Term
|
Definition
A ____ facilitates communication and resource sharing between other computers on the network. |
|
|
Term
|
Definition
Which network model ensures that no computer on the network has more authority than another? |
|
|
Term
|
Definition
Which network topology is the most common? |
|
|
Term
|
Definition
____ are the distinct units of data that are exchanged between nodes on a network. |
|
|
Term
|
Definition
A ____ network connects clients and servers from multiple buildings. |
|
|
Term
|
Definition
____ services allow remote users to connect to the network. |
|
|
Term
|
Definition
____ provide a Web-based client for checking e-mail. |
|
|
Term
|
Definition
Which type of service supports e-mail? |
|
|
Term
|
Definition
Often, separate LANs are interconnected and rely on several ____ running many different applications and managing resources other than data. |
|
|
Term
|
Definition
Which Data Link sublayer manages access to the physical medium? |
|
|
Term
|
Definition
Which Data Link sublayer manages flow control? |
|
|
Term
|
Definition
____ is the process of reconstructing segmented data. |
|
|
Term
|
Definition
In which OSI model layer does IP operate? |
|
|
Term
|
Definition
In which OSI model layer do hubs operate? |
|
|
Term
|
Definition
Which IEEE standard describes specifications for wireless transmissions? |
|
|
Term
|
Definition
Standards define the ____ performance of a product or service. |
|
|
Term
|
Definition
Transport layer protocols break large data units into ____. |
|
|
Term
|
Definition
The ____ is a fixed number associated with a device’s NIC. |
|
|
Term
|
Definition
Which IEEE standard describes Ethernet? |
|
|
Term
|
Definition
Which term describes the hardware that makes up the enterprise-wide cabling system? |
|
|
Term
|
Definition
____ describes wiring that connects workstations to the closest telecommunications closet. |
|
|
Term
EIA/TIA RS-232 (Recommended Standard 232) |
|
Definition
____ describes a popular serial data transmission method. |
|
|
Term
|
Definition
The data transmission characteristic most frequently discussed and analyzed by networking professionals is ____. |
|
|
Term
telecommunications closet |
|
Definition
Which term identifies a room containing connectivity for groups of workstations in its area? |
|
|
Term
|
Definition
The most significant factor in choosing a transmission method is its ____. |
|
|
Term
|
Definition
Many network problems can be traced to poor cable ____ techniques. |
|
|
Term
|
Definition
The more twists per foot in a pair of wires, the more resistant the pair will be to ____. |
|
|
Term
|
Definition
In modulation, a simple wave called a ____ wave, is combined with another analog signal to produce a unique signal that gets transmitted from one node to another. |
|
|
Term
|
Definition
Which connector is used in RS-232 transmissions? |
|
|
Term
all devices on your network segment |
|
Definition
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address. To what device(s) are you transmitting? |
|
|
Term
video transmission over the Web |
|
Definition
Which of the following applications would be best suited to using UDP? |
|
|
Term
a broadcast to all the nodes on its segment |
|
Definition
What method of transmission does a workstation use to send an ARP request? |
|
|
Term
the lease duration for client computers |
|
Definition
You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and note-taking. Clients need access to the Internet, so you have configured your network’s DHCP server to issue them IP addresses automatically. What DHCP option should you modify to make sure you are not wasting addresses that were used by clients who’ve completed a class and no longer need them? |
|
|
Term
Students and professors will be unable to Telnet to the server or FTP files to or from the server. |
|
Definition
You manage a server that allows university students to use Telnet to make a connection, then use FTP to upload their homework. Professors also pick up students’ homework by telnetting to the computer and using FTP. You have decided to change the FTP port number on the server from its default number to 23, for better security. Assuming students and professors make no changes to their default workstation configurations, what will be the result of this change? |
|
|
Term
All devices that are reachable |
|
Definition
Suppose you send data to an address that begins with the Format Prefix FF0E on a net- work running IPv6. To what device(s) are you transmitting? |
|
|
Term
It is discarded by the connectivity device. |
|
Definition
What happens to an IP datagram when its TTL reaches 1? |
|
|
Term
|
Definition
What devices are the highest authorities in the domain name system hierarchy? |
|
|
Term
to obtain the MAC address of a host, and then map that MAC address to the host’s IP address |
|
Definition
What is the function of ARP? |
|
|
Term
BOOTP relies on a static table to associate IP addresses with MAC addresses, whereas DHCP does not. |
|
Definition
What is the main difference between BOOTP and DHCP? |
|
|
Term
|
Definition
Collectively, MPLS labels are sometimes called a ____. |
|
|
Term
|
Definition
A ____ is simply a linked series of devices. |
|
|
Term
|
Definition
The most common 1-Gigabit Ethernet standard in use today is ____. |
|
|
Term
|
Definition
Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin. |
|
|
Term
|
Definition
In packet switching, when packets reach their destination node, the node ____ them based on their control information. |
|
|
Term
|
Definition
