TCP/IP, Multiplexing, Linux, MacOS Complete Study Set

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Telnet default network virtual terminal (NVT) provides which fundamental characteristics? (Choose three.)

It embeds control commands in the data stream. The keyboard generates 128 ASCII codes. It transmits data as a 7-bit ASCII value in an 8-bit field

Which is the primary purpose of the Open Systems Interconnection reference model (OSI/RM) Session Layer?

It establishes, manages, and terminates dialogs between Presentation Layer entities.

Which best describes a BOOTP relay agent?

It forwards client BOOTREQUEST messages across subnet boundaries.

How does a transmission control protocol (TCP) application acknowledge the last message's receipt?

It increments the received sequence number by one and sends it in the response message's Acknowledgment Number field.

Which best describes the Telnet single commands options Do (253) code?

It indicates that the sending Telnet desires the other party perform some specified option.

Which best describes transmission control protocol's (TCP) use of the Window header field?

It is bidirectional, so both ends can control data flow.

Which of the following best describes a local area network (LAN)?

It is confined to a single building or a single floor of a building

What is the best description if the internet protocol (IP) address prefix?

It is the shorthand notation for the combined network and subnet mask.

How does network address and port translation (NAPT) handle an IP packet's source and destination port and IP addresses?

It leaves the destination port and address as is, and changes the source port and address to addresses from its address pool.

How does a router determine where to send packets addressed to hosts on remote networks?

It looks in its routing table for an entry for the destination network.

Which statement best describes an Open Shortest Path First (OSPF) area border router (ABR)?

It maintains a link-state database for each area to which it is connected.

Which statement correctly describes Class of Service (CoS) routing?

It makes routing decisions based on the packet's service category.

How does dynamic address translation enhance network security?

It only maps internal hosts to external addresses for the duration of the connection.

How does RIPv2 authentication protect routing table information?

It password protects routing table updates between routers.

Which statement best describes split horizons?

It prevents a router from advertising a route out to the interface on which the route was learned.

In what three ways does Open Shortest Path First (OSPF) control network routing table update traffic? (Choose three.)

It provides for partitioning networks into subdomains, called area routes. It supports multicast, rather than broadcast route update messages. It passes only route table changes, rather than entire tables.

How does virtual terminal protocol (VTP) support remote terminal access?

It provides generic terminal interfaces for data and control transfer.

The Open Systems Interconnection Reference Model (OSI/RM) Application Layer serves which primary purpose?

It provides the user interface to the system.

What happens if the retransmission timer set by the sending transmission control protocol (TCP) times out before it receives an acknowledgment.

It retransmits the outstanding segments.

Which of the following describes a Domain Name System (DNS) resolver?

It retrieves IP address information.

How does a transmission control protocol (TCP) process handle a failed connection?

It sends an RST segment when the maximum retry count is exceeded.

How does a sending transmission control protocol (TCP) process handle a zero receive window size?

It sends periodic probe segments and waits for an ACK with a nonzero window size.

How does the transmission control protocol (TCP) receiver control the data flowing from the source?

It sets the receive window size with each ACK segment it returns.

Which of the following best describes a metropolitan area network (MAN)?

It spans a single city and uses local telephone company facilities for connectivity

How does the Telnet network virtual terminal (NVT) support complex terminals?

It supports a 3-byte negotiation sequence.

The Open Systems Interconnection Reference Model (OSI/RM) Network Layer serves which primary purpose?

It uses Layer 3 (Network Layer) addresses to create multiple routed networks.

How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from forgery and interception?

It uses digital signatures and public-key encryption techniques.

The open system interconnection reference model (OSI/R<) Network layer serves which primary function?

It uses layer 3 addresses to create multiple routed networks

How does a network address translation (NAT) netmask work to map internal addresses to external addresses?

It works as an inverse mask, converting the internal network address portion to a public address.

What are the competing Linux desktop environments? (Choose two.)

KDE. GNOME.

What message type does border gateway protocol (BGP) send to test a connection's state?

KeepAlive.

Which of the following is developed as a CD-based Debian like distribution, or design, to run off the CD drive?

Knoppix

Which three of the following open systems interconnection (OSI) model layers do routers support? (Choose three.)

Layer 1, the Physical Layer. Layer 2, the Data Link Layer. Layer 3, the Network Layer.

In the five-layer hierarchy of Appl's operating systems, Mac OS X/macOs, which layer is most complex?

Layer five, the application layer containing Cocoa and Carbon.

Dense WDM

Less than 0.8 nm n DWDM applications, the wavelength spacing is typically specified by gigahertz (GHz) instead of wavelengths. While 12.5 GHz channel spacing is the closest spacing specified in ITU-T G.694.1, most deployed DWDM networks use 200 GHz (20 channels), 100 GHz (40 channels), or 50 GHz (80 channels) spacing.

In a link-state algorithm (LSA) shortest path first (SPF) tree, which three of the following are metrics the router uses to describe the cost to reach each destination network? (Choose three.)

Line speed. Line delay. Hop counts.

The broadcast packets used by link-state protocols to share routing information about neighbor routers are called what?

Link-state Algorithms (LSA).

Which advanced routing function allows for redundant paths between networks?

Load splitting.

Port addresses and network addresses are two types of :

Logical addresses

A file transfer protocol (FTP) server administrator can control server access in which three ways? (Choose three.)

Make only portions of the drive visible Control read and write privileges Limit file access

Which three of the following are network management model components for Simple Network Management Protocol (SNMP)? (Choose three.)

Managed devices. Network management station (NMS). Network management protocol.

Simple Network Management Protocol (SNMP) gathers network information from what type of database?

Management information base (MIB).

Which of the following is NOT a Gigabit Ethernet Physical Layer function?

Media access control (MAC) address assignments

Which three of the following terms refer to a physical address? (Choose three.)

Media access control (MAC) address. Adapter address. Hardware address.

A classful routing protocol can pass which three types of information in its routing table update messages? (Choose three.)

Metrics. Network numbers. Autonomous system (AS) numbers.

Which two of the following are examples of email programs? (Choose two.)

Microsoft Outlook UNIX Sendmail

Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported data types? (Choose two.)

Moving Picture Experts Group (MPEG). Graphics interchange format (GIF).

A Class D address is also known as which type of address?

Multicast

Which routing type allows networks to recover from failed routes?

Multipath routing.

Which Domain Name System (DNS) record lists a zone's name servers?

Name server (NS).

Which command can we use in conjunction with the address resolution protocol (ARP) command to determine the hostname of a cached NetBIOSover-IP address?

Nbtstat -A <IPaddress>.

Which are TCP/IP network troubleshooting tools? (Choose three.)

Netstat. Ping. Tracert.

Which TCP/IP protocol has us attach a remote device to the local file system by mounting it?

Network File System (NFS).

A web browser client sends a web page request message to a hypertext transfer protocol (HTTP) server. In which order will the server decapsulate the request message?

Network Interface Layer, Internet Layer, Transport Layer, Application Layer.

Which TCP/IP Application Layer protocol allows companies to publicly post information over the Internet?

Network News Transfer Protocol (NNTP)

Which TCP/IP application distributes news articles read from a central database?

Network News Transfer Protocol (NNTP).

Which network address translation (NAT) address mapping technique maps internal IP addresses to a single, external IP address?

Network address and port translation (NAPT).

What three addresses are needed to move data from one application to another across a network?

Network address, network interface card (NIC) address, process address

What are the most common types of applications that run on Linux?

Network applications.

Which device provides the connection point between a workstation or personal computer (PC) and the network?

Network interface card (NIC).

Which network device requires a device driver in order to connect hosts to the network segment?

Network interface card (NIC).

Can the "arp" command be used to determine your own media access control (MAC) address?

No

What is a benefit of using static routes?

No bandwidth usage passing updates between routers.

What synchronous optical network (SONET) standard is 10GBase-EW/LW/SW compatible?

OC-192

With what SONET standard is 10GbE compatible?

OC-192

Link-State Advertisement Types in OSPF

OSPF defines five packet types: Hello, Database Description, Link State Request, Link State Update, and Link State Acknowledgment. All but the Hello packets pass LSA information. All packets carrying LSA information must include a 20-byte LSA message header as part of the message payload.

An Open Shortest Path First (OSPF) autonomous system border router (ASBR) runs which two routing protocols? (Choose two.)

OSPF on interfaces on its own autonomous system (AS). Exterior Gateway Protocol (EGP) on interfaces on other autonomous systems (AS).

Match the well known user datagram protocol (UDP) port numbers with their associated application.

Port 53—DNS Port 67 -Bootstrap Protocol (BOOTP) or Dynamic Host Configuration Protocol (DHCP) Server port 68 -Bootstrap Protocol (BOOTP) or Dynamic Host Configuration Protocol (DHCP) Client Port 69—TFTP Port 123—Network Time Protocol (NTP) Port 161—SNMP

Which one of the following protocols allows email clients to download their messages from an email server?

Post Office Protocol version 3 (POP3)

Which two protocols deliver email directly to the email client? (Choose two.)

Post Office Protocol version 3 (POP3). Internet Message Access Protocol version 4 (IMAP4).

Which of the following functions is not represented by code stored in the /Library directory?

Printer Drivers

What is the Telnet character device responsible for displaying incoming data?

Printer.

Remote monitoring (RMON) uses which devices, placed on remote network segments, to gather network information?

Probes.

Internet Protocol (IP) and x.25 are considered to be which of the following?

Protocols for the network layer.

Which statement best describes proxy address resolution protocol (ARP)?

Proxy ARP allows a router to answer an ARP request on behalf of a remote host.

A host on the local IP network segment has data to send to another host, located on another IP network. The source host needs to resolve the destination host's IP address to a media access control (MAC) address. Which protocol might the gateway router run in order to answer the local host's address resolution protocol (ARP) request?

Proxy ARP.

Which choice best describes a Simple Network Management Protocol (SNMP) proxy agent?

Proxy agents translate between SNMP and proprietary management systems.

Which transmission control protocol (TCP) function forces data delivery before filling the transmit buffer?

Push

Which two flags can a sending application set to force the transmission control protocol (TCP) process to send data before filling the transmit buffer? (Choose two.)

Push (PSH). Urgent (URG).

Which is the file transfer protocol (FTP) command used to place files on an FTP server?

Put.

Which command does the sender Simple Mail Transfer Protocol (SMTP) issue to terminate the transmission control protocol (TCP) connection?

QUIT.

Which Simple Mail Transfer Protocol (SMTP) command does the sender process use to identify separate recipient mailboxes?

RCPT.

RIP Updates

RIP routers pass routing updates to and from user datagram protocol (UDP) Port 520 RIP routers send routing updates to adjacent routers every 30 seconds, by default. RIP defines two message types: request messages and response messages.

RIP-Routing Information Protocol

RIP was designed to pass routing information inside of small, 15-hops or less autonomous systems (AS). RIP is a Distance Vector Algorithm (DVA) routing protocol used by transmission control protocol/Internet protocol (TCP/IP) networks. It was originally developed for Berkeley UNIX systems and was named in part for the UNIX daemon program called routed (pronounced "route d").

In which three of the following ways does RIPv2 differ from routing information protocol (RIP)? (Choose three.)

RIPv2 adds a Route Tag routing table entry. RIPv2 supports variable length subnet masks. RIPv2 provides update message authentication.

How does remote monitoring 2 (RMON2) differ from remote monitoring (RMON)?

RMON2 looks at Layer 3 traffic, while RMON only looks at Layers 1 and 2.

Of the five trivial file transfer protocol (TFTP) packet types, which three choices below are TFTP packet types? (Choose three.)

Read request Write request Acknowledgment **Error **Data

Which two of the following are the interior gateway routing protocol (IGRP) default metrics? (Choose two.)

Bandwidth Delay

Which three of the following cost factors might least cost routing use to calculate a minimum-cost path for a packet? (Choose three.)

Bandwidth. Delay. Cash costs.

Which is another name for the decimal number system?

Base 10

Which is another name for the binary number system?

Base 2

Why are routers known as neighbors or peers?

Because they exchange routing information

Which of the following is another name for a distance vector algorithm (DVA)?

Bellman-Ford algorithm.

Course WDM

Between 0.8 nm and 50 nm used in large metropolitan networks, utilizing wavelengths that are in the E-band (1,360 nm to 1,460 nm). The the ITU G.694.2 standard specifies 20 nm channel spacing and 18 channels.

What are the common File Extensions used to transfer image data in the file transfer protocol (FTP)?

Bitmap (.BPM), Graphics interchange format (GIF) and joint photography experts group (.JPG or .JPEG)

Which TCP/IP protocol allows a diskless workstation to discover its IP address, as well as download a boot file?

Bootstrap Protocol (BOOTP).

Which of the choices below is an example of an exterior gateway protocol (EGP)?

