IP Addresses and Networking In Depth, Hardware and Network Troubleshooting, ports, Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

___________ is a single mode fiber optic cable standard with transfer speeds of 10 gbps over a maximum distance of 40 km.

10GBase-ER

___________ is a multi-mode fiber optic cable standard with transfer speeds of 10 gbps over a maximum distance of 26 - 82 m.

10GBaseSR

IPv6 is made up of _____ bits of data Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

128

Class B IPv4 addresses have two octets to represent the network portion and two for the hosts (n.n.h.h). The default subnet mask is 16 bits (255.255.0.0). These addresses are typically used for medium-sized networks. Class B range is ___ - ____.

128 - 191 128.1.0.1 to 191.255.255.254

IPv4: CLASS B

128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.

IPv4: CLASS C

192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.

Lower-numbered ports are well-defined and map to a specific _______ ________ or ___________.

network protocol, service

Ports help define the type of traffic going from a _______ ________ to a __________.

network source, destination

Transmission Control Protocol/Internet Protocol (TCP/IP) is the primary protocol for modern _________.

networks

What is a common symptom of a bad network cable?

no link lights

IPv4 address is ____ bits in length and divided into 4 octets, each 8 bits in lengths. It is written in binary numbers made up of 0s and 1s called dotted-decimal notation.

32

_________ ___________ are designed to be used in the hosts that are publicly accessible from the internet. The majority of addresses are ________ ___________.

public addresses

_____________ ________ is used to connect a cable to a punchdown block and to the back of an RJ-45 jack.

punchdown tool

Many video cards have sensors to shut down the system if the temperature is too high. If you experience spontaneous shutdown, check the ________ __________.

system cooling

Well-known ports range from ___ - _____.

0 - 1023

CAT 5e cable has transmission speeds of _______ mbps and the frequency is _____ mhz. UTP Cat 5e cables are used for equipment capable of 1 gpbs transmissions.

1000 Mbps 100 MHz frequency

What's the top speed for data transfers using Infrared (IrDA) technology?

4 Mbps

Fiber optic cables are less susceptible to ______.

EMI (electromagnetic interference)

Port 443 is a TCP transfer known as the __________ ___________ protocol that allows the browser to connect to the web pages on the internet. However, unlike port 80, the connection is secure.

HTTPS (HyperText Transfer Protocol Secure) TCP transfer

Port 42 is a TCP/UDP protocol that is known as the _______ ________ ________. It is used by WINS (Windows Internet Naming Service) for translating a host name to an Internet address.

Host Name Server

router

Hubs and switches help to control traffic within a network but only within a network. _________ connect and route traffic between networks. It links computers to the internet, so users can share the connection. A ________ acts as a dispatcher, choosing the best path for information to travel so its received quickly For example, a computer trying to retrieve data from the Internet can only do so if the computer has a connection to a router. Routers build tables to direct traffic as data passes through them. Some physical devices can act both as switches and __________. All of these devices have activity lights on each port.

__________ are networks that have multiple locations but within the same municipality

MANs

_________ __________ have distinct roles in managing all aspects of a network

Network protocols

Ports 161 - 162 are UDP transfers known as _______ ___________ _________ protocol, and it is used to monitor and manage devices on networks.

SNMP (Simple Network Management Protocol)

ping command: -a

This ping command option will resolve, if possible, the hostname of an IP address target.

______ ____________ and _________ are used to find an opposite end of a cable and the signal strength of the cable. The generator sends a signal from one end of a cable. The probe receives the signal and if it is a good signal, sounds a tone.

Tone generator probe

_________ _____ and ______ allows for automatic discovery of network devices and then, basic services of those devices. For example, a UPnP media server provides media library storage and streaming to network clients.

Universal Plug and Play (UPnP)

WPA (Wi-Fi Protected Access)

____ is newer than WEP. On older wireless access points, a firmware update may be needed in order for _____ to be available. It uses a 128-bit encryption to scramble data packets _____ uses Temporal Key Integrity Protocol (TKIP), which provides a new encryption key for every packet. It also offers security enhancements such as encryption key integrity checking. User authentication is through Extensible Authentication Protocol (EAP). However, it still contained many flaws and led to the next security protocol.

MX (Mail Exchange Record)

____ maps a domain name to a list of mail exchange servers for that domain This query returns a list of host names of mail exchange servers accepting incoming mail for that domain.

USB dongle

_____ __________ is a device inserted into a USB port that adds additional features to the base system Examples: enabling network connectivity and increasing RAM

infrastructure mode

_______________ ______ uses one or more wireless access points (WAPs) to connect the wireless network nodes to a wired network segment a single WAP that services a given area is called a Basic Service Set (BSS) Extending a service area by adding more WAPs is called a Extended Basic Service Set (EBSS) Requires planning and are more complicated to configure than ad-hoc networks. Better suited to networks that need to share dedicated resources such as Internet connections and centralized databases. Created to support small office/home office (SOHO) networks and larger corporate environments.

_______ __________ is used to test the twisted-pair wires in a twisted-pair cable and can identify any pairs which do not work, thus allowing a technician to focus on a specific part of a cable to repair.

cable tester

IPv4 addresses are grouped into 5 classes. Classes A, B and C are ___________ addresses and are assigned to hosts. Class D is reserved for ________ use. Class E is for _____________ use.

commercial multicast experimental

A rollover cable (yost cable or console cable) is a type of null-modem cable that is often used to connect a ___________ __________ to a router console port (RJ-45). This cable is typically flat (and has a light blue color) to help distinguish it from other types of network cabling.

computer terminal - workstation serial port (DB-9)

In troubleshooting a network that is down, a red X on the network icon means the cable is not ________. While a yellow exclamation point means there is ________ _______________.

connected limited connectivity

One way to prevent hardware problems is to make sure the system __________ is always working. In addition to regularly cleaning and examining fans to make sure they are properly ________ a computer, a software-based temperature monitor can also keep a computer user aware of the temperature of the CPU, hard drive, and other components inside of a computer.

cooling.

__________ is a tool that allows you to take an RJ-45 connector and crimp it onto the end of UTP cable. It can also be used on RJ-11 cables. Leave about ½" of exposed wire from the end of the jacket to make a cable Use EIA/TIA 568A or 568B pattern for wires

crimper

When working on networks, tools that you may need includes:

crimper cable (wire) stripper multimeter cable tester tone generator and probe loopback plug punchdown tool wi-fi analyzer wireless locator

A loud clicking noise, usually means the ______ ________ is failing. Back up your data and replace immediately.

hard drive

To find a computer's MAC address, you would use the command prompt ____________

ipconfig/all

Ports 49152 to 65535 are ________ ports

public

Ports 0 to 1023 are ________ __________ ports

well-known

registered ports range from ____ - _______.

1024 - 49,151

frequency

(MegaHertZ) One million cycles per second. MHz is used to measure the transmission speed of electronic devices, including channels, buses and the computer's internal clock. A one-megahertz clock (1 MHz) means some number of bits (1, 4, 8, 16, 32 or 64) can be manipulated at least one million times per second.

In CIDR, the maximum can only go to a _____ because a byte is 8 bits and there are 4 octets (bytes) in an IPv4 address (4 x 8 = 32) Keep in mind...the largest subnet mask can only be a /30 because you have to keep at least 2 bits for host bits.

/32

The two frequencies on which wireless networks operate are _________ and __________.

2.4 GHz: Works with the: 802.11b 802.11g 802.11n This frequency is susceptible to interference from cordless phones and microwave ovens. 5 GHz: A frequency which is mostly interference-free but does not travel as far as the 2.4 GHz frequency

A very large network can use the Class A private network, which allows for over 16 million private addresses. On medium size networks, a Class B private network could be used, which provides over _________ addresses. Home and small business networks typically use a single class C private address, which allows up to _____ host.

65,000 254 host

If the computer system goes back in time each time it is booted up, the ______ _________ is failing and needs to be replaced.

CMOS battery

In troubleshooting, after checking the power supply, and you are still experiencing "no power," the problem may be a bad ______.

CPU

Network Topologies: HYBRID

Implemented in many networks today Combination of two or more different topologies Star ring and Star bus are the most common

Network types

LAN WAN PAN MAN

When multiple signals travel through a cable simultaneously, using a plastic core, it is known as a ________-______ fiber cable Because multiple signals pass through at once, these fiber cables typically do not carry a signal as far as that of single-mode fiber cables. Of note, the plastic core is larger than the glass core

Multi-mode (MMF)

_________ is used on Windows XP machines to join a computer to a domain

NETDOM -no significant switches or attributes

_________ are networks connecting two personal devices.

PANs

Straight-through cable is used to connect dissimilar (unlike) devices, such as a _____ to switch OR switch to __________.

PC to switch switch to router

True or False Fiber cables have several types of connectors, but the three main connector types are the SC, LC, or ST. The SC is shaped like a square. The LC is a miniature version of the SC. The ST is a round-shaped.

TRUE

True or False: 5 GHz Frequency Range: Immune from interference from devices that operate in the 2.4GHz range (microwave ovens, cordless phones, Bluetooth devices). Offers coverage for shorter distances but faster speeds. Contains 12 non-overlapping channels

TRUE

True or False: Turning DHCP on or off: Only one device on a network should serve the role of DHCP. If the wireless access point is to serve that role, DHCP should be turned on. If a DHCP server is already fulfilling the role, DHCP should not be turned on

TRUE

True or False: Before allowing devices to connect to a wireless network, a wireless router needs to be configured properly. Configuration aspects include items related to security, controlling port traffic, and whether the wireless router will serve a DHCP role A technician, should always consider the following: Channels Port forwarding Port triggering Turning DHCP on or off Demilitarized zone (DMZ) Network Address Translation (NAT) Basic Quality of Service (QoS) Firmware Universal Plug and Play (UPnP)

TRUE

configuration troubleshooting: Most of the time this is obvious with two words: "User Error". -Wrong SSID -Wrong security configuration -MAC address filtering configuration

TRUE

Fiber optic cables are typically used for ________.

WANS (wide area networks)

If the monitor displays a dim or faded screen image, check the on-board _________ ________. If the brightness is set to a high level, the ___________ is failing.

brightness controls backlight

symptom: local connectivity only If a device cannot get out to the internet, check the ______ ___________ to make sure it is working. Make sure the device has the correct IP address for the ______ __________.

default gateway default gateway

If the toner is not fused to the paper, replace the _______. A message will usually appear indicating the ______ needs to be replaced.

fuser fuser

_________ displays all current TCP/IP network configuration values and refreshes DHCP and DNS settings. In Linux and OSX, you would use ________. The wireless equivalent is _________.

ipconfig ifconfig iwconfig.

_____ asks the computer, "are you there?" If the request times out, the address cannot be reached. Typically supports DNS name resolution, and the domain name may be used.

ping

__________ boost network signals so they can travel longer distances. ____________ can be wired or wireless. In electromagnetic media, ____________ overcome the attenuation caused by free-space electromagnetic-field divergence or cable loss. --Attenuation is a general term that refers to any reduction in the strength of a signal. Sometimes called loss.

repeaters (extenders)

On an inkjet printer, if there are vertical lines on a page, the ______ may be clogged. Try removing and shaking the ______ ____________. If that is not the solution, the ______ could be scratched. On an ink-jet printer, try re-aligning and cleaning the print heads.

toner toner cartridge drum

______________ ____________ ___________ refers to a cable that has four twisted pairs of copper wire. These cables are far more common than STP cables as they are less expensive. However, due to lack of shielding, these cables are more susceptible to EMI. EMI is worse if the cable is exposed to light, near a power cable, or near magnets or motors. In addition to EMI, crosstalk can be a problem if two cables are too close to each other as with crosstalk, data from one cable can crossover to another cable

. Unshielded Twisted Pair (UTP)

IPv4 addresses are 32-bit IP addresses displayed as four numbers from_____ to _____.

0 to 255.

Class A IPv4 addresses have only one octet to represent the network portion and three to represent the hosts (n.h.h.h). The default subnet mask is 8 bits (255.0.0.0). These addresses are typically assigned to large organizations. Class A range is __ - ____.

1 - 126 1.0.0.1 to 126.255.255.254

In addition to these network architecture devices, Ethernet networks can use, when needed, existing electrical wiring in order to transmit data. Conversely, devices needing power can sometimes use Ethernet cables instead of electrical wiring for their power. There are two specific devices which allow Ethernet and electrical power to share the same medium, which are ________ ______ ________ and ______ _________ __________ ____________.

1. Ethernet over power: -An adapter which allows for an Ethernet connection using existing electrical wiring in a building. 2. Power over Ethernet injector: -A device which uses Power over Ethernet (PoE) to transmit electrical power over Ethernet cables. For example, a camera may need power and an Ethernet cable may be nearby but not an electrical wall plug. If the camera supports PoE, an Ethernet connection can supply power to the camera.

