Term
A MAC address is composed of which two parts? |
|
Definition
the organizationally unique identifier and the unique device ID of the NIC. |
|
|
Term
How does a receiving station on a network use the CRC to verify that it received accurate data? |
|
Definition
It uses the same divisor as the sending station to find the same remainder. |
|
|
Term
How many layers does the OSI model contain? |
|
Definition
|
|
Term
NICs send and receive binary data as pulses of all of the following accept? |
|
Definition
|
|
Term
Routers function at what layer of the OSI model? |
|
Definition
|
|
Term
Select one of the functions below that a NIC does NOT perform? |
|
Definition
it routes data data across the most efficient route on the network. |
|
|
Term
What device do you need to split a large network into smaller ones? |
|
Definition
|
|
Term
What is the Network layer unique identifier assigned to each device on a TCP/IP network? |
|
Definition
|
|
Term
Which layer of the OSI model adds source and destination MAC addresses to frames? |
|
Definition
|
|
Term
What layer of the OSI model is the only layer divided into two sublayers? |
|
Definition
|
|
Term
What layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system? |
|
Definition
|
|
Term
Which of the following is a broadcast MAC address? |
|
Definition
|
|
Term
Which of the following is another name for a MAC address? |
|
Definition
|
|
Term
Which of the following statements best describes an IP address? |
|
Definition
It is a unique dotted decimal number assigned to every network node. |
|
|
Term
Which statement best describes what happens to frames when the hub sends them to the NICs on the network? |
|
Definition
The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame. |
|
|
Term
At what layer of the OSI model does network cabling belong? |
|
Definition
|
|
Term
Of the following which is the fastest category of UTP cabling? |
|
Definition
|
|
Term
What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps? |
|
Definition
|
|
Term
What is the most common use of coaxial cable in networking today? |
|
Definition
connecting a cable modem to an Internet Service Provider (ISP) |
|
|
Term
What kind of cable is described as a central conductor wire, surrounded by insulating materials, placed inside a braided metal shield? |
|
Definition
|
|
Term
What type of fiber optic cable uses lasers to send signals? |
|
Definition
|
|
Term
Which connector is used for UTP cabling on a network? |
|
Definition
|
|
Term
What kind of cable does not provide any protection against EMI? |
|
Definition
|
|
Term
What kind of cable works best for long distance transmission? |
|
Definition
|
|
Term
Which kind of cabling would you select when you need to cover distances that span kilometers? |
|
Definition
|
|
Term
Which network topology offers the greatest level of fault tolerance? |
|
Definition
|
|
Term
Which of the following cables does not use copper wires? |
|
Definition
|
|
Term
How many pairs of pins in an RJ-45 connector does a 10BaseT device actually use? |
|
Definition
|
|
Term
How many pins does an RJ-45 connector have? |
|
Definition
|
|
Term
Of the following statements, which is the best comparison of repeaters and bridges? |
|
Definition
Repeaters retransmit all packets, while bridges examine the destination MAC address to determine which packets to forward onto the next segment. |
|
|
Term
What basis do bridges use to determine whether to forward traffic? |
|
Definition
|
|
Term
What does it mean if a NIC runs in promiscuous mode? |
|
Definition
|
|
Term
What events, characteristic to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid? |
|
Definition
|
|
Term
What is the maximum distance between a hub and a node on a 10BaseT network? |
|
Definition
|
|
Term
What is the maximum speed at which 10BaseT Ethernet networks communicate? |
|
Definition
|
|
Term
What is the meaning of the "10" in 10BaseT? |
|
Definition
|
|
Term
What is the purpose of a crimper? |
|
Definition
to connect a RJ-45 connector to the cable |
|
|
Term
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs? |
|
Definition
|
|
Term
Which of the following is true of an Ethernet hub? |
|
Definition
It reads a signal coming in from one port and repeats the signal out to the other ports. |
|
|
Term
Which of the following statements best describe the preamble of an Ethernet frame? |
|
Definition
It includes 64-bits of alternating ones and zeros that ends with 11 to notify the receiving NIC that a frame is starting. |
|
|
Term
Which type of cabling does the 10BaseT standard specify? |
|
Definition
|
|
Term
If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full duplex NICs? |
|
Definition
|
|
Term
What general type of cabling is a tech most likely to use today when installing Ethernet cabling in areas with high electrical interference? |
|
Definition
|
|
Term
What is the maximum cable length for a 1000BaseT network? |
|
Definition
|
|
Term
When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function? |
|
Definition
10 Mbps sending and receiving |
|
|
Term
At what layer of the OSI model does the IP protocol work? |
|
Definition
|
|
Term
How long is a subnet mask? |
|
Definition
|
|
Term
How many binary digits are in an IPv4 address? |
|
Definition
|
|
Term
What command can you use to test the NIC's ability to send and receive packets? |
|
Definition
|
|
Term
What is the de facto protocol suite of the Internet? |
|
Definition
|
|
Term
What is the default subnet mask for a class C network? |
|
Definition
|
|
Term
What is the MAC broadcast address? |
|
Definition
|
|
Term
What is the range of decimal values in each of the four groups of an IPv4 address? |
|
Definition
|
|
Term
Which of the following automatically gives out IP information to computers that request it? |
|
Definition
|
|
Term
Which of the following is a valid IP address for an individual system expressed in dotted-decimal notation? |
|
Definition
|
|
Term
Which of the following is another way of representing the subnet mask 255.255.255.0? |
|
Definition
|
|
Term
Which of the following is not a designated private IP address? |
|
Definition
|
|
Term
An administrator managing many routers should be using this type of tool in order to have an overall view of all the routers? |
