C172 - Network and Security Foundations

¡Supera tus tareas y exámenes ahora con Quizwiz!

The ________ on a switch is the length of time a MAC address remains assigned to a port.

Aging time

Full IPv6 Address

All 32 hexadecimal positions contain a value other than 0.

C. All of these support

Which of the following does not support a NIC device? A. PC Card B. USB C. All of these support D. Expansion Card

sm

Single mode.

NCP

Network Control Protocol

Wire-map

A graphical or text description of the wire connections from pin to pin.

Token Ring Hub

A hub that manages the passing of the token in a token ring network.

Index-matching Gel

A jellylike substance that has an index of refraction much closer to glass than to air.

B. Cause the cable to not be certified C. Can be due to inconsistent twists D. Be due to poor manufacturing

A length difference in wire pairs for UTP can ________. (Choose all that apply) A. Cause the cable to be certified B. Cause the cable to not be certified C. Can be due to inconsistent twists D. Be due to poor manufacturing

Packet Filtering

A limit is placed on the information that can enter the network.

Hotspots

A limited geographic area that provides wireless access for the public.

B. The link integrity test is operational

A lit link light indicated that A. Link pulses are being shared by all devices in the LAN B. The link integrity test is operational C. All of these answers are correct D. A 100 Mbps data link has been established E. A 10 Mbps data link has been established

Fusion Splicing

A long-term method where two fibers are fused or welded together.

Cisco Network Assistant (CNA)

A management software tool from Cisco that simplifies switch configuration and troubleshooting.

Numerical Aperture

A measure of a fiber's ability to accept light.

Near-end Crosstalk (NEXT)

A measure of the level of crosstalk or signal coupling within the cable, with a high NEXT (dB) value being desirable.

Cable Modem

A modem that can use the high bandwidth of a cable television system to deliver high-speed data to and from the service provider.

Distributed Feedback (DFB) Laser

A more stable laser suitable for use in DWDM systems.

ARP Reply

A network protocol where the MAC address is returned.

IP Internetwork

A network that uses IP addressing for identifying devices connected to the network.

Token Ring Topology

A network topology configured in a logical ring that complements the token passing protocol.

Bridge

A networking device that uses the MAC address to forward data and interconnect two LANs.

Virus

A piece of malicious computer code that, when opened, can damage your hardware, software, or other files.

Link Light

Indicates that the transmit and receive pairs are properly aligned.

ISM

Industrial, scientific, and medical.

Spoof

Inserting a different IP address in place of an IP packet's source address to make it appear that the packet came from another network.

IEEE

Institute of Electrical and Electronics Engineers, one of the major standards-setting bodies for technological development.

Application Layer

Interacts with application programs that incorporate a communication component such as your internet browser and email.

IC

Interconnect fibers branch exchange-item D shows the jumpers connecting the main fiber cross-connect (item B) to the active equipment (item C).

Transparent Bridge

Interconnects two LANs running the same type of protocol.

IDC

Intermediate distribution closet.

ICMP

Internet Control Message Protocol.

IGMP

Internet Group Message Protocol

IKE

Internet Key Exchange

ISAKMP

Internet Security Association and Key Management Protocol

ISP

Internet service provider.

Anycast Address

Is obtained from a list of addresses.

netstat -a -b

(a) Command used to display the ports currently open on a Windows operating system and (b) used to display the executable involved in creating the connection or listening port.

Port Address Translation (PAT)

A port number is tracked with the client computer's private address when translating to a public address.

Gigabit ethernet

1000Mbps ethernet

10 Gbps over twisted-pair copper cable

10GBASE-T

The maximum data rate of 802.11b, 802.11a, 802.11g, and 802.11n are _______Mbps, ________Mbps, ________Mbps, and _______Mbps respectively.

11, 54, 54, 600

The IPv4 address 192.168.12.5 can be expressed inIPv6 form using dotted decimal as__________.

::192.168.12.5

Transceiver

A transmit/receive unit.

Access Control Lists (ACLs)

A basic form of firewall protection

WiMAX

A broadband wireless system based on the IEEE 802.16e standard.

Console Cable

A cable that connects a router's console port to a computer's serial port.

Campus Network

A collection of two or more interconnected LANs in a limited geographic area.

Event

A disturbance in the light propagating down a fiber span that results in a disturbance on the OTDR trace.

Multimode Fiber

A fiber that supports many optical waveguide modes.

True

A full channel test tests all the link elements from the computer through the patch panel to the wall plate. (True/False)

90

A general rule of thumb is to allow _________ meters for the cable run from the telecommunications closet to the work area.

False

A protocol defines the network architecture used to interconnect the network equipment. True/False

Entrance Facilities (EF)

A room set aside for complex electronic equipment.

Denial of Service (DoS)

A service is being denied to a computer, network, or server.

Fiber Bragg Grating

A short strand of modified fiber that changes the index of refraction and minimizes intersymbol interference.

Network Congestion

A slowdown on network data traffic movement.

Cross-connect

A space where you are going to take one or multiple cables and connect them to one or more cables or equipment.

MIMO

A space-division multiplexing technique where the data stream is split into multiple parts called spatial streams.

Content Addressable Memory (CAM)

A table of MAC addresses and port mapping used by the switch to identify connected networking devices.

Packet Sniffing

A technique in which the contents of data packets are watched.

6to4 Prefix

A technique that enables IPv6 hosts to communicate over the IPv4 Internet.

Radio Frequency Identification (RFID)

A technique that uses radio waves to track and identify people, animals, objects, and shipments.

Token Passing

A technique where an electrical token circulates around a network a network-control of the token enables the user to gain access to the network.

Access Point

A transceiver used to interconnect a wireless and a wired LAN.

ThinNet

A type of coaxial cable used to connect LANs configured with a bus topology.

Worm

A type of virus that attacks computers, typically proliferates by itself, and can deny service to networks.

MAC Address

A unique 6-byte address assigned by the vendor of the network interface card.