Installing and Configuring LANs:

1. Install the NIC 2. Link and Activity lights 3. Wake-on-LAN 4. Quality of Service (QoS) 5. Power over ethernet (POE)

How can you secure a wireless network?

1. Turn off all defaults such as the default username is blank and the password is admin 2. Provide a new username and password. 3. Turn off the SSID broadcast and manually enter a unique SSID. 4. Use MAC address filtering. 5. Configure encryption for communications.

A general order for troubleshooting startup problems is to remember the order in which components start up on a computer: 1. ________ __________ 2. _____ 3. _____ 4. ______________ 5. ________ __________

1. power supply 2. CPU 3. RAM 4. peripherals 5. bootable media

IPv4: CLASS A

1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks

CAT 6 cable has transmission speeds of ____ gbps and the frequency is ____ mhz. UTP CAT 6 is used with 10GBase-T networks

10 Gbps 250 MHz frequency

CAT 6e cable has transmission speeds of ___ gbps and the frequency is _____ mhz Official standard is CAT 6a, not 6e.

10 Gbps 500 MHz frequency

CAT 7 cable has transmission speeds of ____ gbps and the frequency is ____ mhz Shielding is added for individual wire pairs.

10 Gbps 600 MHz frequency

Coaxial cables have a maximum transmission speed of __________, thus making it far slower than that of twisted-pair or fiber cables.

10 Mbps

Cat 3 cable has transmission speeds of ____ mbps and the frequency is ____ mhz. UTP Cat 3 cables are an older standard and not used as much.

10 Mbps speed 16 MHz frequency

10Base5 (Thicknet) is a coaxial cable standard with transmission speeds of ____ mbps with a max distance of ____ meters.

10 Mbps speed 500 meters distance

10Base2 (Thinnet) is a coaxial cable standard with transmission speeds of ___ mbps with a max distance of ____ meters Note that the 2 in 10Base2 represents a distance of approximately 200 meters but the actual signal distance is _____ meters.

10 Mbps speed 185 meters distance

Cat 5 cable has transmission speeds of _____ mbps and the frequency is ____ mhz. UTP Cat 5 cables are used for equipment capable of 100 mbps transmissions.

100 Mbps speed 100 MHz frequency

For UTP cables, the standard distance a signal will travel without losing quality is ______ meters or _____ feet. If two devices are further than this and need to be connected, a repeater needs to sit in between those two devices. Repeaters boost signals. While there is one standard for distances for UTP cables, there are several standards for speeds and transmissions. Speeds and transmissions are defined by categories.

100 meters (328 feet)

___________ is a single mode fiber optic cable standard with transfer speeds of 1 gbps over a maximum distance of 10 km.

1000Base-LH

There are several different STANDARDS for fiber cables, each with a maximum speed and distance. Most standards use either MMF or SMF with the exception being the ___________ standard, which uses both MMF and SMF.

1000Base-LX

___________ is a fiber optic cable standard with transfer speeds of 1 gbps over a maximum distance of 5 km. This is the only fiber optic cable standard which can use both MMF or SMF.

1000Base-LX

___________ is a single mode fiber optic cable standard with transfer speeds of 1 gbps over a maximum distance of 70 km.

1000Base-ZX

___________ is a multi-mode fiber optic cable standard with transfer speeds of 100 mbps over a maximum distance of 2 km.

100Base-FX

Coaxial cables have two basic standards for speeds and transmissions, which are ______ and _______

10Base2 (Thinnet) 10Base5 (Thicknet)

___________ is a single mode fiber optic cable standard with transfer speeds of 10 gbps over a maximum distance of 10 km.

10GBase-LR

Port ____ is a TCP/UDP protocol known as Simple Network Management Protocol (SNMP) It is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more

161

Class C IPv4 addresses have three octets for the network portion and one for the hosts (n.n.n.h). The default subnet mask is 24 bits (255.255.255.0). These addresses are usually assigned to small networks. Class C range is ___ - ____.

192 - 223 192.0.1.1 to 223.255.254.254

____.___.___.____ is the default gateway, normally used by Linksys broadband routers or other internal router interface (i.e., home networks). It is also the internal DHCP server IP address.

192.168.1.1 subnet mask: 255.255.255.0

IPv4: CLASS D

224.0.0.0 to 239.255.255.255 RESERVED FOR MULTICAST GROUPS

IPv4: CLASS E

240.0.0.0 to 254.255.255.254 RESERVED FOR FUTURE USE or RESEARCH & DEVELOPMENT PURPOSES

A subnet mask is a ______ bit value that allows the recipient of IP packets to distinguish the network ID from the host ID portion of the IP address.

32

dynamic or private ports range from _______ - ________.

49,152 - 65, 535

There are _________ available ports

65,535

Wireless networking is based upon the IEEE _________ wireless Ethernet standard. Mostly referred to as ___-___. Wireless networks uses radio signals, infrared signals and cellular signals.

802.11 Wi-Fi

________ is a wireless network standard that uses 5 GHz frequency over an indoor distance of 30 meters/100 feet and transfer speed up to 54 Mbps.

802.11a

________ is a wireless network standard that uses 5 GHz frequency over an indoor distance of 27 meters/90 feet and transfer speed up to 1300 Mbps. It uses multiple antennas; each with transfer speeds of up to 400 Mbps. Most devices have between one and four antennas. Smartphones typically have one antenna while desktop wireless network adapters typically have four antennas. The actual likely top speed of an 802.11ac network is 400 Mbps.

802.11ac

________ is a wireless network standard that uses 2.4 GHz frequency over an indoor distance of 35 meters/115 feet and transfer speed up to 11 Mbps.

802.11b

________ is a wireless network standard that uses 2.4 GHz or 5 GHz frequency over an indoor distance of 38 meters/125 feet and transfer speed up to 54 Mbps.

802.11g

________ is a wireless network standard that uses 2.4 GHz frequency over an indoor distance of 70 meters/230 feet and transfer speed up to 300 Mbps. However, with dual link, the speed can be 600 Mbps. It uses MIMO to achieve higher speeds. Without MIMO, the speed would typically be 240 Mbps.

802.11n

DNS Services and Protocol

A NS CNAME MX AAAA PTR

File History, File Recovery

A Windows 8 utility that backs up important files, makes a complete mirror image of your current computer setup. Then the files can be recovered if need be.

Hub

A _____ can transmit data from one computer to another. However, hubs are not common in modern networks for one main reason: Hubs do not save any data on its connected devices. So every time data comes in from a computer to a hub, the hub broadcasts that data to every device connected to it and then each computer connected to the hub has to figure out if the data is meant to reach that computer. This creates a lot of unnecessary traffic on a network

printer maintenance (kit)

A __________ _____________ kit is purchased from a printer manufacturer. It contains the parts, tools, and instructions needed to perform routine printer maintenance. Sometimes, this is initiated through pushing a button on the printer console or LED panel. At other times, this process is initiated through printer software installed on a computer.

Port 548 is a TCP transfer known as ________ ___________ protocol, which is a proprietary network protocol, which allows non-apple network to communicate with an Appleshare file server.

AFP (Apple Filing Protocol)

Port 427, 548

AFP - File Transfer Offers file services in a Mac environment. Primary protocol for file services in Mac OS 9 and prior (now it is SMB).

A (An end device address)

An ___ record ties the IPv4 address to the domain name like: 198.98.16.27 to www.cisco.com.

AAAA (An end device address for IPv6)

An _______ record ties the IPv6 address to the domain name like: 2000:AD34:7322::93C:11FF to www.cisco.com.

NS (an authoritative name server)

An authoritative name server, also known as ____, is a name server that can give an authoritative answer to a DNS query, and not just a cached answer that was given by another name server. All primary and secondary name servers give authoritative answers

___________ is a method of addressing groups of computers as though they were a single computer. It starts by giving a number of computers (or clusters of computers) the same IP address. Advanced routers then send incoming packets to the closest of the computers.

Anycast

Network Topologies: BUS

Backbone -One main coaxial cable -Each device spliced into the main --Vampire taps or BNC-T connectors Terminated at both ends Contention based network/Collisions

If the mobile device is experiencing a "flickering display," there may be a loose connection within the laptop display area. Take apart the laptop and reconnect the display connectors. If that does not work, the ______ or ___________ is starting to fail.

CCFL inverter

The most common CHKDSK commands are: ____________ - fixes errors on the disk ____________ - fixes errors and recovers readable information when fixing errors.

CHKDSK /f: CHKDSK /r:

______ is a subnetting method that is an expansion of the IP addressing system that allows for a more efficient and appropriate allocation of addresses. It selects a subnet mask that meets the company/home network's networking and node requirements, and then treats the mask like a 32-bit binary word. In this method, addresses are provided in block size. When a company or person receives a block of addresses from an ISP, it is typical to see the following: Example: 192.168.10.32 /28 The slash means how many bits are turned on (1s). The maximum can only go to a /32 because a byte is 8 bits and there are 4 octets (bytes) in an IPv4 address (4 x 8 = 32). Keep in mind...the largest subnet mask can only be a /30 because you have to keep at least 2 bits for host bits.

CIDR (Classless Inter Domain Routing)

There are 4 types of "Wired" internet connections, which include _________, ________ or _______, _____-___ and ________.

Cable DSL or ISDN Dial-up Fiber

_________ and ____ are the two most common high-speed Internet connections. Cable tends to be faster but the bandwidth is shared, thus speeds will vary. DSL runs on a dedicated line.

Cable and DSL

There are 3 types of "Wireless" connections, which include ________, _______-___-_______, and _______.

Cellular --Mobile Hot Spot Line-of-sight --WISP (Wireless Internet Service Provider) WiMAX (Worldwide Interoperability for Microwave Access) --Satellite

Not all networks need subnets, meaning they use the default subnet mask. What are the default subnet masks for class A, B, and C?

Class A: n.h.h.h 255.0.0.0 Class B: n.n.h.h 255.255.0.0 Class C: n.n.n.h 255.255.255.0

_______ _____-________ __________ is a method that ISPs use to efficiently and appropriately allocate a number of addresses to a company or home connection. These addresses are provided in block size. For example, It is written like 192.168.10.32/28 The slash means how many bits are turned on (1s)

Class Inter-Domain Routing (CIDR)

There are two main components in a network to fulfill a role, which include:

Client(s) - the local computer that is requesting or desiring access to a certain role Server(s) - A local or remote server that fulfills these requests sent by the host.

On a laptop, if you are experiencing no power, make sure it is plugged in as the battery may be discharged. If needed, reseat the battery. If that does not work, the ______ ________ may need to be replaced.

DC jack

___________ is one of the most important aspects to configure as if it is turned on when it is not supposed to be, machines will obtain an IP address from the wrong source.

DHCP

Port 67 - 68 are UDP transfers known as ___________ __________ ___________ protocol, which assigns IP address related information to the clients on a network automatically. This information may comprise of subnet mask, IP Address etc. UDP Port 67 performs the task of accepting address requests from DHCP and sending the data to the server. While, UDP Port 68 performs the task of responding to all the requests of DHCP and forwarding data to the client.

DHCP (Domain Host Configuration Protocol)

The _____ _________ _________ also shows the client name and whether it is connected via the Ethernet LAN or wireless (Interface).

DHCP client table

The _____ ______________ feature on most ISRs gives information about connected hosts and IP addresses, their associated MAC address, and lease times.

DHCP configuration

On the DHCP configuration screen a default _____ ___________ is available or you can specify a starting address for the _____ __________ (do not use 192.168.1.1) and the number of addresses to be assigned.

DHCP range

One way in which an IP address can be permanently assigned to a device through DHCP is through a ______ _____________. To do this, an administrator needs to know the MAC address of the device which needs a reserved IP address.

DHCP reservation

If two devices on a network have the same IP address, which is also known as IP conflict, the usual cause is a _______ ________ assigning an IP address which has already been assigned statically. The DHCP scope should be fixed to not include any static IP address.

DHCP server

If you enter a wireless hotspot at an airport or coffee shop, the ______ __________ makes it possible for you to access the Internet. As you enter the area, your laptop DHCP client contacts the local ____ _________ via a wireless connection, and it assigns an IP address to your laptop.

DHCP server

Port 53 uses both TCP and UDP and is known as __________ __________ _________ protocol. It makes use of relational databases to link the host names of the computers or networks to their respective IP Addresses.

DNS (Domain Name System)

If you receive a "boot disk not found" error message, the system is attempting to boot to the incorrect device. Make sure the _____ drive is empty and no ______ drives are plugged in. If this does not solve the problem, boot into the ______ and make sure the boot order is correct.

DVD drive flash drives BIOS

_______________ _________ an area of the network which contains devices that need to communicate directly with both private machines on the network and public-facing machines. (perimeter network) For example, a web server needs to send information to public requests yet also be accessible by the webmaster in a private network.

