Network+ Guide to Networks (8th Ed.) Chapters 5-8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A subnet of 255.255.248.0 can be represented by what CIDR notation?

/21

A network with 10 bits remaining for the host portion will have how many usable host addresses?

1022

What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?

10GBase-T

Near-field communication devices send data at what fixed frequency?

13.56 MHz

An IP address of 192.168.18.73/28 has what network ID?

192.168.18.64

By default, when using classful addressing, how many bits exist in the host portion of a Class A address?

24

What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number of hosts per subnet?

255.255.224.0

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs?

4 bytes

How many data streams are used in 802.11ac Wave 2 devices?

4 data streams

What is the maximum number of host IP addresses that can exist in a Class B network?

65,534

What is the industry standard angle for an Angle Polished Connector (APC)?

8 degrees

Which of the following is NOT a task that a VPN concentrator is responsible for?

A VPN concentrator shuts down established connections with malicious traffic occurs.

What statement describes a transmission flaw that is occurring due to attenuation?

A customer modem is continuously losing signal due to large distance from the transmitting device.

What scenario describes an evil twin attack?

A malicious access point is configured with the SSID of a non-malicious public access point.

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

What is the minimum category of UTP cable required in order to support Gigabit speeds?

Cat 5e

Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?

Class 1

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

Dynamic Multipoint VPN

A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.

False

A native VLAN mismatch occurs when two access ports that are connected to each other are both tagging traffic with different VLAN IDs.

False

A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port.

False

An unmanaged switch can still support the creation of VLANs, provided there is an interface for configuration.

False

FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.

False

NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.

False

Network segmentation decreases both performance and security on a network.

False

Only Class B and Class C networks can be subnetted.

False

The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.

False

Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters.

False

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

How does refraction affect the propagation of a wireless transmission?

It distorts the signal as it travels into and through a different transmission medium.

When using RFID, what is an ARPT (Active Reader Passive Tag)?

It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.

Why is the telnet utility a poor choice for remote access to a device?

It provides poor authentication and no encryption.

What does the VLAN Trunk Protocol (VTP) do?

It shares VLAN database information amongst switches that participate.

What statement correctly describes "jitter"?

Jitter is what happens when packets experience varying amounts of delay and arrive out of order.

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?

Layer 2

Which statement accurately describes what near end crosstalk (NEXT) is?

NEXT is crosstalk that occurs between wire pairs near the source of a signal.

At what layer of the OSI model does the IPsec encryption protocol operate?

Network layer

At what layer of the OSI model do the 802.11 standards vary?

Physical layer

Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable?

RG-6

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SaaS

You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?

TIA/EIA 568A

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?

The cable must be a rollover cable.

Diffraction has what affect on a wireless signal's propagation?

The signal is split into secondary waves that continue in the direction in which they split

Which statement regarding the use of a bridged mode vNIC is accurate?

The vNIC will its own IP address on the physical LAN.

A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.

True

A community cloud is a service shared between multiple organizations, but not available publicly.

True

A continuity tester should not be used on a live network segment.

True

A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable.

True

All wireless signals are carried through the air by electromagnetic waves.

True

An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.

True

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

True

In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch.

True

Latency on data networks is based on a calculation of a packet's round trip time (RTT).

True

Office 365 is an example of an SaaS implementation with a subscription model.

True

The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.

True

The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.

True

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

VPN gateway

What is NOT a potential disadvantage of utilizing virtualization?

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment?

coarse wavelength division multiplexing

Noise that can degrade or distort a signal on a network is measured with what unit?

decibels

On certain Cisco products, what command can be used to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+?

ip helper-address

In Linux, what command can be used for viewing and setting wireless interface parameters?

iwconfig

The combination of a public key and a private key are known by what term below?

key pair

You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size?

local connector (LC)

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

openVPN

The use of certificate authorities to associate public keys with certain users is known by what term?

public-key infrastructure

Telephone connections follow what registered jack standard?

registered jack 11 (RJ-11)

Signals that can travel in only one direction on a medium are referred to as what type of signal?

simplex

Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines?

statistical time division multiplexing


Ensembles d'études connexes

Ch 13 - Capital/Leverage Structure

View Set

Environmental science Chapter one review

View Set