ist-220 midterm review
You have decided to use SNAT (source network address translation) and PAT (port address translation) on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?
1
What four functions do all routers perform?
1. Connecting Dissimilar networks (ex. lan and wan) 2. Interpreting layer 3 and often layer 4 addressing 3. Determining the best path for data to follow from point A to point B 4. Rerouting the traffic if the first choice path is down but another is available.
What is the maximum supported throughput of a CAT6 cable?
10 Gbps
What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?
10Gbase-t
How many bits does an IPv6 address contain?
128
What is the Internet standard MTU?
1500 bytes
Continued- Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets neeed. What is the incremental subnet variable (aka magic number) that you add to each Network ID to get the next NW ID that starts the next subnet range?
16
Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host?
172.16.0.0
What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0?
172.16.32.0/24
Continued- Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets needed . What is the range of host addresses for the last subnet?
172.20.0.1 through 172.20.15.254
Continued- Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets needed List all the subnets on a separate piece of paper and answer the following question -. What is the CIDR notation for the second subnet's network ID?
172.20.16.0/20
FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port does an FTP server listen on?
21
How many bits of a Class A IP address are used for host information?
24
Continued- Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets needed You can now calculate the subnet mask. The default subnet mask for a Class B network is 255.255.0.0, and so the third octet is the one that will change. What is the subnet mask for these subnets, written in decimal?
255.255.240.0
Which formulas can be used to calculate the magic number? Choose two. Note: h is the number of host bits remaining ; n is the number of host bits borrowed
256 - the interesting octet 2h
What is the formula for determining the number of possible hosts on a network?
2h - 2 = Z
Subnetting operates at Layer ________ while VLANs function at Layer _______.
3, 2
When terminating an Ethernet cable, about how far should the cable sheath extend into the plug?
3/8 inch
Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default?
3389
USE THE FOLLOWING INFORMATION TO ANSWER QUESTIONS 1-6: Suppose your organization uses the Class B network ID of 172.20.0.0 for its entire network and wants to create 15 subnets. You first need to decide how many bits to borrow from the host address bits. Recall that you can use the formula 2n = Y. For the new subnets, how many bits must be borrowed from the host address portion? How many bits total will be used for identifying a host's subnet?
4, 20
Continued- Given Class B network ID of 172.20.0.0 for its entire network and 15 subnets needed . If 20 bits are used to identify the network and subnet, that leaves 12 bits to identify each host. Using the formula 2h - 2 = Z, how many host addresses are possible in each subnet? (You may use calculator for this step).
4094
What is the range of addresses that might be assigned by APIPA?
69.254.0.1 through 169.254.255.254
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
8
Which IEEE standard determines how VLANs work on a network?
802.1q
MAC address
A Media Access Control address is a hardware address that uniquely identifies each node on a network.
VLSM (Variable Length Subnet Mask)
A classless subnet mask that can be customized to a different length for each subnet based on the number of nodes on that subnet.
KVM switch
A device that switches a single keyboard/video/mouse set among multiple computer systems.
wiring schematic
A graphical representation of a network's wired infrastructure.
Checksum
A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source.
TDM (time division multiplexing)
A multiplexing method in which the communication channel is divided into discrete time slots that are assigned to each node on a network.
WDM (wavelength division multiplexing)
A multiplexing technique in which each signal on a fiber-optic cable is assigned a different wavelength, which equates to its own subchannel. Each wavelength is modulated with a data signal. In this manner, multiple signals can be simultaneously transmitted in the same direction over a length of fiber.
Registered Jack 11 (RJ-11) Interface
A network interface or connection with four pins and a clip to hold the plug into a wall socket. RJ-11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack.
FTP (File Transfer Protocol)
A protocol used to move files and folders over a network or the Internet.
ICMP (Internet Control Message Protocol)
A protocol used with IP that attempts to report on the condition of a connection between two nodes.
three-way handshake
A three-step process in which Transport layer protocols establish a TCP connection between nodes. The three steps are: Node A issues a SYN packet to node B, node B responds with SYN-ACK, and node A responds with ACK.
punchdown tool
A tool used to punch individual wires from a network cable into their slots to terminate the cable on a 66 or 110 block.
