Study.com cs108

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is IMAP?

(IMAP) is a standard internet protocol used for the retrieval of email messages from an email server.

_____ is an example of a TLD name.

.com .com most web resources are categorized under 13 TLD names including .com, .net, .org

Which of the following actions is allowed because of a switch?

Being able to send a document from your office computer to a printer several offices away.

In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?

CAT5e

In a cable network environment, what is the name of the cable type that connects from the wall outlet to the modem?

Coaxial

Which of the following statements about a VLAN environment is TRUE?

Computers or nodes by default are not VLAN aware

SD-WAN is best used for which task?

Connecting branches to the cloud SD-WAN or software-defined wide-area networks rely on software to control services. This will be part of connecting branches to the cloud.

On which component can a router's operating system be found?

Flash memory The router's operating system can be found on the router's flash memory. ROM is the read-only memory for the router. IOS is the name of the operating system found on Cisco routers. Ports are the connectors found on the back of a router that allow you to physically connect computers to the router and the router to the Internet

Which of the following devices can be used to interface computer networks that use different communication protocols?

Gateway

Each computer or device connected to the Internet has a unique identifying number. What is this called?

IP address

What protocol do computer systems (hosts) use when communicating with each other on a network?

IP addresses

What are some of the tunneling protocols that VPNs use?

IPsec and L2TP

A subnet mask _____

Indicates the network address within the IP addresses

Which of these answers describes one possible method to prevent or limit the impacts of a DoS or DDoS

Install and maintain anti-virus (AV) software

Which of the following best describes the connection tool for a new smartphone that can connect to Wi-Fi?

Integrated Wi-Fi

What are the two main routing classifications?

Interior and exterior gateway protocols

Why is the role of RTCP important in VoIP communications?

It allows adjustments to be made to fine-tune transmissions

What makes the symmetric DSL network type so different from the asymmetric type?

It has an equal balance between download and upload speeds.

POP is within what layer of the OSI Model?

Layer 7

The network layer converts:

Logical addresses into physical addresses

Which of the following statements is true?

MAC and IP addresses need to work in parallel for effective communication

Of the options listed, which is the most used WAN (Wide Area Network) carrier?

MPLS MPLS is currently used by three fourths of polled companies. This is due mostly to it's any-to-any capabilities and service provided added services. MPLS lines are in most cases less expensive than traditional WAN lines. Frame Relays are being phased out and are no longer actively sold be the majority of carriers. Dark Fiber and other dedicated lines are expensive and complicated to install. They are typically used in very large enterprises.

What type of coverage does Wi-Fi provide?

Medium range wireless communication

A wireless network for Internet access in a large building is typically connected in a _____ topology.

Mesh

Which of the following wireless communication technologies has the shortest range?

Near field communication

In order to check the nodes that are connected to a system, one can use the command

Netstat

Traffic passed on a network between two nodes on the same subnet:

None of these are required as the switch will likely be physically connected and can send the information on without a routing protocol.

Which of these options properly defines both a DoS and a DDoS attack?

Organized electronic incursions

In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.

Permissions

Which network covers the smallest geographic area?

Personal Area Network

The Subnet is a _____ of a computer network.

Portion

Which switch component allows for devices to be connected to the switch?

Ports Ports allow for devices to be connected to the network switch. RAM handles the switch's short-term memory. Switch Fabric is comprised of hardware and software that work in tandem to ensure that data coming into the network gets sent out via the appropriate port. The Forwarding Engine is the component that is responsible for making all the switching and routing decisions on the device.

The three distance protocols that route information to other nodes that aren't on the same subnet are?

RIP,OSPF,EIGRP

If a video call lags or buffers, which part of the transport protocol works to report on that to remedy the situation?

RTCP

Which part of the transport protocol works in conjunction with signaling protocols in VoIP communications?

RTP

Select the term that best completes the sentence. RIP routers contain _____, a dynamic list of destinations that it can send data to.

Routing tables

Which acronym refers to the network name that your router broadcasts so you can find it?

SSID

Non-repudiation means putting measures in place to assure something cannot be denied. Which of these is a simplified method of non-repudiation?

Sending a letter through certified mail Sending a letter through certified mail, which requires the recipient's presence and signature, is one method of non-repudiation through non-digital channels.

Which two computers facilitate multiplexing and demultiplexing?

Sending and receiving Multiplexing is accomplished on the sending computer, and demultiplexing occurs at the receiving computer.

CAT 3 and CAT 5 belong to which of the following cable categories?

Shielded twisted pair cable Shielded twisted pair (STP) cables come with numbering; the higher the numbering, the better the interference prevention. For example, most computer networks go with CAT 3 or CAT 5.

Which of these is a type of attack that can start off as passive then turn active?

Sniffer

What is the primary use for UDP?

Streaming UDP is used mostly for streaming mediums as it is perfect for this type of network request.

The _____ of an IP address indicates the device.

Suffix The suffix of an IP indicates the device and is useful for the target device or other devices that are on the same network.

Which of the following is not an application layer protocol?

TCP

Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?

TCP/IP

When it comes to home networks, how is the primary IP address generated for all devices?

The ISP assigns a static address to the location, which is translated through a NAT.

How does the MAC Address differ from an IP address?

The MAC address is a hardwired number, permanent and unique to a device's NIC.

What is zero compression?

The ability to reduce zeros in an address in an IPv6 address

What is the 'local factor' in designing a network?

The infrastructure available locally through the local exchange carrier

Which of these statements is FALSE?

