Network+

¡Supera tus tareas y exámenes ahora con Quizwiz!

100BASE-TX

-100mbps -called Fast Ethernet

10BASE-T

-RJ-45 connector -cat3 or higher cable -10mbps

DWDM (Dense Wavelength Division Multiplexing

-allows for more channels per fiber-channels spaced .8 nanometers apart Used on most modern fiber-optic networks Extraordinary capacity Typically used on high-bandwidth or long-distance WAN links

CWDM (coarse wavelength division multiplexing)

-allows up to 8 useable channels per fiber-channels spaced 20 nanometers apart

Which switch is used with the Windows netstat utility to show name of a running program?

-b

Which switch is used with the Windows netstat utility to show the process ID?

-o

What value will most routers insert into the routing table Destination LAN IP column if there is no gateway needed?

0.0.0.0

Which of the following could be a valid Autonomous System Number (ASN)?

1.33457

What is the data transfer speed for DS1?

1.544 Mbps

U (Unit) (Height)

1.75 inches

Which IP address is a private IP address?

10.164.19.5

How many binary digits are in in an IPv6 address?

128

How many powerful DNS server clusters, scattered all over the world, does the DNS root contain?

13

Which port is used to receive e-mail messages from e-mail servers (IMAP4)?

143

What is the maximum number of hops allowed by RIP?

15

How much data can frames hold?What happens when data file to big?

1500 bytes. If data is over, it is sent back to NIC for it to send

What is the range of transfer speed for ATM

155.52 to 622.08 Mbps and beyond

Evolved High-Speed Packet Access (HSPA +) provided theoretical speeds up to _______, although most HSPA + implementations rarely exceeded 10 Mbps .

168 Mbps

Which TCP/IP port does the H.323 video presentation protocol use?

1720

What is the maximum distance between a user's demarc and the central office for all versions of DSL?

18,000 feet

Whats the gain of the typical WAP ANTENNA?

2 dB

Which address range does multicast use in IPv4?

224.0.0.0/4

Which subnet mask is an example of classless subnetting?

255.255.240.0

Which formula would you use to arrive at the number of hosts on a subnet?

2^x-2, Where x represents the number of zeros in the subnet mask

Which formula would you use to calculate the number of new subnets?

2y, where y is the number of bits you add to the subnet mask

LTE networks feature speeds of up to _______ download

300 Mbps

How many binary digits are in an IPv4 address?

32

How long is a subnet mask?

32 bits

One of the last GSM technologies, Enhanced Data rates for GSM Evolution (EDGE ), offered data speeds up to

384 Kbps

Which key size does WEP use?

40 bits and 104 bits

What is the low end speed of the SONET Optical Carrier specification (OC - 1)

51.8 Mbps

What is the size of an ATM fixed-length cell?

53 bytes

Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which two can go through a NAT router?

6in4 and Teredo

Which now deprecated tunneling protocol enabled IPv6 traffic over the IPv4 Internet?

6to4

LTE network upload speed

75 Mbps

Jumbo frame are usually _____ bytes long

9000

Which address notation is the IPv6 loopback address?

::1

preamble

A 7 byte series, followed by a 1 byte start frame delimiter. Always precedes a frame

BPDU Guard

A Cisco switch feature that listens for incoming STP BPDU messages, disabling the interface if any are received. The goal is to prevent loops when a switch connects to a port expected to only have a host connected to it.

MAC address

A Media Access Control address is a hardware address that uniquely identifies each node on a network. 48 bit (6 byte) number.

punchdown block

A device used to connect network cables from equipment closets or rooms to other parts of a building.Connections to networking equipment such as hubs or switches are established from the punchdown block.66 block - telephone systems110 block - modern network and telephone connections using VOIP

Angled Physical Contact (APC)

A fiber-optic connector that makes physical contact between two fiber-optic cables. It specifies an 8-degree angle to the curved end, lowering signal loss. APC connectors have less connection degradation from multiple insertions compared to other connectors.

Community clouds are run by

A group of organizations with similar goals or needs

SFP (Small Form Factor Pluggable)

A standard hot-swappable network interface used to link a connectivity device's backplane with fiber-optic or copper cabling. up to -5gbs

PortFast

A switch STP feature in which a port is placed in an STP forwarding state as soon as the interface comes up, bypassing the listening and learning states. This feature is meant for ports connected to end-user devices.

