Term
|
Definition
To increase security, you decide to use your firewall to block the Telnet protocol. Which port will you need to block to prevent Telnet from being used? |
|
|
Term
|
Definition
When SSL and HTTP are used together, what does the beginning of a site address become? |
|
|
Term
|
Definition
Which troubleshooting tool can be used at the command line to see the IP configuration data given by a DHCP server to a Windows XP workstation? |
|
|
Term
|
Definition
You are administering a system that has been locked down for security reasons. You notice that among all the other ports, port 443 and port 80 have been disabled. What services are associated with these ports? |
|
|
Term
|
Definition
Which protocol can be used by a client to access e-mail on a server? |
|
|
Term
|
Definition
Which tool can be used to test connectivity and see the path taken to reach another host? |
|
|
Term
|
Definition
What is a command line utility that enables you to verify entries on a DNS server? |
|
|
Term
|
Definition
Which of the following technologies is limited to 10 meters?
802.11
802.1x
Bluetooth
UTP |
|
|
Term
|
Definition
Which elements are required to communicate on a TCP/IP network? (Choose all that apply)
IP Address
Subnet Mask
Default Gateway
DNS server |
|
|
Term
|
Definition
What is the lowest grade of cable required to run 1000BaseT? |
|
|
Term
|
Definition
You are installing a network and will use wired connections You have a distance of 80 meters between nodes in some cases. What is the maximum distance you can run UTP cable? |
|
|
Term
|
Definition
You need to recommend a wireless cellular service to a client who travels globally. Which type of service should you recommend?
WiFi
Bluetooth
GSM
CDMA |
|
|
Term
|
Definition
Which of the following 802.11x standards provides data transmission speeds up to 54Mbps?
802.11a
802.11b
802.11g
802.11i |
|
|
Term
ACL (Access Control Lists) |
|
Definition
Firewalls use a set of rules to make determinations on which traffic to block. What are those rules called? |
|
|
Term
|
Definition
Which of the following addresses is a nonroutable IP address?
172.18.32.1
192.169.32.1
168.192.32.1
18.172.32.1 |
|
|
Term
|
Definition
APIPA addresses are in which address range? |
|
|
Term
|
Definition
Which utility is used to view the inbound and outbound TCP/IP connections on your machine? |
|
|
Term
|
Definition
Which command is used to determine if another computer is reachable via TCP/IP? |
|
|
Term
|
Definition
Which of the following acronyms describes the "name" of a wireless network? What is the name of a wireless network called?
WEP
WPA
SSID
MAC |
|
|
Term
Enable MAC filtering
Change the SSID from the default
Use WPA |
|
Definition
Which of the following are examples of ways you can increase the security of your wireless network?
Enable MAC filtering
Enable SSID broadcasts
Change the SSID fromt he default
Use WPA |
|
|
Term
PSTN (Public Switched Telephone Network) |
|
Definition
Telephone company technicians usually call the phone line that goes into your house a POTS (plain old telephone service) line. What is the proper, more formal acronym? |
|
|
Term
|
Definition
The maximum download speed for Dial-up is around 56Kbps. What is the upload speed? |
|
|
Term
|
Definition
A special program that initiates the connection with the ISP by accessing the phone line, dialing the ISP's access number is called what? |
|
|
Term
|
Definition
Most versions of Windows have a built in dialer known as what? |
|
|
Term
DSL (Digital Subscriber Line) |
|
Definition
One of the first methods of broadband Internet to become popular was a technology called what? |
|
|
Term
|
Definition
The correct term for the device used to access DSL is called a what? |
|
|
Term
|
Definition
______ endpoints go inside a computer as an expansion card, but that means that only that computer can access the Internet directly. |
|
|
Term
|
Definition
_______ endpoints can be hooked to a switch, router, or wireless router, which can share the Internet connection with multiple computers. |
|
|
Term
|
Definition
What is used so that when you are on the phone, you don't hear any static from the DSL connection? |
|
|
Term
|
Definition
Many phone providers will provide you DSL without a landline. What is this called? |
|
|
Term
DOCSIS (Data Over Cable Service Internet Specification) |
|
Definition
Cable Internet provides broadband Internet access via the television cable that runs to your home via a specification known as what? |
|
|
