Network+
100BASE-TX
-100mbps -called Fast Ethernet
10BASE-T
-RJ-45 connector -cat3 or higher cable -10mbps
DWDM (Dense Wavelength Division Multiplexing
-allows for more channels per fiber-channels spaced .8 nanometers apart Used on most modern fiber-optic networks Extraordinary capacity Typically used on high-bandwidth or long-distance WAN links
CWDM (coarse wavelength division multiplexing)
-allows up to 8 useable channels per fiber-channels spaced 20 nanometers apart
Which switch is used with the Windows netstat utility to show name of a running program?
-b
Which switch is used with the Windows netstat utility to show the process ID?
-o
What value will most routers insert into the routing table Destination LAN IP column if there is no gateway needed?
0.0.0.0
Which of the following could be a valid Autonomous System Number (ASN)?
1.33457
What is the data transfer speed for DS1?
1.544 Mbps
U (Unit) (Height)
1.75 inches
Which IP address is a private IP address?
10.164.19.5
How many binary digits are in in an IPv6 address?
128
How many powerful DNS server clusters, scattered all over the world, does the DNS root contain?
13
Which port is used to receive e-mail messages from e-mail servers (IMAP4)?
143
What is the maximum number of hops allowed by RIP?
15
How much data can frames hold?What happens when data file to big?
1500 bytes. If data is over, it is sent back to NIC for it to send
What is the range of transfer speed for ATM
155.52 to 622.08 Mbps and beyond
Evolved High-Speed Packet Access (HSPA +) provided theoretical speeds up to _______, although most HSPA + implementations rarely exceeded 10 Mbps .
168 Mbps
Which TCP/IP port does the H.323 video presentation protocol use?
1720
What is the maximum distance between a user's demarc and the central office for all versions of DSL?
18,000 feet
Whats the gain of the typical WAP ANTENNA?
2 dB
Which address range does multicast use in IPv4?
224.0.0.0/4
Which subnet mask is an example of classless subnetting?
255.255.240.0
Which formula would you use to arrive at the number of hosts on a subnet?
2^x-2, Where x represents the number of zeros in the subnet mask
Which formula would you use to calculate the number of new subnets?
2y, where y is the number of bits you add to the subnet mask
LTE networks feature speeds of up to _______ download
300 Mbps
How many binary digits are in an IPv4 address?
32
How long is a subnet mask?
32 bits
One of the last GSM technologies, Enhanced Data rates for GSM Evolution (EDGE ), offered data speeds up to
384 Kbps
Which key size does WEP use?
40 bits and 104 bits
What is the low end speed of the SONET Optical Carrier specification (OC - 1)
51.8 Mbps
What is the size of an ATM fixed-length cell?
53 bytes
Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which two can go through a NAT router?
6in4 and Teredo
Which now deprecated tunneling protocol enabled IPv6 traffic over the IPv4 Internet?
6to4
LTE network upload speed
75 Mbps
Jumbo frame are usually _____ bytes long
9000
Which address notation is the IPv6 loopback address?
::1
preamble
A 7 byte series, followed by a 1 byte start frame delimiter. Always precedes a frame
BPDU Guard
A Cisco switch feature that listens for incoming STP BPDU messages, disabling the interface if any are received. The goal is to prevent loops when a switch connects to a port expected to only have a host connected to it.
MAC address
A Media Access Control address is a hardware address that uniquely identifies each node on a network. 48 bit (6 byte) number.
punchdown block
A device used to connect network cables from equipment closets or rooms to other parts of a building.Connections to networking equipment such as hubs or switches are established from the punchdown block.66 block - telephone systems110 block - modern network and telephone connections using VOIP
Angled Physical Contact (APC)
A fiber-optic connector that makes physical contact between two fiber-optic cables. It specifies an 8-degree angle to the curved end, lowering signal loss. APC connectors have less connection degradation from multiple insertions compared to other connectors.
Community clouds are run by
A group of organizations with similar goals or needs
SFP (Small Form Factor Pluggable)
A standard hot-swappable network interface used to link a connectivity device's backplane with fiber-optic or copper cabling. up to -5gbs
PortFast
A switch STP feature in which a port is placed in an STP forwarding state as soon as the interface comes up, bypassing the listening and learning states. This feature is meant for ports connected to end-user devices.