STDM (statistical time division multiplexing)
A type of multiplexing that assigns time slots to nodes (similar to TDM), but then adjusts these slots according to priority and need.
Half Duplex
A type of transmission in which signals may travel in both directions over a medium, but in only one direction at a time.
Port Address Translation (PAT)
A variant of NAT in which multiple inside local IP addresses share a single inside global IP address. PAT can distinguish between different flows based on port numbers.
Which two protocols manage neighbor discovery processes on IPv4 networks?
ARP and ICMP
ARP
Address Resolution Protocol. Resolves IP addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker's system by sending false MAC address updates. VLAN segregation helps prevent the scope of ARP poisoning attacks within a network.
SSH (Secure Shell)
An encrypted and secure file transfer protocol is SFTP whtch is based on the _______________ protocol
segment
At the transport layer , the PDU is known as a ____________ when the TCP protocol is used
Datagram
At the transport layer , the PDU is known as a ____________ when the UDP protocol is used
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?
FE80::/10
MAC Spoofing
Imitating another computer by means of changing the MAC address
sliding window
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?
HTTP (Hypertext Transfer Protocol)
In the client-server model, what is the primary protocol used for communication between a browser and web server?
At which OSI layer does IP operate?
Layer 3 - Network Layer
What is the first step of inventory management?
List all components on the network
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demarc.
There is only one ________ (use abbreviation) per network, but there can be many ________ (s)(use abbreviation) connecting internal portions of the network
MDF (main distribution frame); IDF (Intermediate distribution frame)
On which networking device do you configure VLANs
Managed switch
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Remote Desktop
What is a message called that is delivered by TCP? At which layer does the protocol work?
Segment Transport layer
gateway of last resort
The IP address of the router in your network where data packets with unknown routes should be forwarded
duplex
The ability to transmit and receive simultaneously.
What does backbone cabling consist of?
The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.
VoIP Gateway
The device that converts an analog telephone call (voice and signals) into data packets (and vice versa) for traversal over an IP-based network.
OUI (Organizationally Unique Identifier)
The first three bytes of a MAC address that uniquely identify a network device manufacturer.
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
The fourth one
entrance facility
The location where an incoming network service (whether phone, Internet, or long-distance service) enters a building and connects with the building's backbone cabling.
In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?
at least 3 feet
IGP (Interior Gateway Protocol)
The protocol responsible for exchanging routing information between gateways within an AS. three protocols: ripv2, ospf, eigrp
Neighbor Discovery Protocol
The protocol used in IPv6 for many functions, including address autoconfiguration; duplicate address detection; router, neighbor, and prefix discovery; neighbor address resolution; and parameter discovery.
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
Native VLAN
The specified VLAN designation that will be assigned to all untagged frames entering a trunk port in a switch.
POP3 (Post Office Protocol version 3)
This email protocol allows an email client to download email messages to the local computer.
IMAP4 (Internet Message Access Protocol, version 4)
This email protocol allows an email client to read mail stored on the mail server?
Which of the following is not a good reason to segment a network?
To increase the number of networking devices on a network
Active Directory
What is the name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?(two words)
password manager
a secure place to store a list of documented network passwords
What is the Industry Standard (full rack )unit of measurement that defines the space available in a rack?________________U [a] How tall are standard(full) racks? _____________feet[b]
a. 42 b. 6
PVC cable coating is toxic when?
burned
What is the minimum category of UTP cable required in order to support Gigabit speeds?
cat 5e
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
cat 6a
Source Network Address Translation (SNAT)
changes the source address of outgoing packets. It works best for local client systems which initiate connections with outside servers, but don't usually receive incoming connections.
CWDM (coarse wavelength division multiplexing)
channels are spaced more widely apart across entire frequency band effective distance is more limited because the signal is not amplified
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
coaxial cable, f-connector
With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?
dallas.mycompany.com
A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
data link layer
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?
default gateway
TIA/EIA 568A and TIA/EIA 568B
describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?
