Study.com cs108
What is IMAP?
(IMAP) is a standard internet protocol used for the retrieval of email messages from an email server.
_____ is an example of a TLD name.
.com .com most web resources are categorized under 13 TLD names including .com, .net, .org
Which of the following actions is allowed because of a switch?
Being able to send a document from your office computer to a printer several offices away.
In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?
CAT5e
In a cable network environment, what is the name of the cable type that connects from the wall outlet to the modem?
Coaxial
Which of the following statements about a VLAN environment is TRUE?
Computers or nodes by default are not VLAN aware
SD-WAN is best used for which task?
Connecting branches to the cloud SD-WAN or software-defined wide-area networks rely on software to control services. This will be part of connecting branches to the cloud.
On which component can a router's operating system be found?
Flash memory The router's operating system can be found on the router's flash memory. ROM is the read-only memory for the router. IOS is the name of the operating system found on Cisco routers. Ports are the connectors found on the back of a router that allow you to physically connect computers to the router and the router to the Internet
Which of the following devices can be used to interface computer networks that use different communication protocols?
Gateway
Each computer or device connected to the Internet has a unique identifying number. What is this called?
IP address
What protocol do computer systems (hosts) use when communicating with each other on a network?
IP addresses
What are some of the tunneling protocols that VPNs use?
IPsec and L2TP
A subnet mask _____
Indicates the network address within the IP addresses
Which of these answers describes one possible method to prevent or limit the impacts of a DoS or DDoS
Install and maintain anti-virus (AV) software
Which of the following best describes the connection tool for a new smartphone that can connect to Wi-Fi?
Integrated Wi-Fi
What are the two main routing classifications?
Interior and exterior gateway protocols
Why is the role of RTCP important in VoIP communications?
It allows adjustments to be made to fine-tune transmissions
What makes the symmetric DSL network type so different from the asymmetric type?
It has an equal balance between download and upload speeds.
POP is within what layer of the OSI Model?
Layer 7
The network layer converts:
Logical addresses into physical addresses
Which of the following statements is true?
MAC and IP addresses need to work in parallel for effective communication
Of the options listed, which is the most used WAN (Wide Area Network) carrier?
MPLS MPLS is currently used by three fourths of polled companies. This is due mostly to it's any-to-any capabilities and service provided added services. MPLS lines are in most cases less expensive than traditional WAN lines. Frame Relays are being phased out and are no longer actively sold be the majority of carriers. Dark Fiber and other dedicated lines are expensive and complicated to install. They are typically used in very large enterprises.
What type of coverage does Wi-Fi provide?
Medium range wireless communication
A wireless network for Internet access in a large building is typically connected in a _____ topology.
Mesh
Which of the following wireless communication technologies has the shortest range?
Near field communication
In order to check the nodes that are connected to a system, one can use the command
Netstat
Traffic passed on a network between two nodes on the same subnet:
None of these are required as the switch will likely be physically connected and can send the information on without a routing protocol.
Which of these options properly defines both a DoS and a DDoS attack?
Organized electronic incursions
In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.
Permissions
Which network covers the smallest geographic area?
Personal Area Network
The Subnet is a _____ of a computer network.
Portion
Which switch component allows for devices to be connected to the switch?
Ports Ports allow for devices to be connected to the network switch. RAM handles the switch's short-term memory. Switch Fabric is comprised of hardware and software that work in tandem to ensure that data coming into the network gets sent out via the appropriate port. The Forwarding Engine is the component that is responsible for making all the switching and routing decisions on the device.
The three distance protocols that route information to other nodes that aren't on the same subnet are?
RIP,OSPF,EIGRP
If a video call lags or buffers, which part of the transport protocol works to report on that to remedy the situation?
RTCP
Which part of the transport protocol works in conjunction with signaling protocols in VoIP communications?
RTP
Select the term that best completes the sentence. RIP routers contain _____, a dynamic list of destinations that it can send data to.
Routing tables
Which acronym refers to the network name that your router broadcasts so you can find it?
SSID
Non-repudiation means putting measures in place to assure something cannot be denied. Which of these is a simplified method of non-repudiation?
Sending a letter through certified mail Sending a letter through certified mail, which requires the recipient's presence and signature, is one method of non-repudiation through non-digital channels.
Which two computers facilitate multiplexing and demultiplexing?
Sending and receiving Multiplexing is accomplished on the sending computer, and demultiplexing occurs at the receiving computer.
CAT 3 and CAT 5 belong to which of the following cable categories?
Shielded twisted pair cable Shielded twisted pair (STP) cables come with numbering; the higher the numbering, the better the interference prevention. For example, most computer networks go with CAT 3 or CAT 5.
Which of these is a type of attack that can start off as passive then turn active?
Sniffer
What is the primary use for UDP?
Streaming UDP is used mostly for streaming mediums as it is perfect for this type of network request.
The _____ of an IP address indicates the device.
Suffix The suffix of an IP indicates the device and is useful for the target device or other devices that are on the same network.
Which of the following is not an application layer protocol?
TCP
Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?
TCP/IP
When it comes to home networks, how is the primary IP address generated for all devices?
The ISP assigns a static address to the location, which is translated through a NAT.
How does the MAC Address differ from an IP address?
The MAC address is a hardwired number, permanent and unique to a device's NIC.
