C172 - Network and Security Foundations
The ________ on a switch is the length of time a MAC address remains assigned to a port.
Aging time
Full IPv6 Address
All 32 hexadecimal positions contain a value other than 0.
C. All of these support
Which of the following does not support a NIC device? A. PC Card B. USB C. All of these support D. Expansion Card
sm
Single mode.
NCP
Network Control Protocol
Wire-map
A graphical or text description of the wire connections from pin to pin.
Token Ring Hub
A hub that manages the passing of the token in a token ring network.
Index-matching Gel
A jellylike substance that has an index of refraction much closer to glass than to air.
B. Cause the cable to not be certified C. Can be due to inconsistent twists D. Be due to poor manufacturing
A length difference in wire pairs for UTP can ________. (Choose all that apply) A. Cause the cable to be certified B. Cause the cable to not be certified C. Can be due to inconsistent twists D. Be due to poor manufacturing
Packet Filtering
A limit is placed on the information that can enter the network.
Hotspots
A limited geographic area that provides wireless access for the public.
B. The link integrity test is operational
A lit link light indicated that A. Link pulses are being shared by all devices in the LAN B. The link integrity test is operational C. All of these answers are correct D. A 100 Mbps data link has been established E. A 10 Mbps data link has been established
Fusion Splicing
A long-term method where two fibers are fused or welded together.
Cisco Network Assistant (CNA)
A management software tool from Cisco that simplifies switch configuration and troubleshooting.
Numerical Aperture
A measure of a fiber's ability to accept light.
Near-end Crosstalk (NEXT)
A measure of the level of crosstalk or signal coupling within the cable, with a high NEXT (dB) value being desirable.
Cable Modem
A modem that can use the high bandwidth of a cable television system to deliver high-speed data to and from the service provider.
Distributed Feedback (DFB) Laser
A more stable laser suitable for use in DWDM systems.
ARP Reply
A network protocol where the MAC address is returned.
IP Internetwork
A network that uses IP addressing for identifying devices connected to the network.
Token Ring Topology
A network topology configured in a logical ring that complements the token passing protocol.
Bridge
A networking device that uses the MAC address to forward data and interconnect two LANs.
Virus
A piece of malicious computer code that, when opened, can damage your hardware, software, or other files.
Link Light
Indicates that the transmit and receive pairs are properly aligned.
ISM
Industrial, scientific, and medical.
Spoof
Inserting a different IP address in place of an IP packet's source address to make it appear that the packet came from another network.
IEEE
Institute of Electrical and Electronics Engineers, one of the major standards-setting bodies for technological development.
Application Layer
Interacts with application programs that incorporate a communication component such as your internet browser and email.
IC
Interconnect fibers branch exchange-item D shows the jumpers connecting the main fiber cross-connect (item B) to the active equipment (item C).
Transparent Bridge
Interconnects two LANs running the same type of protocol.
IDC
Intermediate distribution closet.
ICMP
Internet Control Message Protocol.
IGMP
Internet Group Message Protocol
IKE
Internet Key Exchange
ISAKMP
Internet Security Association and Key Management Protocol
ISP
Internet service provider.
Anycast Address
Is obtained from a list of addresses.
netstat -a -b
(a) Command used to display the ports currently open on a Windows operating system and (b) used to display the executable involved in creating the connection or listening port.
Port Address Translation (PAT)
A port number is tracked with the client computer's private address when translating to a public address.
Gigabit ethernet
1000Mbps ethernet
10 Gbps over twisted-pair copper cable
10GBASE-T
The maximum data rate of 802.11b, 802.11a, 802.11g, and 802.11n are _______Mbps, ________Mbps, ________Mbps, and _______Mbps respectively.
11, 54, 54, 600
The IPv4 address 192.168.12.5 can be expressed inIPv6 form using dotted decimal as__________.
::192.168.12.5
Transceiver
A transmit/receive unit.
Access Control Lists (ACLs)
A basic form of firewall protection
WiMAX
A broadband wireless system based on the IEEE 802.16e standard.
Console Cable
A cable that connects a router's console port to a computer's serial port.
Campus Network
A collection of two or more interconnected LANs in a limited geographic area.