GBIC (Gigabit Interface Converter)
A transceiver used to convert electrical signals into optical signals and vice versa. -1.25gbps -obsolete -the first type of modular transceive
SFP+
A type of SFP that can send and receive data at rates of up to 16 Gbps.
MMF (multimode fiber)
A type of fiber-optic cable that contains a core with a diameter between 50 and 100 microns, through which many pulses of light generated by a light emitting diode (LED) travel at different angles.
SMF (single-mode fiber)
A type of fiber-optic cable with a narrow core that carries light pulses along a single path data from one end of the cable to the other end. Data can be transmitted faster and for longer distances. However, it is expensive.
Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?
Active Directory
Almost all TCP/IP applications have moved to __________ for symmetric cryptography.
Advanced Encryption Standard (AES)
What is the function of the multicast address FF02::1?
All nodes address
Uplink Port
Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable
Which statement is true of an IPv6 prefix?
An IPv6 prefix is a maximum of 64 bits.
Physical Contact (PC)
An early generation of the ferrule that has a curved tip, which allows the two fibers to meet more closely than a flat surface would.
Which test should a network administrator run on a CSU / (DSU) to test a WAN connection and verify the T-carrier connection from end to end
BERT
Which protocol is a path vector routing protocol?
BGP
By convention, what is the name given to Area ID 0 (zero) of an Open Shortest Path First (OSPF) network?
Backbone
Which term is synonymous with traffic shaping?
Bandwidth shaping
What type of unit is formed by a single WAP servicing a given area?
Basic Service Set (BSS)
Which term refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.
BlueBorne
Which protocol is used on the Internet for communication between Autonomous Systems?
Border Gateway Protocol (BGP-4)
Which method of sending a packet allows every computer on the LAN to hear the message?
Broadcast
Which device provides termination at each end of a T1 connection?
CSU/DSU
100BaseT
Cable type: Cat 5 or better/UTP or STP Speed: 100 Mbps Signal type: BasebandDistance: 100 meters
1000BaseSX
Cable type: MMF with ST/SC Speed: 1 Gbps Signal type: Baseband Distance: 220-500 meters
100BaseFX
Cable type: MMF with ST/SC Speed: 100 Mbps Signal type: Baseband Distance: Two kilometers
1000BaseLX
Cable type: SMF Speed: I Gbps Signal type: Baseband Distance: 5 kilometers
Which DNS server is used to talk to other DNS servers to resolve IP addresses for DNS clients?
Cache-only DNS server
Which term refers to a standardized type of file that includes a public key with a digital signature, and the digital signature of a trusted third party?
Certificate
Time- division multiple access (TDMA ) enabled multiple users to share the same _______ more or less at the same time .
Channel
A particular multicast called an IGMP group is assigned an address in which class range?
Class D range
Which statement best describes a Class E address ID?
Class E is considered to be experimental.
Which task is performed by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers?
Classless Inter-Domain Routing (CIDR)
Which organization is the biggest player in the certificate authority market?
Comodo
Windows leans heavily on __________.
DDNS
Which term does CompTIA use in place of a relay agent?
DHCP relay
Which term refers to an authentication and authorization protocol designed to prevent bad guys from impersonating legitimate DNS servers?
DNSSEC
If you have cable Internet service, what protocol is used between the head end connection and the cable company's network?
DOCSIS
Each analog voice call gets converted into a __________ signal at the telephone company's central office before being multiplexed into larger circuits.
DS0
What's is the most basic data chunk you get in the telephone world?
DS0
Which digital signaling rate has a frame containing a framing bit and 24 channels where each channel holds a bit DSO data sample ?
DS1
A common ealy DSL installation consisted of a _______ connected to a telephone wall jack and to a standard network interface card (NIC) in the computer.
DSL modem
Which device takes 8-bit- wide digital data, converts it into 1bit wide digital dataand then hands it to a modem for conversion to analog?
DSL modem
Which term describes a DSL device that is located in a central office connecting multiple DSL customers to the internet ?
