Data Communications - Midterm
DNAT (Destination Network Address Translation)
A type of address translation in which a gateway has a pool of public IP addresses that it is free to assign to a local host whenever the local host makes a request to access the Internet.
twisted-pair
A type of cable similar to telephone wiring that consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm. Every two wires are twisted around each other to form pairs, and all the pairs are encased in a plastic sheath.
coaxial cable
A type of cable that consists of a central metal conducting core, surrounded by an insulator, shielding, and an outer cover. Today it, called "coax" for short, is used to connect cable Internet and cable TV systems.
RG-59 (radio guide 59)
A type of coaxial cable characterized by a 75-ohm impedance and a 20 or 22 AWG core conductor, usually made of braided copper and used for relatively short connections.
RG-6 (radio guide 6)
A type of coaxial cable with an impedance of 75 ohms and an 18 AWG core conductor. RG-6 is used for television, satellite, and broadband cable connections.
DB-25 connector
A type of connector with 25 pins that's used in serial communication and conforms to the RS-232 standard.
DB-9 connector
A type of connector with nine pins that's used in serial communication and conforms to the RS-232 standard.
STP (shielded twisted pair)
A type of copper-based cable containing twisted-pair wires that are not only individually insulated, but are also surrounded by a shielding made of a metallic substance such as foil.
UTP (unshielded twisted pair)
A type of copper-based cable that consists of one or more insulated twisted-pair wires encased in a plastic sheath, which does not contain additional shielding for the twisted pairs.
UPC (Ultra Polished Connector)
A type of ferrule in which the tip has been highly polished, thereby increasing the efficiency of the connection.
MMF (multimode fiber)
A type of fiber-optic cable containing a core that is usually 50 or 62.5 microns in diameter, over which many pulses of light generated by a laser or LED (light-emitting diode) travel at different angles.
SMF (single mode fiber)
A type of fiber-optic cable with a narrow core of 8 to 10 microns in diameter that carries light pulses along a single path from one end of the cable to the other end.
crosstalk
A type of interference caused by signals traveling on nearby wire pairs infringing on another pair's signal.
EMI (electromagnetic interference)
A type of interference that can be caused by motors, power lines, televisions, copiers, fluorescent lights, or other sources of electrical activity.
FDM (frequency division multiplexing)
A type of multiplexing that assigns a unique frequency band to each communications subchannel. Signals are modulated with different carrier frequencies, then multiplexed to simultaneously travel over a single channel.
STDM (statistical time division multiplexing)
A type of multiplexing that assigns time slots to nodes (similar to TDM), but then adjusts these slots according to priority and need.
mesh topology
A type of network in which several nodes are directly interconnected and no single node controls communications on the network.
dual stacked
A type of network that supports both IPv4 and IPv6 traffic.
110 block
A type of punchdown block designed to terminate Cat 5 or better twisted-pair wires and typically used to handle data connections rather than telephone connections. The numeral refers to the model number of the earliest blocks.
66 block
A type of punchdown block designed to terminate telephone connections. The numeral refers to the model number of the earliest blocks.
link-state routing protocol
A type of routing protocol that enables routers to share information beyond neighboring routers, after which each router can independently map the network and determine the best path between itself and a message's destination node.
EGP (exterior gateway protocol)
A type of routing protocol used by edge routers and exterior routers to distribute data outside of autonomous systems. BGP is the only modern example of an exterior gateway protocol.
IGP (interior gateway protocol)
A type of routing protocol, such as OSPF and IS-IS, used by core routers and edge routers within autonomous systems.
duplex
A type of transmission in which signals may travel in both directions over a medium simultaneously.
full-duplex
A type of transmission in which signals may travel in both directions over a medium simultaneously; also called, simply, duplex.
IP address
A unique Network layer address assigned to each node on a TCP/IP network. IPv4 addresses consist of 32 bits divided into four octets, or bytes. IPv6 addresses are composed of eight 16-bit fields, for a total of 128 bits.
extension identifier
A unique set of characters assigned to each NIC by its manufacturer.
PDU (protocol data unit)
A unit of data at any layer of the OSI model.
dig (domain information groper)
A utility available on Linux and macOS that provides more detailed domain information than nslookup. Use dig to query DNS nameservers for information about host addresses and other DNS records.
SPF (Sender Policy Framework)
A validation system that helps fight spam by identifying the email servers allowed to send email on behalf of a domain.
routing cost
A value assigned to a particular route as judged by the network administrator; the more desirable the path, the lower its cost.
LDAPS (Lightweight Directory Access Protocol over SSL)
A version of LDAP that uses SSL to encrypt its communications with network directories and clients.
TLS (Transport Layer Security)
A version of SSL standardized by the IETF (Internet Engineering Task Force). It uses slightly different encryption algorithms than SSL, but otherwise is very similar to the most recent version of SSL.
patch panel
A wall- or rack-mounted panel where cables converge in one location.
wiki
A website that can be edited by users.
A routing protocol's reliability and priority are rated by what measurement?
AD
What is the name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?
AD (Active Directory)
A technique known as slotted ________ organizes time on the channel into uniform slots whose size equals the frame transmission time. Transmission is permitted to begin only at a slot boundary.
ALOHA
a technique known as slotted _____ organizes time on the channel into uniform slots whose size equals the frame transmission time. transmission is permitted to begin only at a slot boundary
ALOHA
Which IoT wireless standard is used to sync data from a smartwatch, bike computer, and smart phone to a single user account?
ANT+
With ________, routing decisions that are made change as conditions on the network change.
Adaptive routing
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
All devices on your local network
MDF (main distribution frame or main distribution facility)
Also known as the main cross connect, the centralized point of interconnection between an organization's LAN or WAN and a service provider's facility.
DHCP (Dynamic Host Configuration Protocol)
An Application layer protocol in the TCP/IP suite that manages the dynamic distribution of IP addresses on a network.
SNMP (Simple Network Management Protocol)
An Application layer protocol in the TCP/IP suite used to monitor and manage devices on a network.
SMTP (Simple Mail Transfer Protocol)
An Application layer protocol responsible for moving messages from one email server to another.
HTTP (Hypertext Transfer Protocol)
An Application layer protocol that formulates and interprets requests between web clients and servers.
RDP (Remote Desktop Protocol)
An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. It also carries session, licensing, and encryption information.
POP3 (Post Office Protocol, version 3)
An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP, messages previously stored on the mail server are downloaded to the client's workstation, and then deleted from the mail server. The most commonly used form of POP.
FTP (File Transfer Protocol)
An Application layer protocol used to send and receive files via TCP/IP.
OSPF (Open Shortest Path First)
An IGP and link-state routing protocol that makes up for some of the limitations of RIP and can coexist with RIP on a network.
loopback address
An IP address reserved for communicating from a node to itself, used mostly for troubleshooting purposes.
dynamic IP address
An IP address that is assigned to a device upon request and may change when the DHCP lease expires or is terminated.
link local address
An IP address that is automatically assigned by an operating system to allow a node to communicate over its local subnet if a routable IP address is not available.
static IP address
An IP address that is manually assigned to a device and remains constant until it is manually changed.
DHCP reservation
An IP address that is set aside by a DHCP server for a specific network client, which is identified by its MAC address.
IP reservation
An IP address that is set aside by a DHCP server for a specific network client, which is identified by its MAC address.
MAC reservation
An IP address that is set aside by a DHCP server for a specific network client, which is identified by its MAC address.
public IP address
An IP address that is valid for use on public networks, such as the Internet.
classful addressing
An IP addressing convention that adheres to network class distinctions, in which the first 8 bits of a Class A address, the first 16 bits of a Class B address, and the first 24 bits of a Class C address are used for network information.
global address
An IPv6 address that can be routed on the Internet. These addresses are similar to public IPv4 addresses. Most begin with the prefix 2000::/3, although other prefixes are being released.
EIGRP (Enhanced Interior Gateway Routing Protocol)
An advanced distance-vector protocol developed by Cisco that combines some of the features of a link-state protocol and so is sometimes referred to as a hybrid protocol.
remote application
An application that is installed and executed on a server, and is presented to a user working at a client computer.
header
An area at the beginning of a payload where protocols add control information.
DMZ (demilitarized zone)
An area on the perimeter of a network that is surrounded by two firewalls—an external firewall that is more porous to allow more types of access, and an internal firewall that is more hardened to provide greater protection to the internal network.
DKIM (DomainKeys Identified Mail)
An authentication method that uses encryption to verify the domain name of an email's sender.
static electricity
An electrical charge at rest. When that charge is transferred between two bodies, it creates an electrostatic discharge, or ESD.
VoIP endpoint
An end user device or application that gives the user access to VoIP services on a network.
process
An instance of running a computer application or service.
continuity tester
An instrument that tests whether voltage (or light, in the case of fiber-optic cable) issued at one end of a cable can be detected at the opposite end of the cable. Also called cable checker or cable tester.
ifconfig
An interface configuration and management utility used with UNIX and Linux systems.
session
An ongoing conversation between two hosts.
forwarding DNS server
An optional server that receives queries from local clients but doesn't work to resolve the queries.
hub
An outdated connectivity device that belongs to the Physical layer of the OSI model and retransmits incoming data signals to its multiple ports.
Cat 3 (Category 3)
An outdated form of UTP that contained four wire pairs and could carry up to 10 Mbps, with a possible bandwidth of 16 MHz.
short circuit
An unwanted connection, such as when exposed wires touch each other.
RIPv2 (Routing Information Protocol version 2)
An updated version of the original RIP routing protocol that generates less broadcast traffic and functions more securely than its predecessor. However, it's packet forwarding is still limited to a maximum 15 hops.
link
Any LAN (local area network) bounded by routers.
local link
Any LAN (local area network) bounded by routers.
server
Any computer or application that provides a service, such as data or other resources, to other devices.
node
Any computer or other device on a network that can be addressed on the local network.
fire suppression system
Any system designed to combat the outbreak of a fire. A fire suppression system might include an emergency alert system, fire extinguishers, emergency power-off switch, and/or a suppression agent such as a foaming chemical or water.
List three IGPs (interior gateway protocols).
Any three) RIP, RIPv2, OSPF, IS-IS, EIGRP
The ________ layer contains the logic needed to support the various user applications.
Application
Network Layer
At which OSI layer does IP operate?
Which routing protocol does an exterior router use to collect data to build its routing tables?
BGP
A key parameter that characterizes any electromagnetic signal is ________, which is the width of the range of frequencies that comprises the signal.
Bandwidth
Which transmission characteristic is never fully achieved?
Bandwidth
Why is it important to use plenum-rated cabling in the area above the ceiling tile?
Because it is coated with a flame-resistant jacket that produces less smoke when on fire
The objective of congestion control is to maintain the number of packets within the network ________ the level at which performance falls off dramatically.
Below
A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?
Bluejacking
With ________, a station wishing to transmit first listens to the medium to determine if another transmission is in progress. If the medium is in use, the station must wait. If the medium is idle, the station may transmit.
CSMA
with _____, a station wishing to transmit first listens to the medium to determine if another transmission is in progress. if the medium is in use, the station must wait, if the medium is idle, the station may transmit
CSMA
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CA
A ________ is a collection of interconnected access points with a software protocol structure that enables communication.
Carrier access station
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
Cat 5e, Cat 6a, Cat 7
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
Cat 6a
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Checksum
In a ________ network, a dedicated communications path is established between two stations through the nodes of the network. The telephone network is the most common example.
