Network + ch.2-glossary
Which protocol is commonly used to retrieve email from a mail server?
IMAP
In a 100BaseT network, the distance of cable from hub to workstation should not exceed:
100 meters
The segment length from hub port to workstation NIC on a 10BaseT network should be no longer than:
100 meters
What is the proper termination for UTP cables?
100 ohms
Which of the following uses a 1300 nm laser beam to drive data across the network media?
1000BaseLX
Which of the following only uses two conductors?
100BaseFX
Which of the following uses a Category 5 cable?
100BaseTX
Which of the following is the expected data rate on a 10BaseT network?
10Mbps
Shields data transmissions from EMI
coaxial cable
Which connection type is the most reliable?
connection-oriented
A ____ is used to provide a centralized connection point for network access.
hub
Which of the following reside(s) at the physical layer of the OSI model? (select all that apply)
hub, cables
A bridge is used to:
interconnect network segments using of the same access protocol
Before a client can receive a dynamic IP address from a server _____
DHCP must be running on the server
A VLAN enables you to
segment a network using the switches you already own
You are experiencing a problem with a workstation and want to ping the localhost. Which two of the following are valid ways to check your local TCP/IP connections?
ping 127.0.1, ping localhost
One of your network technicians has made up 10 new network cables and installed them throughout the building. One of the new cable drops has bad connectivity. The network drop cable is 80 meters over a drop ceiling. What is the most likely cause of this problem?
Fluorescent lights are causing interference
Which of the IEEE 802 standards describes Ethernet?
IEEE 802.3
Which TCP/IP utility is used for determining NetBIOS names?
Nbtstat
The process of making sure data came from the person or entity it was supposed to come from.
Nonrepudiation
To check the connection to a remote server, which TCP/IP utility will show all routers to the remote server?
Tracert
Which of the following protocol suites provides the Ping utility for use in troubleshooting situations?
TCP/IP
Which of the following protocols must use a subnet mask?
TCP/IP
Which protocol is most similar to SSL?
TLS
HTTPS is port ___
443
Thinnet is also referred to as:
Cheapernet
What does the acronym SSL represent?
Secure Sockets Layer
HTTP, FTP, and Telnet work at which layer of the OSI model?
application
A node has been assigned the IP address 129.168.34.25 255.255.0.0. What is the host address of this node?
.34.25
What is the maximum hop count for RIP?
15
Which of the following is an example of a Class B IP address?
172.16.32.1
Which of the following is a valid Class C IP address?
192.168.1.1
FTP is port ____
21
Given the IP address of 212.16.175.24 and a subnet mask of 255.255.0.0, what is the network address of the segment to which this node is connected?
212.16
SSH is port ___
22
Which of the following is a valid IPv6 address?
3FF1:D501:C308:221F:0260:97DE:ED42:032C
DES used a
64-bit block and a 56-bit key
An RJ45 connector is comprised of _____ pins.
8
What standard describes VLAN?
802.1
Which IEEE 802 standard contains specifications for 100BaseT?
802.3 (b)
Which of the IEEE standards specifies fiberoptic technology?
802.3 (f)
____ was designed for port authentication.
AAA
Which is a link layer protocol?
ARP
Who invented TCP/IP? (Select all that apply)
Bob Kahn, Vint Cerf
Which of the following cable types is recommended for 100BaseTX networks?
CAT 5 UTP
A wire in a UTP cable is suspected of having a break. Which of the following would confirm connectivity of each wire in the cable?
Cable tester
A workstation cannot connect with the rest of the network. What's the next step to take?
Check other workstations to determine whether they have a similar problem
The NIC link light on a workstation isn't lit. The cable from patch panel to hub checks good, as does the cabling from wall outlet to patch panel. Which of the following is the next step?
Check the cable from the workstation to NIC
255.255.0.0 is the default subnet mask for a ____ IP address.
Class B
PlainText is also referred to as
ClearText
You are managing a network that uses both a UNIX server and a Windows 2000 server. Which of the following protocols can you use to transfer files between the two servers?
FTP
Which protocol is used to automatically provide IP addresses to network computers?
DHCP
The number of collisions on a network has increased substantially as new user workstations are added. What's the first step in determining the nature of the problem?
Determine whether the entire network is infected
Developed to create a single standard to allow two devices to authenticate
EAP
What type of cable is used with the IEEE 100BaseFX standard?