Border gateway protocol (BGP).

A router that an administrator designates to forward packets between autonomous systems (AS) is called what?

Border system (BS).

Which three of the following networking devices break up collisions? (Choose three.)

Bridge Switch Router

Which network device allows us to connect dissimilar network topologies?

Bridge.

Address resolution protocol (ARP) requests are sent as which type of Ethernet frame?

Broadcast

Layer 3 switches do a good job of containing which of the following?

Broadcasts

A peer-to-peer network is a practical solution in which of the following applications? (Choose two.)

Building a simple network supporting a few clients accessing a shared printer Creating an inexpensive solution for a small business just starting out

How does frequency division multiplexing (FDM) enable multiple signals to share a common medium?

By assigning each signal a specific frequency or band of frequencies called a channel.

Bridges and OSI/RM Layer 2 switches filter traffic in which way?

By building physical address to port mappings and making forwarding decisions based on these mappings.

How does a diskless workstation identify itself when requesting an IP address using reverse address resolution protocol (RARP)?

By its media access control (MAC) address.

How does the Domain Name System (DNS) resolve fully qualified domain names (FQDN) to IP addresses?

By looking up the names in an address mapping database.

In which two ways does a Simple Network Management Protocol (SNMP) agent respond to the management station? (Choose two.)

By responding to the management station's requests for updated data By trapping information that exceeds a set threshold and forwarding the data to the management station

Type of Service (ToS) - Values

By setting or clearing different combinations of bits in the ToS field, a host can select up to 16 different types of routing service. Each ToS, from ToS 0 to ToS 15, is the decimal equivalent of its 4 bit field value )Example: ToS 0 - 0000 Default: All factors normal

Where are Ethernet frames processed?

By the network interface card (NIC) at the Data Link Layer

Which file transfer protocol (FTP) command allows you to change directories within a file listing?

CD

The IEEE 10GBaseT networks operate over which type of cabling?

Category 6 unshielded twisted-pair (UTP).

What are the units called that transport asynchronous transfer mode (ATM) data?

Cells

Transmission control protocol (TCP) includes which three types of mechanisms to ensure reliable data transmission? (Choose three.)

Checksum Acknowledgements Sequence number

In which instance could you use Enhanced Interior Gateway Routing protocol (EIGRP) as a routing protocol?

Cisco routers in the same autonomous system (AS) as other Cisco routers.

In which instance could you use Interior Gateway Routing Protocol (IGRP) as a routing protocol?

Cisco routers in the same autonomous system (AS) as other Cisco routers.

Which element keeps most of the optical signal internally reflected within the core?

Cladding

The address 68.56.189.17 belongs to which IP class

Class A

Complete Class A Subnets Table

Class A has 22 usable subnets

Where is the time dimension?

Click on image

In a client/server arrangement, where are requests normally generated?

Client

Which wavelength division multiplexing (WDM) scheme operates over wavelengths that are compatible with multimode and single-mode fiber?

Coarse wavelength division multiplexing (CWDM) operates over wavelengths that are compatible with multimode and single-mode fiber.

Devices connected to hubs share the same:

Collision domain

What is the Linux Shell?

Command interpreter and scripting language.

Which three of the following are common Telnet application uses? (Choose three.)

Connect to an online database Connect remotely to run a specific application Connect to a router for network information

Which of the following are the three Simple Mail Transfer Protocol (SMTP) mail transfer phases? (Choose three.)

Connection closure. Data transfer. Connection establishment.

The concept of a virtual terminal allows for which of the following? (Choose two.)

Connectivity to multiple host computers Multitasking host computers

Physical Layer protocols

Digital subscriber line (DSL) Integrated services digital network (ISDN) Serial connections like RS-232, RS-422, etc. T-carriers and E-carriers Synchronous optical networking (SONET) Analog modem signaling over telephone lines Broadband cable modem signaling over coaxial and fiber-optic cable networks.

Simple mail transfer protocol (SMTP) is which type of message delivery system?

Direct delivery

What type of network communication does not require a router's services?

Direct routing.

ipconfig (interface configuration)

Displays addressing information on a Microsoft host computer, including Internet protocol (IP) address, subnetmask, and default gateway. A similar Linux command, interface configuration (ifconfig), displays information about the system network interface cards (NIC).

Border gateway protocol (BGP), though an exterior gateway protocol (EGP), operates as which type of routing protocol?

Distance Vector Algorithm (DVA).

what does the Domain Name System (DNS) allow users to do?

Distinguish between two similar names

What services on an Apple Mac OS X/macOS server enables multiple computers to work together on a single task?

Distributed computing with Xgrid.

If the number of hosts per subnet exceeds 255, how might you solve for the subnet incremental range?

Divide the number of hosts by 256.

Host names and uniform resource locators (URL) are resolved to internet protocol (IP) addresses by which of the following?

Domain Name System (DNS)

To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers contact which type of TCP/IP application server?

Domain Name System (DNS).

What network and virtual private network (VPN) services does and Apple Mac OS X/macOS server employ?

Domain name system (DNS), dynamic host configuration protocol (DHCP), network address translation (NAT), firwalling, and network time protocol.

Network News Transfer Protocol (NNTP) allows TCP/IP users to perform which of the following?

Download news articles.

Which two choices are examples of trivial file transfer protocol (TFTP) use? (Choose two.)

Download router upgrades. Software upgrades to IP telephones.

Which of the following services is not included in Mac OS X server?

Dual Boot.

Which Dynamic Host Configuration Protocol (DHCP) network address allocation mechanism assigns a host a temporary IP address?

Dynamic

What does Linux use for automatically configuring a client personal computer (PC) Internet protocol (IP) address?

Dynamic Host Configuration Protocol (DHCP).

Which protocol allows clients to locate and download IP addressing and configuration information on an automatically renewable (lease) basis?

Dynamic Host Configuration Protocol (DHCP).

Which TCP/IP client/server service would allow an administrator to quickly reconfigure host configuration information?

Dynamic host configuration protocol (DHCP).

In order to automatically build a routing table, which type of indirect routing must a router use?

Dynamic.

Which Dynamic Host Configuration Protocol (DHCP) address allocation method assigns reusable addresses to DHCP clients?

Dynamic.

Which routing type allows network administrators to implement route load balancing and fault tolerance?

Dynamic.

Coarse wavelength division multiplexing (CWDM) applications were expanded to include use in large metropolitan networks, utilizing wavelengths in what band?

E-Band

EIGRP Four Basic Components

EIGRP has four basic components:

EIGRP Packet Types

EIGRP uses five different packet types:

All Computers running on the transmission control protocol (TCP/IP) suite have which of the following in common?

Each computer is assigned its own internet protocol (IP) Address

In a subnetted Class B network, in what state will the host bits be on each subnet's broadcast address?

Each subnet's host bits are set to all 1s.

A ping command uses which Internet Control Message Protocol (ICMP) message types? (Choose two.)

Echo Request. Echo Reply.

When an application is sending data to a distant computer, what process occurs on the sending node?

Encapsulation

Which of the following protocols scales better within a Cisco autonomous system?

Enhanced Interior Gateway Routing Protocol.

Which of the following statements is incorrect regarding Ethernet?

Ethernet can only be used with Category 5E unshielded twisted-pair (UTP) cable.

Which of the following statements are true concerning Ethernet networks? (Choose two.)

Ethernet can use thicknet, thinnet, or twisted pair cable at the Physical Layer. Media access control (MAC) frames are transmitted across the physical media.

IEEE Ethernet 802.xxx Specification table

Ethernet has evolved into a series of standards administered by the Institute of Electrical and Electronics Engineers (IEEE) The world's largest technical professional association composed of engineers, scientists, and allied professionals dedicated to advancing innovation and technological excellence for the benefit of humanity via publications, conferences, technology standards, and professional and educational activities. defined under IEEE 802.xxx specifications

What is the most widely installed local area network (LAN) technology?

Ethernet.

With the subnet mask 255.255.255.128, how frequently will the Class B subnets increment, and in which octet?

Every 128 hosts; third and fourth octets.

By default, how frequently do routing information protocol (RIP) routers send out response messages to neighbor routers?

Every 30 seconds

Which program displays all current desktop windows across the desktop?

Expose'

Which of the following protocols do autonomous systems (AS) use to exchange routing information between themselves?

Exterior gateway protocol (EGP).

FTP Function

FTP is a TCP/IP application FTP has the following objectives: File sharing Remote access to files A file storage technology that is transparent to the user Reliable and efficient transfer of data FTP can also be used for program-to-program data transfer. Data can be in the form of text files, encoded data, or programs. FTP uses two TCP connections: Control commands Data transfer

Under what license is Linux released?

GNU General Public License (GPL)

Which protocol data unit (PDU) type requests that the management agent return attribute values for a list of managed objects?

GetRequest.

Which of the statements below is incorrect when comparing Gigabit Ethernet to Fast Ethernet technology?

Gigabit Ethernet uses the same speed as Fast Ethernet

Wide WDM

Greater than 50 nm, Used in passive optical network (PON) installations such as for transporting television signals and high-speed data (HSD) signals from the headend throughout the network and HSD signals from connected premises back to the headend.

Which two of the following result from using Open Shortest Path First (OSPF) routing areas? (Choose two.)

Greatly reduced routing information traffic within the entire autonomous system (AS). The development of a routing information hierarchy.

Which of the following best describes the functionality of a virtual local area network (VLAN)?

Grouping nodes logically that may be physically separated

Which H.323 recommendation protocol handles registration, admission, and status (RAS)?

H.225

Which protocols assist H.323 in controlling and monitoring connections? (Choose two.)

H.225 H.245

Which Simple Mail Transfer Protocol (SMTP) command identifies the sending host?

HELO

When network address translation (NAT) uses IP (internet protocol) address translation, it assigns external address to internal devices in which way?

It assigns to one of a pool of external addresses

If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the 50-percent point, what happens next?

It attempts to obtain a lease at 87.5-percent lease time.

The Open Systems Interconnection Reference Model (OSI/RM) Data Link Layer serves which primary purpose?

It builds a flat network model with unroutable physical addresses.

Which statement best describes 10 Gigabit Ethernet (10GbE)?

It can be used in place of Fiber Channel (FC) as a storage attachment technology.

How does the user datagram protocol (UDP) support multiple application destinations on the same host?

It carries port numbers in its header, used to logically address a destination application.

Which statement best describes an Open Shortest Path First (OSPF) virtual link?

It connects area border routes (ABR) over a non-backbone area.

Which is the primary purpose of the Open Systems Interconnection reference model (OSI/RM) Presentation Layer?

It defines the format in which Application Layer information is sent across the network.

Which of the following is the primary purpose of the Open Systems Interconnection Reference Model (OSI/RM) Transport Layer?

It defines well known logical port addresses for communications between applications.

Which mode of fiber-optic cable is used throughout the telecommunications industry because of its increased signal capacity, low signal attenuation, and low manufacturing costs?

Single-mode fiber-optic cable is used throughout the telecommunications industry because of its increased signal capacity, lower signal attenuation, and lower manufacturing costs than multimode optical fiber.

Review the electromagnetic spectrum. Where is the optical

Single-mode optical fiber transports wavelengths at 1,310 nm and 1,510 nm

Which Linux distribution has the distinction of being the oldest surviving Linux distribution that is k now for its stability?

Slackware

What two popular Linux distributions use installation mechanisms other than Red Hat and Debian?

Slackware. Gentoo.

Which communication process typically is the least intelligent?

Slave

Which two statements are true concerning distance vector algorithm (DVA) routing protocols? (Choose two.)

Slow convergence can cause such problems as routing loops and lost packets. They usually require fewer router resources to compute the best path to a destination network than do other routing protocols.

What file handles Samba Server Configuration in Linux?

Smb.conf

What does Red Hat's Bluecurve technology do?

Smooths over the differences between KDE and GNOME.

What open source mail filter does an Apple Mac OS X/macOS server use for junk mail filtering?

SpamAssassin

You are troubleshooting a name resolution problem on your local network. You run two internal Domain Name System (DNS) servers, and they resolve all local hostnames. Where would you look to verify that your Windows clients are configured to use the correct DNS servers?

The ipconfig response.

Where does the Domain Name System (DNS) namespace begin?

The root.

What can cause routing loops in the flat router architecture?

The router receives data packets before it receives routing information, causing the router generate additional address request messages for routing information

A router makes its packet forwarding decisions based on what information?

The router's routing table.

A router makes its packet forwarding decision based on what information?

The routers routing table

Given the IP address 67.89.124.189 and the subnet mask 255.224.0.0, which is the subnetted octet, and how frequently will it increment?

The second octet, by 32.

What happens first when an IP host needs to resolve an IP address to a media access control (MAC) address?

The sending host looks in its address resolution protocol (ARP) cache for the necessary mapping.