Social Engineering

A way for an intruder to obtain enough information from people to gain access to the network.

Slotted Aloha

A wireless network communications protocol technique similar to the Ethernet protocol.

Gateway

Describes the networking device that enables hosts in a LAN to connect to networks (and hosts) outside the LAN.

Which of the following is not an advantage of using optical communications? A. All of these are advantages B. Wide bandwidth C. Lower attenuation D. Immune to EMI E. Safety

A. All of these are advantages

WiMAX operates at which frequencies in the US? A. Both the unlicensed 5.8GHz and the licensed 2.5GHz B. Both the unlicensed 5.2GHz and the licensed 2.4GHz C. Both the unlicensed 5.3GHz and the licensed 2.6GHz D. Both the unlicensed 13.2GHz and the licensed 5.6GHz

A. Both the unlicensed 5.8GHz and the licensed 2.5GHz

Which of the following is not a type of bridge? A. Bridged B. Wireless C. Translation D. Transparent

A. Bridged

802.11u standard increases security by requiring user authentication. True/False

False

The fast link pulse does which of the following? (Select all that apply) A. Carries the configuration information between each end of the data link B. Is used in auto-negotiation C. Uses a 100Mbps data rate D. Uses a 1Mbps data rate

A. Carries the configuration information between each end of the data link B. Is used in auto-negotiation

Site surveys obtain the following information. (Choose all that apply) A. Connection points to the main network B. Supported bandwidths. C. Electrical power D. RF coverage

A. Connection points to the main network B. Supported bandwidths. C. Electrical power D. RF coverage

How does a switch decrease network traffic? (Choose all that apply) A. Doesn't forward ARP replies to all ports B. Forwards all data directly to the destination C. Ignore MAC addresses in the data packets D. Traffic is not isolated to any port when possible

A. Doesn't forward ARP replies to all ports B. Forwards all data directly to the destination

A logical fiber map shows _________. (Choose all that apply) A. Fiber interconnections B. Routing of the fiber C. None of them D. Data distribution

A. Fiber interconnections D. Data distribution

Which of the following is not an advantage of auto-negotiation? (Choose all that apply) A. Not recommended for fixed data links B. Can maximize throughput C. A failed negotiation can cause a link failure D. Useful in LANs with multiple connection capabilities

A. Not recommended for fixed data links C. A failed negotiation can cause a link failure

The connection to the router's console input is typically which of the following? (Select two) A. RS-232 B. RJ-45 C. DB9 D. RJ-11

A. RS-232 B. RJ-45

The physical connection where a router connects to the network is called the A. Router interface B. Network interface C. Network port D. Router port

A. Router interface

A web filter appliance only lets you see what traffic is flowing to the web. True/False

False

This interface is used to create a T1 connection. A. Serial interface B. FastEthernet Port C. Console input D. WAN interface card

A. Serial interface

Buffer overflows can allow an attacker to do which of the following? (Choose all that apply) A. Set up a backdoor B. Crash applications C. Prevent denial-of-service attacks D. Place viruses

A. Set up a backdoor B. Crash applications D. Place viruses

Which of the following is an advantage of auto-negotiation? (Select all that apply) A. Simplifies the LAN configuration B. Simplifies the backbone configuration C. Can maximize the data link throughput D. Is useful in LANs that have multiple users with multiple connection capabilities E. All of the answers are correct

A. Simplifies the LAN configuration C. Can maximize the data link throughput D. Is useful in LANs that have multiple users with multiple connection capabilities

Which of the following is an advantage for using wireless networking? (Choose all that apply) A. User mobility B. More expensive C. Secure D. Flexible

A. User mobility D. Flexible

The network administrator wants to verify the network connection at 10.10.20.5. Which of the following commands can be used to verify the connection? A. ping 10.10.20.5 B. ping all 10.10.20.5 C. ping -2 10.10.20.5 D. ping -t 10.10.20.5

A. ping 10.10.20.5 D. ping -t 10.10.20.5

RX

Abbreviation for receive.

TX

Abbreviation for transmit

Network Layer

Accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information.

Deterministic

Access to the network is provided at fixed time intervals.

ACK

Acknowledgement packet

Dispersion Compensating Fiber

Acts like an equalizer, canceling dispersion effects and yielding close to zero dispersion in the 1550-mm region.

ARP

Address Resolution Protocol, used to map an IP address to its MAC address.

AES

Advanced Encryption Standard

ARPAnet

Advanced Research Projects Agency network.

Mesh Topology

All networking devices are directly connected to each other.

Supernetting

Allows multiple networks to be specified by one subnet mask.

Uplink Port

Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable.

Managed Switch

Allows the network administrator to monitor, configure, and manage select network features.

Workstation or Work Area Outlet (WO)

Also called the TO ( telecommunications outlet), it's used to connect devices to the cable plant. The cable type typically used is CAT3, CAT5, CAT5e, CAT6, CAT6a, and various coaxial cables. Devices typically connected to these outlets are PCs, printers, servers, phones, televisions, and wireless access points.

Intermediate Cross-connect (IC)

Also called the building distributor (BD), this is the building's connection point to the campus backbone. The IC links the MC to the horizontal cross-connect (HC).

ARIN

American Registry for Internet Numbers.

FastEthernet

An Ethernet system operating at 100Mbps.

IP Tunnel

An IP packet encapsulated in another IP packet.

Piconet

An ad hoc network of up to eight Bluetooth devices.

Layer 2 Switch

An improved network technology that provided a direct data connection for network devices in a LAN.

Isolator

An inline passive device that allows optical power to flow only in one direction.

Intranet

An internal network that provides file and resource sharing but is not accessed from the Internet.

Multiport Repeater

Another name for a hub.

Multiport Bridge

Another name for a layer 2 switch.

ARP Table

Another name for the ARP cache.

Network Address

Another name for the layer 3 address.

TR

Another name for the telecommunications closet

Prefix length notation

Another shorthand technique for writing the subnet mask except class boundaries are not being crossed.