Event
A disturbance in the light propagating down a fiber span that results in a disturbance on the OTDR trace.
Multimode Fiber
A fiber that supports many optical waveguide modes.
True
A full channel test tests all the link elements from the computer through the patch panel to the wall plate. (True/False)
90
A general rule of thumb is to allow _________ meters for the cable run from the telecommunications closet to the work area.
False
A protocol defines the network architecture used to interconnect the network equipment. True/False
Entrance Facilities (EF)
A room set aside for complex electronic equipment.
Denial of Service (DoS)
A service is being denied to a computer, network, or server.
Fiber Bragg Grating
A short strand of modified fiber that changes the index of refraction and minimizes intersymbol interference.
Network Congestion
A slowdown on network data traffic movement.
Cross-connect
A space where you are going to take one or multiple cables and connect them to one or more cables or equipment.
MIMO
A space-division multiplexing technique where the data stream is split into multiple parts called spatial streams.
Content Addressable Memory (CAM)
A table of MAC addresses and port mapping used by the switch to identify connected networking devices.
Packet Sniffing
A technique in which the contents of data packets are watched.
6to4 Prefix
A technique that enables IPv6 hosts to communicate over the IPv4 Internet.
Radio Frequency Identification (RFID)
A technique that uses radio waves to track and identify people, animals, objects, and shipments.
Token Passing
A technique where an electrical token circulates around a network a network-control of the token enables the user to gain access to the network.
Access Point
A transceiver used to interconnect a wireless and a wired LAN.
ThinNet
A type of coaxial cable used to connect LANs configured with a bus topology.
Worm
A type of virus that attacks computers, typically proliferates by itself, and can deny service to networks.
MAC Address
A unique 6-byte address assigned by the vendor of the network interface card.
Social Engineering
A way for an intruder to obtain enough information from people to gain access to the network.
Slotted Aloha
A wireless network communications protocol technique similar to the Ethernet protocol.
Gateway
Describes the networking device that enables hosts in a LAN to connect to networks (and hosts) outside the LAN.
Which of the following is not an advantage of using optical communications? A. All of these are advantages B. Wide bandwidth C. Lower attenuation D. Immune to EMI E. Safety
A. All of these are advantages
WiMAX operates at which frequencies in the US? A. Both the unlicensed 5.8GHz and the licensed 2.5GHz B. Both the unlicensed 5.2GHz and the licensed 2.4GHz C. Both the unlicensed 5.3GHz and the licensed 2.6GHz D. Both the unlicensed 13.2GHz and the licensed 5.6GHz
A. Both the unlicensed 5.8GHz and the licensed 2.5GHz
Which of the following is not a type of bridge? A. Bridged B. Wireless C. Translation D. Transparent
A. Bridged
802.11u standard increases security by requiring user authentication. True/False
False
The fast link pulse does which of the following? (Select all that apply) A. Carries the configuration information between each end of the data link B. Is used in auto-negotiation C. Uses a 100Mbps data rate D. Uses a 1Mbps data rate
A. Carries the configuration information between each end of the data link B. Is used in auto-negotiation
Site surveys obtain the following information. (Choose all that apply) A. Connection points to the main network B. Supported bandwidths. C. Electrical power D. RF coverage
A. Connection points to the main network B. Supported bandwidths. C. Electrical power D. RF coverage
How does a switch decrease network traffic? (Choose all that apply) A. Doesn't forward ARP replies to all ports B. Forwards all data directly to the destination C. Ignore MAC addresses in the data packets D. Traffic is not isolated to any port when possible
A. Doesn't forward ARP replies to all ports B. Forwards all data directly to the destination
A logical fiber map shows _________. (Choose all that apply) A. Fiber interconnections B. Routing of the fiber C. None of them D. Data distribution
A. Fiber interconnections D. Data distribution
Which of the following is not an advantage of auto-negotiation? (Choose all that apply) A. Not recommended for fixed data links B. Can maximize throughput C. A failed negotiation can cause a link failure D. Useful in LANs with multiple connection capabilities
