Networking quizes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When deploying a VoIP solution in a network, what are some of the different types of equipment and devices you may encounter?

A VoIP network might contain devices such as VoIP gateways, which convert signals from analog phone equipment into IP data that can travel over the Internet, or vice versa. You might also encounter VoIP PBX equipment, which serves as a dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway. Internally, this equipment connects to VoIP endpoints, which might be telephones sitting at each user's location or applications hosted on a user's computer or other device.

Master Services Agreement(MSA)

A contract that defines the terms of future contracts between parties

Router table

A database that maintain info about where hosts are located anf the most efficient way to reach them

Router

A device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.

Transmission Control Protocol (TCP)

Makes a connection with the end host check if data was recieved

Optical Time Domain Reflectometer (OTDR)

Measure fiber length - Determine faulty splice locations, breaks, connectors

Throughput

Measure of how much data is actually transmitted during a given time

Servers that have NOS installed require

More memory, processing, and storage capacity

layer 3

Network layer adds its own header and become a packet

RFP (Request for Proposal)

Request to vendors to submit a proposal for a product or service your company wants to purchase

Transport Layer (Layer 4)

Responsible for transporting app layer payloads from one app to another

wavelength mismatch

SMF, MMF, POF use different wavelengths

DNS(Domain Naming Services)

Services responsible for tracking computer names and IP address

Dirty connectors

Signal loss and other errors can start to cause problems

What statement regarding main distribution frame or main distribution facilities is accurate? a. The MDF refers to the racks holding network equipment in an organization. b. The MDF provides intermediate connection between the IDF and end-user equipment on each floor. c. The MDF is the centralized point of interconnection for an organization's LAN or WAN. d. The MDF and entrance facility are always in separate rooms.

The MDF is the centralized point of interconnection for an organization's LAN or WAN.

layer 4

Transport layer protocol usually CP or UDP

The process of designing, implementing, and maintaining an entire network is called the system life cycle. (T/F)

True

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed. (T/F)

True

Probe kit

generator and locator combination

Where is a demarc located in relation to the structured cabling of an enterprise environment? a. at the Intermediate Distribution Frame (IDF) b. in the Main Distribution Frame (MDF) c. between the MDF and the IDF d. in the work area

in the Main Distribution Frame (MDF)

entrance facility

incoming network connects with coporate network

Layers 2 and 1 are responsible for...

interfacing with physical hardware on the local network

Payload

is the data that is passed between applications or utility programs and the OS

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? a. link local address b. global address c. multicast address d. anycast address

link local address

Attenuation

loss of signals strength as it travels away from source

Static routing

network administrators configures a routing table to direct messages along specific paths

Patch panel

panel of data receptors

cable performance tester

performs similarly to continuiting tester but has other uses

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. IP addresses b. domain names c. MAC addresses d. port numbers

port numbers

Encapsulation

process of adding a header to data inherited from layer above

Port Address Translation (PAT)

process of assigning a TCP port number to each ongoing session between a local host and Internet host

System Life Cycle

process of designing, implementing and maintaining an entire network

address translation

process where a gateway device substitutes the private IP addresses with its own public address

Routing metrics

properties of a route used by routers to determine the best path to a destination

Switch

recieves incoming data from one of its ports and redirects it to another port or multiple ports

Digitals signals are...

regenerated

patch cable

relatively short length of cabling with connectors at both ends

Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase? a. request for proposal b. statement of work c. request for quote d. memorandum of understanding

request for proposal

Unicast transmission/stream

send IP packets to a single recipient on a network

multicast transmission

sends IP packets to a group of hosts on a network

Demultiplexer(demux)

seperates the combined signals

What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer? a. master service agreement b. service-level agreement c. statement of work d. memorandum of understanding

service-level agreement

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a. star topology b. mesh topology c. bus topology d. star bus topology

star topology

cable continuity testers

tests whether cable signal to destination

Bandwidth

the amount of data could be theoretically transmitted during a given time

Border Gateway Protocol (BGP)

the only current EGP and is known as the "protocol of the internet"

network mapping

the process of dicovering and identifyng the devices on a network

Network services

the resources a network makes availiable to its users

Round Trip Time (RTT)

time for packet to go from sender to reciever then back

A hexadecimal number is a number written in the base 16 number system.

true

Dual stacked

use both IPv4 and 6

Routing Protocols

used by routers to communicate with each other to determine the best path

subnet mask

used to indicate what portion of an IP address is the network portion and host

PING (Packet Internet Groper)

used to verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs? a. patch cable b. vertical cross connect c. horizontal cross connect d. diagonal cabling

vertical cross connect

Which of the following IP addresses would be a loopback IP address?

127.0.0.1

Equipment data racks most commonly are a standard width of what measurement?