Bottlenecking

Another term for network congestion.

Ad Hoc

Another term used to describe an independent network.

Broadcast Domain

Any network broadcast sent over the network will be seen by all networking devices in this domain.

Topology

Architecture of a network.

Brute Force Attack

Attacker uses every possible combination of characters for the password.

A. Resistance B. Leakage

Attenuation in a twisted-pair cable is caused by ________. A. Resistance B. Leakage C. Scattering D. Insertion loss

AH

Authentication Header

Single mode fiber typically used what wavelengths? (Choose all that apply) A. 1600 nm B. 1310 nm C. 850 nm D. 1550 nm

B. 1310 nm D. 1550 nm

What is the subnet address for a packet that is sent to 174.118.17.95 with a subnet mask of 255.255.248.0? A. 174.118.32.0 B. 174.118.16.0 C. 174.118.16.80 D. 174.118.0.0

B. 174.118.16.0

Given a network IP address of 172.16.0.0 and a subnet mask 255.255.192.0 how many subnets are in this network? A. 8 B. 4 C. 2 D. 16

B. 4

The IP address 192.168.20.5 is an example of what? (Select all that apply) A. Class A IP address B. A private IP address C. Class C IP address D. Class B IP address

B. A private IP address C. Class C IP address

AUI stands for A. Auxiliary Unit Input B. Attachment Unit Interface C. Auxiliary Unit Interface D. Attachment Unit Interconnect

B. Attachment Unit Interface

Which router interfaces are used to connect routers to the network? (Choose all that apply) A. None of them B. Auxiliary C. Ethernet D. Serial

B. Auxiliary C. Ethernet D. Serial

The personal firewall software is typically based on which of the following? A. The 802.11x protocol B. Basic packet filtering inspections C. Using only trusted sites D. Configuring non-stateful firewall protection

B. Basic packet filtering inspections

A wireless network requires a cable connection? True/False

False

An attenuator is used to increase signal strength. True/False?

False

ICMP is used to: (select all that apply) A. None of the answers B. Control the low of data in the networks. C. Report errors D. Perform diagnostics

B. Control the low of data in the networks. C. Report errors D. Perform diagnostics

_________ means that a MAC address was assigned to a port when the device sends a packet. A. None of them B. Dynamic addressing C. Static addressing D. Secure addressing

B. Dynamic addressing

Which of the following are examples of fiber architectures? (Choose all that apply) A. Fiber to the workstation B. Fiber to the home C. Fiber to the curb D. Fiber to the business

B. Fiber to the home C. Fiber to the curb D. Fiber to the business

Bluetooth operates in the 5 GHz band. True/False

False

Fiber optics use light in the visible spectrum. True/False?

False

Which of the following is not a type of dispersion? A. Chromatic B. Light C. Polarization mode D. Modal

B. Light

The network administrator can monitor the network using a _______ switch. A. Powered B. Managed C. Software D. Centralized

B. Managed

Routers use the ______ to route packets. A. Router address B. Network address C. None of them D. MAC address

B. Network address

The range of WiMAX networks is _________. A. 31 km B. None of them C. 31 meters D. 31 feet

B. None of them

Which of the following is not a function of a bridge? A. Only forwards data to the specified port B. None of them C. Isolates the network traffic D. Uses MAC addresses to forward data packets

B. None of them

Routing tables on a router keep track of A. Gateway addresses of LANs B. Routes to use for forwarding data to its destination C. Port assignments D. MAC address assignments

B. Routes to use for forwarding data to its destination

The _______ is used to identify subnets in an IPv6 address. A. V4ADDR B. SLA ID C. Interface ID D. TLA ID

B. SLA ID

The three packets exchanged at the beginning f a TCP connection between two ports are which of the following? A. SYN, SYN, ACK B. SYN, SYN+ACK, ACK C. TCP does not use SYN packets D. SYN, ACK, ACK

B. SYN, SYN+ACK, ACK

The four parts of a fiber optic communications system are ________. A. System, cable, connectors, photodiode B. Source, cable, connectors, photodiode C. Source, cable, splices, photodiode D. Source, cable, splices, data

B. Source, cable, connectors, photodiode

RFID technology has many uses including ________. (Choose all that apply) A. Wired devices B. Tracking shipments C. Border crossings D. Full speed tollbooths

B. Tracking shipments C. Border crossings D. Full speed tollbooths

Isolating the Collision Domains

Breaking the network into segments where a segment is a portion of the network where the data traffic from one part of the network is isolated from the other networking devices.

The _______ is a layer 2 device that is used to interconnect two LANs.

Bridge

BWA

Broadband wireless access.

Hub

Broadcasts the data it received to all devices connected to its ports.

Dispersion

Broadening of a light pulse as it propagates through a fiber strand.

The bit rate of OC-3 is _______. A. 2.4 Gbps B. 622 Mbps C. 155.52 Mbps D. 51,840 Mbps

C. 155.52 Mbps

The port number for SMTP is _______. A. 21 B. 23 C. 25 D. 80 E. 53

C. 25

What is the typical core size of multimode cables? A. 8um B. 59um C. 62.5um D. 65 um

C. 62.5 um

Multimode fiber typically uses what wavelengths? (Choose all that apply) A. 1300 nm B. 1550 nm C. 850 nm D. 1310 nm

C. 850 nm D. 1310 nm

Hubs should never be used with wireless networks. True/False

False

What is the hexadecimal equivalent of 1011? A. F B. A C. B D. 11

C. B

An IPv4 is made up of 4 _______. (Select all that apply) A. Groups B. Bits C. Bytes D. Octets

C. Bytes D. Octets

MIMO uses wave division multiplexing. True/False

False

__________ protocol was developed by Cisco in 1994 and is still being used today. A. IPSec B. L2TP C. GRE D. PPP

C. GRE

The router's routing tables allow the router to A. Keep track of network addresses B. Keep track of MAC addresses C. Keep track of the addresses needed to route data D. Keep track of packets to forward data

C. Keep track of the addresses needed to route data

Which of the following is not a TCP/IP Model layer? A. Application B. Transport C. Network D. Network Interface

C. Network

Site Surveys provide the following: • best location for placing access points • power connection • RF coverage • antenna selection • IP address selection True/False

False

A gateway address defines which of the following? A. All of these answers are correct B. The network links between two LANs C. The networking device that enables hosts a LAN to connect to networks outside the LAN D. The networking device that enables hosts in a LAN to connect to networks inside the LAN

C. The networking device that enables hosts a LAN to connect to networks outside the LAN

Horizontal Cabling

Cabling that extends out from the telecommunications closet into the LAN work area.

