MTA Network Fundamentals

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The "NTP" value in which resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it.

Time to Live (TTL)

Layer 4

Transport Layer

Layer 3 of the OSI model controls routing between network devices.

True

T or F: A Perimeter network typically contains servers that require internet access, such as web or email services.

True

T or F: A switch floods ports if it does not know where to send a packet

True

T or F: A switch sends unicast packets to one destination port only

True

T or F: A wireless bridge connects ethernet based devices to the network

True

T or F: Dynamic Routing provides the ability to add networks automatically by learning them from other RIP routers.

True

T or F: Dynamic Routing provides the ability to automatically remove routes from the routing table with other RIP neighbors delete them.

True

T or F: Dynamic Routing provides the ability to select the best route based on routing metrics.

True

T or F: Dynamic routing is fault tolerant.

True

T or F: Every router today is "TCP/IP" enabled, which is an industry-standard protocol that you use on the Internet and for local addressing.

True

T or F: HTTP, TELNET, FTP, and SMTP protocols operate on Layer 7 of the OSI model

True

T or F: It is standard practice to divide the binary bits of an IPv4 address into 8-bit fields named octets

True

T or F: Quality of Service (QoS) allows you to control bandwidth

True

T or F: Quality of Service (QoS) allows you to define the priority traffic on the network.

True

T or F: The loopback address of your computer is 127.0.0.1

True

T or F: WEP wireless encryption is the most susceptible to interception and decryption.

True

What are three characteristics of Ethernet network topology?

1. It can use coaxial, twisted pair, and fiber optic media. 2. It comprises the largest share of the networks in place today. 3. It can negotiate different transmission speeds.

What are two characteristics of the CSMA/CD access method?

1. It checks to see if a collision has been detected. 2. It waits until the transmission medium is idle.

T or F: Wireless bridges always work in pairs

True

To set lower security settings in Internet Explorer for an extranet site, add the site's URL to the _________ zone.

Trusted Sites

Which feature of Category 5e STP cable reduces external interference?

Twisting

What are two characteristics of a mesh network topology?

1. It is fault tolerant because of redundant connections. 2. Every node connects to every other node on the network. In a (full) mesh network topology, each of the network node, computer and other devices, are interconnected with one another. Every node not only sends its own signals but also relays data from other nodes. In fact a true mesh topology is the one where every node is connected to every other node in the network. This type of topology is very expensive as there are many redundant connections, thus it is not mostly used in computer networks. It is commonly used in wireless networks.

Name the 7 layers of the OSI Model

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

What are two differences between switches and hubs?

1. Switches are capable of sending and receiving data at the same time. 2. Switches identify the intended destination of the data that they receive.

What are three advantages of VLANs?

1. They require a router to connect to VLANs on another switch. 2. They compartmentalize a network and isolate traffic. 3. They act as though they are on the same LAN regardless of physical location.

What is the maximum cable length for a single Cat5 UTP cable run?

100 meters (328 feet)

What IP range are loopback addresses?

127.0.0.0 to 127.255.255.255.255

Which address indicates that your router's DHCP service is NOT functioning?

169.254.x.x

What IP range are private network addresses?

192.168.0.0 to 192.168.255.255

Which IP range is a public address space?

197.16.0.0/12

What IP range are multicast addresses?

224.0.0.0 to 239.255.255.255

What is the bit rate for a North American T3 circuit?

44.736 Mbit/s

Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?

802.11n

In a wireless network that requires an SSL certificate, ________ handles the SSL certificate.

802.1X

What are two advantages of using star topology rather than ring topology in a computer lab workgroup?

A central connection point allows for flexibility and scalability and a cable problem within the group affects two nodes, at most.

When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the ____________ range

APIPA range 169.254.0.0-169.254.255.255

___________ assigns a class B IP address from ______ to ________ to the client when a DHCP server is either permanently or temporarily unavailable

APIPA, 169.254.0.0 to 169.254.255.255

Network (Protocols and Standards)

ARP, ICMP, IGMP, IP, IPSec, RARP

Presentation layer (Duties)

Allows hosts and applications to use a common language; performs data formatting, encryption, and compression.

Which OSI layer provides network services directly to the user's application? TLNET, SMTP, and NTP operate on this layer.

Application

Layer 7

Application Layer

Application (Protocols and Standards)

BOOTP, DHCP, DNS, FTP, HTTP, HTTPS, IMAP4,PING, POP3, NSLOOKUP, NTP, SFTP, SMTP, SNMP, Telnet, TFTP

What is a similarity between Layer 2 and Layer 3 switches?

Both forward packets onto the network.

What is the DNS record type that specifies an alias name of another address record?

CNAME

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement?

CaT5e

Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of ____________ switching

Circuit

Which protocol is responsible for automatically assigning IP addresses?

DHCP

Which OSI layer checks for errors by adding CRC to the frame. Bridges and NICs operate on this layer.

Data Link

Which OSI layer ensures that reassembled bits are in the correct order, and it requests retransmission of frames if an error occurs. Switches and WAPs operate on this layer.

Data Link

Layer 2

Data Link Layer

Which two reasons should you use IPsec between computers?

Data integrity and data confidentiality.