GBIC (Gigabit Interface Converter)

A transceiver used to convert electrical signals into optical signals and vice versa. -1.25gbps -obsolete -the first type of modular transceive

SFP+

A type of SFP that can send and receive data at rates of up to 16 Gbps.

MMF (multimode fiber)

A type of fiber-optic cable that contains a core with a diameter between 50 and 100 microns, through which many pulses of light generated by a light emitting diode (LED) travel at different angles.

SMF (single-mode fiber)

A type of fiber-optic cable with a narrow core that carries light pulses along a single path data from one end of the cable to the other end. Data can be transmitted faster and for longer distances. However, it is expensive.

Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?

Active Directory

Almost all TCP/IP applications have moved to __________ for symmetric cryptography.

Advanced Encryption Standard (AES)

What is the function of the multicast address FF02::1?

All nodes address

Uplink Port

Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable

Which statement is true of an IPv6 prefix?

An IPv6 prefix is a maximum of 64 bits.

Physical Contact (PC)

An early generation of the ferrule that has a curved tip, which allows the two fibers to meet more closely than a flat surface would.

Which test should a network administrator run on a CSU / (DSU) to test a WAN connection and verify the T-carrier connection from end to end

BERT

Which protocol is a path vector routing protocol?

BGP

By convention, what is the name given to Area ID 0 (zero) of an Open Shortest Path First (OSPF) network?

Backbone

Which term is synonymous with traffic shaping?

Bandwidth shaping

What type of unit is formed by a single WAP servicing a given area?

Basic Service Set (BSS)

Which term refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

BlueBorne

Which protocol is used on the Internet for communication between Autonomous Systems?

Border Gateway Protocol (BGP-4)

Which method of sending a packet allows every computer on the LAN to hear the message?

Broadcast

Which device provides termination at each end of a T1 connection?

CSU/DSU

100BaseT

Cable type: Cat 5 or better/UTP or STP Speed: 100 Mbps Signal type: BasebandDistance: 100 meters

1000BaseSX

Cable type: MMF with ST/SC Speed: 1 Gbps Signal type: Baseband Distance: 220-500 meters

100BaseFX

Cable type: MMF with ST/SC Speed: 100 Mbps Signal type: Baseband Distance: Two kilometers

1000BaseLX

Cable type: SMF Speed: I Gbps Signal type: Baseband Distance: 5 kilometers

Which DNS server is used to talk to other DNS servers to resolve IP addresses for DNS clients?

Cache-only DNS server

Which term refers to a standardized type of file that includes a public key with a digital signature, and the digital signature of a trusted third party?

Certificate

Time- division multiple access (TDMA ) enabled multiple users to share the same _______ more or less at the same time .

Channel

A particular multicast called an IGMP group is assigned an address in which class range?

Class D range

Which statement best describes a Class E address ID?

Class E is considered to be experimental.

Which task is performed by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers?

Classless Inter-Domain Routing (CIDR)

Which organization is the biggest player in the certificate authority market?

Comodo

Windows leans heavily on __________.

DDNS

Which term does CompTIA use in place of a relay agent?

DHCP relay

Which term refers to an authentication and authorization protocol designed to prevent bad guys from impersonating legitimate DNS servers?

DNSSEC

If you have cable Internet service, what protocol is used between the head end connection and the cable company's network?

DOCSIS

Each analog voice call gets converted into a __________ signal at the telephone company's central office before being multiplexed into larger circuits.

DS0

What's is the most basic data chunk you get in the telephone world?

DS0

Which digital signaling rate has a frame containing a framing bit and 24 channels where each channel holds a bit DSO data sample ?

DS1

A common ealy DSL installation consisted of a _______ connected to a telephone wall jack and to a standard network interface card (NIC) in the computer.

DSL modem

Which device takes 8-bit- wide digital data, converts it into 1bit wide digital dataand then hands it to a modem for conversion to analog?

DSL modem

Which term describes a DSL device that is located in a central office connecting multiple DSL customers to the internet ?

DSLAM

Using the ping command, which message is displayed if your computer has no route to the address listed?