Circuit switching
With ________ a dedicated path is established between two stations for communication.
Circuit switching network
Which Bluetooth class has the highest power output?
Class 1
A dominant architecture in the business environment and the more recent Web-focused intranet trend is ________ computing.
Client/ server
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
Coaxial cable, F-connector
When the number of packets being transmitted through a network begins to approach the packet handling capacity of the network, ________ occurs.
Congestion
What four functions do all routers perform?
Connect dissimilar networks, Interpret Layers 3 and 4 addressing and other information, Determine the best path for data to follow, Reroute traffic if a primary path is down but another path is available
grounding
Connecting a device directly to the earth so that, in the event of a short circuit, the electricity flows into the earth rather than out of control through the device.
trailer
Control information attached to the end of a packet by a Data Link layer protocol.
FEXT (far end crosstalk)
Crosstalk measured at the far end of the cable from the signal source.
NEXT (near end crosstalk)
Crosstalk that occurs between wire pairs near the source of a signal.
upset failure
Damage that can shorten the life of a component and/or cause intermittent errors.
Which OSI layer is considered the media access control layer?
Data layer (link)
client-server application
Data or a service requested by one computer from another.
payload
Data that is passed between applications or utility programs and the operating system, and includes control information.
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
Data transfer rate (bandwidth)
IP attaches a header to upper layer data to form an IP ________.
Datagram
In the ________ approach in packet switching each packet is treated independently with no reference to packets that have gone before.
Datagram
Dynamic use of bandwidth is utilized with ______
Datagram packet switching and virtual circuit packet switching allocation
________ is determined by whether the routing decision is made on a packet or virtual circuit basis.
Decision time
BGP (Border Gateway Protocol)
Dubbed the "protocol of the Internet," this path-vector routing protocol is the only current EGP and is capable of considering many factors in its routing metrics.
What is the difference between dynamic ARP table entries and static ARP table entries?
Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility.
Electronic mail, remote logon, network management and Web access are examples of ________ applications.
Elastic
alien crosstalk
Electromagnetic interference induced on one cable by signals traveling over a nearby cable.
A device attached to one of the networks of an internet that is used to support end user applications or services is ________.
End system (ES)
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?
Entrance facility
Troubleshooting utilities and tools
Event Viewer, ping, ipconfig, ifconfig (Linux only), nslookup, and dig (Linux only)
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the WiFi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Evil twin
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?
FE80::/10
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
FHSS (frequency hopping spread spectrum)
Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
False
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
Fiber type mismatch
A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ________.
Flow control
________ enables a receiver to regulate the flow of data from a sender so that the receiver's buffers do not overflow.
Flow control (provided by tcp)
patch, upgrade, rollback, and installation
Four types of software changes
The process in which a protocol may need to divide a block received from a higher layer into multiple blocks of some smaller bounded size is called ________.
Fragmentation
The ________ multiplexing is the most heavily used. A familiar example is broadcast and cable television.
Frequency-division multiplexing (FDM) or Time-division multiplexing
Two stations can simultaneously send and receive data from each other with ________ transmission.
Full-duplex
When a router can't determine a path to a message's destination, where does it send the message?
Gateway of last resort
QSFP+
Generally the same technology as QSFP while supporting data rates over 40 Gbps.
4094
Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets needed . If 20 bits are used to identify the network and subnet, that leaves 12 bits to identify each host. Using the formula 2h - 2 = Z, how many host addresses are possible in each subnet? (You may use calculator for this step).
172.20.240.1 through 172.20.255.254
Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets needed . What is the range of host addresses for the last subnet?
172.20.16.0/20
Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets needed List all the subnets on a separate piece of paper and answer the following question -. What is the CIDR notation for the second subnet's network ID?
255.255.240.0
Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets needed You can now calculate the subnet mask. The default subnet mask for a Class B network is 255.255.0.0, and so the third octet is the one that will change. What is the subnet mask for these subnets, written in decimal?
16
Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets neeed. What is the incremental subnet variable (aka magic number) that you add to each Network ID to get the next NW ID that starts the next subnet range?
172.16.0.0
Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host?
In the client-server model, what is the primary protocol used for communication between a browser and web server?
HTTP
Which of the following protocols guarantees a secure transmission
HTTPS
Z-Wave
Healing messages are a feature of what smart home protocol?
What feature of a site survey maps the Wi-Fi signals and other noise in your location?
Heat maps
What three routing metrics used by routers to determine the best of various available routing paths?
Hop count, theoretical bandwidth, path latency (or delay)
24
How many bits of a Class A IP address are used for host information?
topology
How the parts of a whole work together.
For the routing function to work, an increased number of ________ must be exchanged between nodes to alert each other to areas of congestion.
ICMP Messages
Which two protocols manage neighbor discovery processes on IPv4 networks?
ICMP and ARP
Which email protocol allows an email client to read mail stored on the mail server?
IMAP4
At the Network layer, what type of address is used to identify the receiving host?
IP address
private IP address
IP addresses that can be used on a private network but not on the Internet. IEEE recommends the following IP address ranges for private use: 10.0.0.0 through 10.255.255.255; 172.16.0.0 through 172.31.255.255; and 192.168.0.0 through 192.168.255.255.
domain
If your computer is not a member of a _______, you can determine and adjust the time server your computer syncs to when it connects to the Internet
Spoofing
Impersonating a MAC address is known as MAC
collision
In Ethernet networks, the interference of one node's data transmission with the data transmission of another node sharing the same segment.
subnet mask
In IPv4 addressing, a 32-bit number that helps one computer find another by indicating what portion of an IP address is the network and subnet portion and what portion is the host portion.
netmask
In IPv4 addressing, a 32-bit number that helps one computer find another by indicating what portion of an IP address is the network portion and what portion is the host portion.
sliding window
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?
In a large organization, how do you typically request permission to perform a network change?
In a large organization, when requesting a network change you may want to first submit a change request document, then understand and follow the approval process, have the change project-managed, provide additional documentation, and close the change.
bit rate
In digital transmissions, a measurement of throughput and bandwidth that is expressed as bits transmitted per second.
domain
In the context of Windows Server NOSes, a group of users, servers, and other resources that share account and security policies.
Which one of the following wireless transmission types requires a clear LOS to function?
Infrared
MSDS (material safety data sheet)
Instructions provided with dangerous substances that explain how to properly handle these substances and how to safely dispose of them. Also called SDS (safety data sheet).
How does refraction affect the propagation of a wireless transmission?
It distorts the signal as it travels into and through a different transmission medium
true
It's important to understand the specifics covered—and not covered—in a particular document before signing it (TRUE/FALSE)
trip hazard
Items such as extension cords or tools lying on the ground in walkways that can cause someone to stumble.
What database does a router consult before determining the most efficient path for delivering a message?
Its routing table
True
Latency on data networks is based on a calculation of a packet's round trip time (RTT).
A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
Layer 1: Physical Layer, Layer 2: Data Link Layer
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Layer 3
A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you begin troubleshooting?
Layer 5: Session Layer
A user complains that Skype drops her videoconference calls and she must reconnect. Which OSI layer is responsible for not dropping the Skype connection?
Layer 7: Application Layer
A user complains that he cannot access a particular website, although he is able to access other websites. At which layer of the OSI model should you begin troubleshooting this problem?
Layer 7: Application Layer
To provide seamless flow of data across networks that comprise an Internet, an elaborate scheme called a(n) ________ is used.
Layered protocol
Throughput, the actual speed of data transfer that is achieved in a network, is usually ________.
Less than the data transfer rate
What is the first step of inventory management?
List all components on the network
broadcast domain
Logically grouped network nodes that can communicate directly via broadcast transmissions. By default, switches and repeating devices, such as hubs, extend broadcast domains. Routers and other Layer 3 devices separate broadcast domains.
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demarc
At the Data Link layer, which type of network address is used to identify the receiving node? (select multiple)
MAC address, physical address, hardware address, or Data Link layer address
There is only one ________ per network, but there can be many ________ connecting internal portions of the network.
MDF, IDFs
Which fiber connector contains two strands of fiber in each ferrule?
MTRJ
large
Make sure the DHCP scope is _______ enough to account for the number of clients the network must support
The simplest criterion in the selection of a route is to choose the ________.
Min hop route
Why is it important to minimize cable clutter in a rack?
Minimizing cable clutter can help prevent airflow blockages
True
Multimode fiber contains a core that is larger than a single mode fiber core.
Which protocol is supported by ICMPv6 to facilitate neighbor discovery on an IPv6 network?
NDP (Neighbor Discovery Protocol)
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
NFC
Which protocol is supported by ICMPv6 to facilitate neighbor discovery on an IPv6 network?
Neighbor Discovery Protocol (NDP)
What are some elements that are typically included in network diagrams?
Network diagrams may show physical layout, logical topology, IP address reserves, names of major network devices, and types of transmission data.
The ________ element represents the functions and hardware needed to connect digital devices such as data processing devices and digital telephones to the network.
Network interface
Which OSI layer is responsible for adding a header that includes routing information?
Network/ 3rd layer
Each device connected to a network is called a(n) ________.
Node
A Managed Switch
On which networking device do you configure VLANs?
octet
One of 4 bytes that are separated by periods and together make up an IPv4 address.
IP exclusion
One or more IP addresses used for static IP assignments and excluded from the IP address pool so the server doesn't offer those IP addresses to other clients.
Which email protocol allows an email client to download email messages to the local computer?
POP3
A network in which small chunks of data are passed through the network from node to node, and at each node the entire data chunk is received, stored briefly, and then transmitted to the next node, is a ________ network.
Packet switching
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Patch cable
At what layer of the OSI model do the 802.11 standards vary?
Physical Layer
Which two fields in an Ethernet frame help synchronize device communications but are not counted toward the frame's size?
Preamble and SFD
firmware
Programs embedded into hardware devices.
routing metric
Properties of a route used by routing protocols to determine the best path to a destination when various paths are available. They may be calculated using any of several variables, including hop count, bandwidth, delay, MTU, cost, and reliability.
The ________ time is the time it takes for a bit to traverse the link between source and destination.
Propogation
In the URL http://www.prenhall.com, the portion labeled http is the ________.
Protocol
Pick three IGPs (interior gateway protocols).
RIPv2, OSPF, EIGRP
How is latency measured, and in what unit?
RTT (round trip time), and in milliseconds.
What is the unit of measurement that defines the space available in a rack? How tall are standard racks?
Rack Unit (RU); 42 units tall
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Rack ears
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Remote Desktop
decapsulation
Removing a header or trailer from a lower OSI layer.
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100- acre campus. What kind of threat do you need to report to your boss?
Rogue AP
Which computers are the highest authorities in the Domain Name System hierarchy?
Root Server
A ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.
Router
A(n) ________ allows sharing of a broadband Internet connection.
Router
routing metrics
Routers use ________ to determine the best route for messages to take across networks
Which of the following devices are you likely to find in the MDF? Choose all that apply.
Routers, Switches, KVM switch
The ________ function attempts to find the least cost route through the network.
Routing
static and dynamic routing
Routing paths are determined by:
What database does a router consult before determining the most efficient path for delivering a message?
Routing table
Which fiber transceiver is the same size as SFP transceivers, but can support network speeds over 10 Gbps?