Equipment Room (ER)/Backbone Cabling

Cabling that interconnects telecommunication closets in the same building and between buildings.

CSMA/CD

Carrier sense multiple access with collision detection is the Ethernet LAN media-access method.

CSMA/CA

Carrier sense multiple access/collision avoidance.

Fast Link Pulse (FLP)

Carries the configuration information between each end of a data link.

Scattering

Caused by refractive index fluctuations; accounts for 96 percent of attenuation loss.

CHAP

Challenge Handshake Authentication Protocol

The four layers of the TCP/IP model are Application, Network, Internet, Data Link. True/False

False

The private address ranges for usable IP network addresses for Class B are 172.16.0.9 - 172.32.0.0. True/False

False

With Cisco LEAP, the user must provide the correct SSID. True/False

False

Single-mode Fiber

Fiber cables with core diameters of about 7-10 um; light follows a single path.

FTTB

Fiber to the business.

FTTC

Fiber to the curb.

FTTD

Fiber to the desktop.

You have a network ID of 192.168.55.0 and you need to divide it into multiple subnets. You need at least 30 host ID's in each subnet. What is the maximum number of subnets you could have? A. 4 B. 6 C. 1 D. 8

D. 8

FTTH

Fiber to the home.

Bridging Table

List of MAC addresses and port locations for hosts connected to the bridge ports.

True

Single-mode fiber cables have a core diameter of about 8-10 micrometers. True/False?

Attenuation (insertion Loss)

The amount of loss in the signal strength as it propagates down a wire or fiber strand.

EIA/TIA 568-B

The standard that defines the six subsystems of a structured cabling system.

One of the parameters that define RFID system is frequency of operation. True/False

True

Router ports are commonly referred to as interfaces. True/False

True

Routers interconnect LANs. True/False

True

CIDR

Classless interdomain routing.

Proxy Service

Clients go through a proxy to communicate with secure systems.

Ping

Command used to test that a device on the network is reachable.

Full Duplex

Computer system can transmit and receive at the same time.

Full Channel

Consists of all the link elements from the wall plate to the hub or switch.

The _______ part of an optical fiber carries the light.

Core

Fiber to the home fiber typically used what wavelengths? A. 1310 nm B. 1300 nm C. 1550 nm D. 1600 nm

D. 1600 nm

The home IP address for a network is assigned by which of these? A. ARIN, the American Registry for Internet Names B. ARIN, the association of Registered Internet Numbers C. ARNN, the American Registry for Internet Names and Numbers D. ARIN, the American Registry for Internet Numbers

D. ARIN, the American Registry for Internet Numbers

Converting 1 0 1 1 0 1 1 0 1 1 1 1 0 0 0 1 to hexadecimal yields which of the following? A. BAF1 B. AAF1 C. A6F1 D. B6F1 E. None of these

D. B6F1

The maximum length for a multimode fiber optic cable is 2000 meters. True/False?

True

Another name for a switch is A. Multiport router B. Multiport hub C. Multiport repeater D. Multiport bridge

D. Multiport bridge

The subnet mask 255.255.255.0 is applied to the IP address 10.20.35.12. Which subnet is the packet sent to? A. 10.20.35.192 B. 10.0.0.0 C. 10.20.0.0 D. 10.20.35.32 E. None of the answers

D. None of the answers

What is the correct order for the sequence of packets that are sent to set up a virtual TCP connection? A. SYN-ACK, SYN, ACK B. ACK, SYN-ACK, SYN C. SYN, ACK, SYN-ACK D. SYN, SYN-ACK, ACK

D. SYN, SYN-ACK, ACK

In regards to IPv6, the SLA ID is what? A. It replaces the IP address in IPv6 and is 128 bits in length. B. It replaces the MAC address in IPv6 and us 32 bits long. C. The is the site-level aggregation ID and 128 bits in length and replaces the 32 bit IPv4 address. D. This is the site-level aggregation ID and is used by individual networks to identify the subnets within their site

D. This is the site-level aggregation ID and is used by individual networks to identify the subnets within their site

DES, 3DES

Data Encryption Standard, Triple Data Encryption Standard

DTE

Data Terminal Equipment (the serial interface designed for connecting to a CSU/DSU to outside digital communication services).

Encryption guarantees __________.

Data confidentiality

Wire Speed Routing

Data packets are processed as quickly as they arrive.

Multicast Address

Data packets sent to a multicast address are sent to the entire group of networking devices, such as a group of routers running the same routing protocol.

Transport Layer Protocols

Define the type of connection established between hosts and how acknowledgements are sent.

Network Interface Layer

Defines how the host connects to the network.

IP (Internet Protocol)

Defines the addressing used to identify the source and destination addresses of data packets being delivered over an IP network.

Internet Layer

Defines the protocols used for addressing and routing data packets.

Network Slowdown

Degraded network performance.

Logical Address

Describes the IP address location of the network and the address location of the host in the network.

Range Extender

Device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all.

Wireless Router

Device used to interconnect wireless networking devices and to give access to wired devices and establish the broadband internet connection to the ISP.

DS

Digital signal

DSL

Digital subscriber line

DL

Diode Laser

DSSS

Direct sequence spread spectrum.

