Term
Port Mirroring Cisco: SPAN 3Com: RAP |
|
Definition
Physical port; Not on all ports; Cisco: Switched Port Analyse RAP: Roving Analysts Port |
|
|
Term
What tool allows an administrator to determine the MAC address of another computer? |
|
Definition
|
|
Term
RADIUS is the most likely authentication scheme used in _______ |
|
Definition
|
|
Term
DHCP does not affect security on a _______ |
|
Definition
|
|
Term
When debugging a routing problem, the time-to-live (TTL) value can be used to determine the number of router _______ |
|
Definition
|
|
Term
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which method would most likely be implemented on a wireless network? Disable _______ |
|
Definition
|
|
Term
A VPN concentrator is the MOST _____ method to allow users to access a company's _______ network resources |
|
Definition
|
|
Term
A network at a small business utilizes a star topology and is experiencing frequent _______ among data packets. Which device is most likely being used? A _______ |
|
Definition
|
|
Term
A technician temporarily needs an additional network connection in their office to test a new workstation. What is the BEST solution to add a temporary network connection? Install a _______ switch |
|
Definition
|
|
Term
Session affinity is a feature of ______ balancer |
|
Definition
|
|
Term
A user in the accounting department reports that their office is able to connect to the network , but they are unable to connect to the internet. Which of the following documentation would be MOST useful to the administrator in diagnosing this issue? A physical network diagram and ______ schematic |
|
Definition
|
|
Term
Bridge clip to connect both sides of the block = ______ block |
|
Definition
|
|
Term
________ is an interior routing protocol that is used to provide routing within autonomous systems |
|
Definition
|
|
Term
On a network switch, the default native VLAN is ______ |
|
Definition
|
|
Term
LAN technology defined as Fast Ethernet? |
|
Definition
|
|
Term
What ping parameter would set the size of the outgoing packet? |
|
Definition
|
|
Term
WAN technology that modulates 24 channels into a 1.5 Mbps signal? |
|
Definition
|
|
Term
What configuration management documentation types would an administrator use to know how and when to properly install new network devices on the LAN? |
|
Definition
|
|
Term
Traffic shaping is a form of _______ limiting |
|
Definition
|
|
Term
A 66 block is typically used for voice transmissions and has a _______Mbps maximum transfer speed |
|
Definition
|
|
Term
An administrator needs to update a router configuration for a router that does not support ______. What can be used to securely update the router configuration ? KTTPS |
|
Definition
|
|
Term
A new company has been given one public IP address. The company employs 200 users requiring internet access from the headquarter. What can be implemented to provide Internet access for all the employees? |
|
Definition
|
|
Term
A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the internet , but cannot access internal network resources. What is most likely the reason? _______ DNS |
|
Definition
|
|
Term
What layers of the OSI model does the TCP model operate? |
|
Definition
|
|
Term
A workstation is having connectivity issues when being added to the domain. What command would allow the administrator to see DNS and WINS servers that are currently configured for the workstation? |
|
Definition
|
|
Term
What equipment is provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines? |
|
Definition
|
|
Term
RIP is a ______ Distance Routing Protocol |
|
Definition
|
|
Term
An administrator wants to test the network maximum transmission unit (MTU), what command allows different size packets to be sent? |
|
Definition
|
|
Term
A _______ allows a company's single public IP to be shared and translated into local IPs for network devices |
|
Definition
|
|
Term
Two VLANS are separated and now the VLANS cannot communicate with each other. What device does the technician need to enable both VLANS to communicate with each other? |
|
Definition
|
|
Term
What class is the IP address if the IP's first bit is a zero? |
|
Definition
|
|
Term
10GBaseSR is typically used in a _______ environment |
|
Definition
|
|
Term
A ______ would allow a technician using a packet sniffer to view all data on a network |
|
Definition
|
|
Term