In which two ways might using static routes provide additional network security over other routing options? (Choose two.)

They can limit packet traffic to only a single, dedicated route. They share no routing information with other routers.

Which best describes Telnet's use of subnegotiations?

They can vary in length and format.

Which statement is true concerning 10 Gigabit Ethernet (10GbE) Multi-Source Agreements (MSA)?

They describe vendor-developed pluggable optics for interconnecting 10GbE devices.

EIGRP Tables

When EIRGP routing tables are updated, the collected information is stored in three tables.

Administrative Distances (AD)

When a router table contains multiple entries to a destination network, each obtained from a different routing protocol or static configuration, routers use administrative distances (AD) to choose the most trustworthy or reliable route.

In Simple Network Management Protocol (SNMP), when do passive management agents take action on their own initiative?

When certain well-defined error conditions occur the generate an unsolicited message called a trap.

When a client connects to a web browser, the first action is typically media access control (MAC) address resolution. Under what circumstance may address resolution be bypassed?

When the client has recently made a request to the same server

In which cases will a BOOTP relay agent discard a BOOTREQUEST message? (Choose three.)

When the destination port is 68. If the OpCode is not 1 or 2. If the Hop count field value exceeds 16.

Which is the best reason to use the file transfer protocol (FTP) application?

When you need to pass large files over a slow connection

Which of the following Dynamic Host Configuration Protocol (DHCP) codes carries vendor-specific options in a private network?

codes 128-256

What entry would be made to log each hop aong the way to a specific internet site?

enter "tracert" followed by a host name for the internet site

What are some of the common applications included with Mac Os X/macOS in an Apple computer?

iMovie, itunes, and GarageBand.

Which of the following applications is not part of the Apple iLife Suite as included with the macOS operating system?

iTunes

In which three ways do organizations benefit from using private IP addresses? (Choose three.)

They gain more network design flexibility with a large address range. They prevent Internet address clashes when obtaining only a small range of Internet Corporation for Assigned Names and Numbers (ICANN) assigned addresses. They conserve public IP addresses when uniqueness is not required.

Which statement best describes transmission control protocol's (TCP) use of sequence numbers?

They identify the sequence number of the first data byte in the segment.

If a Class B address's subnet mask is 255.255.254.0, in which octet does our subnet portion increment?

Third

If a Class B address's subnet mask is 255.255.255.192, in which octet does the subnet portion increment?

Third and fourth.

What makes time division multiplexing (TDM) ideal for applications that use circuit and packet switching protocols?

Time slot allocation.

What is the purpose of a Boot Camp installation?

To allow newer Microsoft operating systems to boot on Apple hardware

Why does Internet Control Message Protocol (ICMP) use identifier and sequence numbers?

To allow the sender to match ICMP reply messages with requests.

Which two of the following are reasons why an organization would choose to subnet their network? (Choose two.)

To build a more scalable network To conserve network addresses

For what purpose would you choose to run the Telnet application?

To configure a router.

Binary to Decimal Conversion Table

To convert binary to decimal, the simplest method is to sum the decimal representation of each binary place value.

For what application is file transfer protocol (FTP) an excellent choice?

To download large files.

Exterior Gateway Protocols (EGP)

To enable communication between routers that belong to different AS's requires an additional protocol. Exterior neighbors connect to the outer border of their respective AS's.

What is the purpose of the frame check sequence (FCS) field? (Choose two)

To ensure the Ethernet frame does not get processed if an error has occurred. To check the Ethernet frame for errors using a cyclic redundancy check (CRC).

Data Link Layer

To form a frame, the Data Link Layer encapsulates a Network Layer packet within a header and trailer. The header contains the hardware address of the destination node. The trailer called the frame check sequence (FCS) contains a cyclic redundancy check (CRC) value that the receiving node uses for error detection. The Data Link Layer is the only layer that adds a trailer to the data it transmits. Each frame carries a packet of data across a single physical link. The encapsulated packet remains mostly unchanged, but a new frame is built around the packet for the trip across each link. Thus, we often say that the Data Link Layer is concerned with transmitting data to the very next node in the network.

What is the primary reason to build a virtual local area network (VLAN)?

To minimize broadcast traffic.

Why might we use Internet Control Message Protocol (ICMP) testing on an IP network?

To obtain feedback about various problems that might occur on the network.

Why would you use a Bootstrap Protocol (BOOTP) relay agent on your network?

To pass BOOTP messages between subnets

When troubleshooting, why is it important to recreate a problem?

To recognize that there is a problem. To record the circumstances in which the problem occurred. To help focus your efforts.

Why did the Internet Engineering Task Force (IETF) design classless interdomain routing (CIDR)?

To reduce routing table entries.

When might you use the rlogin TCP/IP application?

To remotely connect one UNIX workstation to another.

What is the preamble used for?

To synchronize Ethernet network interface cards (NIC) so the bits that make up the frames are received correctly.

What is the primary reason an Ethernet network interface card (NIC) transmits a jamming message?

To warn other stations that a collision has been detected.

Which version of the packet-based multimedia communications system, covered by the H.323 standard, was the first to standardize requirements for communications between a PC-based Telephone and a Telephone on the switched circuit (SCN) of the public telephone system?

Version 2

Which IP packet frame field ensures that the gateways handling a datagram agree on the datagram's format?

Version.

Transmission control protocol (TCP) establishes which type of circuit between applications?

Virtual

Which protocol reduces the number of client terminal protocols the remote host must support?

Virtual terminal protocol (VTP).

Which Linux tool allows you to run Windows applications natively on an x86 platform?

WINE

What process takes the optical output from multiple lasers operating at different wavelengths and transports them over a single, common optical fiber?

Wavelength division multiplexing (WDM) is a process wherein the optical output from multiple lasers operating at different wavelengths is combined and transported over a single, common optical fiber.

Which IEEE 802.1p traffic class represents standard data (best effort) traffic?

0

which network address represents a default route?

0.0.0.0/0

Which two of the following are considered reserved IP addresses? (Choose two.)

0.x.y.z 127.x.y.z

How would IP multicasting map address 224.0.0.1 to an Ethernet multicast address?

01:00:5E:00:00:01

What server management services are installed on an Apple Mac OS X/macOS server?

Simple network management protocol version 3 (SNMpv3), Secure shell access, and server monitor.

Quality of Service (QoS) routing uses which Internet protocol (IP) header field to make route decisions?

Type of Service (ToS).

Which three modes does file transfer protocol (FTP) use to transfer data? (Choose three.)

Stream. Block. Compressed.

On which network type is a static route best used?

Stub

On which network type is a static route best used?

Stub.

Which OSI/RM Data Link Layer 2 device creates multiple network segments, each offering the full network bandwidth?

Switch

Which three devices forward broadcast traffic? (Choose three.)

Switch. Bridge. Repeater.

Which two of the following are examples of relative domain names in the ncti.com domain? (Choose two.)

telnet telnet.ncti

How TCP/IP Applications Work - Lesson 7

#105-114

Introduction to Multiplexing - Lesson 9

#127-136

RIPv2 (Routing Information Protocol version 2)

(RIPv2) was created to handle this additional routing information. The four elements added to RIPv1 to create RIPv2 were: Route tag Subnet mask Next hop Authentication RIPv2 allows the smaller, simpler DVA protocol to be used in environments that require authentication or use of variable-length subnet masks (VLSM). RIP version 2 multicasts the entire routing table to all adjacent RIP routers using multicast address 224.0.0.9.

What is the advantage of a switch over a standard hub? (choose two)

Switches isolate traffic per port. Switches can improve network performance by keeping individual workgroup traffic local.

Digital Signal Designation, T-Carrier, Voice Channels, and Data Rate Table

T-carriers were developed by the telephone industry as an economical and efficient solution for growth in the telephone network without adding voice cable pairs between switching offices.

Which multimedia protocol specifies a multipoint conferencing transport?

T.120

Which are the well know transmission control protocol (TCP) ports for file transfer protocol (FTP) server control and data? (Choose two.)

TCP Port 20 TCP Port 21

The Simple Mail Transfer Protocol (SMTP) receiver accepts incoming email on which well known port?

TCP Port 25

Before data can be sent between applications using transmission control protocol (TCP), which of the following must occur?

TCP connection must be established.

What is the primary difference between transmission control protocol (TCP) and user datagram protocol (UDP)?

TCP messages are tracked to ensure they are received; UDP messages are sent without tracking.

Which application protocols does file transfer protocol (FTP) use on its command channel?

Telnet

Which TCP/IP application allows a network user to remotely log on and manipulate a network device?

Telnet.

An H.323 multipoint control unit (MCU) provides which service on a converged network?

Terminal conferencing.

What is Linus networking based upon?

Text commands and configuration files.

What is the difference between the frame formats of 10 Mbps Ethernet and 100 Mbps Ethernet?

The 10 Mbps Ethernet frame is exactly the same and contains the same fields as the 100 Mbps frame.

Which address resolution protocol (ARP) feature allows the local host to maintain a mapping of recently discovered IP-to-media access control (MAC) addresses?

The ARP cache

Application Layer

The Application Layer contains programs that invoke the underlying services of the network protocol stack. Some of these applications are proprietary and written specifically for one network, while others are globally used standard applications. When these applications need to communicate with peers over the network, they use their own application layer protocol, plus the services of the lower layer protocols. Application Layer programs include: User applications, such as email or file transfer, provide standard services directly to the user. Each of these applications has its own Application Layer protocol. Application services, such as web servers or file servers, provide services to other applications, but not directly to the user. These facilities simplify application development by allowing programmers to use a common service rather than duplicating the same features in every application.

The most commonly used dense wavelength division multiplexing (DWDM) channels in broadband cable networks are in which band?

The C-band (1,530 to 1,565 nm)

Transmitting messages to a from a sending computer process to a receiving computer process is the function of which layer of the open system interconnection (OSI) model?

The Transport layer.

What happens when the browser application finishes downloading the files necessary to display a web page?

The browser and server drop the connections, and the browser maintains the page and its elements in local memory

Which portion of optical fiber surrounds the core and keeps most of the optical signal internally reflected within the core?

The cladding, which surrounds the core, has a lower refractive index than the core, keeping most of the optical signal internally reflected within the core.

What is the Dynamic Host Configuration Protocol (DHCP) client/server components?

The client requests parameters and the server provides the parameters

What caused orthogonal frequency division multiplexing (OFDM) to lay dormant for several years after it was conceptualized?

The complexity in executing fast Fourier transforms (FFT) caused OFDM technology to lay dormant after it was conceptualized until digital signal processing became available.

What Happens to a diagram sent by a higher level protocol to a 127.x.y.z adress

The datagram loops back inside the host and never leaves the (NIC)

When subnetting Class B addresses, what is the first subnet's wire address equal to?

The default network wire address.

In a set of subnet address ranges, which is the first wire address in the first subnet?

The default network's wire address.

When subnetting Class A addresses, which two of the following is the first subnet's wire address equal to? (Choose two.)

The default wire address. Netid.0.0.0.

Telnet Options

The defined Telnet options can be roughly divided into three major groups: Options that modify the default NVT, such as RFC 857, which controls echoing of data received or sent Options that modify Telnet transfer procedures, such as RFC 858, which eliminate the Go Ahead (GA) command and makes transmission full-duplex Options that allow information that is not part of the user data or transfer protocol to be defined and transmitted over the Telnet connection, such as RFC 859, which allow status information to be sent over the link The Select Assigned Telnet Options Table lists many of the popular Telnet options.

What characterizes a connection-oriented time division multiplexing (TDM) application?

In a connection-oriented TDM application the packets are transported over a preselected path established between their source and destination.

What is an inefficient characteristic of conventional, or synchronous time division multiplexing?

In conventional, or synchronous TDM, the time slots on the output of the multiplexer can be allocated to sources without data, creating empty time slots.

Why would you replace a hub with a switch?

Increase local area network (LAN) performance.

Which three of the following are advantages of remote terminal access (Telnet) over direct terminal-to-host access? (Choose three.)

Increased user productivity Access to multiple, separate sites from the same terminal Reduction in the number of physical terminals

By the time the message is transmitted across cable, where will you find an Internet protocol (IP) packet?

Inside a frame.

Which Router protocol type shares routing information within the autonomous system (AS)?

Interior Gateway Protocol (IGP)

Which of the following is the generic routing protocol type that routers use to communicate within an autonomous system (AS)?

Interior gateway protocol (IGP).

Which router protocol type shares routing information within an autonomous system (AS)?

Interior gateway protocol (IGP).

Which three of the following are interior gateway protocol (IGP) examples? (Choose three.)

Interior gateway routing protocol (IGRP). Routing information protocol (RIP). Open shortest path first (OSPF).

What are routers that belong to the same autonomous system (AS) called

Interior neighbors

A router that can receive packets from a neighboring router and forward them to at least one other router is called what?