DSLAM
Using the ping command, which message is displayed if your computer has no route to the address listed?
Destination host unreachable
Which 802.11 collision avoidance method is currently implemented?
Distributed coordination function (DCF)
What tasks should be performed as soon as an administrator finishes configuring a router?
Document how you configured the router and back up the router configuration.
Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?
Dynamic NAT
Which term refers to ports in the 49152 to 65535 range?
Dynamic port
Which authentication method is commonly used for more-secure wireless networks?
EAP-TLS
Which hypervisor is industry leader?
ESXi
Which term refers to session information stored in RAM by a computer on one side of a session?
Endpoint
Which term describes the status of a port that is part of an active working endpoint pair?
Established port
Which email server type has over 50 percent market share and runs on just about everything, from Unix/Linux to Windows?
Exim
Whenever you allow authorized remote users to access some part of your private network have created a(n) ________
Extranet
What is the universal MAC address for broadcast?
FF-FF-FF-FF-FF-FF
Which multicast reserved address is designed to reach solicited-node addresses?
FF02::1:FFXX:XXXX
Which multicast addresses will only reach routers?
FF02::2
A port number is an 8-bit value between 0 and 65535.
False
A system connected to a VPN looks as though it's on a remote network.
False
IPv6 will use the IPsec Tunnel mode by default.
False
If a primary DNS server goes down, the secondary servers can resolve FQDNs and add new records.
False
In DNS load balancing, all Web servers share the same IP address.
False
Layer 2 Tunneling Protocol (L2TP) has authentication and encryption.
False
Routers work at the Network layer of TCP/IP model.
False
TCP and UDP both offer encryption methods at Layer 4 of the OSI model.
False
The Kerberos authentication protocol was developed primarily for use with the Point-to-Point Protocol (PPP).
False
The SSH File Transfer Protocol (SFTP) is designed to run over an FTP session.
False
Using class blocks enables a much more efficient use of IP addresses compared to subnetting.
False
When a computer gives itself an Automatic Private IP Address (APIPA), it also includes a valid default gateway address.
False
Wireless devices can listen and send at the same time
False
The Internet Control Message Protocol (ICMP) works at Layer 3 to deliver connection-oriented packets.
False, cuz its connectionless
Which technology refers to an infrastructure that can be utilized to support a SAN?
Fiber Channel over Ethernet (FCoE)
Local Connector (LC)
Fiber-optic cable connector that corresponds to the mini form-factor standard. Colloquially known as the "little connector."
plenum cable
Fire resistant and non-toxic; it must be used when wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned.
On an authoritative DNS server, which storage areas hold the IP addresses and FQDNs for the computers in a domain?
Forward lookup zones
Which zone files are the most important part of any DNS server?
Forward lookup zones
Which technology acts on behalf of clients, getting information from various sources and handing that info to the clients?
Forward proxy server
What characteristic does spread-spectrum transmission change for each user
Frequency
Which statement describes an ISDN PRI?
Full T1 line, carrying 23 B channels
What type of IPv6 address do you need to get on the Internet?
Global unicast address
Which technology was the final 3G data standard
HSPA+
Which protocol uses TCP as its transport layer protocol?
HTTP
Which proxy servers are the most common type of proxy server?
HTTP
What term best describes the way the DNS name space is organized?
Hierarchical
Which term refers to the passage of a packet through a router?
Hop
Both Z- Wave and Zigbee use a mesh networking topology to facilitate communication in homes , yet both also have _______ that act as the network interconnect .
Hubs
Which standard, developed by Citrix, is used with a remote terminal connection?
ICA
Which organization has the authority to create new top-level domain names?
ICANN
Which protocol does the ping application use?
ICMP
Which protocol is best for simple, connectionless applications that never need more than a single packet?
ICMP
Which trunk standard enables you to connect switches from different manufacturers?
IEEE 802.1Q
Which standard includes secure authentication using a RADIUS server and password encryption using EAP?
IEEE 802.1x
Which organization developed the new IPv6 addressing system?
IETF
Which of the following is an authentication and encryption protocol suite that works at the Network layer of the OSI seven-layer model?
