| Term 
 
        | What type of attack involves a flooding of SYN packets to open TCP sessions to a server? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is used to identify a wireless network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Ping and Traceroute operate at what layer of the OSI model? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In OSPF, what is the cost of a T1? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the maximum hop count for EIGRP? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of cable would you use between a router and a switch? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | CHAP can be described as what type of authentication? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of cable should you use between two switches? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Routing occurs at what level of the TCP/IP model? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Where is the feasible successor route stored in EIGRP? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of cable would you plug into a T1 interface with a built-in CSU/DSU? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is used to identify traffic from different VLANs? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In spanning-tree, how long does it take a port to go from the blocking state to the forwarding state? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What device would you use to create more collision domains on your network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What command shows you the current IOS that is in use on a router? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | On what type of device would you typically configure the clock rate? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | CDP is found at what layer of the OSI model? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What command shows you if a router is acting as the designated router for one of its interfaces? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What command will display IP to MAC address mappings on a Windows PC? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the maximum hop count for OSPF? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of technology would you use to prevent unauthorized hosts from accessing the LAN? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What command would you use to display an administrative message when a person connects to a router? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What command woul dyou use to see if clocking is stopped on an interface? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | At what layer of the OSI model would you find windowing and sequence numbers? |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | an unauthorized AP that is installed to facilitate the capture of information |  | 
        |  | 
        
        | Term 
 
        | What frequency bands is used by 802.11a? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | You have a single network connected to your ISP. What type of routing would allow the internal clients to reach the Internet? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In EIGRP, where would you find the feasible successor route? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | When is a packet processed by an inbound access list? |  | Definition 
 
        | befor it is sent ot an outbound interface |  | 
        |  |