Network+ Guide to Networks - Seventh Edition (MID Term Chpt 1-6)
NFC
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
ipconfig /all
If you have a computer with two network adapters and want to see the IP address configuration for all the adapters, which command should you use?
Windows Domain
If you want users to sign on to the network from any computer to get access to network resources controlled by Active Directory, what type of network do you need?
HTTP
In the client-server model, what is the primary protocol used for communication between a browser and a Web server?
Peer to Peer
In what type of network does each computer control its own resources and communicate directly with other computers?
Layers 1 and 2
In which layer(s) of the OSI model do NICs operate?
Header
What is the very beginning of an Ethernet frame called ?
PAN
What type of network is the smallest geographically?
All devices on your local network
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPV4 network. To which device(s) are you transmitting?
Patch Panel
What kind of networking device on today's racks does nothing to the data transmitted on a line other than pass it along through the connection?
Static route
What kind of route is created when a network admin configures a router to use a specific path between nodes?
Port number
What number does a host use to identify the application involved in a transmission?
Time to Live
What part of a resource record tells a server how long the record should remain in the cache?
probe
What part of a toner and probe kit emits when it detects electrical activity on a wire pair?
53
What port is used by the DNS process?
Ring
What topology is most likely to use a token?
Primary
What type of DNS server holds the master copy of a DNS zone and is responsible for transferring the data to another server when changes are made to the zone?
Protocol analyzer
What type of software can you use to capture and examine the contents of network messages?
CIFS (Common Internet File System)
What version of SMB can be used across Windows, UNIX, and other operating systems ?
Cat 6
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase T-transmissions?
TLD (Top level domain)
What is the last part of an FQDN called?
2001:DB8::1
What is an example of a valid IPv6 address?
Layer 3
What is lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Network Operating System
What is required by the client-server model?
Controlling the speed of the CPU
What is the NOS typically NOT responsible for?
Active Directory
What service provided by Windows Server 2012 R2 allows a computer to serve up applications to other computers on the network?
HTTPS
What should you look for if you want to know if your Web browser session is secure?
Default gateway
What type of device does a computer turn to first when attempting to make contact with a host on another network?
Recursive
When a local DNS server queries a TLD server, what kind of query does it send?
Default Gateway
When a router can't determine a path to a message's destination, where does it send the message?
Rogue access point
An unauthorized AP with a very strong signal near the area.
Web server
Apache is a popular example of what type of networking software?
Network layer
At which OSI layer does IP operate ?
ipconfig/release
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
Cable TV, Telephone signal, Mobile voice
Examples of a broadband transmission.
LAN
Five computers are connected to a switch in a star topology. What type of network is this?
3
How many octets is the network portion of a Class C address?
power redundancy
Providing a backup power source is called __________.
CSMA/CD
What Carrier Sense technology is used on wireless networks to reduce collisions?
Network
What OSI Model layer relies on routing protocols to find the best route for a packet?
Physical
What OSI Model layer sends bits over wired or wireless media?
Domain name
What are the last two parts of a FQDN called?
18U and 42U
What are two primary standard widths for rack systems?
UTP (Unshielded twister pair), STP (Sheilded twisted pair), Fiber optic
What cables are recognized by the TIA/EIA for horizontal wiring?
nslookup
What command should you use to determine the FQDN of a computer with a IP address ?
Root servers
What computers are the highest authorities in the Domain Name System hierarchy?
Simplex, simplex, half-duplex
When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the twisted-pair cable uses ________ transmissions, the receiver pair in the cable uses _______ transmissions, and the twisted-pair cable uses_______ transmissions.
ping
When messages to a remote Web server are being lost for no apparent reason and you suspect the problem might be a path MTU black hole, which TCP/IP utility can you use to diagnose the problem?
FE80::/10
When your computer first joins an IPV6 network, what is the prefix of the IP address the computer first configures for itself?
802.11n
Which 802.11 standard can be used in both the 2.4 GHz and the 5 GHz bands?
Transport layer
Which OSI layer is responsible for directing data from one LAN to another?
RTP (Real-time Transport Protocol)
Which Session layer protocol is a streaming live video teleconference likely to use on the network?
Remote Desktop
Which application embedded in Windows operating system allows remote control of a computer and uses the RDP secure protocol for transmissions.
Class 1
Which bluetooth class has the highest power output?
