Networking Review Exam One
What is the fundamental distinction between a MAN and a WAN?
-A MAN connects LANs over a limited geographical area, whereas a WAN connects LANs over a long distance.
What is the fundamental distinction between a node and a host?
-A host is typically a networked device - endpoint devices connected to the network to access or provide resources. A node is a networking device - a device that enables connections on the network, but does not provide applications or data resources for networking devices to access.
What is the fundamental distinction between a layer 2 switch and a router?
-A switch belongs only to its local network while a router belongs to two or more networks. The router acts as a gateway between multiple networks, but a switch can only communicate with a single network.
A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?
-Application Layer -Application Layer deals with the data used by specific applications.
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
-Check the demarc to see whose side the equipment lies on.
How can you go about gathering the information needed to assemble a thorough operations manual?
-Create network diagrams with nMap, take physical inventory by examining MDFs, IDFs and Entrance Facilities, compile all possible information from fellow employees, use pre-existing knowledge bases and wikis.
For what time period should you schedule a network change?
-During off-hours, so there is no disruption in service (unless there is an emergency). If there are no off-hours, select a time period where there are the least users on the network and inform them about the maintenance taking place.
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
-Entrance Facility
While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won't even solve the problem. What should you do next in the troubleshooting process?
-Escalate the Problem
What is the first step of inventory management?
-List all components on the network.
What are some elements that are typically included in network diagrams?
-Logical topology, IP address reserves, names of major network devices, types of transmission media and physical layout such as floor plan or rack diagram.
Why is it important to minimize cable clutter in a rack?
-Minimizing cable clutter can help prevent air blockages and heat buildup.
Which of these is considered a secure place to store a list of documented network passwords?
-Password Manager
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
-Patch Cable
A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
-Physical Layer -The Network Adapter works at Layers 1 and 2 or the Physical and Data Link Layers
Why is it important to use plenum-rated cabling in the area above the ceiling tile?
-Plenum-rated cabling is coated with a flame-resistant jacket, which produces less smoke and is less toxic when burned than typical PVC / Polyvinyl Chloride
Give three examples of networked devices that are not computers.
-Printer, VOIP phone, some HVAC systems, voice gateway
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
-Rack Ears
What is the unit of measurement that defines the space available in a rack? How tall are standard racks?
-Rack Units. 42U / About 6 Feet.
Which of the following devices are you likely to find in the MDF? Choose all that apply.
-Routers, Switches, KVM Switches
Why is it important to use a structured cabling standard when installing and managing cabling systems?
-Structured cabling systems are designed in such a way where they maximize performance and minimize upkeep. Additionally, adhering to a common standard makes it easier for co-workers, third party contractors or anyone else who ends up accessing your network and its infrastructure, as they are all familiar with the conventions specified by the common structured cabling systems in place.
In a large organization, how do you typically request permission to perform a network change?
-Submit a change request document through whomever is responsible for submitting such forms.
List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?
-TCP / Transmission Control Protocol and UDP / User Datagram Protocol. -The transport layer protocols add an address called a 'port' -A port is a number associated with a process, such as an application or service running on a computer. The port directs data to the appropriate process.
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
-Voice Gateway
What type of diagram shows a graphical representation of a network's wired infrastructure?
-Wiring Diagram
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
-Zenmap -Powershell -Command Prompt
What command invokes Nmap at a command line?
-nmap + IP Address
What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?
AD / Active Directory
Suppose Windows Server 2019 is installed on one computer. Which networking model can the network now support that it could not support without the upgrade?
Client-Server
In the event of a fire, the most appropriate failure policy is a _________ policy.
Fail-Open
In the client-server model, what is the primary secure protocol used for communication between a browser and a web-server?
HTTPS
At the network layer, what type of address is used to identify the receiving host?
IP Address
At the data link layer, which type of network address is used to identify the receiving node?
MAC Address
Which of the following applications could be used to run a website from a server?
NGINX
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Peer-to-Peer
Which of the following is an application layer protocol?
RDP
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
SQL
Which two encryption protocols might be used to provide secure transmissions for email services?
SSL and TLS
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Test the theory to determine the cause.