Transport Layer (Duties)

Ensures accurate delivery of data through flow control, segmentation and reassembly, error correction, and acknowledgement

Network Layer (Duties)

Establishes network connections, translates network addresses into their physical counterparts and determines routing

Session Layer (Duties)

Establishes, maintains, and terminates user connections

T or F: A LAN has no access to the perimeter network

False

T or F: A switch sends broadcast packets to the uplink port only.

False

T or F: A wireless bridge increases the wireless signal strength of the access point

False

T or F: An IPv4 address consists of 64 bits

False

T or F: IPv6 addresses are 64-bit in length

False

T or F: IPv6 addresses are divided into 8-bit blocks

False

T or F: IPv6 addresses are represented by dotted-decimal notation

False

T or F: Layer 4 of the OSI model controls dialogue between computers.

False

T or F: Quality of Service (QoS) allows you to assign protocols dynamically

False

T or F: The value of any IPv4 octet can be from 0 to 256

False

T or F: You use a perimeter network to grant internal clients access to external resources

False

A _____________ protects a network's perimeter by monitoring traffic as it enters and leaves.

Firewall

Which metric does Routing Information Protocol (RIP) use to determine the least costly route?

Hop count

Physical Link (Standards)

IEEE 802.3 (Ethernet), 802.5 (Token Ring), 802.11 (Wi-Fi)

Which wireless communication problem is caused by electromagnetic waves?

Interference

Data Link (Protocols and Standards)

L2TP, PPP, PPTP, SLIP

An Address Resolution Protocol (ARP) table is used to associate IP addresses with ___________

MAC Addresses

Presentation (Protocols and Standards)

MIME, SSL, TLS

Which network device interconnects computers in a workgroup, is able to be remotely configured, and provides the best throughput?

Managed Switch. These switches have one or more methods to modify the operation of the switch. Common management methods include: a command-line interface (CLI) accessed via serial console, telnet or Secure Shell, an embedded Simple Network Management Protocol (SNMP) agent allowing management from a remote console or management station, or a web interface for management from a web browser.

Physical Layer (Duties)

Manages signaling to and from physical network connections

A node within a local area network (LAN) must have two what?

NIC and IP address

Which OSI layer is responsible for path determination and delivery of packets, but does not guarantee delivery. ICMP, RIP, and ARP operate on this later.

Network

Which OSI layer relies on upper layers for reliable dlivery and sequencing. IPX, X.25, and NLSP operate on this layer.

Network

Each IPv4 address consists of a _______ and a ___________

Network ID and a host ID

Layer 3

Network Layer

Data Link Layer (Duties)

Packages data in frames appropriate to network transmission method

Layer 1

Physical Layer

An Action Center alert recommends that you enable Windows Firewall. After enabling the firewall, you can no longer access websites. Which two TCP ports should you add exceptions for on the firewall?

Ports 80 and 443

According to the OSI model, encryption takes place on the __________ Layer

Presentation

Layer 6

Presentation Layer

A ________ zoneis the first DNS zone to which all updates for the records that belong to that zone are written.

Primary

Application Layer (Duties)

Provides interface between software applications and network for interpreting requests and requirements. Note: This layer is not the actual software application.

Session (Protocols and Standards)

RTP & SIP

What is an example of a Layer 3 device that connects multiple computers and networks?

Router

What is an example of a network device that associates a network address with a port?

Router. A router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model.

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use?

STP Cat5e. Shielded cable, here STP Cat5e, would reduce interference.

Which OSI layer controls dialogue between source and destination notes. RPC and NETBIOS operate on this layer.

Session

Layer 5

Session Layer

You are helping a friend set up a public-facing web server for a home office. Your friend wants to protect the internal network from intrusion. What should you do?

Set the web server in a perimeter network.

Which of cable type transmits data the greatest distance?

Single-mode fiber. When working with distances up to 2 km, use multimode optical-fiber cable. Like multi-mode optical fibers, single mode fibers do exhibit modal dispersion resulting from multiple spatial modes but with narrower modal dispersion. Single mode fibers are therefore better at retaining the fidelity of each light pulse over longer distances than multi-mode fibers. Cat5e and Cat6 max cable length is 100 metres.

Where on a network is a T3 connection possible?

T3 lines are a common aggregation of 28 T1 circuits that yields 44.736 Mbps total network bandwidth . Besides being used for long-distance traffic, T3 lines are also often used to build the core of a business network at its headquarters.

Transport (Protocols and Standards)

TCP, UDP

What happens when an 802.11a node broadcasts within the range of an 802.11g access point?

The node transmits, but the access point is unable to receive.

IPSec policies for two machines on a LAN can be modified by using the ____________ on Windows 7

Windows Firewall with Advanced Security snap-in


Ensembles d'études connexes

Advertising Final: Evans ADPR3100

View Set

Ch. 13: The U.S. Supreme Court and Federal Judiciary

View Set

Geology Chapter 10 Reading/Visual Quiz

View Set

Chapter 20 - Pediatric Variations of Nursing Interventions

View Set

Chapter 19. Vital Signs My Nursing Test Banks

View Set

VB Quiz - Section 3.3 - Input and Output

View Set

Chapter 5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture

View Set

Chapter 3 PArt 2 Xcel Solutions Quiz

View Set

anatomy exam 2: bones and skeletal tissues

View Set

Chapter 7: Microbial Nutrition, Ecology, and Growth

View Set