Destination host unreachable

Which 802.11 collision avoidance method is currently implemented?

Distributed coordination function (DCF)

What tasks should be performed as soon as an administrator finishes configuring a router?

Document how you configured the router and back up the router configuration.

Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?

Dynamic NAT

Which term refers to ports in the 49152 to 65535 range?

Dynamic port

Which authentication method is commonly used for more-secure wireless networks?

EAP-TLS

Which hypervisor is industry leader?

ESXi

Which term refers to session information stored in RAM by a computer on one side of a session?

Endpoint

Which term describes the status of a port that is part of an active working endpoint pair?

Established port

Which email server type has over 50 percent market share and runs on just about everything, from Unix/Linux to Windows?

Exim

Whenever you allow authorized remote users to access some part of your private network have created a(n) ________

Extranet

What is the universal MAC address for broadcast?

FF-FF-FF-FF-FF-FF

Which multicast reserved address is designed to reach solicited-node addresses?

FF02::1:FFXX:XXXX

Which multicast addresses will only reach routers?

FF02::2

A port number is an 8-bit value between 0 and 65535.

False

A system connected to a VPN looks as though it's on a remote network.

False

IPv6 will use the IPsec Tunnel mode by default.

False

If a primary DNS server goes down, the secondary servers can resolve FQDNs and add new records.

False

In DNS load balancing, all Web servers share the same IP address.

False

Layer 2 Tunneling Protocol (L2TP) has authentication and encryption.

False

Routers work at the Network layer of TCP/IP model.

False

TCP and UDP both offer encryption methods at Layer 4 of the OSI model.

False

The Kerberos authentication protocol was developed primarily for use with the Point-to-Point Protocol (PPP).

False

The SSH File Transfer Protocol (SFTP) is designed to run over an FTP session.

False

Using class blocks enables a much more efficient use of IP addresses compared to subnetting.

False

When a computer gives itself an Automatic Private IP Address (APIPA), it also includes a valid default gateway address.

False

Wireless devices can listen and send at the same time

False

The Internet Control Message Protocol (ICMP) works at Layer 3 to deliver connection-oriented packets.

False, cuz its connectionless

Which technology refers to an infrastructure that can be utilized to support a SAN?

Fiber Channel over Ethernet (FCoE)

Local Connector (LC)

Fiber-optic cable connector that corresponds to the mini form-factor standard. Colloquially known as the "little connector."

plenum cable

Fire resistant and non-toxic; it must be used when wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned.

On an authoritative DNS server, which storage areas hold the IP addresses and FQDNs for the computers in a domain?

Forward lookup zones

Which zone files are the most important part of any DNS server?

Forward lookup zones

Which technology acts on behalf of clients, getting information from various sources and handing that info to the clients?

Forward proxy server

What characteristic does spread-spectrum transmission change for each user

Frequency

Which statement describes an ISDN PRI?

Full T1 line, carrying 23 B channels

What type of IPv6 address do you need to get on the Internet?

Global unicast address

Which technology was the final 3G data standard

HSPA+

Which protocol uses TCP as its transport layer protocol?

HTTP

Which proxy servers are the most common type of proxy server?

HTTP

What term best describes the way the DNS name space is organized?

Hierarchical

Which term refers to the passage of a packet through a router?

Hop

Both Z- Wave and Zigbee use a mesh networking topology to facilitate communication in homes , yet both also have _______ that act as the network interconnect .

Hubs

Which standard, developed by Citrix, is used with a remote terminal connection?

ICA

Which organization has the authority to create new top-level domain names?

ICANN

Which protocol does the ping application use?

ICMP

Which protocol is best for simple, connectionless applications that never need more than a single packet?

ICMP

Which trunk standard enables you to connect switches from different manufacturers?

IEEE 802.1Q

Which standard includes secure authentication using a RADIUS server and password encryption using EAP?

IEEE 802.1x

Which organization developed the new IPv6 addressing system?

IETF

Which of the following is an authentication and encryption protocol suite that works at the Network layer of the OSI seven-layer model?

IPSec

Which protocol uses nonstandard addresses for the endpoints?

ISATAP

What is a Peer to Peer Network?

