MTA Network Fundamentals
The "NTP" value in which resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it.
Time to Live (TTL)
Layer 4
Transport Layer
Layer 3 of the OSI model controls routing between network devices.
True
T or F: A Perimeter network typically contains servers that require internet access, such as web or email services.
True
T or F: A switch floods ports if it does not know where to send a packet
True
T or F: A switch sends unicast packets to one destination port only
True
T or F: A wireless bridge connects ethernet based devices to the network
True
T or F: Dynamic Routing provides the ability to add networks automatically by learning them from other RIP routers.
True
T or F: Dynamic Routing provides the ability to automatically remove routes from the routing table with other RIP neighbors delete them.
True
T or F: Dynamic Routing provides the ability to select the best route based on routing metrics.
True
T or F: Dynamic routing is fault tolerant.
True
T or F: Every router today is "TCP/IP" enabled, which is an industry-standard protocol that you use on the Internet and for local addressing.
True
T or F: HTTP, TELNET, FTP, and SMTP protocols operate on Layer 7 of the OSI model
True
T or F: It is standard practice to divide the binary bits of an IPv4 address into 8-bit fields named octets
True
T or F: Quality of Service (QoS) allows you to control bandwidth
True
T or F: Quality of Service (QoS) allows you to define the priority traffic on the network.
True
T or F: The loopback address of your computer is 127.0.0.1
True
T or F: WEP wireless encryption is the most susceptible to interception and decryption.
True
What are three characteristics of Ethernet network topology?
1. It can use coaxial, twisted pair, and fiber optic media. 2. It comprises the largest share of the networks in place today. 3. It can negotiate different transmission speeds.
What are two characteristics of the CSMA/CD access method?
1. It checks to see if a collision has been detected. 2. It waits until the transmission medium is idle.
T or F: Wireless bridges always work in pairs
True
To set lower security settings in Internet Explorer for an extranet site, add the site's URL to the _________ zone.
Trusted Sites
Which feature of Category 5e STP cable reduces external interference?
Twisting
What are two characteristics of a mesh network topology?
1. It is fault tolerant because of redundant connections. 2. Every node connects to every other node on the network. In a (full) mesh network topology, each of the network node, computer and other devices, are interconnected with one another. Every node not only sends its own signals but also relays data from other nodes. In fact a true mesh topology is the one where every node is connected to every other node in the network. This type of topology is very expensive as there are many redundant connections, thus it is not mostly used in computer networks. It is commonly used in wireless networks.
Name the 7 layers of the OSI Model
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application
What are two differences between switches and hubs?
1. Switches are capable of sending and receiving data at the same time. 2. Switches identify the intended destination of the data that they receive.
What are three advantages of VLANs?
1. They require a router to connect to VLANs on another switch. 2. They compartmentalize a network and isolate traffic. 3. They act as though they are on the same LAN regardless of physical location.
What is the maximum cable length for a single Cat5 UTP cable run?
100 meters (328 feet)
What IP range are loopback addresses?
127.0.0.0 to 127.255.255.255.255
Which address indicates that your router's DHCP service is NOT functioning?
169.254.x.x
What IP range are private network addresses?
192.168.0.0 to 192.168.255.255
Which IP range is a public address space?
197.16.0.0/12
What IP range are multicast addresses?
224.0.0.0 to 239.255.255.255
What is the bit rate for a North American T3 circuit?
44.736 Mbit/s
Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?
802.11n
In a wireless network that requires an SSL certificate, ________ handles the SSL certificate.
802.1X
What are two advantages of using star topology rather than ring topology in a computer lab workgroup?
A central connection point allows for flexibility and scalability and a cable problem within the group affects two nodes, at most.
When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the ____________ range
APIPA range 169.254.0.0-169.254.255.255
___________ assigns a class B IP address from ______ to ________ to the client when a DHCP server is either permanently or temporarily unavailable
APIPA, 169.254.0.0 to 169.254.255.255
Network (Protocols and Standards)
ARP, ICMP, IGMP, IP, IPSec, RARP
Presentation layer (Duties)
Allows hosts and applications to use a common language; performs data formatting, encryption, and compression.
Which OSI layer provides network services directly to the user's application? TLNET, SMTP, and NTP operate on this layer.
Application
Layer 7
Application Layer
Application (Protocols and Standards)
BOOTP, DHCP, DNS, FTP, HTTP, HTTPS, IMAP4,PING, POP3, NSLOOKUP, NTP, SFTP, SMTP, SNMP, Telnet, TFTP
What is a similarity between Layer 2 and Layer 3 switches?
Both forward packets onto the network.
What is the DNS record type that specifies an alias name of another address record?
CNAME
You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement?
CaT5e
Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of ____________ switching
Circuit
Which protocol is responsible for automatically assigning IP addresses?
DHCP
Which OSI layer checks for errors by adding CRC to the frame. Bridges and NICs operate on this layer.