19 inch

IPv4 address

32 bit addresss organized into 4 groups of 8

IPv4 addresses are divided into how many classes

5

Port numbers

(OSI Transport layer) ensure data is transmitted to the correct process among multiple process running on computer

4 addressing methods

-Data link layer MAC Address -Network layer IP address -Transport layer port numbers -Application Layer

In Mac Address the 1st and last 24 bits

-First 24 are OUI (manufactor id) - Last are device id

TDR (Time-Domain Reflectometer)

-Issue signal, measures signal bounce back - Indicates distance between nodes

The NOS is responsible for:

-Manages client data, resources -Ensures authorized user access -Controls user file access -Restricts user network access -Dictates computer communication rules -Supplies application to clients

4 common types of DNS servers

-Primary DNS -Secondary DNS -Caching DNS -Fowarding DNS

2 types of DNS requests

-Recursive -Iterative

Difference between router and switch

-Router is like a gateway between networks and belongs to 2 or more local networks -Switch belongs only to its local network

Latency causes

-cable length -Intervening connectivity device

Advantages of peer 2 peer

-user credential assigned from one place -Multiple shared resources access centrally controlled

7 layers of the OSI model

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

Multiplexing

A form of transmission that allows multiple signals to travel simultaneously over one medium.

tepdump

A free, command-line packet sniffer that runs on linux and others UNIX OS's

network diagram

A graphical representation of a network's devices and connections.

Service Level Agreement (SLA)

A legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer. Specific details might include contract duration, guaranteed uptime, problem management, performance benchmarks, and termination options.

gateway

A node that handles communication between its LAN and other networks

Fiber type mismatch

A problem created by mismatching fiber core types, such as when connecting an SMF cable to an MMF cable.

tone generator

A small electronic device that issues a signal on a wire pair.

What statement correctly identifies the purpose of a software patch? a. A software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources. b. A software patch is a correction, improvement, or enhancement to software. c. A software patch involves the process of reverting to a previous version of software after attempting to upgrade it. d. A software patch is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities.

A software patch is a correction, improvement, or enhancement to software.

Cross-talk

A type of interference caused by signals traveling on nearby wire pairs infringing on another pair's signal.

peer-to-peer network

A type of network that connects two client computers directly together.

optical power meter (OPM)

Also called a light meter - Measures the amount of light power transmitted on a fiber optic line

When creating network diagrams, what icon description typically represents a network switch? a. An icon that is rectangular, which contains four arrows pointing in opposite directions. b. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. c. An icon that resembles a brick wall. d. An icon that is rectangular in shape, with squiggly lines on the front.

An icon that is rectangular, which contains four arrows pointing in opposite directions.

What is the most popular web server application? a. NGINX b. Apache c. Lighttpd d. Microsoft Internet Information Services

Apache

DMZ (demilitarized zone)

Area between two firewalls separating the internet and an internal network. A DMZ provides a layer of protection for internet-facing servers. It allows access to a server or service for internet users while segmenting and protecting access to the internal network.

Which of the following is NOT a best practice when performing cable management? a. A cable tester should be used to verify that each segment of cable is transmitting reliably. b. Cable should not be placed across a floor where they might be damaged by traffic. c. Cable ties should be pulled tightly to keep cables from moving around in a bundle. d. Grounding requirements should be followed when running cables.

Cable ties should be pulled tightly to keep cables from moving around in a bundle.

Layer 3 switch

Capable of interpreting Layer 3 data and works much like a router

Layer 4 switch

Capable of interpreting layer 4 data

EMI

Caused by motors, power lines, television, copiers

Main Distribution Frame (MDF)

Centralized point of interconnections for an organizations LAN or WAN

Fiber optic cable

Contains glass fibers surrounded by a layer of glass cladding and a protective outer jacket, is used to carry voice, video, and data transmissions over very long distances.

network operating system (NOS)

Controls access to entire network

Layer 7, 6, and 5

Data and Instructions, known as payload are generated by applications running on source hosts

Session Layer (Layer 5)

Describes how data between applications is synched and recovered if messages don't arrive intact at the recieving app

Damarc

Device that marks where a telecommunications service provider network ends and organizations network begins

What is a defining characteristic of a bus topology based network? a. Devices are connected directly to a centralized networking device, known as a network switch. b. Devices are daisy-chained together in a single line. c. Devices are connected to two adjacent devices, and communication priority is granted by a token. d. Devices are directly attached to a network router, which forwards data to intended destinations.

Devices are daisy-chained together in a single line.

netstat

Displays TCP/IP statistics and details about TCP/IP connections on a host

Statement of Work (SOW)

Documents in detail the work that must be completed for a particular project

User Datagram Protocol (UDP)

Does not gurantee deleivery by first connecting and checking data is recieved

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. (T/F)

False

Master License Agreement (MLA)

Grants a licence from a creator, dev, or producer to a 3rd party for he purpose marketing

Wide Area Network (WAN)

Group of LANs that are geographically isolated.

