Answer one of the following from Section 7.1:
- What is the difference between static and dynamic routing?
- What is convergence?
- What information is contained in a routing table?
- What is the function of a routing table?
- When would you create a static routing table entry?
Answer one of the following from Section 7.2:
- When would you configure both static and dynamic routing on the same router?
- Which type of route is preferred, one with a higher metric or one with a lower metric?
- Why is the hop count sometimes an unreliable metric for choosing the best path to a destination network?
- How does the link state method differ from the distance vector method?
- What is the difference between RIP and RIPv2? Why is this important in today’s networks?
- Which routing protocol is typically used within an ISP? Which protocol is used on the Internet?
- Which routing protocol(s) divide an autonomous system into areas?
- How does IS-IS differ from OSPF?
Answer one of the following from Section 7.3:
- What are two advantages to using NAT?
- What is the difference between static NAT and dynamic NAT?
- What is port forwarding?
- What is the difference between NAT and PAT?
Answer one of the following from Section 7.4:
- What is administrative distance?
- What is the difference between automatic and manual summarization?
- What are the benefits of route summarization?
- What is a first-hop router?
Answer one of the following from Section 8.1:
- How does a packet filtering firewall differ from a circuit-level gateway?
- Why is a packet filtering firewall a stateless device?
- What types of filter criteria can an application layer firewall use for filtering?
- Which security device might you choose to restrict access by user account?
- What is the difference between a proxy and a reverse proxy?
Answer one of the following from Section 8.2:
- Under what conditions would you use an all-in-one security appliance?
- What security functions are included in an all-in-one security appliance?
Answer one of the following from Section 8.3:
- How do firewalls manage incoming or outgoing traffic?
- What is the difference between a standard and an extended ACL?
- What does the deny any statement do?
- What is the difference between a routed firewall and a transparent firewall?
Answer one of the following from Section 10.1:
- Under which circumstances might you choose an ad hoc wireless network?
- What device is used to create an infrastructure wireless network?
- How do wireless networks control media access?
- What is the difference between a BSS and an ESS?
- What do wireless clients use to identify a specific wireless access point?
- How do multiple access points identify themselves as part of the same network?
Answer one of the following from Section 10.2:
- What are the differences between 802.11a and 802.11g specifications?
- Devices that support the 802.11g standards are typically compatible with which other wireless standard?
- How does MIMO differ from channel bonding?
- Why is channel bonding typically not used with the 2.4 GHz range?
- What happens when an 802.11a device connects to an access point that supports both 802.11n and 802.11a? What happens if the access point uses MIMO and supports dual band?
- Which types of devices typically use Bluetooth wireless?
Answer one of the following from Section 10.3:
- What information is contained in the wireless profile?
- What is the strongest encryption method?
- What is the purpose of a beacon?
- How are wireless networks listed in the notification area?
Answer one of the following from Section 10.4:
- What is device density?
- What is the difference between Received Signal Level and Signal to Noise Ratio?
- Which implementation automatically partitions a single broadcast domain into multiple VLANs?
- What information if specified in logical network diagram?
- How do you measure the signal strength at a given distance from the access point?
Answer one of the following from Section 10.5:
- What is the difference between a hub-and-spoke infrastructure and a distributed wireless mesh infrastructure?
- What is a lightweight access point used for?
- Which protocol is used to route frames back and forth between the wireless network and the wired LAN?
- Which enterprise deployment has limited mobility and is difficult to manage?
Answer one of the following from Section 10.6:
- What does open authentication use for authenticating a device? Why is this not a very secure solution?
- What two additional components are required to implement 802.1x authentication?
- What does WEP use for the encryption key? Why does this present a security problem?
- Why should you not use shared key authentication with WEP?
- What is the difference between WPA Personal and WPA Enterprise?
- You have an access point that currently supports only WEP. What would you typically need to do to support WPA2?
- What is the encryption method used with WPA? WPA2?
- Which default values should you always change on your wireless network?
- What can you do to contain RF emanations?