Network + ch.2-glossary

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which protocol is commonly used to retrieve email from a mail server?

IMAP

In a 100BaseT network, the distance of cable from hub to workstation should not exceed:

100 meters

The segment length from hub port to workstation NIC on a 10BaseT network should be no longer than:

100 meters

What is the proper termination for UTP cables?

100 ohms

Which of the following uses a 1300 nm laser beam to drive data across the network media?

1000BaseLX

Which of the following only uses two conductors?

100BaseFX

Which of the following uses a Category 5 cable?

100BaseTX

Which of the following is the expected data rate on a 10BaseT network?

10Mbps

Shields data transmissions from EMI

coaxial cable

Which connection type is the most reliable?

connection-oriented

A ____ is used to provide a centralized connection point for network access.

hub

Which of the following reside(s) at the physical layer of the OSI model? (select all that apply)

hub, cables

A bridge is used to:

interconnect network segments using of the same access protocol

Before a client can receive a dynamic IP address from a server _____

DHCP must be running on the server

A VLAN enables you to

segment a network using the switches you already own

You are experiencing a problem with a workstation and want to ping the localhost. Which two of the following are valid ways to check your local TCP/IP connections?

ping 127.0.1, ping localhost

One of your network technicians has made up 10 new network cables and installed them throughout the building. One of the new cable drops has bad connectivity. The network drop cable is 80 meters over a drop ceiling. What is the most likely cause of this problem?

Fluorescent lights are causing interference

Which of the IEEE 802 standards describes Ethernet?

IEEE 802.3

Which TCP/IP utility is used for determining NetBIOS names?

Nbtstat

The process of making sure data came from the person or entity it was supposed to come from.

Nonrepudiation

To check the connection to a remote server, which TCP/IP utility will show all routers to the remote server?

Tracert

Which of the following protocol suites provides the Ping utility for use in troubleshooting situations?

TCP/IP

Which of the following protocols must use a subnet mask?

TCP/IP

Which protocol is most similar to SSL?

TLS

HTTPS is port ___

443

Thinnet is also referred to as:

Cheapernet

What does the acronym SSL represent?

Secure Sockets Layer

HTTP, FTP, and Telnet work at which layer of the OSI model?

application

A node has been assigned the IP address 129.168.34.25 255.255.0.0. What is the host address of this node?

.34.25

What is the maximum hop count for RIP?

15

Which of the following is an example of a Class B IP address?

172.16.32.1

Which of the following is a valid Class C IP address?

192.168.1.1

FTP is port ____

21

Given the IP address of 212.16.175.24 and a subnet mask of 255.255.0.0, what is the network address of the segment to which this node is connected?

212.16

SSH is port ___

22

Which of the following is a valid IPv6 address?

3FF1:D501:C308:221F:0260:97DE:ED42:032C

DES used a

64-bit block and a 56-bit key

An RJ45 connector is comprised of _____ pins.

8

What standard describes VLAN?

802.1

Which IEEE 802 standard contains specifications for 100BaseT?

802.3 (b)

Which of the IEEE standards specifies fiberoptic technology?

802.3 (f)

____ was designed for port authentication.

AAA

Which is a link layer protocol?

ARP

Who invented TCP/IP? (Select all that apply)

Bob Kahn, Vint Cerf

Which of the following cable types is recommended for 100BaseTX networks?

CAT 5 UTP

A wire in a UTP cable is suspected of having a break. Which of the following would confirm connectivity of each wire in the cable?

Cable tester

A workstation cannot connect with the rest of the network. What's the next step to take?

Check other workstations to determine whether they have a similar problem

The NIC link light on a workstation isn't lit. The cable from patch panel to hub checks good, as does the cabling from wall outlet to patch panel. Which of the following is the next step?

Check the cable from the workstation to NIC

255.255.0.0 is the default subnet mask for a ____ IP address.

Class B

PlainText is also referred to as

ClearText

You are managing a network that uses both a UNIX server and a Windows 2000 server. Which of the following protocols can you use to transfer files between the two servers?

FTP

Which protocol is used to automatically provide IP addresses to network computers?

DHCP

The number of collisions on a network has increased substantially as new user workstations are added. What's the first step in determining the nature of the problem?

Determine whether the entire network is infected

Developed to create a single standard to allow two devices to authenticate

EAP

What type of cable is used with the IEEE 100BaseFX standard?

Fiber-optic

You want to connect two networks that are using different protocols. What type of device should you use?

Gateway

A workstation is being added to an Ethernet LAN. The NIC card has been installed, IRQ assigned along with an I/O range with no conflicts. What else must be done before the workstation can access the network resources?