IPv6 address

Has 128 bits written as eight blocks of hexadecimal numbers seperated by colons

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? a. No more than 1 inch of the cable should be exposed. b. Each pair should be stripped of insulation so that it doesn't get caught in the jack. c. Each pair should be twisted around another pair to reduce cross talk. d. No less than 1 inch of the cable should be exposed.

No more than 1 inch of the cable should be exposed.

IP

OSI layer 3

TCP (Transmission Control Protocol)

OSI layer 4 used by OS for communication on a network

layer 2

Packet is passed to Data link layer on NIC, which encapsulates data with its own header and trailer creating a frame

layer 1

Physical layer

ICMP (Internet Control Message Protocol)

Protocol used by the echo request/reply to carry error messages and info about the network

Intermediate distribution frame

Provides an intermediate connection between the MDF and end user equipment on each floor and in each building

Active directory (AD)

The centralized directory database that contains user account info and security for entire group of computers

Latency

The delay between the transmission of a signal and its receipt.

How can you determine the manufacturer of a NIC card based on the MAC address? a. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. b. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. c. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer. d. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier.

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

cladding

The layer of glass that surrounds the optic fibers in fiber optic cables.

logical topology

The logical way computers connect on a network.

BIND (Berkeley Internet Name Domain)

The most popular DNS server software. BIND is free, open source software that runs on Linux, UNIX, and Windows platforms.

Physical Topology

The physical arrangement of connections between computers.

Header

The portion of a data block, cell, frame, or packet that precedes the text field or payload and provides information such as the source address and destination address.

Presentation Layer (Layer 6)

The sixth layer of the OSI model. Protocols in this layer translate between the application and the network. Here, data are formatted in a schema that the network can understand, with the format varying according to the type of network used. This layer also manages data encryption and decryption.

Which of the following is not one of the disadvantages of peer-to-peer networks? a. They are impractical for connecting large numbers of computers. b. They are not necessarily secure. c. They lack scalability. d. They centralize user account logins.

They centralize user account logins.

reserve DNS lookup

To find the host name of a device whose IP address you know

Broadcast

Traffic streams from a single point to all possible endpoints within reach on the network

Interior Gateway Protocol (IGP)

Used by core roters and edge routers within autonomous systems and are often grouped according to the algorithms they use to calculate best paths

Exterior Gateway Protocol (EGP)

Used by edge router and exterior routers to distribute data outside of autonomous systems

A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term? a. VoIP ATB (analog telephone branch) b. VoIP PBX (private branch exchange) c. VoIP LEC (local exchange carrier) d. VoIP router

VoIP PBX (private branch exchange)

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines? a. VoIP PBX b. VoIP translator c. VoIP gateway d. VoIP MTA

VoIP gateway

VoIP telephone equitment

Voice over IP

Backbone

a central conduit that connects the segments (pieces) of a network

Metropolitan Area Network (MAN)

a group of connected LANs in the same geographical area

windows domain

a logical group of computers that a Windows Server can control

Network Interface Card (NIC)

a network port used to attach a device to a network

Network Address Translation (NAT)

a technique designed to conserve public IP addresses needed by a network

nslookup (name space lookup)

allows you to query the DNS database from any computer on a network

Analog signals are...

amplified

Noise

any undesirable influence degrading or distorting signal

Static IP addresses are

assigned by the network admin

dynamic IP address

automatically assigned by DHCP Server

Dynamic routing

automatically calculates the best path between two networks and accumulates this information in the routing table.

Microsoft DNS Server

built-in DNS service in the Windows Server OS

Industrial grade router

can have several network ports one for each network it connects to

Resources are managed by the network operating systems via

central database

three characteristics of TCP

connection-oriented protocol, sequencing and checksums, flow control

Horizontal Cabling

connects workstations to the data closet

backbone cabling

consist of cables or wireless links that provide interconnected between the entrance facility and MDF and between MDF and IDF

Socket

consists of host's IP address and the port number of an application running on the host

Memorandum of Understanding (MOU)

document the intention of two entities to work together toward a common goal -less formal than an SLA and does not include any monetary penalties

tone locator

emits tone when electrical activity detected

Data room

enclosed space that hold network equitment

What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling? a. network interface device b. intermediate distribution frame c. main distribution frame d. entrance facility

entrance facility


Ensembles d'études connexes

BLAW 243- PP 28 Intellectual Property Rights: Copyrights- Exam 3

View Set

Chapter 34 "Corporate Management"

View Set

Chapter 14 Central & Western Africa

View Set

Chapter 14- Information Technology Careers

View Set

Pharm (Chapter 3-Toxic Effects of Drugs)

View Set