Cat 5e and higher
Which categories of twisted-pair cable can support Gigabit Ethernet?
Telnet
Which client-server application allows an admin to control a remote computer but does not encrypt or secure the communication between the client and server?
POP3
Which email protocol allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?
IMAP4
Which email protocol allows an email client to read mail stored on the mail server?
Statistical multiplexing
Which kind of multiplexing assigns slots to nodes according to priority and need?
MSDS
Which of the following explains how to properly handle substances such as chemical solvents and how to dispose of them?
0 to 1023
Which of the following is the range of well-known Transport layer ports?
Wi-Fi
Which one of the following wireless transmission types does NOT require a clear LOS to function.
The OUI (Organizationally Unique Identifier)
Which part of a MAC address is unique to each manufacturer?
Default Gateway
Which part of a computer's address is used by the host to access another network?
SSH (Secure Shell)
Which protocol creates a secure channel between two computers and is a client-server command-line application?
TCP (Transfer Control Protocol)
Which protocol's header would a layer 4 device read and process ?
BGP (Border gateway protocol)
Which routing protocol does an exterior router use to collect data to build its routing tables?
Test your theory to determine the cause
Which step in the troubleshooting process should you take after you have established a theory of probable cause?
SSL and TLS
Which two encryption protocols might be used to provide secure transmissions for browser and Web communications?
PTR (Pointer record)
Which type of DNS resource record is used for reverse lookups?
Ethernet II frame
Which type of Ethernet frames do today's networks use?
MAC address
Which type of address is embedded on a NIC?
NEXT (Near end cross-talk)
Which type of cross-talk occurs between wire pairs near the source of a signal?
Analog
Which type of transmission is measured by baud rate?
The caching and primary DNS servers, because the caching server is requesting zone transfers from the primary server.
You have just brought online a new secondary DNS server and notice your monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
ping localhost
You want to find out if the TCP/IP services are working correctly on the computer you are working on. Which command should you use?
Evil twin
A fake wireless wi-fi broadcast
Bluesnarfing
A hacker takes advantage of a Bluetooth connection to send a virus to a user's phone. What kind of security breach has occurred?
AD (administrative distance)
A route protocol's reliability and priority are rated by what measurement?
Ad hoc
A student has completed his part of a group research paper, and needs to share it with a classmate. he sees the classmate as they're crossing the parking lot between classes. Which WLAN architecture could they use to transfer the file from one laptop to the other?
Conversational voice, streaming live audio and voice ,and streaming stored audio and voice.
List three types of services a network might support that are considered part of unified communications or convergence?
Transport
On which layer of the OSI Model do you find both a connection-oriented and a connectionless protocol that is responsible for transporting data from one application to another?
255
What decimal number corresponds to the binary number 11111111?
Amplifier, repeater
What device can boost an analog signal? A digital signal?
Router
What device do you need if your network has multiple LANs that need to communicate with each other?
Surge Protector
What device protects computer equipment from a momentary increase in voltage due to lightning strikes, solar flares, or electrical problems?
Rack-monitoring system
What devices provides a central control portal for all devices on a rack?
Port number
What does the Transport layer use as an addressing method to identify an application running on a host?
Acknowledgment number
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Inverter
What generator component converts DC power from the generator to AC power that the electrical infrastructure in a data center can use.
SMTP (Simple Mail Transfer Protocol) is a connection-based protocol that uses TCP
What is a statement that describes SMTP?
User accounts are assigned in one place
What is an advantage of client-server networks over peer-to-peer networks?
172.55.100.254
What is an example of a Class B IP address?
Escalate the problem.
While troubleshooting a problem, you believe the problem is with a router configuration but you don't have security privileges to change the router configuration? What should you do?
Star
With what topology are all the devices connected to a central switch?
To use a dynamic IP address
You are examining the IP address of a computer and find that it is 169.254.44.100. How is that computer most likely configured?
Convergence
What is the term for the use of the same network to deliver multiple types of communication services such as video, voice, and fax?
Coaxial cable, coaxial cable, F-connectors
What kind of cable uses BNC connectors, F-connectors? Which connector is likely to be used by cable TV?
SMTP
What protocol does an email client use to send an email to the first server?
ICMP ( Internet Control Message Protocol )
What protocol is used by the ping utility to send echo request and echo reply packets?