In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts. . Advantages of peer-to-peer networks include the following:• Easy implementation• InexpensiveDisadvantages of peer-to-peer networks include the following:• Difficult to expand (not scalable)• Difficult to support• Lack centralized control• No centralized storage

What type of unit is formed by two or more wireless nodes communicating in ad hoc mode

Independent basic device set (IBSS)

Which term describes the predetermined silence period that is added to the length of the current frame to determine the waiting period for a network device after it has detected traffic on the media?

Inter frame gap

Which column in a routing table tells the router which of its ports to use?

Interface

Which organization assigns Autonomous System Numbers (ASNs)?

Internet Assigned Numbers Authority (IANA)

Which attribute applies to the OSPF routing method?

It corrects link failures and creates convergence almost immediately.

Which proprietary Cisco protocol was combined with PPTP to create the Layer 2 Tunneling Protocol (L2TP)?

L2F

Which protocol is the tool that programs use to query and change a database used by the network?

LDAP

A Word document that stops or an online file that stops downloading are examples of

Latency

What OSI model layer supports content switches?

Layer 7

__________ specifies a number of features and options to automate the negotiation, management, load balancing, and failure modes of aggregated ports.

Link Aggregation Control Protocol (LACP)

LACP

Link Aggregation Control Protocol (LACP) Protocol designed to dictate how network multiple network devices send and receive data as a single connection on a network.

VLANs based on __________ are called dynamic VLANs, although they are never used these days.

MAC addresses

Which routing metric determines the largest frame a particular technology can handle?

MTU

Which term refers to a technology that serves as a replacement for frame relay and ATM switching?

Multi-protocol label switching (MPLS)

Which method of sending a packet allows a single computer to send a packet to a group of interested computers?

Multicast

Which address is a set of reserved addresses designed to go only to certain systems?

Multicast address

Which protocol makes the IPv6 automation magic work?

Neighbor Discovery Protocol (NDP)

To what layer of the OSI model does the TCP/IP model's Internet layer roughly correspond?

Network

__________ defines a newer series of protection applications that combine the features of what traditionally was done by separate applications.

Network access control (NAC)

What is a Client Server Network?

Network? In a client-server network, hosts have specific roles. Advantages of client-server networks include the following:• Easy to expand (scalable)• Easy to support• Centralized services• Easy to back disadvantages of client-server networks include the following:• Expensive server operating systems• Extensive advanced planning required

Which routing protocol is the choice in most large enterprise networks?

OSPF

Straight Tip (ST)

One of the most common fiber-optic connectors, similar in style to the BNC connector used in 10Base2 Ethernet.

Which term describes the status for a socket that is prepared to respond to any IP packets destined for that socket's port number?

Open port

Which connection type is always used for dial-up connection to the Internet?

PPP

Which phone line has a baud rate of 2,400 and uses an RJ - 11 connector

PSTN

To make rollouts affordable, most the home technologies employ a architecture that single ber to the nethborhood switch and then individual destination

Passive optical network (PON)

PVC

Polyvinyl chloride-cheap and flexible plastic for their insulators and jackets. in a fire it can burn and release toxic smoke

Which form of NAT typically handles the one-to-many connections?

Port Address Translation (PAT)

Which protocol is the Cisco protocol for accomplishing aggregation?

Port Aggregation Protocol (PAgP)

Your company has a single server on a private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?

Port forwarding

Which standard offers authentication, authorization, and accounting?

RADIUS/Terminal Access Control Access Control System Plus (TACACS+)

Which routing protocol does not support Variable-Length Subnet Masking (VLSM)?

RIPv1

What protocol was adopted in 1994, and is now considered obsolete except for small, private WANs?

RIPv2

Which protocol is a distance vector routing protocol?

RIPv2

Which entity passes out IPv6 prefixes?

RIRs

Which term refers to the standard used by the vast majority of Volp solutions

RTP

Which protocol is commonly used to stream video?

RTSP

IANA has grown dramatically and now oversees five __________ that parcel out IP addresses to large ISPs and major corporations.

Regional Internet Registries (RIRs)

What enables a system to determine an FQDN by knowing the IP address?

Reverse lookup zones

Which terms refer to versions of DSL service?