Intermediate system (IS).

Which IP protocol will a router use to inform neighbor routers of congestion on an interface?

Internet Control Message Protocol (ICMP).

Which TCP/IP Internetwork Layer provides troubleshooting utilities, such as ping and traceroute?

Internet Control Message Protocol (ICMP).

Network Layer protocols

Internet Control Message Protocol (ICMP)—Allows status and error messages to flow between networks. Both ping and traceroute use ICMP messages to test connectivity. Internet Group Management Protocol (IGMP)—When hosts join the appropriate address group, routers will forward messages to the group members. Internetwork Packet Exchange (IPX)—IPX was Novell NetWare's proprietary Network Layer protocol. IP version 4 and IP version 6—IP is the primary Layer 3 protocol used across the Internet and LANs - having replaced other proprietary network layer protocols. Internet protocol security (IPsec)—A security enhancement to IPv4 and integrated within IPv6, IPsec offers authentication and/or encryption. Routing Protocols—Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), open shortest path first (OSPF), routing information protocol (RIP). X.25—X.25 is an older packet switching protocol that has been largely replaced by faster protocols based on the same basic packet approach.

Which statement is true concerning IP routing?

The destination and source media access control (MAC) addresses change at each hop.

Why might a device send an Internet Control Message Protocol (ICMP) source quench message?

The device does not have the buffering capacity to forward a datagram.

Which of the following commonly is used to classify networks?

The distance between the computer and the server***WRONG*** Might be - The distance between communicating computers. This is the key tip from text - Networks can be classified by the distance separating the network nodes.

A Domain Name System (DNS) start of authority (SOA) entry indicates which of the following?

The domain's primary DNS

What network Information can be determined from a logical Internet protocol (IP) address?

The host portion and network portion

What network information can be determined from a logical internet protocol (IP) address?

The host portion and network portion

Which two statements are true concerning IP addressing? (Choose two.)

The host portion should not be all 1s. The network portion bits should not be all 0s.

A subnet's broadcast address has which portion's bits set to all ones?

The host portion.

A Store-and-foward email system will not deliver messages until

The host requests the information

Which statement best describes Handshake #1?

The initiator sends a SYN segment to the target host's transmission control process (TCP) process.

Which three of the following are included in the TCP/IP Internetwork Layer? (Choose three.)

Internet Group Management Protocol (IGMP). Internet protocol (IP). Address resolution protocol (ARP).

Which email protocol enables the messages to be viewed without first downloading them from the email server?

Internet Message Access Protocol version 4 (IMAP4)

Which capability is NOT provided by Layer 3 switching.

Internet protocol (IP) to name resolution for forwarding.

A file transfer protocol (FTP) control port is used by an FTP server to perform which of the following?

Interpret requests from a client.

Which of the troubleshooting utilities presented is frequently used as starting point for transmission control protocol/internet protocol (TCP/IP) network problem isolation to learn what network a device resides on?

Ipconfig

Which utility should be run to verify that your windows client is configured to use the correct domain name system (DNS) sever?

Ipconfig

Which troubleshooting step is likely to require the most time?

Isolate the cause.

What does an Ethernet frame addressed with a "1" as the first bit of destination media access control (MAC) address do?

It allows all frames to be multicast to a select group of nodes

Why is subnetting used?

It allows network administrators to break up a single network address into smaller network addresses

When troubleshooting a problem crossing network responsibilities, why is it best to start with the local network and work out? (Choose three.)

It allows us to eliminate and resolve any internal problems first. It provides information we can use to support our case, if the problem proves to be external to our network. It breaks up the troubleshooting effort to specific areas of responsibility.

Network address translation (NAT) IP address translation assigns external addresses to internal devices in which way?

It assigns the internal address to one of a pool of external addresses.

When a management station polls a device agent process to collect information, the network management system is operating in which Simple Network Management Protocol (SNMP) network management mode?

Passive.

What type of process is located on two computers that perform approximately the same services?

Peer

What types of processes are located on two computers that perform approximately the same services?

Peer

Which three of the following are examples of Simple Network Management Protocol (SNMP) router management categories? (Choose three.)

Performance Configuration Security

Which of the following is the lowest layer?

Physical Layer

Which of the following layers is only concerned with the physical signals that represent data bits?

Physical Layer

The TCP/IP model Network Interface Layer maps to which Open Systems Interconnection reference model (OSI/RM) layer(s)? (Choose all that apply.)

Physical Layer Data Link Layer

Which of the following is used to verify whether another host on a transmission control protocol/internet protocol (TCP/IP) network is reachable?

Ping

Which of the troubleshooting utilities presented expects a reply when it sends a message to another computer?

Ping

Ping Commands Continued

Ping - "t" - The ping command will run indefinitely Ctrl +C - Will interrupt a continuous command "-l" - Allows you to specify the packet buffer size "-n" - Allows the user to request x amount of packets to be sent/received "-h" - Maximum number of hops to search for target

Which ping option allows you to specify the packet buffer for each ping packet?

Ping -l

Tracert uses which of the following commands and IP fields to carry out its operation?

Ping and time-to-live (TTL).

How can we verify that name resolution is working correctly?

Ping one or more network hosts by both name and address.

Which ping tests would indicate that TCP/IP is working correctly on a network segment? (Choose three)

Ping the local IP address. Ping other local segment hosts by IP address. Ping the local network segment router port.

How would we verify that TCP/IP is working on the local host?

Ping the local loopback address.

Internet Control Message Protocol (ICMP) supports which TCP/IP utility?

Ping.

Which routing information protocol (RIP) stability feature sets a route's hop count to 16, preventing further updates from setting an incorrect route to an unreachable network?

Poison reverse

Which protocol allows a diskless workstation to contact a server and obtain an Internet protocol (IP) address?

Reverse Adress Resolution Protocol (RARP)

You know the logical address of an associates's computer on the company's local network and you want to learn the media access control (MAC) address of your associate's computer. Which of the following tools would you use?

Reverse Adress Resolution Protocol (RARP) (could be wrong) could be Address resolution protocol (ARP)

Which protocol allows a diskless workstation to contact a server and obtain an internet protocol address?

Reverse address resolution protocol (RARP)

Which IP protocol allows a diskless workstation to contact a server and obtain an IP address?

Reverse address resolution protocol (RARP).

Which TCP/IP application allows users to display locally a remote UNIX host's screen?

Rlogin

Which TCP/IP UNIX specific application would allow us to connect to a remote database over the network, but restrict database activity to the remote host?

Rlogin.

Where does the Domain Name system (DNS) namespace begin?

Root Domains

Which two of the following are default Interior Gateway Routing Protocol (IGRP) features? (Choose two.)

Route update period = 90 seconds Maximum hop count = 100

Which device evaluates and acts upon a packet's internet protocol (IP) IP Address?

Router

Which network device allows communication between separate IP networks?

Router.

Which network device can isolate broadcast traffic to the local network segment?

Router.

Why do routers take more time to process frames than Layer 3 switches do? (select two)

Routers check both frame addresses and packet addresses. Routers make decisions in software; switches make decisions in hardware.

Enhanced interior gateway routing protocol (EIGRP) was designed to replace or enhance which two previous routing protocols? (Choose two.)

Routing Information Protocol Interior Gateway Routing Protocol

Which two dynamic routing protocols create flat network topologies? (Choose two.)

Routing information protocol (RIP). Interdomain routing protocol (IDRP).

Interior Gateway Routing Protocol (IGRP) Timers

Routing update timer—This sets the time interval between regular route update messages. This time period defaults to 90 seconds. Route invalid (expiration) timer—Determines how long the router holds active in its routing table a route for which it has not received an update. It is set as a multiple of the routing update timer; the default is three times the update timer (270 seconds). Holddown timers—The holddown timer specifies the holddown period. It is set somewhere between the invalid and flush timer settings, and the IGRP default is the update timer times three, plus 10 seconds (280 seconds). Route flush timer—This is the time period that elapses between the time a route becomes invalid and the time the router removes the route from its route table entirely. Normally, this is configured as some multiple of the update timer, but greater than the invalid timer. The IGRP default is seven times the update timer (630 seconds).

Which of the following statements concerning Simple Mail Transfer Protocol (SMTP) is correct?

SMTP delivers mail from one computer to another.

Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-text data as attachments?

SMTP only carries ASCII text characters.

Which Transmission control protocol (TCP) header control bit represents that the message is initiating a connection?

SYN

Which type of packet does the receiving transmission control protocol (TCP) send to the source indicating its receipt of the source's SYN packet?

SYN-ACK

Which application allows Linux to share files and printers with Microsoft Windows devices?

Samba

Which application allows Linux to share files and printers with Windows?

Samba

Given the subnet mask 255.255.254.0, and considering the trick you learned for identifying subnet masking patterns, in which octet will the subnet wire addresses increment?

Second

What services are typically included with Apple's Mac OS X/macOS server?

Services a company would need to operate a business.

What is the overall data rate of a T1 circuit?

1.544 Mbs

Which is the valid Class A IP address range available to network hosts?

1.hhh.hhh.hhh-126.hhh.hhh.hhh

What is the decimal equivalent of the binary number 1010?

10

Which are considered private Internet protocol (IP) addresses? (Choose three.)

10.0.0.0 172.31.255.255 192.168.0.0

What is the maximum cable length for 100BaseTx Ethernet?

100 m

What is the maximum length of 10GBase-T Ethernet connection using category 7 (CAT-7) shielded twisted-pair (STP) cable?

100 m

Ethernet

1000 Gbps (Connection-less) Originally developed in the 1970s by Xerox Corporation in conjunction with Intel and Digital Equipment Corporation (DEC), Ethernet is the most widely implemented LAN technology. Popular because it is fast, inexpensive, and reasonably simple to implement, Ethernet was designed to minimize wiring by connecting computers to a common coaxial bus cable. Standard Ethernet equipment, network interface cards (NIC) An expansion card that permits connecting a network cable to a personal computer. , hubs/switches, and cabling is inexpensive and widely available from many vendors. Most Ethernet LANs use twisted-pair cabling to connect computers and peripherals to switches.

What is the binary equivalent of the decimal number 129?

10000001

What is the binary equivalent of decimal 136?

10001000

Which of the following is a Gigabit Ethernet specification for copper cable?

1000BaseCX

Which of the following is NOT a Gigabit Ethernet fiber cabling specification?

1000BaseFX

Convert the internet protocol (IP) address 172.68.10.2 from decimal to binary.

10101100.01000100.00001010.000000010

Star/Bus / 10BaseT Configurations

10BaseT star-wired networks provided the following advantages over 10Base2 and 10Base5: Nodes are easily added, moved, and removed within the network. Network problems are easier to troubleshoot because suspect nodes can easily be disconnected from the hub. Troubleshooting may be easier since the hubs and switches flash lights when the ports are operational.

Which interfaces are NOT considered parts of the IEEE 802.3ae standard?

10GBaseCX4

Which 10GbE interfaces operate over multimode fiber (MMF) cabling? (Choose two.)

10GBaseLX4 10GBaseSR

Convert the decimal IP address 206.190.36.45 to a binary IP address.

11001110.10111110.00100100.00101101

What is the binary equivalent of the decimal number 254?

11111110

What is the binary equivalent of the subnet mask 255.248.0.0?

11111111.11111000.00000000.00000000

Convert the binary internet protocol (IP) address 01110011.11001000.00101100.00000010 to decimal.

115.200.44.2

Which Dynamic Host Configuration Protocol (DHCP) option code is used for specifying vendor specific options?

128

How long is an Internet protocol version 6 (IPv6) address?

128 bits.

Which is the valid Class B IP address range?

128.001.hhh.hhh-191.254.hhh.hhh

How many total bits does a Class B subnet allow us to borrow from the host portion?

14

Which is a valid Class B network address?

151.129.89.76

ATM Asynchronous Transfer Mode

155 Mbps to 2.48 Gbps (connection-oriented) synchronous transfer mode (ATM) is an international standard for a high-speed, connection-oriented, cell-switching technology. ATM operates at both the Physical and Data Link Layers (Layers 1 and 2) of the OSI model to transport voice, video, and data across LANs, metropolitan area networks (MAN), and WANs. most implementations of ATM use high-speed optical transport to take full advantage of the data rate capacity of optical technology.

Which user datagram (UDP) port address do simple network management protocol (SNMP) agents use to send and receive management requests?

161.

Convert the binary IP address 10101111.11001100.00010110.01010101 to a decimal IP address.

175.204.22.85

At what maximum distance would you have to add a repeater to a 10Base2 network segment to prevent signal degradation?

185m

Which is the valid Class C IP address range?

192.000.001.hhh-223.255.254.hhh

Using the default Class C subnet mask, 255.255.255.0, which two addresses will be able to communicate on the same network segment? (Choose two.)

