Ultimate Network+ Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Class A IP Addresses

1.0.0.0-127.0.0.0 0-127, Subnet Mask of 255.0.0.0, default CIDR of /8 1.x.x.x - 126.x.x.x 10.x.x.x Mask 255.0.0.0

What is the maximum speed and typical use of CAT 6 UTP cable?

10 Gbps 10 Gibabit Ethernet (10 GbE)

Category 3 Cable Type

10 Mbps

What is the maximum speed and typical use of CAT 3 UTP cable?

10 Mbps Ethernet over UTP at 10 Mbps (10BaseT)

Transfer rate of 10 Base T?

10 megabits per second (Mbps)

10gbase-LR and 10gbase-LW

10,000 mbps, 10,000m, smf

10gbase-ER and 10gbase-EW

10,000 mbps, 40,000m, smf

10gbase-t

10,000mbps, 100m, cat 6 or 7

10gbase-SR and 10gbase-SW

10,000mbps, 300m, mmf

Class A Range (Private IPv4 Address)

10.0.0.0 - 10.255.255.255

Cat5 bandwidth?

10/100 Base-T

Category 5 Cable Type

100 Mbps

What is the maximum speed and typical use of CAT 5 UTP cable?

100 Mbps Ethernet over UTP at 100 Mbps (100BaseTX)

Category 5e Cable Type

100 Mbps and Gigabit networks and is usually rated at 350 MHz, but actual speed varies depending on several different networking factors.

100base-Tx

100 mbps, 100m, cat 5

100base-fx

100 mbps, 2000m, MMF

With an Ethernet 10BasT network, the maximum cable lenght between a computer and the hub is

100 meters

With an Ethernet 10BaseT network, the maximum cable length between a computer and the hub is:

100 meters

Your network follows the 100BaseTx specifications for Fast Ethernet. What is the maximum cable segment

100 meters

Your network follows the 100BaseTx specifications for Fast Ethernet. What is the maximum cable segment length allowed?

100 meters

Max length for Cat5 cable?

100 meters (328 feet)

A host has the address 100.55.177.99/16 Which of the following is the broadcast address for the subnet?

100.55.255.255

A host has the address 100.55.177.99/16. What is the broadcast address for the subnet?

100.55.255.255

1000base-T

1000 mbps, 100m, cat 5

What is the binary format for the following decimal IP address? 131.9.202.111

100000011.00001001.11001010.01101111

What is the binary format for the following decimal IP address? 131.9.202.111

10000011.00001001.11001010.01101111

You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150-ohm shielded twisted pair (STP) wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber-optic cabling. Which Ethernet standard could you implement in this situation

1000BaseCX

You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150ohm shielded twisted pair wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation?

1000BaseCX

Which Gigabit Ethernet standard can support long network segments up to a maximum of 5 km when used with single mode fiber-optic cable?

1000BaseLX

Which Gigabit Ethernet standard can support long network segments up to maximum of 5 km when used with single mode fiber-optic cable?

1000BaseLX

YOu want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose: select 2 1000BaseLX 1000BaseSX single mode fiber multimode fiber 1000BaseCX

1000BaseLX single mode fiber

You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose?(2 answers)

1000BaseLX, 1000BaseSX

Which Gigabit Ethernet standard uses multimode fiber-optic cabling and supports network segments up to a maximum of 550 m long?

1000BaseSX

Which Gigabit Ethernet standard uses multimode fiber-optic cabling and supports network segments up to a maximum of 550 meters long?

1000BaseSX

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Multimode fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guideline: select 2 1000BaseT 1000BaseCX 10BaseER 1000BaseSX 10BaseSR

1000BaseSX 10BaseSR

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Multimode fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines?(2 answers)

1000BaseSX, 10GBaseSR

Which of the following use the CSMA/CD access method? select all that apply FDDI token ring 1000BaseT 10BaseT

1000BaseT 10BaseT

Which of the following use the CSMA/CD access method?(2 answers)

1000BaseT, 10BaseT

What is the maximum speed and typical use of CAT 5e UTP cable?

1000Mbps Ethernet over UTP at 1000Mbps (1000BaseTX)

1000base-SX

1000mbps, 500m, mmf

1000base-LX

1000mbps, 550m, mmf

Which of the following Ethernet standards uses fiber optic cabling? 1000BaseCX 100BaseT4 100BaseFX 100BaseTX 1000BaseLX

100BaseFX 1000BaseLX

Which of the following Ethernet standards uses fiber-optic cabling?(2 answers)

100BaseFX, 1000BaseLX

Cat 5 speed:

100Mbits

What is the maximum length of UTP cable?

100m

Ethernet subnetting limit:

1024 in a subnet

You would like to implement 10 Gbps Ethernet over a distance of 1 km or greater. Which of the following would be the minimum requirement for the implementation?(2 answers)

10GBaseLR standards, Single mode fiber

Which of the following standards is used by SONET?

10GBaseLW

which of the following standards is used by SONET? 1000BaseCX 1000BaseLX 10GBaseLW 10GBaseER

10GbaseLW

Cat 6 speed:

10Gbits

Cat 3 speed:

10Mbits or 16Mbits

802.11b

11 Mbps (Data Transfer Rate) and 2.4 GHz Frequency

On what Port is POP3?

110

What is the decimal format of the following binary address?

11001110.00111010.10101010.01000011

On what Port is SUN RPC?

111

Loopback address

127.x.x.x Sometimes called the localhost, a reserved IP address used fror internal testing: 127.0.0.1.

B class range

128 - 191 B: IP 192.168.1.100/23 GW 192.168.2.1

IPv6

128 Bit Address Hexadecimal 0-9,A-F

What is the maximum data rate of an ISDN BRI line?

128 Kbps

Advanced Encryption Standard (AES)

128-,192-, and 256-bit

Temporal Key Integrity Protocol (TKIP)

128-bit encryption level

Class B IP Addresses

128.0.0.0-191.255.0.0 128-191, Subnet Mask of 255.255.0.0, default CIDR of /16 128.x.x.x - 191.x.x.x 172.0-16.x.x Mask 255.255.0.0

Which of the following IP addresses have a default subnet mask of 255.255.0.0? pick all that apply 129.0.0.1 228.23.45.0.1 123.254.19.6 191.168.2.15 168.45.68.1

129.0.0.1 191.168.2.15 168.45.68.1

Which thre3 is not a valid IP address? 129.0.0.272 228.23.450.0.1 365.254.19.6 191.168.2.15 168.45.68.1

129.0.0.272 228.23.450.0.1 365.254.19.6

A host on the network has an IP address of 129.11.99.78 using the deafult subnet mask

129.11.99.78/16

A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation

129.11.99.78/16

Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on your network? 130.15.0.1 130.16.3.89 130.15.60.0

130.16.3.89

Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on your network?

130.16.61.3

In an IP addressing scheme using default subnet masks, which of the following IP addresses can you assign to a host? 132.70.254.15 127.0.0.1 199.45.207.0

132.70.254.15

On what Port is NetBios

135-139

Which of the following IP addresses is a valid IP address for a host on a public network? 172.18.188.67 10.0.12.15 142.15.6.1

142.15.6.1

On what Port is IMAP?

143

On what Port is SQL Server?

1433

What is the speed of an OC-3 connection?

155 mbps

What is the maximum speed and typical use of CAT 4 UTP cable?

16 Mbps Token Ring at 16 mbps

Which port number is used by SNMP?

161

On what Port is SNMP?

161 & 162

What is the first IP address that can be assigned to hosts on the 166.70.0.0?

166.70.0.1

Which of the following is the first IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.0.1

What is the last IP address that can be assigned to hosts on the 166.70.0.0

166.70.254.255

Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.255.254

What is the network address and subnet mask used by APIPA

169.254.0.0

What is the network address and subnet mask used by APIPA? (Select 2)

169.254.0.0, 255.255.0.0

What IP address ranges is reserved for Automatic Private IP Addressing

169.254.0.1--169.254.255.254

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

169.254.0.1-169.254.255.254

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 172.16.0.1-172.31.255.254 169.254.0.1-169.254.255.254 10.0.0.1-10.255.255.254

169.254.0.1-169.254.255.254

APIPA Address range

169.254.x.x

Class B Range (Private IPv4 Address)

172.16.0.0 - 172.31.255.255

Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your netowork?

179.113.0.118, 179.113.65.12, 179.113.89.0

Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your network? 180.113.0.67 179.113.89.0 179.113.0.117 179.113.65.12 179.112.95.64

179.113.89.0 179.113.0.117 179.113.65.12

Which of the following IP addresses have a default subnet mask of 255.255.0.0

191.168.2.15, 168.16.5.1, 129.0.0.1

C class range

192 -223

Class C IP Addresses

192.0.0.0-223.255.255.0 192-223, Subnet Mask of 255.255.255.0, default CIDR of /24 192.x.x.x - 223.x.x.x 192.168.x.x Mask 255.255.255.0

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addressess could you assign to the computer? 127.0.0.1 10.0.12.15 240.12.188.1 32.188.99.10 192.168.12.253 172.18.188.67

192.168.12.253 172.18.188.67 10.0.12.15

Class C Range (Private IPv4 Address)

192.169.0.0 - 192.168.255.255

Cat 5e speed:

1Gbits

Telecommunications closet

"Telco room," space that contains connectivity for groups of workstations in a defined area

1 gigabit per second

(1 Gbps) 1,000,000,000 bits per second

1 kilotbit per second

(1 Kbps) 1000 bits per second

1 megabit per second

(1 Mbps) 1,000,000 bits per second

1 terabit per second

(1 Tbps) 1,000,000,000,000 bits per second

ACK

(Acknowledgement) A response generated at the Transport layer of the OSI model that confirms to a sender that its frame was received. The ACK packet is the third of three in the three-step process of establishing a connection.

ANSI

(American National Standards Institute) An organization composed of more than 1000 representatives from industry and government who together determine standards for the electronics for the electronics industry in addition to other fields, such as chemical and nuclear engineering, health and safety, and construction. Prescribes type of NIC in order to receive wireless. sets standards electronically. international.

AWG

(American Wire Gauge) A standard rating that indicates the diameter of a wire, such as the conducting core of a coaxial cable

API

(Application Program Interface) A set of routines that make up part of a software application.

BNC

(Bayonet Neill-Concelman) A standard for coaxial cable connectors named after its coupling method and its inventors.

CRC

(Cyclic Redundancy Check) An algorithm (or mathematical routine) used to verify the accuracy of data contained in a data frame. Data Link Layer protocol that generates the frame check & verifies if package was sent undamaged

DNS

(Domain Name Service) 13 root servers UDP/TCP Port 53

EIA

(Electronic Industries Alliance) A trade organization composed of representatives from electronics manufacturing firms across the United States that sets standards for electronic equipment and lobbies for legislation favorable to the growth of the computer and electronics industries.

FDDI

(Fiber Distributed Data Interface) ___ allows each node to release a new token.

FTP

(File Transfer Protocol) TCP Port 20, 21

FCS

(Frame Check Sequence) Data Link Layer A sequence of bits placed in a frame that is used to check the primary data for errors. The field in a frame responsible for ensuring that data carried by the frame arrives intact. It uses and algorithm, such as CRC, to accomplish this verification. Makes sure data matches data from source

GUI

(Graphical User Interface) A user interface based on graphical displays. With a mouse, the user points to icons that represents files, folders, and disks. Documents are displayed in windows. The user selects commands from menus.

HTTP

(Hyper Text Transfer Protocol) TCP Port 80 An application layer protocol that formulates and interprets requests between Web clients and servers. Extremely fast protocol used for network file transfers in the WWW environment.

HTTPS

(HyperText Transfer Protocol Secure(SSL)) TCP Port 443 Extremely fast protocol used for network file transfers in the WWW environment, but it uses public and private key encryption.

IEEE

(Institute of Electrical and Electronics Engineers) Prescribes how communication is sent through atmosphere and in correct sequence. international. An international society composed of engineering professionals. Its goals are to promote development and education in the electrical engineering and computer science fields.

ISO

(International Organization for Standardization) A collection of standards organizations representing 157 countries with headquarters located in Geneva, Switzerland. Its goal is to establish international technological standards to facilitate the global exchange of information and barrier-free trade.

ITU

(International Telecommunication Union) A United Nations agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases.

IAB

(Internet Architecture Board) A technical advisory group of researchers and technical professionals responsible for Internet growth and management strategy, resolution of technical disputes, and standards oversight.

What is the maximum speed and typical use of CAT 1 UTP cable?

1Mbps Voice Only-regular analog phone lines

What is the throughput and frequency used for Bluetooth?

1Mbps throughput 2.45 Ghz frequency

Physical Layer

1st layer of the OSI model. PDU is Bits Protocols(Ethernet, FDDI, HDLC, and PPP) in the physical layer generate and detect signals so as to transmit and receive data over a network medium. These protocols also set the data transmission rate and monitor data error rates, but do not provide error correction. Cabling, air, connectors, hubs, fiber optic through NICs, WAP and repeaters

How many possible MAC address combination?

2 or 48 bit address

Which of the following is a vaild IP (version 4) address? (Select 2)

2.2.2.2, 172.16.1.26

IEEE 802.3 CD

2.5km max LAN (with repeaters) Frame must be long enough that sender still sending if collision noise arrives, since when finished sending, cannot guarantee that sender still listening In the worst case, it can take 2*propagation delay (slot size) to detect a collision 51.2μs slot size => 512b min frame size given 100ns transitions for sending 1 bit 46B pad ensures that frame = 512 bits even with 0 data and 2B addressing

On what Port is FTP?

20 & 21

Your network has been assigned the Class C network address of 200.78.151.0

200.78.151.12, 200.78.151.252, 200.78.151.111

You are planning a network for an education campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?

2000 meters

You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?

2000 meters

What is the last IP address that can be assigned to hosts on the 211.70.0.0?

211.70.0.254

Which of the following is the last IP address that can be assigned to hosts on the 211.70.0.0 network using the default subnet mask?

211.70.0.254

On what Port is SSH?

22

Which three are class C addresses? 222.0.0.272 192.23.45.0.1 165.254.19.6 223.168.2.15 168.45.68.1

222.0.0.272 192.23.45.0.1 223.168.2.15

Multicast address range:

224.0.0.0 to 239.255.255.255

Class D IP Addresses

224.0.0.0-254.0.0.0 224-239, used for Multicast Addressing

On what Port is Telnet?

23

OUI

24 bit character sequence assigned by IEEE that appears at beginning of a network interface's physical address and identifies NIC's manufacturer

Class E IP Addresses

240-255, used for Experimental Addressing

On what Port is the SMTP Server?

25

You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select Two)

25, 110

You have been told to assign the IP address 21.155.67.188 to a host on the network using the default subnet mask. WHich mask should you use?

255.0.0.0

You are configuring the IP address for a host and have been asked to use the address 192.160.99.110/16. What subnet mask value would you use?

255.255.0.0

What is the default mask for the IP address 203.111.3.3?

255.255.255.0

What is the default subnet mask for the IP address 203.111.3.37

255.255.255.0

Wi-Fi Protected Access (WPA2)

256-bit encryption level

Data Link Layer

2nd Layer Error checking PDU is Frames, Transmits packets from node to node based on addresses; has protocols of Ethernet, FDDI, HDLC, and PPP & SLIP Hardware used are NICs, MAC address, bridges, switches & WAP 2nd layer in the OSI model. The Data Link layer bridges the networking media with the Network layer. Its primary function is to divide the data it receives from the Network layer into frames that can then be transmitted by the Physical layer.

On what Port is RDP?

3389

On what Port is LDAP?

389

Network Layer

3rd layer of the OSI model. PDU is Packets, Protocols: IPX, ARP, DHCP, ICMP, OSPF translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver transfers data to LANS/WANS based on network address, turns address into physical Hardware used are Routers or Switches IP addressing scheme

What is the maximum speed and typical use of CAT 2 UTP cable?

4 Mbps Used by old Token Ring

Cat5

4 unshielded, twisted pairs--UTP

Your network follows the 100BaseFX specifications for Fast Ethernet, and uses half-duplex, multimode cable. What is the maximum cable segment length allowed

412 meters

Your network follows the 100BaseFX specifications for Fast Ethernet, and uses half-duplex, multimode cable. What is the maximum cable segment length allowed?

412 meters

On what Port is HTTPS/ SSL?

443

Physical address

48 or 64-bit network interface identifier that includes OUI and the extension identifier

Transport layer

4th layer of the OSI model. In the Transport layer PDU is Segments Gateway - TCP, SPX, IPSec Protocols ensure that data are transferred from point A to point B reliably and without errors. (TCP) vs (UDP), ensures accurate delivery of data through flow control, segmentation, reassembly, error connection, acknowledgment and sequencing

On what Port is Sys Log/ Event Manager?

514

On what Port is DNS?

53

802.11g

54 Mbps (Data Transfer Rate) and 2.4 GHz Frequency

802.11a

54 Mbps (Data Transfer Rate) and 5 GHz Frequency

What is the most common wiring standard for UTP connections?

568B

Pin #4

568B = Blue 568A = Blue BOGB = Orange

Pin #8

568B = Brown 568A = Brown BOGB = Brown

Pin #6

568B = Green 568A = Orange BOGB = Green

Pin #2

568B = Orange 568A = Green BOGB = Blue

Pin #5

568B = White/blue 568A = White/blue BOGB = White/green

Pin #7

568B = White/brown 568A = White/brown BOGB = White/brown

Pin #3

568B = White/green 568A = White/orange BOGB = White/orange

Pin #1

568B = White/orange 568A = White/green BOGB = White/blue

Session layer

5th layer in the OSI model. PDU is Data The session layer establishes, maintains, and terminates user connections between two nodes on the network. It can be considered the "traffic cop" for network communications.

802.11n

600 Mbps (Data Transfer Rate) and 5 GHz and/or 2.4 GHz Frequency

If the SONET (OC-1) base data rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?

622.08 Mb

Wired Equivalent Privacy (WEP)

64-bit encryption level

Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?

66 Block

On what Port is TFTP?

69

Presentation Layer

6th layer of the OSI model. PDU is Data Protocols(Encryption, Compression) in the Presentation layer translate between the application and the network. allows hosts and applications to use a common language Here, data are formatted in a schema that the network can understand, with the format varying according to the type of network used. The presentation layer also manages data encryption and decryption, such as the scrambling of system passwords.

How many slave devices can a Bluetooth master control at one time?

7

How many wires does a RJ45 connector have and how are they typically used with the TCP networking standards.

8 total wires as 4 Pairs. TCP typically only uses two pairs

On what Port is HTTP?

80

Haley configures a Web site using Windows 2000 default values. What are the HTTP port and SSL port settings?

80 for HTTP; 443 for SSL

You want to increase the security of your network by allowing only authenticated users to be able to access network devices through a switch? Which one of the following should you implement?

802.1x

1Gbps / 1000 Mbps

802.3ab Ethernet networks run at __________ Mbps.

100 Mbps

802.3u Ethernet networks run at __________ Mbps.

On what Port is the Proxy Server?

8080

IEEE 802.3 Inter-frame Gap

9.6μs interval between successive frames from host to allow other hosts to use medium

GUID (Globally Unique Identifier)

A 128-bit number generated and assigned to an object upon its creation in Active Directory. Network applications and services uses an object's GUID to communicate with it.

Compact disc files system (CDFS)

A 32-bit file system used on standard capacity CD-ROMs

Service Set Identifier (SSID)

A 32-bit identification string, sometimes called a network name, inserted into the header of each data packet processed by a wireless access point. It enables you to set a basic level of access security for your wireless network.

preamble

A 64-bit series of alternating 1s and 0s that end with 11; gives a receiving NIC time to realize a frame is coming, and to know exactly where the frame starts.

Enhanced Interior Gateway Routing Protocol (EIGRP)

A Cisco proprietary hybrid protocol that uses "hello" packets broadcasted every 60 seconds to form neighbor relationships, has metrics of bandwidth, delay, load, reliability and MTU, is classless (uses VLSM), can support different protocols with PDMs and implements DUAL as it's algorithm to choose best paths to networks

Server Manager

A GUI tool provided with Windows Server 2008 that enables network administrators to manage server roles, features, resources, and users from a single interface.

Internet Protocol Security (IPSec)

A IP packet encryption protocol. This is the only IP encryption protocol to work at Layer 3 of the OSI model and is most commonly seen on VPNs.

Teredo

A NAT-traversal IPv6 tunneling protocol built into Microsoft Windows. Teredo addresses start with 2001:0000:/32.

node

A NIC connected to an Ethernet network.

Internet Protocol version 6 (IPv6)

A Network layer Protocol in the TCP/IP suite in which its 128-bit addresses consist of eight sets of four hexadecimal numbers, each number being a value between 0000 and FFFF, using a colon to separate the numbers. No IP address may be all 0s or all FFFFs. An example is FEDC:BA98:7654:3210:0800:200C:00CF:1234.

Internet Protocol version 4 (IPv4)

A Network layer protocol in the TCP/IP suite in which its 32-bit addresses consist of four sets of numbers, each number being a value between 0 and 255, and using a period to separate the numbers. Often called dotted decimal format. No IPv4 address may be all 0s or all 255s. Examples include 192.168.0.1 and 64.176.19.164.

Fragmentation

A Network layer service that breaks down segments it receives fro the Transport layer into smaller packets.

Compact disc (CD-ROM)

A ROM medium that typically holds up to 1GB of information

LPR

A UNIX command that places files in the printer queue. The files are subsequently printed with 1pd, the print service.

ARP PING

A UNIX command used in place of PING to see if you can reach a remote computer. It uses Address Resolution Protocol (ARP) packets rather than the ICMP packets used by PING (that are blocked or ignored by many devices). Not available on Windows systems, ARP PING packets do not cross routers.

BSD (Berkeley Software Distribution)

A UNIX distribution that originated at the University of California at Berkeley. The BSD suffix differentiates these distributions from AT&T distributions. no longer being developed at Berkeley, the last public release of BSD UNIX was version 4.4

Inode (Information Node)

A UNIX or Linux file system information storage area that holds all details about a file. This information includes the size, the access rights, the date and time of creation, and a pointer to the actual contents of the file.

lpd (line printer daemon)

A UNIX service responsible for printing files placed in the printer queue by the 1pr command.

crossover cable

A UTP cable with RJ-45 connectors crimped so that one complies with EIA/TIA 568A and the other complies with 568B, resulting in reversed sending and receiving pairs so that both ends of the cable can receive data. This eliminates the need for a hub or switch between 2 computers or network devices.

H.323

A VoIP standard that handles the initiation, setup, and delivery of VoIP sessions.

Active Directory

A Windows 2000 database of computer, users, shared printers, shared folders, and other network resources, and resource grouping that is used to manage a network and enable users to quickly find a particular resource

Domain Controller

A Windows Server 2003 or Server 2008 computer that contains a replica of the Active Directory database.

NBTSTAT

A Windows command that shows all the local NetBIOS names, and is a command-line equivalent to My Network Places. You must run NBTSTAT with a switch.

Torrent

A ___________ is a program used to download files quickly from a P2P network.

Host

A ___________ is a single computer or device that connects to a TCP/IP network?

Layer 3 (Network Layer)

A ___________ switch is one that uses logical addressing to determine data paths.

Ring

A ___________ topology can be defined as connecting several computers in a circle without the use of a hub or a switch.

Star Topology

A ____________ topology can be defined by connecting several hubs to a switch.

Dynamic

A _____________ address is assigned by a DHCP server.

Independent Basic Service Set (IBSS)

A basic unit of organization in wireless networks formed by two or more wireless nodes communicating in ad hoc mode.

Advanced Encryption Standard (AES)

A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.

central office

A building that houses local exchanges, and a location where individual voice circuits come together.

Multi-mode (MM)

A cable with a larger fiber core, capable of carrying multiple rays of light. This type of cable is used for shorter distance runs, up to 600 meters.

Single-mode (SM)

A cable with an optical fiber that is meant to carry a single ray of light-one ray of light, one mode. This type of cable is normally used for longer distance runs, generally 10 km and up to 80 km.

Serial cable

A cable, such as a RS232 type, that permits serial data transmission

Pipe

A character that enables you to combine existing commands to form new commands. The _____ symbol is the vertical bar (|).

complete algorithm

A cipher and the methods used to implement that cipher.

access control list

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.

supplicant

A client computer in a RADIUS network.

UNIX

A client or server operating system originally developed by researchers at AT&T Bell Labs in 1969. _____ is a proprietary operating system, but similar operating systems, such as Linux, are freely distributable.

3-tier Architecture

A client/server environment that uses middleware to translate requests between the client and server.

Zero administration for Windows (ZAW)

A combination of management options and tools that enable an organization to reduce the total cost of ownership.

My Traceroute (MTR)

A command that is similar to TRACEROUTE except that it keeps running until shut down. Not available in Windows.

HOSTNAME

A command that simply returns the host name of the local computer.

NSLOOKUP

A command used to diagnose DNS problems, but considered obsolete. DIG is a more powerful alternative, but is not available on Windows

DIG

A command used to diagnose DNS problems, but it is not available on Windows.

Route

A command-line command that enables you to display and edit the local system's routing table. To intelligently direct data between networks based on addressing, patterns of usage, and availability of network segments.

NETSTAT

A command-line utility that displays information on the current state of all the running IP processes on your computer. Use NETSTAT when you want to know about your current sessions.

What is the Domain?

A common administrative and replication boundary. sc.edu is a domain. itec.sc.edu is a sub-domain.

Connectionless

A communications session over IP which does not require an acknowledgement from the receiving computer. A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.

Connection Oriented

A communications session over IP which requires an acknowledgement from the receiving computer. A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.

Network

A communications system that enables computer users to share computer equipment, software, and data, voice, and video transmissions

Internet

A complex WAN that connects LANs and MANs around the globe

Client

A computer on a network that requests services or resources from another computer on the network

Scalable

A computer operating system that can be used on small to large computer with a single Intel-based processor and on larger computers, such as those with multiple processors

Node

A computer or other device connected to a network, which has a unique address and is capable of sending or receiving data

Gateway

A computer system or device that provides expansion capabilities for internetworking and providing translation between two systems. Provides services to all layers

Client

A computer that accesses resources on another computer via a network or by a direct connection

Peer

A computer that can function as a client and a server.