Data Link
Which OSI layer ensures that reassembled bits are in the correct order, and it requests retransmission of frames if an error occurs. Switches and WAPs operate on this layer.
Data Link
Layer 2
Data Link Layer
Which two reasons should you use IPsec between computers?
Data integrity and data confidentiality.
Transport Layer (Duties)
Ensures accurate delivery of data through flow control, segmentation and reassembly, error correction, and acknowledgement
Network Layer (Duties)
Establishes network connections, translates network addresses into their physical counterparts and determines routing
Session Layer (Duties)
Establishes, maintains, and terminates user connections
T or F: A LAN has no access to the perimeter network
False
T or F: A switch sends broadcast packets to the uplink port only.
False
T or F: A wireless bridge increases the wireless signal strength of the access point
False
T or F: An IPv4 address consists of 64 bits
False
T or F: IPv6 addresses are 64-bit in length
False
T or F: IPv6 addresses are divided into 8-bit blocks
False
T or F: IPv6 addresses are represented by dotted-decimal notation
False
T or F: Layer 4 of the OSI model controls dialogue between computers.
False
T or F: Quality of Service (QoS) allows you to assign protocols dynamically
False
T or F: The value of any IPv4 octet can be from 0 to 256
False
T or F: You use a perimeter network to grant internal clients access to external resources
False
A _____________ protects a network's perimeter by monitoring traffic as it enters and leaves.
Firewall
Which metric does Routing Information Protocol (RIP) use to determine the least costly route?
Hop count
Physical Link (Standards)
IEEE 802.3 (Ethernet), 802.5 (Token Ring), 802.11 (Wi-Fi)
Which wireless communication problem is caused by electromagnetic waves?
Interference
Data Link (Protocols and Standards)
L2TP, PPP, PPTP, SLIP
An Address Resolution Protocol (ARP) table is used to associate IP addresses with ___________
MAC Addresses
Presentation (Protocols and Standards)
MIME, SSL, TLS
Which network device interconnects computers in a workgroup, is able to be remotely configured, and provides the best throughput?
Managed Switch. These switches have one or more methods to modify the operation of the switch. Common management methods include: a command-line interface (CLI) accessed via serial console, telnet or Secure Shell, an embedded Simple Network Management Protocol (SNMP) agent allowing management from a remote console or management station, or a web interface for management from a web browser.
Physical Layer (Duties)
Manages signaling to and from physical network connections
A node within a local area network (LAN) must have two what?
NIC and IP address
Which OSI layer is responsible for path determination and delivery of packets, but does not guarantee delivery. ICMP, RIP, and ARP operate on this later.
Network
Which OSI layer relies on upper layers for reliable dlivery and sequencing. IPX, X.25, and NLSP operate on this layer.
Network
Each IPv4 address consists of a _______ and a ___________
Network ID and a host ID
Layer 3
Network Layer
Data Link Layer (Duties)
Packages data in frames appropriate to network transmission method
Layer 1
Physical Layer
An Action Center alert recommends that you enable Windows Firewall. After enabling the firewall, you can no longer access websites. Which two TCP ports should you add exceptions for on the firewall?
Ports 80 and 443
According to the OSI model, encryption takes place on the __________ Layer
Presentation
Layer 6
Presentation Layer
A ________ zoneis the first DNS zone to which all updates for the records that belong to that zone are written.
Primary
Application Layer (Duties)
Provides interface between software applications and network for interpreting requests and requirements. Note: This layer is not the actual software application.
Session (Protocols and Standards)
RTP & SIP
What is an example of a Layer 3 device that connects multiple computers and networks?
Router
What is an example of a network device that associates a network address with a port?
Router. A router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model.
You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use?
STP Cat5e. Shielded cable, here STP Cat5e, would reduce interference.
Which OSI layer controls dialogue between source and destination notes. RPC and NETBIOS operate on this layer.
Session
Layer 5
Session Layer
You are helping a friend set up a public-facing web server for a home office. Your friend wants to protect the internal network from intrusion. What should you do?
Set the web server in a perimeter network.
Which of cable type transmits data the greatest distance?
Single-mode fiber. When working with distances up to 2 km, use multimode optical-fiber cable. Like multi-mode optical fibers, single mode fibers do exhibit modal dispersion resulting from multiple spatial modes but with narrower modal dispersion. Single mode fibers are therefore better at retaining the fidelity of each light pulse over longer distances than multi-mode fibers. Cat5e and Cat6 max cable length is 100 metres.
Where on a network is a T3 connection possible?
T3 lines are a common aggregation of 28 T1 circuits that yields 44.736 Mbps total network bandwidth . Besides being used for long-distance traffic, T3 lines are also often used to build the core of a business network at its headquarters.
Transport (Protocols and Standards)
TCP, UDP
What happens when an 802.11a node broadcasts within the range of an 802.11g access point?
The node transmits, but the access point is unable to receive.
IPSec policies for two machines on a LAN can be modified by using the ____________ on Windows 7
Windows Firewall with Advanced Security snap-in