IPSec
Which protocol uses nonstandard addresses for the endpoints?
ISATAP
What is a Peer to Peer Network?
In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts. . Advantages of peer-to-peer networks include the following:• Easy implementation• InexpensiveDisadvantages of peer-to-peer networks include the following:• Difficult to expand (not scalable)• Difficult to support• Lack centralized control• No centralized storage
What type of unit is formed by two or more wireless nodes communicating in ad hoc mode
Independent basic device set (IBSS)
Which term describes the predetermined silence period that is added to the length of the current frame to determine the waiting period for a network device after it has detected traffic on the media?
Inter frame gap
Which column in a routing table tells the router which of its ports to use?
Interface
Which organization assigns Autonomous System Numbers (ASNs)?
Internet Assigned Numbers Authority (IANA)
Which attribute applies to the OSPF routing method?
It corrects link failures and creates convergence almost immediately.
Which proprietary Cisco protocol was combined with PPTP to create the Layer 2 Tunneling Protocol (L2TP)?
L2F
Which protocol is the tool that programs use to query and change a database used by the network?
LDAP
A Word document that stops or an online file that stops downloading are examples of
Latency
What OSI model layer supports content switches?
Layer 7
__________ specifies a number of features and options to automate the negotiation, management, load balancing, and failure modes of aggregated ports.
Link Aggregation Control Protocol (LACP)
LACP
Link Aggregation Control Protocol (LACP) Protocol designed to dictate how network multiple network devices send and receive data as a single connection on a network.
VLANs based on __________ are called dynamic VLANs, although they are never used these days.
MAC addresses
Which routing metric determines the largest frame a particular technology can handle?
MTU
Which term refers to a technology that serves as a replacement for frame relay and ATM switching?
Multi-protocol label switching (MPLS)
Which method of sending a packet allows a single computer to send a packet to a group of interested computers?
Multicast
Which address is a set of reserved addresses designed to go only to certain systems?
Multicast address
Which protocol makes the IPv6 automation magic work?
Neighbor Discovery Protocol (NDP)
To what layer of the OSI model does the TCP/IP model's Internet layer roughly correspond?
Network
__________ defines a newer series of protection applications that combine the features of what traditionally was done by separate applications.
Network access control (NAC)
What is a Client Server Network?
Network? In a client-server network, hosts have specific roles. Advantages of client-server networks include the following:• Easy to expand (scalable)• Easy to support• Centralized services• Easy to back disadvantages of client-server networks include the following:• Expensive server operating systems• Extensive advanced planning required
Which routing protocol is the choice in most large enterprise networks?
OSPF
Straight Tip (ST)
One of the most common fiber-optic connectors, similar in style to the BNC connector used in 10Base2 Ethernet.
Which term describes the status for a socket that is prepared to respond to any IP packets destined for that socket's port number?
Open port
Which connection type is always used for dial-up connection to the Internet?
PPP
Which phone line has a baud rate of 2,400 and uses an RJ - 11 connector
PSTN
To make rollouts affordable, most the home technologies employ a architecture that single ber to the nethborhood switch and then individual destination
Passive optical network (PON)
PVC
Polyvinyl chloride-cheap and flexible plastic for their insulators and jackets. in a fire it can burn and release toxic smoke
Which form of NAT typically handles the one-to-many connections?
Port Address Translation (PAT)
Which protocol is the Cisco protocol for accomplishing aggregation?
Port Aggregation Protocol (PAgP)
Your company has a single server on a private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?
Port forwarding
Which standard offers authentication, authorization, and accounting?
RADIUS/Terminal Access Control Access Control System Plus (TACACS+)
Which routing protocol does not support Variable-Length Subnet Masking (VLSM)?
RIPv1
What protocol was adopted in 1994, and is now considered obsolete except for small, private WANs?
RIPv2
Which protocol is a distance vector routing protocol?
RIPv2
Which entity passes out IPv6 prefixes?
RIRs
Which term refers to the standard used by the vast majority of Volp solutions
RTP
Which protocol is commonly used to stream video?
RTSP
IANA has grown dramatically and now oversees five __________ that parcel out IP addresses to large ISPs and major corporations.