Workstation

A computer that has its own CPU and may be used as a standalone computer for work processing, spreadsheet creation, or other software applications. It also may be used to access another computer such as a mainframe computer or file server, and long as the necessary network hardware and software are installed

Workstation

A computer that runs a desktop OS and connects to a network

Client

A computer that uses resources from other computers on the network.

remote terminal

A connection on a faraway computer that enables you to control that computer as if you were sitting in front of it, logged in. Remote terminal programs all require a server and a client. The server is the computer to be controlled. The client is the computer from which you do the controlling.

Internet Control Message Protocol (ICMP)

A connectionless protocol used by programs such as PING, which never need to send more than a single packet.

RJ-45 connector

A connector introduced with the 10BaseT standard in which each of the 8 pins connects to a single wire inside the cable, allowing devices to put voltage on the individual wires within the cable.

Local connector

A connector used with single-mode or multimode fiber-optic cable

MT-RJ

A connector used with single-mode or multimode fiber-optic cable

MMC (Microsoft Management Console)

A customizable, graphical network management interface introduced with Windows Server 2003 and incorporated in Windows Server 2008's Server Manager.

HUB

A device at the center of a star topology network that acts like an electronic repeater in that it interprets the ones and zeros coming in from 1 port and repeats the same signal out to other connected ports. A multiport repeaters that receive a digital signal, regenerates it, and then broadcasts that signal to all connected ports. Works at Layer 1 and has all devices connected in the same collision and broadcast domain

DSL Access Multiplexer (DSLAM)

A device located in a telephone company's central office that connects multiple customers to the Internet.

wireless access point (WAP)

A device that Connects wireless network nodes to wireless or wired networks. Many WAPs are combination devices that act as high-speed hubs, switches, bridges, and routers, all rolled into one.

Amplifier

A device that boosts, or strengthens, an analog signal.

DSL modem

A device that connects a customer to a DSL line, with one interface that connects to a telephone wall jack and another interface that connects to a standard NIC in a computer or router. It is not a true "modem," but more like an ISDN terminal adapter; in spite of this, the term modem is used by nearly everyone including manufacturers.

Router

A device that connects network segments and directs data based on information contained in the data packet. The primary function of determining the next node to which a packet is sent by scanning the destination IP address and searching it's Routing Table for the path that the packet needs to take. Works at Layer 3 and breaks up broadcast domains and collision domains

modulator/demodulator (modem)

A device that converts outgoing digital bit streams into analog signals (modulation) and incoming analog signals back into digital signals (demodulation). Most commonly used to interconnect telephone lines to computers.

cable stripper

A device that enables you to make UTP cables by stripping the cover off cable before using a crimper to attach crimps (connectors) to the cable ends.

media convertor

A device that interconnects 2 different types of cabling in an Ethernet network.

repeater

A device that interprets the signals coming in from 1 port, and repeats the same signals out to the other connected ports.

tone probe

A device that is used with a tone generator to identify the ends of cables that are not properly labeled.

multiplexer

A device that merges information from multiple input channels to a single output channel.

punchdown tool

A device that places UTP wires into 66- and 110- blocks. It is useful in a diagnostic environment to repunch a connection to make sure all the contacts are properly set.

Multiplexer

A device that separates a medium into multiple channels and issues signals to each of those subchannels

Bridge

A device that takes the data frames it receives, and filters and forwards the frames between 2 or more networks based on the MAC address of the destination node. Originally introduced to connect networks with different media types that perform at the Hardware Layer (2), that have since been replaced by switches

certifier

A device that tests a cable to ensure that it can handle its rated capacity. Use a certifier for slowdowns, not disconnects.

multimeter

A device that tests voltage, resistance, and continuity on a line.

cable tester

A device that will reveal continuity problems caused by a broken cable.

wireless bridge

A device used to connect two wireless network segments together, or to join wireless and wired networks together in the same way that wired bridge devices do.

Network Node

A device with at least one unique network address. Usually analogous to hosts. Can be a redistributin point or end point.

Terminal

A device with little (if any) of its own processing or disk capacity that depends on a host to supply it with application and data-processing services

Packet

A discrete unit of information sent from one node to another

Mapped folder or drive

A disk volume or folder that is shared on the network by a file server or workstation, it gives designated network workstations access to the files and data in its shared volume or folder. The workstation, via software, determines a drive letter for the shared volume, which is the workstation's map to the data

Standard

A documented agreement containing technical specifications or other precise criteria that are used as guidelines to ensure that materials, products, processes, and services suite their intended purpose. In addition to, how a product or service should be performed, ensure interoperability

Child Domain

A domain established within another domain in a Windows Server 2003 or Server 2008 domain tree.

Which of the following describes a man-in-the -middle?

A false server intercepts communications from a client by impersonating the intended server.

What does plenum mean?

A fancy name for a gap between the real ceiling and the suspended tiles

Multiple in/multiple out (MIMO)

A feature in 802.11 WAPs that enables them to make multiple simultaneous connections.

What is MAC filtering?

A feature that enables the admin to limit the access of the wireless network based on the physical, hard-wired addresses of the wireless adapter

What is 10BaseFL?

A fiber-optic cabling standard for ethernet over fiber at 10 Mbps

What is 100BaseFX?

A fiber-optic cabling standard for ethernet over fiber at 100 Mbps

What is 1000BaseSX?

A fiber-optic cabling standard for ethernet over fiber using MMF at 1000 Mbps

What is 1000BaseLX?

A fiber-optic cabling standard for ethernet over fiber using SMF at 1000 Mbps

CIFS (Common Internet File System)

A file access protocol. CIFS runs over TCP/IP and is the standard file access protocol used by Windows operating systems.

Page File

A file on the hard drive that is used for virtual memory.

File Allocation Table (FAT) file system

A file system based on the use of a file allocation table, a flat table that records the clusters used to store the data contained in each Windows 95, Windows 98, and Windows 2000

NTFS (New Technology File System)

A file system developed by Microsoft and used with its Windows NT, 2000 Server, Server 2003, and 2008 operating systems.

File Globbing

A form of filename substitution, similar to the use of wildcards in Windows and DOS.

Baseband transmission

A form of transmission in which digital signals are sent through direct current pulses applied to a wire. Such as the conducting core of a coaxial cable. Send digital signal over entire bandwidth for one signal via half duplex communication.

Hypertext Markup Language (HTML)

A formatting language that is used to enable documents and graphic images to be read on the Web is a series of file servers with software such as Microsoft's Internet Information Services (IIS), which make GTML and other Web documents available for workstations to access

Linux

A freely distributable implementation of a UNIX-type of system. Finnish computer scientist Linus Torvalds originally developed it.

Transceive

A full duplex connection can _________ twice as much information per second as a half duplex connection.

Asymmetric DSL (ADSL)

A fully digital, dedicated connection to the telephone system that provides download speeds up to 9 Mbps, and upload speeds of up to 1 Mbps.

Internet

A global network of diverse Web and information servers offering voice, video, and text data to millions of users

Domain Tree

A group of hierarchically arranged domains that share a common namespace in the Windows Server 2003/2008 Active Directory.

802.3

A group of standards for networking devloped by the IEEE 802.3 subcommittee. Ethernet LAN standard, all media, interfaces, devices and data handling (using the CSMA/CD access method).

metropolitan area network

A group of two or more interconnected LANs operating under a single management. Ofthe encompasses a city-sized geographical area.

Domain

A group of users, servers, and other resources that share account and security policies through a Windows Server 2003 or Server 2008 NOS.

Digital Subscriber Line (DSL)

A high-speed Internet connection technology that uses a regular telephone line for connectivity. DSL comes in several varieties, including Asymmetric (ADSL) and Symmetric (SDSL), and many speeds. Typical home-user DSL connections are ADSL, with a download speed of up to 1.5 Mbps and an upload speed of up to 384 Kbps.

Root

A highly privileged user ID that has all rights to create, delete, modify, move, read, write, or execute files on a UNIX or Linux systems.

Intermediate distribution frame

A junction point between the MDF and concentration of fewer connections

dumb terminal

A keyboard and monitor that send keystrokes to a central processing computer (typically a mainframe or minicomputer) that returns screen displays to the monitor. The unit has no processing power of its own

Router

A layer 3 switch is similar to a ___________.

T3 line

A leased-line connection capable of carrying data at 44.736Mbps.

Per User

A licensing mode that allows a fixed quantity of clients to use one software package simultaneously.

routing table

A list of paths to various networks required by routers. You can build this either manually or automatically.

Virtual LAN (VLAN)

A logical group of users to share information despite physical locations that are configurable by switches to reduce broadcast traffic and improve performance

OU (Organizational Unit)

A logical receptacle for holding objects with similar characteristics or privileges in an NOS directory. Containers form the branches of the directory tree.

Printer Queue

A logical representation of a networked printer's functionality. To use a printer, clients must have access to the printer queue

Tree

A logical representation of multiple, hierarchical levels in a directory. It is called a _____ because the whole structure shares a common starting point (the root), and from that point extends branches (or containers), which may extend additional branches, and so on.

DN (Distinguished Name)

A long form of an object's name in Active Directory that explicitly indicates the object name, plus the names of its containers and domains. A distinguished name includes a DC (domain component), OU (organizational unit), and CN (common name). A client uses the distinguished name to access a particular object, such as a printer.

hash

A mathematical function used in cryptography that is run on a string of binary digits of any length that results in a value of some fixed length.

Group

A means of collectively managing users' permissions and restrictions applied to shared resources. Groups form the basis for resource and account management for every type of NOS. Many network administrators create groups according to department or, even more specifically, according to job function within a department.

amplitude

A measure of a signal's strength.

Amplitude

A measure of a signals strength

bandwidth

A measure of the difference between the highest and lowest frequencies that a medium can transmit.

Signal strength

A measurement of how well your wireless device is connecting to other devices.

unicast

A message sent from one computer to one other computer.

public-key cryptography

A method for exchanging digital keys securely.

anycast

A method of addressing groups of computers as though they were a single computer. Anycasting starts by giving a number of computers (or clusters of computers) the same IP address. Advanced routers then send incoming packets to the closest of the computers.

Point Coordination Function (PCF)

A method of collision avoidance, as defined by 802.11 standards, that has yet to be implemented.

Flow Control

A method of gauging the appropriate rate of data transmission based on how fast the recipient can accept data.

MAC address filtering

A method of limiting access to a wireless network based on the physical addresses of wireless NICs. Enables you to configure a list of PCs, identified by their MAC addresses, which are then permitted to access the specific wireless network.

Symmetric Multiprocessing

A method of multiprocessing that splits all operations equally among two or more processors.

encryption

A method of securing messages by scrambling and encoding each packet as it is sent across an unsecured medium, such as the Internet. Each encryption level provides multiple standards and options.

Trunking

A method used to connect two or more switches together and allows like VLANs to communicate

Setup Mode

A mode that brings up an interactive configuration dialog and is utilized when no startup-config is in NVRAM

Server-based network

A model in which access to the network, and resources, and the management of resources, is accomplished through on or more servers

AM

A modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal

AM (amplitude modulation)

A modulation technique in which the amplitude of the carrier signal is modified by the applications of a data signal.

Transmit beamforming

A multiple-antenna technology in 802.11n WAPs that helps get rid of dead spots.

Asymmetric Multiprocessing

A multiprocessing method that assigns each subtask to a specific processor.

key pair

A name for the two keys generated in asymmetric-key algorithm systems.

Client/Server Architecture

A network design in which client computers use a centrally administered server to share data, data storage space and devices

sniffer

A network diagnostic program that can cause a NIC to run in promiscuous mode in order to capture all the traggic on an Ethernet network.

LAN

A network of computers and other devices confined to a relatively small space

point-to-point

A network of two single devices communicating with each other.

Peer-to-peer network

A network on which any computer can communicate with other networked computers on an equal or peer like basis without going through an intermediary, such as a server or host

Asynchronous Transfer Mode (ATM)

A network technology that runs at speeds between 25 and 622 Mbps using fiber-optic cabling or CAT 5 or better UTP.

WAN

A network that spans a long distance and connects two or more LANs

Token Bus Network

A network that uses a bus topology and a token-passing system

Token Ring Network

A network that uses a ring topology and a token-passing system

point-to-multipoint

A network topology in which one device communicates with more than one other device on a network.

Automatic Private IP Addressing (APIPA)

A networking feature in operating systems that enables DHCP clients to self-configure an IP address and subnet mask automatically when a DHCP server isn't available.

Token Ring

A networking technology developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology, using tokens to allow nodes to transmit data.

Ethernet

A networking technology originally developed at Xerox based on a bus topology in the 1970's and improved by Digital Equipment Corporation, Intel, and Xerox. Ethernet, which is the most common form of network transmission technology, follows the IEEE 802.3 standard.

The Open Group

A nonprofit industry association that owns the UNIX trademark.

Address

A number that uniquely identifies each workstation and device on a network

network ID

A number used in IP networks to identify the network on which a device or machine exists.

ephemeral port number

A number with the range of 1024-5000 (classic version) and 49152-65535 (dynamic or private) that is arbitrarily assigned by a computer to an outgoing packet.

Frame

A package for data that includes not only raw data, but also senders and recipients addressing and control information

Frame

A package for data that includes not only the raw data, or "payload," but also the sender's and recipient's addressing and control information. Frames are generated at the Data Link layer of the OSI model and are issued to the network at the Physical layer. Data that has been broken up into smaller chunks by networking technologies for the purpose of transmitting it over a network. It also includes error-checking information.

virtual circuit

A packet- switching, connection-oriented mechanism in which a logical connection is established between two stations at the start of transmission. All packets follow the same route, need not carry a complete address, and arrive in sequence.

Delta channel (D channel)

A part of an ISDN line that transfers data at 16 Kbps. As part of the BRI, it carries setup and configuration information.

Transmission Control Protocol (TCP)

A part of the TCP/IP protocol suite, is a connection oriented protocol.

Branch

A part of the organizational structure of an operating system's directory that contains objects or other organizational units.

User

A person who uses a computer

GUI (Graphical User Interface)

A pictorial representation of computer functions and elements that, in the case of NOSs, enables administrators to more easily manage files, users, groups, security, printers, and other issues.

Channel Service Unit/Data Service Unit (CSU/DSU)

A piece of equipment that connects a T-carrier leased line from the telephone company to a customer's equipment (such as a router). It performs line encoding and conditioning functions, and it often has a loopback function for testing.

Phase

A point or stage in a wave's progress over time

Secure Hash Algorithm (SHA)

A popular cryptographic hash.

NFS (Network File System)

A popular remote file system created by Sun Microsystems, and available UNIX and Linux operating systems.

802.1X

A port authenication network access control mechanism.

uplink port

A port on a hub that allows you to connect 2 hubs together using a straight-thru cable.

Kernel Module

A portion of the kernel that you can load and unload to add or remove functionality on a running UNIX or Linux system.

channel

A portion of the wireless spectrum on which a particular wireless network operates. Setting wireless networks to different channels enables separation of the networks.

Intranet

A private network within an organization. It uses the same Web-based software as the Internet, but is highly restricted from public access. Intranets are currently used to enable managers to run high-level reports, to enable staff members to update human resources information, and to provide access to other forms of private data.

Frequency Division Multiplexing (FDM)

A process of keeping individual phone calls separate by adding a different frequency multiplier to each phone call, making it possible to separate phone calls by their unique frequency range.

Site survey

A process that enables you to determine any obstacles to creating the wireless network you want.

Authentication

A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers. Composed of public information (username) and private information (password).

CCNA

A professional certification that attests to one's skills in installation, configuring, maintaining and troubleshooting skills on medium sized networks that use Cisco systems' devices

Command Interpreter

A program (usually text-based) that accepts and executes system programs and applications on behalf of users. Often, it includes the ability to execute a series of instructions that are stored in a file.

Mac OS X Server

A proprietary NOS from Apple Computer that is based on a version of UNIX.

Solaris

A proprietary implementation of the UNIX operating system by Sun Microsystems.

AIX

A proprietary implementation of the UNIX system distributed by IBM.

Privileged mode

A protected memory space allocated for the Windows 2000 kernel that cannot be directly accessed by software applications

SMB (Server Message Block)

A protocol for communications and resource access between systems, such as clients and servers, SMB originated at IBM and then was adopted and further developed by Microsoft for use on its Windows operating systems. The current version of SMB is known as the CIFS (Common Internet File System) protocol.

Address Resolution Protocol (ARP)

A protocol in the TCP/IP suite used with the command-line utility of the same name to determine the MAC address that corresponds to a particular IP address.

Dynamic Host Configuration Protocol (DHCP)

A protocol that allows a DHCP server to automatically set TCP/IP settings for a DHCP client.

Internet Group Management Protocol

A protocol that allows routers to forward multicast IP packets to these type of groups.

File Access Protocol

A protocol that enables one system to access files on another system.

Network Time Protocol (NTP)

A protocol that gives the current time.

What is TKIP?

A protocol that is used to change the keys used for encryption for every packet that is sent.

Point-to-Point Protocol over Ethernet (PPPoE)

A protocol that was originally designed to encapsulate PPP frames into Ethernet frames. Used by DSL providers to force customers to log into their DSL connection instead of simply connecting automatically.

How does a proxy server differ from a packet filtering firewall?

A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.

certificate

A public encryption key signed with the digital signature from a trusted 3rd party called a certificate authority (CA). This key serves to validate the identity of its holder when that person or company sends data to other parties.

Account

A record of a user that contains all of her properties, including rights to resources, password, user name and so on.

Challenge Handshake Authenciation Protocol

A remote access authentication protocol. It has the serving system challenge the remote client, which must provide an encrypted password.

Universal disk format (UDF)

A removable disk formatting standard used for large capacity CD-ROMs and DVD-ROMs

Object

A representation of a thing or person associated with the network that belongs in the NOS directory. Objects include users, printers, groups, computers, data files, and applications.

Transport Layer Security (TLS)

A robust update to SSL that works with almost any TCP application.

Static Route

A route created when the specific route is manually inputed into the routing table

Dynamic Route

A route maintained by the router itself and is automatically updated by the router

Multi-Protocol Label Switching (MPLS)

A router feature that labels certain data to use a desired connection. It works with any type of packet switching (even Ethernet) to force certain types of data to use a certain path.

aggregation

A router hierarchy in which every router underneath a higher router always uses a subnet of the higher router's existing routes.

Process

A routine of sequential instructions that run until it has achieved its goal. For example, a spreadsheet program.

Mandatory Access Control (MAC)

A security model in which every resource is assigned a label that defines its security level. A user that lacks that security level does not get access.

Temporal Key Integrity Protocol (TKIP)

A security protocol that uses a 128-bit encryption key. Used with WPA as an extra layer of security, it was soon hacked, and a replacement had to be found. The replacement is WPA2.

Kerberos

A security system developed by the Massachusetts Institute of Technology to enable two parties on an open network to communicate without interception from an intruder, by creating a unique encryption key for each communication session

cipher

A series of complex and hard-to-reverse mathematics run on a string of ones and zeroes in order to make a new set of seemingly meaningless ones and zeroes.

OpenSSH

A series of secure programs developed by the Open BSD organization to fix SSH's limitation of only being able to handle one session per tunnel.

Pipeline

A series of two or more commands in which the output of prior commands is sent to the input of subsequent commands.

Mail Server

A server that manages storage/transfer of e-mail messages

fractional T1 access

A service provided by many telephone companies wherein customers can purchase a number of individual channels in a T1 line in order to save money.

Redirector

A service that ruins on a client workstation and determines whether the client's request should be handled by the client or the server.

protocol suite

A set of protocols that are commonly used together and operate at different levels of the OSI seven-layer model.

algorithm

A set of rules for solving a problem in a given number of steps.

File Transfer Protocol (FTP)

A set of rules that uses ports 20 and 21, and efficiently transmits large files.

Simple Network Management Protocol (SNMP)

A set of standards for communication with devices connected to a TCP/IP network. Examples of these devices include routers, hubs, and switches.

token

A short binary code that is passed around to computers on a ring topology, and in some cases a bus topology. A special control frame that indicates to the rest of the network that a particular node has the right to transmit data

analog

A signal that uses variable voltage to create continuous waves, resulting in an inexact transmission.

Which of the following correctly describes the T1 carrier system?(select two)

A single T1 channel can transfer data at 64 Kbps, T1 lines use pairs of copper wire

connection

A single communication between two computers. Also called a session.

Session

A single communication or connection for data exchange between two computers. The term session may be used in the context of Web, remote access or terminal and mainframe communications, for example.

packet sniffer

A software utility or dedicated hardware device that intercepts and logs network packets. Wireshark is a popular packet sniffer.

What is a loopback cable?

A special cable used for self-diagnostics and typically has wires connecting the trasmit pins to the recieve pins on the same system

Token

A special control frame that indicates to the rest of the network that a particular node has the right to transmit data

butt set

A special hand set used to tap into a 66- or 110-block to see if a particular line is working.

mailbox

A special holding area on a mail server for a user's e-mail. Each user's messages are stored separately.

frequency-hopping spread spectrum (FSSS)

A spread-spectrum broadcasting method defined in the 802.11 standard that sends data on one frequency at a time, constantly shifting (or hopping) frequencies.

orthogonal frequency-division multiplexing (OFDM)

A spread-spectrum broadcasting method that combines the multiple frequencies of DSSS with FHSS's hopping capability.

Distributed component object model (DCOM)

A standard built upon COM to enable object linking to take place over a network

Power over Ethernet (PoE)

A standard defining a method by which devices can receive power from the same Ethernet cables that transfer data. Both the device receiving the power and the device supply it must support PoE. One scenario is a PoE-enabled WAP receiving power from a PoE-enabled Ethernet switch.

568A

A standard for crimping of 4-pair UTP cable in which wires.

LDAP (Lightweight Directory Access Protocol)

A standard protocol for accessing network directories.

AWG

A standard rating that indicates the diameter of a wire, such as the conducting core of a coaxial cable

Layer 1 (Physical Layer)

A standard such as 100Base-T refers to which OSI layer?

Authorization

A step in the AAA philosophy during which a client's permissions are decided upon.

Hierarchical Storage Management (HSM)

A storage management system that enables administrators to establish storage policies, archiving techniques, and disk capacity planning through automated procedures and the coordinated use of different media, including tapes, CD-ROMs, hard drives, and Zip Drives

digital signature

A string of characters, created from a private encryption key, that verifies a sender's identity to those who receive encrypted data or messages.

Data Encryption Standard

A symmetric-key algorithm developed by the U.S. government in the 1970s and formerly in use in a variety of TCP/IP applications. DES used a 64-bit block and a 56-bit key. Over time, the 56-bit key made DES susceptible to brute-force attacks.

Key Distribution Center (KDC)

A system for granting authentication in Kerberos.

binary

A system founded on using 1s and 0s to encode information.

Network Access Server

A system that controls the modems in a RADIUS network.

Network Access Server (NAS)

A system that controls the modems in a RADIUS network. See also Remote Authentication Dial-In User Service (RADIUS).

RADIUS server

A system that enables remote users to connect to a network service. - Combines authentication and authorization using policies to grant access. - Uses UDP. - Encrypts only the password. - Often uses vendor-specific extensions. RADIUS solution from different vendors might not be compatible.

Modulation

A technique for formatting signals in which one property of a simple carrier wave is modified by the data signal during transmission

dedicated line

A telephone line that is an always open, or connected, circuit. Dedicated telephone lines usually do not have telephone numbers.

dial-up line

A telephone line with a telephone number; a user must dial to make a connection, as opposed to a dedicated line that is always connected.

Secure Shell (SSH)

A terminal emulation program that looks exactly like Telnet but encrypts the data. SSH has replaced Telnet on the Internet because it provides better security through data encryption.

33

A total of __ MSAUs can be connected together.

switching loop

A traffic loop, resulting in every computer on the broadcast domain being unable to access the network. Caused by the way in which multiple switches are connected, but normally avoided by switches using the spanning tree protocol.

What is Broadcast Transmission?

A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it, which can generate a great deal of network traffic.

What is Multicast Transmission?

A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.

What is Unicast?

A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)

Straight-through cable

A twisted pair patch cable in which the wire terminations in both connectors follow the same scheme

Bearer Channel (B Channel)

A type of ISDN service that carries data and voice information using standard DS0 channels at 64Kbps.

STP

A type of cable containing twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil

Symmetric multiprocessor (SMP)

A type of computer with two or more CPUs that share the processing load

MMF

A type of fiber-optic cable that contains a core with a diameter between 50 and 100 microns

Class

A type of object recognized by an NOS directory and defined in an NOS schema. Printers and users are examples of object classes.

Inherited

A type of permission, or right, that is passed down from one group (the parent) to a group within that group (the child)

110 block

A type of punch-down block designed to terminate Cat 5 or better twisted pair wires

Member Server

A type of server on a Windows Server 2003/2008 network that does not hold directory information and, therefore, cannot authenticate others.

Site License

A type of software license that, for a fixed price, allows any number of users in one location to legally access a program.

Explicit One-Way Trust

A type of trust relationship in which two domains that belong to different NOS directory trees are configured to trust each other.

unicast address

A unique IPv6 address that is exclusive to a system. Link-local addresses are unicast addresses.

Segment

A unit of data that results from subdividing a larger protocol data unit. The bus cable to which computers on an Ethernet network work.

Layer 6 (Presentation Layer)

A user has connected to a Web site. The information that is sent to that user's computer is encrypted in an encoded format. This change to the data occurs at the ___________ layer.

Attribute

A variable property associated with a network object. For example, a restriction on the time of day a user can log on is an attribute associated with that user object.

Fedora

A version of Linux packaged and distributed by Red Had.

MD5

A very popular hashing function.

dynamic addressing

A way for a computer to receive IP information automatically from a server program. See Dynamic Host Configuration Protocol (DHCP).