Term
Instead of analog signals, it carries digital signals. |
|
Definition
What makes ISDN (Intergrated Service Digital Network) different from a regular POTS line is how it uses the copper wiring. How is it used? |
|
|
Term
Bearer (B channel) , Signal (D channel) |
|
Definition
An ISDN line has 2 types of channels. What are they? |
|
|
Term
|
Definition
BRI (basic rate interface) is also known as what? |
|
|
Term
|
Definition
PRI (Primary rate interface) is also known as what? |
|
|
Term
Bonding, or Inverse Multiplexing |
|
Definition
When the B channels are combined to maximize data throughput (which is common), the process is called what? |
|
|
Term
Propagation delay, or, latency |
|
Definition
This occurs because of the length of time required to transmit the data and receive a response via satellite. |
|
|
Term
|
Definition
______ is not designed to be a WLAN, but rather a wireless personal area network (WPAN). |
|
|
Term
GSM (Global System for Mobile Communications)
CDMA (Code Division Multiple Access) |
|
Definition
What are the 2 main standards for cellular communications? |
|
|
Term
|
Definition
_______ breaks up telephone conversations into data packets that are then sent over a TCP/IP network (such as the internet). |
|
|
Term
wireless access point (WAP) or wireless router |
|
Definition
Wireless networks use either a _______ or a _______ to provide central connectivity. |
|
|
Term
|
Definition
When you are using windows to connect to a wireless network, all available wireless networks will be listed by their what? |
|
|
Term
|
Definition
What is the default internal address of the Linksys WRT54G wireless router? |
|
|
Term
|
Definition
When someone drives through your neighborhood looking for a wireless signal, this is called what? |
|
|
Term
|
Definition
If security is enabled, and you are using _____, the client will be required to know the passphrase as well as the key to connect to the wiresless router. |
|
|
Term
RADIUS ( Remote Authentication Dial-In User Service ) |
|
Definition
_______ is a service that provides centralized authentication on a network. |
|
|
Term
|
Definition
A hardware or software solution that serves as your network's security guard. |
|
|
Term
Internet, or public side
Internal network, or private side |
|
Definition
Most firewalls will have at least two network connections. What are they? |
|
|
Term
|
Definition
What companies use to protect their private network from public networks is called? |
|
|
Term
|
Definition
This is implemented on a single machine so it only protects that one machine. |
|
|
Term
|
Definition
The default configuration of a firewall is generally _____, which means that all traffic is blocked unless specifically authorized by the administrator. |
|
|
Term
|
Definition
All traffic is allowed through the firewall unless the administrator denies it. This is called what? |
|
|
Term
|
Definition
Packets that meet the criteria in the ACL are passed through the firewall to their destination. This is known as what? |
|
|
Term
|
Definition
It allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port. |
|
|
Term
|
Definition
Each computer or device that wants to participate on a TCP/IP network needs a unique _______ on that network. |
|
|
Term
|
Definition
This defines the network address for the computer. |
|
|
Term
|
Definition
The door out of your local network and onto another network, say the Internet, is called what? |
|
|
Term
|
Definition
When you use a DHCP server to provide clients with an IP address, subnet mask, default gateway, and DNS server, this is referred to as what? |
|
|
Term
|
Definition
If you manually set up a clients IP address, subnet mask, default gateway, and DNS server, this is referred to as what? |
|
|
Term
zero configuration networking, or auto-configuration |
|
Definition
APIPA is sometimes known as what? |
|
|
Term
NAT (Network Address Translation) |
|
Definition
The process of translating private, nonroutable IP addresses into public IP addresses. |
|
|
Term
|
Definition
The IP address of 127.0.0.1 is reserved as the _______. Its used to test basic TCP/IP functionality for your network card. |
|
|
Term
ICMP echo requests/replies |
|
Definition
Pings are also called _______ , as they use the ICMP protocol. |
|
|
Term
|
Definition
Besides being able to check out the inbound and outbound TCP/IP connections, it can also be used to view packet statistics, such as how many packets have been sent and received and the number of errors. |
|
|