IST 220 Midterms Ch4-5, 8
Optical Power (OPM)
A(n) ___Blank 1___ ___Blank 2___ meter measures the amount of light power transmitted on a fiber line. (one word per answer)
Network
At which OSI layer does IP operate?
24
How many bits of a Class A IP address are used for host information?
spoofing
Impersonating a MAC address is known as MAC ___________________.
sliding window
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received? urgent pointer sliding-window URG flag PSH flag
Layer 2 switch
On which networking device do you configure VLANs?
RIPv2, OSPF, EIGRP
Pick three IGPs (interior gateway protocols). RIPv2 OSPF BGP EIGRP
240
Scenario: Calculate the subnet mask. You have a Class B parent network ID of 172.20.0.0 and require 15 subnets The default subnet mask for a Class B network is 255.255.0.0, and so the third octet is the one that will change. What is the third octet?
simplex
Signals that can travel in only one direction on a medium are referred to as what type of signal?
3 (Network), 2(Data. Link)
Subnetting operates at Layer ________ while VLANs function at Layer _______.
white/green
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
False
T/F: A short circuit is one where needed connections are missing, such as when a wire breaks.
True
T/F: IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.
False
T/F: IPv4 and IPv6 use the same packet format.
True
T/F: Latency on data networks is based on a calculation of a packet's round trip time (RTT).
True
T/F: Multimode fiber contains a core that is larger than a single mode fiber core.
False
T/F: Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.
C. registered jack 11 (RJ-100)
Telephone connections follow what registered jack standard? a. registered jack 12 (RJ-12) b. registered jack 45 (RJ-45) c. registered jack 100 (RJ-100) d. registered jack 11 (RJ-11)
DMZ (demilitarized zone)
What area of a network can provide less stringent security so a web server is more accessible from the open Internet? (Use of acronym is accepted)
Routing Table
What database does a router consult before determining the most efficient path for delivering a message? Routing table ARP table Three-way handshake netstat table
DiffServ
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? Source port Acknowledgement number DiffServ Checksum
a, b, c, , e
What four functions do all routers perform? a. Connect dissimilar networks. b. Interpret Layers 3 and 4 addressing and other information. c. Determine the best path for data to follow. d. Broadcast traffic across the EIGRP e. Reroute traffic if a primary path is down but another path is available.
1500 bytes
What is the Internet standard MTU? 65,535 bytes 1,522 bytes 1,500 bytes 9,198 bytes
B (Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility.)
What is the difference between dynamic ARP table entries and static ARP table entries? a. Static ARP table entries are created when a client makes an ARP request, whereas dynamic ARP table entries are entered manually using the ARP utility. b. Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility. c. Dynamic ARP table entries are not created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility. d. Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered automatically using the ARP utility.
6a
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions? Cat 5 Cat 7 Cat 6a Cat 5e
10GBase-T
What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling? 100Base-T 1000Base-T 10GBase-T 10TBase-T
10 Gbps
What is the maximum supported throughput of a CAT6 cable? 100 Gbps 1 Gbps 100 Mbps 10 Gbps
Cat5
What is the minimum category of UTP cable required in order to support Gigabit speeds?
coaxial cable (F-connector)
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
Static route
What kind of route is created when a network administrator configures a router to use a specific path between nodes? Trace route Static route Default route Best path
C (multimeter)
What kind of tool can you use to measure voltage on a cable length? a. light meter b. time domain reflectometer c. multimeter d. continuity tester
3 way handshake
What process is used to establish a TCP connection?
A (Jitter is what happens when packets experience varying amounts of delay and arrive out of order.)
What statement correctly describes "jitter"? a. Jitter is what happens when packets experience varying amounts of delay and arrive out of order. b. Jitter is the loss of 50% or more packets in a given data stream, causing a connection to falter. c. Jitter is the transmission of signal onto unintended pairs in a copper cable. d. Jitter is the fluctuation of a signal's strength as it travels away from its source.
C (Power over Ethernet requires CAT6 or better copper cable)
What statement regarding the Power Over Ethernet standards is inaccurate? a. The amount of power provided is 15.4 watts for standard PoE devices. b. A device that supplies power for PoE is known as power sourcing equipment. c. Power over Ethernet requires CAT6 or better copper cable. d. Electric current may run over a pair of wires used for data transmission.
a b c d
What three characteristics about TCP distinguish it from UDP? a. TCP is connection-oriented b. Uses sequencing and checksums c. Provides flow control d. UDP is connection-oriented
hopt count, theoretical bandwidth, path latency
What three routing metrics used by routers to determine the best of various available routing paths. Hop count theoretical bandwidth Path latency (or delay) OSPF
fiber type mismatch
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
Gateway of last resort
When a router can't determine a path to a message's destination, where does it send the message? efault gateway Routing table Administrative distance Gateway of last resort
3/8"
When terminating an Ethernet cable, about how far should the cable sheath extend into the plug?
white/orange, orange, white/green, blue, white/blue, green, white/brown, brown
When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?