FTP transmits passwords in _______ text |
|
Definition
|
|
Term
A wireless access point supports up to 20 clients. What describes this wireless network? |
|
Definition
|
|
Term
Router routes traffic between different networks and a ______ does not |
|
Definition
|
|
Term
An administrator is trying to isolate the location of a persistent conectivity problem caused by a faulty NIC. What diagram would assist the technician in finding the machine that is causing the problem? Physical and _______ network |
|
Definition
|
|
Term
An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configurating the machine first. Which of the following would MOST likely be installed? A _______ server |
|
Definition
|
|
Term
_______ is used on the backbone of a ISDN |
|
Definition
|
|
Term
The purpose of ______ is to classify, mark, and prioritize traffic on WAN and LAN links |
|
Definition
|
|
Term
When testing a CAT5 cable, the technician notices that pin A is open. However, the cable works fine. How is this possible? The cable was tested for ________ |
|
Definition
|
|
Term
RIP and IGRP are unable to advertise ______ networks |
|
Definition
|
|
Term
______ (Network Admission Control) performs posture assessments for unknown devices that connect to the network |
|
Definition
|
|
Term
Which of the following OSI model layers is HTTPS encryption performed? |
|
Definition
|
|
Term
STP network cables require _______ |
|
Definition
|
|
Term
Stateless inspection is ______ able to determine if a packet is related to an established connection |
|
Definition
|
|
Term
A natural disaster has occurred and the admininstrator must return the network to a healthy status. What should the administrator do in this case? Follow the _______ action plan. |
|
Definition
|
|
Term
Several users are sending emails to CompTIA.org but they are not being received. Which command could be used to verify that the company is able to connect to the mail service at CompTIA.org? |
|
Definition
|
|
Term
_______would be used to lock all of the primary communication equipment of a building, including its demarcation point |
|
Definition
|
|
Term
The T568B wiring standard states that CAT5 should be coded as follows White/Orange, Orange, White/Green, _____, White/Blue, Green, White/Brown, Brown |
|
Definition
|
|
Term
What WAN protocol is a circuit switching technology? |
|
Definition
|
|
Term
Link aggregation is also known as ______ distribution |
|
Definition
|
|
Term
A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow this addition? ______ relay |
|
Definition
|
|
Term
An intrusion detection software ______ a server to see which _______ might be in use |
|
Definition
|
|
Term
ADSL was designed to provide the FASTEST data rates over ______ phone lines |
|
Definition
|
|
Term
A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement? |
|
Definition
|
|
Term
A stateless firewall requires a technician to write ______ packet filters. |
|
Definition
|
|
Term
Out of T1, ADSL, SDSL, OC-3 .. ______ offers the HIGHEST data rate |
|
Definition
|
|
Term
The only requirement for a computer to connect to another computer in a intranet is a unique IP address and an appropriate _______ |
|
Definition
|
|
Term
DS0 operates at _______ Kbps |
|
Definition
|
|
Term
BRI ISDN uses ______ B channels and _______ D channel |
|
Definition
|
|
Term
Wireshark can sniff and ________ all network traffic |
|
Definition
|
|
Term
DSL requires ________ filters |
|
Definition
|
|
Term
You should use a cable tester when you have a dead connection and you suspect a _________ cable |
|
Definition
|
|
Term
Early 802.11 wireless networks rat at a maximum of _______ Mbps |
|
Definition
|
|
Term
WPA > WEP offers end to end data packet encryption, user authentication via ________, and encryption key integrity checking |
|
Definition
|
|
Term
A wireless access point or bridge enables you to connect _______ PCs to a _______ network segment |
|
Definition
|
|
Term
A token is a special _______ that must be attached to a _______ in order for the message to enter the network and travel on it |
|
Definition
|
|
Term
10G Networks =10 _______ bits per second |
|
Definition
|
|
Term
A ________ is a device used to _______ packets from one network to another network |
|
Definition
|
|
Term
On a NIC, which section of the MAC address must be unique to the OUI of the vendor that made the card? |
|
Definition
|
|
