CISCO Cyberops Security Fundamentals Section 02: Network Infrastructure (Q 1-10)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Paranormalrob
P
Paranormalrob
Community Contributor
Quizzes Created: 6 | Total Attempts: 1,700
Questions: 10 | Attempts: 386

SettingsSettingsSettings
CISCO Quizzes & Trivia

Questions and Answers
  • 1. 

    When using DHCP with LWAP devices, which one of the following is option 43 used for?

    • A.

      To identify the default gateway

    • B.

      To assign a fallback IP address

    • C.

      To supply the specific WLAN controllers IP address

    • D.

      To supply the specific NAME server IP address

    Correct Answer
    C. To supply the specific WLAN controllers IP address
    Explanation
    Option 43 is used in DHCP with LWAP devices to supply the specific WLAN controllers IP address. This means that when a LWAP device connects to the network and obtains an IP address through DHCP, it can also receive the IP address of the specific WLAN controller that it should associate with. This allows the LWAP device to establish a connection with the appropriate WLAN controller and join the wireless network.

    Rate this question:

  • 2. 

    Which two of the following DHCP messages are always sent as broadcast? (Choose two.)

    • A.

      DHCPOFFER

    • B.

      DHCPDISCOVER

    • C.

      DHCPREQUEST

    • D.

      DHCPACK

    Correct Answer(s)
    B. DHCPDISCOVER
    C. DHCPREQUEST
    Explanation
    The DHCPDISCOVER and DHCPREQUEST messages are always sent as broadcast. DHCPDISCOVER is sent by a client to discover available DHCP servers on the network, and it needs to be sent as a broadcast so that all DHCP servers can receive it. DHCPREQUEST is sent by the client to request a specific IP address from a DHCP server, and again, it needs to be sent as a broadcast so that all DHCP servers can hear the request and respond accordingly.

    Rate this question:

  • 3. 

    In the address 172.16.55.87 /20, what does the /20 indicate?

    • A.

      The subnet can accommodate 20 hosts per network

    • B.

      /20 is the prefix length: the first 20 bits are the network address; the remaining 12 bits are the host portion

    • C.

      This subnet is the 20th usable range

    • D.

      This IP address is the 20th usable IP in the range

    Correct Answer
    B. /20 is the prefix length: the first 20 bits are the network address; the remaining 12 bits are the host portion
    Explanation
    The /20 in the given address indicates the prefix length, where the first 20 bits are the network address and the remaining 12 bits are the host portion.

    Rate this question:

  • 4. 

    Which two of the following options are potential problems with a large single broadcast domain? (Choose two.)

    • A.

      Large amounts of broadcast traffic consume resources.

    • B.

      All PCs share the same collision domain.

    • C.

      Layer 3 routing overhead is high.

    • D.

      It is difficult to apply security policies because there are no boundaries between devices.

    Correct Answer(s)
    A. Large amounts of broadcast traffic consume resources.
    D. It is difficult to apply security policies because there are no boundaries between devices.
    Explanation
    A large single broadcast domain can lead to potential problems such as consuming excessive network resources due to the high volume of broadcast traffic. This can cause congestion and slow down the network. Additionally, without boundaries between devices, it becomes challenging to apply security policies effectively, leaving the network vulnerable to unauthorized access and potential security breaches.

    Rate this question:

  • 5. 

    How many usable subnets and hosts per subnet are available in the 192.168.1.0 network address with a 255.255.255.240 mask?

    • A.

      2 usable subnets and 126 hosts per subnet

    • B.

      4 usable subnets and 62 hosts per subnet

    • C.

      8 usable subnets and 30 hosts per subnet

    • D.

      16 usable subnets and 14 hosts per subnet

    • E.

      32 usable subnets and 6 hosts per subnet

    Correct Answer
    D. 16 usable subnets and 14 hosts per subnet
    Explanation
    The given network address 192.168.1.0 with a 255.255.255.240 mask allows for 16 usable subnets. This is because the subnet mask 255.255.255.240 has 4 bits borrowed from the host portion, which gives us 2^4 = 16 subnets. Each subnet can have 14 hosts, as the remaining 4 bits in the host portion can represent 2^4 - 2 = 14 hosts per subnet.

    Rate this question:

  • 6. 

    Which one of the following devices operates strictly at the physical layer?

    • A.

      Switches

    • B.

      Hubs

    • C.

      Routers

    • D.

      Bridges

    Correct Answer
    B. Hubs
    Explanation
    Hubs operate strictly at the physical layer. A hub is a networking device that connects multiple devices in a network, allowing them to communicate with each other. It simply receives incoming data packets and broadcasts them to all connected devices without any intelligence or filtering. Hubs do not perform any network routing or make decisions based on IP addresses, making them operate only at the physical layer of the network protocol stack.

    Rate this question:

  • 7. 

    Which one of the following options is the main purpose for using spanning tree protocol?

    • A.

      Layer 2 routing protocol

    • B.

      Layer 2 loop prevention protocol

    • C.

      Layer 2 frame speed double verification protocol

    • D.

      Layer 3 routing protocol

    Correct Answer
    B. Layer 2 loop prevention protocol
    Explanation
    The main purpose of using the spanning tree protocol is to prevent layer 2 loops in a network. Layer 2 loops can occur when there are multiple paths between switches, causing broadcast storms and network congestion. The spanning tree protocol helps to identify and disable redundant paths, ensuring that there is only one active path between switches. This prevents loops and improves network stability and performance.

    Rate this question:

  • 8. 

    Which one of the following statements is true regarding STP?

    • A.

      STP is used to defend against spoofing attacks.

    • B.

      STP is used to maintain the VLAN configuration consistency across the Layer 2 network.

    • C.

      STP is used to prevent loops from being formed when switches or bridges are interconnected via multiple paths across the Layer 2 network.

    • D.

      STP is used to negotiate whether an interconnection between two switches should be put into access or trunk mode.

    • E.

      STP is used to detect the loss of bidirectional communication on a link.

    Correct Answer
    C. STP is used to prevent loops from being formed when switches or bridges are interconnected via multiple paths across the Layer 2 network.
    Explanation
    STP, or Spanning Tree Protocol, is used to prevent loops from forming in a Layer 2 network when switches or bridges are interconnected via multiple paths. By identifying redundant links and blocking certain paths, STP ensures that there is only one active path between any two network devices, thus preventing broadcast storms and network instability caused by loops. This helps to maintain network reliability and efficiency.

    Rate this question:

  • 9. 

    Which two of the following statements are true regarding standalone and lightweight access points? (Choose two.)

    • A.

      Lightweight access points are self-contained, each offering one or more fully functional BSSs.

    • B.

      Standalone access points can be configured one-by-one and offer complete functionality by themselves.

    • C.

      Lightweight access points rely on a central wireless LAN controller to retrieve their configurations.

    • D.

      Lightweight access points are also known as autonomous access points.

    Correct Answer(s)
    B. Standalone access points can be configured one-by-one and offer complete functionality by themselves.
    C. Lightweight access points rely on a central wireless LAN controller to retrieve their configurations.
    Explanation
    Standalone access points can be configured individually and provide full functionality on their own, while lightweight access points require a central wireless LAN controller to obtain their configurations.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 27, 2017
    Quiz Created by
    Paranormalrob
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.