SDSL and ADSL

Microsoft has used DNS names with the __________ protocol to provide folder and printer sharing in small TCP/IP networks.

SMB

Which record type defines the primary name server in charge of the forward lookup zone?

SOA

What are the two most common types of SSL VPNs?

SSL portal VPNs and SSL tunnel VPNs

When you install an ISDN terminal adapter (TA)what special number provided by the telephone company must be configured along with the other ISDN telephone number you want to call?

Service Profile ID (SPID)

MT-RJ (Mechanical Transfer Registered Jack)

Sometimes called a Fiber Jack connector, it is a compact snap-to-lock connector used with multimode fiber.

STP

Spanning Tree Protocol. Protocol enabled on most switches that protects against switching loops. A switching loop can be caused if two ports of a switch are connected together

Code-division multiple access (CDMA) came out not long after GSM, and used a _________ form of transmission.

Spread-spectrum

A DHCPv6 server is operating very similarly to an IPv4 DHCP server by passing out complete IPv6 information: addresses and default gateways, as well as items like DNS server addresses. In which mode is this server?

Stateful

A(n) __________ DHCPv6 server relies on router advertisements to give some information to individual hosts, making small changes to what the router advertisements would normally show, such as the address of the DNS server.

Stateless

__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.

Static NAT

What is the cornerstone of subnetting?

Subnet mask

What is the de facto protocol suite of the Internet?

TCP/IP

What network protocol do Apple systems use today?

TCP/IP

What file transfer protocol uses UDP port 69?

TFTP

Which terms refer to automatic tunnel configuration protocols?

TSP and TIC

Layer 2

The Data Link layer defines the rules and procedures for hosts as they access the Physical layer.These rules and procedures define:• How physical network devices are identified on the network by defining a unique hardware address (physical or MAC address).• How and when devices have access to the LAN and can transmit on the network medium (media access control and logical topology).• How to verify that the data received from the Physical layer is error free (parity and CRC).• How devices control the rate of data transmission between hosts (flow control).At the Data Link layer, data segments are called frames.Switches, bridges and NICs, and WAPs function in Layer 2.

What information is kept in the cached lookups folder for a DNS server?

The IP addresses already resolved

Ina Basic Service Set Identifier (BSSID) infrastructure mode network, the BSSID is the same as __________ for the WAP

The MAC Address

Layer 1

The Physical layer of the OSI model sets standards for sending and receiving electrical signals between devices.Protocols at the Physical layer identify:•How digital data (bits) are converted to electric pulses, radio waves, or pulses of light and moved across network cables.•Specifications for cables and connectors.•The physical topology.At the Physical layer, data segments are called bits. NICs, repeaters, hubs, WAPs, and modems function in Layer 1.

Which item is part of a fully qualified domain name (FQDN)?

The host name

Layer 3

The network layer is responsible for moving data between systems throughout the internetwork and is where routing happens. Routing takes a message sent from a device to a router to another router - maybe through several routers - to the destination device. Routing protocols specify how each router identifies destination networks and the path data should take to arrive at that destination network.One very important thing that happens at the network layer is the assignment of IP addresses.When a segment is passed off to the network layer, the source and destination IP addresses are added to the segment, and the data then becomes a packet.At the Network layer, data segments are called packets.

Layer 6

The presentation layer can be thought of as the formatting layer. This layer deals with syntax, encryption, and compression. One example of this is a Web site using the HTTP protocol. When data is encrypted, the HTTP protocol doesn't do this. Instead, the SSL protocol encrypts the data at the presentation layer.Specifically, the Presentation layer ensures:• Formatting and translation of data between systems.• Negotiation of data transfer syntax between systems by converting character sets to the correct format.• Encapsulation of data into message envelopes by encryption and compression.• Restoration of data by decryption and decompression.

Layer 5

The session layer uses a session ID to identify unique sessions. This keeps the data stream separated so that information requested by one client isn't sent to another client. The session layer is also responsible for terminating sessions. It's responsible for creating sessions between communication devices. Each client connection is called a session. An example of this is multiple clients connected to a Web server.

Which statement describes a weakness in WEP that allows it to be easily cracked?