Term
OSI layer primarily responsible for putting "bits" onto the wire or other network medium = _______ |
|
Definition
|
|
Term
Transparent & Translational = _______ |
|
Definition
|
|
Term
________ is a connectionionless protocol that works at the Network layer of the OSI |
|
Definition
|
|
Term
A smurf attack is generally directed at a "victim" user on a network. The attacker pings the network addresses and ________ the source address of the victim. |
|
Definition
|
|
Term
Telnet is not considered secure because it requires a _______ and the _______ is not transmitted in a secure fashion |
|
Definition
|
|
Term
nbtstat -c = NetBIOS name table for ______ computer |
|
Definition
|
|
Term
nbtstat -a (computer name) = NetBIOS name table for specific ________ computer |
|
Definition
|
|
Term
Challenge Handshake Authentication Protocol (CHAP) is a remote authentication protocol that transfers a _______ of a password instead of the password itself |
|
Definition
|
|
Term
PoE most common in _______ |
|
Definition
|
|
Term
An administrator should _______ the configuration ______ after running a command from the console on a perimeter router |
|
Definition
|
|
Term
A ______ is an intelligent repeater that is aware of _______ of the nodes on either side of the data link |
|
Definition
|
|
Term
|
Definition
Network Intrusion Prevention System |
|
|
Term
______ = EGP routing protocol |
|
Definition
|
|
Term
_______ is used by RADIUS to encrypt messages |
|
Definition
|
|
Term
Cisco invented which protocol? |
|
Definition
|
|
Term
The _______ standard is almost universal for VLAN _______. |
|
Definition
|
|
Term
Trunking is the process of transferring _______ data between _______ or more switches. |
|
Definition
|
|
Term
Content switches = Layer 4-7 but usually Layer ______ |
|
Definition
|
|
Term
Load Balancing = make a bunch of servers look like ______ server |
|
Definition
|
|
Term
One hexadecimal represents 4 bits, so 4 hexadecimal characters make a ______ -bit group |
|
Definition
|
|
Term
In IPv6 no subnet is ever longer than /_____ |
|
Definition
|
|
Term
Network ID + Subnet aka = ________ |
|
Definition
|
|
Term
A _______address is a true internet address, IPv6 needs it to access the internet |
|
Definition
|
|
Term
A 48-bit prefix from ________ router + 16-bit subnet from gateway router + 64-bit unique number = 128-bit IPv6 address |
|
Definition
|
|
Term
Most IPv6 installation should take advantage of IPv6's autoconfiguration and run ________ DHCPv6 servers. |
|
Definition
|
|
Term
|
Definition
|
|
Term
All IPv6 addresses use an _______ nomenclature |
|
Definition
|
|
Term
_______ replaces broadcast in IPv6 |
|
Definition
|
|
Term
________ is the /16 prefix designated by IANA for all 6 to 4 addresses |
|
Definition
|
|
Term
Toredo is built into ________ and ________ |
|
Definition
Windows XP ; Windows Vista |
|
|
Term
The /48 prefix consists of only the first ______ groups of the address |
|
Definition
|
|
Term
________ is not needed in IPv6 because the address space is so large that there is no need to ration routable addresses |
|
Definition
|
|
Term
The _______ is a snapshot of a properly functioning network |
|
Definition
|
|
Term
Formula for a mesh network is n(n-1). n is the number of ________ connected to the mesh |
|
Definition
|
|
Term
RIP, RIPv2, EIGRP and _______ are all Distance Vector routing protocols |
|
Definition
BGP (Border Gateway Protocol) |
|
|
Term
OSPF and ________ are link-state routing protocols |
|
Definition
|
|
Term
The ______ layer in the OSI is responsible for the logical addressing of packets on a network. |
|
Definition
|
|
Term
A _________ cable is completely opposite of each end in regards to wire color |
|
Definition
|
|
Term
Terminal Access Controller Access Control Systems+ (TACACS+) was developed by _______ for centralized control of remote access devices and servers. |
|
Definition
|
|
Term
Two advantages of VLANS include increased security and simplified _______ |
|
Definition
|
|
Term
You should use a ________ cable to connect two switches because they are _______ devices. |
|
Definition
|
|
Term
In a three-pronged firewall design, the domain controller should be located in the ________ zone, which is configured to be the most secure |
|
Definition
|
|
Term
The ping command is the most common tool to check for connectivity and _______ resolution on a network. |
|