Demilitarized zone (DMZ)

ping command: -n(count)

Determines the number of echo requests to send. The default is 4 requests.

_______ __________ ________ uses digital signals over phone lines for a high-speed Internet connection. The speed is not typically as high as that of cable Internet but tends to be more consistent than cable Internet. The closer the connection to the phone company equipment, the higher the speed. ______________ _____ is the most common DSL subscription, with much faster download speeds than upload speeds. ________________ ______ has the same upload and download speeds.

Digital Subscriber Line (DSL) Asymmetric DSL (ADSL) Symmetric DSL (SDSL)

IPCONFIG/all

Display full configuration information.

IPCONFIG/displaydns

Display the contents of the DNS Resolver Cache.

_________ __________ _____________ translates domain names into IP addresses. Because domain names are alphabetic, they are easier to remember The Internet however, is based upon IP addresses. Every time you use a domain name, therefore, a _____ service must translate the name into the corresponding IP address.

Domain Name Service (DNS) DNS

_________ _______ _______________ ____________ is a protocol for assigning dynamic IP addresses to devices on a network. Simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. However, a device can have a different IP address every time it connects to the network.

Dynamic Host Configuration Protocol (DHCP)

ping command: -I(size)

Enables you to adjust the size of the ping packet. The default size is 32 bytes.

ping command: -w(timeout)

Enables you to adjust the time-out (in milliseconds). The default is 1,000 (a 1-second time-out).

___________ is system for connecting a number of computer systems to form a local area network. Most modern networks use three speeds: -10BaseT (10 Mbps) -100BaseT (100 Mbps) -1000BaseT (1000 Mbps or 1 Gbps) Uses a Star bus technology Connects via cables usually using UTP (Unshielded Twister Pair)

Ethernet

In addition to cable standards, there are two main types of connectors used with coaxial cables, which are _______ and _______.

F-connector: Bayonet Neill-Concelman (BNC) connector

On Ethernet networks, the broadcast MAC address is 48 ones displayed as Hexadecimal: ____-____-_____-_____-_____-______. To send a broadcast, the destination MAC address should be set to this.

FF-FF-FF-FF-FF-FF

A command used to erase the data on a hard drive is the _________ command. Being that the _________ command erases data on a hard drive, the data should be backed up before formatting the drive. When formatting a hard drive, the file system can also be determined. For example: a FORMAT D: /fs:ntfs command formats the D: drive with the NTFS file system.

FORMAT

Port 20 - 21 are TCP transfers known as _________ ________ protocol, which transfers files over the internet

FTP (File Transfer Protocol)

If Windows does not automatically detect your NIC, you have to install it manually by following these steps: 1. Go to Start 2. Control Panel 3. Add Hardware 4. Hardware and Sound 5. Devices and Printers 6. Add device The Ethernet is classified as _____-________ (data can send and receive at the same time) OR _____-________ (data can send and receive, but not at the same time).

Full-Duplex Half-Duplex

_________ __________ is the term for a public IPv6 address assigned by the ISP. It starts with 2000::/3. These addresses are publicly routable addresses and they're used just like they are for IPv4

Global Unicast

Port 80 is a TCP transfer known as the __________ ___________ protocol that allows the browser to connect to the web pages on the internet.

HTTP (Hypertext Transfer Protocol)

Port 143 is a TCP transfer known as ________ __________ _________ protocol, which retrieves emails from a remote server without having the need to download the email.

IMAP4 (Internet Message Access Protocol)

The network adapter properties show the ___ __________, ____ __________, and ___________ and allows one to configure those settings.

IP address, DNS server, and gateway

______ is used to obtain a device's IP address.

IPCONFIG /all gets more information /release releases the IP address /renew renews the IP address /displaydns displays DNS entries /flushdns flushes the DNS cache

_____ address is a 32-bit address assigned to hosts using TCP/IP. It is expressed in 4 octets of 8 binary numbers each, with the binary number translated into decimals. Each address consists - a network number - an optional subnetwork number - a host number. The network and subnetwork numbers together are used for routing, and the host number is used to address an individual host within the network or subnetwork.

IPv4 address

________ addressing is the next generation Internet Protocol (IP) address standard that will supplement and eventually replace IPv4. ________ addressing theoretically allows approximately 3.4 x 10(38) addresses. It brings further flexibility, efficiency, capability, and optimized functionality. It was developed by the Internet Engineering Task Force (IETF)

IPv6

_____ address is a 128-bit IP addresses, meaning they consist of 128 binary 1s and 0s designed to combat the lack of IPv4 addresses. It is written in hexadecimal form, and made up of 8 octets of 4 numbers/letters (ranging from 0 to 9 and A through F) and separated by colons. Example: fe80::42:acff:feaa:1bf0 IPv6 has approximately 340 undecillion IP addresses available, or, in terms of scientific notation, 3.4 x 1038 IP addresses.

IPv6 (Internet Protocol, version 6)

To combat the overgrowing population, the _________ standard was released. Eventually, this will be the main standard for all IP addressing

IPv6 address

port forwarding VS port triggering

In port triggering, ports are temporarily opened. While in port forwarding, ports are always open.

Ralph has installed a wireless network in his house, placing the wireless access point in the kitchen, a centralized location. The Wi-Fi works fine in the living room and the dining room but goes out almost completely in the bedroom. What's most likely the problem?

Interference with some metal object

Any device connected to any network needs an __________ ___________ __________, which allows the device to communicate with other devices on the network. . The original and still current standard for IP addressing is IPv4 (IP version 4).

Internet Protocol (IP) address

Higher-numbered ports (over port number 49152) are normally used for _________ ____________.

Internet traffic

In ____________ _______, devices can connect to the wireless router but not to each other. This is usually set up as a security measure to keep individual machines isolated from each other.

Isolation Mode

Port 88 is mainly a UDP protocol, it will use TCP for large tickets. It is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner with an aim to protect against eavesdropping and replay attacks. This port is used for the _________ authenticating system, which is primarily aimed for authentication of a client-server model and it provides mutual authentication —both the user and the server verify each other's identity.

Kerberos

________ are confined to a single location

LANs

On a mobile device, if there is no display, plug in an external monitor to determine if the _____ has failed or if the ______ ______ has failed. Plug in an external monitor. Make sure the display is not configured to only show the external monitor. If the display only works on the external monitor, the LCD has failed. If neither the built-in nor the external displays work, the most likely problem is a failed video card.

LCD video card

Port 389 uses both TCP and UDP transfers and is known as ____________ ____________ _____________ protocol. It is an Internet protocol, used by MS Active Directory,as well as some email programs to look up contact information from a server.

LDAP (Lightweight Directory Access Protocol)

________ __________ in a block of an IPv6 address can be removed.

Leading zeros

________ _______ __________ is made up of group of computers located physically close to one other, which are able to "hear" each other when a broadcast address is sent out. An example of this is a SOHO (small office/home office), which usually has 10 - 15 people on a network. The small office can be a wired network, a wireless network, or a combination of both.

Local Area Network (LAN)

A broadcast IP address for a network needs a corresponding _____ address in the Ethernet frame. Every NIC has a hardware address that's known as a _______ ________ _________.

MAC Media Access Control (MAC)

What technology enables 802.11n networks to make multiple simultaneous connections and thus improve speed over previous Wi-Fi standards?

MIMO - Multiple Input Multiple Output

Sometimes, a straight-through cable can be used where a crossover cable would be otherwise needed. This is possible if the port on the switch or router receiving the cable is a ________ _________ ____________ ___________ port.

Medium Dependent Interface Crossover (MDI-X) port.

______________ _______ ___________ is a network that interconnects users with computer resources in a geographic area or region larger than that covered by a LAN but smaller than the area covered by a WAN. The term is applied to the interconnection of networks in a city into a single larger network (which may then also offer efficient connection to a wide area network). It is also used to mean the interconnection of several local area networks by bridging them using backbone lines.

Metropolitan Area Network (MAN) This is also sometimes referred to as a Campus Area Network (CAN).

_______________ is an advanced continuity scanner (with a digital display) that shows the actual mapping of wires. The adapter allows for end-to-end testing. It is designed to prevent and solve cable and wire installation problems, allowing you to confirm continuity, wiring configuration and the location of cable faults.

Microscanner

_________ broadcast is similar to unicast. However, it uses streaming (UDP) as its delivery of information and uses a special class of destination addresses (Class D: 224 - 239), representing a specific group. It is known as "one to many" It allows a source device to send a packet to a group of devices. Examples: remote gaming, where many players are connected remotely but playing the same game. Another example would be distance learning through video conferencing, where many students are connected to the same class.

Multicast

________ is used to troubleshoot Network Basic Input/ Output System (NetBIOS) name resolution.

NBTSTAT -c shows names and IP addresses -r shows resolved names -R purges and reloads remote cache from lmhosts file -RR Release/Refresh for name registration

_____ has many network uses but is mostly related to network shares

NET Use maps a drive View shows remote shares Share shows local shares Statistics workstation shows sent and received statistics

_____ is used to show inbound and outbound TCP/IP connections.

NETSTAT -a shows all connections and ports -b shows the application for each connection -s shows protocol statistics

__________ shows DNS servers for a domain and troubleshoots DNS name resolution. This is not a pure command-line tool but rather a shell application. A non-authoritative answer means the DNS server does not have a host record for the machine you are using but the host name and IP address were resolved through querying other DNS servers.

NSLOOKUP

Ports 137 - 139 use both TCP and UDP and is known as _________ protocol, which allows applications and computers on a local area network (LAN) to communicate with network hardware and to transmit data across the network.

NetBIOS/NetBT (Network Basic Input/Output System)

_________ allows management of Windows domains (active directory domains) and trust relationships. It is used for batch management of trusts, joining computers to domains, verifying trusts, and secure channels.

Netdom

_______ ________ _________ translates private IP addresses in data packets to a public IP address so information can be routed to and from other networks. When more than one public address is used, this is known as Dynamic NAT (DNAT).

Network Address Translation (NAT)

Networking Topologies: RING

Old, rarely used Token ring -Token is passed in one direction around the ring -Only the machine that owns the token can send data

T568A is a wiring standard used for configuring twisted pair networking cable with RJ-45. The color order for this standard is: Pin 1 - Pin 2 - Pin 3 - Pin 4 - Pin 5 - Pin 6 - Pin 7 - Pin 8 -

P1 - green-white P2 - green P3 - orange- white P4 - blue P5 - blue-white P6 - orange P7 - brown-white P8 - brown

T568B is a wiring standard used for configuring twisted pair networking cable with RJ-45. The color order for this standard is: Pin 1 - Pin 2 - Pin 3 - Pin 4 - Pin 5 - Pin 6 - Pin 7 - Pin 8 -

P1 - orange-white P2 - orange P3 - green-white P4 - blue P5 - blue-white P6 - green P7 - brown-white P8 - brown - This particular scheme is the accepted standard.

POST cards is plugged into a _____ and ______ slot. It displays progress and error codes generated during power-on self-test (POST) of a computer. It is used to troubleshoot computers that do not start up. This runs as a machine is attempting to boot. Match the POST code with a list of code on a motherboard's manufacturer to identify a startup problem.

PCI and PCIe

______ is used to see if a destination can be reached by name or IP address.

PING -t time to live. This runs PING constantly until one presses Ctrl+C to stop the ping -4 for IPv4 addresses -6 for IPv6 addresses

Common command line tools include:

PING IPCONFIG TRACERT NETSTAT NBSTAT NET NETDOM

Port 110 is a UDP transfer known as _______ protocol, which allows the email messages to be retrieved from the SMTP servers. Using this port, you can download the messages from the server and then read them. However, this means that you will not be able to access the messages and read them without downloading them. Furthermore, the messages are also deleted from the server once they are downloaded. However, this port does not cater to the issue of security

POP3 (Post Office Protocol, version 3)

______ __________ is a device in which cables are used in a network converge. This is usually located in a network closet. Provide a connection point between hubs or switches and the ports to which computers are connected. Patch cables connect from a hub or switch port to the patch panel.

Patch panel

WPA and WPA2 support two modes, which are _______ and _______.

Personal: Used in most SOHO networks. Devices use a passphrase to connect to the wireless network. Enterprise: Requires an authentication server known as a Remote Authentication Dial- In User Service (RADIUS) server to authenticate clients. A username and password is needed to connect to the network.

ping command: -t

Pings the specified host until stopped. To stop, press ctrl + c

Twisted-pair cables have two types of jacket coverings, which are ___________ and _______.

Plenum: A jacket for cable which needs to be run through open space (between walls, through raised floors, or through ceilings). In case of fire, this type of jacket does not give off toxic fumes. PVC: A cable with a jacket made of polyvinyl chloride (PVC). This type of jacket gives off toxic fumes when burned.