The 10-gigabit fiber optic standard with the shortest segment length is ____. |
|
|
Term
|
Definition
In the 10GBase-LR standard, the L stands for ____. |
|
|
Term
|
Definition
1000Base-SX has a maximum throughput of ____. |
|
|
Term
|
Definition
A complex combination of pure topologies is known as a ____ topology. |
|
|
Term
|
Definition
The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium. |
|
|
Term
|
Definition
The primary difference between the two USB standards is ____. |
|
|
Term
|
Definition
The primary difference between the two USB standards is ____. |
|
|
Term
|
Definition
The primary difference between the two USB standards is ____. |
|
|
Term
|
Definition
Switches can create ____ by grouping a number of ports into a broadcast domain. |
|
|
Term
|
Definition
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks. |
|
|
Term
|
Definition
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes. |
|
|
Term
|
Definition
A ____ is a multiport connectivity device that directs data between nodes on a network. |
|
|
Term
|
Definition
PCIe slots vary depending on the number of ____ they support. |
|
|
Term
|
Definition
Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches. |
|
|
Term
|
Definition
Nearly all NICs contain a(n) ____, the device that transmits and receives data signals. |
|
|
Term
|
Definition
The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU. |
|
|
Term
|
Definition
____ is a type of microchip that requires very little energy to operate. |
|
|
Term
|
Definition
What part of a SONET network allows it to be “self-healing”? |
|
|
Term
any type of Internet connection |
|
Definition
A VPN is designed to connect 15 film animators and programmers from around the state of California. At the core of the VPN is a router connected to a high-performance server used for storing the animation files. The server and router are housed in an ISP’s data center. The ISP provides two different T3 connections to the Internet backbone. What type of connection must each of the animators and programmers have to access the VPN? |
|
|
Term
|
Definition
Which of the following elements of the PSTN is most likely capable of transmitting only analog signals? |
|
|
Term
In a remote switching facility |
|
Definition
Where on the PSTN would you most likely find a DSLAM? |
|
|
Term
|
Definition
Which of the following WAN technologies operates at Layer 3 of the OSI model? |
|
|
Term
|
Definition
What technique enables DSL to achieve high throughput over PSTN lines? |
|
|
Term
|
Definition
On an ISDN connection, what device separates the voice signal from the data signals at the customer premises? |
|
|
Term
the distance from the customer to the carrier’s switching facility |
|
Definition
Which of the following may limit a DSL connection’s capacity? |
|
|
Term
time division multiplexing |
|
Definition
What technique does T1 technology use to transmit multiple signals over a single telephone line? |
|
|
Term
|
Definition
In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range. |
|
|
Term
|
Definition
____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel. |
|
|
Term
|
Definition
Dial return satellite Internet access is a(n) ____ technology. |
|
|
Term
|
Definition
If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit. |
|
|
Term
|
Definition
If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit. |
|
|
Term
|
Definition
A unique characteristic of the 802.11 data frame is its ____ field. |
|
|
Term
|
Definition
A directional antenna issues wireless signals along a(n) ____ direction. |
|
|
Term
|
Definition
In ____, a wireless signal splits into secondary waves when it encounters an obstruction. |
|
|
Term
|
Definition
____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves. |
|
|
Term
|
Definition
____ is one of the most important functions an NOS provides. |
|
|
Term
|
Definition
Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions. |
|
|
Term
|
Definition
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on. |
|
|
Term
|
Definition
A piece of software called ____ translates requests and responses between a client and a server. |
|
|
Term
|
Definition
A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____. |
|
|
Term
|
Definition
Solaris employs the file system called ____ for its native file system type. |
|
|
Term
|
Definition
A(n) ____ is a self-contained, well-defined task within a process. |
|
|
Term
|
Definition
The printer queue is a ____ representation of the printer’s input and output. |
|
|
Term
|
Definition
A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal. |
|
|
Term
|
Definition
The directory containing information about objects in a domain resides on computers called ____ controllers. |
|
|
Term
|
Definition
Convert the following subnet mask into its dotted-decimal equivalent: 11111111 11111111 11111000 00000000. |
|
|
Term
|
Definition
A node on a network has an IP address of 140.133.28.72 and its subnet mask is 255.248.0.0. What type of subnetting has been used on this network? |
|
|
Term
|
Definition
If you worked on an older network that could not interpret classless addressing, and your network ID was 145.27.0.0, what is the theoretical maximum number of different subnets you could create on this network? |
|
|
Term
|
Definition
You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this? |
|
|
Term
|
Definition
Your workstation's IP address is 10.35.88.12 and your supervisor's workstation's IP address is 10.35.91.4. When you send data from your workstation to your supervisor's workstation, what is the most likely IP address of the first default gateway that will accept and interpret your transmission? |