Classless inter-domain routing (CIDR)

A way of allocating IP addresses and routing Internet Protocol packets.

Thread

A well-defined, self-contained subset of a process. Using _____ within a process enables a program to efficiently perform related, multiple, simultaneous activities. _____ are also used to enable processes to use multiple processors on SMP systems.

Extended Service Set (ESS)

A wireless network with more than one access point.

ad-hoc mode

A wireless networking mode where each node is in direct contact with every other node in a decentralized free-for-all. Ad hoc mode is similar to the mesh topology, the simplest way to network wireless computers, but it offers no fine control over shared resources.

Wi-Fi protected Access (WPA)

A wireless security protocol that addresses the weaknesses and acts as a sort of upgrade to WEP. WPA offers security enhancements such as dynamic encryption key generation (keys are issued on a per-user and per-session basis), an encryption key integrity-checking feature, user authentication through the industry-standard Extensible Authentication Protocol (EAP), and other advanced features that WEP lacks.

Wired Equivalency Privacy (WEP)

A wireless security protocol that uses a 64-bit encryption algorithm to scramble data packets. The least secure of the common wireless encryption protocols.

802.11i

A wireless standard that added security features.

What is the main difference between a worm and a virus?

A worm can replicate itself and does not need a host for distribution.

Which of the following is a valid MAC address *AB.07.CF.62.16.BD *145.65.245.10 *FABC.875E.9BG6

AB.07.CF.62.16.BD 12 hexadecimal ranging form 0-9 and A-F only

Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?

ACL

Error Detection

Adding enough extra bits to detect an error, but not enough to correct the error. Retransmission required to recover lost packet. This is called ARQ (automatic repeat request).

Error Correction

Adding even more extra bits to correct errors. Examples are hamming codes and FEC (forward error correction, used in video streams and the like).

What is ARP? What are some of its attributes?

Address Resolution Protocol. Has no error control.

Multicast Address

Address assigned to a group of interfaces on multiple nodes. Packets are delivered to all interfaces.

Anycast Address

Address assigned to a group of interfaces on multiple nodes. Packets are delivered to the "first" or "closest" interface only.

Unicast

Address assigned to one interface of one host. ::/10 means that addresses starting with FE80, FE90, FEA0, and FEB0 are part of the range.

Which two of the following statements about the dynamic host configuration protocol are true? -ADHCP server assigns addresses to requesting hosts -it is used only to deliver IP addresses to host -it cannot be configured to assign the same IP address to the same host each time it boots -It can deliver other configuration information in addition to IP addresses.

ADHCP server assigns addresses to requesting hosts It can deliver other configuration information in addition to IP addresses.

Which of the following are characteristics of MLPS?(Select Two)

Adds labels to data units, Supports variable-length data units

Checksum

Adds single parity bit, can be two dimensional string that determines if arriving data units match data units sent by source. A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source.

IPsec is implemented through two separate protocols. What are these protocols called? (Select Two)

AH, ESP

Terminal

AKA Dumb Terminal or KVM. A device with little (if any) of its own processing or disk capacity that depends on a host to supply it with applications and data-processing services.

What is coaxial cable type RG-62 used for?

ARCNet

A host wants to send a message to another host with IP address 115.99.80.157. Ip doesn't know the hardwar address of the destination device. Whci protocol can be used to discover the MAC address?

ARP

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. What protocol can be used to discover the MAC address?

ARP

A host wants to sen a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP address resolution Protocol

Ethernet Encapsulation Method

ARPA

Which WAN technology uses 53 byte fixed length cells?

ATM

Cat

Abbreviation of the word category when describing a type of twisted pair cable

Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)

Access method used mainly on wireless networks. Before hosts send out data, they send out a signal that checks to make sure that the network is free of other signals. If data is detected on the wire [or other medium], the hosts wait a random length of time before trying again. If the wire is free the data is sent out.

Electronic Industries Alliance (EIA)

Accredited by ANSI and helps develop and issue standards for telecommunications and electronics.

IANA

(Internet Assigned Numbers Authority) A nonprofit, United States government-funded group that was established at the University of Southern California and charged with managing IP address allocation and the domain name system. The oversight for many of IANA's functions was given to ICANN in 1998; however, IANA continues to perform Internet addressing and domain name system administration.

ICANN

(Internet Corporation for Assigned Names and Numbers)The nonprofit corporation currently designated by the United States government to maintain and assign IP addresses.

IETF

(Internet Engineering Task Force) An organization that sets standards for how systems communicate over the Internet (for example, how protocols operate and interact).

IMAP4

(Internet Message Access Protocol) TCP Port 143

IP Address

(Internet Protocol address) The network layer address assigned to nodes to uniquely identify them on a TCP/IP network. IP addresses consist of 32 bits divided into four octets, or bytes. Hierarchical, where it is going exactly

IP

(Internet Protocol) Internet Layer, Connectionless A core protocol in the TCP/IP suite that operates in the Network layer of the OSI model and provides information about how and where data should be delivered. IP is the subprotocol that enables TCP/IP to internetwork.

ISP

(Internet Service Provider)A business that provides organizations and individuals with Internet access and often, other services, such as email and web hosting

ISOC

(Internet Society) Keeps it accessible and concerns on growth. A professional organization with members from 90 chapters around the world that helps to establish technical standards for the internet.

LDAP

(Lightweight Directory Access Protocol) TCP Port 389

LEAP

(Lightweight Extensible Authentication Protocol) A proprietary EAP authentication used almost exclusively by Cisco wireless products. LEAP is a combination of MS-CHAP authentication between a wireless client and a RADIUS server. See also MS-CHAP and Remote Authentication Dial-In User Service (RADIUS

MTU

(Maximum Transmission Unit) The largest data unit a network (for example, Ethernet or token ring) will accept for transmission.

MAC Sublayer

(Media Access Control Sublayer) The lower sublayer of the Data Link layer. The MAC appends the physical address of the destination computer onto the frame. Framing, addressing and channel access Large frames = less overhead but greater chance of collision and expensive to retransmit

NNTP

(Network News Transfer Protocol) TCP Port 119

NTP

(Network Time Protocol) UDP Port 123

OSI Model

(Open System Interconnection) Model A model for understanding and developing computer-to-computer communication developed in the 1980's by ISO. It divides networking functions among seven layers; Physical, Data Link, Network, Transport, Session, Presentation, and Application.

POP3

(Post Office Protocol version 3) TCP Port 110 Refers to the way e-mail software retrieves e-mail from the e-mail server.

PDU

(Protocol Data Unit) A unit of data at any layer of the OSI Model.

RTP

(Real-time Transport Protocol) Protocol that defines the type of packets used on the Internet to move voice or data from a server to clients. The vast majority of VoIP solutions available today use RTP.

RIR

(Regional Internet Registry) A not-for-profit angency that manages the distribution of IP addresses to private and public entities. ARIN is the RIR for North, Central, and South America

RAS

(Remote Access Server) Refers to both the hardware component (servers built to handle the unique stresses of a large number of clients calling in) and the software component (programs that work with the operating system to allow remote access to the network) of a remote access solution.

RADIUS

(Remote Authentication Dial-In User Service) An AAA standard created to support ISPs with hundreds, if not thousands, of modems in hundreds of computers to connect to a single central database. RADIUS consists of three devices: the RADIUS server that has access to a database of user names and passwords, a number of network access servers (NASs) that control the modems, and a group of systems that dial into the network.

RDP

(Remote Desktop Protocol) TCP Port 3389

SSH

(Secure Shell) TCP Port 22

SMB

(Server Message Block) TCP Port 445

Netstat -an

(Shows TCP and UDP connections numerically.

SMTP

(Simple Mail Transfer Protocol) TCP Port 25

SNMP

(Simple Network Management Protocol) UDP Port 161, 162, 10161, 10162

SYN

(Synchronization) The packet one node sends the request a connection with another node on the network. The SYN packet is the first of three in the three-step process of establishing a connection.

SYN-ACK

(Synchronization-acknowledgment) The packet a node sends to acknowledge to another node that it has received a SYN request for connection. The SYN-ACK packet is the second of three in the three-step process of establishing a connection.

TIA

(Telecommunications Industry Association) Accredited by ANSI and helps develop and issue standards for telecommunications and electronics. A subgroup of the EIA that focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment. Probably the best known standards to come from the TIA/EIA alliance are its guidelines for how network cable should be installed in commercial buildings , known as the "TIA/EIA 568-B Series."

TFTP

(Trivial File Transfer Protocol) UDP Port 69 A connectionless oriented protocol used to transfer files.

bit

(binary digit) A bit equals a single pulse in the digital encoding system. It may have only one of two values: 0 or 1.

Network Address

(virtual address) A unique identifying number for a network node that follows a hierarchical addressing scheme and can be assigned through operating system software. Network addresses are added to data packets and interpreted by protocols at the Network layer of the OSI model.

Which of the following best describes how a switch functions? *It connects multiple segments of different architectures. It translates frames, and broadcasts them to all of its ports. *It connects multiple cable segments and broadcasts frames to all of its ports. *It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.

*It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.

Which of the following are characteristics of an MT-RJ fiber optic connector *They can be used with multimode fiber optic cables *They use metal guide pins to ensure accurate alignement. *They must never be used with single-mode fiber optic cables *They use nickel-plated housing *They use a keyed bayonet *They are used with multifiber fiber optic ribbon cables

*They can be used with multimode fiber optic cables *They use metal guide pins to ensure accurate alignment.

What are the different encapsulation options offered by Link Control Protocol (LCP)?

- Authentication - Compression - Error Detection - Multilink - PPP Callback

Layer 2:

- Data Link layer - Two layers : LLC ( Logical Link Control layer) & MAC ( Media Access Control Layer) - Frames - LLC Provides the OS link to the device drivers - MAC Translates generic network request into device specific terms - Frames

What options are you able to select on a packet filtering firewall?

- Destination addr of packet - Port No. - Source addr of a packet

Interior Gateway Protocol

- Distance vector Algorithms -- Routing by rumors -- Periodical updates to the connected router -- Classful protocol -- takes longer to converge - Link State Algorithms -- all the area in a converged network sees the same pictures -- sends link state advertisements to the area -- SPF - Shortest Path First -- Topology based

IPSec are implemented in two protocol. They are?

- IP Authentication Header (AH) - Encapsulating Security Payload (ESP)

Which WAN connection types use digital communications over POTS?

- ISDN - DSL

Coaxial network cable characteristics:

- It has a conductor made from copper in the center of the cable. - It uses two concentric metallic conductors. - The ends of the cable must be terminated.

Characteristics of ISDN?

- It is a dial-up service that uses existing copper wires for the local loop. - It provides enough bandwidth to transmit data at much higher speeds than standards modems and analog lines. - It lets you transmit voice, video and data over the dame lines.

How do MODEMS work?

- It modulates digital data from the PC into analog data and transmits it on a telephone network - It demodulates analog data from a telephone network into digital PC data.

What does a switch do when an unknown destination frame is received?

- It will send the frame out all ports except the port on which the frame was received.

What are the three phases of PPP session establishment?

- Link-Establishment Phase: Link-Control Protocol (LCP) packets are sent by each PPP device to configure and test the link - Authentication Phase: If required, either CHAP or PAP authenticates the link - Network Layer: Each Network layer routed protocol establishes a service with Network Control Protocol (NCP).

MPLS is a WAN data classification and data carrying mechanism.

- MPLS is a packet switching technology that supports variable-length frames - adds a label to packets between the existing Network and Data Link Later formats. - Information in the labels is used to switch the packet through the MPLS network to the destination. - etc

Which fiber optic cables include both cables in a single connector?

- MT-RJ - LC

Layer 3:

- Network Layer - Routing - Assignment IP address - Packet/ Datagram - Routers & Gateways

Circuit-level gateway/firewall features are:

- Operates at Session Layer (L5) - Keeps a table of known connections and sessions. - Verifies proper sequence of packets. - Ensures TCP 3 Way Handshake process only occurs when appropriate. - Does not filters packet, rather allows/denies sessions.

When do you use a straight through cable?

- PC to Hub/Switch - PC to Routers/ GW - WAP to Hub/Switch

When do you use a crossover cable?

- PC to PC - PC to Uplink port - Router to router - Hub to Uplink

What are the two methods of authentication that can be used with PPP links?

- Password Authentication Protocol (PAP) - Challenge Handshake Authentication Protocol (CHAP)

Layer 1:

- Physical Layer - Cables, Hubs and Repeaters etc - Cat 5, Twisted Pair protocol - Bits

What type of fiber optic cables connects using a twisting motion?

- ST - The T in ST is associated with "T"wist.

What fiber connectors requires polishing as part of the assembly process?

- ST and SC

Layer 5:

- Session Layer - creates the session between clients. establishes session - uses a session ID to keep the data stream separate

Characteristics of an LC fiber optic connector?

- They use a housing and latch system similar to an RJ-45 UTP connector. - They are half the size of standard connectors

Layer 4:

- Transport layer - Concerns with the transportation method - responsible for segmentation - flow control, host to host error corrections, flow control - assignments of port numbers - Segments

Characteristics of ATM?

- Uses fixed-length cells of 53-bytes - Adds labels to data units

Organizational unit

-A container within a domain for managing similar objects.

Global Catalog Server

-A domain controller that also contains a subset of active directory domain services objects from other domains in the forest.

What is a tree?

-A group of domains. -itec.sc.edu, retai.sc.edu, sports.sc.edu are all in the same tree.

Extending the schema

-Adding attributes to the schema, such as adding height, weight, eye color, etc. to a user object.

Layer 7:

-Application layer - protocol association HTTP, Telnet, FTP etc -Integrating of network functionality into the host OS -Enabling communication between network client and services

Transitive Trusts

-Automatically created when a sub-domain is created. -First step for users in one domain to access resources in another domain.

Choosing between groups and OUs

-Choose OU when there is a need to delegate administrative functions.

Shortcut Trusts

-Created to expedite the flow of trusts from one sub-domain to another.

Two ways to help prevent duplication IP address on a network.

-DHCP Server - APIPA

Attributes

-Define an object -For example, a user has a first name, last name, department, phone number, address, etc...

Schema

-Determines the way all users, computer, and other object data are stored in AD DS. -Defines relationships and attributes of objects throughout AD DS

Domain Controller

-Enables user to authenticate to the domain for access to domain resources.

EIGRP

-IGP -Default metrics are bandwidth and delay -Enhanced Interior Gateway Routing Protocol Cisco Distance vector Routing Protocol -CISCO proprietary -Supports VLSM/CIDR

RIPv1

-IGP -Metric Hop max = 15 -Uses Bellman-Ford DV Algorithms -Hold Down time 180 seconds -Classfull routing

IS-IS

-IGP -Metric: Link Cost -Intermediate System to Intermediate System -An IGP, Link-State Protocol

RIPv2

-IGP -Supports CIDR -Hop max = 15 -Implements plain text authentication has added at first then MD5 was added later

What is coaxial cable used for in current times?

-In high interference environments, where un-shielded cabling cannot function well - When connecting home LAN's to an Internet connection provided by the local cable company

What is a forest?

-Multiple domain trees in one instance of active directory domain services.

Server core installation

-No GUI version of the operating system -Saves RAM -Less Maintenance and better security

Operation Master Roles

-One per DOMAIN only.

Multimaster Replication Operation Master Roles

-One per FOREST only

OSPF

-Open Shortest Path First -IGP -Metric: Uses path cost = metrics -Link State Protocol -Supports VLSM/CIDR and faster convergence -DIJKSTRAR

What is Authentication? What phase is it?

-Phase 1 -Access mechanism that verifies a user, process, or computer.

What is Authorization? What phase is it?

-Phase 2 -Decides based on the directory what access rights or rules the authenticated entity is under.

Layer 6:

-Presentation layer - handles syntax, encryption and compression - specifies data format

Originating writes

-Replication of objects between domain controllers is accomplished through the use of a property known as Originating Writes.

which Internet services provides equal upload and download speed?

-SDSL provides equal download and upload speeds

5 Technologies of Directory Services

-TCP-IP - Lightweight Directory Access Protocol (LDAP) support -Domain name systems (DNS) support. -Security support -Ease of administration

Windows Rights Management Services

-The framework for secured information sharing of data by encrypting content and setting a policy on the content.

Characteristics of an MT-RJ fiber optic connector?

-They can be used with multimode fiber optic cables. - They use metal guide pins to ensure accurate alignments.

How to create a DMZ?

-To create a DMZ use two network based firewalls. One connected to the public and one on the private network.

TIA/EIA 568B Wiring specifics

-Used for Cat 5e,6 -Color Coding: 1 White Orange 2 Orange 3 White Green 4 Blue 5 White Blue 6 Green 7 White Brown 8 Brown

Objects

-Users, printers, and computer are some examples of objects.

Domain VS. OU usage

-When an administrator has the choice of creating multiple domains versus multiple organizational units, it is easier to create multiple OUs in one domain.

A class range

0 - 126 A: IP 192.168.3.100/23 GW 192.168.2.1

What is the proper format of a MAC address?

00-00-00-00-00-00(- can also be replaced with .)

What are the common fiber-optic cabling standards?

1) 10BaseFL 2) 100BaseFX 3) 1000BaseSX 4) 1000BaseLX 5) FDDI

Name three methods to carry radio frequency.

1) Direct Sequence Spread Spectrum (DSSS) 2) Frequency Hopping Spread Spectrum (FHSS) 3) Orthogonal Frequency-Division Multiplexing (OFDM)

link state

1) In wireless networking, an indication of whether you are connected. 2) In routing protocols, a type of dynamic routing protocol that announces only changes to routing tables, as opposed to entire routing tables. Compare to distance vector routing protocols.

What are the most common types of coaxial cables?

1) RG-58 2) RG-8 or RG-11 3) RG-62

CRC algorithm

1) multiply i(x) by x^n-k (shifts bits left) 2) divide by g(x) (solves for r(x)) 3) add r(x) (those 0's on right gained from shift become check bits) Errors undetected if no remainder exists.

1Kbps

1,000 bits per second

1Mbps

1,000,000 bits per second

1Gbps

1,000,000,000 bits per second

1Tbps

1,000,000,000,000 bits per second

Describe briefly the Spanning Tree Protocol?

Algorithm that detects cabling loops and then disables an affected port to remove loops.

CRC

Algorithm used to verify accuracy of data in a contained frame

Which of the following is a characteristic of static routing when compared to dynamic routing?

All routers must be manually updated on the router.

Variable-length subnet masking (VLSM)

Allows a network to be divided into different-sized subnets to make one IP network that would have previously been considered a class (such as Class A) look like Class B or Class C.

How does CSMA/CA work?

1. The system asks for permission to transmit 2. A designated authority (such as a hub, router, or access point), grants access when the comms medium is free. 3. The system transmit data and waits for an ACK 4. If no ACK is received, the data is retransmitted.

How does CSMA/CD work?

1. The system listens for traffic, if the line is clear it begins transmitting. 2. During the transmission, the system listens for collisions. 3. If no collisions are detected, the comm succeeds. IF collisions are detected, an interrupt jam signal is broadcast to stop all transmissions. Each system waits a random amount of time before starting over at step 1.

HTTP

Almost all of your users connect to Web sites with Internet Explorer. they usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name?

crimper

Also called a crimping took, a tool used to secure an RJ-45 connector (a "crimp") onto the end of a UTP cable.

Digital video disc (DVD)

Also called digital versatile disk, a ROM medium can hold from 4.7 to 17 GB of information

What is a rollover cable?

Also called the console cable It's used to connect the admin's system to the console port of a CIsco router or switch

10BaseT

An Ethernet LAN designed to run on UTP cabling. Runs at 10Mbps and uses baseband signaling. Max. length between NIC and hub is 100 meters.

Truncated

An IPv6 address can be abbreviated or __________ by removing unnecessary and /or leading 0s.

Global Unicast Address

An IPv6 address that every system needs in order to get on the Internet.

Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)

An IPv6 tunneling protocol that adds the IPv4 address to an IPv6 prefix.

Extended Service Set Identifier (ESSID)

An SSID applied to an Extended Service Set as a network naming convention.

protocol

An agreement that governs the procedures used to exchange information between cooperating entities; usually includes how much information is to be sent, how often it is sent, how to recover from transmission errors, and who is to receive the information.

Internet Message Access Protocol version 4 (IMAP4)

An alternative to the more popular POP3, it retrieves e-mail from an e-mail server like POP3, but it uses port 143.

Directional antenna

An antenna that can be made to focus in one direction so that it can receive a signal from a specific source. Dish antennas are directional.

Partition

An area of a computer's hard drive that is logically defined and acts as a separate disk drive.

loopback test

An attempt to contact one's own machine for troubleshooting purposes. In TCP/IP-based networking, this test can be performed by communicating with an IPv4 address that begins with an octet of 127. Usually, this means pinging the address 127.0.0.1.

RDN (Relative Distinguished Name)

An attribute of an object that identifies the object separately from its related container(s) and domain. For most objects, the relative distinguished name is the same as its common name (CN) in the distinguished name convention.

Protected Extensible Authentication Protocol (PEAP)

An authentication protocol that uses a password function based on MS-CHAPv2 with the addition of an encrypted TLS tunnel similar to EAP-TLS.

Kerberos

An authentication standard designed to allow different operating systems and applications to authenticate each other.

10BaseFL

An early fiber-optic implementation of Ethernet that runs at 10 Mbps using baseband signaling. Max. segment length is 2km, using multimode cabling, and either SC or ST connectors.

bridged connection

An early type of DSL connection that made the DSL line function the same as if you snapped an Ethernet cable into your NIC.

CCIE

An elite certification that recognizes expert level installation, management and troubleshooting skills on networks that use a range of Cisco devices

tunnel

An encrypted link between two programs on two separate computers.

block cipher

An encryption algorithm in which data is encrypted in "chunks" of a certain length at a time. Popular in wired networks.

asymmetric-key algorithm

An encryption method in which the key used to encrypt a message and the key used to decrypt it are different, or asymmetrical.

stream cipher

An encryption method that encrypts a single bit at a time. Popular when data comes in long streams (such as with older wireless networks or cell phones).

Bit Error Rate Test (BERT)

An end-to-end test that verifies a T-carrier connection.

Kernel

An essential set of programs and computer code that allows a computer operating system to control processor, disk, memory, and other functions central to its basic operation

Frame Relay

An extremely efficient data transmission technique used to send digital information such as voice, data, LAN, and WAN traffic quickly and cost-efficiently to many destinations from one port. Packet-switch technology that works at the Data-Link and Physical Layers that does not use error-checking overhead and has the BECN and FECN congestion control features

bridge loop

An interconnection of bridging devices (switches) are installed in such a fashion that they create a loop, causing packets to loop continuously.

Leaf Object

An object in an operating system's directory, such as a printer or user that does not contain other objects.

Samba

An open source software package that provides complete Windows-style file and printer sharing capabilities.

File System

An operating system's method of organizing, managing, and accessing its files through logical structures and software routines.

broadcast storm

An undesired event on the network caused by the simultaneous transmission of any number of broadcasts across the network segment. Such an occurrence can overwhelm network bandwidth, resulting in time-outs A non-stop flurry of broadcast frames on the network that can keep computers on the broadcast domain from connecting to the rest of the network.

What is crosstalk?

An unwanted interaction, or interference, between two electrical signals

Wi-Fi protected Access 2 (WPA)

An update to the WPA protocol that uses the Advanced Encryption Standard algorithm, making it much harder to crack.

802.11n

An updated 802.11 standard that increases transfer speeds and adds support for multiple in / multiple out (MIMO) by using multiple antennae. and a maximum distance of 1200ft. 802.11n can operate on either the 2.4- & 5-GHz frequency and has a maximum throughput of 600 Mbps. - 11 or 23 Channels

ADC

Analog-to-Digital conversion.

You are concerned about protecting your network from network based attacks from the Internet. Specifically, you are concerned about "zero day" attacks (attacks that have not yet been identified or that do not have prescribed protections).

Anomaly based IDS

network interface unit (NIU)

Another name for a demarc. See demarc in the Glossary.

peer-to-peer mode

Another name for ad hoc mode.

snip

Another term for cable stripper. See cable stripper.

Shell

Another term for the UNIX command interpreter.

What is the most common form of host based IDS that employs signature or pattern matching detection methods?

Anti-virus software

Which of the following measures are you most likely to implement in order to protect against a worm or a Trojan horse?

Anti-virus software

Which of the following statements about the use of anti-virus software is correct?

Anti-virus software should be configured to download updated virus definition files as soon as they become available.

Which three of the following are NOT a valid IP address?

Any IP address with numbers less than 0 or greater than 255 is not valid

Host Computer

Any device that is on a network.

symmetric-key algorithm

Any encryption method that uses the same key for both encryption and decryption.

Proprietary UNIX

Any implementation of UNIX for which the source code is either unavailable or available only by purchasing a licensed copy from Novell (costing as much as millions of dollars). Redistribution of proprietary UNIX versions require paying royalties to Novell.

MAC

Appends physical address of the destination computer onto the frame

HTTP

Application layer protocol that formulates and interprets requests between web clients and servers

Ethernet Frame Format

As for IEEE 802.3 except no SFD field and length is type DA and SA were only 2 bytes long in older implementations

Digital

As opposed to analog signals, digital signals are composed of pulses that can only make a value of 1 or 0

Workgroup

As used in Microsoft networks, a number of users who share drive and printer resources in an independent peer-to-peer relationship

Encapsulated

As you delve into a packet of data with your protocol analyzer, you notice that the frame size is bigger than the packet size. This is because the packet is ___________ inside the frame.

Sequencing

Assigning a placeholder to each piece of a data block to allow the receiving node's Transport layer to reassemble the data in the correct order

Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two)

Authentication for agents and managers, Encryption of SNMP messages

Extensible Authentication Protocol (EAP)

Authentication wrapper that EAP-compliant applications can use to accept one of many types of authentication. While EAP is a general-purpose authentication wrapper, its only substantial use is in wireless networks.