The size of the encryption key

Layer 4

The transport layer is responsible for delivering data on a network. The transport layer receives data from the upper layers and segments it. For example, suppose you're downloading a 4 MB file from a Web site. The transport layer knows that a 4 MB file can't be sent all at once, so it segments the data.It divides data into smaller blocks called segments and identifies each block with a sequence number.The sequence number helps the receiving device reassemble the segment blocks in the right order.The sequence number also helps identify any segments that got lost in transit, allowing a device to request retransmission of a lost segment.The transport layer is also responsible for flow control between two hosts. If data is being sent too fast or too slow, the receiving device can send a message telling the sending device to slow down or speedTransport layer functions include:• End-to-end flow control.• Assigns port and socket numbers.• Segmentation, sequencing, and combination.• Connection services, either reliable (connection-oriented) or unreliable (connectionless) delivery of data. TCP and UDP

Layer 7

This layer is responsible for integrating network services with the operating system. The application layer provides an interface between an application running on the system and the rest of the network. It doesn't refer to the application itself.The Application layer include:• HTTP• Telnet• FTP• TFTP• SNMP

What is another name for a timestamped service ticket?

Token

Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?

Transparent, server, and client

What OSI model layer supports PPTP?

Transport

A very early protocol called Bootstrap Protocol (BOOTP) preceded DHCP in providing dynamic IP addressing.

True

A zone is a container for a single domain that gets filled with records.

True

An anycast address is a unicast address.

True

Before the Internet existed, the biggest drawback to remote connections was the cost to connect.

True

Digital signatures are very popular with e-mail users.

True

E1 and T1 lines can interconnect for international use

True

Every DNS forward lookup zone will have one SOA and at least one NS record.

True

Every operating system's virtual private network (VPN) client fully supports L2TP/IPSec VPNs.

True

Glass is notorious for bending radio waves as the waves pass through them causing refraction

True

IPv6 always uses link-local addressing for communicating on a local network.

True

IPv6 completely drops the idea of broadcast addresses, replacing it with the idea of multicast.

True

IR blasters can emulate any IR remote control, turning any Android into a universal remote

True

If your network consists of only two, three, or four routers, RIP's easy configuration often makes it worth putting up with slower convergence.

True

Just like with a traditional hard disk, we have to format a virtual disk before we can use it

True

Lightweight EAP (LEAP) is a proprietary EAP authentication used almost exclusively by Cisco wireless products

True

Many new routers have CSU/DSUs built into them

True

Most of the connections that make up the high-speed backbone of the Internet use technologies designed at least years ago to support telephone calls.

True

NetBIOS was suitable only for small networks.

True

One nice aspect of DSL is that you do not have to run new phone lines

True

SIP and H.323 both run on top of Real-time Transport Protocol (RTP) .

True

Subnet masks are always 32 binary digits long.

True

Systems that use static IP addressing can never have DHCP problems.

True

The 802.11 standard defines both how wireless devices communicate and how to secure that communication

True

The best example of nonrepudiation is a digital signature.

True

The first binary octet of a Class C IP address always begins with 110 (110xxxxx).

True

The latest version of ANT is ANT+

True

The original CDMA was considered a 2G technology.

True

There is a strong movement toward using the term Internet Protocol instead of the term TCP/IP.

True

Transmission Control Protocol (TCP) chops up data into segments.

True

WAPs use an access control list (ACL) to enable or deny specific MAX addresses

True

When a DHCP client boots up, it automatically sends out a special DHCP Discover message using the broadcast address.

True

When a technician installs a range of IP addresses, this is called a DHCP scope.

True

XenServer is a powerful hypervisor that serves as the foundation for massive cloud offerings

True

You rarely have a choice of tunneling protocol.

True

Zigbee is a completely open standard

True

Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?

Trunk port

__________ create the actual tunnel and (usually) offer a custom-made endpoint client for you to use, although more advanced users can often make a manual connection.

Tunnel brokers

Which type of hypervisor relies on an underlying operating system

Type 2

Which protocol do Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) use?

UDP

Which method of sending a packet allows one computer to send a message directly to another user?

Unicast

Bridge Protocol Data Unit (BPDU)

Used by switches to share information with other switches that are participating in the Spanning-Tree Protocol

What is a Terminator

Used in a Bus Topology a terminator is placed at both ends of the trunk cable. Terminators absorb signals and prevent them from reflecting repeatedly back and forth on the cable.

