Networking Essentials - Chapter 1 Exam
Cite the three advantages of a wired network.
*1. Faster network data transfer speeds within the LAN* *2. Relatively inexpensive to set up* *3. Network is not susceptible to outside interference*
Expand the acronym LAN.
*LAN (Local Area Network)*
What is the minimum and maximum size of an Ethernet frame?
*Minimum: 64 bytes* *Maximum: 1518 bytes*
Expand the acronym NIC.
*NIC (Network Interface Card)*
Which OSI layer combines messages or segments into packets?
*Network Layer*
Which OSI layer is responsible for adding a header that includes routing information?
*Network Layer*
Define the acronym OUI. Where is the OUI used?
*OUI: Organizationally Unique Identifier. The OUI is found in the first 3 bytes of the MAC address.*
Which OSI layer is responsible for the mechanical connection to the network?
*Physical*
The OSI layer responsible for data compression and encryption is which layer?
*Presentation*
Expand the acronym TCP/IP.
*TCP/IP: Transmission Control Protocol / Internet Protocol*
What is a VPN, and how does it protect the data transferred over a wireless network?
*VPN is virtual private networking. A VPN connection enables a remote or mobile user to access the network as if they were actually physically at the network.* *Additionally, the VPN connection is encrypted providing privacy for the data packets being transmitted.*
Expand the acronym WAN.
*WAN (Wide Area Network)*
You have the choice of selecting a networking device with WEP and another with WPA. Which offers better security and why?
*WPA offers stronger encryption and is supported with most new Wi-Fi systems*
What information is not included in an Ethernet frame? a. Frame size b. Source MAC address c. Pad d. Frame check sequence
*a. Frame size*
The NIC operates at which layer of the OSI model? a. Layer 1 b. Layer 3 c. Layer 5 d. Layer 7 e. All of these answers are correct.
*a. Layer 1*
A hub is also called a multiport repeater. a. True b. False
*a. True*
The "X" on the input to a switch represents a router-only port. a. True b. False
*b. False*
The network address is another name for a layer 4 address. a. True b. False
*b. False*
What is NAT? a. Network Asynchronous Transfer b. Network Address Translation c. Network Address Transfer d. None of these answers is correct
*b. Network Address Translation*
An IP address for an internal computer is assigned by a. the Internet Assigned Numbers Authority b. the local network administrator c. the user of the computer d. Internet Address Numbers Authority
*b. the local network administrator*
The term deterministic means a. Access to the network is provided at random time intervals. b. Access to the network is provided using CSMA/CD. c. Access to the network is provided at fixed time intervals. d. None of these answers is correct
*c. Access to the network is provided at fixed time intervals.*
What does RJ-45 represent? a. A 45-pin connector for CAT6 b. An IEEE standard for data speed c. An 8-pin modular connector for twisted pair Ethernet d. Protocol used to verify a communications link
*c. An 8-pin modular connector for twisted pair Ethernet*
The ping -t ip address command (select all that apply) a. Pings the host at the specified IP address until it is stopped. b. Pings the MAC address of the host at the specified IP address. c. Allows the ping to pass through routers. d. Allows the ping command to be executed from the command prompt.
**a. Pings the host at the specified IP address until it is stopped.*
What are the seven layers of the OSI model?
*1. Physical* *2. Data link* *3. Network* *4. Transport* *5. Session* *6. Presentation* *7. Application*
Cite three advantages of a wireless network.
*1. User mobility* *2. Simple installations* *3. No cables*
What is the minimum size of the data payload in an Ethernet frame?
*46 bytes*
What is the difference between a hub and a switch?
*A hub replicates the data it receives to all devices connected to its ports.* *A switch forwards the data it receives directly to its destination address when its associated port is known.*
What is an uplink port?
*An uplink port is a port on a hub or switch that can be used as either a cross-connected or straight-through input. This is used to connect multiple hubs/switches together.*
In Windows Vista or Windows XP, how would you find the Ethernet (MAC) address?
*At the command line, type ipconfig /all*
What is the maximum speed and length for Category 6 cabling?
*CAT6 cable is capable of supporting a data rate of 1000 Mbps (or greater) over a distance of 100 meters.*
Define the acronym CSMA/CD and the protocol that uses CSMA/CD.
*CSMA/CD: Carrier Sense Multiple Access / Collision Detection, Ethernet*
What are the most common types of equipment that are used to establish abroadband connection to the ISP?
*Cable and DSL modems*
List five steps that can be used to protect the home network.
*Change the default factory passwords.* *2. Change the default SSID.* *3. Turn on encryption.* *4. Turn off the SSID broadcast.* *5. Enable MAC address filtering.*
Which OSI layer is considered the media access control layer?
*Data Link Layer*
Name six issues that should be considered when planning a home network?