A. Not recommended for fixed data links C. A failed negotiation can cause a link failure
The connection to the router's console input is typically which of the following? (Select two) A. RS-232 B. RJ-45 C. DB9 D. RJ-11
A. RS-232 B. RJ-45
The physical connection where a router connects to the network is called the A. Router interface B. Network interface C. Network port D. Router port
A. Router interface
A web filter appliance only lets you see what traffic is flowing to the web. True/False
False
This interface is used to create a T1 connection. A. Serial interface B. FastEthernet Port C. Console input D. WAN interface card
A. Serial interface
Buffer overflows can allow an attacker to do which of the following? (Choose all that apply) A. Set up a backdoor B. Crash applications C. Prevent denial-of-service attacks D. Place viruses
A. Set up a backdoor B. Crash applications D. Place viruses
Which of the following is an advantage of auto-negotiation? (Select all that apply) A. Simplifies the LAN configuration B. Simplifies the backbone configuration C. Can maximize the data link throughput D. Is useful in LANs that have multiple users with multiple connection capabilities E. All of the answers are correct
A. Simplifies the LAN configuration C. Can maximize the data link throughput D. Is useful in LANs that have multiple users with multiple connection capabilities
Which of the following is an advantage for using wireless networking? (Choose all that apply) A. User mobility B. More expensive C. Secure D. Flexible
A. User mobility D. Flexible
The network administrator wants to verify the network connection at 10.10.20.5. Which of the following commands can be used to verify the connection? A. ping 10.10.20.5 B. ping all 10.10.20.5 C. ping -2 10.10.20.5 D. ping -t 10.10.20.5
A. ping 10.10.20.5 D. ping -t 10.10.20.5
RX
Abbreviation for receive.
TX
Abbreviation for transmit
Network Layer
Accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information.
Deterministic
Access to the network is provided at fixed time intervals.
ACK
Acknowledgement packet
Dispersion Compensating Fiber
Acts like an equalizer, canceling dispersion effects and yielding close to zero dispersion in the 1550-mm region.
ARP
Address Resolution Protocol, used to map an IP address to its MAC address.
AES
Advanced Encryption Standard
ARPAnet
Advanced Research Projects Agency network.
Mesh Topology
All networking devices are directly connected to each other.
Supernetting
Allows multiple networks to be specified by one subnet mask.
Uplink Port
Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable.
Managed Switch
Allows the network administrator to monitor, configure, and manage select network features.
Workstation or Work Area Outlet (WO)
Also called the TO ( telecommunications outlet), it's used to connect devices to the cable plant. The cable type typically used is CAT3, CAT5, CAT5e, CAT6, CAT6a, and various coaxial cables. Devices typically connected to these outlets are PCs, printers, servers, phones, televisions, and wireless access points.
Intermediate Cross-connect (IC)
Also called the building distributor (BD), this is the building's connection point to the campus backbone. The IC links the MC to the horizontal cross-connect (HC).
ARIN
American Registry for Internet Numbers.
FastEthernet
An Ethernet system operating at 100Mbps.
IP Tunnel
An IP packet encapsulated in another IP packet.
Piconet
An ad hoc network of up to eight Bluetooth devices.
Layer 2 Switch
An improved network technology that provided a direct data connection for network devices in a LAN.
Isolator
An inline passive device that allows optical power to flow only in one direction.
Intranet
An internal network that provides file and resource sharing but is not accessed from the Internet.
Multiport Repeater
Another name for a hub.
Multiport Bridge
Another name for a layer 2 switch.
ARP Table
Another name for the ARP cache.
Network Address
Another name for the layer 3 address.
TR
Another name for the telecommunications closet
Prefix length notation
Another shorthand technique for writing the subnet mask except class boundaries are not being crossed.
Bottlenecking
Another term for network congestion.
Ad Hoc
Another term used to describe an independent network.
Broadcast Domain
Any network broadcast sent over the network will be seen by all networking devices in this domain.
Topology
Architecture of a network.
Brute Force Attack
Attacker uses every possible combination of characters for the password.