_____ ___ is a TCP/UDP protocol that is used to help determine the OS. _____ ___ is considered invalid & generates a different response from a closed port. RESERVED; DO NOT USE

Port 0

_______ __________ ________________ an extension to a NAT that permits multiple devices on a (LAN) to be mapped to a single public IP address. The goal is to conserve IP addresses.

Port Address Translation (PAT)

________ ________ _____________ is power provided to device over the Ethernet connection Maximum distance of 300 feet FYI: Not all wire pairs are used for communications and are available to be used for power

Power Over Ethernet (POE)

On newer systems, NETDOM has been replaced with the add-computer ___________ command. For example, opening ____________ and typing add-computer -credential sammyssnacks.local\administrator -domainname sammyssnacks.local adds a computer using the administrator account on sammyssnacks.local to join the sammyssnacks.local domain. After entering that command it will prompt for a password and then, assuming the information is correct, the computer will join the domain.

PowerShell

Port 69

Protocol UDP TFTP (Trivial File Transfer Protocol)

IPCONFIG /flushdns

Purge the DNS Resolver cache.

To control bandwidth allocation in a wireless network, use ____________.

QoS - Basic Quality of Service

________ ____ _________ enables busy networks to prioritize or manage network traffic based on bandwidth, latency, jitter, and reliability. Bandwith - rate at which traffic is carred by a network. Latency - delay in transmission from source to destination jitter - the variation in latency reliability - percentage of packets discarded by a router

Quality of Service (QoS)

During the POST, code beeps often mean faulty _______, but this is not always the case. Consult the motherboard manual for guidance on what the number of beeps indicate

RAM

If the printer displays "low memory errors," add more _____ to the printer, if possible. If this is not a viable solution, lower the _____________ of the print job causing the low memory error.

RAM resolution

If the mobile device is experiencing slow performance, too many apps may be running OR the device could be running low on ______ and/or ______ _________. Check for ___________ to rule out if it's the cause.

RAM disk space malware

Port 3389 is a TCP transfer known as __________ __________ protocol, which enables you to establish a connection with a remote computer. With the help of this connection, you get the liberty to control the desktop of this remote computer.

RDP (Remote Desktop Protocol)

_____ ______ is a standard that reserves several ranges of addresses within each of the classes A, B and C. Class A (24-bit block) 10.0.0.0 - 10.255.255.255 8 mask bits Class B (20-bit block) 172.16.0.0 - 172.31.255.255 12 mask bits Class C (16-bit block) 192.168.0.0 - 192.168.255.255 16 mask bits

RFC 1918

Bayonet Neill-Concelman (BNC) is used with coaxial cable to carry radio frequencies to and from devices. This connector has a neck and is a push-and-turn connector used with ______ cables.

RG-59 cables.

______ coaxial cable is an older and thinner coaxial cable once used for cable TV. It uses a BNC connector. It is now mainly used for transmitting data between a TV and VCR or a TV and DVD player

RG-59 coaxial cabler

______ coaxial cable used for connecting homes to cable networks. Larger center conductor and higher frequencies than RG-59. It uses an F-connector. This is the current standard for cable and satellite systems and is very efficient at transmitting digital signals. It is used in home networks with multiple TV boxes. This setup allows for recording a program in one room and then watching it in another room.

RG-6

F-Connector (Coaxial) resembles a cylinder and is a screw-on connector for coaxial cable(s). This connector is used with _____ cables.

RG-6 cables.

A standard phone line cable is known as an ______ cable. There are two pairs of wires used for this cable, with the wires surrounded by a jacket which protects the wires from signal interference

RJ-11

A typical CAT 6 cable uses which type of connector?

RJ-45

______ is the standard cable for Ethernet networks. There are four pairs of wires used for the cable. The wire configuration determines the type of cable and where it can be used. These have two wiring standards: T568A and T568B.

RJ-45

Networking Topologies: MESH

Redundant connections provide fault tolerance Can be fully connected or partial mesh Higher cost in price and use of network resources

IPCONFIG/registerdns

Refresh all DHCP leases and re-register DNS names.

IPCONFIG/release

Releases the IP address for the specified adapter.

IPCONFIG/renew

Renew the IP address for the specified adapter.

Networking Topologies: STAR

Resembles a star in design (most common today) The bus refers to the internal wiring inside the boxes The star refers to the wires leading from the boxes to the hosts. The central box is the switch (or hub) which provides the common point of connections.

A type of shielded twisted-pair cable, in which there is shielding around each pair and then again around all four pairs, resulting in a double-shield to protect against EMI is known as _____.

S/STP

A type of shielded twisted-pair cable, in which each of the four pairs of wires are individually shielded to protect against EMI is known as ______.

S/UTP

If you receive a "drive not recognized" error, check to make sure the cabling is correct and the ______ port the drive is plugged into is ___________.

SATA enabled

Port 427 uses both TCP and UDP transfers and is known as __________ __________ protocol, which allows computers and other devices to find services in a LAN without prior configuration.

SLP (Service Location Protocol)

Port 445 is a TCP tranfer known as _________ ___________ _________ protocol, which is used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network. Used mostly on Microsoft networks. Used to transfer files over a network. Ports 137-139 use NetBIOS over TCP or UDP, while port 445 is used directly over TCP

SMB (Server Message Block)

In regards to how data travels through a fiber cable, the mode is considered either _____ OR ______ The exception to this is fiber cable 1000Base-LX which can use both modes.

SMF: Single Mode MMF: Multi-mode

Port 25 is a TCP transfer known as the _______ ________ ________ protocol, and it makes sure that email messages are communicated over the network securely Used for outgoing email.

SMTP (Simple Mail Transfer Protocol)

Port 22 is a TCP transfer known as ________ __________, and it is one of the most secure ways of accessing your files remotely. It carries out the task of remotely connecting to a remote server or host. It allows you to execute a number of commands and move your files remotely as well. This port sends the data over the network in an encrypted form which adds an extra layer of security on it.. Additionally, only authorized users can access the files.

SSH (Secure Shell)

symptom: SSID not found If a network name cannot be located, see if the _____ changed. If it has not, move the device closer to the ________ ________ _________. Make sure the wireless access point is working.

SSID wireless access point

When the shielded twisted pair cable has shielding around all four pairs of wires, it is known as ______.

STP shielded twisted pair

There are 3 types of shielded-twisted pair network cables, which include _______, ________, and _________.

STP: S/UTP: S/STP:

Types of Twisted-Pair cables are ____ and ______.

STP: shielded twisted-pair UTP: unshielded twisted-pair

Hard Drive Troubleshooting Tools include _________ and _______ _______________

Screwdriver: A screwdriver is not used to open a hard drive. Most hard drives are mounted inside of desktops and thus a screwdriver is needed to unscrew and dismount the hard drive from the desktop computer. For laptop hard drives, a screwdriver is needed to remove the case protecting the hard drive. External enclosure: A unit used to hold a hard drive so that it can be used as an external hard drive. External enclosures include power and SATA connectors for a drive and either a DC jack for power or its power is received through a USB connection to a computer. For example, a hard drive can be removed from a decommissioned laptop, placed in an external enclosure, and then plugged into another computer, thus allowing retrieval of the hard drive's data.

ping command: -f

Sets the Do Not Fragment bit on the ping packet. By default, the ping packet allows fragmentation.

_____________ _____________ ____________ is a copper network cable that has two or four pairs of twisted wires shielded by a braided mesh and covered with an outside coating. Instances where these cables would be used is for a workshop or factory floors; near motors or heavy machinery, or any other instance where EMI is involved.

Shielded Twisted Pair (STP)

When a signal travels through the cable one at a time through a glass core, it is known as a ______ _________ fiber cable

Single mode (SMF)

________ ____ addresses are important when external devices or websites need to remember your IP address. Reasons for using this type of IP address (over automatically assigned DHCP) would be for website hosting, file and server hosting, networked printers or VOIP.

Static IP

Crossover cable is used to connect similar (like) devices such as switch to a _________, router to a ________, PC to a _______, OR ______ to router ethernet port.

Switch to Switch Router to Router PC to PC PC to Router Ethernet port

The two types of RJ-45 cables are _______ and ______

T568A T568B

TCP vs UDP

TCP has slower but more reliable transfers than UDP, as TCP guarantees data has arrived safely and correctly. UDP transfers are faster, but does not guarantee that data is transferred correctly or safely. TCP is generally used for email and web browsing. While UDP is used for VoIP applications and music streaming.

______ is used to trace a path from source to destination. It helps to diagnose where a data transmission is failing.

TRACERT -d lists IP addresses only /4 for IPv4 addresses /6 for IPv6 addresses

Connectivity Troubleshooting: Most of the time comes down to incorrect configuration (incorrect password) or low signal strength. -Use the wireless NIC link lights to check if data packets are being passed. -Check the wireless NIC's configuration utility. -The link state defines the wireless NIC's connection status to a wireless network.

TRUE

Network Design Models: 1. Flat Network Network is built like it is on one massive switch 2. Layered Network Better performance, allows for a growing network Three Main Layers: 1. Core Layer Fast routers 2. Distribution Layer Printers, servers, routers, and switches 3. Access Layer Switches and wireless access points

TRUE

Software Troubleshooting: Two areas to consider when troubleshooting wireless software: 1. Wireless's device configuration 2. The firmware version of the device or the WAP. Manufacturer's regularly release firmware updates to fix issues. Always go the manufacturer's website for the updates.

TRUE

To share and access resources, a network must have the following: 1. Something that defines and standardizes the design and operation of the cabling -- Network cards and the interconnection of multiple computers 2. An addressing method that enables clients to find servers and enables servers to send data to clients 3. Some method of sharing resources and accessing those shared resources.

TRUE

True or False How to create a subnet: To create a mask, a network administrator creates a 32 bit mask composed of 1s and 0s. The 1s in the subnet mask represent the position of the network portion. Not all networks need subnets, meaning they use the default subnet mask. The following are the default subnet masks for each class. Class A Format: N.H.H.H. Default Subnet Mask: 255.0.0.0 Class B Format: N.N.H.H. Default Subnet Mask: 255.255.0.0 Class C Format: N.N.N.H Default Subnet Mask: 255.255.255.0

TRUE

True or False Steps for setting an IP ADDRESS: 1. On a Windows computer, click the Start button. 2. Type: network and sharing. When you see the Network and Sharing link, click it. The network and sharing center will launch and look similar to the screen on the right: 3. Click the Change adapter settings link. 4. Right-click the network adapter you wish to change and click Properties. The screen on the right will appear: 5. Scroll down and click the Internet Protocol Version 4 (TCP/IPv4) setting 6. Click the Properties button. You will see the following: _OBTAIN IP ADDRESS AUTOMATICALLY -USE THE FOLLOWING ADDRESS (which will be listed) -OBTAIN DNS SERVER ADDRESS AUTOMATICALLY -USE THE FOLLOWING DNS SERVER 7. Document the current setup on the network adapter in case you need to put the settings back to where they were following this project. 8. If the Obtain an IP address automatically option is not selected, select it. This tells the adapter to obtain an IP address from a DHCP server. 9. If the Obtain DNS server address automatically option is not selected, select it. 10. Click the Advanced button. You will see the IP SETTINGS dialog box 11. If you wish to add a default gateway, click the Add button and then enter an IP address for the default gateway. 12. Click the OK button. 13. Click the Close button to close the network properties. 14. If necessary, re-open the network properties and change the adapter configuration back to where it was. fyi-you can get IP settings assigned automatically if your network supports this capability. Otherwise, you need to ask your network administrator for the appropriate IP settings.

TRUE

True or False In CRT monitors, a problem that is prevalent is "distorted geometry." There are three forms, which include: 1. Pincushion Distortion: Lines bend inward. 2. Barrel Distortion: Lines bend outward. 3. Trapezoid Distortion: Vertical lines are straight but not parallel with each other. Adjusting the trapezoid settings on the monitor itself often fixes this

TRUE

True or False Types of IP address traffic: Unicast: One-to-one traffic between two devices. Broadcast: One-to-all traffic on a network. For example, a server may send a patch to every machine on its network. Multicast: One-to-many (but not all) traffic on a network. For example, a server may send a patch to every Windows 8 machine on its network but not every Windows 7 machine

TRUE

True or False: IPv4 address classes are Class A: 1 - 126 Class B: 128 - 191 Class C: 192 - 223 Class D: 224 - 239 (multicast purposes) Class E: 240 - 255 (scientific/experimental purposes)

TRUE

True or False: Channels: On a 2.4 GHz network in the U.S., channels 1, 6, and 11 should be used as these channels do not overlap. Most wireless routers are set to automatically choose a channel. Devices must use the same channels as the channel used on the wireless access point.