Regional Internet Registries (RIRs)
What enables a system to determine an FQDN by knowing the IP address?
Reverse lookup zones
Which terms refer to versions of DSL service?
SDSL and ADSL
Microsoft has used DNS names with the __________ protocol to provide folder and printer sharing in small TCP/IP networks.
SMB
Which record type defines the primary name server in charge of the forward lookup zone?
SOA
What are the two most common types of SSL VPNs?
SSL portal VPNs and SSL tunnel VPNs
When you install an ISDN terminal adapter (TA)what special number provided by the telephone company must be configured along with the other ISDN telephone number you want to call?
Service Profile ID (SPID)
MT-RJ (Mechanical Transfer Registered Jack)
Sometimes called a Fiber Jack connector, it is a compact snap-to-lock connector used with multimode fiber.
STP
Spanning Tree Protocol. Protocol enabled on most switches that protects against switching loops. A switching loop can be caused if two ports of a switch are connected together
Code-division multiple access (CDMA) came out not long after GSM, and used a _________ form of transmission.
Spread-spectrum
A DHCPv6 server is operating very similarly to an IPv4 DHCP server by passing out complete IPv6 information: addresses and default gateways, as well as items like DNS server addresses. In which mode is this server?
Stateful
A(n) __________ DHCPv6 server relies on router advertisements to give some information to individual hosts, making small changes to what the router advertisements would normally show, such as the address of the DNS server.
Stateless
__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.
Static NAT
What is the cornerstone of subnetting?
Subnet mask
What is the de facto protocol suite of the Internet?
TCP/IP
What network protocol do Apple systems use today?
TCP/IP
What file transfer protocol uses UDP port 69?
TFTP
Which terms refer to automatic tunnel configuration protocols?
TSP and TIC
Layer 2
The Data Link layer defines the rules and procedures for hosts as they access the Physical layer.These rules and procedures define:• How physical network devices are identified on the network by defining a unique hardware address (physical or MAC address).• How and when devices have access to the LAN and can transmit on the network medium (media access control and logical topology).• How to verify that the data received from the Physical layer is error free (parity and CRC).• How devices control the rate of data transmission between hosts (flow control).At the Data Link layer, data segments are called frames.Switches, bridges and NICs, and WAPs function in Layer 2.
What information is kept in the cached lookups folder for a DNS server?
The IP addresses already resolved
Ina Basic Service Set Identifier (BSSID) infrastructure mode network, the BSSID is the same as __________ for the WAP
The MAC Address
Layer 1
The Physical layer of the OSI model sets standards for sending and receiving electrical signals between devices.Protocols at the Physical layer identify:•How digital data (bits) are converted to electric pulses, radio waves, or pulses of light and moved across network cables.•Specifications for cables and connectors.•The physical topology.At the Physical layer, data segments are called bits. NICs, repeaters, hubs, WAPs, and modems function in Layer 1.
Which item is part of a fully qualified domain name (FQDN)?
The host name
Layer 3
The network layer is responsible for moving data between systems throughout the internetwork and is where routing happens. Routing takes a message sent from a device to a router to another router - maybe through several routers - to the destination device. Routing protocols specify how each router identifies destination networks and the path data should take to arrive at that destination network.One very important thing that happens at the network layer is the assignment of IP addresses.When a segment is passed off to the network layer, the source and destination IP addresses are added to the segment, and the data then becomes a packet.At the Network layer, data segments are called packets.
Layer 6
The presentation layer can be thought of as the formatting layer. This layer deals with syntax, encryption, and compression. One example of this is a Web site using the HTTP protocol. When data is encrypted, the HTTP protocol doesn't do this. Instead, the SSL protocol encrypts the data at the presentation layer.Specifically, the Presentation layer ensures:• Formatting and translation of data between systems.• Negotiation of data transfer syntax between systems by converting character sets to the correct format.• Encapsulation of data into message envelopes by encryption and compression.• Restoration of data by decryption and decompression.