A. Resistance B. Leakage
Attenuation in a twisted-pair cable is caused by ________. A. Resistance B. Leakage C. Scattering D. Insertion loss
AH
Authentication Header
Single mode fiber typically used what wavelengths? (Choose all that apply) A. 1600 nm B. 1310 nm C. 850 nm D. 1550 nm
B. 1310 nm D. 1550 nm
What is the subnet address for a packet that is sent to 174.118.17.95 with a subnet mask of 255.255.248.0? A. 174.118.32.0 B. 174.118.16.0 C. 174.118.16.80 D. 174.118.0.0
B. 174.118.16.0
Given a network IP address of 172.16.0.0 and a subnet mask 255.255.192.0 how many subnets are in this network? A. 8 B. 4 C. 2 D. 16
B. 4
The IP address 192.168.20.5 is an example of what? (Select all that apply) A. Class A IP address B. A private IP address C. Class C IP address D. Class B IP address
B. A private IP address C. Class C IP address
AUI stands for A. Auxiliary Unit Input B. Attachment Unit Interface C. Auxiliary Unit Interface D. Attachment Unit Interconnect
B. Attachment Unit Interface
Which router interfaces are used to connect routers to the network? (Choose all that apply) A. None of them B. Auxiliary C. Ethernet D. Serial
B. Auxiliary C. Ethernet D. Serial
The personal firewall software is typically based on which of the following? A. The 802.11x protocol B. Basic packet filtering inspections C. Using only trusted sites D. Configuring non-stateful firewall protection
B. Basic packet filtering inspections
A wireless network requires a cable connection? True/False
False
An attenuator is used to increase signal strength. True/False?
False
ICMP is used to: (select all that apply) A. None of the answers B. Control the low of data in the networks. C. Report errors D. Perform diagnostics
B. Control the low of data in the networks. C. Report errors D. Perform diagnostics
_________ means that a MAC address was assigned to a port when the device sends a packet. A. None of them B. Dynamic addressing C. Static addressing D. Secure addressing
B. Dynamic addressing
Which of the following are examples of fiber architectures? (Choose all that apply) A. Fiber to the workstation B. Fiber to the home C. Fiber to the curb D. Fiber to the business
B. Fiber to the home C. Fiber to the curb D. Fiber to the business
Bluetooth operates in the 5 GHz band. True/False
False
Fiber optics use light in the visible spectrum. True/False?
False
Which of the following is not a type of dispersion? A. Chromatic B. Light C. Polarization mode D. Modal
B. Light
The network administrator can monitor the network using a _______ switch. A. Powered B. Managed C. Software D. Centralized
B. Managed
Routers use the ______ to route packets. A. Router address B. Network address C. None of them D. MAC address
B. Network address
The range of WiMAX networks is _________. A. 31 km B. None of them C. 31 meters D. 31 feet
B. None of them
Which of the following is not a function of a bridge? A. Only forwards data to the specified port B. None of them C. Isolates the network traffic D. Uses MAC addresses to forward data packets
B. None of them
Routing tables on a router keep track of A. Gateway addresses of LANs B. Routes to use for forwarding data to its destination C. Port assignments D. MAC address assignments
B. Routes to use for forwarding data to its destination
The _______ is used to identify subnets in an IPv6 address. A. V4ADDR B. SLA ID C. Interface ID D. TLA ID
B. SLA ID
The three packets exchanged at the beginning f a TCP connection between two ports are which of the following? A. SYN, SYN, ACK B. SYN, SYN+ACK, ACK C. TCP does not use SYN packets D. SYN, ACK, ACK
B. SYN, SYN+ACK, ACK
The four parts of a fiber optic communications system are ________. A. System, cable, connectors, photodiode B. Source, cable, connectors, photodiode C. Source, cable, splices, photodiode D. Source, cable, splices, data
B. Source, cable, connectors, photodiode
RFID technology has many uses including ________. (Choose all that apply) A. Wired devices B. Tracking shipments C. Border crossings D. Full speed tollbooths
B. Tracking shipments C. Border crossings D. Full speed tollbooths
Isolating the Collision Domains
Breaking the network into segments where a segment is a portion of the network where the data traffic from one part of the network is isolated from the other networking devices.
The _______ is a layer 2 device that is used to interconnect two LANs.
Bridge
BWA
Broadband wireless access.
Hub
Broadcasts the data it received to all devices connected to its ports.
Dispersion
Broadening of a light pulse as it propagates through a fiber strand.