192.200.129.18 192.200.129.179

Using the subnet mask 255.255.255.248, which two addresses are on the same subnet? (Choose two.)

194.212.56.18 194.212.56.20

When was Linux first created?

1991

Match the well known transmission control port (TCP) port numbers with the associated applications.

20-File Transfer Protocol (FTP) (data) 21-File Transfer Protocol (FTP) (control) 23-Telnet 25-Simple Mail Transfer Protocol (SMTP) 53-Domain Name System (DNS) 80-Hypertext Transfer Protocol (HTTP) 139-Network Basic Input/Output System (NetBIOS) Session Service

Using the subnet mask 255.255.255.240, which two addresses are on the same subnet? (Choose two.)

200.193.15.49 200.193.15.61

You need to integrate these six class C networks 201.36.35.0/24, 201.36.72.0/24, 201.36.78.0/24, 201.36.79.0/24, 201.36.80.0/24, and 201.36.141.0/24. Which of these networks would be in the classless interdomain routing (CIDR) network range 201.36.72.0/21?

201.36.72.0/24 201.36.78.0/24 201.36.79.0/24

Which two of the following are examples of local area network (LAN) logical addresses? (Choose two.)

201.90.35.78 Port 23

Using the subnet mask 255.255.255.192, which sets of host addresses will be able to communicate on the same network segment?

210.68.165.65 to 210.68.165.120

Which user datagram protocol (UDP) port address enables connection to a device running secure shell?

22

Which is the result of ANDing the internet protocol (IP) address 23.176.224.18 with the subnet mask 255.224.0.0?

23.176.0.0 WRONG

A Class C network address provides for how many network and host bits?

24 network, 8 hosts

A Class C address provides for a maximum of how many usable hosts?

254

The maximum Domain Name System (DNS) domain name length is how many bytes?

255

The maximum Domain Name System (DNS) domain name length is how many characters?

255

Your customer owns a full Class C address, 220.14.56.0. They currently operate a flat network using the default Class C subnet mask, 255.255.255.0, and use a single router to connect to the Internet. What should the subnet mask number be changed to in order to segment their network into six subnets to better control broadcast traffic?

255.255.255.224.

Which broadcast IP address limits packets to the local network segment only?

255.255.255.255

According to the Ethernet 5/4/3 rule, how many 10Base2 segments may have nodes attached?

3

How many Internet Control Message Protocol (ICMP) packets does the tracert utility send per hop?

3

X.25

300 bps to 56 Kbps (connection-oriented) X.25 was the first switched network service, predating the Open Systems Interconnection (OSI) An architectural model for how digital information should be transmitted between any two points in a data communication network. reference model. An X.25 network, whether public or private, is typically built upon the leased-line facilities of the public telephone network. X.25 uses a Network Layer (OSI Layer 3) address (telephone number) so that switches can route packet traffic over multiple paths.

How does the receiver Simple Mail Transfer Protocol (SMTP) respond to the sender SMTP issued Data command?

354 start mail input.

What is the overall data rate of a fractional T1 circuit with six voice circuits?

384 kbps

How many Dynamic Host Configuration Protocol (DHCP) address allocation steps are required to enable the client to successfully acquire a lease from a server?

4

How many fragments will the transmitting device have to create to match the datagram to the segment's 512 maximum transfer unit (MTU) size, having a 1,500-byte datagram, and a 20-byte IP header?

4

If we borrow 12 bits from a Class B address, how many usable subnets have we created?

4,096

What is the maximum length of a 10GbE segment through single-mode fiber (SMF) cable?

40 km

At which point in the lease period does the client first attempt to renew its lease?

50 percent

At which point in the Dynamic Host Configuration Protocol (DHCP) lease period does the client first attempt to renew its lease?

50% of the original lease time.

In a Class B network, if you borrowed 9 bits, how many usable subnets would you create?

512

Frame Relay

56 Kbps to 1.544 Mbps (connection-oriented) Frame relay is a connection-oriented packet-switched network protocol that works at the Data Link Layer (OSI Layer 2)

On an IP network, all hosts must be able to handle a packet size of at least how many bytes?

576

Which is the internet protocol (IP) header protocol number used to specify that the packet's contents were created with transmission control protocol?

6

which is the correct destination of a user datagram protocol (UDP) port number for a DHCPDISCOVER messgae?

67

The local transmission control protocol (TCP) process sends four segments, each 4 bytes long. The first sequence number is 7,806,002. Which is the acknowledgment number the receiving process returned to indicate it received segment one?

7,806,006

If we borrow 3 bits from a Class C network address, how many usable subnets have we created?

8

What is the decimal value of the binary number 1000?

8

if we borrow 3 bits from a class C network address, how many use-able subnets have we created?

8

Which Quality of Service (QoS( protocols could a network support to provide robust voice over Internet protocol (VoIP) services? (Choose two.)

802.1p. Resource Reservation Protocol (RSVP).

What is Ethernet?

A Data link layer specification for media access control (MAC), which defines how network nodes can use a shared medium to transmit signals to one another.

How does a Layer 2 switch differ from a Layer 3 switch?

A Layer 2 switch makes decisions based on media access control (MAC) addresses.

How does a Layer 3 switch differ from a router?

A Layer 3 switch checks the first packet in each stream; a router checks each packet.

The Mac OS X/macOS kernel includes which elements?

A Mach kernel, xnu kernel, and various Berkeley Software Distribution (BSD) system calls.

You wish to implement voice over Internet protocol (VoIP) services on your existing data network. Part of your plan is to allow telecommuters to call network users from their home public switched telephone network (PSTN) telephones. Which H.323 device must you install in your existing data network to allow for these remote connections?

A PSTN gateway.

On the file transfer protocol (FTP) server, what manages client requests for file retrieval or transmission?

A daemon

What type of server maintains an access log to assist with troubleshooting and tracking down malicious users?

A file transfer Protocol (FTP) server

Which three of the following are functions of the TCP/IP Internetwork Layer? (Choose three.)

A global addressing structure Packet fragmentation Service type requests

Metro Ethernet Forum (MEF)

A global organization of manufacturers and service providers formed to promote and educate industry on the merits of Ethernet in the service provider network, and to define carrier-class Ethernet.

A group of computers are connected in a multistory building. This would be considered what type of network?

A local area network (LAN).

What does the class network number 127.x.y.z designate?

A loopback address

A group of computers in the south side of a city are connected to another group of computers downtown. This would be considered what type of network?

A metropolitan area network (MAN).

Simple Network Management Protocol (SNMP) structures management information base (MIB) information in which of the following trees?

A name tree.

What isolates an internet protocol (IP) address's network portion from its host portion?

A network mask

An Interior Gateway Routing Protocol (IGRP) interior route is which of the following?

A path to a directly attached, subnetted route

Which of the following best describes the difference between a process and a program?

A process is a subset of a program.

The interaction between processes and protocols forms which of the following?

A protocol stack.

Which best describes a Dynamic Host Configuration Protocol (DHCP) scope?

A range of addresses from which the server chooses a client address assignment

What is the difference between a switch and a hub?

A switch allows a dedicated path between two ports.

Virtual local area networks (VLAN) are typically implemented using which type of device?

A switch.

Which would cause a router to update a route entry still in the holddown period set by a previously received update?

A triggered update with a lower hop count than previously received

Area Border Router (ABR) in OSPF

ABRs handle routing between areas. An ABR maintains a separate link-state database for each area to which it is connected and creates a separate SPF tree from each of those databases. An ABR must always be reachable through intra-area routing

Which types of transmission control protocol (TCP) segments contain window size advertisements?

ACK

Which three parts of the transmission control protocol (TCP) header help the protocol ensure reliable communications between applications? (Choose three.)

ACK control bits Sequence numbers Checksum

Which text file type is the file transfer protocol (FTP) default?

ASCII

Simple Network Management Protocol (SNMP) represents object syntax with a subset of which International Organization for Standardization (ISO) standard?

ASN.1

Which portion of the transmission control protocol (TCP) header specifies the next sequence number the receiver expects from the connection source?

Acknowledgment number.

Which Simple Network Management Protocol (SNMP) management mode allows us to change a device's characteristics and operating parameters?

Active management.

A hub that repeats and regenerates signals is called which type of hub?

Active.

Typing ipconfig in the Windows command line interface (CLI) displays which three of the following pieces of client configuration information? (Choose three.)

Adapter address. IP address. Lease expiration.

The network interface card (NIC) in an Ethernet node receives from the Internet protocol (IP) a packet 12 bytes long. What must the NIC do in order to prepare the packet for transmission across the physical network?

Add padding, a header and a trailer.

Which Domain Name System (DNS) record type specifies name to address translation, such as used in a glue record entry?

Address (A).

Data Link Layer protocols

Address resolution protocol (ARP) High-level data link control (HDLC) Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless protocols like 802.11a, 802.11b, 802.11g, and 802.11n Local area network (LAN) protocols such as Ethernet, Token Ring (TR), and fiber distributed data interface (FDDI) Link access procedure- D channel (LAPD), used in integrated services digital network (ISDN) Multiprotocol Label Switching (MPLS) Point-to-Point Protocol (PPP) Serial line Internet protocol (SLIP)) Spanning Tree Protocol (STP) Sublayer protocols: media access control (MAC) and logical link control (LLC) IEEE 802.2 Synchronous data link control (SDLC) Wide area network (WAN) protocols such as Frame Relay and asynchronous transfer mode (ATM)

Address Resolution Protocol (ARP)

Address resolution protocol (ARP) is used to provide a mapping between symbolic Internet protocol (IP) addresses and hardcoded Data Link Layer addresses, such as those found in local area networks (LAN) (ARP is used to map IP addresses to Data Link Layer addresses.) (ARP is used to map IP addresses to Data Link Layer addresses within the LAN.)

In TCP/IP, what does a network host use to find a physical address, given a logical address?

Address resolution protocol (ARP).

What is the first step in most client requests?

Address resolution.

Encapsulation means that each layer on the sending node does which of the following?

Adds its protocol header to the data

Which three of the following are H.323 gatekeeper functions? (Choose three.)

Admissions control. Call signaling. Bandwidth management.

When do a Telnet terminal and remote host negotiate options?

After establishing the transmission control protocol (TCP) connection.

When can a Dynamic Host Configuration Protocol (DHCP) server reuse an address offered in a DHCPOFFER message?

After the server times out waiting for a DHCPREQUEST message

Which of the following accurately describes a bus topology?

All devices are connected by a single electrical circuit.

Three fundamental aspects that differentiate Carrier Ethernet from Ethernet LANs are:

An entire organization connects to a Carrier Ethernet "port" at a given customer location The Carrier Ethernet network serves many organizations The Carrier Ethernet network is outside the building across a wide area

Concerning routing information protocol (RIP), what is meant by the statement "maximum diameter of 15 hops"?

Any single network cannot be more than 15 hops away.

You wish to host a corporate web site on a Linux server. Which application adds web server functionality to Linux?

Apache.

Telnet is a protocol in which TCP/IP layer?

Application

The TCP/IP model Application Layer maps to which three Open Systems Interconnection reference model (OSI/RM) layers? (Choose three.)

Application Layer. Session Layer. Presentation Layer.

Which three of the following are devices manageable with simple network management protocol (SNMP)? (Choose three.)

Applications. Bridges. Routers.

What is the name of Apple's graphical user interface?

Aqua

Which three of the following are Dynamic Host Configuration Protocol (DHCP) address allocation mechanisms? (Choose three.)

Automatic Dynamic Manual

A repeater operates at which layer of the Open Systems Interconnection reference model (OSI/RM)

The physical layer

Which services does Real-time Transport Protocol (RTP) provide to add reliability to packet voice networks? (Choose three.)

Delivery monitoring. Sequence numbering. Timestamping.

To reduce routing information traffic between adjacent networks, Open Shortest Path First (OSPF) networks elect which two devices? (Choose two.)

Designated router (DR). Backup designated router (BDR).

Which of the following two ports are contained in the transmission control protocol (TCP) header?

Destination and Source

How does enhanced interior gateway routing protocol (EIGRP) avoid routing loops?

Diffusing Update Algorithm (DUAL).

Which two mechanisms might a host use to resolve fully qualified domain names (FQDN) to IP addresses? (Choose two.)

Hosts table Domain Name System (DNS)

What type of device is used with unshielded twisted-pair (UTP) cable to create a star network configuration?

Hub

Which two of the following devices work only with the binary representations of network data? (Choose two.)

Hub Repeater

Which represents the prefix bits for the subnet mask 255.255.0.0

/16

Your network Help desk calls and asks you to help troubleshoot an email problem. Several users have complained that when they send email messages with attachments, the recipients reply that the attachments are unreadable. The message body is legible, however. You know that your users encode all attachments using Multipurpose Internet Mail Extension (MIME). Which is the best solution to this problem?