Layer 5
The session layer uses a session ID to identify unique sessions. This keeps the data stream separated so that information requested by one client isn't sent to another client. The session layer is also responsible for terminating sessions. It's responsible for creating sessions between communication devices. Each client connection is called a session. An example of this is multiple clients connected to a Web server.
Which statement describes a weakness in WEP that allows it to be easily cracked?
The size of the encryption key
Layer 4
The transport layer is responsible for delivering data on a network. The transport layer receives data from the upper layers and segments it. For example, suppose you're downloading a 4 MB file from a Web site. The transport layer knows that a 4 MB file can't be sent all at once, so it segments the data.It divides data into smaller blocks called segments and identifies each block with a sequence number.The sequence number helps the receiving device reassemble the segment blocks in the right order.The sequence number also helps identify any segments that got lost in transit, allowing a device to request retransmission of a lost segment.The transport layer is also responsible for flow control between two hosts. If data is being sent too fast or too slow, the receiving device can send a message telling the sending device to slow down or speedTransport layer functions include:• End-to-end flow control.• Assigns port and socket numbers.• Segmentation, sequencing, and combination.• Connection services, either reliable (connection-oriented) or unreliable (connectionless) delivery of data. TCP and UDP
Layer 7
This layer is responsible for integrating network services with the operating system. The application layer provides an interface between an application running on the system and the rest of the network. It doesn't refer to the application itself.The Application layer include:• HTTP• Telnet• FTP• TFTP• SNMP
What is another name for a timestamped service ticket?
Token
Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?
Transparent, server, and client
What OSI model layer supports PPTP?
Transport
A very early protocol called Bootstrap Protocol (BOOTP) preceded DHCP in providing dynamic IP addressing.
True
A zone is a container for a single domain that gets filled with records.
True
An anycast address is a unicast address.
True
Before the Internet existed, the biggest drawback to remote connections was the cost to connect.
True
Digital signatures are very popular with e-mail users.
True
E1 and T1 lines can interconnect for international use
True
Every DNS forward lookup zone will have one SOA and at least one NS record.
True
Every operating system's virtual private network (VPN) client fully supports L2TP/IPSec VPNs.
True
Glass is notorious for bending radio waves as the waves pass through them causing refraction
True
IPv6 always uses link-local addressing for communicating on a local network.
True
IPv6 completely drops the idea of broadcast addresses, replacing it with the idea of multicast.
True
IR blasters can emulate any IR remote control, turning any Android into a universal remote
True
If your network consists of only two, three, or four routers, RIP's easy configuration often makes it worth putting up with slower convergence.
True
Just like with a traditional hard disk, we have to format a virtual disk before we can use it
True
Lightweight EAP (LEAP) is a proprietary EAP authentication used almost exclusively by Cisco wireless products
True
Many new routers have CSU/DSUs built into them
True
Most of the connections that make up the high-speed backbone of the Internet use technologies designed at least years ago to support telephone calls.
True
NetBIOS was suitable only for small networks.
True
One nice aspect of DSL is that you do not have to run new phone lines
True
SIP and H.323 both run on top of Real-time Transport Protocol (RTP) .
True
Subnet masks are always 32 binary digits long.
True
Systems that use static IP addressing can never have DHCP problems.
True
The 802.11 standard defines both how wireless devices communicate and how to secure that communication
True
The best example of nonrepudiation is a digital signature.
True
The first binary octet of a Class C IP address always begins with 110 (110xxxxx).
True
The latest version of ANT is ANT+
True
The original CDMA was considered a 2G technology.
True
There is a strong movement toward using the term Internet Protocol instead of the term TCP/IP.
True
Transmission Control Protocol (TCP) chops up data into segments.
True
WAPs use an access control list (ACL) to enable or deny specific MAX addresses
True
When a DHCP client boots up, it automatically sends out a special DHCP Discover message using the broadcast address.
True
When a technician installs a range of IP addresses, this is called a DHCP scope.
True
XenServer is a powerful hypervisor that serves as the foundation for massive cloud offerings
True
You rarely have a choice of tunneling protocol.
True
Zigbee is a completely open standard
True
Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?
Trunk port
__________ create the actual tunnel and (usually) offer a custom-made endpoint client for you to use, although more advanced users can often make a manual connection.
