Network topology is the most redundant and the most expensive
What is the most
common central device used today to connect computers to a network?
·
switch
What is the most
common adapter or connector used to connect a computer to a wired network?
·
RJ45
Which of the following
does a switch use for increased performance?
A.simplex
B.half duplex
C.full duplex
D.sliding duplex
C.full duplex
·
A switch switches very fast between multiple connections, which allow multiple
computers to communicate at
the same time. As a result, each client can send and receive at the same time
(full duplex), which gives better
performance.
What do you use to
isolate a group of computers within your organization?
·
VLAN
What do you use to
create VLANs
·
managed switch
What do you use to
create VLANs
·
managed switch
What zone is used to
publish external websites for an organization?
·
A perimeter network
(also known as a demilitarized zone or DMZ) is a small network that is set up
separately from a company's private LAN and the Internet. It is called a
perimeter network because it is usually on the edge of the LAN.
Which network topology
is the most redundant and the most expensive?
·
Mesh
What standard
describes CSMA/CD?
·
802.3
What mechanism do
wireless networks use to access the network?
·
CSMA/CA
What model promises
the most processing power?
·
distributive computing
Which model user a
central database for authentication?
·
client/server
What type of server
does Active Directory run on?
·
network controller
Which model has each
host have their own security database?
·
peer-to-peer
What is used to
uniquely identify a host on a TCP/IP network?
·
IP address
A _________ is a
single computer or device that connects to a TCP/IP network.
·
(Two answers)
·
Host
or
Node
What is the central
device used in wireless LANs?
·
Wireless Access Point
What command do you
use to test the TCP/IP stack on a computer? (3 answers)
·
Ping localhost
Ping 127.0.0.1
Ping loopback
What model is used to
describe how data communication occurs between hosts?
·
OSI reference model
Which layer in the OSI
model do MAC addresses and switches use?
·
Data link, layer 2
Which layer in the OSI
model covers routing between networks?
·
Network layer, layer 3
"Which layer in
the OSI model is used to verify thatdata was delivered without error?"
·
Transport layer, layer
4
Which layer in the OSI
model covers HTTP, FTP, and RDC?
·
Application, layer 1
Which layer of the OSI
model is used to create a connection so that a host can transfer files?
·
Session
Which layer of the OSI
model includes VLANs?
·
Data link, layer 2.
Layer 2 switching can also allow for a virtual LAN(VLAN) to be implemented.
Which protocol do you
use as the transport protocolfor a video application?
·
UDP (User Datagram
Protocol)
Which port categories
include inbound ports of HTTP, HTTPS, FTP, and DNS?
·
well-known ports
What layer in the OSI
model is responsible for logging on and off?
·
Session
The Session layer governs the establishment, termination, and synchronization
of sessions within the OS over
the network and between hosts. When you log on, youare creating a session while
on the network.
What layer in the OSI
model is used to encrypt data?
·
The Presentation layer
covers both compression and encryption.
Which layer in the OSI
model includes the cable andnetwork adapters?
·
Physical, layer 1
How many layers does
the TCP/IP model have?
·
4
Which layer in the OSI
model is included in the TCP/IP model?
·
Transport
In the TCP/IP model, the OSI Physical layer is skipped altogether, and the
Application layer comprises the OSI application, presentation, and session
layers. The Transport layer is the only one from the OSI model that also
appears in the TCP/IP model.
Which protocol is used
to translate IP addresses to MAC addresses?
·
ARP (Address
Resolution Protocol)
What ports are defined
above 49,152?
·
dynamic ports
Dynamic ports, also known as private ports, can be used by applications, but
they cannot be registered by vendors. Dynamic ports are from port 49152 to
65535.
TCP/IP and IPX/SPX are
known as _________ stacks.
·
Protocol (stacks)
What is the advantage
of UDP over TCP?
·
Less Overhead - Faster
Performance
What are the seven
layers found in the OSI model, in order?
·
Physical
Data Link
Network
Transport
Session
Presentation
Application
What is the maximum
speed supported by 802.11b?
·
11 Mbps
What is the most
common network cable used today?
·
Unshielded
twisted-pair (UTP) is the cable most commonly used in local area networks.
If you are making a
crossover cable and one end is 568A, what should the other end be?
·
568B
If you want to connect
a computer directly to another computer without using a switch, you use a
__________.
·
crossover cable
You need to connect a
twisted-pair cable to the back of a patch panel. What tool should you use?
·
punch-down tool
The tools necessary to make the connections between patch panels and RJ45 jacks
include a cutting tool, a wire stripper, a punch-down tool, and a continuity
tester.
What is the minimum
category of twisted-pair cable you need to support 100 Mbps?
·
Category 5
When you pick up your
wireless phone, your computer drops network connectivity. What could be the
cause of
the problem?
·
radio frequency
interference (RFI)
You are setting up a
network within a warehouse using Category 6 UTP. However, parts of the network
are
down because of the heavy machinery used. What cable type should you use?
·
fiber (to avoid emi)
What do you call it
when electrical signals jump toanother set of wires?
·
crosstalk
What type of cable
should be used as part of a firecode for a building?
·
plenum-rated
Which of the following
is not a fiber connector?
·
RJ-45
(Fiber connectors include FC, LC, MT-RJ, SC, and ST. RJ-45 is used for UTP
cables.)
What is a
characteristic of single-mode fiber?
·
Single-mode fiber
supports longer distances than multimode fiber.
What is the maximum
speed supported by 802.11g?
·
54 Mbps
In what ways is
802.11n superior to older WLAN standards?
·
802.11n is superior to
older WLAN standards in the following ways: Multiple-Input Multiple-Output
(MIMO), frame aggregation, and channel bonding.
