Annex A final study guide

Ace your homework & exams now with Quizwiz!

What security solutions are most likely to only be used in a corporate environment?

* Antivirus and Antispyware * Firewall Filtering * Dedicated Firewall Systems * Access Control Lists (ACL) * Intrusion Prevention Systems (IPS) * Virtual Private Networks (VPN)

What are characteristics of multicast transmission?

*A single packet can be sent to a group of hosts. *Multicast transmission can be used by routers to exchange routing information. *Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255

What are characteristics of fiber-optic cable?

*Core: Pure Glass *Cladding: Mirror *Jacket: protects the core and cladding

What are two characteristics of peer-to-peer networks? (Choose two.)

*Decentralized Resources *Resource sharing without a dedicated server

What items are contained in an Ethernet header and trailer?

*Inside the Header: MAC Address *Inside the Trailer: CRC (Cyclic Redundancy Check)

What services are provided by the OSI network layer?

*routing packets toward the destination *encapsulating PDUs from the transport layer

You notice that the network throughput appears lower than the bandwidth expected. Which factors could influence the differences in throughput?

*the amount of traffic that is currently crossing the network *the type of traffic that is crossing the network *the latency that is created by the number of network devices that the data is crossing

What are ways that TCP uses the sequence numbers in a segment?

*to identify missing segments at the destination *to reassemble the segments at the remote location

What would be an example of a top-level domain?

.com

If you must provide for 126 hosts. Which subnet mask would be used?

/25

What is the dotted decimal representation of the IPv4 address which is represented in binary string of 00001010.01100100.00010101.00000001?

10.100.21.1

What IPv4 address is a loopback address that can be pinged to test the local TCP/IP configuration?

127.0.0.1

What is the dotted decimal representation of the IPv4 address 11001011.10101001.01110001.11010011?

203.169.113.211

What method is used to manage contention-based access on a wireless network?

CSMA/CA

What data link layer media access control method does Ethernet use?

Contention based access or CSMA/CD

What protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?

DNS

What are the functions of the data link layer?

Exchange of frames between nodes, allows upper layers access to media, and controls how data is placed and received on the media

What tasks are functions of the presentation layer?

Formatting, Compressing, and Encrypting data

What scenario describes a function provided by the transport layer?

Having two separate web browsers and pages open and traffic getting directed to the correct place

What is a characteristic of the LLC sublayer?

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media

What addresses are mapped by ARP?

MAC address to an IP address

What are the benefits of using cloud computing in networking?

Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.

What tool can be implemented in a small network to help minimize network latency for real-time streaming applications?

QoS quality of service

What type of attack may involve the use of tools such as nslookup and fping?

Reconnaissance attack

What frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

Store-and-forward

What utility is available on a Windows PC to view current running applications and processes?

Task manager

A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?

The address is returned to the pool for reuse when the lease expires.

Describe variable-length subnet masking?

The size of each subnet may be different, depending on requirements

What is stored in the NVRAM of a Cisco router?

The start up config

Describe port numbers?

Way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server

What things can be determined when given an IP address and subnet mask of an attached network device?

Whether it is a Network, Host, or Broadcast address

What is a characteristic of a fault tolerant network?

a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure

What is a characteristic of UTP cabling?

cancellation

Networks change the way we do what?

communicate

What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

discard the Frame

You would like to determine the path a packet takes to reach the destination 192.168.1.1. What is the best command to determine the network path?

ipconfig 192.168.1.1

What command would help lessen brute-force password attacks against the router?

login block-for 60 attempts 5 within 60

What are examples of malicious code that could be classified as a Trojan horse?

malware that was written to look like a video game

A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

nslookup

What topology provides high availability and connects some, but not all, remote sites?

partial mesh

In what type of network do devices operate as both clients and servers?

peer to peer

What applications or services allow hosts to act as client and server at the same time?

peer-to-peer

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

physical layer

What type of attack involves the unauthorized discovery and mapping of network systems and services?

reconnaissance attack

What is a key characteristic of the peer-to-peer networking model?

resource sharing without a dedicated server

What type of physical topology can be created by connecting all Ethernet cables to a central device?

star topology

A user opens three browsers on the same PC to access www.cisco.com to search for certification course information. The Cisco web server sends a datagram as a reply to the request from one of the web browsers. Which information is used by the TCP/IP protocol stack in the PC to identify which of the three web browsers should receive the reply?

the destination port number

What are functions of NVRAM?

to retain contents when power is removed, and to store the startup configuration file

A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What types of network services is the network administrator trying to accommodate?

voice and video


Related study sets

Technology Support Chapter 5 Study Guide

View Set

Chapter 11: Public Speaking Preparation

View Set

Intro to business. How to form a business

View Set

HB1: Cellular Function and Medical Genetics

View Set

Section 2.2.1 - Identification, and Authentication

View Set

Laboratory Management - Financial Management

View Set

Understanding Business: Chapter 5

View Set