Chapter 1 thru Chapter 6 Computer Networking Fundamentals
Bluesnarfing
A hacker takes advantage of a Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?
Star
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Peer-to-peer
A network consists of the computers all running Windows 10 Professional. All the computers are connected to a switch which is connected to a router, which is connected to the Internet. Which networking model does the network use?
AD
A routing protocol's reliability and priority are rated by what measurement?
Look at whether the device is located on the ISP's side of the demarc.
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must fit the bill?
NFC
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
Network Layer
At which OSI layer does IP operate?
IP config/release
If you are connected to a network that uses DHCP,and you need to terminate your windows workstation DHCP lease, which command would you use?
Rack ears
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
255
What decimal number corresponds to the binary number 11111111?
default gateway
What type of device does a computer turn to first when attempting to make contact with a host on another network?
wiring schematic
What type of diagram shows a graphical representation of a network's wired infrastructure?
MTRJ (Mechanical Transfer Registered Jack)
Which fiber connector contains two strands of fiber in each ferrule?
STDM (statistical time division multiplexing)
Which kind of multiplexing assigns slots to nodes according to priority and need?
Infrared
Which one of the following wireless transmission types require a clear LOS to function?
The OUI
Which part of a mac address is unique to each manufacturer?
tone locator
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
TCP
Which protocol's header would a Layer 4 device read and process?
SMTP is a connection-based protocol
Which statement describes SMTP?
Remote Desktop
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
VoIP gateway
Which device converts a signal from a campus's analog phone equipment into IP data that can travel over the internet?
POP3
Which email protocol allows an email client to download email messages to the local computer?
Client-server
In previous question, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support with without the upgrade?
HTTP
In the client-server model, what is the primary protocol used for communication between a browser and a web server?
Star-bus
In the previous question (#8), suppose a new switch is connected to the first switch by way of a network cable and 3 computers are connected to the new switch. Which network topology is now used?
All devices on your local network
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
White/green
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
root server
What computers are the highest authorities in the DOMAN Name System hierarchy?
Checksum
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
1500 bytes
What is the Internet standard MTU?
Cat 5e
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
List all components on the network
What is the first step of inventory management?
Layer 3
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Coaxial cable, F-connector
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
NEXT
What kind of crosstalk occurs between wire pairs near the source of the signal?
Static Route
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
FHSS (Frequency Hopping Spread Spectrum)
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
fiber type mismatch
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
The secondary and primary DNS servers, because the secondary server is requesting zone transfer from the primary server.
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
Evil Twin
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your computer to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
FE80::/10
When your computer first joins an IPv6 network, what is the prefix of the IP address the computer first configures for itself?
802.11n
Which 802.11 standard can be used in both the 2.4-GHz and the 5-GHz bands?
Class 1
Which Bluetooth class has the highest power outlet?
CSMA/CA
Which Carrier Sense technology is used on wireless networks to reduce collisions?
Gateway of last resort
When a router can't determine a path to a message's destination, where does it send the message?
Rogue AP
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
Network layer
Which OSI layer is responsible for directing data from one LAN to another?
IMAP4
Which email protocol allows an email client to read mail stored on the mail server?
Cat 5e, Cat 6a, Cat 7
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
A password manager
Which of these is considered a secure place to store a list of documented network passwords?
BGP
Which routing protocol does an exterior router use to collect data to build its routing tables?
Bandwidth
Which transmission characteristic is never fully achieved?
IKEv2
Which tunneling protocol is a component of the IPsec protocol suite?
ICMP and ARP
Which two protocols manage neighbor discovery processes on IPv4 networks?
Port
Which type of address is used at the Transport layer to identify the receiving application?
NAT mode
With which network connection type does the VM obtain IP addressing information from its host?
Patch cable
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?