Online Quizzes

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

- UDP Length - UDP Checksum - Source and Destination Ports

A UDP segment header contains which of the following fields? Select one or more: - Sequence and Acknowledgement Numbers - UDP Length - UDP Checksum - Source and Destination Ports

Client

A ______________ is a device (software or hardware) typically used by an end user to access a network or resource.

Dual-Ring Topology

A ________________ adds a layer of fault tolerance. If a cable break occurred, connectivity to all devices could be restored.

Router

A _________________ is a layer 3 device that makes its forwarding decisions based on a database it maintains of logical network addresses.

VPN Concentrator

A __________________ can be used to perform processor-intensive encryption and authentication involved with terminating multiple VPN tunnels.

Patch Panel

A ___________________ is typically a wall-mounted or freestanding unit with a number of RJ-45 port connections which can be used to quickly connect end user offices with a network device, such as a switch.

Layer 3 router

A device designed to forward data packets between networks is called:

Hub

A major disadvantage to this obsolete device is that it receives any incoming signal on any port and that signal is repeated out all other ports.

STP

A new IT employee links three network switches together such that each switch connects to the two others. As a result, the network is flooded with useless traffic. What could prevent this situation from happening again?

NOS (network operating system)

A server in a client/server network could be running a ____________ such a Linux Server or Microsoft Windows Server.

- packet sniffer - protocol analyzer

A software tool used for monitoring and examining the contents of network traffic is known as: Select one or more: - packet sniffer - vulnerability scanner - port scanner - protocol analyzer

Plenum Cat 6a

A technician needs to order cable that meets 10GBASE-T and fire safety requirements for an installation of horizontal cabling between a drop ceiling and a standard ceiling. Which of the following will ensure compliance with the requirements mentioned?

Application Presentation Session Transport Network Data Link Physical

Arrange the layers of the OSI model with Layer 1 at the bottom of the stack and Layer 7 at the top of the stack.

- a break results in a network outage for all connected devices - they both have scalability limitations

Bus topologies and single ring topologies have some benefits such as simplicity and ease of troubleshooting. Which of the following drawbacks do these two topologies have in common? Select one or more: - installation can take longer as opposed to star and mesh topologies - a break results in a network outage for all connected devices Correct - more cable is required as opposed to star and mesh topologies - they both have scalability limitations Correct

DHCP Discover DHCP Offer DHCP Request DHCP ACK

Drag and drop the DHCP "handshake" steps provided onto the appropriate area of the image

SSH --Port 22--Used to securely connect to a remote host. TELNET --Port 23--Used to connect to a remote host. DNS --Port 53--Resolves domain names to corresponding IP addresses. SMTP --Port 25--Used for sending Email. SNMP --Port 161--Used to Monitor and Manage Network Devices RTP --Ports 5004/5005--Used for delivering audio and video over IP Networks. SIP --Ports 5060/5061--Establishes and terminates voice and video session. POP3 --Port 110--Retrieves email from an email server. IMAP --Port 143--Retrieves email from an email server. H.323 --Port 1720--Establishes and terminates voice and video sessions.

Drag and drop the port number labels provided onto the appropriate area of the image SSH --__________________--Used to securely connect to a remote host. TELNET --__________________--Used to connect to a remote host. DNS --__________________--Resolves domain names to corresponding IP addresses. SMTP --__________________--Used for sending Email. SNMP --__________________--Used to Monitor and Manage Network Devices RTP --__________________--Used for delivering audio and video over IP Networks. SIP --__________________--Establishes and terminates voice and video session. POP3 --__________________--Retrieves email from an email server. IMAP --__________________--Retrieves email from an email server. H.323 --__________________--Establishes and terminates voice and video sessions.

1

How many collision domains does a hub with 12 ports have?

16

How many collision domains does the following switch have? [16 Port Switch]

Jumbo Frames

IP-based SCSI is designed to support larger than normal Ethernet frames, which are referred to as

- IPv6 has no fragmentation Correct - IPv6 has an increased address space Correct - IPv6 has a simplified header Correct

IPv6 has many advantages over IPv4. Which of the following are some of the advantages IPv6 offers? Select one or more: - IPv6 has no fragmentation - IPv6 has broadcasts - IPv6 has an increased address space - IPv6 has a simplified header

100 M

Identify the distance limitation of a 1000BASE-T Ethernet network.

SAN

Identify the network type below that would help the most if large video files needed to be stored and transferred throughout a network.

ARP

If a workstation on a network does not already have the default gateway's MAC address in its cache, the workstation can send a(n) _______________ in an attempt to learn the default gateway's MAC address.