The address range of APIPA:

Automatic Private IP address 169.254.0.0 - 169.254.255.254/ 16

Software Distribution

Automatically transferring a data file or installing a software application from the server to a client on the network

LSA 5

Autonomous System External LSA, produced by ASBRs to advertise destinations outside to the OSPF AS

IEEE 802.5 Token Ring

Avoids collisions Access to medium signalled by passing token around Token frame inserted by Active Ring Monitor Any station takes token and sends data frame Destination copies passing data Sender removes frame on return

What is the primary countermeasure to social engineering?

Awareness

What routing protocol is used by routers on the internet for learning and sharing routes?

BGP

IEEE 802.11 - WLAN

Basic Service Set: Access point, known as a cell that stations can access Extended Service Set: Interconnected cells via a distribution system, appears as a single logical LAN to higher levels

What does BNC stand for?

Bayonet Neil-Concelman

What type of connection do Thin Ethernet and ARCNet use?

Bayonet Neil-Concelman Connector (BNC)

Why shouldn't you use copper (coax or UTP) connections to link two buildings?

Because differences in neutral-to-earth voltage of two buildings can cause major data corruption

Bit stuffing

Begin and end with 01111110 (7E). If 5 consecutive 1's encountered, stuff with a 0 it.

Advantages of VLANs

Better security, uses bandwidth more efficiently, isolates points of failure and increased flexibility

DL Protocol 4 - 1-bit Sliding Window

Bidirectional, window size = 1 for both sender and receiver. Need ACK timer.

Bit/byte/block levels

Bit level - receiver knows start and end of bit Byte level - receiver knows start and end of character Block level - receiver knows start and end of frame

Polynomial codes

Bit strings are treated as representations of polynomials with only binary coefficients (0's and 1's). The k bits are regarded as the coefficient list, for example for 01011000, i(x) = x^6+x^4+x^3.

What is BGMP?

Border Gateway Multicast Protocol - A routing protocol for router to router activity.

Token Passing Summary

Bounded access delay but no instant on demand access Can give priority access Good for real-time control systems Complex in practice since all stations must cooperate and token loss must be handled IEEE 802.4 / 802/5 Token Bus / Ring and FDDI uses this

Braiding

Braided metal shielding used to insulate some types of coaxial cable

Data Link layer

Bridges networking media with Network layer

802.7

Broadband Network

Classful Network Architecture

Broken down into five sections, three of which are commonly used by hosts on networks-Classes A, B, & C and is the IPv4 classification system.

What is a BDF?

Building Distribution Frame Used in instances such as a College campus where the ouside line is connected to a MDF (campus) panel which then connects to the BDF panel (building) which connects to the IDF panel (floor)

Which of the following physical topologies are used with Ethernet networks? select two Bus Mesh Ring Star

Bus Star

Which of the following physical topologies are used with Ethernet networks?(2 answers)

Bus, Star

How does Bluetooth work?

By creating a small wireless network called Wireless Personal Area Network

Payload

By default, this is 64 KB maximum, just like IPV4 packets. But this can be increased much further if jumbograms are used.

0x2142

Bypass

PPP Byte Stuffing

Byte stuffs and XORs original byte with 0x20.

Which of the following are requirements of the 1000BaseT Ethernet standards?(3 answers)

CAT 5e cabling, RJ-45 connectors, The cable length must be less than or equal to 100m

What wiring uses the 100/120 block standard?

CAT5 UTP

Which of the following authentication protocols uses a three-way handshake to authenticate users to the network? (Choose two)

CHAP, MS-CHAP

The media access control method of all Ethernet networks is

CSMA/CD

What must install between your network and a T1 line for your network to use the T1 line?

CSU/DSU

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?

CSU/DSU

What is a CSU/DSU?

CSU/DSU is a device that converts the signal received from the WAN provided. The CSU terminates the digital signal and provides error correction and line monitoring. The DSU converts the digital data into synchronous serial data for connection to a router.

Which of the following services are available regardless of whether the telephone company network is available?

Cable modem

Which of the following functions are performed by proxies? (select two)

Cache web pages, Block employees from accessing certain websites.

CSMA

Carrier Sense Multiple Access When ready to send, listen If channel busy, wait until idle When channel idle, send Listen to channel while sending in order to detect collisions If collision, abort signal with noise burst and wait random time before listening again

Network Backbone

Carries the majority of the network data. Normally doesn't connect endpoints.

What is the minimum cable specification that supports 1000 Mbps Ethernet?

Cat 5

what is the minimum cable specification that supports 1000mbps Ethernet?

Cat 5

Core

Central component of cable designed to carry a signal

MAC in Wireless LANS

Centralised: good for time-sensitive / high priority data but suffers limits of centralisation Distributed: Good for ad-hoc peers with bursty traffic Both: No guarantee that all nodes can hear each other, which makes CD difficult

Network Directory

Centralized database of everything on your network.

Unified Communications

Centralized management for multiple types of network based communications

What is CHAP?

Challenge Handshake Authentication Protocol

When deploying B/G wireless access point, which channels eliminates interference?

Channels 1, 6, 11

American National Standards Institute (ANSI)

Character development on keyboards.

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

Circuit-level

Which type of network establishes a dedicated connection between two hosts who need to communicate on the network, not allowing any other host to use the medium until the communication is complete?

Circuit-switched

Interior Gateway Routing Protocol (IGRP)

Cisco proprietary, distant vector protocol that is classful (no VLSM), has a max hop count of 255, Update Timer of 90 seconds, Invalid Timer of 270 seconds, Holddown Timer of 280 seconds, Flush Timer of 630 seconds, and Administrative Distance 100, uses ASNs for activation

Consider the following IP addresses .

Class A, B, B, C

Which three of the following are Class B addresses?

Class B addresses range of 128-191

Which three of the following IP addresses are Class C addresses?

Class C addresses range of 192-223

B

Class__ nodes in FCCI network are only connected to the primary fiber ring.

A

Class__ nodes in FDDI network are connected to both fiber rings.

Purpose of QoS?

Classify, mark, and prioritize traffic om WAN and LAN links

Which of the following terms are often synonymous with or made possible with CIDR. select 2 OPSF CLASSLESS CLASSSFUL NAT VLSM

Classless VLSM

CIDR address

Classless Inter Domain Routing

BNC connector

Coaxial cable type that uses a twist-and-lock (or bayonet) style of coupling

RG-58

Coaxial cable with 50ohm impedance and a 10 AWG core

RG-59

Coaxial cable with 75ohm impedance and 20-22 AWG core

RG-6

Coaxial cable with impedance of 75 ohms and contains 18 AWG core

Asset Management

Collecting and storing data on the number and types of software and hardware assets in an organizations network

Which of the following is not a reason to use subnets on a network?

Combine different media type on to the same subnet

enable

Command that allows a user to enter privileged level command mode, default level of 15

show version

Command that displays the OS version along with system information

show terminal

Command that displays the settings for the terminal

show users

Command that displays users connected to the router

show history

Command that displays what a user has previously done on the terminal, with a default setting of 10 entries

show flash

Command that lists a current status of the flash memory

show hosts

Command used to display a listening of hosts on the network

show sessions

Command used to display open sessions for your router

show clock

Command used to give the system time and date

Specific Configuration Mode

Commands entered in this mode affect specific interfaces or processes, Router(config-if)#

Global Configuration Mode

Commands entered in this mode affect the entire system, Router(config)#

Non-broadcasts Point-to-multipoint transmission

Communications arrangement in which a single transmitter issues a signal to multiple, defined recipients

Point-to-multipoint

Communications arrangement in which one transmitter issues signals to multiple recievers

A+

CompTIA certification for PC operation, repair, and management

Networking Standards

Comprised of connector types, cable length, and number of computers.

Server

Computer on the network that manages shared resources

Host

Computer that enables resource sharing by other computers on the same network

Web Server

Computer that manages website services

Stand-Alone Computer

Computer that uses applications and data only from its local disks and is not connected to a network

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.

Configure the remote access servers as RADIUS servers.

You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within the connectors?

Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5

You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within the connectors?

Connect pin 1 to pin8, pin 2 to pin 7, pin 3 to pin 6, pin 4 to pin 5

Which of the following tasks are associated with the session layer?

Connection establishment

Session

Connection for data exchange between two parties

F-type connector

Connector used to terminate coaxial cable used for transmitting television or broadband capability

RJ-45

Connector used with STP and UTP cabling

Methods to Access the IOS

Console and Auxiliary ports (Out-of-Band) and Telnet (In-Band)

Point Coordination Function

Contention free service

class license

Contiguous chunk of IP addresses passed out by the Internet Assigned Numbers Authority (IANA).

Which of the following applications typically use 802.1x authentication? (Select Two)

Controlling access through a switch, Controlling access though a wireless access point

You have a network configured to use OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?

Convergence

CDDI

Copper Distributed Data Interface

Backing Up

Copying critical data files to secure storage data

IP

Core protocol in the TCP/IP suite that operates in the Network layer of the OSI model and provides information about how and where data should be delivered

DHCP lease

Created by the DHCP server to allow a system requesting DHCP IP information to use that information for a certain amount of time.

NEXT

Cross talk, or the impingement of the signal carried by one wire onto another wire

You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?

Crossover

You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

Crossover

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?

Crossover

you have two switches that you need to connect using their uplink ports. The switches don not support auto-MDI, what type of cable do you use

Crossover

Soft Skills

Customer relations, oral and written communications, dependability, teamwork, leadership abilities

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned.

DHCP

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between host. You run protocol analyzer and discover that two hosts have the same IP address assigned. What protocol can you implement on your network to help prevent problems such as this?

DHCP Dynamic Host Configuration Protocol

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values What device should you used

DHCP server

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values.

DHCP server

HDLC Byte Stuffing

DLE STX to begin, DLE ETX to end. If DLE found in data, stuff with another DLE.

What is on Port 53?

DNS

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. WHich protocol should you implement?

DNS

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. What protocol should you implement?

DNS

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com Which device would you use?

DNS server

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. What device would you use?

DNS server

Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?

DSL

A switch is associated with which OSI model layer?

Data Link

Your company purchases a new bridge, which filters packets based on the MAC address of the destination computer. On which layer of the OSI model is the device functioning?

Data Link

Your company purchases a new bridge, which filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning?

Data Link

a Switch is associated with which OSI model layer

Data link

DL Protocol 1 - Utopia

Data sent, data received, no errors, everything flows smoothly and no flow control needed. Unidirectional.

cleartext

Data that is in an easily read or viewed industry-wide standard format.

plaintext

Data that is in an easily read or viewed industry-wide standard format.

Traffic

Data transmission and processing activity taking place on a computer network at any given time

Point-to-point

Data transmission with one transmitter and one receiver

Multi-Frame Transmissions

Data unit broken into multiple frames Once medium acquired using DIFS, subsequent frames of MPDUs use SIFS sent upon receipt of ACK

255.0.0.0

Default Class A Subnet Mask

255.255.0.0

Default Class B Subnet Mask

255.255.255.0

Default Class C Subnet Mask

Optical loss

Degradation of a light signal in a fiber-optic cable

Latency

Delay between transmission of signal and it's receipt

802.12

Demand priority networking

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?

Denial of Service

Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Denial of Service attack

stateless

Describes a DHCPv6 server that only passes out optional information.

stateful

Describes a DHCPv6 server that works very similarly to an IPv4 DHCP server, passing out IPv6 addresses, subnet masks, and default gateways as well as optional items like DNS server addresses.

Traffic Monitoring

Determining how much data transfer is taking place on a computer network or network segment and notifying admins when a segment becomes overloaded

International Organization for Standards (ISO)

Developed OSI model.

Institute of Electrical and Electronics Engineers (IEEE)

Developed networking standarads (i.e. 802.11).

Router

Device that connects network segments and directs data based on information contained in the data packed

Media converter

Device that enables networks or segments using different media to interconnect and exchange signals

NIC

Device that enables workstation to connect to network and communicate with computers

Modem

Device that modulates analog signals into digital signals at the transmitting end for transmission over telephone lines

Demultiplexer (demux)

Device that separates multiplexed signals once they are received and regenerates them in original form

Amplifier

Device that strengthens or boosts an analog signal

Transceiver

Device that transmits and receives signals

Network components

Device, Media, Network Adapter, Network Operating System, and Protocol.

Which of the following best describes the concept of a virtual LAN?

Devices on the same network logically grouped as if they were grouped on separate networks.

Resources

Devices, data, and data storage space provided by a computer (stand-alone or shared)

DAC

Digital-to-Analog conversion.

How does the DSSS method work?

Direct Sequence Spread Spectrum A modulation technique that transfers data using the full bandwidth of a frequency.

What method does the 802.11b wireless network use to carry radio frequency traffic?

Direct Sequence Spread Spectrum (DSSS)

Channel

Direct communication path between two or more nodes; much like a lane is a distinct transportation path on a freeway

Token rings

Directs links between nodes and a ring topology using tokens to transmit data

Which of the following functions can a port scanner provide?

Discover unadvertised servers, Determining which ports are open on a firewall

RIP, Ripv2, BGP

Distance Vector Dynamic Routing Protocol

Wavelength

Distance between corresponding points on a wave's cycle

Two Types of Dynamic Routing Protocols

Distance-vector and Link-state

Distributability

Dividing complex application program tasks among two or more computers

Standard

Documented agreement containing technical specifications or other precise criteria that are used as guidelines to ensure that materials, products, processes, and services suit their intended purpose

Using the Netstat command you notice that a remote system has made a connection to your Windows server 2003 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing ?

Downloading a file

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Drop the packet.

Which of the following are examples of social engineering? (Select Two)

Dumpster diving, Shoulder surfing

What is DHCP? What is its key attribute?

Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.

You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?

EAP

You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?

EAP

Which of the following routing protocols is classified as a balance hybrid routing protocol? EIGRP RIP IS-IS OSPF

EIGRP

Alien cross talk

EMI interference induced on one cable by signals traveling over a nearby cable

alien cross talk

EMI interference induced on one cable by signals traveling over a nearby cable.

How can an organization help prevent social engineering attacks?(Select Two)

Educate employees on the risks and countermeasures, Publish and enforce clearly written security policies.

Network Standard Creation

Either De Facto (because they're widely used) or De Jure (by law, created by a governing body first).

High-level Data-link Control (HDLC)

Encapsulation method for data on serial links that will not encapsulate multiple network protocols on the same link, it's proprietary

Point-to-Point Protocol (PPP)

Encapsulation method utilized to connect WAN links when equipment is purchased from different vendors, it's non-proprietary A protocol that enables a computer to connect to the Internet through a dial-in connection and to enjoy most of the benefits of a direct connect. PPP is considered superior to SLIP because of its error detection and data compression features, which SLIP lacks, and the capability to use dynamic IP addresses.

Checksum

Error-checking that determines if the contents of an arriving data unit match the contents of the data unit sent out by source

Session layer

Establishes and maintains communication between two nodes on the network

Synchronous Digital Hierarchy (SDH)

European fiber carrier standard equivalent to SONET.

CCITT

European standards body that established the V standards for modems.

Security Auditing

Evaluating security measures currently in place on a network and notifying the network admin if a security breach occurs

P2P Network

Every computer can communicate directly with every other computer. By default, no one computer has more authority than another

Contention Domain

Every computer competes with each other to send out the data. To solve this problem you create more contention domains, thereby segmenting the network.

Exterior Gateway Protocols (EGP)

Exchanges packets between Autonomous Systems

Dual IP Stack

Exists when there are two Internet Protocol software implementations in an operating system, one for IPv4 and another for IPv6.

What is EAP? What is it used for?

Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.

What is EGP?

Exterior Gateway Protocol

Border Gateway Protocol (BGP)

Exterior Gateway Protocol that is commonly used to connect larger organizations to the Internet, has an Administrative Distance of 20 and uses all other IGPs inside of an autonomous system

pad

Extra data added to an Ethernet frame that is less than 64 bytes to bring the frame up to the 64-byte minimum.

You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use? BNC RJ-11 SC F-TYPE RJ-45 ST

F-TYPE

What type of connection are used for broadband using coaxial cable?

F-Type

You want to allow you users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability?

FTP

You want to transfer a file from a UNIX server to a Windows 2000 computer. Which of the following utilities could you use to do this?

FTP TFTP

Entrance facilities

Facilities necessary for a service provider to connect with another organizations LAN or WAN

CSMA w/ CD Properties (3)

Fairness - equal access to all stations, no priorities Probabilistic - unbounded access time, bad at heavy loads due to exponential back-off Doesn't waste channel sending broken frames

True or False. A reason to implement subnets is to combine different media type on to the same subnet.

False

What is FDDI?

Fiber Distributed Data Interface at 10 Mbps

Ethernet 100BaseFX networks use what type of cabling?

Fiber optic

802.8

Fiber-Optic

Ethernet 100BaseFX networks use what type of cabling?

Fiber-optic

FCS

Field in a frame responsible for ensuring that data carried by the frame remains intact

Which of the following are characteristics of a packet filtering firewall? (Select Two)

Filters IP address and port, Stateless

Which of the following are characteristics of a circuit-level gateway? (Select Two)

Filters based on sessions, Stateful

Which of the following is the best device to deploy to protect your private network from a public untrusted network?

Firewall

You are the administrator of a company's network. You want to prevent unauthorized access to your intranet from the internet. Which of the following should you implement?

Firewall

You are the network administrator for a small organization. Recently, you contacted an ISP to connect your organization's network to the internet to provide users with internet access. Since doing so, it has come to your attention that an intruder has invaded your network on three separate occasions. What type of network hardware should you implement to prevent this from happening again?

Firewall

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect you organization's network to the Internet to provide users with Internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the Internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again?

Firewall

Which three of the following IP addresses belong to the Class A network 114.0.0.0? (Assume the network is indicated by the default portion of the IP address.)

First oclet is 114 (choose 3)

In an IP addressing scheme using default subnet masks, which of the following IP addresses can you assign to a host?

First oclet is 132

Distance-Vector Protocol

First routing protocols that have a distance metric of hop count and has each router send all of it's routing table only to it's neighbors

Class D

For IPv4, what class is used for multicasting?

802.1x

For organizations, using, authentication for wireless networks is recommended.

Cat 5

Form of UTP that contains four wire pairs and can carry up to 100Mbps

Cat 3

Form of UTP that contains four wire pairs and can carry up to 10Mbps

Baseband

Form of transmission in which digital signals are sent through direct pulses applied to a wire

Broadband

Form of transmission in which signals are modulated as a radio frequency analog pulses with different frequency changes

Multiplexing

Form of transmission that allows multiple signals to travel simultaneously over one medium

A router is connected to network192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168/4/0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet address to network 10.1.0.0/16.

Forward the packet to the next hop router specified by the route to network 0.0.0.0

How does the FHSS method work?

Frequency Hopping Spread Spectrum Transmits radio signals by switching frequencies at a high rate. The benifit is it is harder for someone to tap into the data as the frequency continues to change

What method does Bluetooth use to carry radio frequency traffic?

Frequency Hopping Spread Spectrum (FHSS)

IEEE 802.11 - Media Types (3)

Frequency-hopping spread spectrum: low bandwidth, 1-2Mbs but good interference resistance Direct-sequence spread spectrum (similar to CDMA): very good range and variable speed, upto 11Mbs (802.11b) Orthogonal FDM (similar to ADSL): up to 53Mbs but lower range (802.11a / 802.11g)

Synchronous transmission

Full frame sent, receiver needs to stay synched the whole time. Less overhead, receiver stays in sync with separate clock line or embedding clock information into data (biphase coding).

Generating function

G = g(x) = x^n-k+gsub(n-k-1)*x^n-k-1+gsub(n-k-2)*x^n-k-2+...+1

What type of module might a switch use to allow it to modify the media type supported by a switch port?

GBIC SFP

What type of module might a switch use to allow it to modify the media type supported by a switch port? select 2 GBIC MPLS OX-x SFP

GBIC gigabit interface converter SFG small form-factor pluggable

Framing(4)

Gaps: insert gaps - timing hard to guarantee Counting: Include length field to delimit data, often used with another framing method Serial Line Framing: at least 1 transition per byte, bit asynchronous, byte synchronous Flags: special signal at start & end of frame, byte stuffing in the form of an escape signal to identify data if it has the same signal as FLAG (or ESC)

Category 6 Cable Type

Gigabit networks. Has different versions that run at 250 MHz and 500 MHz.

Cladding

Glass or plastic shield around the core of a fiber-optic cable

Extra Modes for Cisco Devices

Global Configuration, Specific Configuration, Setup

Which of the following are advatages of using fiber optic cabling for a network, as opposed to other types of cabling? *Greater cable distances without a repeater *Lower installation cost *Immunity to electromagnetic interference *Faster installation

Greater cable distances without a repeater Immunity to electromagnetic interference

Network

Group of computers and other devices (printers) connected by, and can enhance data via some type of transmission media

Serial Encapsulation Methods

HDLC, PPP, Frame Relay and X.25

What is on Port 80?

HTTP

Which protocol is used on the world wide web to transmit web pages to web browsers?

HTTP

which protocol is used for securely browsing a Web site?

HTTPS

What is on Port 443?

HTTPS/ SSL

Shielded Twisted Pair (STP) Cables

Have an aluminum shield inside the plastic jacket that surrounds the pairs of wires.

IPv4-mapped addresses

Have the first 80 bits set to 0 (note the double colon), the next 16 set to 1 (shown as ffff), and the last 32 bits populated by the IPv4 address.

Internet Engineering Task Force (IETF)

Help develop and maintain Internet standards as well as its evolution.

Cat 5e

Higher grade version of Cat5 wi

Cat 6a

Higher-grade version of Cat 6 wiring that further reduces attenuation and cross-talk

What is a HCC cable?

Horizontal Cross-Connect cable Is the patch cable that connects to the patch panel

What should be change to enable the two host to communicate?

Host A IP to: 192.168.2.(anything) This insures that there is a path to communicate

DNS Host A records:

Host A records identity the IP address a known host name.

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?

Host based IDS

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?

Host based firewall

128

How many bits is an IPv6 address?

Three

How many layers are incorporated in the OSI model communications subnetwork?

Four

How many layers does the TCP/IP model have?

An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device?

Hub

An access point that conforms to the IEEE802.11b standard acts most closely to what other networking device? Router Patch bay terminal Hub Gateway

Hub

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? select 2 Hub router repeater gateway bridge switch

Hub repeater

Redistribution Point

Hub, router, or switch.

Which organization is responsible for allocating public IP addresses?

IANA

260

IBM STP cable supports ___ nodes.

72

IBM UTP cable supports ___ nodes.

Which of the following protocols allows hosts to exchange messges to indicate problems with packet delivery?

ICMP

PING

ICMP (no port) A command that uses Internet Control Message Protocol (ICMP) packets to query by IP or by name, and which works across routers. Usually it is the first tool used to check if a system is reachable.

What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?

IDS

Which of the following devices can monitor a network and detect potential security attacks?

IDS

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?

IDS

Ethernet

IEEE 802.3 standard

Thinnet

IEEE physical layer standard 10mbps throughput over coaxial cable 10base-2

Thicknet

IEEE physical layer standard for throughput over a coaxial copper cable

EUI-64

IEEE standard defining 64-bit physical address

802.3

IEEE standard for Ethernet networking devices and data handling (using CSMA LCD access method)

802.2

IEEE standard for error & flow control in data frames

802.5

IEEE standard for token ring networking devices and data handling

802.11

IEEE standard for wireless networking

You have a private network connected to the Internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use? Distance vector IGP Static BGP Link state Dynamic

IGP

You have a private network connected to the internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use?

IGP

You are asked to recommend an e-mail retrieval protocol for a company's sales team. The sales team needs to access e-mail from various locations and possible different computers. The sales team does not want to worry about transferring e-mail messages or files back and forth between these computer. Which em-mail protocol was designed for this purpose?

IMAP

What is on Port 143?

IMAP (Mail Client)

Which of the following protocol stores e-mail on the mail server and gives users a choice to download mail or keep it on the server?

IMAP4

You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets.

IP address

Network

IP resides on the ___________ layer of the OSI model.

Which of the following devices is capable of detecting and responding to security threats?

IPS

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use?

IPS

Which of following network layer protocols provides authentication and encryption services for IP based network traffic?

IPSec

Which of the following is the best countermeasure against man-in-the-middle attacks?

IPSec

IPv6 tunneling

IPv6 packets can be encapsulated inside IPv4 datagrams.

What is the maximum data rate of an ISDN BRI line?

ISDN BRI carries two B channels and one D channel. Each B channel can maintain a throughput of 64 Kbps, for a total of 128 Kbps. The D channel is used for line management, and does not contribute to data throughput.

Which WAN connection types use digital communications over POTS?(Select two)

ISDN, DSL

Two Types of Trunking

ISL and IEEE 802.1Q

Automatic Private IP Addressing (APIPA)

If a windows client cannot get an IP address from a DHCP server and has not been configured statically, the __________ will auto-assign a number on this network.

CA

If channel is idle, wait IFS else wait until idle then wait IFS If still idle, transmit frame or random back-off before transmission if channel was initially busy, else, wait until idle again

568B

If you are making a crossover cable and one end is 568A, what should the other end be?

4, 16

If you put a ___ Mbps in a ___ Mbps Token net, you will have problems.

Crossover Cable

If you want to connect a computer directly to another computer without using a switch, you use a _____________.

You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?

Implement version 3 SNMP

tunnel broker

In IPv6, a service that creates the actual tunnel and (usually) offers a custom-made endpoint client for you to use, although more advanced users can often make a manual connection.

multicast address

In IPv6, a set of reserved addresses designed to go only to certain systems.

CN (Common Name)

In LDAP naming conventions, the name of an object.

DC (Domain Component)

In LDAP naming conventions, the name of any one of the domains to which an object belongs.

Workgroup

In Microsoft terminology, a group of interconnected computers that share each others' resources without relying on a central file server.

Role

In Microsoft terminology, the primary purpose of a Windows Server 2008 server.

Domain Model

In Microsoft terminology, the type of client/server network that relies on domains, rather than workgroups.

