Essay about Network Technology and Service Integration

959 Words Nov 19th, 2014 4 Pages
Answers to Assessment Test
1. A. Network Control Protocol is used to help identify the Network layer protocol used in the packet. See Chapter 16 for more information.
2. B. Each field in an IPv6 address is 16 bits long. An IPv6 address is a total of 128 bits. See Chapter 15 for more information.
3. C. The port roles used within RSTP include discarding, learning, and forwarding. The difference between 802.1d and RSTP is the discarding role. See Chapter 10 for more information.
4. C. The command line console 0 places you at a prompt where you can then set your console user-mode password. See Chapter 6 for more information. 5. D. An IPv6 address is 128 bits long, whereas an IPv4 address is only 32 bits long. See Chapter 15 for more
…show more content…
See Chapter 12 for more information.
14. C. VLANs break up broadcast domains at layer 2. See Chapter 11 for more information.
15. A. The command erase startup-config deletes the configuration stored in NVRAM. See Chapter 6 for more information.
16. C. ICMP is the protocol at the Network layer that is used to send messages back to an originating router. See Chapter 3 for more information.
17. A. Class A addressing provides 24 bits for host addressing. See Chapter 3 for more information.
18. B. Every 2 seconds, BPDUs are sent out from all active bridge ports by default. See Chapter 10 for more information.
19. D. Switches do not propagate VLAN information by default; you must configure the VTP domain for this to occur. VLAN Trunking Protocol
(VTP) is used to propagate VLAN information across a trunk link. See Chapter 11 for more information.
20. C. IEEE 802.11bg is in the 2.4GHz range, with a top speed of 54Mbps. See Chapter 14 for more information.
21. A. By default, switches break up collision domains on a per-port basis but are one large broadcast domain. See Chapter 1 for more information. 22. D. Port Address Translation (PAT) allows a one-to-many approach to network address translation. See Chapter 13 for more information.
23. C, D. VTP is not right because it has nothing to do with trunking except that it sends VLAN information across a trunk link. 802.1Q and ISL encapsulations are used to configure trunking on a port. See Chapter 11 for

Related Documents