TRUE

True or False: Public vs Private addresses: Public Addresses -The majority of the addresses are public addresses. -These addresses are designed to be used in the hosts that are publicly accessible from the Internet. Private addresses -There are blocks of addresses that require no Internet access. *10.0.0.0 to 10.255.255.255 *172.16.0.0 to 172.31.255.255 *192.168.0.0 to 192.168.255.255 -Hosts in different networks may use the same private addresses. -Hosts within the same subnetwork must use the same range of private addresses

TRUE

True or False: 2.4 GHz Frequency Range: Offers coverage for farther distances, but may perform at slower speeds. More difficult time penetrating solid objects. Better if you are looking for a longer wireless range. Contains 14 overlapping channels each at 22MHz wide. In the United States, only 11 channels are configurable. --Channels 1, 6, and 11 are non-overlapping and offers the ability to have three access points in the same area without interference.

TRUE

True or False: Types of Wireless Connections: Wireless NICs USB dongle receiver PCMCIA card Built-in to the laptop

TRUE

True or False: Broadband technologies include: cable modem DSL Fiber-optic Satellite Cable modem communication: -Uses existing cable lines -Specific channels dedicated to Internet communication -Always connected (always up) -More subscribers the slower the speed

TRUE

True or False: Common hard drive problems include: 1. failure to boot 2. drive not recognized 3. operating system (OS) not found 4. BSOD or pinwheel 5. loud clicking noise 6. read/write failure 7. slow performance 8. self-monitoring, analysis, and reporting technology (S.M.A.R.T.) errors 9. RAID not found 10. RAID stops working

TRUE

True or False: Hubs, switches and routers are very important devices in a network infrastructure but they are not the only devices which help make up a network infrastructure. Other network devices include: access point bridge modem firewall patch panel repeaters

TRUE

True or False: Internet Connection Types: cable Digital Subscriber Line (DSL) Dial-up Fiber satellite Integrated Services Digital Network (ISDN) cellular tethering Hot spot Line-of-sight

TRUE

True or False: There are 4 areas in a structured cabling design, which include work area, distribution cabling, telecommunications room, and backbone cabling. 1. Work area The locations for the end devices and individual users. Patch cables are used to connect individual devices to wall jacks. Cables normally no longer than 5 meters (16 feet). 2. Distribution cabling (horizontal cabling) Horizontal cabling refers to the cables connecting the telecommunication rooms with the work areas. The max length for a cable from a termination point in the telecommunications room (IDF) to the termination at the work area outlet must not exceed 90 meters (295 feet). This max cabling distance is the permanent link because it is installed in the building structure. 3. Telecommunications room (wiring closet, data center) This room contains racks of - hubs, switches, routers, and data service units (DSUs) - that tie the network together. These devices provide the transitions between the backbone cabling and the distribution cabling. The patch cord, with a length of up to 5 meters, is used to connect equipment and patch panels in the telecommunications room. Server racks are 19" wide -Separation between each device on rack is measured in U's = 1.75 inches 4. Backbone cabling (vertical cabling) Backbone cabling interconnects multiple telecommunications rooms throughout the facility. These cables are sometimes routed outside the building to the WAN connection or ISP.

TRUE

True or False: To disassemble and resemble a laptop, follow 4 steps: 1. Document and label screw locations: -Screws are different lengths, so make sure to mark each screw and location. Some laptops will have coded labels near the screws. Use those to your advantage. If needed, take pictures as you remove screws from the laptop cover. 2. Organize parts: -One of the best ways to organize screws is to have an egg carton or similar tray, with labels, and to put screws with the matching labels. Other parts you remove should also be labeled. 3. Refer to manufacturer resources: -Before attempting to work on the inside of a laptop, get as much documentation as possible from both the laptop manufacturer and the manufacturer of the laptop's motherboard. Print these out or have these up on another computer screen or tablet as you are working on the laptop. 4. Use appropriate hand tools: -Most of the work done in disassembling a laptop will involve the use of one or more screwdrivers. Make sure to have the correct sizes for screwdriver heads. The screwdriver heads need to non-magnetic as to avoid damage to any laptop components, especially hard drives. Most laptops screws are tiny. Having the screws threaded due to the lack of the correct screwdriver will make it nearly impossible to remove a screw from a laptop cover.

TRUE

Wireless Security Best Practices: 1. Change default usernames and passwords -Administrative interface is often overlooked 2. Change the SSID (Service Set Identifier) -Name for the wireless network --Get rid of the default entry point --Clearly name it or completely disable SSID ---For the EXAM, disabling the SSID is considered a part of wireless security 3. Set Encryption -Best for wireless is WPA2 (Wireless Protected Access 2) then WPA (Wireless Protected Access) --WEP (Wired Equivalent Privacy) is least secure 4. Disable unused ports 5. Physical Security 6. Enable MAC (Media Access Control) filtering -Usually more difficult to manage then it is worth 7. Antenna and access point placement -Used to control the wireless network -Can help prevent accidental network address --Shouldn't rely on antennas to handle all the security 8. Radio power levels -The actual output power of the radio itself -Reducing the power level decreases the size of the wireless network coverage area 9. Assign static IP addresses -Devices have to have a valid IP to connect to the network

TRUE

Port 23 is a TCP transfer known as ___________, which establishes a connection between a server and a remote computer. This protocol is not used much as data is not encrypted, meaning a username and password is sent as clear text.

Telnet

HOME NETWORK IPv4 ADDRESS EXAMPLE

The most common default addresses assigned by home routers are shown below. 192.168.1.0 This number, called the network number, identifies the network as a whole, and is not assigned to a device. 192.168.1.1 The common default address assigned to the gateway device. In most home networks, the gateway is the router itself. 192.168.1.2 Another common gateway address. Or, it may be assigned to a device on the network. 192.168.1.3-254 Assigned to devices on the network. 192.168.1.255 The broadcast address of the network. Data sent to this address is automatically broadcast to addresses 1-254.

Toners: ________ ______________ connects to the cable using clips or hooks and sends an electrical signal along the wire at a certain frequency. _______ __________ emits a sound when it is placed near a cable connected to a tone generator. Fox and Hound is the most common brand name of these two devices.

Toner Generator - Toner Probe

Most data transmissions occur over _______ ________ _______ or User Datagram Protocol (UDP).

Transmission Control Protocol (TCP)

The most commonly used protocol for network communication is _____________ __________ _____________, which is also known as connection-oriented protocol The computer sending the data connects directly to the computer it is sending the data to, and stays connected for the duration of the transfer in order to guarantee transfer of data, then the connection is disconnected. This method may be referred to as a "three-way" handshake.

Transmission Control Protocol (TCP)

Port 69 is a UDP protocol known as ______ _____ ________ protocol. It is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network. _____ has been used for this application because it is very simple to implement.

Trivial File Transfer Protocol TFTP

________ __________ ______________ is known as the "connection-less" oriented protocol, as it provides low overhead data delivery. This protocol uses the "best effort" method for sending data and does not connect directly to the receiving computer. An example of this network connection is streaming video.

User Datagram Protocol (UDP)

_________ uses IP technology to transmit telephone calls. Session Initiation Protocol (SIP) is a signaling protocol used for controlling communications sessions for _______..

VoIP (Voice over IP) Real-time Transport Protocol (RTP) opens two ports for communication (port #s between 1,024 and 65,535) -- One for the media stream (phone call) --One for control (QOS control)

_________ are a collection of LANs across multiple locations.

WANs

What device enables you to extend the capabilities of a wireless network?

WAP

Whenever possible, _________ should be used for encryption in a wireless network. ______ should not be used as it has been cracked.

WPA2 WEP

The ability of the NIC to turn on or "wake up" a powered-down or sleeping PC is known as ______-___-_____. Useful when you need to power up one or multiple computers that aren't physically near you.

Wake-on-LAN.

switch

Whereas a hub does not know where data should go on a network, a __________ is far more intelligent in that role. A _________ identifies and remembers devices connected to it and then can send data from a sender to a recipient on the network. Thus, data is not broadcast unnecessarily to every device on the network. __________ connect computers, printers and servers within a building or campus. A _________ serves as a controller, enabling networked devices to talk to each other efficiently.

Questions to ask yourself when troubleshooting wireless?

Who is affected by the problem? What is the nature of their network problem? When did the problem start?

__-___ __________ and __________ _____________help find and identify wireless networks.

Wi-Fi analyzers wireless locators

_______ ______ _________ is a widespread group of computers connected by using long distance (geographically) technologies. It connects multiple LANS by routers into one large network. An example would be the internet.

Wide Area Network (WAN)

Encryption helps to ensure that data is not being hacked into as it travels through the wireless network. What are the three main types of encryption protocols in wireless networks?

Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access 2 (WPA2)

________ _____ connects a computer to a network using radio frequencies. Network Interface Card (NIC) breaks files into smaller data units to send across the network and reassembles the units back into whole files. Everything starts with this. Anything that wants to access a network or the internet needs one.

Wireless NIC

ad hoc mode

____ ____ _______ is a peer-to-peer wireless configuration where each wireless workstation talks directly to other workstations. the maximum distance between devices depends on the maximum range for each device

MAC address

____ _____________ is a unique identifier that is unique to every NIC 48-bits in length Hexadecimal (combination of letters and numbers) --One hex character is used to represent four binary characters.

MAN (Metropolitan Area Network)

_____ is a connection of multiple LANs in a metropolitan area, such as a city. Example: A university with multiple locations within a city. Another example is a city-wide wireless network. Many people argue a MAN is a form a WAN. Technically, that is correct. For definition purposes, a MAN is kept within the confines of a city or similar municipality while a WAN covers a much larger territory.

LAN (local area network)

_____ is a network in which devices are connected together through wired and/or wireless connections in a single area (like a building). Example: A SOHO network, which usually has 10 or fewer devices. Another example could be a 1000-device network in a single building.

PAN (Personal Area Network)

_____ is a short-distance connection between two personal devices. Types of PAN 1. Bluetooth designed to create small wireless networks. Is NOT designed to be a full function networking solution 2. Infrared also known as "Data Association (IrDA)" uses infrared light which falls below human eye sensitivity must be in light of sight devices. Found in remote controls, wireless mice, and keyboards 3. Near Field Communication (NFC) allows for communication of devices via radio frequency. The device are touching or nearly touching together. Used in peer-to-peer sharing, mobile smartphone payments, and other forms of close communication sharing information 4. Personal Hotspot typically a small device that has access to cellular technologies. Provides access to networks via Wi-Fi. These devices can usually allow up to 5 - 10 devices to connect at one time (tethering) Example: A Bluetooth connection between a tablet and a keyboard or a smartphone and an earpiece.

WEP (Wired Equivalent Privacy)

_____ is an older encryption standard that has been cracked. It may be available, but it should not be used. It uses a 40- or 64-bit encryption to scramble data packets Contains a flaw that makes it extremely vulnerable to attacks --WEP traffic is encrypted with the same key, so one user's traffic isn't protected from other members on the network.

WPA2 (Wi-Fi Protected Access 2)

_____ is the newest and strongest encryption protocol. This should be used whenever possible. It falls under the IEEE 802.11 standard It uses a 256-bit encryption to scramble data packets ______ uses Advanced Encryption Standard (AES), which is a very strong encryption standard. -uses a 128, 192, and 256-bit encryption to scramble data packets.

ISDN (Integrated Services Digital Network)

_____ the first upgrade over a dial-up connection. Uses two 64 Kbps channels for a Basic Rate Interface (BRI) or 23 64 Kbps channels for a Primary Rate Interface (PRI).

PTR (Pointer Record)

_____ ties to an "A" record and is a reverse DNS lookup

MAC address filtering

______ ___________ ______________ is a method of limiting wireless network access based on the physical, hard-wired address of the wireless NIC of a computing device.

Port Forwarding (port mapping)

______ _____________ allows an outside device to connect to a specific device in a network. For example, port 3389 (remote desktop) can be set to forward to a specific machine on the network.

QoS (Basic Quality of Service)

______ allows for prioritization of network traffic. For example, more bandwidth can be allocated to business apps while less bandwidth can be allocated to games.

Wireless Access Point (WAP)

______ is a central connecting device used in wireless networks. They broadcast out a signal that allows for wireless devices to gain connectivity to the LAN and its resources Uses an Omni-directional antenna known as a dipole antenna.

APIPA (Automatic Private IP Addressing)

______ is a feature of Windows that automatically assigns an IP address to the system when the client cannot obtain an IP address automatically from DHCP. Assigns a Class B IP address from 169.254.0.0 - 169.254.255.255

MIMO (Multiple Input Multiple Output)

______ is a feature of the IEEE 802.11n standard for wireless networking whereby two or more antennas are used at both ends of transmissions to improve performance.

WAN (Wide Area Network)

______ is a network consisting of multiple LANs in separate locations Example: A company with LANs in three major cities, all connected through WAN links, usually leased from a telecommunications provider.

