A wireless LAN controller (WLC) can be configured to manage multiple lightweight access points (LWAPs). On the WLC, a network administrator can configure SSIDs, security, IP addressing, and other wireless network parameters in a centralized management environment.

11. Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)

  • repeater
  • WLAN controller
  • Ethernet switch
  • access point
  • RADIUS authentication server

Explanation: In addition to its roles as router, a typical SOHO wireless router acts as both a wireless access point and an Ethernet switch. RADIUS authentication is provided by an external server. A WLAN controller is used in enterprise deployments to manage groups of lightweight access points. A repeater is a device that enhances an incoming signal and retransmits it.

12. What technology is used to prevent Layer 2 loops?

  • VTP
  • NTP
  • ARP
  • STP

Explanation: The Spanning Tree Protocol (STP), is enabled on switches to prevent Layer 2 loops from forming when there are redundant physical paths.

13. Which sentence correctly describes the SVI inter-VLAN routing method?

  • Subinterfaces have to be created.
  • The encapsulation type must be configured on the SVI.
  • An SVI is needed for each VLAN.
  • A physical interface is needed for every VLAN that is created.

Explanation: In order to create SVI inter-VLAN routing on a Layer 3 switch, the VLAN must exist in the database and the SVI must be explicitly created. The only exception is VLAN1, which is created by default.

14. How are IP addressing designs affected by VLAN implementations?

  • Each VLAN must have a different network number.
  • Each VLAN must have a different subnet mask.
  • VLANs do not support VLSM.
  • VLANs do not use a broadcast address.

Explanation: Each VLAN requires its own network number, broadcast address, and valid IP addresses because each VLAN is a separate network. IP addressing schemes are frequently designed with the VLAN numbers as part of the design.

Notify of

Inline Feedbacks
View all comments