Definition
|
|
Term
The nbtstat -R command ________ NetBIOS name cache and then reloads it from the Lmhosts file |
|
Definition
|
|
Term
The Internet Assigned Numbers Authority (IANA) is responsible for assigning IP addresses for systems on a ______ net |
|
Definition
|
|
Term
2 Hard Drives 2 Controllers = ______, ______,_____ |
|
Definition
RAID 0, RAID 1, Disk Duplexing |
|
|
Term
RAID 5 needs _______ hard drives and stripe parity information across all disks in the array. |
|
Definition
|
|
Term
FTP, DHCP, HTTP, DNS are all apart of the _______ suite |
|
Definition
|
|
Term
The MAC address is 6-byte address expressed in six pairs of hexadecimal values. Because its hexadecimal, only the letters ______and ______ can be used. |
|
Definition
|
|
Term
|
Definition
|
|
Term
The service for which a data packet is destined is determined by the _______. |
|
Definition
|
|
Term
The ________ layer of the OSI is responsible for placing the ______ on the network medium |
|
Definition
|
|
Term
NetBIOS uses a ___________ space |
|
Definition
|
|
Term
Two reasons to use WINS server are to reduce overhead from ________ and to enable NetBIOS _________resolution across routers |
|
Definition
|
|
Term
nbtstat _______ command to check current NetBIOS name resolution across routers. |
|
Definition
|
|
Term
The ______ file is checked first when trying to resolve an ______ to IP Address. |
|
Definition
|
|
Term
BRI ISDN uses two 64 Kbps data channels. Combined, BRI ISDN offers a ________ - kbps transfer |
|
Definition
|
|
Term
Route and netstat command can be used to view _________ on Vista |
|
Definition
|
|
Term
Fiber Optic media is resistant to ________. |
|
Definition
|
|
Term
IEEE 802.11 g/b wireless systems communicate with each other using radio frequency. Neighboring channels are ________ Mhz apart. |
|
Definition
|
|
Term
PRI ISDN uses 23 _____ channels to carry data and one D channel to carry signaling. |
|
Definition
|
|
Term
1000BaseSX = _________- mode fiber |
|
Definition
|
|
Term
The bridging method used on Ethernet networks is called _______ because the other network devices are unaware of the existence of the bridge |
|
Definition
|
|
Term
The 100BaseT standard defines an Ethernet network using twisted-pair cable, which would be configured in a physical star config. However, even in a star config, an Ethernet network still uses a _________ bus topology. |
|
Definition
|
|
Term
RARP ( reverse ArP ) protocol maps ________ to Layer 3 addresses on a TCP/IP network |
|
Definition
|
|
Term
Server clustering is a strategy using a grouping of servers to provide _______ tolerance and failover service solutions for a network. |
|
Definition
|
|
Term
100BaseT = 100 Mbps Full Duplex = ______ Mbps |
|
Definition
|
|
Term
Most modern phone systems are ________ so regular analog modems that require analog lines will not work |
|
Definition
|
|
Term
A hardware loopback plug connects the 2 and 6 wires and the _____ and _____ wires to simulate a live connection |
|
Definition
|
|
Term
IPv6 loopback = ::1 or ________ |
|
Definition
|
|
Term
RC$ is a ________ cipher. |
|
Definition
|
|
Term
Nonrepudiation = ________ confident the sender is who the receiver thinks he is. |
|
Definition
|
|
Term
A ______ function is by definition a one-way function. |
|
Definition
|
|
Term
_______ infrastructure must have a root authority |
|
Definition
|
|
Term
Mandatory Access Control must use a label to define _______. |
|
Definition
|
|
Term
RADIUS uses UDP port _______ and 1813. |
|
Definition
|
|
Term
Kerberos authentication standard is highly ________ and all tickets are _________. |
|
Definition
Time Sensitive ; Time-stamped |
|
|
Term
DS0 signal rate = ______ bits |
|
Definition
|
|
Term
Which of the following DNS records is an IPv4 address record? |
|
Definition
|
|
Term
Which of the following DNS records is an IPv6 address record? |
|
Definition
|
|
Term
Which access control model assigns permissions based on job function? |
|
Definition
Role-based access control (RBAC) |
|
|
Term
WEP uses the _____ to provide encryption |
|
Definition
|
|
Term
Which kind of security scanner will block security attacks on a host device? |
|
Definition
Host-based Intrusion Prevention |
|
|
Term
Asychronous Transfer Mode (ATM) encodes _____ into _______. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Which IEEE standard specifies security mechanisms for wireless networks? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Routing Table command = _________ |