SSID (Service Set Identifier)

______ is a network name that wireless routers use to identify themselves. When a WAP sends out its signal, unless programmed otherwise, it will send out the SSID so devices can join the network Turn off broadcast to provide additional security

Dynamic Host Configuration Protocol (DHCP)

______ is a protocol that allows properly configured client computers to obtain IP addresses automatically from a DHCP server. In order to have DHCP set an IP address on a client machine, the NETWORK ADAPTER needs to be configured to find a DHCP server. Furthermore, in order for computer names and Internet addresses to resolve correctly to the IP addresses of those computers and websites, the DNS settings for the network adapter need to be correct. Normally, a DNS server is located automatically but depending upon the desired network configuration for a network environment, a DNS server address may be set manually as a network administrator may want a machine to point to a specific DNS server with specific DNS entries. In order to reach computers on other networks, including the Internet, a network adapter needs to point to a default gateway, which is usually the IP address of a router or, in the case of a small business or home office, a wireless access point. Again, this IP address can be set automatically or manually.

Carrier Sense Multiple Access (CSMA)

______ is a protocol used by EtherNet to listen for existing traffic and wait until the line is clear before sending data in order to avoid Collisions. Wireless has difficulty detecting collisions, so it uses Request to Send/Clear to send (RTS/CTS) protocol

WLAN (Wireless Local Area Network)

______ is a wireless, local area network centered around a wireless access point

SNMP (Simple Network Management Protocol)

______ manages and communicates with network devices, such as routers and switches. SNMPv3 is the newest and most secure.

CIFS (Common Internet File System)

______ uses UDP ports 137 and 138, and TCP ports 139 and 445. It is a cross-platform file-sharing protocol that is a successor to the server message block (SMB) protocol. This is the primary protocol used by Windows systems for file sharing. In fact, _____ is required for Windows file service.

Dial-up

______-___ is older type of connection using a modem with a phone line (RJ-11) cable. Maximum speed is 56 Kbps. aka POTS (plain old telephone service) or PSTN (public switched telephone network)

fiber-optic cable (fiber cables)

_______ - _______ cables use light guided through thin glass/plastic tubes, instead of electrical signals, to transmit data. It is very fast but also expensive. It is designed for long distance, very high-performance data networking, and telecommunications.

toner vacuum

_______ __________ is small, specialized, electrostatic discharge (ESD) safe vacuum. NEVER use a wet cloth or anything close to it to attempt to clean toner out of a printer, as a wet cloth will just smudge the toner.

Port Triggering

_______ ________________ opens a specific incoming port (or a range of ports) in response to traffic on a specific outgoing port (or a range of ports). more secure than port forwarding For example, outgoing traffic on port 9999 for traffic going to a specific online app could trigger opening port 9998 for anticipation of receiving incoming traffic from that app.

CNAME (Alias) (the canonical name)

_______ allows for another name (or alias) to resolve to the same IP address You should use a ______ record whenever you want to associate a new subdomain to an already existing "A" record For example, you can have the _______ record cisco.com point to the "A" resource record www.cisco.com.

PCMCIA (Personal Computer Memory Card Industry Association)

_______ is a removable expansion card for a laptop computer

WPS (Wi-Fi Protected Setup)

_______ is a standard included on many WAPs and clients to make secure connections easier to configure. Works in one of two ways: 1. Push button 2. Access password or code Contains a security flaw and is usually not recommended.

dynamic IP address

_________ ___ __________ is an IP address that is assigned to a device upon request and may change when the DHCP lease expires or is terminated. BOOTP and DHCP are two ways of assigning dynamic IP addresses. The IP address is assigned through a Dynamic Host Configuration Protocol (DHCP) service on either a DHCP server (more common in larger networks) or an access point (as in the case of a SOHO network). If a device such as a printer uses DHCP and then has an IP address which changes, network users will lose their connection to the printer. This is the main reason devices such as printers should get a static IP address.

static IP address

_________ ____ _______ is a permanent IP address that is manually assigned to a device; any device which will be accessed by multiple devices in a network should have a _________ ____ ________. These IP addresses will NOT change For example, all servers, routers, access points, and printers should have a static IP address assigned to them

cable internet connection

_________ _________ ________________ is Internet service through a cable TV company. The signal is split between TV and Internet. The speeds tend to be high but vary as the bandwidth is shared with other cable Internet customers in the area.

Bridges

_________ are the first slight improvement over hubs. __________ isolate groups of devices on a network and then bridges communicate with each other. Wireless access points can serve to bridge two ends of a LAN where wiring the two ends would be difficult.

wireless router

__________ _________ is a wireless access point with routing capabilities, wired ports, switch capabilities, DHCP capabilities, firewall capabilities, and Network Address Translation (NAT) capabilities. NAT allows devices connected to the wireless router to share one public IP address.

cellular internet

__________ _________ uses a cellular subscription to access the internet 4G LTE is the most common cellular network. Speeds are often comparable to cable Internet speeds.

Access Point (wireless router)

__________ ___________ provides wireless network access to devices. Most wireless access points have wired ports for Ethernet cables.

modem(s)

__________ is used to reach an external network. _________ used to be mostly dial-up through phone lines but now are mostly dedicated DSL or cable connections.

Line-of-sight

__________-____-________ internet service with a modem which uses a wireless connection from a wireless tower. The signal varies based on interference from outside sources.

loopback 127.0.0.1

___________ address is an IP address that sends outgoing signals back to the same computer for testing of TCP/IP configuration on the computer. Pinging this address will always return a reply unless a firewall prevents it. It allows a network administrator to treat the local machine as if it were a remote machine. The IP _________ address is ____.__.__.__

Hotspot

___________ is an app on a smartphone or a standalone device that, when activated, allows others to use the smartphone's cellular connection to get Internet access.

compressed air

____________ _____ usually comes in the form of an air can with nozzle and is used to clear the printer of dust and similar debris.

Firmware

____________ are instructions written directly into device hardware. Occasionally, a wireless router will need a firmware upgrade to enhance its capabilities and/or fix hardware flaws and security deficiencies. Always back up the current configuration before doing a firmware upgrade.

Unmanaged Switch

_____________ __________ is a switch that provides plug-and-play simplicity with minimal configuration options and has no IP address assigned to it. Unmanaged switches are inexpensive, but their capabilities are limited. unmanaged switches have less network capacity than managed switches. Usually found in home networks

tethering

________________ is the use of a USB cable with a cellular connection to obtain Internet access.

managed network switch

a __________ __________ __________ is a switch that is configurable and offers greater flexibility and capacity than an unmanaged switch. You can monitor and adjust a managed switch locally or remotely to give you greater network control

On a device, if you see a fast-blinking green light it typically indicates _________, such as a data transfer. For devices which can transmit data at different speeds, activity lights can change color depending upon the speed of the activity. As an example, an orange light can indicate a 100 Mbps connection while a green light can indicate a 1000 Mbps connection

activity

Ports 1024 - 49151 are registered ports used for __________.

applications

If the display does not have an image on screen, check to make sure everything is plugged in. Try plugging in a different monitor. If the new monitor works, the original display has a failing ________ or __________. For a system that has both an integrated and installed video card, make sure the video cable is in the correct port.

backlight or inverter

If you are experiencing read/write failure, this is usually the result of one or more ______ __________. Back up the disk contents and then run _________ to either turn off or fix the ______ _________.

bad sectors CHKDSK bad sectors

Before opening any cover on a laptop, make sure to unplug the laptop and remove the ____________ to minimize any chances of electrical shock.

battery

In the case of extremely short battery life, try a different charger to discover or rule/out a bad charger. The ________ may need to be replaced. Additionally, the more _________ apps on a device, the shorter the battery life

battery running apps

802.11ac uses ______________, which concentrates signals in the directions of the identified devices on the network.

beamforming

If the printer produces "creased paper," it is usually caused by _______ ________, which is thicker than normal paper. Use the manual feeder instead of the paper tray.

bonded paper

Bootrec /rebuildbcd rebuilds the ______ ________________ data file through scanning all disks to find bootable operating systems.

boot configuration

Bootrec /fixboot writes a new ______ ________ onto the system partition.

boot sector

On a mobile device, if the display is dim, check the _________ settings.. If it is set to high and the display is still dim, the _____________ or _________ could be failing

brightness backlight or inverter

With a ___________, the packet contains a destination IP address with all ones (1s) in the host portion. This means that all hosts on that local network ("one-to-all" domain) will receive and look at the packet.

broadcast

A ________ __________ tests to make sure a cable is functional while a ______ __________ and _________ finds the opposite end of a cable and tests its signal strength

cable tester tone generator and probe

If the printer has no local connectivity, make sure the _______ are connected properly. Try unplugging and replugging in the cables.

cables

symptom: ghost cursor/pointer drift If a laptop has a pointing stick, it might be stuck and the area may need to be _____________. If not, make sure the _____________ is not being touched accidentally. Lower the sensitivity of the ___________, if necessary.

cleaned touchpad touchpad

___________ _________ is a single copper wire surrounded by layers of plastic insulation and sheathing; used mainly in cable television and cable Internet service. This used to be the primary cable used in networking, but due to advent of faster twisted-pair cables and fiber cables, they are not used as often, other than with internet service and cable tv providers. Another primary role for coaxial cables is to connect a cable modem with a unit that leads to a cable Internet service provider. To split the TV signal from streaming data, a coaxial splitter is used. This helps the signal quality of both the TV and Internet data streams as the split helps to prevent signal interference. The two main types of these cables are _____ and _____.

coaxial cable RG-6 RG-59

One way to troubleshoot networks is by using ________ _______. Commands are run in a command prompt. These commands can give network information, test network connectivity, or, in some cases, both To get help on a command in Windows, type the name of the command, a space, a slash, and a question mark. This will display the ways in which the command in question is used. Specifically, the help feature will display attributes and switches, which both control how a command is run. Attributes have a dash in front of them while switches have a slash in front of them. Note that for many command-line tools, the attributes and switches are case-sensitive, as is the case, for example, with the NBTSTAT tool.

command lines

On the device, if you see a green link light it typically means a _____________ to another device has taken place

connection

________ __________checks for breaks or correct wire mapping. It is used to make sure your cables are good It is important to read the manual as they are all different.

continuity tester (wiremap tester)

If a laptop is constantly experiencing overheating, consider getting a laptop __________ _____. Avoid using the laptop on clothing or a carpet. Use a compressed air can to clean existing fans.

cooling fan

_________ and ______ __________ help build and repair network cables.

crimpers and wire strippers

If one end of the cable used the T568A standard and the other end uses a T568B standard, the cable is a _____________ __________. These cables are are used to connect computers to computers, switches to switches, and switches to routers.

crossover cable

If a laser printer displays "ghost images," this can happen after printing a very _______ page. Print a blank page in between the _______ page and the next page. If that does not solve the problem, the ______ may not be getting enough of a charge and may need to be replaced.

dark dark drum

Many protocols deal with ______ _________ while some protocols deal with __________ _______________.

data transfer network management

The _________ ___________ serves as an access point or router that a network computer uses to communicate with computers on another network or the Internet. It can be either statically configured on the host, or received dynamically by DHCP. Without it, the network is isolated from the outside.

default gateway

Default route is used when a specific route is not available. The _______ ________ is 0.0.0.0. This also cover all addresses in the 0.0.0.0 - 0.255.255.255.

default route

The _______ _________ is used when a specific route is not available. It is represented by ___.___.____.____

default route the default route: 0.0.0.0 This also covers all addresses in the 0.0.0.0 - 0.255.255.255

One tool that can be used to speed up performance is a _______________ _______. As data is saved onto a magnetic hard disk drive, the data is saved in fragments. The more fragmented the hard drive becomes, the slower it will perform. The _____________ ______ organizes the data on the hard drive so that the drive is not as fragmented. Note that this problem does not occur on solid-state drives.

defragmentation tool.

If you are unable to decrypt an email, a ______ __________ and/or ________ _____ is missing. If these are stored on a smart card, insert the smart card into the device. Otherwise, obtain the necessary digital certificate from the email server's certificate authority (CA).

digital certificate private key

On a laptop, if the keys are sticking, it is usually the result of a _______ ___________. Use compressed air and/or isopropyl alcohol to clean the keyboard.

dirty keyboard

In relation to the BSOD/pinwheel, check the error message to see what is causing the error, then boot into safe mode and replace the driver for the device causing the error. If this does not work, ______ __________ may be needed.

disk recovery

When a display fails to function or shows signs of degrading performance, the key is to determine whether the cause is the _______ or _______ _______. Then, determine if the display can be repaired or should it be replaced.

display or video card

When a motherboard's capacitors are bulging or worn, it is known as ___________ _________________, and they need to be replaced.

distended capacitors.