|
Definition
Network Management System (NMS) |
|
|
Term
At which layer of the OSI model do routers work? |
|
Definition
|
|
Term
If your company has a signal server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while while allowing access to that server from the Internet? |
|
Definition
|
|
Term
In a NAT router, what is the name for an arbitrary number generated by the sending computer? |
|
Definition
|
|
Term
On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go? |
|
Definition
Destination MAC addresses |
|
|
Term
Some manufacturers, such as Cisco, use this term to refer to either overloaded NAT or port forwarding? |
|
Definition
Port Address Translation (PAT) |
|
|
Term
What is the term used for the passage of a packet through a router? |
|
Definition
|
|
Term
When a NAT router uses this in conjunction with IP addresses, it solves the two problems of security and limited IP addresses? |
|
Definition
|
|
Term
Which type of NAT is the most popular? |
|
Definition
|
|
Term
With this type of NAT, many computers can share a pool of routable IP addresses that number fewer than the computers? |
|
Definition
|
|
Term
A communication between computers that begins with an acknowledgement, followed by a message, and ending with a closing acknowledgement is which type of communication? |
|
Definition
|
|
Term
At what layer of the OSI model does the set of protocols indicated by the TCP part of TCP/IP work? |
|
Definition
|
|
Term
If you cannot receive email, which of the following protocols should you suspect is not working properly? |
|
Definition
|
|
Term
Microsoft Internet Explorer and Mozilla Firefox are examples of this type of TCP/IP application? |
|
Definition
|
|
Term
Which function is being used if a packet is sent to port 80? |
|
Definition
|
|
Term
What is the name for the number used by the operating system to track all running programs? |
|
Definition
|
|
Term
What protocol handles outgoing email? |
|
Definition
|
|
Term
What protocol, replaced in recent years by a more secure protocol, was for many years the primary protocol used to allow a user to log in remotely and execute text-based commands on a remote host? |
|
Definition
|
|
Term
Which protocol does the PING application use? |
|
Definition
|
|
Term
What is the term used to explain what happens when packets are sent out on a network by two devices simultaneously, corrupting both packets? |
|
Definition
|
|
Term
What method of extending a wireless network creates an Extended Service Set? |
|
Definition
|
|
Term
What type of unit is formed by a single WAP servicing a given area? |
|
Definition
|
|
Term
When configuring a WAP, set this to something unique and easily identified, and follow up by giving this same name on all wireless hosts that should connect to this network? |
|
Definition
|
|
Term
When troubleshooting a potential wireless hardware problem, open this Windows utility to see if there is an error or conflict with the wireless adapter |
|
Definition
|
|
Term
Which of the channels defined by the 802.11 standard may be used in the United States? |
|
Definition
|
|
Term
Which of the following is a method for limiting access to your wireless network based on the physical address of wireless NICs? |
|
Definition
|
|
Term
Which of the following is used to describe a portion of available spectrum? |
|
Definition
|
|
Term
Which status term applies to whether your wireless device is connected? |
|
Definition
|
|
Term
Which term applies to how well you wireless device is connecting to other devices? |
|
Definition
|
|
Term
Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), a range of up to about 300 feet, operates in the 2.4 GHz and 5.0 GHz frequencies? |
|
Definition
|
|
Term
Which Wi-Fi standard offers speeds of up to 54 Mbps, a range of up to about 300 feet, operates in the 2.4 GHz frequency, and is downward compatible with an earlier, popular Wi-Fi standard? |
|
Definition
|
|
Term
Network components will fail, and you can sum up the best protection against such failures in one word. Select that word from the following |
|
Definition
|
|
Term
This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual address of internal network hosts. |
|
Definition
|
|
Term
This is a networks first line of defense against external threats. |
|
Definition
|
|
Term
This term describes an unauthorized person who is intentionally to access resources on your network. |
|
Definition
|
|
Term
This term describes any program that sends information about you or your computer over the internet without your consent. |
|
Definition
|
|
Term
This term describes several methods for spreading data across multiple drives. |
|
Definition
|
|
Term
This type of device accept something of the user, such as a fingerprint, retina scan, or voiceprint in place of password. |
|
Definition
|
|
Term
This type of malware replicates through networks. |
|
Definition
|
|
Term
What type of firewall technology allows or denies access to a network according to the MAC address of the computer seeking access? |
|
Definition
|
|
Term
What type of attack uses zombie computers to bring a network down under a massive number of requests? |
|
Definition
|
|
Term
What kind of device can you insert into a PC in lieu of entering a password? |
|
Definition
|
|
Term
Which of the following statements is true about DNS root servers? |
|
Definition
They have the complete definitive name resolution table. |
|
|
Term
What type of server resolves NetBIOS names to IP addresses? |
|
Definition
|
|
Term
Which of the following is not a top level domain name? |
|
Definition
|
|
Term
Which of the following would confirm that you have a DNS problem? |
|
Definition
PING works with the IP address, but not with the FDQN. |
|
|
Term
In the syntax for a domain, what character or characters separates a domain name from its sub domains. |
|
Definition
|
|
Term
Which of the following characters is not permitted in a DNS domain or host name? |
|
Definition
|
|
Term
What is the term for servers just below the DNS root servers? |
|
Definition
|
|
Term
Which of the following is not part of the fully qualified domain name (FQDN)? |
|
Definition
|
|
Term
What is the correct sequence according to the DNS naming convention? |
|
Definition
|
|