The bit rate of OC-3 is _______. A. 2.4 Gbps B. 622 Mbps C. 155.52 Mbps D. 51,840 Mbps
C. 155.52 Mbps
The port number for SMTP is _______. A. 21 B. 23 C. 25 D. 80 E. 53
C. 25
What is the typical core size of multimode cables? A. 8um B. 59um C. 62.5um D. 65 um
C. 62.5 um
Multimode fiber typically uses what wavelengths? (Choose all that apply) A. 1300 nm B. 1550 nm C. 850 nm D. 1310 nm
C. 850 nm D. 1310 nm
Hubs should never be used with wireless networks. True/False
False
What is the hexadecimal equivalent of 1011? A. F B. A C. B D. 11
C. B
An IPv4 is made up of 4 _______. (Select all that apply) A. Groups B. Bits C. Bytes D. Octets
C. Bytes D. Octets
MIMO uses wave division multiplexing. True/False
False
__________ protocol was developed by Cisco in 1994 and is still being used today. A. IPSec B. L2TP C. GRE D. PPP
C. GRE
The router's routing tables allow the router to A. Keep track of network addresses B. Keep track of MAC addresses C. Keep track of the addresses needed to route data D. Keep track of packets to forward data
C. Keep track of the addresses needed to route data
Which of the following is not a TCP/IP Model layer? A. Application B. Transport C. Network D. Network Interface
C. Network
Site Surveys provide the following: • best location for placing access points • power connection • RF coverage • antenna selection • IP address selection True/False
False
A gateway address defines which of the following? A. All of these answers are correct B. The network links between two LANs C. The networking device that enables hosts a LAN to connect to networks outside the LAN D. The networking device that enables hosts in a LAN to connect to networks inside the LAN
C. The networking device that enables hosts a LAN to connect to networks outside the LAN
Horizontal Cabling
Cabling that extends out from the telecommunications closet into the LAN work area.
Equipment Room (ER)/Backbone Cabling
Cabling that interconnects telecommunication closets in the same building and between buildings.
CSMA/CD
Carrier sense multiple access with collision detection is the Ethernet LAN media-access method.
CSMA/CA
Carrier sense multiple access/collision avoidance.
Fast Link Pulse (FLP)
Carries the configuration information between each end of a data link.
Scattering
Caused by refractive index fluctuations; accounts for 96 percent of attenuation loss.
CHAP
Challenge Handshake Authentication Protocol
The four layers of the TCP/IP model are Application, Network, Internet, Data Link. True/False
False
The private address ranges for usable IP network addresses for Class B are 172.16.0.9 - 172.32.0.0. True/False
False
With Cisco LEAP, the user must provide the correct SSID. True/False
False
Single-mode Fiber
Fiber cables with core diameters of about 7-10 um; light follows a single path.
FTTB
Fiber to the business.
FTTC
Fiber to the curb.
FTTD
Fiber to the desktop.
You have a network ID of 192.168.55.0 and you need to divide it into multiple subnets. You need at least 30 host ID's in each subnet. What is the maximum number of subnets you could have? A. 4 B. 6 C. 1 D. 8
D. 8
FTTH
Fiber to the home.
Bridging Table
List of MAC addresses and port locations for hosts connected to the bridge ports.
True
Single-mode fiber cables have a core diameter of about 8-10 micrometers. True/False?
Attenuation (insertion Loss)
The amount of loss in the signal strength as it propagates down a wire or fiber strand.
EIA/TIA 568-B
The standard that defines the six subsystems of a structured cabling system.
One of the parameters that define RFID system is frequency of operation. True/False
True
Router ports are commonly referred to as interfaces. True/False
True
Routers interconnect LANs. True/False
True
CIDR
Classless interdomain routing.
Proxy Service
Clients go through a proxy to communicate with secure systems.
Ping
Command used to test that a device on the network is reachable.
Full Duplex
Computer system can transmit and receive at the same time.
Full Channel
Consists of all the link elements from the wall plate to the hub or switch.
The _______ part of an optical fiber carries the light.