A single group of one or more consecutive blocks of four 0s in an IPv6 address can be written as a _______ __________.

double colon (::)

If there is garbled characters on the paper, make sure the correct ________ is installed for the printer. Another cause is a cable that is too _______.

driver long

If you are unable to install printer, make sure the correct printer _________ and that the user installing the printer has sufficient _____________ to do the installation. FYI - printer drivers are based on the operating system and version and 32-bit vs 64-bit.

drivers permissions

On a laser printer, if it produces streaks on the paper, the most likely cause is scratches in the _______. Replace the _______. On an inkjet printer, the _____________ need to be re-aligned and/or cleaned.

drum drum printheads

_________________ __________________ is an electromagnetic emission that causes a disturbance in another piece of electrical equipment.

electromagnetic interference (EMI) also known as radio frequency interference (RFI)

If you experience a, "RAID not found" error, this usually means that the RAID may not be set up properly. The RAID functionality may not be _________ in the BIOS. RAID may not be supported on the system or RAID drivers may be needed.

enabled

Symptom: No connectivity If a device cannot connect to any network, make sure everything is plugged in and that network adapters are _________. Try to ping ___.__.__.__ to make sure the NIC is working.

enabled 127.0.0.1

On a laptop, if you are experiencing no Bluetooth connectivity, make sure Bluetooth is _________ on the devices trying to connect. Make sure that the devices are not more than ______ feet apart, then try re-pairing the devices.

enabled 33 feet

The Blue Screen of Death (BSoD) is a screen that shows and error message and then reboots the computer. When it reboots, use the ________ _________ to view the message and use that information to troubleshoot the problem. The Mac version of the BSOD is the "Spinning Pinwheel of Death (SPoD)"

event viewer

Unshielded Twisted Pair (UTP) cables are the most commonly used network connection as it is less _____________.

expensive

__________ is the primary method for keeping a network secure from intruders. A hardware-based device or software-based app that controls network traffic though filtering ports, protocols, and programs.

firewall

If there are some pixels which always show one color (stuck pixels), you should obtain a tool that can _________ the screen. This will usually get the pixels unstuck.

flash

The most important compatibility factor with wireless networks is the _________ on which the wireless networks operate. For example, if a wireless access point is an 802.11ac access point operating on the 5 GHz frequency, any device connecting to it must also operate on the 5 GHz frequency.

frequency

The most important consideration for compatibility in wireless standards is the __________ on which the wireless networks operate

frequency

Wireless standards determine the __________, __________, and ___________ in which wireless networks operate. Wireless networks are based on the_________ standards as developed by the Institute of Electrical and Electronics Engineers (IEEE).

frequency, speed, distance. 802.11

If the system is experiencing "slow performance," the drive could be close to _____ or it could be _____________. If the drive is a magnetic hard disk drive, run the __________________ ________.

full fragmented defragmentation tool

On a laptop, if you are experiencing no wireless connectivity, make sure the wireless adapter has not been disabled due to the user accidentally hitting the ___________ ______. Try reconnecting to a wireless connection after enabling the function key. If the device cannot connect to any wireless network, replace the ________ or use a _____-___-_________ dongle to get a connection.

function key adapter USB-to-wireless dongle

Many fiber cables use a ________ _______, so care must be taken to make sure the cables are not bent to the point where the glass breaks.

glass core

CHKDSK is the most common command used to check a ______ ________ for errors. It is often run automatically if a PC is not shut down properly or if Windows detects a possible problem with a disk sector

hard drive

DISKPART (diskpart.exe) is a ______ _________ troubleshooting command prompt and allows one to format, convert, expand, or shrink a disk volume. DISKPART is used primarily during a Windows installation as the Disk Management tool in Windows can perform many of the tasks DISKPART performs.

hard drive

S.M.A.R.T. is a monitoring tool which can notify a user of a _____ _________ problem. Research the message to see which actions should be taken. S.M.A.R.T - self-monitoring, analysis, and reporting technology

hard drive

bootrec command (bootrec.exe.) is a _____ ________ troubleshooting command that is run during a system recovery in Windows. When a computer boots, a user needs to hold down F8 (Shift + F8 in Windows 8) and then select repair your computer in Windows 7 or troubleshoot in Windows 8 and then choose to display a command prompt. From there, you would enter 1 of 4 bootrec commands: 1. Bootrec /fixmbr 2. Bootrec /fixboot 3. Bootrec /rebuildbcd 4. Bootrec /scanos Note that bootrec does not run in a regular Windows environment. It only runs when Windows is in recovery mode.

hard drive

If RAID stops working, it is usually caused by a failing ______ ________, especially in the case of RAID 0. For any other RAID, swap out the bad ______ _______ for a good one.

hard drive hard drive

If the computer is experiencing "continuous reboots," check to see if any ________ has recently been added or _________ recently installed. Try booting into ______ _______ and then check the Device Manager for any hardware abnormalities.

hardware software safe mode

If your system is experiencing unexpected shutdowns, it is usually due to ______. Make sure the system is _______ properly.

heat cooling

Similar to unexpected shutdowns, "system lockups," are typically caused by ______. Check to make sure the video card is not _________________.

heat overheating

IPv6 is written in _________ form. It is broken into 8 parts (letters and numbers) of 16 bits each using a colon to separate each one.

hexadecimal

For networks using wired connections, there are three major types of devices used, which are ________, __________, or ____________.

hub switch router

If the monitor's image flickers in and out, you should __________ the resolution. This will typically only be seen with a CRT monitor.

increase

With a DSL Internet connection, if a splitter is used to split voice frequencies from data frequencies to avoid signal interference, the quality of both the voice transmission and data transmission will __________.

increase

If colors print in wrong print color, the _____ ___________ are most likely in the wrong spot. Note that even after putting the ____________ in the correct slot, it will take time for print jobs to look normal.

ink cartridges cartridges

_________ _________ ____________ are usually set to be DHCP servers by default. These routers are developed by Cisco and supports video-conferencing, virtualization services, and transports other kinds of rich media over a wide area network (WAN).

integrated service routers (ISR)

symptom: slow transfer sppeds If network activity is slower than normal, the main cause is ____________. The _________ __________ may also not be set to the highest possible speed.

interference wireless router

If the mobile device is experiencing intermittent wireless signal, there could be _______________ with he wireless signal. The device could be too far from the wireless access point. A very unlikely cause is ___________ ___________ ________________ inside the device

interference loose wireless connectors

Ports 49152 - 65535 are dynamic ports used for ________ __________ and ___________. As an example, many of these ports are used for Internet connections.

internal services and processes.

Steve's Windows system can't connect to the Internet, and he comes to you for help. You figure out that it's a DHCP problem. What program should you run to troubleshoot his DHCP problem from the client side?

ipconfig

Fiber optic cables carry communication signals using pulses of _______ generated by small lasers or light-emitting diodes (LEDs).

light

A________-__________ address is an address that a computer running IPv6 gives itself after first booting. The first 64 bits are always FE80::/64. Similiar to APIPA. These addresses are not routed.

link-local

The use of private addresses can provide a measure of security since they are only visible on the _____ ________, and outsiders cannot gain direct access to the private IP addresses.

local network

There are also private addresses that can be used for the diagnostic testing of devices. This type of private address is known as a _______ ___________. The reserved class A address for this is _____.__.___.___

loopback address 127.0.0.0 (You can use all loopback addresses from 127.0.0.1 up to 127.255.255.254 however you like)

Which small device enables you to test a NIC circuitry?

loopback plug

____________ _______ is used to test ports (such as serial, parallel USB and network ports) to identify network and NIC issues. It facilitates the testing of simple networking issues and is available at very low costs.

loopback plug (loopback adapter or loopback cable.)

If the printer produces "faded prints," this is most likely due to ______ _______. However, on an impact printer this could signify a _______ _______. On a laser printer, the _______ could be malfunctioning.

low toner stuck ribbon fuser

If a data transmission alone is split, the two entities sharing the split also share the frequency, thus __________ the overall quality of data transmissions.

lowering

Bootrec /fixmbr attempts to fix the ________ ________ __________. This is necessary when a virus corrupts the ______ ______ _________.

master boot record

In IPv6 addressing, a __________ broadcast sends packets of data from one to many addresses. This is easy to spot in an IPv6 address because they start with FF.

multicast

The _________ MAC address is a special value that begins with 01-00-5E in hexadecimal.

multicast MAC address

Class D IPv4 are reserved for ______ _________, and ranges between ____ - _____.

multicast purposes 224 -239 224.0.0.0 to 239.255.255.255

_______________ is used to test electrical current. A multimeter can be used to test two ends of a cable for continuity. It can also be used to test voltage for a voltage wire on a power supply connector.

multimeter

Hardware troubleshooting tools:

multimeter power supply tester loopback plug POST card

If there is no sound from the speakers, check to make sure the speakers are plugged in properly. Make sure neither speakers nor the volume on the device is _______. Try a different set of speakers to ensure the speakers and not the ________ _______ are the problem.

muted sound card

If the display image looks disproportional and somewhat fuzzy, make sure the monitor is set to its _________ ______________. If the monitor is set to its _______ ____________, try plugins in another monitor. If that does not work, check for overheating on the video card or an incorrect video card driver.

native resolution

________ is a network command line tool that is designed to help troubleshoot NetBIOS name resolution problems. Resolves NetBIOS names to IP addresses. It does this through several options for NetBIOS name resolution.

nbstat

The _____ user command is used to add, delete, and otherwise manage the users on a computer.

net net use - Connects/disconnects a computer from shared resources, or displays information about computer connections. The command also controls persistent net connections. Used without parameters, net use retrieves a list of network connections. net view - Displays a list of domains, computers, or resources that are being shared by the specified computer.. net start - Starts a service. net stop - Stops a running service. net time - Synchronizes the computer's clock with that of another computer or domain.

Which of the following is the correct net syntax for discovering which network shares on a particular server are mapped on your computer?

net view \\fileserver

_________ is a handy troubleshooting, network command line tool that can display incoming and outgoing network connections; display routing tables; display number of network interfaces; and display network protocol statistics This is a cross-platform utility meaning you can use it on Linux, OS X or Windows.

netstat

Computers rarely connect directly to each other in order to exchange data. Rather, they go through a ___________ device. The network device used depends upon the size of the network and the desire to transmit data to and from the network (like the Internet, for example).

network

An IP address has two components, which include ______ address and _______ address.

network host

As an example, if a host has IP address 192.168.18.57 the first three octets, (192.168.18), identify the _____ portion of the address, and the last octet, (57) identifies the _____.

network host

The first IP address (______ ________) and last IP address (_______ ________) can NEVER be given out as a usable IP address

network address broadcast (host) address

Within each network, the first address (_________) and the last address (____________) CANNOT be assigned to hosts.

network address broadcast address

An IP address has two components, which include ______ address and ________ address

network address host address

Time-Domain Reflector (TDR) measures impedance in ________ ___________. Optical Time-Domain Reflector (OTDR) is used in fiber optic testing

network cabling.

loopback plug is plugged into a _________ ______ and loops signals from output pins to input pins.

network jack Once this is plugged in, a machine can be pinged to make sure the NIC is working.

When networks are built, the networks themselves have a network type. The network type designation for a network will depend on the ________ ________ and _______ ____ __________. When working on an existing network, a technician needs to know if the network is confined to a single building, for example, or, if the network encompasses several offices, located in different cities, states, or even countries.

network's size and area of coverage

___________ is a network command line tool that displays information that you can use to diagnose DNS infrastructure. Gives you the ability to enter a host name (for example, "whatis.com") and find out the corresponding IP address.

nslookup

If the numeric pad is not working on the keyboard, make sure the ________ _______ indicator light is not on.

number lock

T568A and T568B wiring standards are based on a specified color order of the individual wires. The stripes always go in the ______ number pins.

odd

If the printer will not print, check to make sure everything is properly connected and that the printer is not _________. Try printing a test page to make sure the printer itself is not the problem.

offline

Most wireless antennas are ______________, meaning they beam in all directions.

omnidirectional

Bootrec /scanos scans for ___________ ______________ on a computer.

operating systems

symptom: limited connectivity If a device can reach some but not all devices on a network, check for an ________ somewhere in the network.

outage

Swollen battery is caused by battery cells being ______________. Do not try to puncture the battery. If you can remove the battery, do so and then dispose of the battery properly and get a new battery.

overcharged.

If the monitor displays "artifacts," such as lines that do not belong, repeating patterns of small rectangles, wobbly vertical lines, or random dots, they may be due to an ___________ video card, a bad video card driver, or a faulty ______ interface. The video card may need to be replaced. If the video card has two DVI interfaces, switch the interface.

overheating DVI

If the computer system is experiencing "intermittent device failure," this is a sign of ________________ or a _________ _______________. Check the connection on components which have just been installed on the computer.

overheating loose connector

If a laptop freezes, make sure it is not _________. If a smartphone/tablet freezes, plug it into a charger. Power off the device and restart it. Try uninstalling any recently installed apps. A last resort is to _____ the device to its ________ ____________. (of course after backing up data)

overheating reset factory settings

In the computer system, ________________ is caused by a failing fan in the system. Clean the fans of any dust and debris. Check the CPU, video card, and case fans. Installing a new piece of hardware can affect the cooling in the system. Try uninstalling the new hardware piece to see if that alleviates the problem

overheating.