Contact the recipients, and have them use MIME to decode attachments.

Which element transports most of the optical signal?

Core

Which key combination will terminate a continuous Ping issued with the Ping -t option?

Ctrl+C.

Which Simple Mail Transfer Protocol (SMTP) command designates that the message's text follows?

DATA.

What does Dynamic Host Configuration Protocol (DHCP) Overview and Objectives (DHCP) provide that Bootstrap Protocol (BOOTP) cannot?

DHCP assigns reusable addresses to any requesting host.

Which of the following choices is the correct order in which a Dynamic Host Configuration Protocol (DHCP) client initially obtains an IP address?

DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK

How might a Dynamic Host Configuration Protocol (DHCP) client relinquish its current lease?

DHCPRELEASE message.

The file transfer protocol (FTP) server process can run as which two of the following? (Choose two.)

Daemon Windows service

What open source operating system is the foundation of Apple macOS?

Darwin.

At which Open Systems Interconnection reference model (OSI/RM) layer does the physical address reside?

Data Link

What layer of software is normally loaded on the network interface card (NIC)?

Data Link Layer

Which layer in the OSI Reference Model is the only layer that adds a trailer to the data it transmits?

Data Link Layer

What are some issues that can arise when making a file available for transfer to other users?

Data type, File Structure, and transmission mode.

Internet protocol (IP) provides which three of the following services to transmission control protocol (TCP)? (Choose three.)

Datagram routing. Time-to-live (TTL). Differentiated Services Code Point (DSCP).

What must the Network Layer do to a received frame first in order to determine the route over which it will forward the datagram to the next network?

Decapsulate the packet.

If a hypertext transfer protocol (HTTP) client does not specify a document name in its HTTP request message, what will the HTTP server return in response?

Default document.

Ipconfig displays which of the following elements of client configuration information?

Default gateway

Which IP packet bits does open shortest path first (OSPF) use to provide Type of Service (ToS) routing?

Delay, throughput, reliability, and cost (D-T-R-C) bits.

Gigabit Ethernet uses a different frame format than 10 Mbps Ethernet and Fast Ethernet. True or False?

False

If you want to locate a previously saved Uniform Resource Locator (URL) so that you can quickly return to it as needed, where on the browser toolbar would you look?

Favorites

Which three of the following are file transfer protocol (FTP) objectives? (Choose three.)

File sharing. Transparent file storage technology. Reliable data transfer.

Which TCP/IP application allows us to transfer files either within a browser or at the command line?

File transfer protocol (FTP).

Which two of the following might cause a ping across network boundaries to fail? (Choose two.)

Firewalls on the router ports. Internet Control Message Filters (ICMP) filters on the router ports.

What type of routing table update message does Interior Gateway Routing Protocol (IGRP) send to quickly remove a route and place it in holddown?

Flash updates.

Router-Based Network Architectures

Flat—A flat network is like a mesh that connects all routers at the same logical level. The internetwork is not divided into specific areas or specialized functions. In a flat network, there is no distinction between different parts of the network, and all routers play an equal role. Hierarchical—A hierarchical network is divided into logical areas and levels. Routers perform different tasks based on their functional position within an area or level.

Which three choices are transmission control protocol (TCP) features? (Choose three.)

Flow control. Packet error recovery. Demultiplexing multiple applications.

What is required when interleaving data bits or bytes in time division multiplexing (TDM)?

For TDM interleaving a "time slice" is reserved on the multiplexed stream for each individual input port via a synchronization channel that the demultiplexer uses to synchronize with the multiplexer.

What unit have scientists used for centuries to quantify the color of light?

For centuries, scientists have quantified the colors of light, or frequencies, by the distance between the top of one light wave and the top of the next one, hence "wavelength".

Which internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram?

Fragment Offset.

Which layer 2 type reads the first 64 bytes of frame and then forwards it to the destination interface?

Fragment free

Which Layer 2 switch type reads the first 64-bytes of a frame and then forwards it to the destination interface?

Fragment-free

You are shopping for a new Ethernet switch. You want maximum switch throughput, but also want to avoid passing frames damaged by collisions. Which type of switch should you choose?

Fragment-free

What multiplexing scheme is used in broadband cable headends where multiple downstream channels of different frequencies, are combined before being transported over the hybrid fiber/coax (HFC) network?

Frequency division multiplexing (FDM) is used in broadband cable headends where multiple downstream channels of different frequencies, are combined before being transported over the HFC network.

Which two codecs support audio coding at 64 Kbps? (Choose two.)

G.711 G.722

Which of the following are H.323 audio codecs? (Choose two.)

G.711 G.728

Which best describes why an hypertext transfer protocol (HTTP) server can handle multiple simultaneous connections?

HTTP is stateless, which means the server has no knowledge of previous connections after they are dropped.

Open Shortest Path First (OSPF) routers send which type of packet to locate their neighbors?

Hello.

Which type of network architecture allows routers to perform different tasks depending on their functional position within an area?

Hierarchical.

Which three of the following are distance vector algorithm (DVA) stability features? (Choose three.)

Holddowns Hop-count limits Split horizons

Which three choices are Interior Gateway Routing Protocol (IGRP) stability features? (Choose three.)

Holddowns Split horizons Poison reverse updates

IP routing information protocol (RIP) uses which of the following metrics to make path decisions?

Hop count

Which metric does Interior Gateway Routing Protocol (IGRP) use on a network with only one medium, such as one running 16-Mbps Token Ring exclusively?

Hop count.

Which three of the following are examples of dynamic routing protocol metrics? (Choose three.)

Hop count. Line capacity. Transmission delay.

How does routing information protocol (RIP) resolve the count-to-infinity problem?

Hop-count limits. When the hop count exceeds 15, the RIP router marks the route as unreachable. Over time, the route is removed from the table.

You are running an active browser session with your employer's Human Resources intranet web server. You issue the netstat command from your local workstation's command prompt. The resulting screen shows several connections to the web server, each using a separate transmission control protocol (TCP) port. Why does your client workstation have multiple active port connections open to the same web server?

Hypertext transfer protocol (HTTP) sessions often open multiple connections between the client and the server.

Which IEEE standard describes vendor-neutral virtual local area network (VLAN) tagging on bridged networks?

IEEE 802.1Q

Which Ethernet frame format includes a length field in the media access control (MAC) header?

IEEE 802.3

Interior Gateway Routing Protocol (IGRP)

IGRP is a Cisco Systems retired, proprietary, distance-vector protocol designed to improve upon RIP. Maximum handoff point (hop) count—IGRP sets a maximum hop count of 255, with a default of 100. This makes IGRP suitable for larger networks than RIP. Use of different metrics—IGRP uses different metrics than does RIP. IGRP's default metrics are the link's bandwidth and delay, but it can also build a composite metric using the link's reliability and load. Longer update period—The IGRP default update period is three times (90 seconds) that of IP RIP.

Which statement best describes Internet Message Access Protocol (IMAP)?

IMAP allows users to scan email headers and choose email messages to download from the email server.

A remote monitoring 2 (RMON2) probe can capture a network segment's performance statistics based on which two of the following? (Choose two.)

IP address. Application.

Which addresses combine to create a transmission control protocol (TCP) socket?

IP and port.

Which two statements concerning multicasting are true? (Choose two.)

IP multicast group membership is dynamic. User datagram protocol (UDP) uses IP multicast services.

The Synchronous Optical Network Table (SONET)

In SONET, the electrical signal, known as a synchronous transport signal (STS) frame, is the basic building block, having a data transmission rate of 51.84 Mbps.

What is a time division multiplexing (TDM) frame?

In TDM, the time slots are grouped into frames, which is one complete cycle of time slots. The number of input channels determines the length of a frame

Which of the following best describes the function of a media access control (MAC) layer address?

Identifies the destination device's physical address

Troubleshooting Steps Networking

Identify the exact issue Recreate the problem Isolate the cause Formulate and implement a correction Test the solution Document the problem and solution and provide feedback

Which is the most important of the network troubleshooting steps?

Identify the exact issue.

When troubleshooting a network, we begin by performing which of the following?

Identify the issue.

When troubleshooting, asking the question, has anything changed recently that might have had an impact?", will aid you in :

Identifying the exact issue relating to a problem

When might a BOOTP client discard a BOOTREPLY message? (Choose three.)

If the destination port number is 67. If the BOOTREPLY targets another media access control (MAC) address. If the BOOTREPLY includes a transaction ID other than its own.

Reassembly

If the received message was segmented, one of the processes on the receiving end reassembles the segments into their correct order, then passes the restored message up one layer.

What Linux tool is used for monitoring and changing network parameters?

IfConfig

You are a networking consultant for a major telecommunications firm. They ask you to help them resolve a hacked email problem. It seems that someone is intercepting emails between district offices and inserting pornographic pictures in place of legitimate email attachments. How might you resolve this problem for them?

Implement Secure Multipurpose Internet Mail Extension (S/MIME) encoding on all outbound email attachments.

DVA Advantages, Disadvantages, Operation

In DVAs, a router sends its neighbor routers a vector of distances or metrics for all possible network destinations (its routing table). Advantages DVAs require only a small number of central processing unit (CPU) cycles to determine the shortest route to a distant network. Disadvantages identifying a misbehaving router supplying inaccurate data is quite difficult A change in the routing table of a single router can result in a chain of updates DVAs can form routing loops, and be slow to converge. This slow convergence can lead to route instability and increased overhead.

LSA Advantages, Disadvantages, Operation

In LSAs, each router must know the entire network topology before computing the shortest path to each destination network. Advantages Each router maintains a consistent view of the network, thus eliminating problems of looping and slow adjustment/convergence to changes in network conditions. LSAs can eliminate problems that occur in very large networks because of their ability to partition an AS into areas Disadvantages An excessive amount of memory and communication overhead may be required in large networks LSAs require a larger amount of CPU time per calculation compared to DVAs

Open Shortest Path First (OSPF) Solution

OSPF solves RIP's main problems, while providing many new features. OSPF supports configurable metrics, allowing an administrator to assign each path a cost metric based on a combination of factors, such as price cost, reliability, delay, and hop count SPF technology converges quickly and is resistant to routing loops Orderly update procedures reduce network traffic. All routing exchanges are authenticated OSPF uses multicasts, rather than broadcasts, to exchange routing updates Equal-cost multipath routing allows a router to perform load balancing over multiple routes with equal costs. Subnet masks can be attached to routes, thereby allowing the use of variable-length subnet masks OSPF supports area routing OSPF supports Type of Service (ToS) routing OSPF supports the transfer of external routing information through an AS, through external route tagging.

Decapsulation

On the receiving node, each protocol removes its own protocol header before passing the encapsulated message up one layer.

Segmentation

On the sending node, if a layer receives a message that is too long, it divides the message into manageable blocks.

For which three purposes might you use multicasting on an IP network? (Choose three.)

Online training Teleconferencing Software distribution

Which network segment hosts respond to an address resolution protocol (ARP) request?

Only the target host responds

Which Linux application supports centrilized user authorization and directory services?

OpenLDAP

What authentication and directory services does an Apple Mac OS X/macOS server employ?

OpenLDAP, Kerberos, Active Directory (AD) connector, and RADIUS.

What does operating with dense wavelength division multiplexing (DWDM) in the optical C-band (1,530 to 1,565 nm) allow?

Operating DWDM in the optical C-band is in the range of wavelengths that can be amplified in the network using erbium doped fiber amplifiers (EDFA).

Which hypertext transfer protocol (HTTP) message request from the client allows it to obtain additional requirements without initiating any actions on the part of the server?

Options

Which are the two control entries found in a master file resource record (RR) entry? (Choose two.)

Origin Include

What best describes orthogonal frequency division multiplexing (OFDM)?

Orthogonal frequency division multiplexing (OFDM) - A multicarrier transport scheme in which narrowband carriers (subcarriers) are modulated independently, and then multiplexed together

Layer 3 capability

Packet forwarding. Route processing. Internet protocol (IP) to name resolution for forwarding.

What applications are available in Apple iWork?

Pages, a word processing application; Numbers, a spreadsheet application; and Keynote, a presentation application.

What is the primary difference between active and passive destinations in an enhanced interior gateway routing protocol (EIGRP) topology table?

Passive tables are stable and trusted.

Transport Layer protocols

Real-time transport protocol (RTP)—RTP carries the multimedia payloads used in Voice over Internet protocol (VoIP) or media streaming. Although on Layer 4, RTP uses the connectionless services of user datagram protocol (UDP) to include the port addresses. Sequenced Packet Exchange (SPX)—SPX was a Novell® NetWare™ Transport Layer protocol. It worked in conjunction with IPX. Transmission control protocol (TCP)—TCP is encapsulated by IP to track messages and ensure they are delivered and delivered in the correct order. User Datagram Protocol (UDP)—UDP is encapsulated by IP and is commonly used for sending error messages or video and audio streams. Messages are not tracked, so if a UDP message fails to arrive, the message is lost, unless another message is sent later.