SFP+
___ Provides a basic electronic mail transport facility
SMTP
________ provides a basic electronic mail transport facility.
SMTP
Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower _________ due to the higher proportion of noise.
SNR(signal-to-noise ratio)
Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
SSL and TLS
Which kind of multiplexing assigns slots to nodes according to priority and need?
STDM (statistical time division multiplexing)
The "s" in https stands for ________.
Secure
Data Link layer address
See MAC (Media Access Control) address.
hardware address
See MAC (Media Access Control) address.
physical address
See MAC (Media Access Control) address.
device ID
See extension identifier.
Simplex
Signals that can travel in only one direction on a medium are referred to as what type of signal?
Which of the following is the distinguishing feature of local area networks?
Single location
open source
Software whose code is publicly available for use and modification.
scope options
Specific configuration information, such as a time limit and a default gateway IP address, that is shared from a DHCP server along with an IP address assignment.
The effect of the ________ is to erase the portion of the host field that refers to an actual host on a subnet, leaving the network number and the subnet number.
Subnet mask
Subnetting operates at Layer 3 VLANs function at Layer 2
Subnetting operates at Layer ________ while VLANs function at Layer _______.
White/Green
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
4, 20
Suppose your organization uses the Class B network ID of 172.20.0.0 for its entire network and wants to create 15 subnets. You first need to decide how many bits to borrow from the host address bits. Recall that you can use the formula 2n = Y. For the new subnets, how many bits must be borrowed from the host address portion? How many bits total will be used for identifying a host's subnet?
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
Switch
fail open
System default that allows access during a system or network failure.
fail close
System default that denies access during a system or network failure.
Which protocol's header would a Layer 4 device read and process?
TCP
What three characteristics about TCP distinguish it from UDP?
TCP is connection-oriented, Uses sequencing and checksums, Provides flow control
What three characteristics about TCP distinguish it from UDP?
TCP is connection-oriented, uses sequencing and checksums, and provides flow control.
The ________ protocol architecture is a result of protocol research and development conducted on the experimental packet switched network ARPANET.
TCP/IP
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.
TCP/IP
the ____ protocol architecture is a result of protocol research and development conducted on the experimental packet switched network ARPANET
TCP/IP
the protocols used on the internet are arranged according to a structure known as the ____ protocol architecture
TCP/IP
registered jack 11 (RJ-11)
Telephone connections follow what registered jack standard?
subnet ID
The 16 bits, or one block, in an IPv6 address that can be used to identify a subnet on a large corporate network.
AD DS (Active Directory Domain Services)
The Active Directory service that manages the process allowing a user to sign on to a network from any computer on the network and get access to the resources that Active Directory manages.
EUI-64 (Extended Unique Identifier-64)
The IEEE standard defining 64-bit physical addresses. In this scheme, the OUI portion of an address is 24 bits in length. A 40-bit extension identifier makes up the rest of the physical address, for a total of 64 bits.
802.3at
The IEEE standard that improves upon the older 802.3af by supplying more power (up to 25.5 watts) over Ethernet connections.
802.3af
The IEEE standard that specifies a way of supplying electrical power (up to 15.4 watts) over twisted-pair Ethernet connections, also known as PoE (Power over Ethernet).
IPv4 (Internet Protocol version 4)
The Internet Protocol standard released in the 1980s and still commonly used on modern networks. It specifies 32-bit addresses composed of four octets.
False
The LLC sublayer is primarily concerned with managing MAC addresses in message frames.
Which part of a MAC address is unique to each manufacturer?
The OUI
registered port
The TCP/IP ports in the range of 1024 to 49,151. These ports can be used by network users and processes that are not considered standard processes. Default assignments of these ports must be registered with IANA.
well-known port
The TCP/IP ports numbered 0 to 1023, so named because they were long ago assigned by Internet authorities to popular services and are, therefore, well known and frequently used.
HTTPS (HTTP Secure)
The URL prefix that indicates a web page requires its data to be exchanged between client and server using SSL or TLS encryption.
route
The ______ command allows you to view a host's routing table
continuity
The ability of a cable to carry a signal to its destination.
spoofing
The act of impersonating fields of data in a transmission, such as when a source IP address is impersonated in a DRDoS attack.
throughput
The amount of data that a medium transmits during a given period of time. It is usually measured in megabits (1,000,000 bits) per second, or Mbps.
bandwidth
The amount of data that could theoretically be transmitted during a given period of time.
plenum
The area above the ceiling tile or below the subfloor in a building.
primary DNS server
The authoritative name server for an organization, which holds the authoritative DNS database for the organization's zones. This server is contacted by clients, both local and over the Internet, to resolve DNS queries for the organization's domains.
authoritative server
The authority on computer names and their IP addresses for computers in their domains.
secondary DNS server
The backup authoritative name server for an organization.
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
The caching and primary DNS server because the caching server is requesting zone transfers from the primary server
backbone
The central conduit of a network that connects network segments and significant shared devices (such as routers, switches, and servers) and is sometimes referred to as "a network of networks."
AD (Active Directory)
The centralized directory database that contains user account information and security for the entire group of computers on a network.
Ethernet II
The current Ethernet standard. It is distinguished from other Ethernet frame types in that it contains a 2-byte type field to identify the upper-layer protocol contained in the frame.
optical loss
The degradation of a light signal on a fiber-optic network as it travels away from its source.
latency
The delay between the transmission of a signal and its receipt.
switch
The determination of how connections are created between nodes on a network.
NIC (network interface card)
The device that enables a workstation to connect to the network and communicate with other computers. They are manufactured by several different companies and come with a variety of specifications that are tailored to the workstation's and the network's requirements. They are also called network adapters.
resource record
The element of a DNS database stored on a name server that contains information about TCP/IP host names and their addresses.
frame
The entire Data Link layer message, including the header, payload, and trailer.
packet
The entire Network layer message, which includes the segment (TCP) or datagram (UDP) from the Transport layer, plus the Network layer header.
ferrule
The extended tip of a fiber-optic cable connector that encircles the fiber strand to keep it properly aligned and ensure that it makes contact with the receptacle in a jack or other connector.
Session layer
The fifth layer in the OSI model. The Session layer describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
host name
The first part of an FQDN, such as www or ftp, which identifies the individual computer on the network.
the network
The first part of an IPv4 address identifies ______
Transport layer
The fourth layer of the OSI model. The Transport layer is responsible for transporting Application layer payloads from one application to another.
default gateway
The gateway device that nodes on the network turn to first for access to the outside world.
cladding
The glass or plastic shield around the core of a fiber-optic cable. It reflects light back to the core in patterns that vary depending on the transmission mode.
MTU (maximum transmission unit)
The largest IP packet size in bytes that routers in a message's path will allow without fragmentation and excluding the frame.
interface ID
The last 64 bits, or four blocks, of an IPv6 address that uniquely identify the interface on the local link.
TLD (top-level domain)
The last part of an FQDN and the highest-level category used to distinguish domain names—for example, .org, .com, and .net. It is also known as the domain suffix.
domain name
The last two parts of an FQDN, such as mycompany.com. Usually, it is associated with the company's name and its type of organization, such as a university or military unit.
APC (Angle Polished Connector)
The latest advancement in ferrule technology that uses the principles of reflection to its advantage by placing the end faces of the highly polished ferrules at an angle to each other, thus reducing the effect of back reflection.
RTT (round trip time)
The length of time it takes for a packet to go from sender to receiver, then back from receiver to sender. RTT is usually measured in milliseconds.
entrance facility
The location where an incoming network service (whether phone, Internet, or long-distance service) enters a building and connects with the building's backbone cabling.
attenuation
The loss of a signal's strength as it travels away from its source.
Physical layer
The lowest, or first, layer of the OSI model. The Physical layer is responsible only for sending bits via a wired or wireless transmission.
OSHA (Occupational Safety and Health Administration)
The main federal agency charged with regulating safety and health in the workplace.
routing protocol
The means by which routers communicate with each other about network status. They determine the best path for data to take between networks.
LC (local connector)
The most common 1.25-mm ferrule connector, which is used with single-mode, fiber-optic cable.
MTRJ (Mechanical Transfer-Registered Jack)
The most common type of connector used with multimode fiber-optic cable.
best path
The most efficient route from one node on a network to another, as calculated by a router.
BIND
The most popular DNS server software
ICANN (Internet Corporation for Assigned Names and Numbers)
The nonprofit corporation currently designated by the U.S. government to maintain and assign IP addresses.
hop limit
The number of times that an IPv6 packet can be forwarded by routers on the network; similar to the TTL field in IPv4 packets.
twist ratio
The number of twists per meter or foot in a twisted-pair cable.
RIP (Routing Information Protocol)
The oldest routing protocol that is still widely used. It is a distance-vector protocol that uses hop count as its routing metric and allows up to only 15 hops.
physical topology
The physical layout of the media, nodes, and devices on a network. It does not specify device types, connectivity methods, or addressing schemes.
pinout
The pin numbers and color-coded wire assignments used when terminating a cable or installing a jack, as determined by the TIA/EIA standard.
demarc (demarcation point)
The point of division between a telecommunications service carrier's network and a building's internal network.
licensing restrictions
The portion of a software license that limits what a product can be used for.
collision domain
The portion of an Ethernet network in which collisions could occur if two nodes transmit data at the same time. Today, switches and routers separate these.
network ID
The portion of an IP address common to all nodes on the same network or subnet.
host ID
The portion of an IP address that identifies the host on a network.
node ID
The portion of an IP address that identifies the node on a network.
DHCP pool
The predefined range of addresses that can be leased to any network device on a particular segment.
API (application programming interface) call
The process an application uses to make a request of the OS.
encapsulation
The process of adding a header to data inherited from the layer above.
system life cycle
The process of designing, implementing, and maintaining an entire network.
name resolution
The process of discovering the IP address of a host when the FQDN is known.
tunneling
The process of encapsulating one type of protocol in another. Tunneling is the way in which higher-layer data is transported over VPNs by Layer 2 protocols.
inventory management
The process of monitoring and maintaining all the assets that make up a network.
patch management
The process of monitoring the release of new patches, testing them for use on networked devices, and installing them.
rollback
The process of reverting to a previous version of a software application after attempting to patch or upgrade it.
scalable
The property of a network that allows an administrator to add nodes or increase its size easily.
VoIP (Voice over IP)
The provision of telephone service over a packet-switched network running the TCP/IP protocol suite.
gateway of last resort
The router on a network that accepts all unroutable messages from other routers.
Data Link layer
The second layer in the OSI model. The Data link layer, also called the Link layer, bridges the Physical layer's networking media with Network layer processes.
Application layer
The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.
Diffraction has what affect on a wireless signal's propagation?
The signal is split into secondary waves that continue in the direction in which they split
distance-vector routing protocol
The simplest type of routing protocols; used to determine the best route for data based on the distance to a destination.
Presentation layer
The sixth layer of the OSI model. Protocols in the Presentation layer are responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
NOS (network operating system)
The software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. Popular examples of network operating systems are Windows Server, Ubuntu Server, and Red Hat Enterprise Linux.
RJ-45 (registered jack 45)
The standard connector used with shielded twisted-pair and unshielded twisted-pair cabling.
RJ-11 (registered jack 11)
The standard connector used with unshielded twisted-pair cabling (usually Cat 3) to connect analog telephones.
Why is it important to use a structured cabling standard when installing and managing cabling systems?