DNS

Domain name service

EMI

Electromagnetic interference

EIA

Electronic Industries Alliance.

ipconfig /all

Enables the MAC address information to be displayed from the command prompt.

ESP

Encapsulating Security Protocol

ELTCTL

Equal Level Transverse Conversion Transfer Loss

Virtual Private Network (VPN)

Established a secure network connection and is a way to protect your LANs data from being observed by outsiders.

Connection-Oriented Protocol

Establishes a network connection, manages the delivery of data, and terminates the connection.

Optical Ethernet

Ethernet data running over a fiber link.

Broadcast Storm

Excessive amounts of broadcasts.

EAP

Extensible Authentication Protocol

FTP

File Transfer Protocol

F/UTP

Foil over twisted-pair cabling.

Switch

Forwards a frame it receives directly out the port associated with its destination address.

FHSS

Frequency hopping spread spectrum.

False

Full duplex gigabit Ethernet uses two pairs of wires. (True/False)

D. A long-term method where two fibers are fused or welded together

Fusion-splicing is characterized by which of the following? A. A temporary method for splicing fiber B. An inexpensive alternative to mechanical splices C. Required index-matching gel D. A long-term method where two fibers are fused or welded together

The _________ is a term used to describe the networking device that enables hosts in a LAN to connect to networks and hosts outside the LAN.

Gateway

GRE

Generic Routing Encapsulation

GBIC

Gigabit interface converter.

Buffer Overflow

Happens when a program tries to put more data into a buffer than it was configured to hold.

Bandwidth

Having to do with the data capacity of the network link. A Fast-Ethernet 100Mbps link has greater data capacity that a 10Mbps Ethernet link.

Hex

Hexadecimal, base 16

The FHSS transmitting and receiving units must know the _________ to communicate.

Hopping sequence, pseudorandom sequence

A. Switch or hub B. Patch panel

Horizontal cabling consists of which of the following basic blocks? (Select two) A. Switch or hub B. Patch panel C. Backbone cabling D. Routers

A secure VPN connection between two endpoints is known as a(n) _________ tunnel. A. Secure B. Layer2 C. IP D. VPN

IP

Non-Internet Routable IP Addresses

IP addresses not routed on the Internet.

Private Addresses

IP addresses set aside for use in private intranets.

Network layer 3

IP and IPX are examples of protocols that operate in the ___________ layer of the OSI model.

IPSec

IP security is used to encrypt data between various networking devices.

IPv6

IP version 6

Building entrance Equipment room Telecommunications closet Backbone cabling Horizontal cabling Work area

Identify the six subsystems of a structured cabling system.

Association

Indicates that the destination address is for a networking device connected to one of the ports on the bridge.

Dense Wavelength Division Multiplex (DWDM)

Incorporates the propagation of several wavelengths in the 1550-mm range for a single fiber.

True

It is important to be very careful working with fiber ends. These ends are extremely difficult to see and can become "lost" and/or easily embedded in your finger. True/False?

Stateful Firewall

Keeps track of the data packet flow.

Routing Table

Keeps track of the routes to use for forwarding data to its destination.

Diffie-Hellman

Key generation algorithm.

Tunable Laser

Laser in which the fundamental wavelength can be shifted a few nanometers, ideal for traffic routing in DWDM systems.

Vertical Cavity Surface Emitting Lasers (VCSELs)

Lasers with the simplicity of LEDs and the performance of lasers.

L2F

Layer 2 Forwarding

L2TP

Layer 2 Tunneling Protocol

Presentation Layer

Layer of the OSI reference model that accepts and structures the messages for the application.

Data Link Layer

Layer of the OSI reference model that handles error recovery, flow control (synchronization), and sequencing.

Transport Layer

Layer of the OSI reference model that is concerned with message integrity between source and destination.

Session Layer

Layer of the OSI reference model that provides the control functions necessary to establish, manage, and terminate the connection.

Physical Layer

Layer of the OSI reference model that provides the electrical and mechanical connection to the network. Describes the media that interconnects networking devices.

Infrared Light

Light extending from 680 nm up to the wavelengths of the microwaves.

Optical Spectrum

Light frequencies from the infrared on up.

Absorption

Light interaction with the atomic structure of the fiber material; also involves the conversion of optical power to heat.

LED

Light-emitting diode.

The ________ describes the IP address location of the network and the address location of the host in the network.

Logical address

LCL

Longitudinal Conversion Loss

Microbending

Loss caused by very small mechanical deflections and stress on the fiber.

Macrobending

Loss due to light breaking up and escaping into the cladding.

Dynamic Assignment

MAC addresses are assigned to a port when a host is connected.

Media Access Control

MAC stands for

Malware

Malicious programs.

Service Set Identifier (SSID)

Name that is used to identify your wireless network and is used by your access point or wireless router to establish an association.

FastEthernet Port (FA0/0, FA0/1, FA0/2,...)

Naming of the FastEthernet ports on the router.

Serial Port (S0/0, S0/1, S0/2,...)

Naming of the serial ports on the router.

Balanced Mode

Neither wire in the wire pairs connects to ground.

Cladding

Material surrounding the core, which must have a lower index of refraction to keep the light in the core.

Maximum lengths for multimode fiber is ______ km and the maximum length of single-mode fiber is ______ km.

Maximum lengths for multimode fiber is 2 km and maximum length of single-mode fiber is 80 km.

Mbps

Megabits per second

MD5

Message Digest 5

Multicast

Messages are sent to a specific group of hosts on the network.

MM

Multimode.

Nominal Velocity of Propagation (NVP)

NVP is some percentage of the velocity of light and is dependent on the type of cable being tested. The typical delay value for CAT5/5e UTP cable is about 5.7 Marc per meter. The EIA/TIA specification allows for 548 Marc for the maximum 100-meter run for CAT5e, CAT6, CAT6a, CAT7, and CAT7a.

Local Area Network (LAN)

Network of users that share computer resources in a limited area.

NLOS

Non-line-of-sight.

