Co Info 770 - FINAL
1)In regards to Bluetooth, what is the inquiry procedure? 2)What is the purpose of the inquiry procedure in Bluetooth?
1)If a Bluetooth device is discovered, it sends an inquiry reply back to the Bluetooth device initiating the inquiry. Next, the Bluetooth devices enter the paging procedure, which is used to establish and synchronize a connection between two Bluetooth devices. 2)It is used by Bluetooth to discover other Bluetooth devices or to allow itself to be discovered.
A multicast is characterized by which of the following? (select all that apply.)
1)It uses Class D addressing 2)It is used when messages are sent to a specific group of networking devices.
1)The potential advantages of wireless LANs include all of the following except 2)The potential advantages of wireless LANs include which of the following
1)reliability 2)Accessibility and ease of use are the main advantages of wireless1
Which three packets are exchanged between two hosts when establishing a TCP connection?
1. SYN - (Synchronizing Packet) 3. ACK- (Acknowledgement Packet) 2. SYN ACK - (Synchronizing Acknowledgement Packet)
The following major criteria affect the choice of fiber type:
1. Signal losses 2. Ease of light coupling and interconnection 3. Bandwidth Figure 3-6 presents a graphic of a fiber showing three modes (that is, multimode) of propagation: • The lowest-order mode is seen traveling along the axis of the fiber. • The middle-order mode is reflected twice at the interface . • The highest-order mode is reflected many times and makes many trips across the fiber
What frequency band is used by 802.11ac
5Ghz
Which is not an example of a wireless technology found in mobile devices today?
802.11q
The RJ-48 connector is commonly used with what type of network connections?
A data communications interface that uses a cable of twisted wire pairs and an 8-pin modular jack. It uses the same plug and socket as RJ-45 but has different pinouts. RJ-48C is commonly used for T1 lines and uses pins 1, 2, 4 and 5. Used for WAN.
4) Which of the following services are provided by the wireless LAN adapter? (Select all that apply.) A) Authentication B) Segmenting C) Delivery of the data D) Routing E) Privacy
A) Authentication C) Delivery of the data E) Privacy
Which OSI layer combines messages or segments into packets. A. Network B. Physical C. Transport D. Data Link E. None of the above
A. Network
The OSI layer responsible for compression and encryption is. A. Presentation B. Transport C. Application D. Network E.None of the above
A. Presentation
ARP
Address Resolution Protocol
What is the length of time an IP address is assigned to a switchport called?
Aging time
ICANN is the Internet Corporation for Assigned Names and Numbers and coordinates port number assignments.
Assigned Names and Numbers (ICANN) The Internet Corporation for Assigned Names and Numbers (ICANN) is a non-profit organization based in the United States that coordinates IP address allocation, the management of domain names used by DNS, and the protocol identifiers or port numbers used by TCP and UDP protocols. ICANN creates policies and has overall responsibility for these assignments.
What are the Microsoft client and server virtualization technologies called?
Azure
"Another term for network congestion" defines which of the following?
Bottlenecking
Which OSI layer is responsible for the mechanical connection to the network. A. Network B. Transport C. Data Link D. None of the above (Physical)
D. None the above
Which OSI layer is considered the media access control layer
Data Link
After a working solution is found for a networking problem, what should you do?
Document the changes made to solve the problem.
The last step in network problem resolution is
Document the changes made to solve the problem.
What is the primary role of a DNS server?
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.
Using multiple access points can accomplish which of the following?
Extend the range for wireless connectivity
What is EAP?
Extensible Authentication Protocol
A CIDR block is no longer used since the development of IPv6. T/F
FALSE
Switches can be used with 802.11g but not with 802.11b. True or False?
FALSE
What statement is true regarding the transmit range for 802.11ac
It is similar to or better than 802.11n.
Which OSI layer combines messages or segments into packets.
Network
Which OSI layer is responsible for adding a header that includes information used in routing?
Network
The OSI layer responsible for compression and encryption is
Presentation
What protocol does RTP rely on?
Real-time Transport Protocol UDP 5004/5005
What are the six address types in IPv6?
Reserved Unicast Multicast Anycast Loopback Unspecified
IP address conflicts are most common with which network configuration?
Static IP address
The command to enter the router's global configuration mode is which of the following?
Switch(Config)#
What protocol uses port 2427?
TCP port 2427 uses the Transmission Control Protocol.
What protocol relies upon ports 5060 and 5061?
TCP/UDP 5060/5061 SIP - Session Initiation Protocol
A broadcast can cause a network slow-down. (T/F)
TRUE
T or F? The purpose of an ARP request is to determine which networks interface has a specified IP address.
TRUE
Which of the following commands displays the router's running-configuration?
The command show running-config (sh run) can be used to display the most current configuration of the router show running-config
The status of protocol up indicates which of the following? (Select all that apply.)
The status "line protocol is up" indicates that the interface is properly connected to your PC
What are the two types of networking devices defined by power over Ethernet
There are two types of PSEs: endspans and midspans. Endspans (commonly called PoE switches) are Ethernet switches that include the power over Ethernet transmission circuitry. Midspans are power injectors that stand between a regular Ethernet switch and the powered device, injecting power without affecting the data.
All subnets connected to Router3 in the network shown in Figure 9-14 are: 10.10.10.0 10.50.10.0 10.10.200.0 True or False?
True
What is the goal of WPS in wireless networking today?
WPS stands for Wi-Fi Protected Setup. It is a wireless network security standard that tries to make connections between a router and wireless devices faster and easier. WPS works only for wireless networks that use a password that is encrypted with the WPA Personal or WPA2 Personal security protocols.
You just learned that a car patrolling your neighborhood is scanning the wireless signals coming from homes. What is this called?
War Driving
Divide-and-Conquer Method
begins in the middle of the OSI stack. Use this method when its not clear which method to use between top-down and bottom-up. Test pings, if pings are successful use bottom-up. If pings failed, top-down approach would be advised.
Which of the following terms is used to describe that a MAC address has been manually assigned?
d) Static assignment
The purpose of the Keep-alive packet is to indicate that the Ethernet interface is connected to another networking device.
keepalive packet - indicates that the Ethernet interface is connected to another networking device such as a hub, switch, or router
What is a measure of a fiber's light acceptance?
numerical aperture
Which router command can be used to check whether the router interfaces are properly configured?
show ip interface brief (sh ip int brief)
Which of the following commands enables you to view the route codes and routes?
show ip route
Which of the following commands would you enter to display only the static routes?
show ip route static