2.5 - Chapter Quiz 2.5.1- Quiz Diagram 1, Quiz Chapter 2 Quiz: Exploring the Enterprise Network Infrastructure 1. Match each term to its correct description. (Not all options are used) Term A. POP B. VPN C. DoS D. CPE E. DMZ F. demarc Description 1. Maliciously prevents access to network resources by legitimate users. 2. Boundary that designates responsibility for equipment maintenance and troubleshooting. 3. Physical link to outside networks at the enterprise edge. 4. Equipment located at the customer facility. 5. Allows remote workers to access the internal network securely. 2. What information can be found by using the command show mac-address-table on a Cisco Catalyst switch? A. The MAC addresses of the ports on the Catalyst switch. B. The port the switch will use to forward frames to a host. C. The IP addresses of directly connected network devices. D. The mapping between MAC address and IP address for network hosts. 3. While trouble shooting a network problem, the network administrator issues the show version command on a router. What information can be found using this command? A. The amount of NVRAM, DRAM, and flash memory installed on the router. B. Bandwidth, encapsulation, and I/O statistics on the interfaces. C. Differences between the backup configuration and the current running configuration. D. The version of the routing protocols running on the router. 4. After gathering a thorough list of network applications, the traffic generated by these applications, and the priority of this traffic, a network engineer wishes to integrate this information into a single document for analysis. How can this be accomplished? A. Create a physical topology map of the network and annotate it with the network application data. B. Create a logical topology map of the network and annotate it with the network application data. C. Create a blueprint of the facility, including network cabling and telecommunication rooms and annotate it with the network application data. D. Take a photograph of the facility and annotate it with the network application data. 5. One evening a network administrator attempted to access a recently deployed website and received a ?page not found? error. The next day the administrator checked the web server logs and noticed that during the same hour that the site failed to load, there was hundreds of requests for the website home page. All of the requests originated from the same IP address. Given this information, what might the network administrator conclude? A. It is normal web surfing activity. B. It is likely that someone attempted a DoS attack. C. The link to the website does not have enough capacity and needs to be increased. D. The web server was turned off and not able to service requests. 6. What type of media typically connects a MDF switch to an IDF switch in another building? A. Fiber-optic B. Coaxial-cable C. Unsheilded twisted pair D. Sheilded twisted pair 7. Which three devices can receive power over the same twisted pair Ethernet cable that carries data? (Choose three) A. Wireless access point B. Monitors C. Web camera D. IP Phone E. Network switches F. Laptops 8. Match the hardware characteristics to the hardware type. (router or switch) Characteristic: A. Define broadcast domains B. Connect IP Phones and access points to the network C. Enhance security with ACLs D. Interconnect networks E. Appear more commonly at the access layer F. Connect hosts to the network 9. Which two protocols can be used to access a Cisco router for in-band management? (Choose two) A. ARP B. SSH C. FTP D. SMTP E. Telnet 10. A network analyst is documenting the existing network at ABC Corporation. The analyst decides to start at the core router to identify and document the Cisco network devices attached to the core. Which command executed on the core router provides the required information? A. show version B. show IP route C. show tech-support D. show running-config E. show CDP neighbors detail