The structured cabling standard describes the best way to maximize performance and minimize upkeep.
Network layer
The third layer in the OSI model. The Network layer, sometimes called the Internet layer, is responsible for moving messages between networks.
convergence time
The time it takes for a router to recognize a best path in the event of a change or network outage.
ESD (electrostatic discharge)
The transfer of electrical charge between two bodies, such as when a technician touches a computer component.
hop
The trip a unit of data takes from one connectivity device to another. Typically, it is used in the context of router-to-router communications.
canonical name
The true name of a server, such as www.example.com, as opposed to one of many alias names a server might have, such as ns1.example.com.
console port
The type of port on a router used to communicate with the router itself, such as when making configuration changes to the device.
Ethernet port
The type of port that connects devices on a LAN; it uses an RJ-45 connector.
ipconfig
The utility used to display and alter TCP/IP addressing and domain name information in the Windows client operating systems.
DHCPv6
The version of DHCP used with IPv6.
ICMPv6
The version of ICMP used with IPv6 networks. It performs the functions that ICMP, IGMP, and ARP perform in IPv4. It detects and reports data transmission errors, discovers other nodes on a network, and manages multicasting.
When a wireless signal encounters a large obstacle, what happens to the signal?
The wave may pass through the object if the object allows otherwise the signal may experience certain phenomena, depending on the object such as fading, attenuation, interference, refraction, reflection, scattering or diffraction
What process is used to establish a TCP connection?
Three-way handshake
The key features of a protocol are: syntax, semantics and ________.
Timing
routing protocols
To communicate with each other, routers use ____________ that are similar to scouting parties, exploring unknown territories, and collecting data about current network status
internetwork
To traverse more than one LAN segment and more than one type of network through a router.
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Tone locator
The term ________ refers to the way in which the end points, or stations, attached to the network are interconnected.
Topology
multicast
Transmissions in which one host sends messages to multiple hosts.
Which OSI layer combines messages or segments into packets?
Transport layer
The ________ layer of the TCP/IP protocol architecture is said to provide reliable internet transport.
Transport/ 4th layer
All wireless signals are carried through the air by electromagnetic waves.
True
An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.
True
neighbors
Two or more nodes on the same link.
Private IP addresses ________.
Usually on LAN
How can you go about gathering the information needed to assemble a thorough operations manual?
Visits to data rooms, an examination of servers and desktops, a review of receipts for software and hardware purchases, and the use of a protocol analyzer or network management software package
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
VoIP gateway
Computers that reside in different geographic locations are connected using a
WAN
What is the fundamental distinction between a MAN and a WAN?
WANs expand over a larger geographical area than MANs; MANs cover a small geographical area. WANs cover a large geographical area
PPE (personal protective equipment)
Wearable equipment such as goggles that might be required in the workplace to increase safety of workers.
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
Web servers
management frames
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
DMZ (Demilitarized zone)
What area of a network can provide less stringent security so a web server is more accessible from the open Internet?
Network documentation is easier to manage
What do well-chosen subnets accomplish?
Checksum
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Cat 6a
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
10GBASE-T
What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?
2h - 2 = Z
What is the formula for determining the number of possible hosts on a network?
8
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
10 Gbps
What is the maximum supported throughput of a CAT6 cable?
Cat 5e
What is the minimum category of UTP cable required in order to support Gigabit speeds?
172.16.32.0/24
What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0?
naming them systematically and then labeling them with those names
What is the secret to keeping track of devices?
Coaxial cable, F-connector
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
Multimeter
What kind of tool can you use to measure voltage on a cable length?
Static settings might be using the wrong information; Try switching to DHCP
What should you do if the computer is not obtaining an IP address and related information from a DHCP server?
Jitter is what happens when packets experience varying amounts of delay and arrive out of order.
What statement correctly describes "jitter"?
Power over Ethernet requires CAT6 or better copper cable.
What statement regarding the Power Over Ethernet standards is inaccurate?
fiber type mismatch
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
3/8 of an inch
When terminating an Ethernet cable, about how far should the cable sheath extend into the plug?
white/orange, orange, white/green, blue, white/blue, green, white/brown, brown
When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?
802.1Q
Which IEEE standard determines how VLANs work on a network?
VLSM (variable length subnet mask)
Which IP addressing technique subnets a subnet to create subnets of various sizes?
Management VLAN
Which VLAN is designed to support administrative access to networking devices?
Native VLAN
Which VLAN on a switch manages untagged frames?
MTRJ
Which fiber connector contains two strands of fiber in each ferrule?
256 - the interesting octet 2^h
Which formulas can be used to calculate the magic number? Choose two. Note: h is the number of host bits remaining ; n is the number of host bits borrowed
The fourth one
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
NEXT
Which kind of crosstalk occurs between wire pairs near the source of the signal?
STDM (statistical time division multiplexing)
Which kind of multiplexing assigns slots to nodes according to priority and need?
To increase the number of networking devices on a network
Which of the following is not a good reason to segment a network?
Cat 5e, Cat 6a, Cat 7
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
Tone Locator
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Trunk
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
TCP
Which protocol's header would a Layer 4 device read and process?
Bandwidth
Which transmission characteristic is never fully achieved?
DHCP relay agent
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs?
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
White/green
Computers that reside in different geographic locations are connected using a(n) ________.
Wide area network (WAN)
Why do wireless networks experience a greater reduction in throughput compared with wired networks?
Wireless networks operate at half duplex while wired networks can operate in full duplex which causes throughput to be lower in wireless connections then what is advertised for them. Also in the 802.11 data frame the Sequence Control field that handles packet fragmentation is error checked and handled at the Data link layer rather than the Networking Layer which slows down transmission more.
What type of diagram shows a graphical representation of a network's wired infrastructure?
Wiring schematic
TIA/EIA 568A
You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?
Local Connector
You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size?
You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply.
Zenmap, Command prompt, Powershell
Helpful TCP/IP utilities
__________ include ping, ipconfig, ifconfig, nslookup, dig, arp, route, netstat, tracert, traceroute, pathping, and tcpdump
ICMP
a Network layer core protocol that reports on the success or failure of data delivery
port number
a number, assigned to a process
DHCP scope
a range of addresses to be assigned to clients when they request an IPv4 address
Suppose you're assisting with a cable installation using fiber-optic cabling that will support Gigabit Ethernet. You're approved to install segments up to 4000 m in length. What kind of cable are you using?
a single mode fiber cable
TCP/IP
a suite of protocols that includes TCP, IP (IPv4 and IPv6), UDP, ARP, and many others
Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP and ARP b. IPv4 and IPv6 c. TCP and UDP d. BGP and OSPF
a. ICMP and ARP
with _____, routing decisions that are made change as condition on the network change
adaptive routing
Typical hardware changes
adding new security cameras, replacing old workstations, installing new printers, and upgrading IP phone hardware
IANA
an organization responsible for tracking the assignments of domain names, port numbers, and IP addresses
UDP
an unreliable, connectionless protocol that provides no delivery guarantees
The ____ layer contains the logic needed to support the various user applications
application layer
Specialized products
are available that monitor the critical factors of a data room's environment
Interior gateway protocols
are used by core routers and edge routers within an autonomous system
Which routing protocol does an exterior router use to collect data to build its routing tables? a. RIPv2 b. BGP c. OSPF d. IP
b. BGP
Which OSI layer is responsible for directing data from one LAN to another? a. Transport layer b. Network layer c. Data Link layer d. Physical layer
b. Network Layer
What kind of route is created when a network administrator configures a router to use a specific path between nodes? a. Trace route b. Static route c. Default route d. Best path
b. Static route
Which protocol's header would a Layer 4 device read and process? a. IP b. TCP c. ARP d. HTTP
b. TCP
cable continuity tester
battery operated and has two parts: The base unit that connects to one end of the cable and generates a voltage, and the remote unit that connects to the other end of the cable and detects the voltage
network
begins at the demark and ends at a workstation
the objective of congestion control is to maintain the number of packets within the network ____ the level at which performance falls off dramatically
below
Communications speeds are measured in ________.
bits or bps
communication speeds are measured in:
bits or bps
What is the Internet standard MTU? a. 65,535 bytes b. 1,522 bytes c. 1,500 bytes d. 9,198 bytes
c. 1,500 bytes
At which OSI layer does IP operate? a. Application layer b. Transport layer c. Network layer d. Data Link layer
c. Network Layer
What kind of tool can measure the distance to the location of damage in a cable?
cable performance tester
a ____ is a collection of interconnected access points with a software protocol structure that enables communication
carrier access point
In a ____ network, a dedicated communication path is established between two stations through the nodes of the network. The telephone network is the most common example
circuit switching
with ____ a dedicated path is established between two stations for communication
circuit switching
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support without the upgrade?
client-server
a dominant architecture in the business environment and the more recent web-focused intranet trend is ____ computing
client/server
Two frames interfering with each other at the receiver so that neither gets through is known as ________.
colision
Exterior gateway protocols
communicate between autonomous systems
Horizontal cabling
connects workstations to the closest data room and to switches housed in that room
backbone
consists of the cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs
MAC addresses
contain two parts, are 48 bits long, and are written in hexadecimal numbers separated by colons
What characteristic of optical transmissions is primarily responsible for the distance limitations of fiber-optic cabling?
cost and optical loss
A routing protocol's reliability and priority are rated by what measurement? a. Routing table b. MTU c. Latency d. AD
d. AD
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? a. Source port b. Acknowledgement number c. DiffServ d. Checksum
d. Checksum
When a router can't determine a path to a message's destination, where does it send the message?a. Default gateway b. Routing table c. Administrative distance d. Gateway of last resort
d. Gateway of last resort
The ____ is the maximum speed at which data can be transmitted between two nodes on a network
data transfer rate
in the ____ approach in packet switching each packet is treated independently with no reference to packets that have gone before
datagram
ip attaches a header to upper layer data to form an ip ______
datagram
____ is determined by whether the routing decision is made on a packet or virtual circuit basis
decision time
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?
default gateway
IPv6 addressing
designed so that a computer can autoconfigure its own link local IP address
IPv6 standards
developed to improve routing capabilities and speed communication over the established IPv4 standards
You are the network manager for a computer training center that allows students to bring their own laptops to class for learning and taking notes. Students need access to the Internet, so you have configured your network's DHCP server to issue IP addresses automatically. Which DHCP option should you modify to make sure you are not wasting addresses used by students who have left for the day?
dhcp lease
Which of these commands is available only in Linux?
dig
From the carrier's central office to the customer's site is ________
downstream
a device attached to one of the networks of an internet that is used to support end user applications or services is ____
end system
TCP and UDP ports
ensure that data is transmitted to the correct process among multiple process running on the computer
In a data link control protocol, ________ control is achieved by retransmission of damaged frames.
error
in a data link control protocol, _____ control is achieved by retransmission of the damaged frames
error
The principle conditions that influence routing decisions are ________.
failure and congestion
the principle conditions that influence routing decisions are
failure, congestion
_____ enables a receiver to regulate the flow of data from a sender so that the receivers buffers do not overflow
flow control
a function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ____
flow control
the process in which a protocol may need to divide a block received from a higher layer into multiple blocks of some smaller bounded size called
fragmentation
Data are sent in blocks called ________.
frames
To exchange information, two antennas must be tuned to the same ______________.
frequency
the ____ multiplexing is the most heavily used. A familiar example is broadcast and cable television
frequency-division
Two stations can simultaneously send and receive data from eachother with _____ transmission
full duplex
in ____ transmission signals are transmitted in only one direction; one station is the transmitter and the other is the receiver
half duplex
List some good names for devices on your home network or on the network in your school's lab. Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.
hec-02-ne-01-rtr2: HEC building, 2nd floor, northeast corner, rack number, type of device, number of the device
What is the fundamental distinction between a node and a host?
host is a computer that hosts a resource on the network; node is any computer that can be addressed on the network
Each device connected to a network is called a
host node
When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:80. Which Application layer protocol is in use for this session?
http
IP addresses
identify nodes at the Network layer
You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
ifconfig
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
ipconfig/release
What is a twist ratio, and why is it important?
it is the number of twists per foot. It is important because t he number of twists per foot in a pair of wires translates to the more resistant the pair will be to cross-talk or noise.