WAN link

If your company has two geographically separate offices, the two locations could use MPLS or ATM to connect the two locations and these connections are typically referred to as a

presentation layer

In the OSI model, data compression and encryption takes place at the:

Mesh

In which of the following topologies does every node have a direct connection to all other nodes?

Standard Ethernet -- 10 Million Bits per second 100-Gigabit Ethernet -- 100 Billion Bits per second 10-Gigabit Ethernet -- 10 Billion bits per second Gigabit Ethernet -- 1 Billion bits per second Fast Ethernet-- 100 Million bits per second

Match the Ethernet types with the correct bandwidth capacity Standard Ethernet -- ____________________ 100-Gigabit Ethernet -- ____________________ 10-Gigabit Ethernet -- ____________________ Gigabit Ethernet -- ____________________ Fast Ethernet -- ____________________

Application--Raw Data Presentation--Raw Data Session--Raw Data Transport--Segments Network--Packets Data Link--Frames Physical--Bits

Match the OSI layer with the appropriate PDU at each layer:

Transport, Session, Presentation, and Application Layers--NGFW or UTM Network Layer--Traditional Router Physcial Layer--Hubs & Cables Data Link Layer--Tradition Switch

Match the OSI layer with the appropriate device(s) at each layer (Traditional Router, Hubs & Cables, Tradition Switch, and NGFW or UTM) Transport, Session, Presentation, and Application Layers-- _____________ Network Layer-- _____________ Physcial Layer-- _____________ Data Link Layer-- _____________

connects traditional telephone circuits (PSTN) with VoIP network--Gateway analyzes dialed digits and determines how to route the call to the destination--Call Agent switch that connects and manages calls within a private organization and transmits/receives voice signals from other network devices--PBX protocol that goes to work, exchanging voice packets after a voice session is established by a separate protocol--RTP converts analog voice signals into IP packets--VoIP Adapter signaling protocol that sets up and manages voice and video sessions over IP networks--SIP

Match the VoIP network elements with the statements that BEST describe each (VoIP Adapter, Call Agent, RTP, PBX, SIP, and Gateway) connects traditional telephone circuits (PSTN) with VoIP network-- _____________ analyzes dialed digits and determines how to route the call to the destination-- _____________ switch that connects and manages calls within a private organization and transmits/receives voice signals from other network devices-- _____________ protocol that goes to work, exchanging voice packets after a voice session is established by a separate protocol-- _____________ converts analog voice signals into IP packets-- _____________ signaling protocol that sets up and manages voice and video sessions over IP networks-- _____________

Match the addresses with the correct address examples provided IPv4 loopback address --127.0.0.1 IPv6 link local address --FE80::/10 Class B private address -- 172.16.0.1 IPv6 loopback address -- ::1 IPv4 link local address -- 169.254.0.0/16 Broadcast address -- 255.255.255.255

Match the addresses with the correct address examples provided IPv4 loopback address --________________ IPv6 link local address --________________ Class B private address --________________ IPv6 loopback address --________________ IPv4 link local address --________________ Broadcast address --________________

hub that includes some kind of management software that works with SNMP- Smart Hub monitors, amplifies, and regenerates received bits-Active Hub serves as a physical connection point for network devices only and does not regenerate received bits-Passive Hub

Match the hub types with the statement that BEST describes them [Passive Hub, Smart Hub, Active Hub] hub that includes some kind of management software that works with SNMP-______________ monitors, amplifies, and regenerates received bits-______________ serves as a physical connection point for network devices only and does not regenerate received bits-______________

A traditional port found on a PC's NIC -- MDI A traditional port found on an Ethernet switch -- MDIX The most modern port found on an Ethernet switch -- Auto-MDIX

Match the port type with the statement that BEST describes each A traditional port found on a PC's NIC -- ______________ A traditional port found on an Ethernet switch -- ______________ The most modern port found on an Ethernet switch -- ______________

Divides channel into multiple time intervals (time slots)-TDM Assigns time slots according to priority or need-StatTDM Divides frequency range into channels-FDM

Match the statements provided with the appropriate multiplexing approach [FDM, TDM, StatTDM] Divides channel into multiple time intervals (time slots)-____________ Assigns time slots according to priority or need-____________ Divides frequency range into channels-____________

Transfers files and uses SSH port 22 to make secure connections to a remote host- TFTP Transfers files with a remote host, uses TCP ports 20 (data port) and 21 (control port), and typically requires authentication-FTP Transfers files, uses ports 989 (data port) and 990 (control port), and works with SSL or TLS to make secure connections to a remote host-FTPS Transfers files with a remote host, uses UDP port 69, and does not require authentication-TFTP

Match the statements with the correct FTP derivatives provided [TFTP, FTP, FTPS. SFTP] Transfers files and uses SSH port 22 to make secure connections to a remote host-_____________ Transfers files with a remote host, uses TCP ports 20 (data port) and 21 (control port), and typically requires authentication-_____________ Transfers files, uses ports 989 (data port) and 990 (control port), and works with SSL or TLS to make secure connections to a remote host-_____________ Transfers files with a remote host, uses UDP port 69, and does not require authentication-_____________

connection-oriented

TCP is an example of what kind of protocol?

