CpS 335 Test 1 Chapters 1-5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the minimal amount of voltage required to damage an electrical component?

10

Which of the following is NOT a range of IP addresses recommended for use in private networks?

127.0.0.0 through 127.255.255.255

In the classful addressing scheme, what range of network addresses is considered a Class B?

128.0.x.y to 191.255.x.y

By default, what is the MTU size on a typical Ethernet network?

1500

If the VLAN tag is present in an Ethernet frame, what is the maximum frame size?

1522 bytes

Equipment data racks most commonly are a standard width of what measurement?

19 inches

Which of the following IPv6 addresses represents a global unicast address?

2000::/3

How is an IPv6 address written and displayed?

2001:0db8:85a3:0000:0000:8a2e:0370:7334

What statement accurately describes what a cable bend radius determines?

A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

How is a memorandum of understanding document utilized?

A memorandum documents the intentions of two or more parties to enter into a binding agreement.

What is the difference between a port and a socket?

A port is a construct assigned by a network proccess so that they can be identified in the system. A socket is a combination of a port and ip address.

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?

TIA/EIA-568

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

In the United States, who is able to activate the Emergency Alert System at the national level?

The President

What does backbone cabling consist of?

The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address.

Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?

The exposure of the cable can cause transmission interference between wires.

How can you determine the manufacturer of a NIC card based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

What part of a MAC address serves as the extension identifier, or device ID?

The last 24 bits of the MAC address.

What statement accurately reflects what occurs when a message is too large to transport on a network?

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol.

Transport

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.

True

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.

True

Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF).

True

In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling.

True

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.

True

The Border Gateway Protocol is considered to be a hybrid routing protocol.

True

The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6.

True

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

True

The industry standard height for a rack in rack units is 42U.

True

The process of designing, implementing, and maintaining an entire network is called the system life cycle.

True

True

True

UDP port 123 is utilized by the Network Time Protocol service.

True

When using IPv6, two or more nodes on the same link are said to be neighbors.

True

What is the purpose of a main distribution frame or main distribution facility?

Used to connect public or private lines coming into the building into internal network

A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term?

VoIP PBX (private branch exchange)

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?

VoIP gateway

When deploying a VoIP solution in a network, what are some of the different types of equipment and devices you may encounter?

VoIP gateway Switch VoIP PBX

What is the difference between a WAN, MAN, CAN, and a PAN?

WAN is wide area network. A group of connected LANs is called a MAN (Metropolitan area network). CAN means campus area network and can is also a group of connected LANs and PAN is a very small network and it stands for Personal area network.

What is plenum, and what must you do to be able to run cable through plenum space?

You must make sure the cable sheath is plenum-rated, and consult the local codes to make sure it is installed correctly.

What is the name of the GUI front end that is available for the Nmap utility?

Zenmap

What are some of the different types of software changes?

patch—A software patch is a correction, improvement, or enhancement to software. It corrects a bug, closes a vulnerability, or adds minor enhancements to only part of the software, leaving most of the code untouched. The process of monitoring the release of new patches, testing them for use on networked devices, and installing them is called patch management.• upgrade—A software upgrade is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities.• rollback—A software rollback is the process of reverting to a previous version of software after attempting to patch or upgrade it.• installation—New software, such as CRM (customer relationship management) software for sales reps or a financial software package for accountants, must be installed on the relevant devices and incorporated with network resources.

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

port 547

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

port numbers

A change coordinator functions as what type of manager?

project manager

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

sliding-window

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?

star topology

What tcpdump command can be used to filter out all traffic except SSH traffic?

tcpdump port 22

How are routing paths determined?

the router searches its routing table for a network address that matches he destination ip address of the packet.

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?

traceroute -I srv1.mycompany.com

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?

vertical cross connect

What text editor can be used on Linux to view and edit the contents of a configuration file?

vim

What command can be used to check a domain computer's time source from a Command Prompt window?

w32tm /query /source

What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?

wiki

What type of diagram is a graphical representation of a network's wired infrastructure?

wiring schematic

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?

EIGRP may not be available on non-Cisco routers.

A 66 block is more suitable for data connections than the older 110 block.

False

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

False

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.

False

F5 Networks set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices.

False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

False

IPv4 and IPv6 use the same packet format.

False

In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack.

False

Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.

False

Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.

False

TCP uses a four-step process called a four-way handshake to establish a TCP connection.

False

The pathping utility sends 10 pings per hop by default.

False

The protocol data unit for the Physical layer of the OSI model is payload, or data.

False

UDP provides error checking, but not sequencing.

False

Explain the two different categories of Application layer protocols, and then detail the PDU used at this layer.

First category of application layer protocol is services such as broswer and web servers that use HTTP Second is Utility programs that provide services to systems such as SNMP.

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Framing

IPv6 has two different types of unicast addresses. How do these two types differ from each other?

Global address-have 4 sections of bits on their address. 3-45-16-64 link local address- have 2 different sections of bits. 64-64

Which statement does NOT accurately describe characteristics of the OSPF protocol?

OSPF requires very little CPU or memory resources.

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

In the DNS hierarchy, where is information about how to find the top-level domain servers held?

On the DNS root servers.

What are the differences between the POP3 and IMAP4 protocols?

POP3 is a simple protocal that only allows a message to be downloaded from an inbox to the local computer while IMAP allows the user to see all the folders on the entire mail server.