What fiber is used in fiber-optic cabling to protect the inner core and prevent the cable from stretching?
kevlar
to provide seamless flow of data across networks that comprise an internet, an elaborate scheme is called a ___ is used
layered protocol
Throughput, the actual speed of data transfer that is achieved in a network is usually
less than the data transfer rate
Network diagrams
may show physical layout, logical topology, IP address reserves, names of major network devices, and types of transmission media
OPM (optical power meter)
measures the amount of light power transmitted on a fiber-optic line
Multiple users employing the same transport protocol and distinguished by port numbers or service access points is ________.
multiplexing
multiple users employing the same transport protocol and distinguished by port numbers or service access points is ___
multiplexing
Which type of DNS record identifies an email server?
mx record
the ____ element represents the functions and hardware needed to connect digital devices such as data processing devices and digital telephones to a network
network interface
At which OSI layer does IP operate?
network layer
Enter the Name of the OSI Layer #3.
network layer
Which OSI layer is responsible for directing data from one LAN to another?
network layer
which osi layer is responsible for adding a header that includes routing information
network layer
While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?
nslookup
Data rooms
often serviced by HVAC systems that are separate from the rest of the building
IP
operates at the Network layer of the OSI model and specifies where data should be delivered
TCP
operates at the Transport layer and provides reliable data delivery
As packets arrive they are stored in the input buffer of the corresponding port, the node examines the packet, makes a routing decision, and then moves the packet to the appropriate ________.
output buffer
A network in which small chunks of data are passed through the network from node to node, and at each node the entire data chunk is received stored briefly and then transmitted to the next node, is a___ network
packet switching
dynamic use of bandwidth is utilized with
packet switching
data are sent in blocks called
packets
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
peer-to-peer
You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol handles your transmission?
pop3
Which type of address is used at the Transport layer to identify the receiving application?
port
FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port does an FTP server listen on?
port 21
the ____ time is the time it takes for a bit to traverse the link between source and destination
propagation
A(n) ________ is a set of rules that two communicating devices follow.
protocol
a ___ is a set of rules that 2 communicating devices follow
protocol
in the url http://www.prenhall.com, the http portion is the
protocol
________ has to do with the ability of the network to deliver packets via some route in the face of localized failures and overloads.
robustness
A ____ allows sharing of a broadband internet connection
router
a ___ is a special purpose computer that moves packet traffic according to the rules of the IP protocol
router
Dynamic routing
routes automatically calculated by the router
Static routing
routes configured by a network administrator
the _____ function attempts to find the least cost route through the network
routing
for the routing function to work, an increased number of ____ must be exchanged between nodes to alert eachother to areas of congestion
routing messages
toner
same as tone generator
toner probe
same as toner and probe kit.
The s in https stands for:
secure
What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work? (select two answers)
segment; datagram; Layer 4: Transport Layer
What is the difference between short circuits and open circuits?
short circuit is an unwanted connection, like exposed wires touching. Open circuit is one where needed connections are missing, like wire breaks.
Why is SMF more efficient over long distances than MMF?
signals traveling over MMF experience greater attenuation that those on SMF
In ________ transmission signals are transmitted in only one direction; one station is the transmitter and the other is the receiver.
simplex
Inventory management
simplifies maintaining and upgrading the network chiefly because you know what the system includes
gateway device
stands between a private network and other networks substitutes the private IP address with its own public address when computers need access to other networks or the Internet
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
star
In Question 8, suppose a new switch is connected to the first switch by way of a network cable, and three computers are connected to the new switch. Which network topology is now used?
star-bus
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
static route
Namespace databases
stored in DNS zone files
the effect of the ____ is to erase the portion of the host fireld that refers to an actual host on a subnet, leaving the network number and the subnet number
subnet mask
A ___ keeps track of data packets and in conjunction with network interface cards, helps the data packets find their destination without running unto eachother on an ethernet network
switch
The various computers and printers on a LAN are connected to a ________,which is a special-purpose computer that receives and transmits wired traffic on the LAN.
switch
the various computers and printers on a LAN are connected to a _____, which is a special purpose computer that receives and transmits wired traffic on the LAN
switch
What is the fundamental distinction between a Layer 2 switch and a router?
switch belongs only to one network; router belongs to more than one network
Which Linux utility provides output similar to Wireshark's?
tcpdump
Organizations
tend to follow a single cabling standard known as TIA/EIA-568 Commercial Building Wiring Standard or structured cabling
larger; more
the ________ an organization, the ______ documentation is necessary when making hardware and software changes
Why do APC ferrules create less back reflection than UPC ferrules?
the end faces are placed at an angle to each other
the host
the last part of an IPv4 address identifies _____
Name resolution
the process of discovering the IP address of a host when its FQDN is known
Connection establishment in TCP always uses a ________.
three way handshake
the key features of a protocol are: syntax, semantics, and
timing
In the URL http://www.prenhall.com, the portion labeled .com is the ________.
top level domain
in the url http://www.prenhall.com, the .com portion is the
top level domain
the term ____ refers to the way in which the end points or stations attached to the network are interconnected
topology
The time it takes for a station to emit all of the bits of a frame onto the medium is the ________ time.
transmission
the time it takes for a station to emit all of the bits of a frame onto the medium is the ____ time
transmission
The ____ layer of the tcp/ip protocol architecture is said to provide reliable internet transport
transport layer
which osi layer combines messages or segments into packets
transport layer
From customer to carrier is _________
upstream
Circuit switching was developed to handle ________ traffic.
voice
circuit switching was developed to handle ____ traffic
voice
____ are programs that run on a server-tier computer and that manage http traffic by sending and receiving web pages to and from clients
webservers
sophisticated cable performance tester
will include TDR (time domain reflector) that issues a signal on a cable and then measures the way the signal bounces back; Detecting the type and locations of cable defects
ARP
works in conjunction with IPv4 to obtain the MAC address of a host
probe
(1) A repeated trial message transmitted by the tracert and traceroute utilities to trigger routers along a route to return specific information about the route. (2) A small electronic device that emits a tone when it detects electrical activity on a wire pair. When used in conjunction with a tone generator, it can help locate the termination of a wire pair. Also called a tone locator. (3) In 802.11 wireless networking, a type of frame issued by a station during active scanning to find nearby access points.
host
(1) Any computer or device on a network that provides or uses a resource such as an application or data. (2) In the context of virtualization, the physical computer on which virtualization software operates and manages guests.
Give three examples of routing metrics used by routers to determine the best of various available routing paths.
(Any three) Hop count, theoretical bandwidth, actual throughput, path latency (or delay), path load, MTU, cost, reliability, network topology
What four functions do all routers perform?
*1.* Connect dissimilar networks. *2.* Interpret Layers 3 and 4 addressing and other information. *3.* Determine the best path for data to follow. *4.* Reroute traffic if a primary path is down but another path is available.
You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?
1 ip address
segment
1) A TCP message at the Transport layer. (2) A part of a network.
What is the Internet standard MTU?
1,500 bytes
How many bits does an IPv6 address contain?
128 bits
What is the range of addresses that might be assigned by APIPA?
169.254.0.1 through 169.254.255.254
What decimal number corresponds to the binary number 11111111?
255
Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default?
3389
Which Wi-Fi frequency band offers 24 unlicensed communications channels in the United States?
5 GHz
802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size bonded channels does 802.11ac support?
802.11ac supports 20-,40-,60-MHz channels with optional use of 160-MHz channels.
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
802.11n
OUI (Organizationally Unique Identifier)
A 24-bit character sequence assigned by IEEE that appears at the beginning of a network interface's physical address and identifies the NIC's manufacturer.
elevated Command Prompt
A Command Prompt window with administrative privileges.
reverse zone
A DNS lookup file that holds A records where the IP addresses must be stored in reverse— with the last octet listed first—plus the domain .in-addr.arpa. For example, the IP address 1.2.3.4 would be stored in a PTR record as 4.3.2.1.in-addr.arpa.
forward zone
A DNS lookup file that holds A records.
NS (Name Server) record
A DNS lookup file that indicates the authoritative name server for a domain. It's mostly used for delegating subdomains to other name servers.
recursive query
A DNS query that demands a resolution or the response that the information can't be found.
iterative query
A DNS query that does not demand a resolution, which means the server provides the information only if it already has that information available.
root server
A DNS server maintained by ICANN and IANA that is an authority on how to contact the top-level domains, such as those ending with .com, .edu, .net, .us, and so on. ICANN oversees the operation of 13 clusters of root servers around the world.
router
A Layer 3 device that uses logical addressing information to direct data between two or more networks and can help find the best path for traffic to get from one network to another.
WSL (Windows Subsystem for Linux)
A Linux shell CLI in Windows that allows users to interact with underlying Windows functions and system files.
fragmentation
A Network layer service that subdivides packets into smaller packets when those packets exceed the maximum size for the network.
1000Base-T
A Physical layer standard for achieving 1 Gbps over twisted-pair cable.
10GBase-T
A Physical layer standard for achieving 10-Gbps data transmission over twisted-pair cable.
1000Base-LX
A Physical layer standard for networks that specifies 1-Gbps transmission over fiber-optic cable using baseband transmission. The LX represents its reliance on long wavelengths of 1300 nanometers.
1000Base-SX
A Physical layer standard for networks that specifies 1-Gbps transmission over fiber-optic cable using baseband transmission. The SX represents its reliance on short wavelengths of 850 nanometers.
100Base-T
A Physical layer standard for networks that specifies baseband transmission, twisted-pair cabling, and 100-Mbps throughput. It is also known as Fast Ethernet.
TFTP (Trivial File Transfer Protocol)
A TCP/IP Application layer protocol that is seldom used by humans. Computers commonly use it as they are booting up to request configuration files from another computer on the local network. Unlike FTP, it relies on UDP at the Transport layer using port 69.
traceroute
A TCP/IP troubleshooting utility available in Linux, UNIX, and macOS systems that sends UDP messages to a random port on the destination node to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
ping (Packet Internet Groper)
A TCP/IP troubleshooting utility that can verify TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network. Ping uses ICMP to send echo request and echo reply messages.
netstat
A TCP/IP troubleshooting utility that displays statistics and details about TCP/IP components and connections on a host. It also lists ports, which can signal whether services are using the correct ports.
nslookup (name space lookup)
A TCP/IP utility that allows a technician to query the DNS database from any computer on the network and find the host name of a network node by specifying its IP address, or vice versa. This ability is useful for verifying that a host is configured correctly and for troubleshooting DNS resolution problems.
datagram
A UDP message at the Transport layer.
pathping
A Windows utility that combines the functionality of the tracert and ping utilities to provide deeper information about network issues along a route; similar to UNIX's mtr command.
tracert
A Windows utility that uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
router
A _______ joins two or more networks and passes packets from one network to another
Layer 3
A ________ switch is a switch that is capable of interpreting Layer 3 data and works much like a router
default route
A backup route, usually to another router, used when a router cannot determine a path to a message's destination.
core
A cable's central component that is designed to carry a signal, such as glass or plastic fibers in fiberoptic cable or strands of copper in twisted-pair cable.
logical topology
A characteristic of network transmission that reflects the way in which data is transmitted between nodes, including how access to the network is controlled and how specific resources are shared on the network. A network's _______ ________ may differ from its physical topology.
open circuit
A circuit in which necessary connections are missing, such as occurs when a wire breaks.