OSI

Open system interconnect.

Multilayer Switch (MLS)

Operates at layer 2 but functions at the higher layers.

Fiber Cross-connect

Optical patch panel used to interconnect fiber cables.

OFDM

Orthogonal frequency division multiplexing.

Ethernet, Physical, Hardware, or Adapter Address

Other names for the MAC address.

Echo Request

Part of the ICMP protocol that requests a reply from a computer.

PAP

Password Authentication Protocol

Site Survey

Performed to determine the best location(s) for placing the access point(s) to provide maximum RF coverage for the wireless clients.

Horizontal cabling

Permanent networking cabling with in a building belongs to the _________ subsystem.

Link

Point from one cable termination to another.

PPTP

Point to Point Tunneling Protocol

Zero-dispersion Wavelength

Point where the dispersion is actually zero.

PPP

Point-to-Point Protocol

Well-known Ports

Ports reserved by ICANN.

Refractive Index

Ratio of the speed of light in free space to its speed in a given material.

Backscatter

Refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source.

PSACR

Power sum ACR uses all four wire pairs to obtain the measure of the attenuation-crosstalk ratio. This is a measurement of the difference between PSNEXT and attenuation (insertion loss). The difference is measured in dB, and higher PSACR dB values indicate better cable performance.

PSELFEXT

Power sum ELFEXT that uses all four wire pairs to obtain a combined ELFEXT performance measurement. This value is the difference between the test signal level and the cross-talk measured at the far end of the cable. A higher PSELFEXT value indicates better cable performance.

PSAACRF

Power-Sum Alien Attenuation Cross-talk Ratio Far-End

PSANEXT

Power-Sum Alien Near-End Crosstalk

_______ is the best way to keep from contributing to DDoS attacks.

Prevent intrusion

Auto-negotiation

Protocol used by interconnected electronic devices to negotiate a link speed.

Link Integrity Test

Protocol used to verify that a communication link between two Ethernet devices has been established.

Serial Ports

Provides a serial data communication link into and out of the router, using V.35 serial interface cables.

Console Input

Provides an RS-232 serial communications link into the router for initial router configuration. A special cable, called a console cable, is used to connect the console input to the serial port on a computer. The console cable uses RJ-45 plugs on each end and requires the use of an RJ-45 to DB9 adapter for connecting to the COM1 or COM2 port.

Packet

Provides grouping of the information for transmission.

RIRs

Regional Internet registries, IANA-designated governing organizations responsible for IP address allocation by geographical location.

RADIUS

Remote Authentication Dial-In Service.

Hybrid Echo Cancellation Circuit

Removes the transmitted signal from the receive signal.

Logical Fiber Map

Shows how the fiber is interconnected and data is distributed throughout a campus.

Physical Fiber Map

Shows the routing of the fiber but also shows detail about the terrain, underground conduit, and entries into buildings.

Crosstalk

Signal coupling in a cable.

Host Address

Same as host number.

SHA-1

Secure Hash Algorithm

Link Pulses

Sent by each of the connected devices via the twisted-pair cables when data is not being transmitted to indicate that the link is still up.

SSID

Service set identifier.

Protocol

Set of rules established for users to exchange information.

STP

Shielded twisted psir

Pulse Dispersion

Stretching of received pulse width because of multiple paths taken by the light.

SYN ACK

Synchronizing Acknowledgement packet

SYN

Synchronizing packet

SONET/SDH

Synchronous optical network; protocol standard for optical transmission in long-haul communication/synchronous digital hierarchy.

STS

Synchronous transport signals.

Transport layer 4

TCP functions at the __________ layer of the OSI model.

Layer 4 transport

TCP functions at which layer of the OSI model?

False

The "X" (cross connection) on the input to a switch represents a router only port. True/False

Multilevel Encoding

Technique used to reduce in the required bandwidth required to transport the data.

TIA

Telecommunications Industry Association

TCO

Telecommunications outlet.

ARP Cache

Temporary storage of MAC addresses recently contacted.

Basic Service Set (BSS)

Term used to describe an independent network.

Enterprise Network

Term used to describe the network used by a large company.

Fiber, Light Pipe, Glass

Terms used to describe a fiber-optic strand.

False

The 10GBASE-T system splits the data into 8 channels for transmission. (True/False)

Secure Address

The switch port will automatically disable itself if a device with a different MAC address connects to the port.

RJ-45

The 8-pin modular connector used with CAT6/5e/5 cable.

A. Measurement procedures C. Cabling hardware D. Transmissions

The EIA/TIA568-B.2 specifies which aspect of UTP cabling components? (Choose all that apply) A. Measurement procedures B. System requirements C. Cabling hardware D. Transmissions

Classful

The IP and subnet addresses are within the same network.

IPv4

The IP version currently being used on the Internet.

IANA

The Internet Assigned Numbers Authority is the agency that assigns IP addresses to computer networks.

ICANN

The Internet Corporation of Assigned Names and Numbers.

Static Addressing

The MAC address has been manually assigned to a switch port.

Layer 1 physical

The NIC operates at which layer of the OSI model?

Main cross-connect

The Telco and the ISP usually connect to __________ room in the campus network hierarchy.

Network layer 3

The ________ layer combines messages or segments into packets.

Mode Field Diameter

The actual guided optical power distribution, which is typically a micron or so larger than the core diameter; single-mode fiber specifications typically list the mode field diameter.

True

The address range for Class A IP addresses is 1.0.0.0 - 126.255.255.255. True/False

ACR

The attention-to-crosstalk ration measurement compares the signal level from a transmitter at the far end to the crosstalk measured at the near end.

True

The bend radius for UTP cable is four times the jacket diameter. (True/False)

Directed Broadcast

The broadcast is sent to a specific subnet.

Modal Dispersion

The broadening of a pulse due to different path lengths taken through the fiber by different modes.

Chromatic Dispersion

The broadening of a pulse due to different propagation velocities of the spectral components of the light pulse.