In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

Physical

Explain the differences between a physical topology and a logical topology.

Physical topology refers to a networks hardware and how computers and cables fit together to form the physical network. Logical topology has to do with the software, how to access to the network is controlled, including how users and programs have access to the network, how applications and databases are shared on the network.

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

Remote Desktop Protocol (RDP)

What is a remote application, and how can remote applications be implemented on Windows Server?

Remote applications allow people to run applications and control their servers or computers when they are away from the device/network. They can be implemented on Windows Server pretty seamlessly. Users can control other Windows OS from their own local computer.

How does IPv6 utilize Neighbor Discovery Protocol to detect neighboring devices?

Routers learn about all device on the network. IPv6 automatically does this and adjusts when ever a computer or node is removed from the network.

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

SIP

What mail protocol is used to send mail messages to a server?

SMTP

What are the two different variations of network address translation (NAT)?

Snat-Static Network Address Translation DNAT-Destination Network Address Translation

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

mycompany.com

Which of the following is not a task handled by a router?

A router forwards broadcasts over the network.

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

AAAA record

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Active Directory Domain Services (AD DS)

What is MAC address spoofing?

Alters the MAC address on the network interface controller

Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for?

An IS-IS capable network router.

When creating network diagrams, what icon description typically represents a network switch?

An icon that is rectangular, which contains four arrows pointing in opposite directions.

How might an organization configure a DNS server for use on their network?

An organization might use primary DNS server, secondary DNS server, or caching DNs server. Or forwarding DNS server.

Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols?

EIGRP

What is the difference between unicast, multicast, and anycast addresses?

Anycast: A type of IPv6 address that represents a group of interfaces, any one of which (and usually the first available of which) can accept a transmission. At this time, anycast addresses are not designed to be assigned to hosts, such as servers or workstations, but rather to routers. Multicast: Transmissions in which one host sends messages to multiple hosts. Unicast: type of IPv6 address that represents a single node on a network.

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?

Application

Which statement regarding the Border Gateway Protocol (BGP) is accurate?

BGP utilizes TCP for communicating updates.

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

Which of the following is NOT a best practice when performing cable management?

Cable ties should be pulled tightly to keep cables from moving around in a bundle.

Why are the Class D and Class E IPv4 address ranges not available for general use?

Class D addresses begin with octets 224 through 239 and are used for multicast transmissions, in which one host sends messages to multiple hosts. An example of this is when a host transmits a videoconference over the Internet to multiple participants. Class E addresses, which begin with 240 through 254, are reserved for research. Additionally, the IP addresses listed in Table 3-2 are reserved for special use by TCP/IP and should not be assigned to a device on a network.

What is a defining characteristic of a bus topology based network?

Devices are daisy-chained together in a single line.

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

Differentiated Services (DiffServ)

ARP tables might contain two different types of entries. What are they, and how are they created?

Dynamic and static Dynamic entries are created when client makes arp request that could not be satisfied by the data in the arp table. Static are table entries that someone has already entered into the table.

What does the MX record do in a forward DNS zone?

It identifies the e-mail server to be used for e-mail traffic for the domain.

What steps should be taken to manage documentation at a cabling plant?

Keep cable plant documentation in a central and accessible location. Label every jack and port, Use color coded cables, Update documentation when changes occur.

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

Material Safety Data Sheet (MSDS)

What are some of the tasks for which a network operating system is responsible?

NOS, The OS is repsonsible for Application, presentation, and the session layer.

What are some general OSHA guidelines to use when using power (electric) tools or other hand tools in the workplace?

Wear PPE (personal protective equipment) to protect yourself as you work. For example, wear eye protection where dust or fumes are generated by power tools.• Keep all tools in good condition and properly store tools not in use. Examine a tool for damage before you use it.• Use the right tool for the job and operate the tool according to the manufacturer's instructions and guidelines. Don't work with a tool unless you are trained and authorized to use it.• Watch out for trip hazards, so you and others don't stumble on a tool or cord. For example, keep power tool electrical extension cords out from underfoot, and don't leave hand tools lying around unattended

Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company?

master license agreement

What utility is the equivalent to the pathping command on a Linux system?

mtr

What are some examples of routing metrics that can be used to determine the best path for a network?

bandwith, load, hop count, path cost,

What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling?

entrance facility

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

fail-close

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

fail-open

The Data Link Layer utilizes what name for its protocol data unit (PDU)?

frame

What IPv6 field is similar to the TTL field in IPv4 packets?

hop limit

Where is a demarc located in relation to the structured cabling of an enterprise environment?

in the Main Distribution Frame (MDF)

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?

ipconfig /flushdns

What are some of the basic functions of a network router?

managing traffic between these networks by forwarding data packets to their intended ip address. Allow multiple devices to use the same internet connection.


Set pelajaran terkait

HS 305: Intercultural Comm. MIDTERM

View Set

CHAPTER 5: PUBLIC SPENDING AND PUBLIC CHOICE

View Set

008 - Networking - C5.1.5 Variable Length Subnet Mask (VLSM) Facts

View Set

Accounting 344 Ch 7 Review Questions

View Set

Word formation (Destination C1 & C2)

View Set

Interrelationships Of Humans With The Living And Non-living Environment

View Set

Thesis, topic sentence & controlling idea

View Set

N404 populations and community health exam 1

View Set