BNC connector
A coaxial cable connector type that uses a turn-and-lock (or bayonet) style of coupling.
knowledge base
A collection of accumulated insights and solutions to the problems encountered on a particular network.
route command
A command-line tool that shows a host's routing table.
hot-swappable
A component that can be installed or removed without disrupting operations.
client
A computer or application that makes a request from another computer or application.
gateway
A computer, router, or other device that a host uses to access another network. They perform connectivity, session management, and data translation, so they must operate at multiple layers of the OSI model.
SSH (Secure Shell)
A connection utility that provides authentication and encryption. It is often used to log onto a host, execute commands on that host, and copy files to or from the host.
F-connector
A connector used to terminate coaxial cable that transmits television and cable broadband signals.
SC (subscriber connector or standard connector)
A connector with a 2.5-mm ferrule that is used with single-mode, fiber-optic cable.
ST (straight tip)
A connector with a 2.5-mm ferrule that is used with single-mode, fiber-optic cable.
MSA (master service agreement)
A contract that defines terms of future contracts.
MLA (master license agreement)
A contract that grants a license from a creator, developer, or producer, such as a software producer, to a third party for the purposes of marketing, sublicensing, or distributing the product to consumers as a stand-alone product or as part of another product.
LED (light-emitting diode)
A cool-burning, longlasting technology that creates light by the release of photons as electrons move through a semiconductor material.
UDP (User Datagram Protocol)
A core protocol in the TCP/ IP suite that does not guarantee delivery because it does not first make the connection before sending data or check to confirm that data is received.
ARP (Address Resolution Protocol)
A core protocol in the TCP/IP suite that belongs in the Data Link layer of the OSI model. It works in conjunction with IPv4 to discover the MAC address of a node on the local network and to maintain a database that maps local IP addresses to MAC addresses.
ICMP (Internet Control Message Protocol)
A core protocol in the TCP/IP suite that notifies the sender when something has gone wrong in the transmission process and packets were not delivered.
IP (Internet Protocol)
A core protocol in the TCP/IP suite that operates in the Network layer of the OSI model and provides information about how and where data should be delivered. IP is the subprotocol that enables TCP/IP to internetwork.
TCP (Transmission Control Protocol)
A core protocol of the TCP/IP suite that makes a connection with the end host, checks whether data is received, and resends it if it is not.
patch
A correction, improvement, or enhancement to part of a software application, often distributed at no charge by software vendors to fix a bug in their code or to add slightly more functionality.
ARP table
A database of records that maps MAC addresses to IP addresses. The It is stored on a computer's hard disk where it is used by the ARP utility to supply the MAC addresses of network nodes, given their IP addresses.
routing table
A database stored in a router's memory that maintains information about the location of hosts and best paths for forwarding packets to them.
VoIP PBX (private branch exchange)
A dedicated telephone switch or a virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway.
firewall
A device (either a router, a dedicated device, or a computer running special software) that selectively filters or blocks traffic between networks.
FDP (fiber distribution panel)
A device on a rack where fiber cables converge, connect with each other, and connect with fiber-optic terminal equipment from the ISP.
KVM (keyboard, video, and mouse) switch
A device that connects the equipment in a rack to a single console to provide a central control portal for all devices on the rack.
VoIP gateway
A device that converts signals from a campus's analog phone equipment into IP data that can travel over the Internet, or that converts VoIP data from an internal IP network to travel over a phone company's analog telephone lines.
media converter
A device that enables networks or segments running on different media to interconnect and exchange signals.
light meter
A device that measures the amount of light power transmitted on a fiber-optic line. Also called OPM (optical power meter).
OPM (optical power meter)
A device that measures the amount of light power transmitted on a fiber-optic line. Also called light meter.
cable tester
A device that tests cables for one or more of the following conditions: continuity, segment length, distance to a fault, attenuation along a cable, near-end cross-talk, and termination resistance and impedance.
repeater
A device used to regenerate a digital signal in its original form. Repeaters operate at the Physical layer of the OSI model.
Which kind of antenna is used in a point-to-point link, especially over long distances?
A directional antenna
MOU (memorandum of understanding)
A document presenting the intentions of two or more parties to enter into a binding agreement, or contract. It is usually not a legally binding document (although there are exceptions), does not grant extensive rights to either party, provides no legal recourse, and is not intended to provide a thorough coverage of the agreement to come.
RFP (request for proposal)
A document requesting that vendors submit a proposal for a product or service that a company wants to purchase.
SOW (statement of work)
A document that details the work that must be completed for a particular project, including specifics such as tasks, deliverables, standards, payment schedule, and work timeline. It is legally binding, meaning it can be enforced in a court of law.
rack diagram
A drawing that shows the devices stacked in a rack system and is typically drawn to scale.
catastrophic failure
A failure that destroys a component beyond use.
Remote Desktop Services
A feature of Windows Server 2008 and later editions of Windows Server that allows technicians to manage remote applications.
CFP (centum form-factor pluggable)
A fiber-optic transceiver intended for 100-Gbps network connections.
QSFP (quad small form-factor pluggable)
A fiber-optic transceiver that complies with the 802.3ba standard, squeezing four channels in a single transceiver and supporting data rates up to 40 Gbps (4 x 10 Gbps).
BiDi transceiver
A fiber-optic transceiver that supports bidirectional transmission on both its ports.
TTL (Time to Live)
A field that indicates the maximum duration that an IPv4 packet can remain on the network before it is discarded. Although this field was originally meant to represent units of time, on modern networks it represents the number of times a packet can still be forwarded by a router, or the maximum number of router hops remaining.
Cat 5 (Category 5)
A form of UTP that contains four wire pairs and supports up to 100-Mbps throughput and a 100-MHz signal rate. Required minimum standard for Fast Ethernet.
PAT (Port Address Translation)
A form of address translation that assigns a separate TCP port to each ongoing conversation, or session, between a local host and an Internet host.
fiber-optic cable
A form of cable that contains one or several glass or plastic fibers in its core. Data is transmitted via a pulsing light sent from a laser or LED (light-emitting diode) through the central fiber or fibers.
multiplexing
A form of transmission that allows multiple signals to travel simultaneously over one medium.
EIA (Electronic Industries Alliance)
A former trade organization composed of representatives from electronics manufacturing firms across the United States that sets standards for electronic equipment and lobbies for legislation favorable to the growth of the computer and electronics industries. It was dissolved in 2011 and its responsibilities transferred to ECA (Electronic Components, Assemblies, Equipment & Supplies Association), but the standards brand name, ___, will continue to be used.
tcpdump
A free, command-line packet sniffer utility that runs on Linux and other UNIX operating systems.
CLI (command-line interface)
A graphic-free user interface, such as the Command Prompt application in Windows, where technicians can enter commands more quickly and with more flexibility than in a GUI (graphical user interface) environment.
network diagram
A graphical representation of a network's devices and connections.
wiring schematic
A graphical representation of a network's wired infrastructure.
network
A group of computers and other devices (such as printers) that are connected by and can exchange data via some type of transmission media, such as a cable, a wire, or the atmosphere.
AS (autonomous system)
A group of networks, often on the same domain, that are operated by the same organization.
You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?
A guest network with a captive portal.
The two approaches the hacker might use for VLAN hopping are as follows: * double tagging-The hacker stacks VLAN tags in Ethernet frames. When the first, legitimate tag is removed by a switch, the second, illegitimate tag is revealed, tricking a switch into forwarding the transmission on to a restricted VLAN. * switch spoofing-An attacker connects to a switch and then makes the connection look to the switch as if it's a trunk line. The switch might autoconfigure its port into trunk mode when it detects trunk mode on the other end of the connection. A hacker can then feed his own VLAN traffic into that port and access VLANs throughout the network.
A hacker wants to orchestrate a VLAN hopping attack. Which of the method(s) below can he employ to do his attack?
DNS (Domain Name System or Domain Name Service)
A hierarchical way of tracking domain names and their addresses, devised in the mid-1980s.
TDR (time domain reflectometer)
A high-end instrument for testing the qualities of a cable.
Cat 5e (Enhanced Category 5)
A higher-grade version of Cat 5 wiring that supports a signaling rate of up to 350 MHz and a maximum throughput of 1 Gbps, making it the required minimum standard for Gigabit Ethernet.
Cat 6a (Augmented Category 6)
A higher-grade version of Cat 6 wiring that further reduces attenuation and crosstalk, and allows for potentially exceeding traditional network segment length limits.
Cat 7a (Augmented Category 7)
A higher-grade version of Cat 7 wiring that will possibly support up to 100-Gbps throughput and up to 1000-MHz signal rate. ISO standards for this cabling are still being drafted and simulations conducted.
FQDN (fully qualified domain name)
A host name plus domain name that uniquely identifies a computer or location on a network.
star-bus topology
A hybrid topology in which groups of workstations are connected in a star fashion to connectivity devices that are networked via a single bus.
IDF (intermediate distribution frame)
A junction point between the MDF and concentrations of fewer connections— for example, those that terminate in a data closet.
RFI (radio frequency interference)
A kind of electromagnetic interference that can be generated by broadcast signals from radio or TV antennas.
SLA (service-level agreement)
A legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer. Specific details might include contract duration, guaranteed uptime, problem management, performance benchmarks, and termination options.
IS-IS (Intermediate System to Intermediate System)
A link-state routing protocol that uses a bestpath algorithm. It was originally codified by ISO, which referred to routers as "intermediate systems," thus the protocol's name.
socket
A logical address consisting of a host's IP address and the port of an application running on the host with a colon separating the two values.
IMAP4 (Internet Message Access Protocol, version 4)
A mail retrieval protocol that allows users to store messages on the mail server. The most current version of IMAP is version 4 (IMAP4).
modal bandwidth
A measure of the highest frequency of signal a multimode fiber-optic cable can support over a specific distance. It is measured in MHz-km.
RS (router solicitation)
A message from a client to a router requesting network configuration information.
RA (router advertisement)
A message from a router in response to a client's solicitation and provides DHCP information.
broadcast
A message that is read by every node on a network.
structured cabling
A method for uniform, enterprise-wide, multivendor cabling systems specified by the TIA/EIA 568 Commercial Building Wiring Standard. It is based on a hierarchical design using a high-speed backbone.
MAC (Media Access Control) address
A method of access control where resources are organized into hierarchical classifications, such as "confidential" or "top secret," and grouped into categories, perhaps by department. Users, then, are also classified and categorized. If a user's classification and category match those of a resource, then the user is given access.
PoE+
A method of delivering more current (up to 25.5 watts) than PoE does to devices using Ethernet connection cables.