Telnet

The SSH protocol is a more secure alternative to what other protocol?

TTL

The __________ field in an IP packet header contains a value that is used to help prevent routing loops.

MDF

The centralized wiring closet, which often connects out to multiple IDFs is known as the: Provide the acronym

active router

The following image represents a specific networking solution called first-hop redundancy. Which of the following devices might become unavailable and makes this solution a necessity on a network that requires high availability?

- UDP - TCP

The two primary protocols found at the TCP/IP stack's transport layer are: Select one or more: - IP - UDP Correct - TCP Correct - FTP

False

True or False? The TCP/IP Stack or the DoD Model has four defined layers as opposed to the seven layers of the OSI Model. The four layers of the TCP/IP Stack are Application, Transport, Data Link, and Network Interface.

False

True or False? The actual network traffic flow determines the physical topology and the way network components are interconnected via cables and adapters decides the logical topology.

Replace all Ethernet hubs with switches

Users are complaining that the network's performance is unsatisfactory. It takes a long time to access the server and workstations are getting disconnected from the server. The network is heavily used and was created using 1000BASET hubs. Which of the following would you suggest to alleviate the issues on this network?

coaxial cabling

What are F-connectors used for?

- 66 - 110

What are the two main types of punchdown blocks? Select one or more: - 220 - 66 - 12 - 110

it resolves IP addresses to MAC addresses

What is the function of ARP?

It is used to communicate time synchronization information between systems

What is the function of NTP?

MDF

What is the main, centralized wiring closet that typically holds the majority of the network gear, including core routers, core switches, wiring, servers, and more, known as:

1023 and below

What is the range of well-known ports?

Native VLAN mismatches

What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged?

load balancer

What specialized network device might be used for a search engine company, such as Google to prevent a single server from being overwhelmed with the huge amount of requests flooding in from the Internet?

Trunking

What switch feature, pictured below, would allow the Accounting personnel to pass VLAN information between physical switches?

NAT

What technology uses a single external IP address to represent many computers on an internal network?

buffering

When ___________ a router uses a chunk of memory to store segments in a queue if bandwidth is not available to send those segments.

MAN

When a WAN is confined to a certain geographic area, such as a university campus or city, it is know as a:

de-encapsulation

When a network device receives a packet and opens it up to look at the contents, this process is

Baseband

Which approach to bandwidth usage consumes all of the available frequencies on a medium to transmit data?

Presentation layer

Which layer of the OSI model converts data from the application layer into a format that can be sent over a network?

wired mesh

Which network topology has the highest implementation cost as a common drawback?

It provides the route for destinations outside the local network

Which of the following BEST describes the function of the default gateway?

- 25 Correct - SMTP Correct

Which of the following answers are the protocol and port number used by a spam filter? (Select the 2 BEST answers) Select one or more: - TELNET - 23 - 25 - SMTP - HTTPS

- measured service Correct - rapid elasticity Correct - resource pooling Correct - on-demand self service Correct

Which of the following are characteristics of cloud computing? Select one or more: - measured service Correct - rapid elasticity Correct - resource pooling Correct - on-demand self service Correct

- Content filtering to restrict access to certain URLs - Security by hiding network device IP addresses - Load balancing to better utilize a group of servers - Content caching to improve bandwidth

Which of the following are proxy and/or reverse proxy server benefits? Select one or more: - Content filtering to restrict access to certain URLs - Security by hiding network device IP addresses - Load balancing to better utilize a group of servers - Content caching to improve bandwidth

- LLC - MAC

Which of the following are sublayers of the data link layer? Select one or more: - LLC - MAC - Session - LCL

b. less scalability c. typically higher cost to implement

Which of the following are two disadvantages of a full-mesh WAN topology as compared to a hub-and-spoke WAN topology? Select one or more: a. optimal routes b. less scalability c. typically higher cost to implement d. more redundancy

b. less scalability c. typically higher cost to implement Correct

Which of the following are two disadvantages of a full-mesh WAN topology as compared to a hub-and-spoke WAN topology? Select one or more: a. optimal routes b. less scalability c. typically higher cost to implement d. more redundancy

- Cat 6 - Cat 5e

Which of the following categories of UTP cabling are commonly used for 1000BASE-T networks? (select two) Select one or more: - Cat 6 - Cat 5e - Cat 3 - Cat 5

SaaS

Which of the following cloud service models allows consumers to use the provider's applications but they don't manage or control any underlying infrastructure (servers are hidden from the customer)?