|
Definition
|
|
Term
Ping -t = _______ = continuos ping |
|
Definition
|
|
Term
Ping -l = setting size of ______ packet |
|
Definition
|
|
Term
Rogue Wireless Access Point = ______ |
|
Definition
|
|
Term
Coaxial, twinaxial, twisted pair, fiberoptic cabling can be used in ________ networks |
|
Definition
|
|
Term
Rack mounted unit height = ________ |
|
Definition
|
|
Term
IP address and _______ must be different or else the system cannot access remote networks. |
|
Definition
|
|
Term
After you have fixed a problem, you should ______ it to fully ensure that the network is operating completely |
|
Definition
|
|
Term
Both ______ and _______ backup methods clear the archive bit. |
|
Definition
|
|
Term
To ping local loopback address typing 127.0.0.1 or ______ works the same |
|
Definition
|
|
Term
_______ IPv6 is equivalent to IPv4 APIPA 169.254.0.0 |
|
Definition
|
|
Term
_______ address type sends data to _____ systems on a subnet or network instead of a single host. |
|
Definition
|
|
Term
_______ is a distance-vector routing protocol. |
|
Definition
|
|
Term
Overloaded Network Address Translation = _______ |
|
Definition
|
|
Term
OSPF bases routes on speed and sends only route changes to _______ traffic. |
|
Definition
|
|
Term
|
Definition
|
|
Term
Tracert is useful for _________ information about the routers between you and the destination address. |
|
Definition
|
|
Term
Yost cable = _______ > RJ-45 |
|
Definition
|
|
Term
RDP is used in ________ networking, where only screen, keyboard and mouse input is sent across the line |
|
Definition
|
|
Term
PPP is a protocol that can be used for ______ connections over ________ links. |
|
Definition
|
|
Term
IPSec is not an ________ protocol. |
|
Definition
|
|
Term
By installing a ________ server, you can move the workload associated with authentication to a dedicated server |
|
Definition
|
|
Term
Kerberos = Security Tokens = ______ |
|
Definition
|
|
Term
Kerberos allows secure authentication over an _______ network such as the internet |
|
Definition
|
|
Term
What feature can be enable in a switch to facilitate protocol analysis? |
|
Definition
|
|
Term
Which protocol is used to manage bridged topologies? |
|
Definition
|
|
Term
You can use a ________ tool when working with an IDC. |
|
Definition
|
|
Term
Cables that go through _______ and _______ should be STP. |
|
Definition
|
|
Term
Whats the name of a device that connects multiple customer DSLs to a high-speed internet backbone line? |
|
Definition
|
|
Term
Smurf attack is an example of a DDoS attack aka _________ |
|
Definition
Distributed Denial of Service |
|
|
Term
Fake login screen aka _______ |
|
Definition
|
|
Term
IGMP Internet Group Management Protocol is used for establishing multicast group memberships and is used in _______ networks. |
|
Definition
|
|
Term
MAC Address = 48 bits = aka ________ |
|
Definition
|
|
Term
Modes that force a switch to act like a hub? |
|
Definition
Learning and fault tolerant |
|
|
Term
|
Definition
|
|
Term
UDP port 67 = ______& ______ |
|
Definition
|
|
Term
Static VLAN = ______ based on ______ |
|
Definition
|
|
Term
Dynamic VLAN = _______ based on ________ |
|
Definition
|
|
Term
Modems = Analog > ________ |
|
Definition
|
|
Term
Any device that filters and forwards traffic based on MAC addresses is by definition a _______. |
|
Definition
|
|
Term
An AP has a limited distance that it can send data transmissions. When a client system moves out of range, it can't access the ________. |
|
Definition
|
|
Term
802.11x is an IEEE standard specifying ________ network access control |
|
Definition
|
|
Term
MIMO is used by the 802.11n standard and takes advantage of Multiplexing to increase range and speed of wireless networking. Multiplexing is a technique that combines the transmition of multiple data streams over a _______ or medium. |
|
Definition
|
|
Term
The system or node requesting access and ________ to network resource best describes the role of the supplicant in a 802.1x security framework |
|
Definition
|
|
Term
10BaseT and 100BaseT use ______ wire pairs |
|
Definition
|
|
Term
IEEE 802.3ab = 1000BaseT = _______ |
|
Definition
|
|
Term
1000BaseSX uses the ______ connector exclusively |
|
Definition
|
|
Term
1000BaseLX = 5km = _______ meters |
|