Which is the most
secure encryption used in wireless networks?
·
WPA2
What is used to
identify a wireless network?
·
SSID: When clients
want to connect to the WAP, they can identify it by the SSID (service set
identifier).
To test a cable, you
would use a _____________.
·
Continuity tester
For organizations,
using ___________ authentication for wireless networks is recommended.
·
802.1x
One way to secure a wireless connection is to use IEEE 802.1X,a port-based
network access control (PNAC).
When a signal degrades
as it runs through a wire, you have ________.
·
Degradation
What mode uses a
wireless access point?
·
Infrastructure Mode
What command do you
use to connect to a FTP server to download a file?
·
ftp
You have a host with
the address of 180.24.45.120. To what class would this be address be assigned?
·
Class B
For IPv4, what class
is used for multicasting?
·
Class D
What type of address
is used to send a single set of packets to multiple hosts?
·
multicast address
What type of address
is 169.254.32.23?
·
APIPA
What defines the
nearest router for a host?
·
default gateway
What server is used to
translate host names to IP addresses?
·
DNS
What is used to remap
private addresses to public addresses and back?
·
NAT
What do you call a
smaller network that is part of a larger network?
·
subnet
You have a subnet mask
of 255.255.240.0. What wouldthe CIDR (Classless Inter-Domain Routing) notation
be?
·
/16
ex. 192.168.0.0/16
What type of address
is 2001:4212:0000:34DB:0000:0000:0000:4231?
·
IPv6 address
A __________ address
is assigned by a DHCP server.
·
Dynamic
What is the loopback
IP address?
·
127.0.0.1
What IPv6 address
incorporates IPv4?
·
Starting ::ffff:
What command displays
the IP address, subnet mask, and default gateway of the system you are
currentlyon?
·
ipconfig
What protocol does the
ping command use to test network connectivity?
·
ICMP
What command do you
use to clear the DNS cache on alocal system?
·
ipocnfig /flushdns
What command do you
use to test a systems IPv4 protocol stack?
·
ping 127.0.0.1
( When pinging 127.0.0.1, no traffic is placed on the network segment.)
What command do you
use to display active TCP or UDP connections?
·
netstat
What command is used
to display NetBIOS over TCP/IPstatistics?
·
nbtstat
What command clears
the NetBIOS name cache table?
·
nbtstat -R
What command tests
network connectivity while showing you each hop along the way?
·
tracert
What command do you
use to display the routing table on a local system?
·
route print
What command do you
use to retrieve or update your DHCP assigned configuration?
·
ipconfig /release
What command do you
use to register the computers name and IP address with the nearest DNS server?
·
ipconfig /registerdns
What command displays
Ethernet statistics?
·
netstat -e
What option do you use
to ping constantly until youstop it?
·
ping -t <host>
What protocol is used
with L2TP to encrypt data?
·
IPSec
After you install DHCP
servers and configure and activate a scope, what is the last step in
installinga DHCP server?
·
Authorize the server
You have a computer
with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you
cannot
connect to your local file servers. What is most likely the problem?
·
It cannot communicate
with a DHCP server.
What name does Windows
Server 2008 R2 use for Terminal Services?
·
Remote Desktop
Services
What port does Remote
Desktop Services use?
·
3389
What would you use to
create VPN tunnels so that users can connect to your internal network while at
home
using Windows Server 2008 R2?
·
Microsoft RRAS
(Routing and Remote Access
Service)
Which component of
IPSec is generates the encryption and authentication keys?
·
Security association
(SA)
Which IPsec component
provides connectionless integrity and data authentication but does not provide
confidentiality?
·
Authentication header
(AH)
What service on a
Windows network is used to translate between NetBIOS names/computer names and
IP
addresses?
·
WINS
What feature within
Windows allows the server to act as a router?
·
IP forwarding
Enabling LAN routing in RRAS turns on the concept known as IP forwarding, but
only if the server has
two or more network adapters.
You use the ________
to connect to a terminal server.
·
Remote Desktop
Connection (RDC)
What provides name
resolution between domain names and IP addresses.
·
DNS
What allows a user to
connect to a corporate network using the Internet?
·
VPN
What command do you
use to release the IP configuration handed out by a DHCP server?
·
ipconfig /release
What command do you
use to reacquire IP configuration from a DHCP server?
·
ipconfig /renew
List the four steps
for a client to get an IP address from a DHCP server in the correct order
·
Discovery
Offering
Request
Acknowledge
What is the primary
disadvantage of X.25?
·
slow speeds (maximum
56K or 64K line)
What routing protocol
is the most popular distance-vector routing algorithm used to determine the
best routes
within a network?
·
RIP
What routing protocol
is the most popular link-state protocol used within a large organization?
·
OSPF
What technology takes
data and breaks them into packets and sends them over a network, sometimes
using
different routes for each packet?
·
packet switching
X.25 and Frame Relay
are examples of what type of WAN technology?
·
packet switching
What device acts as a
high-speed modem for a LAN?
·
CSU/DSU
What does X.25 use as
its DTE device?
·
With X.25, the PAD (or
router) is known as data-terminating equipment (DTE).
What part of the
network is the point where the responsibility of the administrator ends and the
telecommunications providers responsibility begins?
·
PAD interface
When a packet
traverses a network, each router is a_____.
·
hop
When you have multiple
circuits connected to a site, the entire circuit is known as a ___________.
·
virtual circuit
What replaced X.25?
·
Frame Relay is the
advancement of X.25 packet switching. It is a newer form of packet switching
designed for
faster connections.
At what speed does a
T3 line run?
·
44.7 Mbps