The network layer controls the conversations between different computers. * The network layer does all these things except controlling the conversations between different computers. That is done by the session layer.

At the 'receiving' computer, the transport layer provides input to which OSI layer?

The session layer

Which network topology uses concentration routers to interconnect star network WANs?

Tiered topology

When can a network security hardware appliance stop threats on the network?

When it is installed in line.

IMAP can allow a user with multiple devices to _____

access their emails simultaneously from any of the devices.

The unique identifier application to a specific network computer or node is the Network _____.

address

Wireless technology was created to eliminate cables, yet provide _____.

an identical set of features

Of the multiple different addressing types mentioned, which is the odd one out that has no purpose in future IPv6 networking solutions?

broadcast

EIGRP sends payloads from node to node in what manner?

by building a table based upon specific data sets like MTU, bandwidth, etc. and sending the packet along the best course determined by the table.

Which of the following wireless technologies would fit under the WAN category?

cellular Bluetooth and home routers are short-range, whereas cellular and satellite are long-range.

Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.

duplicate concurrent connections to the high level backbone routers

Padding data is required within an Ethernet frame to _____

fulfill minimum field length requirement Data and Pad - hold the actual data. This field requires a minimum field length and so Padding data is added to meet this.

Which command is used for identifying the MAC address of a system?

getmac

Where is the subnet address contained?

in the IP Address and is extracted via the Subnet Mask

A subnet mask _____

indicates the network address within the IP address

How do clients communicate with the server?

network

The _____ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.

physical

Consider a number of computers are in a network, and one computer crashes. In which of the following network topologies will the entire network also go down?

ring

A computer can be a web server if it:

services web page requests by clients connecting to it

One of the main disadvantages of the collapsed backbone is the _____.

susceptibility to complete system failure if the backbone router fails

A client/server system with a single server and multiple clients represent what tier in terms of network architecture?

two-tier A client/server system with a single server and multiple clients has two levels: level 1 is the clients and level 2 is the server. This represents a two-tier network architecture.

One of the most common applications of IMAP is:

Accessing and managing shared and public folders.

Which of these best describes Stuxnet?

Active threat

Which of the following statements is true?

Authoritative name servers respond to queries from recursive name servers Authoritative DNS name servers provide answers to the queries sent by the recursive DNS name servers with the IP address of the domain name quieried

Crosstalk and attenuation are NOT a problem in which of the following media?

Fiber optic cable

Security in a network ensures all of the following about the information that is passed around EXCEPT:

Affordability Security in a network ensures usability, reliability, integrity, and safety of the information that is passed around.

Which of the following is a transmission mode that transmits in two directions, but only in one direction at a time?

Asynchronous

Which of the following statements is true?

Authoritative name servers respond to queries from recursive name servers

How does the use of a router differ from a bridge in telecommunication?

A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.

_____ represents a standard IP address.

10101000.01001010.00000101.11100111 Typically, IP addresses are made up of 32 binary bits (1s and 0s computer uses to communicate). These 32 bits partly identify the host (street number) and partly identify the network (street name). The 32 bits are divided into octets (8-bit numbers) separated by a period.

What range of addresses can be issued to a class C network?

192.0.0.0-223.255.255.255

An IPv4 Address is how many bits in length?

32 bits Ipv4 stands for 4 octets of 8 groupings of 4 bits.

IPv4 represents a _____-bit integer and IPv6 represents a _____-bit alphanumeric string.

32,128

The _____ mail command starts the process of sending sequential lines of texts with the message

354

An IPv4 address contains _____ digits in _____ sets separated by a _____.

3; 4; period

An office operates on 3 floors of a building. It comprises 4 different departments. Which of the following network implementation will most suit the office needs?

4 VLANs on 4 switches with trunk link connections

What is the maximum number of IP addresses that can be assigned through means of IPv4?

4.3 billion

The link efficiency of a channel is 0.2 and bandwidth is 4000hz. What is the throughtput?

800hz Throughput = link efficiency * bandwidth = 0.2 * 4000 hz = 800 hz

Which two protocols are NOT backward compatible?

802.11a Protocol 802.11b

In terms of computer networking, what is a router?

A device that allows for several individual networks to be connected to each other.

If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?

A full mesh design.

If you didn't have access to a highly-skilled IT network team, what would be a good option for a WAN (Wide Area Network)?

A fully carrier managed WAN

Who was responsible for the creation of IPv4 protocols?

DARPA

What is one of the major differences between a DSL network and a cable network?

DSL only worked well if the modem was close to the main service area, cable does not have such restrictions.

In WANs, what advantage does the ring topology have over the bus topology?

Data transmission is multidirectional

Which computer network, built by a business, is used to interconnect its various company sites in order to share computer resources?

EPN

Which of the following media is comparatively cheaper, lighter and easier to install?

Twisted pair cable

Access a website by entering the _____ or _____ into the address bar of the Internet browser.

URL, IP address

How many nodes for a network would a /23 be good for address space in IPv4?

Up to 512 /23 is a borrowed down VLSM mask that can have upwards of 512 total addresses or as little as 257 total addresses.


Set pelajaran terkait

FL Health and Life Insurance Exam

View Set

Chapter 1: Making OB Work for Me

View Set

Chapter 4 : PowerShell Overview and Chapter 5 : Create and Run a PowerShell Script.

View Set

Cognitive Psych Quiz 2: Chapter 5

View Set

ACC 630 - Audit Practice Questions

View Set

Chapter 22: Pneumothorax, Hemothorax, and Flail Chest

View Set

Module 2: Connecting and Communicating Online

View Set