Network Tech

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the most commonly used global unicast address?

2001

Which is an advantage of the OSI model? 1. It has encouraged creation of industry standards. Incorrect 2. Layers interact only with adjoining layers. Incorrect 3. Network communication processes are segmented. Incorrect 4. All of the above

4. All of the above

What transport layer protocol provides guaranteed delivery of packets?

TCP

Of the listed values, what is not a common subnet mask? 1. 255.0.0.0 2. 255.255.0.0 3. 255.255.255.0 4. 255.255.255.255

4. 255.255.255.255

Category _____ cable was created for 10Gbase-T installations with cable segments up to 100 meters long.

6A

This wireless standard utilizes both the 2.4-gigahertz and 5-gigahertz frequencies?

802.11n

What type of traffic is transmitted by one computer and goes to all other computers on the subnet?

Broadcast

What protocol provides clients with IP addresses and other TCP/IP configurations?

DHCP

T or F: With CSMA/CD, when a collision occurs, the system that caused the collision must discard the frames and try retransmitting 10 seconds later.

False, both systems must discard their frames and retransmit them.

What is used by administrators to configure, control, and manage users and computers?

Group policy

ICMP is a _____ layer protocol that does not carry user data, although its messages are in IP packets.

Network

What port does TCP use for SMTP?

Port 25

What layer of the TCP/IP model controls data transfer on the network by managing sessions between devices?

Transport

An IPv6 _____ transmission is traffic sent from one computer to one other computer.

Unicast

A ____ creates both collision domains and separate broadcast domains. This also connects network devices together.

Router

What device routes data from the internal network to the internet and from the internet back to the internal network?

Router

A subnet is a group of computers separated from other computers by one or more _____.

Routers

Which IP address is not a usable address? 1) 10.0.0.0 2) 192.168.255.254 3) 192.168.254.255

1 and 3.

A computer has an IP address of 192.168.1.25 and a subnet mask of 255.255.0.0. What is the host ID?

1.25

The binary number for 168?

1010 1000

_____ was the first Ethernet standard.

10Base5

Convert the binary number 1010 1100 to decimal.

172

There are advantages to wireless networks in a business environment, which one(s) are disadvantages? 1. Better flexibility Incorrect 2. Data can travel much farther on a wireless signal as opposed to a wired network Correct 3. Greater mobility Incorrect 4. Improved scalability Incorrect 5. Reduced costs Incorrect

2. Data can travel much farther on a wireless signal as opposed to a wired network.

What is not an acceptable method used for reducing traffic on a LAN? 1. Install a bridge 2. Install a hub 3. Install a router 4. Install a switch

2. Install a hub

Approximately how many IP addresses are available with IPv6?

340 trillion, trillion, trillion

Approximately how many IP addresses are available with IPv4?

4 billion

Category _____ cable is rated for frequencies up to 100 megahertz and is designed to support full duplex transmissions over all four wire pairs on 1,000 Base-T Gigabit Ethernet networks.

5e

The destination address field contains a ______ hexadecimal MAC address of the network interface adaptor on the local network, to which the frame will be transmitted.

6-byte

A full IPv6 address includes _____ groups of four hexadecimal numbers separated by colons.

8

How many computers can be on a LAN?

An organization can conceivably have hundreds or thousands of computers connected to a LAN.

What layer of the TCP/IP model uses protocols to access network resources? Select one:

Application

What media access control mechanism is used for wireless networks?

CSMA/CA

A ________ transmits messages to a destination without first establishing a connection to the receiving system. Select one:

Connectionless Protocol

T or F: Broadcast traffic can be transmitted across all subnets in a network on an IPv4 network.

False

T or F: By disabling a SSID, a network administrator can improve the network's security.

False.

What network device blocks unwanted traffic from the internet?

Firewall

What is the most common LAN topology in use today?

Star

An IPv6 ______ transmission is traffic sent from one computer to multiple other computers.

Multicast

______ connect computers to each other within a subnet.

Switches

What type of device connects computers in a network segment together and creates separate collision domains?

Swtch

What standards organization defines the HTTP protocol?

W3C

What is the primary method used to secure wireless networks?

WPA2

When using a computer running a Windows operating system, what command will show the IP address from the command prompt?

ipconfig

With CSMA/CD, the _____ phase is the phase during which the station transmits its data packet when the network is free and all of the stations on the network are contending for access to the same network medium.

multiple access

A _____ is a name that someone has assigned to a wireless network.

service set identifier (SSID)


Kaugnay na mga set ng pag-aaral

LAT CHAPTER 11: Performing Common Technical Procedures

View Set

Fundamentals chapter 15 critical thinking process test bank

View Set

Chapter 15: Marketing Channels & Supply Chain Management

View Set