What does the packet-based multimedia communications systems, covered by the H.323, cover?

Realtime audio, video, and data communications over internet protocol (IP) packet networks

If segmentation occurs on the sending node, what must occur on the receiving node?

Reassembly

Where does one hat store networking parameters?

Red Hat stores networking parameters in the /etc/sysconfig directory

Which two of the following result from implementing classless interdomain routing (CIDR)? (Choose two.)

Reduced network bandwidth utilization. Conservation of available addresses.

Which two of the following are advantages gained from using static routes? (Choose two.)

Reduced network overhead Added network security

Which of the following is not a branch of the Debian development tree?

Released.

Which two TCP/IP protocols are used for network management? (Choose two.)

Remote monitoring (RMON). Simple Network Management Protocol (SNMP).

Which best describes using a remote terminal versus direct access to a number of different hosts?

Remote terminal access provides single terminal access to a number of remote hosts.

The destination transmission control protocol (TCP) process has set a 1,000-byte receive buffer window. The source TCP sequence number starts at 23,100 and sends the following segments, in order: Segment 1-200 bytes; Segment 2-300 bytes; Segment 3-200 bytes; and Segment 4-300 bytes. The last acknowledgment the source received was sequence number 23,600 saying the receive buffer can now hold 800-300 byte streams. The retransmission timer for sequence number 23,600 has expired, so what will the source TCP do next?

Resend segments 3 and 4.

Which protocol works with Internet protocol version 6 (IPv6) Quality of Service (QoS) mechanisms to provide video and other realtime data with reserved bandwidth across a data flow's path?

Resource Reservation Protocol (RSVP).

Zones Maintain domain name information in which record type

Resource records

Zones maintain domain name information in which record types?

Resource records (RR).

You maintain an autonomous routing network that runs RIPv1 as its routing protocol. You calculate that at the workday's busy hours, routing changes occurring on the nearest router take 45 seconds to propagate to the furthest router. In the past, this slow convergence has resulted in routing loops. How might you configure your routers to avoid creating routing loops when route changes occur within the network?

Set 50-second route update holddowns on all routers.

Which Simple Network Management Protocol (SNMP) sets object values on an agent with it's protocol data units (PDU)?

SetRequest

In what ways does open shortest path first (OSPF) improve upon the limitations of distance vector algorithm (DVA) protocols, such as routing information protocol (RIP)? (Choose three.)

Shortest Path First (SPF) technology resists routing loops. Routers exchange routing table updates only. All routing table exchanges are authenticated.

What does each link-state router build to describe the cost to reach each destination network?

Shortest path first (SPF) tree.

Which two choices are TCP/IP email protocols? (Choose two.)

Simple Mail Transfer Protocol (SMTP). Internet Message Access Protocol (IMAP).

Internet email uses which two protocols? (Choose two.)

Simple Mail Transfer Protocol (SMTP). Post Office Protocol version 3 (POP3).

What is the name of the protocol by which management information for a network element can be inspected or altered by a management station?

Simple Network Management Protocol (SNMP)

Which three of the following are typical network manager components? (Choose three.)

Simple Network Management Protocol (SNMP) engine. Transport/link. Management information base (MIB) database.

You want to use a Linux server as a network device management station. Which protocol can be installed on the server to support this functionality?

Simple Network Management Protocol (SNMP).

Router 1, a routing information protocol (RIP) router in a two-router network, informs its neighbor, Router 2, of a route to the new, directly connected Network A. Router 2 updates its routing table accordingly. Almost immediately, Router 1's link to Network A fails. Router 1 prepares its regular update for Router 2, excluding the Network A entry from the update message. While Router 1 is waiting for its update timer to expire, Router 2 sends its regular update message to Router 1. This update tells Router 1 that Router 2 has a new route to Network A, with a hop count of 1. This route is through Router 2 back to Router 1, although Router 1's link to Network A is still failed. Which RIP stability feature will prevent this problem?

Split horizons

Split Horizon

Split horizons derive from the fact that it is never useful to send information about a route back in the direction from which it came. The split-horizon rule helps prevent two-node routing loops. It prevents a router from advertising a route out to the interface on which the route was learned. split horizon provides extra stability.

What are the attributes of Carrier Ethernet? Choose all that apply.

Standardized services Quality of service Scalability Service management Reliability

Hubs connect network hosts in which configuration?

Star

How is Fast Ethernet similar to standard Ethernet?

Star configurations are used in both types. Cat 5E cabling can be used for both. The same frame format is used.

What is the most common LAN topology

Starbus

Hypertext Transfer Protocol (HTTP) is what type of protocol?

Stateless

What are the two methods for configuring Linux network addressing? (Choose two.)

Static (ifconfig). Dynamic Host Configuration Protocol (DHCP).

Considering the default Cisco router default administrative distances (AD), which of the following routes will a router consider more trustworthy than the others?

Static route.

Which of the following is a characteristic of Static routing?

Static systems do not operate well in an environment of rapid growth or change.

Which three choices are indirect routing types? (Choose three.)

Static. Default. Dynamic.

What is one method of configuring Linux for networking?

Statically

How are store and forward Ethernet switches different from cut-through switches?

Store and forward switches are more accurate, but cut through switches are faster.

What type of delivery method uses an email server between the sender and the receiver of messages?

Store-and-Foward

How are store-and-forward switches different than cut-through switches?

Store-and-forward switches are more accurate, but cut-through switches are faster.

Your customer called and stated that they have installed a new border router in their subnetted network. This router supports CIDR, and they are excited that they can now advertise a single network route to the Internet, instead of the six they had advertised before. They own the Class C address range 220.68.0.0/18, and usethe following class C network addresses on their internal network segments: 220.68.7.0220.68.11.0220.68.17.0220.68.21.0220.68.23.0220.68.24.0 They state that some of the networks can no longer connect to Internet services. You Telnet into their border router and look at the routing table entries. You see that their router administrator configured their router to advertise the following internal network: 220.68.0.0/21 Which of the following might be the problem's cause?

The CIDR prefix is incorrect for this range of addresses.

A small company's chief technology officer (CTO) wants to upgrade their existing network to Fast Ethernet. The existing network consists of the following:• 10/100 Network interface cards (NIC) in the server and workstations• 10/100 Hubs• Category 3 and 5E cabling• A 10/100 routerWhich component must be upgraded to support Fast Ethernet?

The Category 3 cabling

The physical address of a device is processed by which layer of the Open Systems Interconnection reference model?

The Data Link Layer

What component of the packet-based multimedia communications system, covered by the H.323 standard, is considered to be the "brain" of the network?

The Gatekeeper

Which remote monitoring (RMON) group records and stores sample statistics for each monitored interface?

The History Control Group.

Which Simple Network Management Protocol (SNMP) remote monitoring (RMON) extension prepares reports about a group of devices that head a measured parameter's statistical list?

The Host Top N Group.

Type of Service (ToS) Routing - Field

The IP header contains a 4-bit ToS field, used by a source host to request a specific type of routing service

Which combined information triggers a transmission control protocol (TCP) or user datagram protocol (UDP) application to respond to an information request?

The Internet protocol (IP) address and port number.

What happens when a dynamic network address translation (NAT) device runs out of addresses to assign?

The NAT device refuses new connections.

Network Layer

The Network Layer is responsible for transmitting packets between source and destination nodes that may not be connected by the same physical link. The Network Layer addresses a packet to a computer that may be located several links away from the source. If the source and destination nodes are not directly connected, then the Network Layer must use intermediate nodes (routers) to get a packet to its destination. Just as Data Link Layer addresses are globally unique physical identifiers, a Network Layer address must be a unique logical identifier for a specific host. To allow network devices to communicate across the worldwide Internet each Network Layer address must also be globally unique. The Network Layer also moves packets to and from node types that may use different Data Link Layer protocols. For example, when a router forwards a packet from an Ethernet LAN to a Frame Relay network, that router removes the Ethernet header and trailer and builds a new frame formatted for the Frame Relay network.

Physical Layer

The Physical Layer transmits a signal, across a physical communication medium, that carries binary bits. That medium can be a copper cable (coaxial or twisted-pair), a fiber-optic cable, or a radio channel. Thus, the Physical Layer includes the following types of hardware devices that send and receive signals over each type of physical medium: Fiber-optic transceivers Radio transceivers Modems Repeaters Hubs Media converters

Presentation Layer

The Presentation Layer deals with the format, or representation, of computer information. It resolves differences between different types of character encoding systems, such as Extended Binary Coded Decimal Interchange Code (EBCDIC), the American Standard Code for Information Interchange (ASCII), and the Unicode encoding scheme. The presentation layer can provide security by encrypting and decrypting data. It may also compress payloads before transmitting them, to use the communication channel more efficiently.

SMTP Commands

The SMTP Commands Table presents some of the more common commands used by SMTP. As with other protocols that use TCP/IP, a transmission control protocol (TCP) connection must be established before SMTP information can be transferred.

Which portion of the Simple Network Management Protocol (SNMP) architecture is responsible for implementing SNMP and exchanging messages between the management station and the managed elements?

The SNMP engine.

Which best describes IP's use of the time-to-live (TTL) field?

The TTL specifies the time a datagram is allowed to remain on the network.

Which of the following best describes an email message's communication flow through the TCP/IP model layers?

The Transport Layer breaks the data stream into pieces, which it passes to the Internetwork Layer. The Internetwork Layer adds the source and destination Internet protocol (IP) addresses and forwards the packets to the Network Interface Layer. The Network Interface Layer builds frames, and converts them to bits for transport across the physical network.

Transport Layer

The Transport Layer, or Layer 4, maps the message address to a specific process running on a server. Or, peer software processes at either end of a connection use the Transport Layer addresses to carry on a conversation. Processes in the Transport Layer act as if their nodes are adjacent. They rely on lower layers to handle the details of passing data through intermediate nodes across the network. Thus, Layer 4 insulates the higher levels from all concerns about the transportation of payloads. Basic services provided by the Transport Layer include: Addressing of processes using port numbers Connection management Flow control and buffering Multiplexing and parallelization Reliable and sequenced delivery Service quality management

Which layer of the Open Systems Interconnection reference model (OSI/RM) would you suspect as being the problem when packets are arriving at the server but no information is being returned to the client?

The Transport Layer.

Session Layer

The job of the upper layers, taken collectively, is to provide user-oriented services through a set of widely available standard applications, and through specialized applications written for the users by programmers. The Session Layer and the Presentation Layer above it, provide reusable services for the applications that reside in the Application Layer. The Session Layer facilitates a step-by-step interaction between two entities. It establishes the session, manages the dialog to prevent simultaneous transmission, and ends the session gracefully. A single session may continue across one or more connections. Similarly, a single connection may support one or more concurrent sessions.

What is an X.25 network, whether public or private, typically built upon?

The leased-line facilities of the public telephone network.

What results from trapping data with an Simple Network Management Protocol (SNMP) agent?

The managed device alerts the management station of a threshold violation.

What are the two dimensions of a signal that most basic multiplexing schemes are based upon?

The most basic multiplexing schemes are based on the time dimension for time division multiplexing (TDM), and the frequency dimension for frequency division multiplexing (FDM).

Which of the following is true about time division multiplexing frames? Choose all that apply.

The multiplexer systematically switches between each input, long enough for 1 byte from each input to be placed in a time slot at the output of the multiplexer. The number of input channels to the multiplexer determines the length of a TDM frame.

Nbtstat

The nbtstat command is used to display protocol statistics for a given computer on a TCP/IP network. It displays these statistics using NetBIOS, the personal computer (PC) local area network (LAN) protocol.

Which enhanced interior gateway routing protocol (EIGRP) routing table keeps a list of neighbors which are directly attached to one of the router's interfaces?

The neighbor table.

Netstat

The netstat command is another command used in troubleshooting a TCP/IP network. This command is used to display the active sessions for a given computer

In a network mask address, what identifies the network and host portions of the address?

The network portion of the net mask is set to all ones, and the host is set to all zeros

When written in binary, the first part of a subnetted Class B network's wire address will show which bit pattern?

The network portion set as the default Class B network portion, the subnet portion to all 0s, and the host portion to all 0s.

The Internet Assigned Numbers Authority (IANA) recommends organizations use private IP addresses under which condition?

The network uses gateways, routers, or firewalls to act on the network host's behalf.

What determines the length of a time division multiplexing (TDM) frame?

The number of input channels to the multiplexer determines the length of a TDM frame.

In order for a host to communicate on a subnetted network segment, which two portions of its IP address must match those of the subnet address? (Choose two.)