Unmasked

In Subnetting, if the binary digit is a 0, then it is __________.

Masked

In Subnetting, if the binary digit is a 1, then it is __________.

Virtual DOS machine

In Windows 2000, a process that emulates an MS-DOS windows in which to run MS-DOS or 16-bit Windows programs in a designated are of memory

Root Domain

In Windows Server 2003 or Server 2008 networking, the single domain from which child domains branch out in a domain tree.

default gateway

In a TCP/IP network, the IP address of the router that interconnects the LAN to a wider network, usually the Internet. This router's IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.

broadcast domain

In a switched Ethernet network, all the nodes connected to a single switch, and therefore, able to hear one another's broadcasts.

beaconing

In a token ring network, the recovery process used when a hardware failure occurs on the ring

collision domain

In a traditional Ethernet network, a group of nodes that hears each other's traffic. The traffic in an unswitched Ethernet netwrok is subject to collisions. a physical network segment where data packets can collide with one another when being sent on a shared medium, in particular, when using the Ethernet networking protocol

What is the difference between a byte-oriented protocol and a bit-oriented protocol?

In byte-oriented protocols, control information is encoded using entire bytes. On the other hand, bit-oriented protocols use single bits to represent the control information.

Directory

In general, a listing that organizes resources and correlates them with their properties. In the context of NOSs, a method for organizing and managing objects.

IEEE 802.11

In order to ensure compatibility, the WAP and other wireless devices must all use the same __________.

Forest

In the context of Windows Server 2003/2008, a collection of domain trees that use different namespaces. A forest allows for trust relationships to be established between trees.

Per Seat

In the context of applications, a licensing mode that limits access to an application to specific users or workstations.

hardware tool

In the context of network troubleshooting, a device dedicated to the purpose of performing one or more tests on a network.

first

In token the ___ node on the wire becomes the active monitor.

Basic Service Set

In wireless networking, a single access point servicing a given area.

network name

In wireless networking, another name for service set identification (SSID).

MCITP

In-depth knowledge of Microsoft products

socket pairs

Information stored in RAM about a session, identifying both sides of a conversation between computers.

End Point

Information stored in RAM about a session, identifying one side of a conversation between computers. Workstation, file server, etc.

socket

Information stored in RAM about a session, identifying one side of a conversion between computers.

Explain infrared wireless networking.

Infrared devices communicate through the Infrared Data Association protocol. The devices have a maximum throughput of 4 Mbps and a maximum distance of 1 meter.

Which of the following strategies are used to prevent duplicate IP addresses being used on a network?

Install a DHCP server on the network Use automatic private IP addressing

You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted. You discover that user download a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation doe not occur. What should you do?

Install a network virus detection software solution.

Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. What is the best way to do this?

Install a proxy server.

In the OSI model, which of the following functions are performed at the application layer?

Integration of network functionality into the host operating system Enabling communication between network clients and services

Switch

Intelligence that allows it to use MAC addresses to create point-2-point connections between 2 conversing computers, effectively giving them the full bandwitch of the network. A device designed to increase performance of a network by moving frames as quickly as possible to their destinations based off of addresses found in the MAC Address Table. Works at Layer 2 and has all devices connected at the same collision domain, but not at the broadcast domains

Setup Requirements

Interfaces, Protocols, Network Addresses, Passwords

What is a IDF?

Intermediate Distribution Frames IDF panels may represent a floor or some specific area

What is IP?

Internet Protocol

What is IPSEC? Why is it significant?

Internet Protocol Security. This is the defacto standard for VPN security.

ICANN

Internet corporation to maintain and assign IP addresses

802.1

Internetworking

DL Protocol 2 - Stop and wait

Introduces ACKs to prevent receiver from being flooded with data, but still no errors. Unidirectional.

DL Protocol 5 - Go Back N

Introduces network_layer_ready event, generally looks for cumulative ACKs.

DL Protocol 3 - Positive Acknowledgement with Retransmissions

Introduces noisy channel (errors). Timers are required, sequence numbers are required, duplicate frames may be needed. Unidirectional.

Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?

It can deliver other configuration information in addition to IP addresses, A DHCP server assigns addresses to requesting hosts

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices) and forwards frames to the appropriate segment.

Which of the following statements accurately describes how a modem works?(2 answers)

It demodulates analog data from a telephone network into digital PC data. It modulates digital data from the PC into analog data and transmits it on a telephone network.

Which of the following statements accurately describes how a modem works? select 2 *It transmits digital signals over ordinary telephone copper wiring at a rate up to 128kbps *It demodulates analog data from telephone network into digital PC data *It modulates digital data from the PC into analog data and transmits it on a telephone network. *It demodulates analog PC data into digital data that can be transmitted through a telephone network.

It demodulates analog data from telephone network into digital PC data *It modulates digital data from the PC into analog data and transmits it on a telephone network.

Which of the following statements accurately describes how a modem works?

It demodulates anolog data from a telphone network into digital pc data. It modulates digital data from the pc inito analog data and transmits it on a telelphone network

Which of the following is NOT a primary characteristic of a worm?

It infects the MBR of a hard drive

Which of the following is true about the MAC address? select 2 *it is a 64-bit address *It is a 48 bit address *it is typically represented by octets of decimal numbers between 0-255 *it is typically represented by hexadecimal numbers

It is a 48 bit address It is typically represented by hexadecimal numbers

Which of the following is true about the mac address

It is typically represented by hexadecimal numbers it is a 48-bi address

Which of the following is true about the MAC address?(2 answers)

It is typically represented by hexadecimal numbers. It is a 48 bit address.

Which three of the following are characteristics of ISDN?

It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines, It is a dial-up service that uses existing copper wires for the local loop, It lets you transmit voice, video, and data over the same lines.

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet router?

It the network is connected to the Internet using multiple ISPs

Which of the following authentication methods uses tickets to provide single sign on?

Kerberos

Which of the following protocols can your portable computer use to connect to your company's network via a tunnel through the Internet? (Select two)

L2TP

LC

LC

Which of the following connectors are used with fiber optic cables and include both cables in a single connector? select 2 SC ST LC MT-RJ BNC

LC MT-RJ Picture is MT-RJ

What is on Port 389?

LDAP - Active Directory (Windows), e-Directory (Novell), Open Directory (Apple)

Two Sub-layers

LLC: Logical Link Control MAC: Medium Access Control

MAN

Larger than a LAN, connecting clients and servers from multiple buildings within a geographic area

MTU

Largest data unit a network will accept for transmission

At which OSI model layer does a media converter operate?

Layer 1

Which OSI model layer does a media converter operate?

Layer 1

Network media and connectors and the electrical signals traveling over them are represented by standards at what level in the OSI model?

Layer 1 (Physical Level)

At which OSI model layer does a media converter operate?

Layer 1 (Physical layer)

What is L2TP? What is significant about this protocol?

Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.

At which of the following OSI layers does a router operate?

Layer 3

At which of the following OSI layers does a router operate?

Layer 3 Network Layer

At which layer of the OSI model is HTTPS encryption performed?

Layer 6

Application Layer

Layer 7 of the OSI model. PDU is Data HTTP, Telnet, SMTP Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network. Communication between software apps and lower layer network services for interpretation

RTT

Length of time it takes for a packet to go from sender to receiver and back

Which of the following are functions of the MAC sublayer?

Letting devices on the network have access to the LAN Defining a unique hardware address for each device on the network

What is LEAP?

Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.

OSPF, IS-IS

Link State Dynamic Routing Protocol

Open Shortest Path First (OSPF)

Link-state routing protocol that uses the SPF algorithm, is classless (uses VLSM), has a metric of cost, an Administrative Distance of 110 and uses LSAs to maintain link-state databases and routing tables

LLC Sublayer

Logical Link Control Sublayer The upper sublayer in the Data Link layer. The LLC provides a common interface and supplies reliability and flow control services. Flow and error control for a single hop Detection: parity bit or Cyclic Redundancy Check (CRC) Correction: Forward Error Correction (FEC)

Subnet

Logical division of the network.

The Data link layer of the OSI model is comprised of two sublayer. What are they?

MAC LLC

Which of the following do switches and wireless access points use to control access through the device?

MAC filtering

Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?

MPLS

intelligent

MSAUs are ___ devices and can monitor the status of the nodes connected.

closing

MSAUs have the capavility of ___ a relay if they detect an error.

What is a MDF?

Main Distribution Frame Outside line enters the building and connects to the MDF panel which in turn connects to IDF panels

Name two tasks that routers perform.

Maintain information about paths through an internetwork. Route data based on logical network addresses

Capturing packets as they travel from one host to another with the with the intent of altering the contents of the packets is a form of which security concern?

Man-in-the-middle attack

Accounting/Administration Management

Management principle that consists of gathering usage statistics for the purposes of billing and accounting

Fault Management

Management principle that detect, isolate, and correct faults in the network, including diagnostic testing and maintaining error logs

Security Management

Management principle that is used to protect a network from unauthorized access and keep users from creating or deleting services

Configuration Management

Management principle that requires documenting and controlling changes to network equipment, hardware, and software

Performance Management

Management principle that uses procedures to evaluate and report the functionality of networked equipment

IANA

Manages IP address allocation and domain name system

RIR

Manages distribution of IP addresses to private and public entities

IEEE 802.3 Frame Format

Manchester encoding Preamble-7|SD-1|DA-4|SA-4|Length-2|Data+Pad-1500|FCS-4 Preamble is alt 0s and 1s to establish synchronisation Start Delimiter: 10101011 receiver can miss preamble and still sync - compatible with token ring (802.4, 802.5) Length = bytes in this frame (optional) Pad = 0 - 46 bytes if req'd as frame must be 64 bytes minimum to enable collision detection Frame Check Sequence = CRC on all fields except preamble, SD and FCS

You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks?

Manually reconfigure the default route to point to the new next hop router.

Half Duplex

Means that the network adapter will send and receive data but not at the same time.

Transmission Media

Means through which data is transmitted and received

Hertz (Hz)

Measure of frequency equivalent to the number of amplitude cycles per second

Bandwidth

Measure of the difference between highest and lowest frequencies that a medium can transmit

Volt

Measurement used to describe the degree of pressure an electrical current exerts on a conductor

MAC Address

Media Access Control Address 00:60:80 (block id) 8c:00:54 (device id), encoded on NICs A 12-character string, usually 48 bits (6 bytes) binary hard-coded address that uniquely identifies each node on a network. The manufacturer hard codes the MAC address into the NIC. This address is composed of block ID and device ID. Written as 6 pairs of hex digits (e.g. 00:11:85:7A:BC:E4) bit 47: 0 = ordinary addr, 1 = gp addr bit 46: 0 = global addr (fixed in hardware), 1 = local addr (assigned by admin) bits 24-45: vendor code (IEEE assigned) bits 0-23: unique code set by vendor 2⁴⁶ -> 10¹³ possible global addresses

You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX ports.

Media converter

You have a server that has a 100baseFX network interface card thath you need to connect to a switch. The switch only has 100BaseTX switch port. What device should you use? *Gateway *media converter *Hub *repeater

Media converter

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

Mesh

You want ot implement a fault tolerant topology as you interconnect routers on you wide area network. Whcih of the following would meet your needs?

Mesh

You have a network that uses logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network.

electronic mail (e-mail)

Messages sent from one person to another via computer.

you have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

Structured cabling

Method for uniform enterprise-wide, multi-vendor cabling systems specified by TIA/EIA 568

FM

Method of data modulation in which frequency of carriers signal is modified by the application of the data signal

Flow control

Method of gauging appropriate rate of data transmission based on how fast recipient can accept data

Statistical multiplexing

Method of multiplexing in which each node on a network is assigned a separate time slot for transmission, based on nodes priority and need

TDM

Method of multiplexing that assigns a time slot in the flow of communications to every node on the network and in that time slot carries data from that node

multicast

Method of sending a packet in which the sending computer sends it to a group of interested computers.

MAN

Metro Area Network

802.6

Metropolitan Area Network (MAN) standard

MS-CHAP

Microsoft's dominant variation of the CHAP protocol; it uses a slightly more advanced encryption protocol.

Link-Layer Topology Discovery

Microsoft's version of LLDP

What is unbounded media?

Microwave, wireless, and infrared network links.

infrastructure mode

Mode in which wireless networks use one or more wireless access points to connect the wireless network nodes centrally. This configuration is similar to the star topology of a wired network.

OSI

Model for understanding and developing computer-computer communication developed in the 1980's

To access the Internet through the PSTN, what kind of connectivity device must you use?

Modem

Which of the following functions are performed at the Physical layer of the OSI model?

Movement of data across network cables

100Base-FX

Multi-mode fiber (The Medium) - Half duplex: 400 meters; full duplex: 2 km Single-mode fiber (The Medium) - Full duplex: 10km

What are the two types of fiber media?

Multimode Fiber (MMF) Single-Mode Fiber (SMF)

What is MMF for and what is it used for?

Multimode Fiber cable Uses multiple rays of light (modes) simultaneously with each ray of light running at a different reflection angle Used to carry data short distances Used for infrared LED systems

DWDM

Multiplexing technique used over single or multimode fiber-optic cable in which each signal is assigned a wavelength for its carrier wave

WDM

Multiplexing technique which each signal on a fiber-optic is assigned different wavelength, which equates to its own subchannel

FDM

Multiplexing that assigns a unique frequency band to each communications subchannel

Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?

Mutual authentication

Explain the relationship of NAT and PAT

NAT translates one address to another. With only NAT, each private address needs a public address. PAT allows one address to serve multiple address.

LSA 7

NSSA External LSA, produced by ASBRs in a not-so stubby area

NTFS

NT files system The native Windows 2000 files system, which has a more detailed directory structure than FAT and supports security measures not found in FAT. It also supports large disks, long filenames, and file compression.

You have a large TCP/IP network and want to keep hosts; real time clock synchronized. What protocol should you use?

NTP

Basic Service Set Identifier (BSSID)

Naming scheme in wireless networks.

What are the two types of crosstalk?

Near-end crosstalk (NEXT) Far-end crosstalk (FEXT)

Solid Green Wire

Negative polarity. Receives data.

Solid Orange Wire

Negative polarity. Sends data.

What is on Ports 135-139?

NetBios

At what OSI layer does a router operate to forward network messages?

Network

What is NAT?

Network Address Translator

Which network component connects a device with the transmission media and allows it to send and receive messages?

Network Interface Card

NIC

Network Interface Card Operates in both Data link and Physical layers

Which of the following devices operate at the OSI model layer 2?(2 answers)

Network Interface Card, Switch

LSA 2

Network LSA, produced by every Designated Router

IPX

Network Layer, Connectionless, Novell Developed

802.10

Network Security standard

You manage a small network at work. Users use workstations connected to your network. No portable computers are allowed. As part of your security plan, you would like to implement scanning of emails for all users. You want to scan the emails and prevent any emails with malicious attachments from being received by users. Your solution should minimize administration, allowing you to centrally manage the scan settings. Which solution should you use?

Network based firewall

Your company has a connection to the Internet that allows users to access the Internet. You also have a web server and an email server that you want to make available to Internet users. You want to create a DMZ for these servers. Which type of device should you use to create the DMZ?

Network based firewall

Which network component connects a device with the transmission media and allows it to send and receive messages?

Network interface card

Which network component connects a device with the transmission media and allows it to sen and receive messages?

Network interface card (NIC)

IP address

Network layer address assigned to nodes to uniquely identify them on a TCP/IP network

Fragmentation

Network layer service that subdivides segments it receives from Transport layer into smaller packages

Unpopulated Segment

Network segment that does not contain end notes; workstations

Populated segment

Network segment that includes end nodes, such as workstations

Print Services

Network service that allows printers to be shared by multiple users on a network

Management Services

Network services centrally administer and simplify complicated management tasks on a network

Mail Services

Network that manages storage and transfer of e-mail between layers on a network

IEEE 802.11 - Station Types (3)

No Transition: Stationary or moves only within range of one BSS BSS Transition: Moves between BSSs in one ESS, addressing must recognise new location and deliver via appropriate BSS ESS Transition: Moves between BSSs in different ESSs, does not guarantee connection to upper layers

You are installing networking wiring for a new Ethernet network at you company's main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete you have a spool of Category 3 network cable in storage. Upon investigation it appears very similar to category 5 wiring. Should you substitute 3 cabling for Category 5 cabling to finish the project?

No, Category 5 cabling has more twists per inch tan category 3 cabling to reduce cross-talk and support higher data rates.

token

Nodes in 802.5 use the ___ passing access method to gain access to the wire.

Overhead

Non-data information that must accompany data for a signal to be properly routed and interpreted by the network

0x2102

Normal Boot Procedure

Frequency

Number of times that a signal's amplitude of change over a fixed period of time, expressed in cycles per second or hertz

Twist ratio

Number of twists per meter or foot in a twisted pair cable

The speed of OC 1?`

OC 1 speed: 51.85 Mbps. Other OC will be a multiple of OC 1.

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?

OSPF

Which of the folowing routing protocols divides the network into areas with all networks required to have an area 0 EIGRP OSPF RIP IS-IS

OSPF

Which of the following routing protocols are classified as link state routing protocols. select 2 IS-IS EIGRP RIPv2 RIP OSPF

OSPF IS-IS

Stub Area

OSPF Area that allows LSA 3's and blocks LSA 5's

Not-So-Stubby Area

OSPF Area that allows external LSA 7's into the OSPF system

Totally Stubby Area

OSPF Area that blocks both LSA 3's and LSA 5's

Which of the following best describes OSPF? -OSPF is a classful distance vector routing protocol -OSPF is a classless lin-state routing protocol. OSPF is a classless distance vector routing protocol. OSPF is a classful link-state routing protocol.

OSPF is a classless link-state routing protocol.

What are the main differences between the OSPF and IS-IS routing protocols?

OSPF requires an area 0, while IS-IS does not

Link-State Protocols

OSPF, EIGRP (Hybrid)

You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?

Obtain a certificate from public PKI

routing loop

Occurs when interconnected routers loop traffic, causing the routers to respond slowly or not respond at all. Dynamic routing protocols sometimes cause routing loops when a router goes down, but static routes usually cause routing loops.

Infrastructure Mode

Occurs when wireless clients connect to and are authenticated by a wireless access point, which can be expanded by creating a wireless distribution system-a group of WAPs interconnected wirelessly.

ISL

Older encapsulation method that added 30 byes of overhead data to the frame

Resource

On a Windows 2000 Server network, a server, shared printer, or shared directory that can be accessed by a user.

ports

On a network hub, the connections that receive the wire links from nodes.

Which two of the following describe the channels and the data transfer rates used for ISDN BRI(Select Two)

One D channel operating at 16 Kbps, Two B channels operating at 64 Kbps each

baud

One analog cycle on a telephone line.

Connectivity Device(s)

One of several types of specialized devices that allows two or more networks or multiple parts of one network to connect and exchange data

Subchannel

One of the many distinct communication paths established when a channel is multiplexed or modulated

6in4

One of the most popular of all the IPv6 tunneling standards, and one of only two IPv6 tunneling protocols that can go through a NAT.

Tunnel Information and Control protocol (TIC)

One of the protocols that set up IPv6 tunnels and handle configuration as well as login.

Tunnel Setup Protocol (TSP)

One of the protocols that set up IPv6 tunnels and handle configuration as well as login.

Distributed Coordination Function (DCF)

One of the two 802.11 standards that define data collision avoidance, and the only one currently implemented. DCF specifies strict rules for sending data onto the network media.

What is OSPF?

Open Source Path First - this is a routing protocol

You are the administrator for a secure network that uses firewall filtering. Several network users have requested to access Internet Usenet groups but are unable. What needs to be done to allow users to access the newsgroups?

Open port 119 to allow NNTP service.

802.11g

Operates at 2.4 GHz, throughput of 54Mbps, and a maximum distance of ~300 feet and is backward compatible with 802.11b. - 11 Channels

Parity

Operates on a word by word basis and adds 12.5% overhead.

How does the 568B standard order the wires of a UTP connection?

Orange/White Orange Green/White Blue Blue/White Green Brown/White Brown

ANSI

Organization of more than 1000 representatives from industry and government who determine standards fro electronics industry in addition to other fields

How does the OFDM method work?

Orthogonal Frequency-Division Method Data is delivered by being spread across multiple parallel channels

Which method do the 802.11g and 802.11n wilreless networks use to carry radio frequency trafic?

Orthogonal Frequency-Division Multiplexing (OFDM)

Which of the following associates a port number with a host on a private network? VLSM PAT NAT CIDR

PAT

Which of the following is a mechanism for granting and validating certificates?

PKI

What is on Port 110?

POP3

Which of the following TCP/IP protocols do e-mail clients use to download messages from a remote mail server?

POP3

Steps to Bring up a Router

POST, Load IOS from Flash Memory to RAM and Load config from NVRAM (startup-config) into RAM (running-config)

Which of the following describes the lines used in local loop for dial-up telephone access?

POTS

You are configuring your computer to dial up to the Internet. What protocol should you use?

PPP

Which of the following protocols of services is commonly used on cable Internet connections for user authentication?

PPPoE

You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?

PPPoE

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network.

PPTP

Which of the following terms identifies the network of dial-up telephone and the long-distance lines?

PSTN

You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel?

PSTN

Which type of network divides data to be transmitted into small units and routes these units from the originating system to the destination system, allowing multiple, concurrent communications on the network medium?

Packet-switched

Ethernet Frame

Packets sent within the LAN.

A Smurf attack requires all but which of the following elements to be implemented?

Padded cell

Punch-down block

Panel of data receptors into which twisted pair wire is inserted, or punched down, to complete a circuit

Segment

Part of a network, usually composed of a group of nodes that share the same communications channel for their traffic

Vertical-cross connect

Part of a networks backbone that supplies connectivity between a building's floors

66 block

Part of an organization's cross-connect facilities, a type of punch-down block used for many years to terminate telephone circuits. It does not meet Cat 5 or better standards, and so it is infrequently used on data networks.

100 block

Part of an organization's cross-connection facilities, a type of punch-down block designed to terminate Cat 5 or better twisted pair wires.

What is PAP?

Password Authentication Protocol

enable secret

Password that overrides the default password that uses MD5 encryption

enable password

Password used on pre-10.3 system that uses Type 7 encryption

Remote User

Person working on a computer on a different network or geographical location from LANs server

Users on your network report that they have received an email stating that the company has just launched a new website for employees, and to access the Web site they need to go there and enter their user name and password information. No one in your company has sent this email. What type of attack is this?

Phishing

At which layer of the OSI model do hubs operate?

Physical

at which layer of the OSI model do hubs operate?

Physical

Primary Rate Interface (PRI)

Physical Interface that supports 23 B-data channels of 64 kbps and one 64 kbps channel for a total bit rate of 1.544 Mbps A type of ISDN that is a full T-1 line, carrying 23 B channels (totaling approximately 1.5 Mbps).

Basic Rate Interface (BRI)

Physical Interface that supports two 64 kbps B-data channels and one 16 kbps channel The basic ISDN configuration, which consists of two B channels (which can carry voice or data at a rate of 64 Kbps) and one D channel (which carries setup and configuration information, as well as data, at 16 Kbps).

Network Segment

Physical division of a network. Connected by a hub, switch, or router.

RS-232

Physical layer standard used for serial communications

Topology

Physical layout of computers on a network

What is bounded media?

Physical network cabling (copper and fiber).

What topology is used with 100BaseTX Fast Ethernet networks?(2 answers)

Physical star/logical bus, Physical star/logical star

Connectors

Pieces of hardware that connect the wire to the network device, be it file server, workstation, etc

Cable configuration for loopback plug using single RJ-45?

Pin 1 - Pin 3 Pin 2 - Pin 6

Rollover cable configuration for the cable with RJ-45?

Pin 1 - Pin 8 Pin 2 - Pin 7 Pin 3 - Pin 6 Pin 4 - Pin 5

Conduit

Pipeline used to contain and protect cabling

You are adding new wires in you building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area.

Plenum

What is Plenum?

Plenum cable is laid in plenum space in buildings. Facilitates circulation for heating/AC system

Which switch features are typically used with VoIP? (Select Two)

PoE, VLAN

What is PPP?

Point to Point Protocol

What is PPTP?

Point to Point Tunneling Protocol

What is PPP?

Point-to-Point Protocol (PPP) is a Data Link layer protocol that can be used over either asynchronous serial (dial-up) or synchronous serial (ISDN) media. It uses Link Control Protocol (LCP) to build and maintain data-link connections. Network Control Protocol (NCP) is used to allow multiple Network layer protocols (routed protocols) to be used on a point-to-point connection. The basic purpose of PPP is to transport layer 3 packets across a Data Link layer point-to-point link, and it's nonproprietary. The PPP protocol stack is specified at the Physical and Data Link layers only.

You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all other sites.

Point-to-multipoint

You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link What type of connection is being used?

Point-to-point

DNS Pointer (PTR) records

Pointer (PTR) records identify the hostname for known IP address

Demand Priority

Polling technique where nodes send out their signal state to a hub.

What is on Ports 161 and 162?

Port 161 is SNMP and Port 162 is the SNMP Manager

What is PAT?

Port Address Translator

21

Port ____________ is used by the File Transfer Protocol.

You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?

Port authentication

You want to make sure that a set of servers will only accept traffic for specific network services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?

Port scanner

Registered

Ports 1024-49,151 are ports used by vendors for proprietary applications. They are known as ________ ports.

Port Range 1024-49-151

Ports used by vendors for proprietary applications. These must be registered with the IANA (e.g., Microsoft registered 3389 for use with the Remote Desktop Protocol). Registered Ports

Green & White Stripe Wire

Positive polarity. Receives data.

Orange & White Stripe Wire

Positive polarity. Sends data.

Voltage

Pressure of an electrical current

Private Addresses

Private IP address: Under RFC1918 (A) 10.0.0.0 - 10.255.255.255 (B) 172.16.0.0 - 172.31.255.255 (C) 192.168.0.0 - 192.168.255.255

you have a small network at home that is connected to the Internet. On your home network you have a serve with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with The server. You are able to connect to other hosts on the internet. Why can't you access the server?