Which of these commands is available only in Linux?
dig
what methods would a A hacker use to orchestrate a VLAN hopping attack
double tagging switch spoofing
A short circuit is one where needed connections are missing, such as when a wire breaks.
false
An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
false
In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack.
false
Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.
false
Static electricity is an electrical charge in motion.
false
The 1024 - 65535 range of ports is also known as the "well-known" range.
false
The Data Link layer attaches a trailer to the end of a packet, and does not include a header.
false
The Transport layer header addresses a receiving application by a number called a MAC address.
false
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
fiber type mismatch
What three routing metrics used by routers to determine the best of various available routing paths.
hop count theoretical bandwidth path latency (or delay)
When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:80. Which Application layer protocol is in use for this session?
http
You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
ifconfig -a
What command can you utilize to display TCP/IP configuration information for each network adapter installed?
ipconfig /all
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
ipconfig /release
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
layer 7
You are the network manager for a computer training center that allows students to bring their own laptops to class for learning and taking notes. Students need access to the Internet, so you have configured your network's DHCP server to issue IP addresses automatically. Which DHCP option should you modify to make sure you are not wasting addresses used by students who have left for the day?
lease time
You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size?
local connector (lc)
Which fiber connector contains two strands of fiber in each ferrule?
mtrj
What kind of tool can you use to measure voltage on a cable length?
multimeter
Which type of DNS record identifies an email server?
mx record
Which OSI layer is responsible for directing data from one LAN to another?
network layer
While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?
nslookup
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
patch cable
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
peer-to-peer
You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol handles your transmission?
pop3
Which type of address is used at the Transport layer to identify the receiving application?
port
DMZ
provideS less stringent security so a web server is more accessible from the open Internet
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
rack ears
What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling?
rg-6 coaxial
Which computers are the highest authorities in the Domain Name System hierarchy?
root servers
devices likely found in the MDF?
routers switches kvm switch
What database does a router consult before determining the most efficient path for delivering a message?
routing table
Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
ssl and tls
A network consists of three switches connected together by a network cable. Three computers are connected to the each of the three switches. Which network topology is being used?
star-bus
Which protocol's header would a Layer 4 device read and process?
tcp
Which Linux utility provides output similar to Wireshark's?
tcpdump
Cable Bend Radius
the radius of the maximum arc into which you can loop the cable without impairing data.
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
tone locator
Multimode fiber contains a core that is larger than a single mode fiber core.
true
The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.
true
The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.
true
UDP port 123 is utilized by the Network Time Protocol service.
true
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
trunk
jitter
what happens when packets experience varying amounts of delay and arrive out of order
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
white/green
When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?
white/orange, orange, white/green, blue, white/blue, green, white/brown, brown
You've decided to run an Nmap scan on your network. What app could you open to perform this task?
zenmap Command prompt powershell
Management VLAN
Can be used to provide administrative access to a switch.
Which networking model requires that a computer is available with a Network Operating System installed on it?
Client-Server
Full Duplex
Communication that happens in two directions at the same time.
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs?
DHCP relay agent
BGP (Border Gateway Protocol)
Dubbed the "protocol of the Internet," this path-vector routing protocol is the only current EGP and is capable of considering many factors in its routing metrics.
What is the difference between dynamic ARP table entries and static ARP table entries?
Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility.
What do well-chosen subnets accomplish?
Network documentation is easier to manage.
In general, how much can a twisted-pair's cable be bent before data transmission may be impeded?
No more than four times the diameter of the cable.
vertical cross connect
Part of a network's backbone that supplies connectivity between a building's floors. For example, vertical cross-connects might connect an MDF and an IDF or IDFs and telecommunications closets within a building.
What statement regarding the Power Over Ethernet standards is inaccurate?
Power over Ethernet requires CAT6 or better copper cable.
Which two fields in an Ethernet frame help synchronize device communications but are not counted toward the frame's size?
Preamble SFD
SFD (start-of-frame delimiter)
Signals to a receiving device that the preamble is over and that the actual frame contents will now follow
Simplex
Single-frequency radio; transmissions can occur in either direction but not simultaneously in both; when one party transmits, the other can only receive, and the party that is transmitting is unable to receive.
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?
TIA/EIA 568A
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
all devices on your local network
A routing protocol's reliability and priority are rated by what measurement?
ad