Polarization Mode Dispersion

The broadening of a pulse due to the different propagation velocities of the X and Y polarization components of the light pulse.

CSU/DSU

The channel service unit/data service unit.

Half-Duplex

The communication device can transmit or receive but not at the same time.

COM1, COM2...

The computer's serial communication ports.

Bus Topology

The computers share the media (coaxial cable) for data transmission.

Horizontal Cross-connect (HC)

The connection between the building distributors and the horizontal cabling to the work area or workstation outlet-another term used for the HC is the floor distributors (FD).

Cut-Through

The data packet is forwarded to the destination MAC address has been read.

100

The data rate for FastEthernet is ____ Mbps.

Presentation layer 6

This layer performs encryption and compression.

Network Interface Card (NIC)

The electronic hardware used to interface the computer to the network.

Power Sum NEXT (PSNEXT)

The enhanced twisted-pair cable must meet four-pair NEXT requirements, called PSNEXT testing. Basically, power sum testing measures the total crosstalk of all cable pairs. This test ensures that the cable can carry data traffic on all four pairs at the same time with minimal interference. A higher PSNEXT value is desirable because it indicates better cable performance.

Store-and-Forward

The entire frame of data is received before any decision is made regarding forwarding the data packet to its destination.

Organizationally Unique Identifier (OUI)

The first 3-bytes of the MAC address that identifies the manufacturer of the network hardware.

Class A, B, C, D, and E

The five classes of IPv4.

Star Topology

The most common networking topology in today's LANs where all networking devices connect to a central switch or hub.

True

The function of an attenuators is to reduce the receive signal level. True/False?

Supernets

The grouping of two or more class networks together; also called CIDR blocks.

CIDR Block

The grouping of two or more class networks together; also called supernetting.

Graded-index Fiber

The index of refraction is gradually varied with a parabolic profile.

Received Signal Level (RSL)

The input signal level to an optical receiver.

Last Mile

The last part of the connection from the telecommunications provider to the customer.

Aging Time

The length of time a MAC address remains assigned to a port.

Switch Latency

The length of time a data packet takes from the time it enters a switch until it exits.

Telecommunications Closet

The location of the cabling termination points that includes the mechanical terminations and the distribution framed.

Work Area

The location of the computers and printers, patch cables, jacks, computer adapter cables, and fiber jumpers.

Return Loss

The measurement provides a measure of the ratio of power transmitted into a cable to the amount of power returned or reflected.

True

The network address is another name for a layer 4 address. True/False

C. Use the ping command to verify network connectivity D. Verify the link lights

The network administrator needs to verify a network connection. Which of the following steps should be taken? (Select two) A. Ping the MAC address B. Perform an ARP request C. Use the ping command to verify network connectivity D. Verify the link lights

Physical layer 1

The network interface card operates at the ___________ layer of the OSI model.

Classful Addressing

The network portion of a particular network address.

IPng

The next generation IP.

Pseudorandom

The number sequence appears random but actually repeats.

Hopping Sequence

The order of frequency changes.

Unicast

The packet has a fixed destination.

Router Interface

The physical connection where the router connects to the network.

Ports

The physical input/output interfaces to the networking hardware.

True

The ping -t: IP address command pings the host at the specified IP address until it is stopped. True/False

Building Entrance

The point where the external cabling and the wireless services interconnect with the internal building cabling.

Error Threshold

The point where the number of errors in the data packets has reached a threshold and the switch changed from the cut-through to the store-and-forward mode.

Host Number

The portion of the IP address that defines the location of the networking device connected to the network; also called the host address.

Network Number

The portion of the IP address that defines which network the IP packet is originating from or being delivered to.

IEEE 802.3an-2006 10-GBASE-T

The standard for 10Gbps

Backbone

The primary path for data traffic to and from destinations and sources in the campus network.

OSI Model

The seven layers describing network functions.

Advertise

The sharing of route information.

Color Map

The specification of which wire color connects to which pin on the connector.

XENPAK, XPAK, X2, XFP, SFP+

The ten gigabit interface adapter.

Roaming

The term used to describe a user's ability to maintain network connectivity as he moved through the workplace.

Flooding

The term used to describe what happens when a switch doesn't have the destination MAC address stored in CAM.

Delay

The time it takes for a data packet to travel from source to destination.

Long Haul

The transmission of data over hundreds or thousands of miles.

Extended Service Set (ESS)

The use of multiple access points to extend user mobility.

Straight-through Cable

The wire pairs in the cable connect to the same PIN numbers on each end.

AUI Port

This is a 10Mpbs Ethernet port. AUI stands for "attachment unit interface."

Propagation Delay

This is a measure of the amount of time it takes for a signal to propagate from one end of the cable to the other. The delay of the signal is affected by the nominal velocity of propagation (NVP) of the cable.

Delay Skew

This is a measure of the difference in arrival time between the fastest and the slowest signal in a UTP wire pair.

Equal Level FEXT (ELFEXT)

This measurement differs from NEXT in that the measurement is for the far end of the cable. Additionally, the ELFEXT measurement does not depend on the length of the cable. This is because ELFEXT is obtained by subtracting the attenuation value from the far-end crosstalk (FEXT!!) loss.

When configuring remote installations for wireless networks, the receive site needs to be able to see the multipoint distribution antenna site. True/False

True

A healthy network starts from within, and the most basic component in the network is an individual computer. True/False

True

Access points provide 802.11 MAC layer functions. True/False

True

Dispersion compensating fiber was developed to increase the transmission capacity of older cabling. True/False?

True

Fast link pulses carry information between each end of a data link. True/False

True

Network Address Translation (NAT)

Translates the private IP address to a public address for routing over the Internet.

TCP

Transmission Control Protocol

TCP/IP

Transmission Control Protocol/Internet Protocol, the protocol suite used for internetworks such as the Internet.

Broadcast

Transmission of data by a network device to all devices connected to its port.

Straight-through

Transmit and receive signal pairs are aligned end-to-end.