Fiber-optic
You want to connect two networks that are using different protocols. What type of device should you use?
Gateway
A workstation is being added to an Ethernet LAN. The NIC card has been installed, IRQ assigned along with an I/O range with no conflicts. What else must be done before the workstation can access the network resources?
Install the client software and add a cable to the NIC card
While troubleshooting a sporadic network connectivity problem on a Windows 2000 system, a fellow technician suggest that you run the ping (dash)t command. What is the purpose of this command?
It pings the remote host continually until it is stopped
An Ethernet frame is to be transported across the Internet using TCP/IP. Which of the following is true?
MAC addresses are checked at each router
What is the hub used in a token ring network called?
MSAU
Which of the following pieces of information is not likely to be supplied via DHCP?
NetBIOS computer name
What TCP/IP utility displays all current connections and ports?
Netstat
Which layer of the OSI model is responsible for routing?
Network
What does OSPF stand for?
Open Shortest Path First
An advanced version of PPP.
PPAP
You are troubleshooting a connectivity problem on a workstation that is unable to connect to the network. You have verified that the physical connectivity of the system is okay, and you suspect that the problem is related to the bindings of the protocols to the network cards. You decide to use the local loopback feature of the TCP/IP stack to test the configuration. Which of the following commands could you use to do this?
Ping 127.0.0.1, Ping localhost
The IP address of a workstation is 192.168.20.2. It's connected to a hub with an IP address of 192.168.20.3. Which of the following will check the connection status between workstation and hub?
Ping 192.168.20.3
Keys could be exchanged securely with
Public-key cryptography
What is the latest updated version of RIP?
RIPv2
What kind of connector would you use to make a patch cable for a 10BaseT network?
RJ-45
A workstation NIC light isn't illuminated. After replacing the NIC, the light still isn't lit. What should be done next?
Replace the cable connecting the NIC to the hub
Which of the following statements best describes dynamic routing?
Routers send and receive advertisements that automatically update the router database table
A user can't connect to the Internet from her workstation. What should be done next?
Run diagnostics on the server
What type of connector would you expect to find in a 1000BaseSX network?
SC
Which protocol is used to upload email messages to an email server?
SMTP
Which two of the following connectors would you use when working with fiberoptic cable?
ST, SC
What type of connection is required at a hub port that's marked MDI?
Straight-through pinning at the port connector is required
_____ takes a single bit at a time and encrypts it on the fly.
Stream cipher
What term is used to describe the process of using parts of the node address range of an IP address as network IDs?
Subnetting
You have been tasked with connecting two computers together to transfer data from one to the other so that the older of the two can be decommissioned. You have 2 straight through networking cables available. Which of the following devices can be used to make this connection work?
Switch
Any encryption that used the same key for both encryption and decryption is called
Symmetric-key algorithm
You move a computer to a new network, using the original ethernet cable that came with the computer. However, when you start it up you notice that nothing is being displayed from the activity light on the back of the NIC. What is the most likely cause of this condition?
The hub port is bad
None of the users on the network can log on to the server. The link lights on all client NICs are lit at the hub. The server NIC link light and the corresponding hub port light are not lit. When one of the workstation cables is inserted into the server port at the hub, the hub link light is lit. What is the likely problem?
The server NIC or cable
What is the purpose of DHCP?
To dynamically assign IP addresses to client workstations
Rack mounted equipment are measured in what units?
U
Encrypted tunnels between a computer or a remote network and a private network through the Internet.
VPN
A protocol to automate the updating of multiple VLAN switches
VTP
What command would you use to delete entries host file?
arp -d
What do twists in a twisted pair cable reduce?
cross-talk
What is the encapsulation named at the Data Link layer?
frames
The most widely used ______ topology are the internet and telephone network.
mesh
What topology allows every computer to connect to another via two or more routes?
mesh
Which network topology is the most fault tolerant?
mesh
What topology is a parallel connection limited to?
point-to-point
Data compression takes place at the
presentation layer
What is the most popular form of email encryption?
public-key cryptography
What is encapsulation?
the process of preparing data to go onto a network
IEEE 802.5 refers to
token ring
When describing the physical structure of a network, what term is used?
topology
To determine the computer name of a remote server, you would _____
use the nbtstat command to resolve the name of the remote server to its IP address