*Data speed, cost, ease of implementation, appearance, home access, and public access*
Define the term deterministic
*Deterministic: A way of providing access to a network by giving each network device a fixed time interval to access the network*
How is IP addressing typically handled in a home network?
*IP addressing for the home network is managed by the router or wireless router that connects to the ISP.* *The ISP will issue an IP address to the router from an available pool of IP addresses managed by the ISP.* *The computers in the home network are issued private IP addresses by the router.*
Why is checking the lights of the networking device that connects to the ISP important?
*Incorrect lights can indicate a connection problem with your cable modem, DSL modem, or your phone connection, or your ISP could be experiencing technical difficulties.*
Why are the layers of the OSI model important to the network administrator?
*Knowledge of the OSI layers is used to help isolate a network problem.*
The network interface card operates at what layer of the OSI model?
*Layer 1: Physical*
What layer does a router work at?
*Layer 3*
IP and IPX are examples of protocols that operate in what layer of the OSI model?
*Layer 3: Network*
TCP functions at what layer of the OSI model?
*Layer 4: Transport*
HTTP functions at what layer of the OSI model?
*Layer 7: Application*
What is a hotspot?
*Limited geographic area that provides wireless access for the public*
Expand the acronym MAC.
*MAC (Media Access Control)*
What is Port Address Translation (PAT)?
*PAT is a form of NAT that allows a single address to represent many inside hosts.* *A port number is attached to the network connection. This port number Identifies the device that is establishing a connection to the Internet.* *This number is used when a data packet is returned to the home network.* *The port number identifies the device that established the Internet connection, and the router can deliver the data packet to the correct device.*
Define the term protocol
*Protocol: Set of rules established for users to gain control of the network to exchange information*
Expand the acronym TTL
*TTL: Time To Live*
A router on a home network is assigned an IP address of 128.123.45.67. A computer in the home network is assigned a private IP address of 192.168.10.62. This computer is assigned the public IP address 128.123.45.67:1922. Which IP address is used for routing data packets on the Internet? Is overloading being used?
*The IP address 128.123.45.67:1922 will be used for routing the data packets on the Internet.* *Yes, overloading is being used because one routable IP address is being shared by the home network.*
What does the OUI represent?
*The OUI identifies the manufacturer of the network device.*
What is the purpose of the SSID, and what can the network administrator do to protect the network from hackers who might have learned the SSID?
*The SSID is the name used to identify your network and is used by your access point or wireless router to establish an association.* *Establishing an association means that a wireless client can join the network.* *The SSID can be up to 32 characters and should be changed often so hackers who have figured out your SSID will no longer have access to your home network.*
How does NAT (Network Address Translation) help protect outsider access to computers in the home network?
*The bad guy only sees the router because the IP addresses of the internal networking devices are not provided on the Internet. Only the IP address of the router is provided.* *The home network typically uses private address space that is not routable on the Internet. (Private IP addresses are blocked by the ISP.)*
What do the link lights on a hub represent?
*The link lights indicate that the transmit and receive pairs of the cable are properly aligned.*
What is the purpose of MAC filtering on a wireless network?
*This can be used to select what devices can be allowed access to the network.* *When MAC address filtering is turned on, only wireless devices that have allowed MAC addresses will be granted access to the network.*
What is the purpose of a range expander?
*This device relays the wireless signal from an access point or wireless router into areas with a weak signal or no signal at all*
What does it mean for a wireless networking device to be Wi-Fi compliant?
*This means the wireless equipment is compliant with the 802.11x standards.*
What is Stateful Packet Inspection?
*This type of firewall inspects incoming data packets to make sure they correspond to an outgoing request. Data packets that are not requested are rejected.*
Define the term topology
*Topology: The architecture of a network*
What does cross-connected mean?
*When the transmit and receive pairs on the CAT5 cable are crossed to properly align each for data communication, they are said to be cross-connected*
What are the potential problems of using the default factory passwords?
*Wireless equipment is shipped with default passwords that are set at the factory.* *These default settings are known by the public, including people who would like to gain access into your network and possibly change your settings.*
State the class of address (A, B, or C) for the following IP addresses: a. 46.39.42.05 b. 220.244.38.168 c. 198.1.0.4 d. 126.87.12.34 e. 99.150.200.251 f. 128.64.32.16
*a. A* *b. C* *c. C* *d. A* *e. A* *f. B*
State whether the following network descriptions are describing a MAN, WAN, or LAN: a. A network of users that share computer resources in a limited area b. A network of users that share computer resources across a metropolitan area c. A network that connects local area networks across a large geographic area
*a. LAN* *b. MAN* *c. WAN*
TCP functions at which layer of the OSI model? a. Layer 4 b. Layer 2 c. Layer 3 d. Layer 5 e. Layer 7
*a. Layer 4*
State the network topology being used in Figure 1-32 (Bus, Star, Ring, or Mesh).