Tunnel brokers
Which type of hypervisor relies on an underlying operating system
Type 2
Which protocol do Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) use?
UDP
Which method of sending a packet allows one computer to send a message directly to another user?
Unicast
Bridge Protocol Data Unit (BPDU)
Used by switches to share information with other switches that are participating in the Spanning-Tree Protocol
What is a Terminator
Used in a Bus Topology a terminator is placed at both ends of the trunk cable. Terminators absorb signals and prevent them from reflecting repeatedly back and forth on the cable.
What is the current modem standard now on the market?
V.92
Which program is a bare-metal virtualization software
VMware ESXi
Which term refers to the first generation of packet-switching technology?
X.25
What is the name of the classic Cisco console cable, more commonly called a rollover cable?
Yost
frame
a container for a chunk of data moving across a network. It encapsulates (wraps) information and data for easier transmission. NIC creates/send, receives/reads these frames
broadband
a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
baseband
a type of transmission in which the entire channel capacity of the communications medium (such as cable) is used by one data signal, enabling only one node to transmit at a time
pad
adding extra data to bring the frame up to the minimum 64 bytes
In IPv6, __________ is commonly used with DNS.
anycast
Which term refers to a software connection that passes traffic from the real NIC to a virtual one?
bridge
What entry is made at the command prompt in UNIX/Linux to display DNS server information?
cat /etc/resolv.conf
You won't get an HTTPS connection without a good __________ exchange.
certificate
unshielded twisted pair (UTP) cable
contains 4 pairs of wires that can transmit and receive data
data
contains whatever payload the frame carries.
Network bridge
created so that larger networks can be segmented or broken up into smaller networks to reduce traffic within that network; acted like a repeater to connect two networks, in addition to filtering and forwarding traffic between the networks based on MAC addresses of computers.
International Organization for Standardization (ISO)
created the OSI seven layer model
A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.
ephemeral port number
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
ethernet networks use this system to determine which computer should use a shared cable at a given moment. Carrier sense means that each node using the network examines the cable before sending a frame. Once the cable is determined to be free, the node sends out its frame. Multiple sense means that all machines have equal access to the wire. Collision detection is when 2 NICs send at the same time. When this happens, both NICs stop sending and wait for the wire to clear by determining a random time interval to resend; this is a network access method that maps to the IEEE 802.3 standard for Ethernet networks
A Class C network block uses the __________ octets to define only the network ID.
first three
central box
handles the flow of data from each computer to every other computer
type
identifies the frame contents
Which command is used to force a DNS server to update its records?
ipconfig /renew
Which device converts an analog signal to digital and a digital signal to analog?
modulator-demodulator
Which device takes a circuit and combines it with a few hundred other circuits into a single complex circuit on one wire?
multiplexer
When an IPv6 computer joins a network, it sends out multicast __________ packets searching for other computers on its broadcast domain.
neighbor solicitation
If you are using NetBIOS, which command allows you to see if other local systems are visible?
net view
A __________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router.
network-based IDS (NIDS)
What command can you use to tell a device to send packets to itself?
ping 127.0.0.1
Telnet runs on TCP __________.
port 23
Another name for port bonding is __________.
port aggregation
Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network?
promiscuous mode
If you ping a device and no echo reply comes back before the default time, ping will respond with a __________ message.
request timed out
Instead of NAT and private network IDs, IPv6 relies on __________.
router advertisements
A __________only comes into play if a computer hasn't heard from the router recently and demands a router advertisement.
router solicitation
switch
sends the frame only to the interface associated with the destination MAC address
How many copper wires are used by a T1 line?
two pairs
Which tool is used to create, configure, and maintain virtual machines on the host from the comfort of a client computer running the tool?
vSphere Client
Topology Change Notification (TCN)
which is used to indicate that a there has been a change in the switch network topology. Enables the switches to rework themselves around the failed interface or device.
RootGuard
will move a port into a root-inconsistent state if BPDU's coming. from a certain direction indicate a switch is trying to become the root bridge.
Hub & Frames
with a hub, every frame sent on a network was received by every NIC, but only the NIC with the matching MAC address would process that frame.