Private addresses are not accessible through the Internet.

setup

Privileged command that allows a basic level of configuration for the router

configure

Privileged command that allows for the configuration to be entered from the network, terminal, or router's memory

write

Privileged command that is used to save changes to the configuration

Privileged Exec Mode

Privileged mode; provides access to all other router commands; Level 2-15, ex. Router#

Slotted ALOHA

Probability of collisions reduced, as sending must synchronise with the start time of each slot Master station sends short signal at the start of each time frame to sync clocks 37% successful transmission

Address Management

Process of centrally administering a finite number of networking addresses for an entire LAN

Segmentation

Process of decreasing the size of data units when moving data from a network that can handle larger data units to a network that can handle smaller data units

License Tracking

Process of determining number of copies of a single application that are currently in use on a network and whether said number exceeds authorized number of licenses

Load Balancing

Process of distributing data transfer activity evenly so that no single device is overwhelmed

IEEE

Promote development and education in the electrical engineering and computer science fields

Scalable

Property of a network that allows you to increase size easily or add nodes

Internet Protocol version 4 (IPv4)

Protocol in which addresses consist of four sets of numbers, each number being a value between 0 and 255, using a period to separate the numbers. It is often called dotted decimal format. No address may be all 0s or all 255s. Examples of valid addresses include 192.168.0.1 and 64.176.19.164.

Application layer

Protocols allow software programs to negotiate formatting procedural, security, synchronization, and other requirements

Transport layer

Protocols ensure that data are transferred from point A to point B reliably and without errors

Physical layer

Protocols in the Presentation layer generate and detect signals so as to transmit and receive data over a network medium

Presentation layer

Protocols translate between the application and the network

Network layer

Protocols translate network addresses into their physical counterparts and decide how to route data

LLC

Provides a common interface and supplies reliability and flow services

ISP

Provides organizations and individuals with internet access and often other services

What is on Port 8080?

Proxy Server

Your computer has an IP address of 161.13.5.15. Your computer is on a

Public network

What is QoS?

Quality of Service

Which of the following is a platform independent authentication system that maintains a database of user accounts and passwords that centralizes the maintenance of those accounts?

RADIUS

Which of the following are differences between RADIUS and TACACS+?

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.

Which type of devices is required to implement port authentication through the switch?

RADIUS server

You want to set up a service to allow multiple users to dial into the office server from modems on their home computers. What service should you implement?

RAS

You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save files on the server, and print files to a printer connected to a computer at home. Which protocol should you use?

RDP

What is on Port 3389?

RDP/ Terminal Services

YOu have a small home network connected to the internet using an RG_6 cable. You need to move the router connecting the network to the internet, but can't find any RG-cable. Which cable types could you use instead

RG-59

F-type connectors are typically used with cables using which of the following standards? select 2 CAT 5e RG-59 RG-58 RG-6 CAT 5 CAT 6e

RG-59 RG-6

F-type connectors are typically used with cables using which of the following standards?

RG-59, RG-6

Of the following cables, which offer the best protection against EMI? CAT 5e CAT 6e CAT 5 RG-6

RG-6

Which of the following cable classification are typically used for cable and satellite networking with coaxial? select 2 RG-6 RG-8 RG-58 RG-59

RG-6 RG-59

Which of the following protocols has a limit of 15 hops between any two networks

RIP

Which of the following protocols has a limit of 15 hops between any two networks?

RIP

What is the main difference between RIP and RIPv2?

RIP is a classful protocol, while RIPv2 is a classless protocol.

What is the main difference between RIP and RIP2?

RIP uses classful protocol, while RIP2 is classless protocol.

Which of the following of RIP is true? -RiP is suitable for large networks -RIP uses hop counts as the cost metric -RIP is a link state routing protocol. -RIP is the routing protocol used on the Internet

RIP uses hop count as the cost metric

Distance-Vector Protocol Types

RIP, RIP v2, IGRP, EIGRP (Hybrid)

Which of the following connectors is used with Ethernet 10BaseT networks?

RJ-45

Which of the following standards is typically used in a rollover cable?

RS-232

Which of the following standards is typically used in a rollover cable? RJ-11 RS-232 RG-6 RG-58

RS-232

DB-25

RS-232 standard 25-pin connector

DB-9

RS-232 standard 9-pin connector

Examples of VOIP Protocol:

RTP: Real Time Transport Protocol SIP: Session Initiation Protocol H 323

Bend radius

Radius of the maximum arc into which you can loop a cable before you will cause transmission errors

Collision Avoidance

Ready To Send - request the channel Clear To Send - response to RTS frame ACK - sent of receipt of frame Other stations hear all / part of the RTS-CTS-ACK exchange and can infer how long the channel will be busy Repeated failures to transmit -> exponential back-off

Asynchronous transmission

Receiver resyncs at the end of each character transferred

DL Protocol 6 - Selective Repeat

Receiver window > 1, NACKs.

What does RJ stand for?

Registered Jack

Unshielded Twisted Pair (UTP)

Regular twisted-pair cabling

ITU

Regulates international telecommunications and provides developing countries with technical expertise and equipment

Zipcord cable

Relatively short fiber-optic cable in which two strands are arranged side by side in conjoined jackets

Patch cable

Relatively short section (3-25ft) of cabling with connectors on both ends

Which three of the following functions are performed by the OSI Transport layer?

Reliable message delivery data segmentation and reassembly end to end flow control

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?

Remote access

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?(2 answers)

Repeater, Hub

Impedance

Resistance that contributes to controlling an electric signal

ACK

Response generated at Transport layer of the OSI model that confirms to a sender that its frame was received

Restoring

Retrieving files from a backup

What is RARP?

Reverse Address Resolution Protocol.

Which of the following topologies connects each device to a neighboring device?

Ring

RC4

Rivest Cipher 4 A popular streaming symmetric-key algorithm.

RSA

Rivest Shamir Adleman An improved public-key cryptography algorithm that enables secure digital signatures.

RBAC

Role-based access control The most popular authentication model used in file sharing, defines a user's access to a resource based on the roles the user plays in the network environment. This leads to the idea of groups, which, in most networks is nothing more than a name that has clearly defined accesses to different resources. User accounts are placed into various groups

You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complet the configuration tasks. Which type of cable would you most likely use?

Rollover

You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use?

Rollover.

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network office. What type of security risk is this?

Rouge access point

What network devices commonly uses OSPF?

Router

Which of the following hardware devices links multiple networks and directs traffic between networks?

Router

LSA 1

Router LSA, produced by ever router

Autonomous System Boundary Router (ASBR)

Router that injects external link-state advertisements into the OSPF database

Area Border Router (ABR)

Router that is connected to more than one area and maintains a link-state database for each area to which it belongs

Internal Router

Router that keeps only one link-state database and has all of it's interfaces in the same OSPF area

Designated Router

Router that sends LSA 2 advertisements to the rest of the network and is in charge of the area

Backup Designated Router (BDR)

Router that takes over the function of the DR if the DR fails

Backbone Router

Router with at least one interface attached to Area 0

You manage a network with two switches. The switches are connected together through their Gigabit uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in the VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate?

Routing

What is RIP?

Routing Internet Protocol

Static Routing

Routing method in which the Network Administrator manually enters routes in the routing table

Dynamic Routing

Routing method that builds routing tables from information received from other routers in the network

Default Routing

Routing method that is used to send packets with a remote destination network that is not located in the routing table of the next-hop router

Link-State Protocol

Routing protocols that send only the state of their own links to all routers, also known as Shortest Path First or Distributed-Database Protocols

Multithreading

Running several program processes or part (threads) at the same time

Which of the following connectors usually require polishing as part of the assembly process? select 2 IDC SC AUI BNC ST

SC ST

SC CONNECTOR

SC CONNECTOR

Which of the following Internet services provides equal upload and download bandwidth?

SDSL

What type of module might a switch use to allow it to modify the media type supported by a switch port?(2 answers)

SFP, GBIC

What protocol sends e-mail to a mail server?

SMTP

Your company has just acquired another company in the same city. You are given the task of integrating the two e-mail systems so that messages can be exchanged between e-mail servers. However, each network uses an e-mail package from a different vendor. Which TCP/IP protocol will enable messages to be exchanged between systems?

SMTP

What is on Port 25?

SMTP Server

Management Information Base (MIB)

SNMP's version of a server. See also Simple Network Management Protocol (SNMP)

What WAN technology allows interoperability of vendor hardware for fibre optic networking?

SONET

Which of the following is WAN technology that allows for interoperability of vendor hardware for fiber optic networking?

SONET

What is on Port 1433?

SQL Server

SFTP uses what security protocol?

SSH

Telenet is inherently insecure because its a communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

SSH

What is on Port 22?

SSH

Which of the following protocols can be used to securely manage a network device from a remote connection?

SSH

FTPS uses what security protocol?

SSL

Which protocol does HTTPS use to offer greater security in Web transactions?

SSL

You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations. Which of the following protocols would be most likely to be allowed through the widest number of firewalls?

SSL

Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two)

SSL, TLS

Which of the following connectors is used with fiber optic cables and connects using a twisting motion? BNC LC F-TYPE SC ST

ST

What are the two most common types of fiber-optic connectors?

ST (twist and lock) SC (push-fit)

What is on Port 111?

SUN RPC

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which of the following is the most susceptible to interference related to atmospheric conditions?

Satellite

SCP

Secure Copy Protocol One of the first SSH-enabled programs to appear after the introduction of SSH. SCP was one of the first protocols used to transfer data securely between two hosts and thus might have replaced FTP. SCP works well but lacks features such as a directory listing.

SFTP

Secure FTP Designed as a replacement for FTP after many of the inadequacies of SCP (such as the inability to see the files on the other computer) were discovered.

SSL

Secure Sockets Layer Port 443 A protocol developed by Netscape for transmitting private documents over the Internet. SSL works by using a public key to encrypt sensitive data. You send the encrypted data over an SSL connection, and decrypt it at the receiving end using a private key.

Two Types of Switches

Segment-Based and Port Based

Broadband transmission

Send analog signal over multiple frequencies via full duplex communication.

ALOHA

Send data as soon as it's ready to go If collision occurs, stations receive garbled data, so wait random time and try again Not v efficient - 18% theoretical max channel utilisation

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports 2-8

An 8-port switch receives a frame on port number. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports 2-8

Sliding windows

Sender has a window of frames to send and expect ACKs for without receiving the previous ACK. Basically more than one frame can be up in the air at once, but you can't send too many frames ahead. Receiver also has window of accepted frames, although windows can be of different sizes.

direct-sequence spread spectrum (DSSS)

Sends data out on different frequencies at the same time.

Ticket-Granting Ticket (TGT)

Sent by an Authentication Server in a Kerberos setup if a client's hash matches its own, signaling that the client is authenticated, but not yet authorized.

Serial Transmissions

Sent sequentially bit by bit along the wire. 1 bit at a time.

Parallel Transmissions

Sent simultaneously across seperate channels. 1 byte at a time.

Which of the following connectors is typically used on one end of a rollover cable?

Serial

Remote Access Server

Server that runs communications services that enable remote users to log onto a network. Also known as access server

What is a SSID?

Service Set Identification (Network Name) A 32-bit identification string used in the header of each 802.11 data packet

Extension identifier

Set of characters assigned to each NIC by manufacturer traditional 48-bit physical addressing scheme

API

Set of routines that make UI a part of a software application

line console

Sets a console user-mode password

line vty

Sets a password used for telnet sessions

IETF

Sets standards for how systems communicate over the internet

line aux

Sets the user-mode password for the auxiliary port

What does STP stand for?

Shielded Twisted Pair

Priority Timing

Short IFS (SIFS): highest priority, immediate response actions (ACK, CTS), gets medium first PCF IFS (PIFS): medium priority polls from central controller DCF IFS (DIFS): lowest priority, ordinary and management data

Ferrule

Short tube within fiber-optic cable connector that encircles fiber strand and keeps it properly aligned

interframe space (IFS)

Short, predefined period of silence in CSMA/CA appended to the waiting time when a device detects activity on the line.

dotted decimal notation

Shorthand method for discussing and configuring binary IP addresses.

Netstat Command

Shows basic connections.

Netstat -a

Shows in depth TCP and UDP connections.

Synchronous Transport Signal (STS)

Signal method used by SONET. It consists of the STS payload and the STS overhead. A number appended to the end of STS designates signal speed.

Analog

Signal that uses a variable voltage to create continuous waves, resulting in an exact transmission

Undetectable Collisions

Signals from 2 hosts collide but neither host can hear the collision or a hidden receiver can hear one host but that host cannot hear the receiver

Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities list in a database?

Signature based

Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are several kilometers apart? Fiber Channel mode Single mode Multi mode dual mode

Single mode

What is SMF and what is it used for?

Single-Mode Fiber cable Uses one ray of light, known as a mode Used for long distances Used for laser-diode-based systems

Datagram (Packet)

Smallest amount of data that we can send. Has a header and footer attached to it. Header contains the source and target. Footer contains the Error Detection Code (EDC). Basic transfer unit associated with a packet-switched network in which the delivery arrival time and order are not guaranteed. Can be sent to a certain computer, a group of computers, or all computers connected to the media

Which of the following is a form of denial of service attack that uses spoofed ICMP PACKETS TO FLOOD A VICTIM WITH ECHO REQUESTs USING A BOUNCE/AMPLIFICATION network?

Smurf

Codec (Compression/Decompression)

Software or hardware that codes and decodes data to and from analog format.

Network operating system (NOS)

Software that enables computers on a network to communicate and to share resources and files

port scanner

Software that probes ports on another system, logging the state of scanned ports. You can use it to find an unintentionally open port so that it can be secured. Hackers like to use port scanners to find vulnerabilities in other systems

NOS

Software that runs on a server and enables the server to manage data, users, groups, security, applications and other network functions

Protocol Stack

Sometimes a protocol suite such as TCP/IP is referred to as a _____________.

STP

Spanning-Tree Protocol An IEEE 802.1 standard used by layer 2 devices to automatically monitor links between all bridges in a network in order to prevent broadcast loops A protocol used in Ethernet switches that allows a switch that detects a bridge loop to disable the loop by turning off any port causing the loop.

File Server

Specialized server that allows clients to share applications and data over the network

protocol analyzer

Specialized software or hardware used to view the Application, Session, Network, and Data Link layer information on every frame going through your network.

Optical carrier (OC)

Specification used to denote the optical data carrying capacity (in Mbps) of fiber-optic cables in networks conforming to the SONET standard. The OC standard is an escalating series of speeds, designed to meet the needs of medium-to-large corporations. SONET establishes OCs from 51.8 Mbps (OC-1) to 39.8 Gbps (OC-768).

RJ-11

Standard connector used with UTP cabling (Cat 3 or level 1) to connect analog telephones

BNC

Standard for coaxial cable connectors named after its coupling methods and its inventors

Protocol

Standard method of format for communications between network devices

V standards

Standards established by CCITT for modem manufacturers to follow (voluntarily) to ensure compatible speeds, compression, and error correction.

Portable operating system interface (POSIX)

Standards set by the Institute of Electrical and Electronics Engineering for portability of applications

Component object model (COM)

Standards that enable software object, such as a graphic, to be linked from one software component into another one. COM is the foundation that makes object linking and embedding (OLE) possible

you have a small network at home that is connected to the internet. On you home network you have a server with the IP address of 192.168.55.199/16. You have a single o]public address that is shared by all hosts on your private network. You want to configure the server as a Web server and allow internet hosts to contact the server to browse a personal web sit What should you use to allow access?

Static NAT

Three Switching Methodologies

Store and Forward, Cut-Through and Fragment-Free

You need to connect to a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?

Straight through

What are the two types of cables that you can make with UTP cable?

Straight-Through and Crossover

Which of the following applications is more likely to justify the investment in Category 6 cable?

Streaming video

Serial

Style of data transmission in which the pulses that represent bits follow one another along a single transmission line

TIA

Subgroup of EIA that focuses on standards for IT, wireless, satellites, fiber optics and telephone equipment

What best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network multiple newirk addresses

LSA 4

Summary LSA for ASBRs, produced by Area Border Routers that advertise Autonomous System Boundary Routers

LSA 3

Summary LSA, produced by Area Border Routers

Which of the following best describes how addressing is configured for the subnet?

Supernetting

You manage a subnet that uses the following subnet address: 1987.162.1.0/23. What best describes how addressing is configured for the subnet?

Supernetting

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network.

Which of the following is a characteristic of SDSL?

Supports data traffic only (no voice)

Which device is used on a LAN and offers guaranteed bandwidth to each port? router switch Bridge

Switch

Which of the following connectivity hardware is used to create a LAN?

Switch

Which of the following devices is used on LAN and offers guaranteed bandwidth to each port? Bridge switch router

Switch

Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port?

Switch

Which of the following devices operate at OSI model layer 2. select 2 Firewall Hub Router Switch Repeater NIC

Switch Network interface card (NIC)

When configuring VLANs on a switch, what is used to identify VLANs on a switch, what is used to identify VLAN membership of a device?

Switch port

SVC

Switched Virtual Circuits Virtual Circuit used by Frame Relay that are established for the duration of data transmission and is taken down once the data transfer is complete

What are three devices that operate at the Data Link layer of the OSI model?

Switches, Network Interface Cards, Bridges

Fragment-Free

Switching methodology that forwards the frame after checking the first 64 bytes of the frame. Used to be the default switching method for Cisco

Cut-Through

Switching methodology that forwards the frame upon receipt of the destination address and does not wait to check if the frame is complete before forwarding. Used in high performance, high speed data centers

Store and Forward

Switching methodology that stores the complete Ethernet frame, checks the header and FCS to ensure the frame is complete, and then forwards the frame to the destination. The default switching method for Cisco switches

Segment-Based Switching

Switching that supports multiple MAC or IP addresses from a single port

Port-Based Switching

Switching that supports only one host per port

SONET characteristics?

Synchronous Optical Network American fiber carrier standard -Transport protocol used for other traffic types (such as ATM) - Dual counter-rotating fiber optic rings

What is on Port 514?

Sys Log (Unix) or Event Manager (Windows)

Binary

System founded on using 1's and 0's to encode information

Coax (RG62) connectors

T connector, end connector, coupler, terminator

You are implementing Internet connectivity for a new start-up company. Your client will provide on-line storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20 - 30 Mbps. Which type of service should you implement?

T3

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two)

TACACS+, RADIUS

Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?

TCP

You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?

TCP

DNS Ports:

TCP 53: Connection orientation services UDP 53: Queries

PPTP (Point to Point Tunneling Protocol)

TCP Port 1723

Telnet

TCP Port 23 Protocol that enables users with the proper permissions to log on to a remote host computer to act as a Telnet client. The user can then perform tasks on a remote computer, called a Telnet server, as if he or she were sitting at the remote computer itself.

fragmentation

TCP/ data packets into right size

Static Allocation

TDM, FDM, CDMA CO Guaranteed bandwidth Bounded latency

Dynamic Allocation

TDM: allocate time based on demand (statistical multiplexing), CL

What is on Port 69?

TFTP (Trivial File Transfer Protocol)

subnetting

Taking a single class of IP addresses and chopping it into multiple smaller groups.

IAB

Technical advisory group of professionals responsible for Internet grown and management strategy etc

Split Horizon with Poison Reverse

Technique in which routes that are learned from a neighboring router are not sent back to that neighboring router

Fault tolerance

Techniques that employ hardware and software to province assurance against equipment failures, computer service interruptions, and data losses

TIA/EIA

Telecommunications Industry Association/Electronics Industries Alliance

What wiring uses the 66 block standard?

Telephone Systems

What is on Port 23?

Telnet

TACACS

Terminal Access Controller Access Control System Plus A proprietary protocol developed by Cisco to support AAA in a network with many routers and switches. It is similar to RADIUS in function, but uses TCP port 49 by default and separates authorization, authentication, and accounting into different parts. - Provides three protocols, one each for authentication, authorization, and accounting. - Uses TCP. - Encrypts the entire packets contents. - Supports more protocol suites than RADIUS.

Difference between T568A and T568B

The A version starts with white/green, green, white/orange, blue, white/blue, orange, white brown, brown. While B, starts with White/Orange.

Integrated Services Digital Network (ISDN)

The CCITT (Comité Consultatif Internationale Téléphonique et Télégraphique) standard that defines a digital method for telephone communications. Originally designed to replace the analog telephone systems, ISDN lines have telephone numbers and support up to 128 Kbps transfer rates. ISDN also allows data and voice to share a common phone line. Never very popular, ISDN is now relegated to specialized niches.

What is CHAP?

The Challenge Handshake Authentication Protocol (CHAP) is used at the intial statup of a link and at periodic checkups on the link to make sure the router is still communicating with the same host. After PPP finishes its initial link-establishment phase, the local router sends a challenge request to the remote device. The remote device sends a value calculated using a one-way hash function called MD6. The local router checks this hash value to make sure it matches. If they don't, the link is immediately terminated.

Two Main Files that Cisco Hardware Relies On

The Cisco Internetwork Operating System (IOS) and configuration (startup-config)

169.254.0.0

The Class B network number used for Automatic Private IP Addressing (APIPA).

E3

The European Counterpart of a T3 line that carries 16 E1 lines (512 channels), for a total bandwidth of 34.368 Mbps—making it a little bit slower than an American T3.

E1

The European counterpart of a T1 connection that carries 32 channels at 64 Kbps for a total of 2.048 Mbps—making it slightly faster than a T1.

LAN, CAN, MAN

The FDDI standard has potential to act as a backbone for ___s, ___s, and ___s.

X Window System

The GUI environment for UNIX and Linux systems.

You administer a Web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows: IP address: 192.168.23.8, HTTP Port: 1030, SSL Port: 443. Users complain that they can't connect to the web site when they type www.westsim.com. What is the most likely source of the problem?

The HTTP port should be changed to 80.

What is HDLC?

The High-Level Data-Link Control (HDLC) protocol is a populare ISO-standard, bit-oriented, Data Link layer protocol. It specifies an encapsulation method for data on synchronous serial data links using frame characters and checksums. HDLC is a point-to-point protocol used on leased lines. No authenication can be used with HDLC.

What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack? (Select two)

The IDS logs all pertinent data about the intrusion, An alert is generated and delivered via Email, the console, or an SNMP trap.

802.16

The IEEE standard for broadband wireless metropolitan area networking (also known as WiMax) with a range of up to 30 miles.

802.2

The IEEE standard for error and flow control in data frames. Logical Link Control

802.11

The IEEE subcommittee that defined the standards for wireless to wireless data communications.

Ethernet

The IT director asks you to connect a client computer to an 802.3ab network. This network uses the __________ standard.

netsh

The Net Shell Command

What is PAP?

The Password Authentication Protocol (PAP) is the less secure of the two methods. Passwords are sent in clear text, and PAP is only performed upon the initial link establishment. When the PPP link is first established, the remote node sends the username and password back to the originating router until authentication is acknowledged.

Physical Memory

The RAM chips installed on the computer's system board that provide dedicated memory to that computer.

Internet Engineering Task Force (IETF)

The TCP/IP model is maintained by the __________.

IPCONFIG

The Windows version of the IFCONFIG command.

active monitor

The ___ ___ is responsible for creating the token and passing to the next node and removing any duplicates. The mechanism used to manage a token ring. The network node with the highest MAC address on the ring becomes the active monitor and is responsible for management tasks such as preventing loops and ensuring that tokens are not lost

First

The ________ octet of the IP address defines which class the address is a member of.

Token Ring

The __________ network architecture is physically a star and logically a ring.

Multitasking

The ability of a processor to perform multiple activities in a brief period of time (often seeming simultaneous to the user.)

Clustering

The ability to share the computer load and resources by linking two or more discrete computer systems together to function as though they were one

Route Summarization

The ability to take a group of subnetworks and summarize them, on the router, as one network route

CSMA/CD

The access method Ethernet systems use in LAN technologies, in which the sending nodes first listen for traffic on the wire, send when no traffic is detected, continue to listen, and if a collision is detected the sending nodes each generate a random number to determine the amount of time to wait, and resend after that time has expired.

Subnetting

The act of dividing a network into smaller logical subnetworks.

Map

The action of associating a disk, directory, or device with a drive letter.

0.0.0.0/0

The address for a default route

link-local address

The address that a computer running IPv6 gives itself after first booting. The first 64-bits of a link-local address is always FE80::/64.

IP addressing

The addressing scheme of the IP protocol by which each machine on a TCP/IP network gets a unique address that identifies the machine. These addresses group together sets of computers into logical networks, and equipment that understands TCP/IP addressing can communicate with each other between LANs, in a WAN.

Throughput

The amount of data that a medium can transmit during a given period of time

Route Invalid Timer

The amount of time that must elapse for a router to determine if a route has become invalid

Transmission

The application of data signals to a medium or the progress data from one point to another

Plenum

The area above the ceiling tile or below the sub-floor in a building

PowerPC

The brand of computer central processing unit invented by Apple Computer, IBM, and Motorola, and used in IBM servers.

SPARC

The brand of computer central processing unit invented by and used in Sun Microsystems servers.

Which of the following are requirements of the 1000BaseT Ethernet standards? select all the apply *SC or ST connectors *The cable length must be less than or equal to 100m *RJ-45 connectors *The cable length must be less than or equal to 1000m *CAT 5e cabling Fiber optic cable

The cable length must be less than or equal to 100m *RJ-45 connectors CAT 5e cabling

Virtualization

The capability for operating multiple logical servers---or virtual servers---on a single machine.

Multitasking

The capability of a computer to run two or more programs at the same time

Remote Access

The capability to access a computer from outside a building in which it is housed. Remote access requires communications hardware, software, and actual physical links.

Which of the following is true about single mode fiber optic network cabling? *The central core is composed of braided plastic or glass fibers *It's less expensive than multimode fiber optic cabling *It doesn't support segment lengths as long as that supported by multimode fiber optic cabling. *The central core is smaller than the multimode fiber optic cabling. *It transmits multiple rays of light concurrently

The central core is smaller than that of multimode fiber optic cabling

IFCONFIG

The command used in operating systems other than Windows that gives you information about a computer's IP settings. The /all switch gives additional detailed information, including DNS server addresses and MAC addresses.