PoE (Power over Ethernet)
A method of delivering up to 15.4 watts to devices using Ethernet connection cables.
SSL (Secure Sockets Layer)
A method of encrypting TCP/IP transmissions—including web pages and data entered into web forms—en route between the client and server using public key encryption technology.
checksum
A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source.
TDM (time division multiplexing)
A method of multiplexing that assigns a time slot in the flow of communications to every node on the network and, in that time slot, carries data from that node.
dynamic routing
A method of routing that automatically calculates the best path between two networks and accumulates this information in a routing table.
OSI (Open Systems Interconnection) reference model
A model for understanding, developing, and troubleshooting computer-to-computer communication and was developed in the 1980s by ISO. It divides networking functions among seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
transceiver
A modular interface that can be inserted in a switch to connect its motherboard with an external, fiber-optic cable.
WDM (wavelength division multiplexing)
A multiplexing technique in which each signal on a fiber-optic cable is assigned a different wavelength, which equates to its own subchannel.
CWDM (coarse wavelength division multiplexing or coarse WDM)
A multiplexing technique used over single-mode or multimode fiber-optic cable in which each signal is assigned a different wavelength for its carrier wave.
DWDM (dense wavelength division multiplexing or dense WDM)
A multiplexing technique used over single-mode or multimode fiber-optic cable in which each signal is assigned a different wavelength for its carrier wave.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
A network access method specified for use by IEEE 802.3 (Ethernet) networks. In this, each node waits its turn before transmitting data to avoid interfering with other nodes' transmissions.
For what time period should you schedule a network change?
A network change should be completed during off-hours where everyone must be informed of and agree to this maintenance window in advance.
interface
A network connection made by a node or host on a network.
SOHO (small office-home office) network
A network consisting of fewer than 10 workstations.
P2P (peer-to-peer) network model
A network in which every computer can communicate directly with every other computer. By default, no computer on a P2P network has more authority than another.
ring topology
A network layout in which each node is connected to the two nearest nodes so that the entire network forms a circle. Data is transmitted in one direction around the ring. Each node accepts and responds to packets addressed to it, then forwards the other packets to the next node in the ring.
LAN (local area network)
A network of computers and other devices that typically is confined to a relatively small space, such as one building or even one office. Each node on a ___ can communicate directly with others on the same ___.
MAN (metropolitan area network)
A network of connected LANs within a limited geographical area, such as multiple city government buildings around a city's center.
CAN (campus area network)
A network of connected LANs within a limited geographical area, such as the buildings on a university campus.
PAN (personal area network)
A network of personal devices, such as a cell phone, laptop, and Bluetooth printer.
WAN (wide area network)
A network that spans a long distance and connects two or more LANs.
client-server network model
A network where resources are managed by the NOS via a centralized directory database.
IANA (Internet Assigned Numbers Authority)
A nonprofit, U.S. government-funded group that was established at the University of Southern California and charged with managing IP address allocation and the Domain Name System. The oversight for many of it's functions was given to ICANN in 1998; however, IANA continues to perform Internet addressing and Domain Name System administration.
AD (administrative distance)
A number indicating a protocol's reliability, with lower values being given higher priority. This assignment can be changed by a network administrator.
port
A number that identifies a process, such as an application or service, running on a computer. TCP and UDP _____ ensure that data is transmitted to the correct process among multiple processes running on a computer.
Which of these is considered a secure place to store a list of documented network passwords?
A password manager
OTDR (optical time domain reflectometer)
A performance testing device for use with fiber-optic networks which can accurately measure the length of the fiber, locations of faults, and many other characteristics.
star topology
A physical topology in which every node on the network is connected through a central device.
hybrid topology
A physical topology that combines characteristics of more than one simple physical topology.
PVC (polyvinyl chloride)
A point-to-point connection over which data may follow any number of different paths.
punchdown tool
A pointed tool used to insert twisted-pair wire into receptors in a punchdown block to complete a circuit.
DNS zone
A portion of the DNS namespace for which one organization is assigned authority to manage.
TX/RX reverse
A problem caused by mismatched pinout standards, resulting in near end crosstalk.
speed and duplex mismatch
A problem that occurs when neighboring devices are using different speed or duplex configurations and results in failed transmissions.
neighbor discovery
A process whereby routers learn about all the devices on their networks. On IPv4 networks, this process is managed by ARP with help from ICMP. On IPv6 networks, NDP (Neighbor Discovery Protocol) automatically detects neighboring devices and automatically adjusts when nodes fail or are removed from the network.
SFTP (Secure File Transfer Protocol)
A protocol available with the proprietary version of SSH that securely copies files between hosts.
SMB (Server Message Block)
A protocol for communications and resource access between systems, such as clients and servers.
dynamic ARP table entry
A record in an ARP table that is created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.
static ARP table entry
A record in an ARP table that someone has manually entered using the ARP utility.
patch cable
A relatively short section (usually between 3 and 25 feet) of cabling with connectors on both ends.
network service
A resource the network makes available to its users, including applications and the data provided by these applications.
routing table
A router relies on its _________ to identify which network a host belongs to and which of the router's interfaces points toward the best next hop to reach the network
edge router
A router that connects an autonomous system with an outside network—for example, the router that connects a business to its ISP.
border router
A router that connects an autonomous system with an outside network—for example, the router that connects a business to its ISP. Also called edge router.
exterior router
A router that directs data between autonomous systems, for example, routers used on the Internet's backbone.
core router
A router that directs data between networks within the same autonomous system.
interior router
A router that directs data between networks within the same autonomous system. Also called core router.
hybrid routing protocol
A routing protocol that exhibits characteristics of both distance-vector and link-state routing protocols.
Nmap
A scanning tool designed to assess large networks quickly and provide comprehensive, customized information about a network and its hosts.
caching DNS server
A server that accesses public DNS data and caches the DNS information it collects.
APIPA (Automatic Private IP Addressing)
A service available on Windows computers that automatically assigns the computer's NIC a link-local IPv4 address in the range of 169.254.0.1 through 169.254.255.254.
jumbo frame
A setting on Ethernet network devices that allows the creation and transmission of extra-large frames, as high as 9198 bytes.
False
A short circuit is one where needed connections are missing, such as when a wire breaks.
DHCP scope
A shortage of available IP addresses on a network so that no new clients can connect to the network.
exhausted DHCP scope
A shortage of available IP addresses on a network so that no new clients can connect to the network.
SIP (Session Initiation Protocol)
A signaling protocol that is used to make an initial connection between hosts but that does not participate in data transfer during the session.
H.323
A signaling protocol used to make a connection between hosts prior to communicating multimedia data. It has largely been replaced by SIP, which is easier to use.
upgrade
A significant change to an application's existing code, typically designed to improve functionality or add new features while also correcting bugs and vulnerabilities.
NTP (Network Time Protocol)
A simple Application layer protocol in the TCP/IP suite used to synchronize the clocks of computers on a network. NTP depends on UDP for Transport layer services.
multimeter
A simple instrument that can measure multiple characteristics of an electric circuit, including its resistance, voltage, and impedance.
tone locator
A small electronic device that emits a tone when it detects electrical activity on a wire pair. When used in conjunction with a tone generator, it can help locate the termination of a wire pair. Also called a probe.
tone generator
A small electronic device that issues a signal on a wire pair. When used in conjunction with a tone locator, it can help locate the termination of a wire pair. Also called a toner.
subnet
A smaller network within a larger network in which all nodes share a network addressing component and a fixed amount of bandwidth.
protocol analyzer
A software package or hardwareA software package or hardware-based tool that can capture dbased tool that can capture and analyze data on a network.
packet sniffer
A software package or hardwarebased tool that can capture data on a network.
IPAM (IP address management)
A standalone product or application embedded in another product, such as Windows Server, that provides a way to plan, deploy, and monitor a network's IP address space.
IPv6 (Internet Protocol version 6)
A standard for IP addressing that is gradually replacing the current IPv4. Most notably, it uses a newer, more efficient header in its packets and allows for 128-bit source and destination IP addresses, which are usually written as eight blocks of hexadecimal numbers, such as 2001:0DB8:0B80:0000:0000:00D3:9C5A:00CC.
SFP (small form-factor pluggable)
A standard hot-swappable network interface used to link a connectivity device's backplane with fiber-optic or copper cabling.
protocol
A standard method or format for communication between network devices.
TIA/EIA 568B
A standard pinout for RJ-45 plugs commonly used in homes and businesses.
TIA/EIA 568A
A standard pinout for RJ-45 plugs required by the federal government on all federal contracts.
LDAP (Lightweight Directory Access Protocol)
A standard protocol for accessing network directories.
GBIC (Gigabit interface converter)
A standard type of modular interface that may contain RJ-45 or fiber-optic cable ports (such as LC, SC, or ST). They are inserted into a socket on a connectivity device's backplane. Pronounced jee-bick.
TIA (Telecommunications Industry Association)
A subgroup of the former EIA that focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment. EIA was dissolved in 2011 and its responsibilities transferred to ECA (Electronic Components, Assemblies, Equipment & Supplies Association), but the standards brand name, EIA, will continue to be used. Probably the best known standards to come from the TIA/EIA alliance are its guidelines for how network cable should be installed in commercial buildings, known as the "TIA/EIA 568-B Series."
TCP/IP
A suite of networking protocols that includes TCP, IP, UDP, and many others. It provides the foundation for data exchange across the Internet.
Layer 3 switch
A switch capable of interpreting Layer 3 data and works much like a router in that it supports the same routing protocols and makes routing decisions.
Layer 4 switch
A switch capable of interpreting Layer 4 data, which means it can perform advanced filtering, keep statistics, and provide security functions.
emergency alert system
A system that typically generates loud noise and flashing lights in response to a fire or other environmental threat. The system might also be able to send alert messages to key personnel or make network-wide announcements.
NAT (Network Address Translation)
A technique in which IP addresses used on a private network are assigned a public IP address by a gateway when accessing a public network.
address translation
A technique in which IP addresses used on a private network are assigned a public IP address by a gateway when accessing a public network.
static routing
A technique in which a network administrator programs a router to use specific paths between networks.
Telnet
A terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol.
three-way handshake
A three-step process in which Transport layer protocols establish a connection between nodes.
lease time
A time limit on the validity of a DHCP-issued IP address.
crimper
A tool used to attach a connector onto the end of a cable, causing the internal RJ-45 pins to pierce the insulation of the wires, thus creating contact between the conductors at each wire.
bus topology
A topology in which a single cable connects all nodes on a network without intervening connectivity devices.
jitter
A transmission flaw caused by packets experiencing varying amounts of delay and arriving out of order. Also called PDV (packet delay variation).
bidirectional
A transmission method that allows each fiber cable to carry data in both directions.
loopback adapter
A troubleshooting tool that plugs into a port (for example, an RJ-45 or fiber-optic port) and crosses the transmit line with the receive line, allowing outgoing signals to be redirected back into the computer for testing. Also called a loopback plug.
cable performance tester
A troubleshooting tool that tests cables for continuity, but can also measure crosstalk, attenuation, and impedance; identify the location of faults; and store or print cable testing results. Also called line tester, certifier, or network tester.