_________ ___________ is a device or unit featuring a number of jacks, usually of the same or similar type, for the use of connecting and routing backbone cabling for monitoring, interconnecting, and testing circuits in a convenient and more flexible manner. The most common _______ ________ uses a special connector called a 110 block. A punchdown tool is required to punch individual strands.

patch panel

When data packets transmit from a source to a destination on a network, two parts of the packet that identify the packet are the destination address and the port number of the destination. The _______ _________ helps to determine the type of data being transmitted.

port number

loopback plug is used to test a ______ to make sure it is working. Specifically, this applies to network interface cards (NIC) and interfaces on network devices such as switches and routers.

ports (such as serial, parallel USB and network ports)

symptom: low RF signal If a wireless signal is weak and slow, the _______ _______ on the wireless access point may have been adjusted in order to shorten the range to the confines of a building. Doing this weakens the signal.

power level

A power supply tester is used to check a _______ __________ when it is not connected to the motherboard.

power supply

If a light does appear on the motherboard, and there is "no power," make sure the ________ _________ is properly connected to the motherboard

power supply

If there is NO light on the motherboard, the _______ ________ is most likely the problem and needs to be replaced.

power supply

If you notice smoke coming from the computer system, this usually comes from the ________ ___________. Unplug the machine and replace immediately.

power supply

In the computer system, if the fans are spinning but no other devices have power, this is usually an indication of a voltage problem or a bad __________ ___________ connection to the motherboard. Check the power supply connectors to make sure they are properly connected

power supply

NEVER try to fix a ______ _______. Electricity conducts well after a ______ ________ is unplugged, causing a risk. Replacing a _______ _________ is much easier than trying to fix one.

power supply

If no "indicator lights" come on, either the _________ _________ is not properly connected to the motherboard or the __________ ___________ has gone bad and needs replacing.

power supply hard drive

If you receive a "failure to boot" error, check to make sure the drive is properly connected to ______ _________ and the ____________. If the connections look good, the ______ ________ might be failing. Try putting the drive in another system to see if it is readable.

power supply motherboard hard drive

If the print queue is backed up, make sure the ________ _________ service is running. Try restarting the service. If that does not work, restart the printer.

printer spooler

One of the most common software tools used to attempt to reconnect a user to a printer is to reset the user's _________ __________. The _________ ____________ processes print jobs. If everyone in an office can print to a printer except for one user, the most likely cause of this is a stuck __________ ____________ on the user's machine and thus the _________ ____________ just needs to be reset.

printer spooler.

_________ _____________ are blocks of addresses that require no internet access. These include: 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 Hosts in different networks may use the same private addresses. However, hosts within the same sub-network must use the same range of private addresses

private addresses

If a mobile device cannot display to an external monitor, check to make sure __________ __________ are correct and that both monitors are showing in the display properties. Disconnect and reconnect the external monitor, if necessary

projection setting

Link lights detect connections to other devices. If the light is on (steady) that means the device is connected _________ to another device. If there is NO light or flickering, then the device has __________ ________. Activity lights detect network traffic. If there is intermittent flickering, this means the network is operating __________. If there is a solid color (not flickering), this means that ________ _______.

properly connection issues properly problems exist

If the touchscreen on a mobile device is unresponsive, if there is a _________ __________, remove it. If this fixes the problem, clean the screen and the cover before putting it back on. If removing the cover does not work, try __________ the device. If this does not work, the touchscreen may need to be _________.

protective cover restarting replaced

Ports 0 - 1023 are well known ports that are used for specific _________ and __________.

protocols and services

All hosts that connect directly to the Internet require a unique _____ __________.

public address

A full format scans for and marks bad sectors on a disk while a ________ ________ does not scan for and mark bad sectors on a disk.

quick format

If the GPS is not functioning, the device may be out of ________ for a GPS signal. Additionally, __________ _________ could be turned off. If the signal is on, but not receiving anything, get and run an app which will flush the GPS data

range location services

If the monitor is displaying colors incorrectly, you should _________ the monitor, using a test image or a calibration tool.

re-calibrate

When files are deleted from a local hard drive, the files move to the _________ _____, so long as the _________ _____ has not been emptied, files are still recoverable.

recycle bin recycle bin

Ports 1024 to 49151 are __________ ports

registered

If a few monitor pixels are always black (dead pixels), you should _______ the monitor. eventually this will turn into a bigger problems, so it should be replaced

replace

On a mobile device, if the battery is not charging, make sure the AC adapter is plugged in properly. If the battery still will not charge, ________ the battery.

replace

If images look very, very large on a display, the ____________ is set too high for the monitor to display. lower the screen resolution. You may need to boot the computer into VGA mode in order to do this.

resolution

If the paper is not feeding properly through the printer, either no paper is being fed or multiple sheets are being fed from the paper tray. Check the ________ as they may need to cleaned or replaced.

rollers

If the printer is experiencing a paper jam, make sure nothing is impeding the paper path when clearing a paper jam. If this happens consistently, either get higher-quality paper or check the ________ for damage. To help prevent paper jams, keep paper in low-humidity area.

rollers

The _____ provides a gateway through which hosts on one network can communicate with hosts on different networks. Each interface on a _____ is connected to a separate network.

router router

While hubs and switches connect devices to each other, __________ route traffic between networks.

routers

__________ is used when other avenues of high-speed Internet are not available. Quality is subject to latency (delay). A clear line of sight to the satellite is needed.

satellite

Class E IPv4 are reserved for _______ or __________ purposes, and ranges between _____ - _______.

scientific/experimental purposes 240 - 255 240.0.0.0 to 254.255.255.254

If an image faintly appears on a screen even after the image is no longer displayed (burn-in), use a ______ ________ to keep changing the image on the screen. You will see this primarily on plasma and CRT screens.

screen saver

If you hear a loud noise in the computer system, check to see if a _______ or other object is loose inside of the case. A loud clicking noise usually indicates a failing ______ _______, so back up your data as soon as possible

screw hard drive

When working on desktop computers, tools may include a ____________ with multiple non-magnetic heads, a pair of _______, and a pair of _________.

screwdriver pliers tweezers

If the user's printer access is denied, make sure the printer is ________ with the users and groups needing the printer.

shared

Since light can travel much longer distances down a fiber cable without losing its strength, it lessens the need for ________ _______________.

signal boosters

symptom: intermittent connectivity If a device experiences reduction or temporary stoppage in a network connection, look for items which can cause _______ ____________, such as microwaves, cordless phones, magnetic devices and water tanks. The device could also be too far from the _______ _______ ________. Intermittent connectivity is a common problem with wireless networks

signal interference wireless access point

In IPv6 addressing, a ______-_______ address is equivalent to private IP addresses in IPv4. It is assigned in the local network starting with FEC0::/10.

site-local

On a network, devices have two ways in which to receive an IP address, which are ________ and ________

static dynamic

Symptom: APIPA or link local address If the device cannot reach a DHCP server as evidenced by a 169.254.x.x IP address, try setting a _____ ________. If that works, the problem is with the DHCP server. Restart the DHCP server service.

static address

Ethernet cables can be wired as ________ or ___________.

straight through or crossover http://www.cables-solutions.com/difference-between-straight-through-and-crossover-cable.html

If both ends of the cable use the same standard (usually T568B), the cable is a __________ ___________ ___________. These are the most commonly used cables in Ethernet networks and are used to connect computers to wall ports, computers to switches, and computers to routers.

straight-through cable

When an IP host is configured, a ______ _______ is assigned along with an IP address. Like the IP address, the _____ ______ is 32 bits long. The _____ ______ signifies which part of the IP address is network and which part is host. It enables a network administrator to further divide the host part of the address into two or more _______ _______. Each _______ _______ allows its connected devices to communicate with each other, and routers are used to communicate between ________ ________.

subnet mask

________ ______ is a 32- bit value that allows the recipient of IP packets to distinguish the network ID portion from the host ID portion of the IP address. Finally...remember that the first IP address (Network Address) and last IP address (Broadcast Address) can NEVER be given out as a usable IP address.

subnet mask

_________ create a network and _________ connect networks.

switches routers

If the printer is printing blank pages, the printer may be out of ________, the _______ may have been installed without removing the _______ seals, or the printer cannot render an image due to a problem with the ________ __________.

toner toner charging process

Once a problem with a printer is diagnosed, there are four main tools used to attempt to fix these problems, which include

toner vacuum compressed air a printer maintenance kit resetting printer spooler

What command would you use to view the path taken by an Ethernet packet?

tracert

__________ is a network command line tool that shows several details about the path that a packet takes from the computer/device you're on to the specified destination.

tracert (traceroute)

If there is no image on the printer display, check to make sure the printer is properly connected, plugged in, and _______ ____.

turned on

__________-______ ________ refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath This is the most common cables used for wired networks which cover the inside of a building.

twisted-pair cable

Cable (Wire) Stripper is used to strip the jacket of a _________-______ ________ and then strips the insulation of each wire.

twisted-pair cable Ideally, 2-inch of the jacket should be stripped and ½-inch to ¾-inch of each wire should be stripped

Fiber cables are far more expensive than _______-______ cables

twisted-pair cables

In IPv6 addressing, if there is a string of zeros, then you can remove them once and replace them with 2 _______. This can only be done once, your IPv6 device will fill up the remaining space with zeros until it has a 128 bit address. Example Original: 2041:0000:140F:0000:0000:0000:875B:131B Short: 2041:0000:140F::875B:131B

two colons - ::

A _____ address is the most common type of an IP network. It is known as "one-to-one." A packet with a _____ destination address is intended for a specific host. Example: class A network of 10.0.0.0, with a default mask of 255.0.0.0, has a broadcast of 10.255.255.255. class B network of 172.16.0.0, with a default mask of 255.255.0.0, has a broadcast of 172.16.255.255. class C network 192.168.1.0 with a default subnet mask of 255.255.255.0 has a broadcast address of 192.168.1.255. The host portion is decimal 255 or binary 11111111 (all 1s).

unicast

The delivery methods for IPv4 addresses are _______ (one to one), _________ (one to all), and _________ (one to many).

unicast - one to one broadcast - one to all multicast - one to many

On a mobile device, if the apps are not loading, the app may need to be ________. Uninstall and reinstall the app. Check to make sure the device has enough ________ for the app.

updated memory

If the computer has a "blank screen on boot up," you should try plugging in a different monitor. If that does not solve the problem, try replacing the _______ _______. If there still is no screen, it may be the ______________.

video card motherboard

If the display is in VGA mode with symptoms of a display in 640 x 480 resolution with NO option for change, it is usually a result of an incorrect ________ ________. Download and reinstall the correct video driver

video driver

multimeter is used to test ___________. When using a ________ to test voltage, the voltage reading should not be more than 5% higher or lower than the prescribed voltage of a wire. For example, if a 5V wire is being tested, the voltage should read between 4.75V and 5.25V

voltage

ALWAYS follow the _________ If opening the computer case is going to break the _________, keep the case closed and use the ________ to your advantage.

warranty

If the printer is displaying error codes, check the error code on the printer's LED panel and/or look up the error code on the printer's _____ _______ or search engine to obtain possible solutions.

web page

The key to finding and fixing network problems is to figure out _______ the problem is happening.

where

When plugged into a laptop, a __________ ____________ uses a directional antenna to look for wireless access points (both legitimate and rogue). A rogue wireless access point is one placed in a network without an administrator's permission.

wireless locator

Wi-Fi analyzer is used to reveal Wi-Fi hotspots and detect _________ ____________ __________. It does this through scanning for 2.4 GHz and 5 GHz RF signals.

wireless network access.

If you receive an "operating system (OS) not found" error, the computer could be booting to the _______ ________. Check the BIOS to make sure the boot order is correct.

wrong disk

In IPv6 addressing, if you have a "hextet" with 4 zeros then you can remove those zeros and leave a single _______. The IPv6 device will add the remaining zeros. example original: 2041:0000:140F::875B:131B Shorter: 2041:0:140F::875B:131B

zero

IPv6 addresses seem long and unwieldy. Fortunately, there are two significant addressing shortcuts which can be used for IPv6 addresses, which are omitting leading _______ and omitting multiple groups of ______.

zeros

In IPv6 addressing, leading _________ can also be removed Example Original: 2001:0001:0002:0003:0004:0005:0006:0007 Short: 2001:1:2:3:4:5:6:7

zeros


Set pelajaran terkait

Mental Health Nsg Exam 2: Suicide

View Set

1 • Basic Principles of Insurance KeyWords

View Set

GW B1+ Unit 2 Grammar Revision ex.5

View Set

biology 103 final exam review-pearson questions (7)

View Set

Chapter 19.2 --- The Enlightenment

View Set