Namespace

The complete database of hierarchical names (including host and domain names) used to resolve IP addresses with their hosts.

Source Code

The computer instructions written in a programming language that is readable by humans. Source code must be translated into a form that is executable by the machine, typically called binary code (for the sequence all zeros and ones) or target code.

startup-config

The configuration file found in NVRAM

last mile

The connection between a central office and individual users in a telephone system.

running-config

The copy of the configuration file that is loaded in RAM from VRAM

Kernel

The core of a UNIX or Linux system. this part of the operating system is loaded and run when you turn on your computer. It mediates between user programs and the computer hardware.

Total cost of ownership (TCO)

The cost of installing and maintaining computers and equipment on a network, which includes hardware, software, maintenance, and support costs

V.92 Standard

The current modem standard, which has a download speed of 57,600 bps and an upload speed of 48 Kbps. V.92 modems have several interesting features, such as Quick Connect and Modem on Hold.

Schema

The description of object types, or classes, and their required and optional attributes that are stored in an NOS's directory.

A network is connected following the IEEE802.3 specifications. Which of the following best describes when a device can transmit messages? *The device listens to determine if the transmission media is free. *The device transmits whenever it is ready. *The device requests permission from a controlling device. *The device with the token can use the transmission media. *The device is notified of its turn to send messages.

The device listens to determine if the the transmission media is free.

A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages?

The device listens to determine if the transmission media is free.

DS0

The digital signal rate created by converting an analog sound into 8-bit chunks 8000 times a second, with a data stream of 64 Kbps. This is the simplest data stream (and the slowest rate) of the digital part of the phone system.

6to4

The dominant IPv6 tunneling protocol, because it is the only IPv6 tunnel that doesn't require a tunnel broker. It is usually used to directly connect two routers because it normally requires a public IPv4 address.

Attenuation

The extent to which a signal has weakened after traveling a given distance

Attenuation

The extent to which a signal has weakened after traveling a given distance.

token ring

The failure of one node in a ___ ___ network can disrupt the entire ring.

Default Gateway

The first IP address of the device that a client computer will look for when attempting to gain access outside the local network.

Physical Layer, Data Link Layer, Network Layer, and Transport Layer

The first four layers of the OSI Model are what?

Main distribution frame

The first point of interconnection between an organizations LAN or WAN and a service provider's facility

802.11b

The first popular wireless networking standard, it operates at 2.4 GHz, throughput of 11Mbps, and a maximum distance of 300 feet; 802.11g is backward compatible with it. - 11 Channels

Explain the purpose and properties of routing and switching

The first router in the path to the destination network

Block ID

The first set of six characters that make up the MAC address and that are unique to a particular manufacturer.

Data Link Layer, Network Layer, Transport Layer, and Application Layer.

The four layers in the TCP/IP Model are what?

Cable plant

The hardware that constitutes the enterprise-wide cabling system

Extended Unique Identifier, 64-bit (EUI-64)

The last 64-bits of the IPv6 address, which are determined based on a device's MAC address.

Very High Bitrate DSL (VDSL)

The latest form of DSL with download and upload speeds of up to 100 Mbps. VDSL was designed to run on copper phone lines, but many VDSL suppliers use fiber-optic cabling to increase effective distances.

Motherboard

The main circuit that controls a computer

Simple Mail Transport Protocol (SMTP)

The main protocol used to send electronic mail on the Internet. This protocol uses port 25.

Demilitarized Zone

The manager of IT asks you to connect a perimeter network to the firewall, which will be separate from the LAN This type of network is known as ______________.

Internet Control Message Protocol (ICMP)

The manager of IT asks you to ping his laptop to see whether your computer can find it on the network. In this scenario, the __________ protocol is being implemented.

Virtual Memory

The memory that is logically carved out of space on the hard drive and added to physical memory (RAM).

Active Directory

The method for organizing and managing objects associated with the network in the Windows Server 2003 and Server 2008 NOSs.

terminal adapter (TA)

The most common interface used to connect a computer to a ISDN line.

Public Switched Telephone Network (PSTN)

The most common phone connection, it's also called Plain Old Telephone Service (POTS). It takes your sounds, translated into an analog waveform by the microphone, and transmits them to another phone.

Plain Old Telephone Service (POTS)

The most common phone connection, it's also called the Public Switched Telephone Network (PSTN).

GNU

The name given to the public software project to implement a complete, free source code implementation of UNIX. it also refers to the collection of UNIX-inspired utilities and tools that are included with Linux distributions. ______ is an acronym within an acronym that stands for "____s Not UNIX."

Ext3

The name of the primary file system used in most Linux distributions.

baud rate

The number of bauds per second. In the early days of telephone data transmission, the baud rate was often analogous to bits per second. Due to advanced modulation of baud cycles as well as data compression, this is no longer true.

568A

The older standard BOGB cable.

Password Authentication Protocol (PAP)

The oldest and most basic form of authentication, and also the least safe because it sends all passwords in Cleartext.

Man Pages (Manual Pages)

The online documentation for any variety of the UNIX operating system. This documentation describes the use of the commands and the programming interface.

Hierarchical File System

The organization of files and directories (or folders) on a disk in which directories may contain files and other directories. When displayed graphically, this organization resembles a treelike structure.

Internet Assigned Numbers Authority (IANA)

The organization responsible for assigning public IP addresses. This organization no longer directly assigns IP addresses, having delegated this to the five Regional Internet Registries.

Sheath

The outer cover, or jacket, of a cable

ciphertext

The output when cleartext is run through a cipher algorithm using a key.

SYN-ACK

The packet a node sends to acknowledge to another node that it has received a SYN request for connection

SYN

The packet one node sends to request a connection with another node on the network

Backbone

The part of a network where segments and significant shared devices connect

ring, rotating

The physical topology used by FDDI is the __ topology with a counter-___ fiber ring for fault tolerance.

Demarcation point (demarc)

The point of division between a telecommunications service carrier's network and a building's internal network

STS payload

The portion of a Synchronous Transport Signal (STS) signal containing data.

STS overhead

The portion of a Synchronous Transport Signal (STS) signal containing the signaling and protocol information

UPN (User Principle Name) Suffix

The portion of a universal principle name (in Active Directory's naming conventions) that follows the @ sign.

host ID

The portion of an IP address that defines a specific machine in a subnet.

UPN (User Principle name)

The preferred Active Directory naming convention for objects when used in informal situations. This name looks like a familiar internet address, including the positioning of the domain name after the @ sign. _____s are typically used for email and related internet services.

circuit switching

The process for connecting two phones together on one circuit.

static addressing

The process of assigning IP addresses by manually typing them into client computers.

Segmentation

The process of breaking down large data units into multiple smaller units and then reassembles-reconstructs units, sometimes increases efficiency. Decreasing the size of data units when moving data from a network that can handle larger data units to a network that can handle only smaller data units.

Replication

The process of copying Active Directory data to multiple domain controllers. This ensures redundancy so that in case one of the domain controllers fails, clients can still log on to the network, be authenticated, and access resources.

time division multiplexing

The process of having frames that carry a bit of every channel in every frame sent on a regular interval in a T1 connection.

Sequencing

The process of identifying segments that belong to same group of divided data, where it begins, the order and how data should be interpreted. Assigning a placeholder to each piece of a data block to allow the receiving node's transport layer to reassemble the data in the correct order.

Mount

The process of making a disk partition available.

proxy ARP

The process of making remotely connected computers truly act as though they are on the same LAN as local computers. Proxy ARPs are done in a number of different ways, such as with a Virtual Private Network (VPN).

Network Address Translation (NAT)

The process of modifying an IP address while it is in transit across a router, computer, or similar device.

Paging

The process of moving blocks of information, called pages, between RAM and into a page file on disk.

Regeneration

The process of re-transmitting a digital signal

Reassembly

The process of reconstructing data units that have been segmented

Reassembly

The process of reconstructing data units that have been segmented.

Encapsulate

The process of wrapping one layer's PDU with protocol informations so that it can be interpreted by a lower layer. For example, Data Link layer protocols encapsulate Network layer packets in frames.

nonrepudiation

The process that guarantees that the data is as originally sent, and that it came from the source you think it should have come from.

System V

The proprietary version of UNIX that comes from Bell Labs.

bend radius

The radius of the maximum arc into which you can loop a cable before you will cause data transmission errors. Generally, a twisted pair cable's bend radius is equal to or greater than four times the diameter of the cable.

Non-Volatile RAM

The random access memory that does not lose its state when power is removed and contains the startup-config

Sharing, Communication, Organization, and Money

The real reasons that organizations need networks.

Trust Relationship

The relationship between two domains on a Windows Server 2003/2008 Network that allows a domain controller from one domain to authenticate users from the other domain.

Addressing

The scheme for assigning a unique identifying number to every device and workstation on the network

Device ID

The second set of six characters that make up a network device's MAC address. The device ID, which is added at the factory, is based on the devices model and manufacture date.

Two-Way Transitive Trust

The security relationship between domains in the same domain tree in which one domain grants every other domain in the tree access to its resources and, in turn, that domain can access other domains' resources. When a new domain is added to a tree, it immediately shares a two-way trust with the other domains in the tree.

DS1

The signaling method used by T1 lines, which uses a relatively simple frame consisting of 25 pieces: a framing bit and 24 channels. Each DS1 channel holds a single 8-bit DS0 data sample. The framing bit and data channels combine to make 193 bits per DS1 frame. These frames are transmitted 8000 times/sec, making a total throughput of 1.544 Mbps.

Middleware

The software that sits between the client and server in a 3-tier architecture. ______ may be used as a messaging service between clients and servers, as a universal query language for databases, or as means of coordinating processes between multiple servers that need to work together in servicing clients.

T1 line

The specific, shielded, two-pair cabling that connects the two ends of a T1 connection. A leased-line connection capable of carrying data at 1.54Mbps.

568B

The standard BOGB cable.

dipole antennae

The standard straight-wire antenna that provides most omni-directional function.

public-key infrastructure (PKI)

The system for creating and distributing digital certificates using sites like VeriSign, thawte, or GoDaddy.

Multiprocessing

The technique of splitting tasks among multiple processors to expedite the completion of any single instruction.

Node

The term ________ is synonymous with "host."

Open Source Software

The term used to describe software that is distributed with few restrictions and who source code is freely available.

Distribution

The term used to refer to the different implementations of a particular UNIX or Linux system. For example, different distributions of Linux include Fedora, SUSE, and Ubuntu.

Route Flush Timer

The time between a route becoming invalid and its removal from the routing table

Holddown Timer

The timer that specifies how long a route will not accept changes after a triggered update is sent

Bandwidth

The transmission capacity of a computer network or telecommunication system. Bandwidth tells you the maximum amount of data that your network can transmit.

Why can't a straight-through cable be used to connect two computers directly (NIC-to-NIC)?

The transmit pins on one system will be connected to the transmit pins on the second system, so neither system can receive data.

SMF

The type of fiber-optic cable with a narrow core that caries light pulses along a single data path

Preemptive Multitasking

The type of multitasking in which tasks are actually performed one at a time, in very brief succession. In______ ______, one program uses the processor for a certain period of time, then is suspended to allow another program to use the processor.

Data Over Cable Service Interface Specification (DOCSIS)

The unique protocol used by cable modem networks.

Sneakernet

The way of exchanging data between computers that are not connected to a network

In what way is HDLC proprietary?

There is a different HDLC for each manufacturer and they don't communicate together. So an alternative to CISCO's HDLC, if you're communicating between Cisco and Juniper (for example), would be PPP (which uses a form of HDLC)

Transmission Error causes

Thermal noise, impulse noise, attenuation, crosstalk, voice amplitude signal compression, quantization noise, jitter, receiver and transmitter out of sync.

802.3z

These Ethernet networks run at 1 Gbps / 1000 Mbps and have a cable standard of 1000Base-X that is Fiber optic cable.

802.3an

These Ethernet networks run at 10 Gbps and have a cable standard of 10 GBase-T that is Twisted pair cable.

802.3ae

These Ethernet networks run at 10 Gbps and have a cable standard of 10Gbase-SR, 10GBase-LR, 10GBase-ER and so on that is Fiber optic cable.

802.3j

These Ethernet networks run at 10 Mbps and have a cable standard of 10Base-F that is Fiber optic cable.

802.3i

These Ethernet networks run at 10 Mbps and have a cable standard of 10Base-T that is Twisted pair cable.

802.3a

These Ethernet networks run at 10 Mbps and have a cable standard of 10Base2 that is Thin coaxial cable.

802.3

These Ethernet networks run at 10Mbps and have a cable standard of 10Base5 that is Thick coaxial cable.

What is on Ports 20 and 21?

These are the FTP ports. Port 20 handles data and Port 21 provides control.

Inbound Ports

These are used when another computer wants to connect to a service or application running on your computer.

Outbound Ports

These are used when your computer wants to connect to a service or application running on another computer.

What are coaxial cable types RG-59 and RG-6 used for?

They are used with home video devices such as TV's and VCR's

Which of the following are characteristics of an LC fiber optic connector? *They use a stainless steel housing. *They are threaded *they can be used with either fiber optic or copper cabling *They use a housing and latch system similar to an RJ-45 UTP connector *they are half the size of standard connectors

They use a housing and latch system similar to an RJ-45 UTP connector *they are half the size of standard connectors

What are coaxial cable types RG-8 or RG-11 used for?

Thick Ethernet

What is coaxial cable type RG-58 used for ?

Thin Ethernet

What type of connections use the Bayonet Neil-Concelman Connector?

Thin Ethernet ARCNet

IPv6 Subnet

This defines the individual subnet of the network that the address is located on.

Default Gateway

This device could be a router, server, or other similar device; it is the device that grants access to the Internet or other networks.

Optional Extension Header

This incorporates options for special treatment of the packet, such as routing and security.

Header

This is 40 bytes and contains the source and destination addresses plus other forwarding information.

Electromagnetic Interference (EMI)

This is a disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction and possibly radiation.

Radio Frequency Interference (RFI)

This is interference that can come from AM/FM transmissions and cell phone towers.

Data Emanation

This is the electromagnetic (EM) field that is generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data.

Global Routing Prefix

This is the first three groups of numbers, and it defines the "network" of the address.

Interface ID

This is the individual host IP portion. It can be assigned to one interface or more than one interface, depending on the type of IPv6 address.

Session Layer

This layer governs the establishment, termination, and synchronization of sessions within the OS over the network and between hosts-for example, when you log on and log off.

Session

This layer of the OSI Model uses the Protocol Logon/Logoff.

Physical

This layer of the OSI Model uses the Protocols 100Base-T & 1000Base-X and uses Hubs, patch panels, & RJ45 Jacks as devices.

Data Link

This layer of the OSI Model uses the Protocols 802.3 & 802.5 and its' devices are NICs, switches, bridges, & WAPs.

Presentation

This layer of the OSI Model uses the Protocols Compression & Encryption.

Application

This layer of the OSI Model uses the Protocols FTP, HTTP, POP3, & SMTP and its' device is the Gateway.

Network

This layer of the OSI Model uses the Protocols IP, ICMP, ARP, & RIP and uses Routers as its' device.

Transport

This layer of the OSI Model uses the Protocols TCP & UDP.

Multiple-Input Multiple Output (MIMO)

This means that wireless devices can have more antennas, up to four maximum.

Port Range 0-1023

This range defines commonly used protocols (e.g. FTP utilizes port 21 to accept client connections.) Well-known ports.

Three-way handshake

Three-step process in which Transport layer protocols establish a connection between nodes

When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?

Ticket

Which of the following are used when implementing Kerberos for authentication and authorization? (Select Two)

Time server, Ticket granting

Route Update Timer

Timer that specifies how often a router sends it's complete routing table updates to it's neighbors

IEEE 802.3 Retry Timing

To avoid repeated collisions, at nth retry, wait between 0 and n slot times (discrete exponential back-off) Give up on 16th collision -> too many stations on the same network Low delay for 2 frames colliding, reasonable for many

What does crimping mean?

To bend or squeeze the metal of a connector around a cable to secure it to the cable

ISO

To establish technological standards to facilitate global exchange

Route

To intelligently direct data between networks based on addressing, patterns of usage, and availability of network segments

Transmit

To issue signals to the network medium

Continuity Tester

To test a cable, what tool would you use?

cannot, translation

Token Ring and Ethernete are layer 2 standards and ___ be in the same network without a ___ device, such as a gateway or router.

802.4

Token bus

IEEE 802.5 Frame Format

Token: |SD-1|AC-1|ED-1| Data: |SD-1|AC-1|FC-1|DA|SA|Data|FCS|ED|FS| Start Delimiter: (JK0JK000) J = high-high transition, K = low-low transition Access Control: (PPPTMRRR) Priority, Token flag, Monitor to handle failure of source to remove frame, Reservation to request priority level Frame Control: (FFZZZZZZ) FF indicates whether frame is data or control. If data, Z interpreted by destination else all hosts act on control bits, z Ending Delimiter: (JK1JK1IE) I = 1: intermediate frame, I = 0: last frame, E = 0 from source, but set if error detected Frame Status: (ACxxACxx) A = address recognised, F = frame copied

EIA

Trade organization that sets standards for electronic equipment and lobbies for favorable legislation to growth of computers and electronics

What device sends signals from a computer onto a network?

Transceiver

Port Address Translations (PAT)

Translates both IP addresses and port numbers.

What is TCP?

Transmission Control Protocol

TCP

Transmission Control Protocol, Connecton Oriented Transport Layer Reliable for transmitting HTTP protocol's request from client to server vice versa. talking w connection. used for downloading. only for LANs

Broadcast

Transmission that involves one transmitter and multiple, undefined receivers

Multicasting

Transmitting data to multiple computers (or routers).

SPX

Transport Layer, Connection Oriented Novell Developed

Connection oriented

Transport layer protocol that requires establishment of a connection between communicating nodes before it will transfer data

Connectionless

Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data

Which of the following are characteristics of SONET? (Select Two)

Transport protocol used for other traffic types, dual counter-rotating fiber optic rings

Responsibilities of the Cisco IOS

Transporting network protocols and functions, provides security features to access control, provides scalability and ensures a high degree of network reliability

RIP Algorithms to Prevent Loops

Triggered Updates and Split Horizon with Poison Reverse

True or False: A private AS number is useful in internet multihoming with all ISPs in same BGP area.

True

True or False: A 66 Block ismostlikely to be used to connect wires for POTS.

True

True or False: ICMP protocol is a layer 3 protocol

True

True or False: PKI is used for mutual authentication and the private key is installed on the client.

True The public key is on the server and the private on the client

Routing Information Protocol (RIP)

True Distance-Vector routing protocol that uses hops as it's metric, has a max hop count of 15, is classful (no VLSM), Update Timer of 30 seconds, Invalid Timer and Holddown Timer of 180 seconds, Flush Timer of 240 seconds and Administrative Distance of 120, does not support authentication

RIP Version 2

True Distance-Vector routing protocol that uses hops as it's metric, has a max hop count of 15, is classless (supports VLSM), Update Timer of 30 seconds, Invalid Timer and Holddown Timer of 180 seconds, Flush Timer of 240 seconds and Administrative Distance of 120, supports authentication

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?

Trunk ports

Link aggregation is also known as:

Trunking

You manage a private network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1, and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?

Trunking

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?

Trunking

IEEE 802.1Q

Trunking method that only adds 4 byes of overhead/data to the frame

Types of Virtual Interfaces

Tunnel, Loopback, Null

Cat 6

Twisted pair cable that contains four wire pairs each wrapped in foil insulation, fire resistant, 6x throughput and 250Mhz

Crossover cable

Twisted pair patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed

Cat 7

Twisted pair with multiple wire pairs, each separately shielded and then surrounded by another shielding within the jacket

What type of cabling is used with 100BaseTX

Type 1A STP or Category 5 UTP

What type of cabling is used with 100BaseTX Fast Ethernet networks?

Type 1A STP or Category 5 UTP

Symmetric DSL (SDLS)

Type of DSL connection that provides equal upload and download speed and, in theory, provides speeds up to 15 Mbps, although the vast majority of ISPs provide packages ranging from 192 Kbps to 9 Mbps.

Twisted pair

Type of cable similar to telephone wiring that consists of pairs of insulated copper wires

Coaxial cable

Type of cable that consists of a central, which might be solid or stranded and is often made of copper, surrounded by an insulator, braided metal shielding and outer cover

UTP

Type of cabling that consists of one or more insulated wire pairs encased in plastic sheath

Cross talk

Type of interference caused by signals travelling on nearby wire pairs infringing on a signal

EMI

Type of interference that may be caused by motors, power lines, copiers, fluorescent lights, or other sources of electrical activity

RFI

Type of interference that may be generated by broadcast signals from radio or TV antennas

Full duplex (duplex)

Type of transmission in which signals may travel in both directions over a medium simultaneously

Half-duplex

Type of transmission in which signals may travel in both directions over a medium, but only one direction at a time

Simplex

Type of transmission in which signals may travel in only one direction over a medium

SNMP v2/3 Ports:

UDP 161 Receives Traps UDP 162 Agents.

Which protocol and port number is used by BOOTP/DHCP?

UDP 67

Which protocol and port number is used by TFTP?

UDP 69

L2TP (Layer 2 Tunneling Protocol)

UDP Port 1701

TraceRoute

UDP Port 33434-33534(Unix) or ICMP(Windows) A command line utility used to trace all the routers between two points. Use it to diagnose problems reaching a remote system. Many routers block TRACERT(The Windows version of TRACEROUTE) packets, therefore, TRACEROUTE is a viable alternative.

DHCP (Dynamic Host Configuration Protocol)

UDP Port 67, 68

BOOTP/DHCP

UDP port 67

What kind of cabling uses the RJ45 connector

UTP Network Cabling (Unshielded Twisted Pair)

100-Pair wire

UTP supplied by a telecommunication carrier that contains 100 wire pairs

100 pair wire

UTP supplied by a telecommunications carrier that contains 100 wire pairs.

25-Pair wire

UTP supplied by a telecommunications carrier that contains 25 wire pairs

25 Pair wire

UTP supplied by a telecommunications carrier that contains 25 wire pairs.

Services (3)

Unacknowledged Connectionless Service: Independent frames with no logical connection, no recovery from loss but fast, common in LANs Acknowledged Connectionless Service: Each frame acknowledged, out of order delivery possible, good for unreliable channels such as wireless Unacknowledged Connection Oriented Service: order guaranteed as each frame numbered, reliable bit stream

Which of the following are characteristics of VDSL? (Select Two)

Unequal download and upload speeds, Supports both data and voice at the same time

Network address

Unique identifying number for a network node that follows a hierarchical addressing scheme

PDU

Unit of data at any layer of the OSI model

Segment

Unit of data that results from subdividing a larger PDU

UART

Universal Asynchronous Receiver/Transmitter A device that turns serial data into parallel data. The cornerstone of serial ports and modems.

What does UTP stand for?

Unshielded Twisted Pair

Spam

Unsolicited, unwanted e-mail

Noise

Unwanted signals or interference from sources on network cabling

Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (Select 2.)

Use Automatic Private IP Addressing, Install a DHCP server on the network

Hamming Codes

Use codewords of data bits and redundant check bits. Check bits reside in power of 2 positions (1, 2, 4, 8, etc). These will make the messages match legal codewords. Hamming distance is number of bit positions in which two patterns differ. It is the smallest distance between two legal codewords. To detect d single bit errors, need d+1 code distance. To correct d single bit errors, need 2d+1 code distance. Error correction too expensive.

You have a company network that is connected to the internet. You want all users to have internet access, but need to protect your private network and users. You also need to make private network and users. You also need to make a Web server publicly available to Internet users. Which solution should use?

Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ

Convergence

Use of data networks to bring voice, video and other communications services in addition to data

Propagation Delay

Use speed of 2*10⁸ m/s Delay = distance / speed (time from one node to another) Time = 1 / Baud (time to send each signal)

Administrative Distance

Used by Cisco routers using multiple routing protocols that prioritizes which routing protocol will be preferred

Distributive Computing

Used for both client-server and peer to peer networks and means that every device or workstation has its own processing power.

Class D Network

Used for multicasting.

Broadcast Address

Used to communicate with all hosts on the network.

UDP

User Datagram Protocol. An alternative to TCP; it is a connectionless-oriented protocol. Getting data there as fast as you can, used for watching stream videos, webcams

What is UDP? What are some of its attributes?

User Datagram Protocol. This protocol is connectionless and routable.

User Exec Mode

User mode, limited to basic monitoring and commands used to view statistics; Level 0-1, ex. Router>

Distributed Coordination Function

Uses CMSA/CA CD not practical Inter Frame Spaces give fair access with priorities Contention service

Which of the following are characteristics TACACS+?(Chose Two)

Uses TCP, Allows for a possible of three different servers, one each for authentication, authorization, and accounting

Which of the following are characteristics of ATM?(Select Two)

Uses fixed-length cells of 53-bytes

Voice over IP (VoIP)

Using an IP network to transfer voice calls.

How is a straight-through cable made for CAT5?

Using only 4 wires - 1,2,3, and 6 1 and 2 are transport pins while 3 and 6 are recieve pins

Interior Gateway Protocols (IGP)

Utilized by networks internal to the AS

LocalTalk

Utilizing CSMA/CD, this is Apple Computer's proprietary baseband protocol, operating at the Data Link and Physical layers of the OSI reference model.

You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?

VLAN

Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?

VLAN

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?

VLANs

You have a group of salesman who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

VPN concentrator

VLSM

Varibale Link Subnet Mask

Network +

Verifies broad, vendor independent networking technology skills

What is a VCC cable?

Vertical Cross-Connect Cable Is the cable that connects the MDF to the IDF's

How are BDF's, MDF's, and IDF's often connected to each other?