Cat 6 (Category 6)
A twisted-pair cable that contains four wire pairs, each wrapped in foil insulation. Additional foil insulation can cover the bundle of wire pairs, and a fire-resistant plastic sheath might cover the second foil layer. The foil insulation provides excellent resistance to crosstalk and enables it to support a signaling rate of 250 MHz and throughput up to 10 Gbps.
Cat 7 (Category 7)
A twisted-pair cable that contains multiple wire pairs, each separately shielded then surrounded by another layer of shielding within the jacket.
crossover cable
A twisted-pair patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed as compared with the other end.
straight-through cable
A twisted-pair patch cable in which the wire terminations in both connectors follow the same scheme.
toner and probe kit
A two-piece tool that includes both a tone generator and a tone locator. Used together, they can help locate the termination of a wire pair.
CNAME (Canonical Name) record
A type of DNS data record that holds alternative names for a host.
TXT (Text) record
A type of DNS data record that holds any type of free-form text. It might contain text designed to be read by humans regarding network, server, or accounting issues.
MX (Mail Exchanger) record
A type of DNS data record that identifies a mail server and that is used for email traffic.
SRV (Service) record
A type of DNS data record that identifies the hostname and port of a computer hosting a specific network service besides email, such as FTP or SIP.
PTR (Pointer) record
A type of DNS data record that is used for reverse lookups, to provide a host name when the IP address is known.
A (Address) record
A type of DNS data record that maps the IPv4 address of an Internet-connected device to its domain name.
AAAA (Address) record
A type of DNS data record that maps the IPv6 address of an Internet-connected device to its domain name. Pronounced "quad-A record."
Fast Ethernet
A type of Ethernet network that is capable of 100-Mbps throughput.
Gigabit Ethernet
A type of Ethernet network that is capable of 1000-Mbps, or 1-Gbps, throughput. Requires Cat 5e or higher cabling.
anycast address
A type of IPv6 address that represents a group of interfaces, any one of which (and usually the first available of which) can accept a transmission. At this time, these addresses are not designed to be assigned to hosts, such as servers or workstations, but rather to routers.
unicast address
A type of IPv6 address that represents a single node on a network.
multicast address
A type of IPv6 address that represents multiple interfaces, often on multiple nodes.
XFP (10 Gigabit small form-factor pluggable)
A type of SFP that can send and receive data at rates of up to 10 Gbps.
SFP+
A type of SFP that can send and receive data at rates of up to 16 Gbps.
connection-oriented protocol
A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.
connectionless protocol
A type of Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data.
SNAT (Static Network Address Translation or Source Network Address Translation)
A type of address translation in which a gateway assigns the same public IP address to a host each time it makes a request to access the Internet.
single switch
A ____________ can support traffic belonging to several VLANs across the network
native VLAN mismatch
A configuration error where switch ports on each end of a trunk are configured with different native VLAN assignments. Also called a VLAN mismatch.
VLAN mismatch
A configuration error where switch ports on each end of a trunk are configured with different native VLAN assignments. Also called a native VLAN mismatch.
fiber
Cabling problems unique to ______ include fiber type mismatch, wavelength mismatch, and dirty connectors
VTP (VLAN Trunk Protocol)
Cisco's protocol for exchanging VLAN information over trunks.
destination host
Computers compare the bits in their own network ID to the bits in the network ID of the ____________
protocols
Computers on a network are able to communicate with each other via the _________ they have in common
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs?
DHCP relay agent
VLAN hopping
Hackers sometimes take advantage of the way VLANs are tagged to implement an attack called _______________
CIDR block
In CIDR notation, the forward slash plus the number of bits used for the network ID. For example, it for 199.34.89.0/22 is /22.
dynamic addressing
In __________________, administrator programs each subnet's DHCP server with the network ID, subnet mask, range of IP addresses, and default gateway
IP addresses
In most situations, each VLAN is assigned its own subnet of ___________
magic number
In the context of calculating subnets, the difference between 256 and the interesting octet (any octet in the subnet whose value is something other than 0 or 255). It can be used to calculate the network IDs in all the subnets of a larger network.
subnet
To create a ________, borrow bits that would represent host information in classful addressing
Which of the following is not a good reason to segment a network?
To increase the number of networking devices on a network
domain
When Windows Server controls network access, the logical group is called a
segmented
When a network is __________ into multiple smaller networks, traffic on one network is separated from another network's traffic
1500
When your body and a component have different static charges and you touch the component, you can discharge up to _____ volts of static electricity without seeing a spark or feeling the discharge
heavy objects
Whenever possible, put ______ on a cart to move them
VLSM
___________ allows subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the IP address space that is needed
CIDR notation
___________ takes the network ID or a host's IP address and follows it with a forward slash (/) followed by the number of bits used for network ID
Managed switches
______________ can be configured via a command-line interface or a webbased management GUI
Now you can calculate the network IDs for each subnet. Begin with the original network ID. Then in the third octet, count up by the magic number with each iteration. The last subnet's network ID will be equal to 256 minus the magic number, because you can't use 256 itself in any IP address. What is the CIDR notation for the second subnet's network ID?
172.20.16.0/20
What area of a network can provide less stringent security so a web server is more accessible from the open Internet?
DMZ (Demilitarized zone)
MMF
contains a core with a larger diameter than SMF over which many pulses of light generated by a laser or LED light source travel at different angles
crossover cable
has the transmit and receive wires reversed
Presentation layer
is responsible for reformatting, compressing, and/or encrypting data in a way that the application on receiving end can read
Data
is transmitted through the central fibers of fiber-optic cable via pulsing light sent from a laser or an LED source
tone generator
issues a signal on a wire that can be detected by a tone locator
Network layer
moves messages from one node to another until they reach the destination host
crimper
pushes on the pins inside an RJ-45 connector so they pierce the wire's insulation
VLAN
A _________ groups ports on a switch so that some of the local traffic is forced to go through a router creating a smaller broadcast domain
The increment will tell you by what amount to skip-count when you're listing the subnets' network IDs. There are two ways to calculate the increment: subtract the interesting octet's value from 256, or use the formula 2h. What is the increment you can use to calculate the network IDs?
16
What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0?
172.16.32.0/24
How many bits of a Class A IP address are used for host information?
24 bits
Which formulas can be used to calculate the magic number? Choose two.
256 - the interesting octet; 2h
VLAN (virtual local area network or virtual LAN)
A network within a network that is logically defined by grouping ports on a switch so that some of the local traffic on the switch is forced to go through a router, thereby limiting the traffic to a smaller broadcast domain.
default VLAN
A preconfigured VLAN on a switch that includes all the switch's ports and cannot be renamed or deleted.
classless addressing
An IP addressing convention that alters the rules of classful IPv4 addressing to create subnets in a network.
VLAN hopping
An attack in which the attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.
native VLAN
An untagged VLAN on a switch that will automatically receive all untagged frames.
On which networking device do you configure VLANs?
Managed switches
Which VLAN is designed to support administrative access to networking devices?
Management VLAN
modular connectors and data jacks
STP and UTP both use RJ-45 _________________
network connection problem
Start troubleshooting a _____________ by checking the network connection LED status indicator lights
classful addressing
Subnetting helps solve the fundamental problem with ________________
simpler
Subnetting in IPv6 is ________ than subnetting in IPv4
trunking
The aggregation of multiple logical connections in one physical connection between connectivity devices. In the case of VLANs, a trunk allows two switches to manage and exchange data between multiple VLANs.
RG-59 coaxial cable
Today's networks might use ___________ for short connections
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
Trunk
An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?
VLAN hopping
Which IP addressing technique subnets a subnet to create subnets of various sizes?
VLSM (Variable Length Subnet Mask )
a switch belongs only to its local network and a router belongs to two or more local networks
What is the fundamental difference between a switch and a router?
STP cable's shielding
acts as a barrier to external electromagnetic forces
UTP cable
both less expensive and less resistant to noise than STP
peer-to-peer model
can be achieved using any assortment of desktop, mobile, or tablet OSs
Noise
can degrade or distort a signal
multimeter
can measure many characteristics of an electric circuit, including its resistance, voltage, and impedance
Twisted-pair cable
consists of color-coded pairs of insulated copper wires that are twisted in pairs
Session layer
describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application
Application layer
describes the interface between two applications, each on separate computers
Duplex signals
free to travel in both directions over a medium simultaneously
media converter
hardware that enables networks or segments running on different media to interconnect and exchange signals
Layers 2 and 1
responsible for interfacing with the physical hardware only on the local network
Peer-to-peer networks
simple to configure and less expensive than other types of networks
Bandwidth
the amount of data that could theoretically be transmitted during a given period of time
Transport layer
transports Application layer payloads from one application to another
Laser-generated light
travels over a single path in SMF cables
router's console port
used with a console cable, or rollover cable
What is the formula for determining the number of possible hosts on a network?
2h - 2 = Z
10
It only takes __ volts to damage the component
You can now calculate the subnet mask. The default subnet mask for a Class B network is 255.255.0.0, and so the third octet is the one that will change. What is the subnet mask for these subnets, written in decimal?
255.255.240.0
Subnetting operates at Layer ________ while VLANs function at Layer _______.
3, 2
Suppose your organization uses the Class B network ID of 172.20.0.0 for its entire network and wants to create 15 subnets. You first need to decide how many bits to borrow from the host address bits. Recall that you can use the formula 2n = Y. For the new subnets, how many bits must be borrowed from the host address portion? How many bits total will be used for identifying a host's subnet?
4, 20
If 20 bits are used to identify the network and subnet, that leaves 12 bits to identify each host. Using the formula 2h - 2 = Z, how many host addresses are possible in each subnet? (You might need a calculator for this step).
4094
Which IEEE standard determines how VLANs work on a network?
802.1Q
tag
A VLAN identifier added to a frame's header according to specifications in the 802.1Q standard.
WAN (wide area network)
A group of LANs spread over a wide geographical area
ANDing
A logical process of combining bits.
ip helper-address
A robust Cisco command that can be configured to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+.
CIDR notation
A shorthand method for denoting the distinction between network and host bits in an IP address.
CIDR (Classless Interdomain Routing)
A shorthand method for identifying network and host bits in an IP address.
DHCP relay agent
A small application that works with a centrally managed DHCP server to provide DHCP assignments to multiple subnets and VLANs.
VLSM (Variable Length Subnet Mask)
A subnetting method that allows subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the needed IP address space.
managed switch
A switch that can be configured via a command-line interface or a web-based management GUI, and sometimes can be configured in groups.
unmanaged switch
A switch that provides plug-and-play simplicity with minimal configuration options and has no IP address assigned to it.
subnetted
Class A, Class B, and Class C networks can all be __________
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
Eight
different types of VLANS
Just as different types of IP addresses serve different purposes, so _______________
802.1Q
The IEEE standard that specifies how VLAN and trunking information appears in frames and how switches and bridges interpret that information.
Which VLAN on a switch manages untagged frames?
Native VLAN
What do well-chosen subnets accomplish?
Network documentation is easier to manage.
ST or SC
Older fiber networks might use ___________ connectors
switch's software
Once you create a VLAN, you also maintain it via the ______________
site prefix
The first four blocks or 64 bits of an IPv6 address that normally identify the network. Also called global routing prefix.
global routing prefix
The first four blocks or 64 bits of an IPv6 address that normally identify the network. Also called site prefix.
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
The fourth one
trunk port
The interface on a switch capable of managing traffic from multiple VLANs.
access port
The interface on a switch used for an end node. Devices connected to them are unaware of VLAN information.