*a. Mesh* *b. Bus* *c. Ring* *d. Star*
Which of the following is not a step in building an office LAN? a. Obtaining proper government permits b. Configuring the network settings c. Connecting the devices together d. Network documentation
*a. Obtaining proper government permits*
What is the most common network topology today? a. Star b. Hub c. Ring d. Mesh
*a. Star*
A lit link light indicates that (select all that apply) a. The Link Integrity Test is operational. b. Link pulses are being shared by all devices in the LAN. c. A 10Mbps data link has been established. d. A 100Mbps data link has been established. e. All of these answers are correct.
*a. The Link Integrity Test is operational.*
A cross-connected input port indicates that a. The transmit and receive pairs are crossed. b. Is only used on connections to routers. c. The cable is wired incorrectly. d. Must be avoided on hub and switch port inputs.
*a. The transmit and receive pairs are crossed.*
The network administrator needs to verify a network connection. Which of the following steps should be taken? (Select two.) a. Verify the link lights. b. Use the ping command to verify network connectivity. c. Perform an ARP request. d. Ping the MAC address
*a. Verify the link lights.* *b. Use the ping command to verify network connectivity.*
The IP address 10.10.20.250 is an example of (select all that apply) a. class A address. b. class B address. c. a private IP address. d. a routable IP address. e. a nonroutable Internet IP address
*a. class A address.* *c. a private IP address.* *e. a nonroutable Internet IP address*
The pad field in an Ethernet packet a. is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes. b. is used to bring the total number of bytes up to 64 if the data file is less than 64 bytes. c. is not required with CSMA/CD. d. provides grouping of the information for transmission.
*a. is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes.*
In terms of computer security, a switch offers better security than a hub. Why is this? a. A hub requires a special pin to activate the connection. b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible. c. A switch forwards the data it receives to every device connected to the switch. It is possible for network devices to pick up data intended for a different device. A hub eliminates this by only forwarding data packets to the correct device whenever possible. d. The use of the switch guarantees that all devices connected to it will share link integrity pulses. This sharing of the pulses strengthens the security of the connection
*b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible.*
A protocol defines the network architecture used to interconnect the networking equipment. a. True b. False
*b. False*
What networking protocol does Ethernet use? a. Ethernet uses a token ring passing scheme. The computer devices must possess the ring to be able to pass a token. b. Ethernet uses Carrier Access - Multiple Sensing / Collision Detection c. Ethernet uses Carrier Sense - Multiple Access / Collision Detection d. Ethernet uses Collision Sense - Carrier Access / Multiple Pairing
*c. Ethernet uses Carrier Sense - Multiple Access / Collision Detection*
An Intranet is (select all that apply) a. uses class E addressing. b. used in high speed (gigabit) Ethernet. c. an internal network that provides file and resource sharing. d. enables Fast Ethernet connections. e. not typically accessed from the Internet
*c. an internal network that provides file and resource sharing.* *e. not typically accessed from the Internet*
Which of the following are examples of wireless technologies? a. 802.11a b. 802.11g c. 802.11n d. All of these answers are correct.
*d. All of these answers are correct.*
Which of the following issues should be considered when planning for a home network? a. Data speed b. Public access c. Cost d. All of these answers are correct.
*d. All of these answers are correct.*
HTTP functions at which layer of the OSI model? a. Layer 6 b. Layer 5 c. Layer 4 d. Layer 7 e. All of these answers are correct.
*d. Layer 7*
Network interface card has a MAC address of 00-00-86-15-7A. From this information, specify the OUI. a. There is not sufficient information to specify the OUI. b. The OUI is 86-15-7A. c. The OUI is 86-00-00 d. The OUI is 00-00-86
*d. The OUI is 00-00-86*
How does MAC address filtering help to secure a wireless network? a. This is used to help prevent the theft of network interface cards. b. This requires an additional login step requiring the user to enter his MAC address. c. MAC address filtering is seldom used anymore because of NIC restrictions. d. This can be used to select which networking devices can be allowed access to the network.
*d. This can be used to select which networking devices can be allowed access to the network.*
A disadvantage of the Token Ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding which of the following? a. Router b. Multiport repeater c. Token passer d. Token Ring hub
*d. Token Ring hub*
IP is an example of a protocol that operates in which layer of the OSI model? a. Layer 7 b. Layer 6 c. Layer 5 d. Layer 2 e. None of these answers is correct.
*e. None of these answers is correct.*
What command would you use to ping 192.168.5.36 20 times with 1024 bytes of data?
*ping -n 20 -1 1024 192.168.5.36*
What command would you use to ping 10.3.9.42 indefinitely?
*ping -t 10.3.9.42*