802.1Q
Which IEEE standard determines how VLANs work on a network? 802.1Q 802.3af 802.11 802.1x
VLSM (Variable Length Subnet Mask)
Which IP addressing technique subnets a subnet to create subnets of various sizes? _____________ (Use of acronym is accepted)
tcpdump
Which Linux utility provides output similar to Wireshark's? tcpdump iwconfig netstat nbtstat
Network Layer (Layer 3)
Which OSI layer is responsible for directing data from one LAN to another?
Management
Which VLAN is designed to support administrative access to networking devices __________ VLAN?
Native VLAN
Which VLAN on a switch manages untagged frames?
MTRJ (Mechanical Transfer Registered Jack)
Which fiber connector contains two strands of fiber in each ferrule?
B. (256 - interesting octet), 2^h
Which formulas can be used to calculate the magic number? Choose two. Note: h is the number of host bits remaining; n is the number of host bits borrowed a. 2*n b. 256 - the interesting octet c. 2^h d. 2^h - 2
4th
Which hexadecimal block in an IPv6 address is used for the Subnet ID? Note - Select hextet choice from left to right
NEXT ( near-end crosstalk)
Which kind of crosstalk occurs between wire pairs near the source of the signal?
STDM (statistical time division multiplexing)
Which kind of multiplexing assigns slots to nodes according to priority and need? WDM (wavelength division multiplexing) STDM (statistical time division multiplexing) TDM (time division multiplexing) CWDM (coarse wavelength division multiplexing)
To increase the number of networking devices on a network
Which of the following is not a good reason to segment a network? a. To narrow down the location of problems on a network b. To limit access to broadcast domains c. To increase the number of networking devices on a network d. To reduce the demand on bandwidth
A. (Cat 5e, Cat 6a, Cat 7)
Which of these categories of twisted-pair cable can support Gigabit Ethernet? a. Cat 5e, Cat 6a, Cat 7 b. Cat 5, Cat 6, Cat 7 c. Cat 5e, Cat 6, Cat 3 d. Cat 6, Cat 7a, Cat 5
tone locator
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Trunk
Which port mode on a switch enables that port to manage traffic for multiple VLANs? Console Trunk Access Ethernet
neighborhood discovery protocol
Which protocol is supported by ICMPv6 to facilitate neighbor discovery on an IPv6 network? Neighbor Discovery Protocol Network Time Protocol Network Address Protocol Failed Address Protocol
TCP
Which protocol's header would a Layer 4 device read and process?
BGP
Which routing protocol does an exterior router use to collect data to build its routing tables? RIPv2 BGP OSPF IP
Bandwidth
Which transmission characteristic is never fully achieved?
Preamble, SFD
Which two fields in an Ethernet frame help synchronize device communications but are not counted toward the frame's size? Preamble Checksum SFD Flags
ICMP, ARP
Which two protocols manage neighbor discovery processes on IPv4 networks? ICMP and ARP IPv4 and IPv6 TCP and UDP BGP and OSPF
DHCP relay agent
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs? Hypervisor Virtual router DHCP server DHCP relay agent
4 borrowed, 20 total
You have a Class B parent network ID of 172.20.0.0 and require 15 subnets Decide how many bits to borrow from the host address bits. Recall that you can use the formula 2n = Y. (where n is the number of bits borrowed) How many bits must be borrowed from the host address portion? How many bits total will be used for identifying a host's subnet?
A (TIA/EIA 568A)
You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use? a. TIA/EIA 568A b. TIA/EIA 568F c. TIA/EIA rollover d. TIA/EIA 568E
D. (local connector LC)
You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size? a. straight tip (ST) b. Mechanical Transfer-Registered Jack (MTRJ) c. subscriber connector (SC) d. local connector (LC)
attenuation
________ is the loss of a signal's strength as it travels away from its source.
Noise
_________ can degrade or distort a signal
Switch Spoofing Double Tagging
A hacker wants to orchestrate a VLAN hopping attack. Which of the method(s) below can he employ to do his attack? Switch Spoofing Double Tagging Tagging Encapsulation VLAN Isolation
AD
A routing protocol's reliability and priority are rated by what measurement? Routing table MTU Latency AD