Attenuation

Which of the following describes the loss of signal strength as a signal travels through a particular medium further away from the source?

circuit switching

Which of the following describes the process to create a dedicated connection between two communication endpoints and direct traffic between those two points?

encrypted tunneling

Which of the following ensures the privacy of a VPN connection?

Frame with destination MAC address of FF-FF-FF-FF-FF-FF

Which of the following frames would be flooded on a switch port?

BNC

Which of the following is NOT a type of fiber optic connector used in network implementations?

- SNMP (Simple Network Management Protocol)

Which of the following is NOT an email protocol? Select one: - SMTP - POP3 - IMAP - SNMP

Bluetooth

Which of the following is a popular, short-range wireless technology used for connecting personal devices in a PAN?

peer-to-peer network

Which of the following network models offers no centralized storage of data or centralized control over the sharing of files and resources?

partial mesh topology

Which of the following network topologies is shown below?

Switch

Which of the following refers to a layer 2 device designed to make forwarding decisions based on MAC addresses?

IEEE 802.1X

Which of the following standards authenticates computing devices before allowing network access?

- a single cable break can cause complete network disruption - it uses a single backbone to connect all nodes

Which of the following statements are associated with a bus LAN network? Select one or more: - a single cable break can cause complete network disruption - it uses a single backbone to connect all nodes - it uses a dual-ring configuration - all devices connect to a central device

Star

Which of the following topologies allows for network expansion and subtraction with the least amount of disruption to the current network users?

Star

Which of the following topologies would utilize a switch?

Plenum

Which type of cabling might be required for installation in the purple shaded areas of the image below that is used for air circulation.

210

You have been asked to help plan a full-mesh WAN in which the corporate office and all branch offices will have a connection to every site. You have one corporate headquarters office and 20 branch offices. How many WAN links will be necessary to construct a full-mesh network? [Used: N ∗ ( N − 1 ) 2 , where N is the number of nodes]

Mesh

You have been asked to install a network that will give the network users the greatest amount of fault tolerance. Which of the following network topologies would you choose?

VLAN

You have been tasked with segmenting internal traffic between layer 2 devices on the LAN. Which of the following network design elements would most likely be used?

QoS

Your organization uses VoIP. Some of the other network traffic has been disrupting the voice data though. Which of the following should be configured to increase the availability of IP telephony?

ICMP (Internet Control Message Protocol)

___________ is a protocol used by utilities such as ping and traceroute.

DHCP -Port 67/68- Dynamically assigns IP Address Information HTTP -Port 8- Retrieves and displays content from Web Servers. HTTPS -Port 443- Securely retrieves and displays content from Web Servers. RDP -Port 3389- Microsoft Protocol that allows control of a remote desktop. NTP -Port 123- Used to synchronize Network device time to a time server. SMB -Port 445- Used to share files, printers, and other network resources. LDAP -Port 389- Provides directory services to network clients. LDAPS -Port 636- Securely provides directory services to network clients.

____________ -Port 67/68- Dynamically assigns IP Address Information ____________ -Port 8- Retrieves and displays content from Web Servers. ____________ -Port 443- Securely retrieves and displays content from Web Servers. ____________ -Port 3389- Microsoft Protocol that allows control of a remote desktop. ____________ -Port 123- Used to synchronize Network device time to a time server. ____________ -Port 445- Used to share files, printers, and other network resources. ____________ -Port 389- Provides directory services to network clients. ____________ -Port 636- Securely provides directory services to network clients.

IoT (Internet of Things)

_____________ refers to connecting everyday objects, such as lights and speakers, to the Internet in order to make them "smart."

Patch Panel

______________ is a freestanding or wall-mounted unit with a number of RJ-45 port connections on the front, used to interconnect cables coming from end-user offices.


Kaugnay na mga set ng pag-aaral

Fundamentals Networking Tech Chapter 7

View Set

Chapter 35: Employment Discrimination

View Set

PEBLO Module 2, 3, and Course Post Test

View Set

Nurs. 107 Ch 25 Mgmt of Pts W/Complications From Heart Disease Wkbk & Prep-U Questions

View Set

Chapter 38: Family-Centered Care of the Child During Illness and Hospitalization NCLEX

View Set

Chapter 4 pt.1 - Life Insurance Policies

View Set

Complete Chapter 21/25 Blood Cells and the Hematopoietic System

View Set

Light Reactions and Energy Flow During Photosynthesis 🌞

View Set