Crossover

Transmit and receive signal pairs are crossed to properly align the transmit signal on one device with the receive signal on the other device.

Crossover Cable

Transmit and receiver wire pairs are crossed.

TCL

Transverse Conversion Loss

TCTL

Transverse Conversion Transfer Loss

A bridge looks for an association between a MAC address and a port. True/False

True

Layer 3 switches use hardware to handle switching functions. True/False

True

Power On/Off

Turns on/off electrical power to the router.

CAT6 (category 6)

Twisted-pair cables capable of carrying up to 1000Mbps (1 gigabit) of data up to a length of 100 meters.

Mechanical Splices

Two fibers joined together with an air gap, thereby requiring an index-matching gel to provide a good splice.

Stateful Packet Inspection (SPI)

Type of firewall that inspects incoming data packets to make sure they correspond to an outgoing request.

SC, ST, FC, LC, MT-RJ

Typical fiber connectors on the market.

Pairing

When a Bluetooth device is set up to connect to another Bluetooth device.

Multicasting

When one host sends data to many destination hosts.

Hand-off

When the user's computer establishes an association with another access point.

CAT7/7a and CAT6a

UTP cable standards that support 10GB data rates for a length of 100 meters.

IP Address

Unique 32-bit address that identifies on which network the computer is located as well as differentiates the computer from all other devices on the same network.

U-NII

Unlicensed National Information Infrastructure.

Alien Crosstalk (AXT)

Unwanted signal coupling from one permanent link to another.

Inquiry Procedure

Used by Bluetooth to discover other Bluetooth devices or to allow itself to be discovered.

Passkey

Used in Bluetooth Security to limit outsider access to the pairing.

Firewall

Used in computer networks for protecting the network.

Media Converter

Used to adapt a layer 1 (physical layer) technology to another layer 1 technology.

Auxiliary Input

Used to connect a dial-in modem into the router. The auxiliary port provides an alternative way to remotely log in to the router if the network is down. This port also uses an RJ-45 connection.

Paging Procedure

Used to establish and synchronize a connection between two Bluetooth devices.

Unicast Address

Used to identify a single network interface address, and data packets are sent directly to the computer with the specified IPv6 address.

Translation Bridge

Used to interconnect two LANs that are operating two different networking protocols.

Address Resolution Protocol (ARP)

Used to map an IP address to its MAC address.

Firewall Protection

Used to prevent unauthorized access to your network.

Beacon

Used to verify the integrity of a wireless link.

UDP

User Datagram Protocol

Overloading

Where NAT translates the home network's private IP addresses to a single public IP address.

Wired Network

Uses cables and connectors to establish the network connection.

Dictionary Attack

Uses known passwords and many variations (upper and lowercase and combinations) to try to log in to your account.

Wireless Network

Uses radio signals to establish the network connection.

Main Cross-connect (MC)

Usually connects two or more buildings and is typically the central telecommunications connection point for a campus or building. It is also called the main distribution frame (MDF) or main equipment room. The MC connects to Telco, an ISP, and so on. Another term for the MC is the campus distributor (CD).

VPN

Virtual private network.

Commercial Cabling Standard Twisted-pair Media Optical Fiber Cabling Standard

What are the three parts of the EIA/TIA 568B standard?

A. Signal coupling from one link to another

What causes Alien Crosstalk? A. Signal coupling from one link to another B. Wide cable separation C. All to them D. Low data rates

A. Manufacturer standards B. Color order

What is the difference between T568A and T568B? (Choose all that apply) A. Manufacturer standards B. Color order C. Nothing D. Performance

Network layer 3

What layer decides the route data will travel?

Network layer 3

What layer is responsible for adding a header that includes routing information?

A. None of them

What signifies the uplink port on hubs? A. None of them B. W C. Y D. Z

B. Better security C. Noise immunity from EMI D. Noise immunity from RFI

Which of the following is an advantage of F/UTP? (Choose all that apply) A. Maximizes signal leakage B. Better security C. Noise immunity from EMI D. Noise immunity from RFI

E. All of the above

Which of the following is found in the telecommunications closet? A. Networking Equipment B. Patch cables C. Backbone cabling D. Patch panels E. All of the above

A. Vertical cabling C. Equipment closet

Which of the following is not a part of a structured cabling subsystem? A. Vertical cabling B. Horizontal cabling C. Equipment closet D. Building entrance

B. Scattering

Which of the following terms is caused by refractive index fluctuations and accounts for 96% of attenuation loss? A. Absorption B. Scattering C. Diffusion D. Dispersion

B. Macrobending

Which of the following terms refers to loss due to light breaking up and escaping into the cladding? A. Scattering B. Macrobending C. Absorption D. Microbending

A. Crimping tool C. Strippers

Which of the following tools are needed to make a UTP cable? (Choose all that apply) A. Crimping tool B. Screwdriver C. Strippers D. Pliers

A. CAT5e B. CAT6

Which type of twisted-pair cable can be used for Gigabit Ethernet networks? A. CAT5e B. CAT6 C. None of them D. CAT5

Wi-Fi

Wi-Fi Alliance[md] an organization that tests and certifies wireless equipment for compliance with the 802.11x standards.

WPA

Wi-Fi Protected Access.

T568A

Wire color guidelines specified under the EIA/TIA568B standard.

T568B

Wire color guidelines specified under the EIA/TIA568B standard.

WLAN

Wireless local area network.

The _________ command is used on a computer to view the contents of the ARP.

arp -a

Cisco routers use _______ command to block broadcasts to a subnet.

no ip directed-broadcast


Conjuntos de estudio relacionados

CH 2 - Fundamental Concepts of the AIS

View Set

Section 9: Contract Types and Maryland's Statute of Frauds

View Set

Section 10: Unit 3 Practice Exam

View Set

MGT 510 Human Resource Management

View Set

chapter 1 educational psychology

View Set

Taylor's Chapter 1: Intro to Nursing (Prep U)

View Set