Definition
|
|
Term
1000BaseT use _____ pairs of wire |
|
Definition
|
|
Term
There is no standard connector for 10-GBE _____ |
|
Definition
|
|
Term
10GBaseT on CAT6 = ________ |
|
Definition
|
|
Term
10GBaseT on CAT6a = _________ |
|
Definition
|
|
Term
The archive bit is _______ after a full backup and incremental backup |
|
Definition
|
|
Term
Incremental backups save all files and directories that have changed since the last full or incremental backup. To restore, you need the latest full backup and all incremental _______. |
|
Definition
|
|
Term
RAID 5 uses distributed parity. The parity info is spread across all disks and requires the equivalent space of a single hard disk. This example has 5 15Gb disks, giving a total of 75GB of storage. 15GB is required for the parity info, leaving 60 Gb for saving actual _______. |
|
Definition
|
|
Term
A cold site often requires the delivery of computer equipment and other _________. |
|
Definition
|
|
Term
Raid 0 = Highest level of performance but _____ fault tolerance |
|
Definition
|
|
Term
Dig & Nslookup can perform manual lookups of DNS lookups on a _______ system |
|
Definition
|
|
Term
arp -s IP Address Mac Address command would add a static entry to ArP ________ |
|
Definition
|
|
Term
Bonding or link aggregation, is the process of using multiple NIC connection, thus increasing ________ |
|
Definition
|
|
Term
A tone generator and tone probe work together to enable you to pick a single cable out of a stack of _______ |
|
Definition
|
|
Term
Rack-mounted equipment uses a height measurement known simply as a ______. |
|
Definition
|
|
Term
A subnet is all ones followed by ________. |
|
Definition
|
|
Term
What is the max # of hosts in a /19 subnet? |
|
Definition
|
|
Term
Which MAC address begins a frame? |
|
Definition
|
|
Term
A frame ends with a special bit called Cyclic Redundency Check (CRC) What does CRC do? It verifies that the ___________ are _________ |
|
Definition
|
|
Term
OSI seventh - layer controls the assembly and disassembly of data |
|
Definition
|
|
Term
Which layer of the OSI keeps track of a system's connections to send the right response to the right computer? |
|
Definition
|
|
Term
VLANS can be created by using protocol assignments, by defining the parts on a device as belonging to a ________or by using __________. |
|
Definition
|
|
Term
On a star network, new devices can be added to a network by attaching the new device to the hub with its own _______. This process does not _______ users who are currently on the network |
|
Definition
|
|
Term
Three things are needed for VPN: A ________, A VPN _________, and a VPN _________. |
|
Definition
|
|
Term
A wired Mesh offers the greatest degree of redundancy but has highest implementation ________. |
|
Definition
|
|
Term
To create the complete ring the ring-ing (RI) port on each MSAU is connected to the ring-out (R)) port on another MSAU. The last MSAU in the ring is then connected to the ________ ring. |
|
Definition
|
|
Term
1000BaseCX = CAT5 UTP cable STP ______ m Max |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
EMI is a type of interference that is often seen when cables run to close to ______________devices. |
|
Definition
|
|
Term
|
Definition
|
|
Term
A wireless AP at the data link layer = Layer _____ |
|
Definition
|
|
Term
The transport layer is responsible for establishing a connection between ___________ devices. |
|
Definition
|
|
Term
Class B addy fall into the ________ to ________ range. |
|
Definition
|
|
Term
When a Windows XP Pro system that is configured to obtain an IP address via DHCP fails to obtain an address, it uses _________ to assign itself an address from 169.254.x.x range |
|
Definition
|
|
Term
Private address defined in RFC 1918: 10.x.x.x, 172.16.xx to 172.31.x.x, ____________ |
|
Definition
|
|
Term
When virtual-circuit switching is used, a logical connection is established between the source and the ___________ device |
|
Definition
|
|
Term
The D channel on a ISDN carries the signaling info, whereas the ____ channel carries the data. |
|
Definition
|
|
Term
All Ethernet frames begin with a ________. |
|
Definition
|
|
Term
10BaseT hub can connect no more then _______ nodes |
|
Definition
|
|
Term
The spanning tree protocol is unique to __________. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
RADIUS UDP port = _______ |
|
Definition
|
|