What is the current modem standard now on the market?

V.92

Which program is a bare-metal virtualization software

VMware ESXi

Which term refers to the first generation of packet-switching technology?

X.25

What is the name of the classic Cisco console cable, more commonly called a rollover cable?

Yost

frame

a container for a chunk of data moving across a network. It encapsulates (wraps) information and data for easier transmission. NIC creates/send, receives/reads these frames

broadband

a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.

baseband

a type of transmission in which the entire channel capacity of the communications medium (such as cable) is used by one data signal, enabling only one node to transmit at a time

pad

adding extra data to bring the frame up to the minimum 64 bytes

In IPv6, __________ is commonly used with DNS.

anycast

Which term refers to a software connection that passes traffic from the real NIC to a virtual one?

bridge

What entry is made at the command prompt in UNIX/Linux to display DNS server information?

cat /etc/resolv.conf

You won't get an HTTPS connection without a good __________ exchange.

certificate

unshielded twisted pair (UTP) cable

contains 4 pairs of wires that can transmit and receive data

data

contains whatever payload the frame carries.

Network bridge

created so that larger networks can be segmented or broken up into smaller networks to reduce traffic within that network; acted like a repeater to connect two networks, in addition to filtering and forwarding traffic between the networks based on MAC addresses of computers.

International Organization for Standardization (ISO)

created the OSI seven layer model

A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.

ephemeral port number

CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

ethernet networks use this system to determine which computer should use a shared cable at a given moment. Carrier sense means that each node using the network examines the cable before sending a frame. Once the cable is determined to be free, the node sends out its frame. Multiple sense means that all machines have equal access to the wire. Collision detection is when 2 NICs send at the same time. When this happens, both NICs stop sending and wait for the wire to clear by determining a random time interval to resend; this is a network access method that maps to the IEEE 802.3 standard for Ethernet networks

A Class C network block uses the __________ octets to define only the network ID.

first three

central box

handles the flow of data from each computer to every other computer

type

identifies the frame contents

Which command is used to force a DNS server to update its records?

ipconfig /renew

Which device converts an analog signal to digital and a digital signal to analog?

modulator-demodulator

Which device takes a circuit and combines it with a few hundred other circuits into a single complex circuit on one wire?

multiplexer

When an IPv6 computer joins a network, it sends out multicast __________ packets searching for other computers on its broadcast domain.

neighbor solicitation

If you are using NetBIOS, which command allows you to see if other local systems are visible?

net view

A __________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router.

network-based IDS (NIDS)

What command can you use to tell a device to send packets to itself?

ping 127.0.0.1

Telnet runs on TCP __________.

port 23

Another name for port bonding is __________.

port aggregation

Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network?

promiscuous mode

If you ping a device and no echo reply comes back before the default time, ping will respond with a __________ message.

request timed out

Instead of NAT and private network IDs, IPv6 relies on __________.

router advertisements

A __________only comes into play if a computer hasn't heard from the router recently and demands a router advertisement.

router solicitation

switch

sends the frame only to the interface associated with the destination MAC address

How many copper wires are used by a T1 line?

two pairs

Which tool is used to create, configure, and maintain virtual machines on the host from the comfort of a client computer running the tool?

vSphere Client

Topology Change Notification (TCN)

which is used to indicate that a there has been a change in the switch network topology. Enables the switches to rework themselves around the failed interface or device.

RootGuard

will move a port into a root-inconsistent state if BPDU's coming. from a certain direction indicate a switch is trying to become the root bridge.

Hub & Frames

with a hub, every frame sent on a network was received by every NIC, but only the NIC with the matching MAC address would process that frame.


Conjuntos de estudio relacionados

English III - CLAUSES AND SENTENCE TYPES

View Set

Germ Layers During Embryonic and Fetal Development

View Set

Assignment: Adding and Subtracting Radicals (100%)

View Set

Chapter 3: Inflammation, the Inflammatory Response, and Fever Prep U

View Set

ITIL V 4 Examinable term of Concepts

View Set

The United States Since 1877 - Chapters 15-21

View Set

ACLS practice questions (Edited) 2021-05-12

View Set