The subnet portion The network portion

A user's personal computer (PC) is connected to a virtual local area network (VLAN) trunk link. What will most likely happen as the switch forwards tagged frames to the PC?

The switch will identify improperly tagged frames as invalid and drop them.

In a synchronous optical network (SONET) what is the basic building block having a data transmission rate of 51.84 Mbps?

The synchronous transport signal (STS) frame.

The five steps of (1) obtaining logical addresses, (2) obtaining physical addresses, (3) establishing a connection between applications, (4) the transfer of information, (5) the termination of the connection are necessary to accomplish what?

The transfer of information across a transmission control protocol/internet protocol (TCP/IP) network.

What happens to a datagram marked as "do not fragment" if it must be transmitted across a network segment with a maximum transmission unit field (MTU) smaller than the datagram?

The transmitting network device will drop the datagram, and notify the source.

Which layer of the open system interconnection reference model (OSI/RM) would you suspect as being the problem when packets arriving at the server but no information is being returned to the client?

The transport layer

How does IEEE 802.3 frame format differ from Ethernet version 2 frame format?

The type field is replaced by the length field

Distance vector algorithms (DVA) operate in which manner?

They advertise their routing tables to directly connected neighbor routers.

Thicknet / 10Base5 Configuration

Transceivers placed at 8.5-foot intervals or multiples thereof. Each segment must be no longer than 500 meters (1,640 feet). The Ethernet 5/4/3 rule applied: Up to five segments can be connected in a series between transmitter and receiver. Up to four repeaters may be used to connect segments. A maximum of three of those segments can contain Ethernet nodes. There can be a maximum of 100 nodes per segment. The coaxial cable has an impedance of 50 ohms. Each segment must be terminated at both ends, with one end using a grounded terminator.

Which three of the following are typical resolver functions? (Choose three.)

Translation of host name to host address (IP address). Translation of host address to host name. General lookup function that returns all of a resource record's (RR) content, rather than a processed form

Which of the following services does Simple Mail Transfer Protocol (SMTP) use?

Transmission control protocol (TCP).

What is the primary purpose of a Physical Layer protocol?

Transmit bits across a physical link

What is the primary purpose of a Data Link Layer protocol?

Transmit frames across a physical link

What is the primary purpose of a Transport Layer protocol?

Transmit messages from process to process

What is the primary purpose of a Network Layer protocol?

Transmit packets across a network

The Open Systems Interconnection reference model (OSI/RM) Physical Layer serves which primary purpose?

Transmitting bits across physical media

What is an inefficient characteristic of synchronous time division multiplexing (TDM) that is addressed by statistical TDM?

Transport of empty time slots

Which three of the following are typical management agent components? (Choose three.)

Transport protocol. Simple Network Management Protocol (SNMP) engine. Management profile.

Which Simple Network Management Protocol (SNMP) protocol data unit (PDU) notifies the management station of the occurrence of a significant event?

Trap

Which three of the following applications utilize user datagram protocol (UDP)? (Choose three.)

Trivial file transfer protocol (TFTP). Simple network management protocol (SNMP). Domain Name System (DNS).

A hub may be used to provide connectivity in both a star and star ring network. True or False?

True

An organization may use more than one type of topology in a single network. True or False?

True

Virtual local area networks (VLAN) can be created using a variety of switch vendor products in the same network. True or False

True

Dynamic Routing Protocols

Two types of dynamic routing protocols are used by computer networks to maintain their routing tables and calculate the shortest path to a destination. They are Distance Vector Algorithms (DVA), also known as Bellman-Ford algorithms, and Link-state Algorithms (LSA), also known as Shortest Path First (SPF) or Dijkstra algorithms.

A client Domain Name System (DNS) resolver wishes to resolve a Web server fully qualified domain name (FQDN) to an IP address. It sends its first message to its designated DNS server, requesting name to IP address resolution. This message contains: 1) The LAN protocol Data Link Layer header and trailer. 2) The IP header. 3) The user datagram (UDP) header. 4) The DNS resolver request. Why did the resolver send the DNS request in the first packet, rather than send an initial empty SYN packet?

UDP does not use SYN and ACK packets.

Which is a true statement concerning user datagram protocol (UDP)?

UDP servers must listen for service requests on well known ports, or else the transactions may fail.

Which best describes the user datagram protocol (UDP) demultiplexing process?

UDP uses port numbers to allow multiple applications to communicate simultaneously on the same host.

What are the primary requirements to connect to a transmission control protocol/internet protocol (TCP/IP) network?

Unique pairs of Network Layer and Transport Layer addresses and use of the TCP/IP protocol suite

RIP Timers

Update timer Route timeout timer (also known as the route invalid or expiration timer) Garbage collection timer (also known as the route flush timer) The update timer is set by default to 30 seconds, and controls how frequently a router sends regular update messages to its neighbors. The timeout timer determines how long a router maintains an active a route for which it has not received an update (an invalid route). The garbage collection timer determines how long a router maintains an invalid route entry before it discards it entirely.

Which choice is the best solution for allowing externally initiated connections through a network address and port translation (NAPT) network address translation (NAT) device?

Use static address mappings for any internal services we wish to make externally available.

Which of the choices below is a Transport Layer protocol?

User datagram protocol (UDP)

Which TCP/IP Transport Layer protocol provides an end-to-end, transaction-oriented, best-effort, connectionless service?

User datagram protocol (UDP).

HTTP web communication

Uses a TCP connection HTTP is a relatively simple protocol that passes commands, called methods, between the client and the server. Contains 7 basic methods

Why does simple network management protocol (SNMP) use unsolicited messages (traps) from the network element to poll for appropriate information?

Using traps is consistent with the goal of simplicity and minimizing the amount of traffic generated by the network management function

Which form of wavelength division multiplexing (WDM) is used in passive optical network (PON) installations to transport two optical carriers downstream and another optical carrier upstream over a single optical fiber?

Wide wavelength division multiplexing (WWDM) is used in PON installations to transport two optical carriers downstream and another optical carrier upstream over a single optical fiber.

Telnet Single Command Options Negotiation Format

Will (251)—Indicates the desire to begin performing some specified option ("I would like to do local echoing of characters"). Won't (252)—Indicates that the Telnet process will not perform the option ("I can't locally echo"). Do (253)—Indicates that the sending Telnet desires the other party to perform some specified option ("Please perform local echoing"). Don't (254)—Indicates that the other side should not perform the option ("You shouldn't locally echo").

What Linux tool allows you to run Windows applications natively under Linux on an x86 platform?

Windows Emulator (WINE).

Which name resolution technique dynamically resolves Windows host names to IP addresses?

Windows Internet Naming Service (WINS).

Which of the following are protocol analyzer applications available for use on the Linux platform? (Choose two.)

Wireshark. Kismet.

in the Linux filesystems, where must the boot images reside?

Within the first two gigabytes of the hard drive.

Which Telnet single command option code tells the requestor that the remote will not perform the option?

Won't (252).

To determine the path your IP packets take to reach a remote office router, you issue the tracert command from a local network host, targeted at the remote office router's outside interface. Previous tracert replies showed the router nine hops away, so you set the tracert command's maximum hops option to 10. You ping the remote router interface, 191.67.17.2, and it succeeds. You issue the command tracert -h 10 191.67.17.2, but the tracert result does not list the router interface's IP address. Which might be a reason why this occurred?

Your Internet service provider (ISP) has added routers between your local and remote network.

What provides user datagram protocol (UDP) with the ability to the demultiplex data for an application?

a UDP designation port number

Which address resolution protocol (ARP) command option shows the contents of the local ARP cache?

arp -a.

What is the default shell for macOS 10.3 and up?

bash

Where is the amplitude dimension?

click on image

Where is the frequency dimension?

click on image

How does network address translation (NAT) help secure a private network from outside attacks?

t allows networks to use private IP addresses on the internal network, and still access the Internet.

Tools Used For Troubleshooting a TCP/IP Network

ipconfig (interface configuration)—Displays addressing information on a Microsoft host computer, including Internet protocol (IP) address, subnetmask, and default gateway ping—Verifies that a computer's IP stack is running properly and checks connectivity between computers. tracert/traceroute—Checks the connection path and round trip time (RTT) between two computers and returns information about each router handoff point (hop) along the way. nbtstat—Displays network protocol statistics and current TCP/IP connections using Network Basic Input/Output System (NetBIOS) over a TCP/IP connection. netstat—Displays protocol statistics and the current state of TCP/IP connections on a computer. ARP (address resolution protocol)—Discovers the media access control (MAC) address that matches the given IP address within the local network. Command arp -d shows the ARP cache of the local computer. pathping—A Microsoft traceroute utility that computes the connection path and latency or delay between two network devices. mtr (my traceroute)—A Linux-based traceroute that continually shows the latency between network devices in a table format. ipconfig /all - More information is available ipconfig /release command releases the currently selected adapter's address lease and related information ipconfig /renew command updates the current adapter's lease information.

Which TCP/IP tool allows you to display a workstation's network configuration values?

ipconfig.

Which of the following commands shows the addresses configured on a Microsoft PC?

ipconfig.

Which of the following helps to determine local addressing information?

ipconfig.

Which Linux application supports firewall functionality in the version 2.4 and greater kernel versions?

iptables.

Which statement best describes network address translation (NAT) masquerading?

it hides all internal addresses behind one external address

When using multipath routing and multiple routes are available for a single destination address, how does the router make the route selection?

it selects the route with the highest precedence

Which is a valid email address?

[email protected]

As a result of issuing the file transfer protocol (FTP) DIR command, each file listing entry begins with a "-"; what does the "-" indicate?

means the item is a file

Which command uses Network Basic Input/Output System (NetBIOS) to display protocol statistics on a local host?

nbtstat.

Which utility displays a host's current Network Basic Input/Output System (NetBIOS) over a TCP/IP connection?

nbtstat.

Which firewalls are supplied in modern Linux distributions? (Choose two.)

nftables. iptables.

Synchronous TDM Applications

originated with the telephone industry as methods to improve their network's efficiency. T-carriers that evolved to synchronous optical networks (SONET), divide each transport frame into a series of timeslots, and then allocate timeslots to each user. The result is constant-bit-rate service that is ideal for voice transport.

In what type of installation is wide wavelength division multiplexing (WWDM) used?

passive optical network (PON)

Pathping

pathping provides statistical details about the turnaround time (in milliseconds) between you and each router (and between routers) along the network path by sending multiple ICMP Echo Request commands.

Which TCP/IP troubleshooting tool is the fastest and easiest method to evaluate whether a host is available across a TCP/IP network?

ping.

Which of the following echoes information back from an IP process?

ping.

Poison Reverse Updates

poison reverse updates are intended to defeat larger routing loops. increases in routing metrics generally indicate routing loops. Poison reverse updates are then sent to remove the route and place it in holddown.

Backbone Area in OSPF

the backbone area consists of those networks not contained in any area, routers attached to those networks, and all ABRs. The main function of the backbone area is to distribute routing information between areas. This backbone copy sends and receives SLAs over the backbone; thus, all areas can learn about backbone reachability without directly participating in the backbone's routing advertisements.

Virtual Links in OSPF

there is a break in the link between ABRs or ABRs must connect over a non-backbone area, a virtual link can connect the ABR to the backbone. The virtual link forms a tunnel over any available physical link, and thus is not associated with any one specific physical link. This forms an optimized path for routing packets between discontiguous ABRs

Distance Vector algorithms (DVA) operate in which manner?

they advertise their routing tables directly to directly connected neighbor routers

How much overhead is added to a T1 carrier to carry control information to help sort the multiplexed channels on each end?

to help sort the multiplexed channels on each end, 1 bit per frame is added in a T1 carrier to carry control information to help sort the multiplexed channels on each end. With 8,000 frames per second there is 8,000 bits of overhead added to a T1 carrier.

Which of the following commands shows the path between source and destination in a TCP/IP network?

tracert.

Which of the following troubleshooting tools tells how many hops to the destination computer?

tracert.

How would an operator find a list of options available for the ping utility?

type "ping" from a command line

In optical fiber, the 850 nanometer (nm) window

used exclusively for multimode fiber.

Multimode optical fiber

used in some local area networks (LAN), security, and industrial applications.

Single-mode fiber-optic Cable

used throughout the telecommunications industry because of its increased signal capacity, lower signal attenuation, and lower manufacturing costs.

Carrier Ethernet

used to connect LANs in the same geographic or metropolitan area. A Metro Ethernet network and Long-haul Ethernet networks that connect two or more Metro Ethernet networks


Set pelajaran terkait

Parallel Programming, Homework(1-3) Review

View Set

Life Quiz : Policy provisions, Riders and Options

View Set

Chapter 45: Hormones & The Endocrine System

View Set

Authors notes and chapter 1-4 Life of Pi

View Set

AS 100 Customs & Courtesies/ Dress and Appearance

View Set