Via fiber

Permanent Virtual Circuits (PVC)

Virtual Circuit used by Frame Relay that are created through mapping and remain in place

Loopback Interface

Virtual interface configured on the route utilized for maintenance/management functions

Null Interface

Virtual interface that provides an alternative method of filtering traffic

Tunnel Interface

Virtual interface utilized to cloak or hide data within another similar protocol

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it found?

Virus

What is 802.1q?

Vlan Tagging

Session Initiation Protocol (SIP)

VoIP protocol competing with H.323 for VoIP dominance.

802.9

Voice and Data Integration

Copper (Physical Media)

Voltage

What is the difference between WPA-Personal and WPA-Enterprise?

WPA-Personal uses a preshared key as the method for encrypting traffic while WPA-Enterprise implements a central authentication server for authentication and auditing features.

A router connected the network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168/4/0/24. The next hop router for the network 192.168.3.0 has changed. you need to make the change with the least amount of effort. What should you do?

Wait for convergence to take place.

Patch panel

Wall-mounted panel of data receptors into which cross-connect patch cables from punch down block are inserted

IPv4 Mapped Addresses

What IPv6 address incorporates IPv4?

Ping

What command do you use to test the TCP/IP stack on a computer?

Default Gateway

What defines the nearest router for a host?

Subnet

What do you call a smaller network that is part of a larger network?

Crosstalk

What do you call it when electrical signals jump to another set of wires?

Switch

What do you use to create VLANs?

VLAN

What do you use to isolate a group of computers within your organization?

11000111

What is 199 equal to in binary?

11111001

What is 249 equal to in binary?

01010110

What is 86 equal to in binary?

8P8C

What is an RJ45 port where the RJ45 plug at the end of the network cable connects, otherwise known as?

Arp -a

What is the Address Resolution Protocol Command?

Wireless Access Point

What is the central device used in wireless LANs?

255.255.0.0

What is the default subnet mask for a Class B network?

254

What is the maximum number of hosts you can use for each subnet that belongs to a class C address?

11 Mbps

What is the maximum speed supported by 802.11b?

54 Mbps

What is the maximum speed supported by 802.11g?

Category 5

What is the minimum category of twisted-pair cable you need to support 100 Mbps?

RJ45

What is the most common adapter or connector used to connect a computer to a wired network?

UTP

What is the most common cable used today?

Switch

What is the most common central device used today to connect computers to a network?

WPA2

What is the most secure encryption used in wireless networks?

Service Set Identifier (SSID)

What is used to identify a wireless network?

NAT

What is used to remap private addresses to public addresses and back?

IP address

What is used to uniquely identify a host on a TCP/IP network?

Presentation

What layer in the OSI model is used to encrypt data?

CSMA/CA

What mechanism do wireless networks use to access the network?

OSI Reference Model

What model is used to describe how data communication occurs between hosts?

Distributive Computing

What model promises the most processing power?

Dynamic Ports

What ports are defined above 49,152?

DNS

What server is used to translate host names to IP addresses?

802.3

What standard describes CSMA/CD?

APIPA

What type of address is 169.254.32.23?

Broadcast Address

What type of address is 202.23.2.255?

Multicast Address

What type of address is used to send a single set of packets to multiple hosts?

Plenum-Rated

What type of cable should be used as part of a fire code for a building?

Unicast

What type of communication is sent to a single designated host?

Network Controller

What type of server does Active Director run on?

Demilitarized Zone (DMZ)

What zone is used to publish external websites for an organization?

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header.

Triggered Updates

When a routing table updates are sent before the update timer has expired

How does Far-end crosstalk occur?

When a signal causes interference on an adjacent signal heading the opposite direction.

How does Near-end crosstalk occur?

When a signal causes interference with a signal on an adjacent wire heading in the same direction.

tone generator

When cabling is improperly labeled, a tone generator and tone probe are used to locate the two ends of each cable. The tone generator is a device that sends a signal, called a tone, over a cable. It is paired with another device, called a tone probe, which you place on the ends of cables until it detects the tone, identifying the other end of the cable.

when would you typically use and Rj_11 connector?

When connecting a phone to a phone line.

voltage event recorder

When experiencing intermittent network problems use a voltage event recorder to measure power.

temperature monitor

When experiencing intermittent network problems, use a temperature monitor to ensure proper temperature.

beaconing

When nodes do not receive an expected frame from its upstream it will issue a ___ alarm.

LAN

When several computers are connected in a small geographic area, it is known as a __________.

promiscuous mode

When the NIC processes all the frames it sees on the cable, regardless of their MAC address.

Star Topology

When this topology is used, each computer is individually wired to a central connecting device with twisted-pair cabling.

Service Set Identifier (SSID)

When utilizing infrastructure mode, the base unit (normally a WAP) will be configured with a _____________. This then becomes the name of the wireless network, and it is broadcast over the airwaves.

Radio Frequency Interference (RFI)

When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem?

Device Manager

Where can you go in Windows 7 to access the Properties of a network adapter?

Physical

Which layer deals with the serial transfer of data?

Application

Which layer in the OSI model covers HTTP, FTP, and RDC?

Network

Which layer in the OSI model covers routing between networks?

Data Link

Which layer in the OSI model do MAC addresses and switches use?

Physical

Which layer in the OSI model includes the cable and network adapters?

Transport

Which layer in the OSI model is included in the TCP/IP model?

Network

Which layer in the OSI model is used to verify that data was delivered without error?

Data Link

Which layer of the OSI model includes VLANs?

Session

Which layer of the OSI model is used to create a connection so that a host can transfer files?

Peer-To-Peer

Which model does each host have their own security database?

Client/Server

Which model uses a central database for authentication?

Full Duplex

Which of the following does a switch use for increased performance?

Radio Frequency Interference (RFI) Protection

Which of the following is not a characteristic of 802.11n?

200.23.34.120

Which of the following is not a private address?

Well Known Ports

Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?

UDP

Which protocol do you use as the transport protocol for a video application?

Address Resolution Protocol (ARP)

Which protocol is used to translate IP addresses to MAC addresses?

Mesh

Which topology is the most redundant and the most expensive?

Wi-Fi

Wireless Fidelity Network The most widely adopted wireless networking type in use today. Technically, only wireless devices that conform to the extended versions of the 802.11 standard—802.11a, 802.11b, and 802.11g—are Wi-Fi certified.

Explain WPA.

Wireless network encryption that 128-bit encryption and TKIP Also features EAP

Explain WPA2.

Wireless network encryption that improves upon the security of WPA by using AES instead of TKIP. Supports 128-bit, 192-bit, and 256-bit

Explain WEP.

Wireless network encryption that uses 64-bit or 128-bit encryption key to scramble data packets

WWW

World wide web A vast network of servers throughout the world that provide access to voice, text, video, and data files

Encapsulate

Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer

APIPA

You are trouble shooting a computer that cannot obtain the proper IP address from a DHCP server. When you run an ipconfig/all, you see that the computer has obtained the address 169.254.67.110 automatically. What has auto assigned an IP address the the computer?

Piggybacking ACKs

You can put an ACK on a data frame to improve efficiency.

Faraday Cage

You could also use electromagnetic shielding on devices that might be emanating an electromagnetic field. This could be done on a small scale by shielding the single device, or on a larger scale by shielding an entire room, perhaps a server room. This would be an example of a ____________.

The hose cannot find a DHCP server

You have a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of 169.32.54.2. What is the problem?

Class B

You have a host with the address of 180.24.45.120. To what class would this address be assigned?

Network Documentation

You have a key network administrator leave a company. Therefore, what does the company depend on to continue to use the network?

Protocol Analyzer

You have been instructed to capture and analyze packets on a server. What tool will allow you to do this?

VLAN

You have been instructed to connect a computer to a group of hosts that have been segmented from the regular network. What kind of network is this?

Subnetting

You have installed a device that has two IP addresses. One address, 64.51.216.27, is displayed to the Internet. The other address, 192.168.50.254, communicates with the LAN. What type of technology have you implemented?

Ipconfig

You have just installed a network adapter and configured an IP address and subnet mask. What command can you use to verify that the IP address is configured and listed properly?

Wireless Bridge

You need to connect 802.11a, 802.11b, and 802.11n wireless networks together. What wireless tool will guarantee connectivity between these networks?

100 Mbps

You need to connect a computer at a rate of 100,000,000 bits per second. What speed network adapter should you install?

Full Duplex

You need to connect a computer's network adapter to a switch. You want the connection to be able to send and receive data simultaneously. What type of connection do you need?

Punch-Down Tool

You need to connect a twisted-pair cable to the back of a patch panel. What tool should you use?

Netstat -an

You need to find out the Internet connections a particular computer has made in the recent past. You also need to see numeric information so that you know the IP address and port numbers of the destination computers. You should type the ___________ in the command prompt.

Ipconfig/all

You need to find out the MAC address of your director's computer. He has given you permission to access his computer. You access the command prompt. What command should you type to see the computer's MAC address?

Arp -a

You need to find out the MAC addresses of all the computers that a particular user's computer has connected to in the recent past. What command should you use to accomplish this?

RJ45

You need to install a network adapter to a computer so that it can be connected to a network that uses twisted-pair cabling. What type of port does the network adapter need to use?

Network

You need to install a router on your company's network that will allow access to the Internet. What layer of the OSI does this device reside on?

Ping loopback

You need to ping your own computer to see if it is alive. Which of the following would qualify as command-line syntax to do so?

Layer 4 (Transport Layer)

You run a netstat -an command in the command prompt and notice many connections being made that say TCP in the left-most column. What layer of the OSI is TCP referring to?

Layer 2 (Data Link Layer)

You suspect a problem with your computer's network adapter and its ability to send the correct frames of data that correspond with the network architecture used by the rest of your computers. What layer should you attempt to use as a troubleshooting starting point?

In which of the following situations might you use an RJ-11 connector?

You want to connect your computer to the internet with a dial-up connection

Class A

Your boss wants you to set up three computers on a classful network with a default subnet mase of 255.0.0.0. What class does he want the computers to be set up on?

Class B

Your client requires that you nstall 284 computers on a single IP network. Which IP class would be your best option?

53

Your company hosts a DNS server that resolves domain names to IP addresses. This server must have port ___________ open to service those requests for name resolutions.

80 & 443

Your manager wants you to allow HTTP and HTTPS connections to the company web server. In order to do this , you need to open inbound ports __________ and ___________.

Private

__________ IP address are hidden from the Internet and any other networks.

Public

_____________ IP addresses are ones that are exposed to the internet; any other computers on the internet can potentially communicate with them.

fiber-optic cable

a cable that contains a glass or plastic center used to carry light

protocol suite

a combination of individual protocols each designed for specific purposes

standby monitor

a computer on a token ring network that can become an active monitor if the active monitor fails or logs off the network

Local Area Network

a group of computers confined to a small geographic area, usually one building.

Subnet Mask

a group of four numbers that define what IP network the computer is a member of.

Virtual Lan/VLAN

a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.

media access control (MAC) address

a hexadecimal number programmed into the Network card's chip. It is different on every card produced..

Multistation Access Unit

a hub-like device that physically connects computers in a star arrangement while maintaining a ring structure

wide area network (WAN)

a large number of computers spread over a wide geographical area and under the control of a centrally located administrator

hybrid topology

a mixture od star, bus, and ring topologies

Wireless LAN (WLAN)

a network composed of at least one WAP and at least one computer or handheld device that can connect to the WAP.

switching hub

a network device that determines wheter a signal should remain in the isolated section of the network or be passed through the device to other parts of the network

Ethernet Network

a network that communicates by broadcasting information to all computers on the network

star topology

a network topology in which a cable runs from each computer to a single central point

ring topology

a network topology in which a single cable runs continuously from computer to computer

bus topology

a network topology in which a single conductor connects all the computers on a network

mesh topology

a network topology in which each node connects directly to every other node on the network.

wireless topology

a network topology that uses no cabling sytem between the computers, but rather uses infrared light or radio transmission to communicate between network devices

client/server model

a networking model in which the network is made up of computers that are either clients or servers

Link-Layer Discovery Protocol

a protocol that identifies devices connected to the LAN and allows them to automatically exchange information

Link-Layer Multicast Name Resolution

a protocol that serves the same function of a DNS server when a DNS server cannot be reached. It resolves names of devices connected collectively on a local network

segment

a section of cable between two network devices

Ethernet

a set of rules that govern the transmission of data between network adapters and various central connecting devices.

access method

a set of rules used by LAN hardware to direct traffic on the network. it determines which host or device uses the LAN next

token

a short binary code generated by network software that is passed along from one computer to the next along a ring topology (and some bus technologies)

local area network (LAN)

a small network of computers contained in a relatively small area, such as an office building

Perimeter Network/Demilitarized Zone

a small network that is set up separately from a company's private LAN and the Internet.

AppleTalk

a suite of protocols developed to support Macintosh computers when configured as a network. Uses CSMA/CA as its access method

netsh

a tool that administrators can use to configure and monitor Windows computers from the command prompt.

Media Access Control (MAC) address

a unique identifier assigned to network adapters by the manufacturer. This address is six octets in length and is written in hexadecimal.

Administrator

a user account that has unlimited privileges to resources and objects managed by a server or domain. The administrator account is created during NOS installation.

Cisco Discovery Protocol

a variation of Link-Layer Discovery Protocol designed to support Cisco equipment such as routers, switches, and telephones

Which of the following i a valid MAC address?

ab.07.cf.62.16.bd

passive hub

acts as a connection point in a star topology. Signals transmitted from one computer are passed to all connected computers

Wireless Access Point (WAP)

acts as the central connecting device for the network.

Which of the following is a characteristic of static routing when compared to dynamic routing?

all routes must be manually updated on the router

Wireless Network Adapters

allow for connectivity between a desktop computer or laptop and the wireless access pint.

station address

an IPX/SPX-based address that consists only of a network number and node address

Client Server

an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7.

Link-Layer Discovery Protocol-Media Endpoint Discovery

an enhanced version of LLDP used for routers, switchs, VoIP devices, and Power Over Ethernet (PoE) devices

wireless

antennas, electromagnetic waves

node

any device connected to a client-server network

Network documentation

any information that helps describe, define, and otherwise explain how computers are connected in a physical and logical way.

Interference

anything that disrupts or modifies a signal that is traveling along a wire.

sequence number

attached to each packet of data transmitted ensuring that the data will be reassembled in the exact order it was transmitted

BOGB Colors

blue, orange, green and brown.

Which of the following topologies connects all devices to a trunk cable?

bus

Which of the following cable types often includes a solid plastic core?

cat 6

You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type? Classful public multicast broadcast classless

classless

Which of the following is valid Mac address

co.36.ff.15.01.8E

What is not a reason to use subnets on a network?

combine different media type on the same subnet

Which of the following tasks is associated with the session layer?

connection establishment

the UDP transport protocol provides which of the following features?

connectionless datagram services low overhead

Hub

connects each of the networked computers, known as hosts, to one another by way of copper-based cables.

network interface card (NIC)

connects the network communication media, usually twisted pair copper, to the individual network devices, such as workstations, file servers, and printers

coaxial cable

consists of a core conductor surrounded by an insulator

which two of the following are included as part of Data link layer specifications?

controlling how messages are propagated through the network Identifying physical network devices.

You have a network configured to use the OSPF routers have learned about all other routes in the network?

convergence

What is the basic purpose of the OSI physical layer?

coordinates rules for transmitting bits.

You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

crossover

You want to connect the LAN port on a router to the uplin port on a switch. The switch does not support auto-MDI. Which type of cable should you use?

crosssover

Two layers that have both header and trailer

data link and physical

IP Address

defines the computer you are working on/the computer you are working on's logical address.

Unicast

describes the situation in which information is sent to one host only.

Layer 3 Switch

determines paths for data using logical addressing (IP addresses) instead of physical addressing (MAC addresses).

Network Adapter/Network Interface Card (NIC)

device that enables you to send and receive data to and from your computer.

hub

device used to provide a quick and easy method of connecting network equipment together by cables

Repeater

device used to regenerate a signal

Peer-to-peer Networking

each computer is treated as an equal and means each computer has an equal ability to serve data and to access data, just like any other computer on the network.

Mesh Topology

every computer connects to every other computer; no central connecting device is needed.

568A wiring configuration

green stripe green orange stripe blue blue stripe orange brown stripe brown

Twisted Pair Cables

has eight wires; they are copper conductors that transmit electric signals. These eight wires are grouped into four pairs: blue, orange, green, and brown.

Open Systems Interconnection (OSI)

helps network engineers, network administrators, and systems engineers define how data networking actually works from one computer to another, regardless of where the computer is or what software it runs.

ring polling

in a token ring network, the process conducted by the active monitor to identify if a computer has logged on or off the ring

ring purge

in a token ring network, the process of removing a defective token and replacing it with a new token

monitor contention

in a token ring network, the process of selecting an active monitor

Physical Layer

includes but is not limited to cables, jacks, patch panels, punch blocks, hubs, and MAUs.

client

individual PC or workstation that accesses a server's resources and shared files

MDI-X

instead of using crossover cables to connect computers to central connecting devices such as switches, these central connecting devices are equipped with _______ ports, which take care of the cross.

Address Resolution Protocol/ARP Table

layer 3 protocol that resolves or translates IP addresses to MAC addresses, allowing connectivity between the layer 3 IP system and the layer 2 Ethernet system.

fiber optic

light pulses

LAN

local area network

You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?

manually reconfigure the default route to point to the new next hop router

Maximum Sequence number

maxseq = 2^n - 1

Full Duplex

means that the network card can send and receive data simultaneously.

You have a server that has a 100baseFx network interface card that youneed to connect to a switch. The switch only has 100BaseTX switch ports.

media converter

MDI-X

medium dependent interface crossover

MDI Port

medium dependent interface.

You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network.

mesh

peer-to-peer network

network administration model in which all PCs connected together are considered equal

twisted pair cable

network cabling made up of four pairs of conductors twisted around each other

active hub

network device that has power connected to it. It regenerates any signal that is received.

Data Transfer Rate

network speed or bit rate/the maximum bits per second that can be transmitted over a network.

peer to peer dis

not flexible, not necessarily secure, not practical for large instructions

IP conflict

occur when two computers are configured with the same IP address.

Ad-hoc/P2P Mode

occurs when all of the clients communicate directly with each other. There is no base or wireless access point.

Near End Crosstalk (NEXT)

occurs when there is measured interference between two pairs in a single cable, measured on the cable end nearest the transmitter.

Far End Crosstalk (FEXT)

occurs when there is similar interference, measured at the cable end farthest from the transmitter.

568B wiring configuration

orange stripe orange green stripe blue blue stripe green brown stripe brown

backoff interval

period of time two network stations wait before trying to retransmit data after data packets from the two stations collide.

What topology is used with 100BaseTX Fast Ethernet networks? select 2 physical ring/logical star physical star/logical bus physical star/logical ring physical star/logical star

physical star/logical bus physical star/logical star

Internet Control Message Protocol (ICMP)

ping utilizes this to send test packets to other computers; this is also a network layer protocol.

IEEE 802.1X

port based network access control (PNAC)

server

powerful computer used to manage network resources and provide services such as security and file sharing

Carrier Sense Multiple access with Collision Detection (CSMA/CD)

protocol used by ethernet networks to control and insure the delivery of data

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

protocol used by wireless networks to control and insure the delivery of data

Port Based Network Access Control (PNAC)

provides strong authentication to devices that need to connect to the WLAN; it can also be used for regular wired LANs.

reassembly

reconstructing segmented data units

NetBIOS name server

resolves NetBIOS computer names to IP v4 addresses

What topology does each device on the network act as a repeater, sending the signal to the next device?

ring

Which of the following hardware devices links multiple networks and directs traffic between networks?

router

In the OSI model, what is the primary function of the Network layer?

routes messages between the networks

802.1

routing, internet working standard, within network

Which of the following connectors is typically used on one end of a rollover cable? ST SC F-Type Serial BNC

serial

dedicated server

server with special functions, such as file servers, print servers, database servers, web page servers, and/or administrative servers

open system interconnect (OSI)

seven-layer reference model that describes how hardware and software should work together to form a network communication system

Wireless Bridge

similar to a wireless repeater, but the bridge can connect different 802.11 standards together; this is know as bridge mode.

peer to peer adv

simple configuration, less expensive

You would like to implement 10Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for the implementations? select 2 single mode fiber 10GBaseLR standards multimode fiber 10GBaseER standards 10GBaseSR standards

single mode fiber 10GBaseLR standards

Of the following cables, which offer the best protection against EMI? CAT 5 CAT-6 CAT-5e Single mode fiber optic

single mode fiber optic

802.11a

slow wireless standard A wireless networking standard that operates at 5.75GHz, throughput of 54Mbps, and a maximum distance of 150 feet. - 23 Channels

packet

small unit of data into which larger amounts of data are divided so they can pass efficiently through a network

In the OSI model, which of the following functions are performed at the Presentation layer?

specify data format (such as file formats) Encrypt and compress data

Universal Naming Convention

standard naming convention that uses the form \\servername\sharename

What topology connects each network device to a central hub?

star

you have a small network that uses a hub to connect multiple devices. What physical topology is used?

star

You need to connect a workstation to a switch using a regular port on the switch (not an up link port). The switch does not support auto-MDI. Which type of cable should you use? Loopback straight-through crossover rollover

straight-through

What device is used to create a physical star topology?

switch

Which three of the following devices operate at the Data Link layer of the OSI model? select 3 routers switches NIC bridges repeaters hubs

switches NIC Bridges

Content Addressable Memory or (CAM) Table

switches have memory that is set aside to store the MAC address to port translation table, known as the ___________.

Continuity Tester

tests all of the pins of a connection one by one.

DNS server address

the IP address of the device or server that resolves DNS addresses to IP addresses.

segmenting

the act of dividing a network into smaller sections to avaoid collisions

command syntax

the correct manner and arrangement in which a command must be typed to be recognized by the operating system

Broadcast

the data is sent to every host on the network.

Which of the following are characteristics of coaxial cable?

the ends of the cable must be terminated it has conductor made from copper in the center of the cable. It uses two concentric metallic conductors.

Communications Subnetwork

the guts of OSI model transmissions, consisting of layers 1 through 3. Regardless of what type of data transmission occurs in a computer network, the ____________ will be employed.

Straight Through Cable

the most common type of patch cable, and it is the type that you would use to connect a computer to a central connecting device like a switch. The wires on each end of the cable are oriented in the same way.

Layer 2 Switch

the most common type of switch used on a LAN.

Internet Protocol Version 4 (IPv4)

the most frequently used communications protocol.

topology

the physical arrangement of hardware and cabling in a network system

Network Topology

the physical connections of hosts in a computer network.

query

the process of locating and extracting data from a database system

Frame Aggregation

the sending of two or more frames of data in a single transmission.

Attenuation

the signal degrades to such a point that it cannot be interpreted by the destination host.

command prompt

the symbol given, such as C:\>, if the computer is waiting for typed input from the user

Serial Data Transfer

the transfer of one bit at a time or transfer in a single bit stream.

BNC - Bayonet Neil-Concelman

the type of connector used with coaxial cable

Segments/Messages

the unit of measurement used in the Transport Layer.

Frames

the unit of measurement used on the Data link layer.

Packets

the unit of measurements used on the Network Layer.

Plenum-rated

these cables have Teflon coating that makes them more impervious to fire.

Port Range 49,152-65,535

these ports can be used by applications, but they cannot be registered by vendors. Dynamic and private ports.

Transport Layer

this layer ensures error-free transmission between hosts through logical addressing. Therefore, it manages the transmission of messages through layers 1 through 3.

Data link layer (DLL)

this layer establishes, maintains, and decides how transfer is accomplished over the physical layer.

Network layer

this layer is dedicated to routing and switching information to different networks, LANs, or internetworks.

Application Layer

this layer is where message creation-and, therefore packet creation begins. DB access is on this level. End-user protocols such as FTP, SMTP, Telnet, and RAS work at this layer.

Presentation Layer

this layer translates the data format from sender to receiver in the various OSes that may be used.

Content Addressable Memory or (CAM) Table

this table can be compromised with a MAC Flood attack.

NetBios (Network Basic Input Output System)

this works on the Session Layer of the computer.

Fiber Optic Cable

transmits light (photons) instead of electricity, and this light is transmitted over glass or plastic.

Which OSI model layer is responsible for guaranteeing reliable message delivery

transport

network

two or more computers connected together for the purpose of sharing data and resources

Bits

unit of measurement used on the Physical Layer.

Server

used to centralize data and share it with other computers on the network.

Crossover Cable

used to connect like devices to each other, for example, a computer to another computer, or a switch to another switch.

Wireless Repeater

used to extend the coverage of a wireless network.

How is crossover cable made?

using only 4 wires - 1,2,3, and 6 Wires 1 and 2 (transmit) from one end of the cable are switched to the recieve wire placeholders (wires 3 and 6) at the other end of the cable.

How do switches and bridges learn where devices are located on a network?

when a frame enters a port, the source MAC address is copied from the frame header.

cross talk

when a signal crosses from one set of wires to another set that runs directly alongside of it

Crosstalk

when the signal that is transmitted on one copper wire or pair of wires creates an undesired effect on another wire or pair of wires.

WAN

wide area network

Server

windows 2000, lenix, OsX, Unix Solaris, IBM etc. "Role" that the computer plays. A single computer that provides extensive multiuser access to network resources

Fiber

you are setting up a network within a warehouse using Category 6 UTP. however, parts of the network are down because of the heavy machinery used. What cable type should you use?


Set pelajaran terkait

Piping T/F, CM 2112 FRIEDLAND VALVE PRACTICE QUIZ

View Set

the phases of intervention and treatment pg 182-193

View Set

Chapter 9 Review & Lab Questions

View Set

AAI 81 Foundations of Insurance Production (Segment C)

View Set

Other Services of Financial Institutions

View Set

Chapter 1: Review of Probability

View Set

ATI Fundamental Practice Questions

View Set

WACC and Optimal Capital Structure

View Set

Land Use Controls and Regulations

View Set

Simple, Complete, and Compound Predicates

View Set