Chapter 1 thru Chapter 6 Computer Networking Fundamentals

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Bluesnarfing

A hacker takes advantage of a Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?

Star

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Peer-to-peer

A network consists of the computers all running Windows 10 Professional. All the computers are connected to a switch which is connected to a router, which is connected to the Internet. Which networking model does the network use?

AD

A routing protocol's reliability and priority are rated by what measurement?

Look at whether the device is located on the ISP's side of the demarc.

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must fit the bill?

NFC

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?

Network Layer

At which OSI layer does IP operate?

IP config/release

If you are connected to a network that uses DHCP,and you need to terminate your windows workstation DHCP lease, which command would you use?

Rack ears

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

255

What decimal number corresponds to the binary number 11111111?

default gateway

What type of device does a computer turn to first when attempting to make contact with a host on another network?

wiring schematic

What type of diagram shows a graphical representation of a network's wired infrastructure?

MTRJ (Mechanical Transfer Registered Jack)

Which fiber connector contains two strands of fiber in each ferrule?

STDM (statistical time division multiplexing)

Which kind of multiplexing assigns slots to nodes according to priority and need?

Infrared

Which one of the following wireless transmission types require a clear LOS to function?

The OUI

Which part of a mac address is unique to each manufacturer?

tone locator

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

TCP

Which protocol's header would a Layer 4 device read and process?

SMTP is a connection-based protocol

Which statement describes SMTP?

Remote Desktop

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?

VoIP gateway

Which device converts a signal from a campus's analog phone equipment into IP data that can travel over the internet?

POP3

Which email protocol allows an email client to download email messages to the local computer?

Client-server

In previous question, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support with without the upgrade?

HTTP

In the client-server model, what is the primary protocol used for communication between a browser and a web server?

Star-bus

In the previous question (#8), suppose a new switch is connected to the first switch by way of a network cable and 3 computers are connected to the new switch. Which network topology is now used?

All devices on your local network

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

White/green

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

root server

What computers are the highest authorities in the DOMAN Name System hierarchy?

Checksum

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

1500 bytes

What is the Internet standard MTU?

Cat 5e

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?

List all components on the network

What is the first step of inventory management?

Layer 3

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Coaxial cable, F-connector

What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?

NEXT

What kind of crosstalk occurs between wire pairs near the source of the signal?

Static Route

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

FHSS (Frequency Hopping Spread Spectrum)

What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?

fiber type mismatch

What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

The secondary and primary DNS servers, because the secondary server is requesting zone transfer from the primary server.

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

Evil Twin

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your computer to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

FE80::/10

When your computer first joins an IPv6 network, what is the prefix of the IP address the computer first configures for itself?

802.11n

Which 802.11 standard can be used in both the 2.4-GHz and the 5-GHz bands?

Class 1

Which Bluetooth class has the highest power outlet?

CSMA/CA

Which Carrier Sense technology is used on wireless networks to reduce collisions?

Gateway of last resort

When a router can't determine a path to a message's destination, where does it send the message?

Rogue AP

You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?

Network layer

Which OSI layer is responsible for directing data from one LAN to another?

IMAP4

Which email protocol allows an email client to read mail stored on the mail server?

Cat 5e, Cat 6a, Cat 7

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

A password manager

Which of these is considered a secure place to store a list of documented network passwords?

BGP

Which routing protocol does an exterior router use to collect data to build its routing tables?

Bandwidth

Which transmission characteristic is never fully achieved?

IKEv2

Which tunneling protocol is a component of the IPsec protocol suite?

ICMP and ARP

Which two protocols manage neighbor discovery processes on IPv4 networks?

Port

Which type of address is used at the Transport layer to identify the receiving application?

NAT mode

With which network connection type does the VM obtain IP addressing information from its host?

Patch cable

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?


Set pelajaran terkait

Principles of Finance Exam 1 Prep Questions

View Set

Exit Ticket- Day 4-9.3.12.BM.2.2 Demonstrate ethical behaviors in the workplace by Explaining the nature of business ethics and Identifying and explaining where an action is legal but unethical.

View Set

Macroeconomics chapter 13 Fiscal Policy practice part 2

View Set

11.1.4 Penetration Testing Section Quiz

View Set