|
|
Term
140.128.0.0 (or 10001100 10000000 00000000 0000000) |
|
Definition
On a network with an IP address of 140.133.28.72 (or 10001100 10000101 00011100 01001000) and a subnet mask of 255.248.0.0 (or 11111111 11111000 00000000 00000000), what is the network ID? |
|
|
Term
|
Definition
You have decided to use PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP in order for all five clients in your office to be able to access servers on the Internet? |
|
|
Term
|
Definition
If you subdivide your Class B network into 254 subnets, what is the maximum number of hosts you can assign to any single subnet? |
|
|
Term
|
Definition
What is the default subnet mask for a Class A network? |
|
|
Term
|
Definition
If you know that your colleague's TCP/IP host name is JSMITH, and you need to find out his IP address, which of the following commands should you type at your shell prompt or command prompt? |
|
|
Term
|
Definition
Many network engineers consider ____ to be superior to MGCP. |
|
|
Term
|
Definition
A computer programmed to act like an IP telephone is known as a(n) ____. |
|
|
Term
|
Definition
Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____. |
|
|
Term
|
Definition
A(n) ____ is a computer that manages multiple media gateways. |
|
|
Term
|
Definition
____ describes the use of any network to carry voice signals using the TCP/IP protocol. |
|
|
Term
|
Definition
In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals. |
|
|
Term
|
Definition
Among all video-over-IP applications, ____ is perhaps the simplest. |
|
|
Term
call signaling and control |
|
Definition
SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers. |
|
|
Term
|
Definition
____ is the use of one network to simultaneously carry voice, video, and data communications. |
|
|
Term
|
Definition
In ____ , a hacker forges name server records to falsify his host’s identity. |
|
|
Term
|
Definition
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission. |
|
|
Term
|
Definition
A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key. |
|
|
Term
|
Definition
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted. |
|
|
Term
|
Definition
In a ____ attack, a person redirects or captures secure transmissions as they occur. |
|
|
Term
authentication, authorization, and accounting |
|
Definition
RADIUS and TACACS belong to a category of protocols known as AAA (____). |
|
|
Term
|
Definition
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections. |
|
|
Term
|
Definition
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions. |
|
|
Term
|
Definition
____ is a method of encrypting TCP/IP transmissions. |
|
|
Term
|
Definition
____ is the telltale factor for ascertaining where faults in a cable lie. |
|
|
Term
|
Definition
The danger in using a ____ is that it could collect more information than you or the machine can reasonably process. |
|
|
Term
|
Definition
____ are often considered third-level support. |
|
|
Term
|
Definition
____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality. |
|
|
Term
|
Definition
To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode. |
|
|
Term
|
Definition
A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network. |
|
|
Term
|
Definition
____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire. |
|
|
Term
|
Definition
A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages. |
|
|
Term
|
Definition
A ____ usually results from a bad NIC. |
|
|
Term
|
Definition
____ packets exceed the medium’s maximum packet size. |
|
|
Term
|
Definition
In ____, parity error checking occurs when data is written across the disk array. |
|
|
Term
|
Definition
A program that disguises itself as something useful but actually harms your system is called a ____. |
|
|
Term
|
Definition
A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. |
|
|
Term
|
Definition
____ provides redundancy through a process called disk mirroring. |
|
|
Term
|
Definition
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived. |
|
|
Term
|
Definition
____ scanning techniques attempt to identify malware by discovering “malware-like” behavior. |
|
|
Term
|
Definition
____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network. |
|
|
Term
|
Definition
Mesh topologies and ____ topologies are good choices for highly available enterprise networks. |
|
|
Term
|
Definition
A(n) ____ virus changes its characteristics every time it is transferred to a new system. |
|
|
Term
|
Definition
A networked ____ is perhaps the simplest device to add. |
|
|
Term
|
Definition
The process where one network management console collects data from multiple networked devices at regular intervals is known as ____. |
|
|
Term
|
Definition
____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software. |
|
|
Term
|
Definition
____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software. |
|
|
Term
|
Definition
A ____ is a correction, improvement, or enhancement to a particular piece of a software application. |
|
|
Term
|
Definition
A key component in managing networks is identifying and tracking its hardware and software through ____ management. |
|
|
Term
|
Definition
Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it. |
|
|
Term
|
Definition
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them. |
|
|
Term
|
Definition
A(n) ____ is a graphical representation of a network’s devices and connections. |
|
|
Term
|
Definition
The process of reverting to a previous version of software after attempting to upgrade it is known as ____. |
|
|