Install the client software and add a cable to the NIC card

While troubleshooting a sporadic network connectivity problem on a Windows 2000 system, a fellow technician suggest that you run the ping (dash)t command. What is the purpose of this command?

It pings the remote host continually until it is stopped

An Ethernet frame is to be transported across the Internet using TCP/IP. Which of the following is true?

MAC addresses are checked at each router

What is the hub used in a token ring network called?

MSAU

Which of the following pieces of information is not likely to be supplied via DHCP?

NetBIOS computer name

What TCP/IP utility displays all current connections and ports?

Netstat

Which layer of the OSI model is responsible for routing?

Network

What does OSPF stand for?

Open Shortest Path First

An advanced version of PPP.

PPAP

You are troubleshooting a connectivity problem on a workstation that is unable to connect to the network. You have verified that the physical connectivity of the system is okay, and you suspect that the problem is related to the bindings of the protocols to the network cards. You decide to use the local loopback feature of the TCP/IP stack to test the configuration. Which of the following commands could you use to do this?

Ping 127.0.0.1, Ping localhost

The IP address of a workstation is 192.168.20.2. It's connected to a hub with an IP address of 192.168.20.3. Which of the following will check the connection status between workstation and hub?

Ping 192.168.20.3

Keys could be exchanged securely with

Public-key cryptography

What is the latest updated version of RIP?

RIPv2

What kind of connector would you use to make a patch cable for a 10BaseT network?

RJ-45

A workstation NIC light isn't illuminated. After replacing the NIC, the light still isn't lit. What should be done next?

Replace the cable connecting the NIC to the hub

Which of the following statements best describes dynamic routing?

Routers send and receive advertisements that automatically update the router database table

A user can't connect to the Internet from her workstation. What should be done next?

Run diagnostics on the server

What type of connector would you expect to find in a 1000BaseSX network?

SC

Which protocol is used to upload email messages to an email server?

SMTP

Which two of the following connectors would you use when working with fiberoptic cable?

ST, SC

What type of connection is required at a hub port that's marked MDI?

Straight-through pinning at the port connector is required

_____ takes a single bit at a time and encrypts it on the fly.

Stream cipher

What term is used to describe the process of using parts of the node address range of an IP address as network IDs?

Subnetting

You have been tasked with connecting two computers together to transfer data from one to the other so that the older of the two can be decommissioned. You have 2 straight through networking cables available. Which of the following devices can be used to make this connection work?

Switch

Any encryption that used the same key for both encryption and decryption is called

Symmetric-key algorithm

You move a computer to a new network, using the original ethernet cable that came with the computer. However, when you start it up you notice that nothing is being displayed from the activity light on the back of the NIC. What is the most likely cause of this condition?

The hub port is bad

None of the users on the network can log on to the server. The link lights on all client NICs are lit at the hub. The server NIC link light and the corresponding hub port light are not lit. When one of the workstation cables is inserted into the server port at the hub, the hub link light is lit. What is the likely problem?

The server NIC or cable

What is the purpose of DHCP?

To dynamically assign IP addresses to client workstations

Rack mounted equipment are measured in what units?

U

Encrypted tunnels between a computer or a remote network and a private network through the Internet.

VPN

A protocol to automate the updating of multiple VLAN switches

VTP

What command would you use to delete entries host file?

arp -d

What do twists in a twisted pair cable reduce?

cross-talk

What is the encapsulation named at the Data Link layer?

frames

The most widely used ______ topology are the internet and telephone network.

mesh

What topology allows every computer to connect to another via two or more routes?

mesh

Which network topology is the most fault tolerant?

mesh

What topology is a parallel connection limited to?

point-to-point

Data compression takes place at the

presentation layer

What is the most popular form of email encryption?

public-key cryptography

What is encapsulation?

the process of preparing data to go onto a network

IEEE 802.5 refers to

token ring

When describing the physical structure of a network, what term is used?

topology

To determine the computer name of a remote server, you would _____

use the nbtstat command to resolve the name of the remote server to its IP address


संबंधित स्टडी सेट्स

Human Behavior and the Social Environment: Groups, Communities, and Organizations Macro Level Textbook by Katherine Van Wormer and Fred H. Besthorn Third Edition at Salem State University SWK 261

View Set

Personal Computers Chapter 8, Personal COmputers Chapter 9, Chapter 7

View Set

Pharmacology Made Easy 4.0 The Respiratory System

View Set

The use of electric current in physical therapy

View Set

History 10-3 The Protestant Reformation

View Set