What is zero compression?
The ability to reduce zeros in an address in an IPv6 address
What is the 'local factor' in designing a network?
The infrastructure available locally through the local exchange carrier
Which of these statements is FALSE?
The network layer controls the conversations between different computers. * The network layer does all these things except controlling the conversations between different computers. That is done by the session layer.
At the 'receiving' computer, the transport layer provides input to which OSI layer?
The session layer
Which network topology uses concentration routers to interconnect star network WANs?
Tiered topology
When can a network security hardware appliance stop threats on the network?
When it is installed in line.
IMAP can allow a user with multiple devices to _____
access their emails simultaneously from any of the devices.
The unique identifier application to a specific network computer or node is the Network _____.
address
Wireless technology was created to eliminate cables, yet provide _____.
an identical set of features
Of the multiple different addressing types mentioned, which is the odd one out that has no purpose in future IPv6 networking solutions?
broadcast
EIGRP sends payloads from node to node in what manner?
by building a table based upon specific data sets like MTU, bandwidth, etc. and sending the packet along the best course determined by the table.
Which of the following wireless technologies would fit under the WAN category?
cellular Bluetooth and home routers are short-range, whereas cellular and satellite are long-range.
Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.
duplicate concurrent connections to the high level backbone routers
Padding data is required within an Ethernet frame to _____
fulfill minimum field length requirement Data and Pad - hold the actual data. This field requires a minimum field length and so Padding data is added to meet this.
Which command is used for identifying the MAC address of a system?
getmac
Where is the subnet address contained?
in the IP Address and is extracted via the Subnet Mask
A subnet mask _____
indicates the network address within the IP address
How do clients communicate with the server?
network
The _____ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.
physical
Consider a number of computers are in a network, and one computer crashes. In which of the following network topologies will the entire network also go down?
ring
A computer can be a web server if it:
services web page requests by clients connecting to it
One of the main disadvantages of the collapsed backbone is the _____.
susceptibility to complete system failure if the backbone router fails
A client/server system with a single server and multiple clients represent what tier in terms of network architecture?
two-tier A client/server system with a single server and multiple clients has two levels: level 1 is the clients and level 2 is the server. This represents a two-tier network architecture.
One of the most common applications of IMAP is:
Accessing and managing shared and public folders.
Which of these best describes Stuxnet?
Active threat
Which of the following statements is true?
Authoritative name servers respond to queries from recursive name servers Authoritative DNS name servers provide answers to the queries sent by the recursive DNS name servers with the IP address of the domain name quieried
Crosstalk and attenuation are NOT a problem in which of the following media?
Fiber optic cable
Security in a network ensures all of the following about the information that is passed around EXCEPT:
Affordability Security in a network ensures usability, reliability, integrity, and safety of the information that is passed around.
Which of the following is a transmission mode that transmits in two directions, but only in one direction at a time?
Asynchronous
Which of the following statements is true?
Authoritative name servers respond to queries from recursive name servers
How does the use of a router differ from a bridge in telecommunication?
A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
_____ represents a standard IP address.
10101000.01001010.00000101.11100111 Typically, IP addresses are made up of 32 binary bits (1s and 0s computer uses to communicate). These 32 bits partly identify the host (street number) and partly identify the network (street name). The 32 bits are divided into octets (8-bit numbers) separated by a period.
What range of addresses can be issued to a class C network?
192.0.0.0-223.255.255.255
An IPv4 Address is how many bits in length?
32 bits Ipv4 stands for 4 octets of 8 groupings of 4 bits.
IPv4 represents a _____-bit integer and IPv6 represents a _____-bit alphanumeric string.
32,128
The _____ mail command starts the process of sending sequential lines of texts with the message
354
An IPv4 address contains _____ digits in _____ sets separated by a _____.
3; 4; period
An office operates on 3 floors of a building. It comprises 4 different departments. Which of the following network implementation will most suit the office needs?
4 VLANs on 4 switches with trunk link connections
What is the maximum number of IP addresses that can be assigned through means of IPv4?
4.3 billion
The link efficiency of a channel is 0.2 and bandwidth is 4000hz. What is the throughtput?
800hz Throughput = link efficiency * bandwidth = 0.2 * 4000 hz = 800 hz
Which two protocols are NOT backward compatible?
802.11a Protocol 802.11b
In terms of computer networking, what is a router?
A device that allows for several individual networks to be connected to each other.
If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?
A full mesh design.
If you didn't have access to a highly-skilled IT network team, what would be a good option for a WAN (Wide Area Network)?
A fully carrier managed WAN
Who was responsible for the creation of IPv4 protocols?
DARPA
What is one of the major differences between a DSL network and a cable network?
DSL only worked well if the modem was close to the main service area, cable does not have such restrictions.
In WANs, what advantage does the ring topology have over the bus topology?
Data transmission is multidirectional
Which computer network, built by a business, is used to interconnect its various company sites in order to share computer resources?
EPN
Which of the following media is comparatively cheaper, lighter and easier to install?
Twisted pair cable
Access a website by entering the _____ or _____ into the address bar of the Internet browser.
URL, IP address
How many nodes for a network would a /23 be good for address space in IPv4?
Up to 512 /23 is a borrowed down VLSM mask that can have upwards of 512 total addresses or as little as 257 total addresses.