Network Tech
What is the most commonly used global unicast address?
2001
Which is an advantage of the OSI model? 1. It has encouraged creation of industry standards. Incorrect 2. Layers interact only with adjoining layers. Incorrect 3. Network communication processes are segmented. Incorrect 4. All of the above
4. All of the above
What transport layer protocol provides guaranteed delivery of packets?
TCP
Of the listed values, what is not a common subnet mask? 1. 255.0.0.0 2. 255.255.0.0 3. 255.255.255.0 4. 255.255.255.255
4. 255.255.255.255
Category _____ cable was created for 10Gbase-T installations with cable segments up to 100 meters long.
6A
This wireless standard utilizes both the 2.4-gigahertz and 5-gigahertz frequencies?
802.11n
What type of traffic is transmitted by one computer and goes to all other computers on the subnet?
Broadcast
What protocol provides clients with IP addresses and other TCP/IP configurations?
DHCP
T or F: With CSMA/CD, when a collision occurs, the system that caused the collision must discard the frames and try retransmitting 10 seconds later.
False, both systems must discard their frames and retransmit them.
What is used by administrators to configure, control, and manage users and computers?
Group policy
ICMP is a _____ layer protocol that does not carry user data, although its messages are in IP packets.
Network
What port does TCP use for SMTP?
Port 25
What layer of the TCP/IP model controls data transfer on the network by managing sessions between devices?
Transport
An IPv6 _____ transmission is traffic sent from one computer to one other computer.
Unicast
A ____ creates both collision domains and separate broadcast domains. This also connects network devices together.
Router
What device routes data from the internal network to the internet and from the internet back to the internal network?
Router
A subnet is a group of computers separated from other computers by one or more _____.
Routers
Which IP address is not a usable address? 1) 10.0.0.0 2) 192.168.255.254 3) 192.168.254.255
1 and 3.
A computer has an IP address of 192.168.1.25 and a subnet mask of 255.255.0.0. What is the host ID?
1.25
The binary number for 168?
1010 1000
_____ was the first Ethernet standard.
10Base5
Convert the binary number 1010 1100 to decimal.
172
There are advantages to wireless networks in a business environment, which one(s) are disadvantages? 1. Better flexibility Incorrect 2. Data can travel much farther on a wireless signal as opposed to a wired network Correct 3. Greater mobility Incorrect 4. Improved scalability Incorrect 5. Reduced costs Incorrect
2. Data can travel much farther on a wireless signal as opposed to a wired network.
What is not an acceptable method used for reducing traffic on a LAN? 1. Install a bridge 2. Install a hub 3. Install a router 4. Install a switch
2. Install a hub
Approximately how many IP addresses are available with IPv6?
340 trillion, trillion, trillion
Approximately how many IP addresses are available with IPv4?
4 billion
Category _____ cable is rated for frequencies up to 100 megahertz and is designed to support full duplex transmissions over all four wire pairs on 1,000 Base-T Gigabit Ethernet networks.
5e
The destination address field contains a ______ hexadecimal MAC address of the network interface adaptor on the local network, to which the frame will be transmitted.
6-byte
A full IPv6 address includes _____ groups of four hexadecimal numbers separated by colons.
8
How many computers can be on a LAN?
An organization can conceivably have hundreds or thousands of computers connected to a LAN.
What layer of the TCP/IP model uses protocols to access network resources? Select one:
Application
What media access control mechanism is used for wireless networks?
CSMA/CA
A ________ transmits messages to a destination without first establishing a connection to the receiving system. Select one:
Connectionless Protocol
T or F: Broadcast traffic can be transmitted across all subnets in a network on an IPv4 network.
False
T or F: By disabling a SSID, a network administrator can improve the network's security.
False.
What network device blocks unwanted traffic from the internet?
Firewall
What is the most common LAN topology in use today?
Star
An IPv6 ______ transmission is traffic sent from one computer to multiple other computers.
Multicast
______ connect computers to each other within a subnet.
Switches
What type of device connects computers in a network segment together and creates separate collision domains?
Swtch
What standards organization defines the HTTP protocol?
W3C
What is the primary method used to secure wireless networks?
WPA2
When using a computer running a Windows operating system, what command will show the IP address from the command prompt?
ipconfig
With CSMA/CD, the _____ phase is the phase during which the station transmits its data packet when the network is free and all of the stations on the network are contending for access to the same network medium.
multiple access
A _____ is a name that someone has assigned to a wireless network.
service set identifier (SSID)