Core
Fiber to the home fiber typically used what wavelengths? A. 1310 nm B. 1300 nm C. 1550 nm D. 1600 nm
D. 1600 nm
The home IP address for a network is assigned by which of these? A. ARIN, the American Registry for Internet Names B. ARIN, the association of Registered Internet Numbers C. ARNN, the American Registry for Internet Names and Numbers D. ARIN, the American Registry for Internet Numbers
D. ARIN, the American Registry for Internet Numbers
Converting 1 0 1 1 0 1 1 0 1 1 1 1 0 0 0 1 to hexadecimal yields which of the following? A. BAF1 B. AAF1 C. A6F1 D. B6F1 E. None of these
D. B6F1
The maximum length for a multimode fiber optic cable is 2000 meters. True/False?
True
Another name for a switch is A. Multiport router B. Multiport hub C. Multiport repeater D. Multiport bridge
D. Multiport bridge
The subnet mask 255.255.255.0 is applied to the IP address 10.20.35.12. Which subnet is the packet sent to? A. 10.20.35.192 B. 10.0.0.0 C. 10.20.0.0 D. 10.20.35.32 E. None of the answers
D. None of the answers
What is the correct order for the sequence of packets that are sent to set up a virtual TCP connection? A. SYN-ACK, SYN, ACK B. ACK, SYN-ACK, SYN C. SYN, ACK, SYN-ACK D. SYN, SYN-ACK, ACK
D. SYN, SYN-ACK, ACK
In regards to IPv6, the SLA ID is what? A. It replaces the IP address in IPv6 and is 128 bits in length. B. It replaces the MAC address in IPv6 and us 32 bits long. C. The is the site-level aggregation ID and 128 bits in length and replaces the 32 bit IPv4 address. D. This is the site-level aggregation ID and is used by individual networks to identify the subnets within their site
D. This is the site-level aggregation ID and is used by individual networks to identify the subnets within their site
DES, 3DES
Data Encryption Standard, Triple Data Encryption Standard
DTE
Data Terminal Equipment (the serial interface designed for connecting to a CSU/DSU to outside digital communication services).
Encryption guarantees __________.
Data confidentiality
Wire Speed Routing
Data packets are processed as quickly as they arrive.
Multicast Address
Data packets sent to a multicast address are sent to the entire group of networking devices, such as a group of routers running the same routing protocol.
Transport Layer Protocols
Define the type of connection established between hosts and how acknowledgements are sent.
Network Interface Layer
Defines how the host connects to the network.
IP (Internet Protocol)
Defines the addressing used to identify the source and destination addresses of data packets being delivered over an IP network.
Internet Layer
Defines the protocols used for addressing and routing data packets.
Network Slowdown
Degraded network performance.
Logical Address
Describes the IP address location of the network and the address location of the host in the network.
Range Extender
Device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all.
Wireless Router
Device used to interconnect wireless networking devices and to give access to wired devices and establish the broadband internet connection to the ISP.
DS
Digital signal
DSL
Digital subscriber line
DL
Diode Laser
DSSS
Direct sequence spread spectrum.
DNS
Domain name service
EMI
Electromagnetic interference
EIA
Electronic Industries Alliance.
ipconfig /all
Enables the MAC address information to be displayed from the command prompt.
ESP
Encapsulating Security Protocol
ELTCTL
Equal Level Transverse Conversion Transfer Loss
Virtual Private Network (VPN)
Established a secure network connection and is a way to protect your LANs data from being observed by outsiders.
Connection-Oriented Protocol
Establishes a network connection, manages the delivery of data, and terminates the connection.
Optical Ethernet
Ethernet data running over a fiber link.
Broadcast Storm
Excessive amounts of broadcasts.
EAP
Extensible Authentication Protocol
FTP
File Transfer Protocol
F/UTP
Foil over twisted-pair cabling.
Switch
Forwards a frame it receives directly out the port associated with its destination address.
FHSS
Frequency hopping spread spectrum.
False
Full duplex gigabit Ethernet uses two pairs of wires. (True/False)
D. A long-term method where two fibers are fused or welded together
Fusion-splicing is characterized by which of the following? A. A temporary method for splicing fiber B. An inexpensive alternative to mechanical splices C. Required index-matching gel D. A long-term method where two fibers are fused or welded together
The _________ is a term used to describe the networking device that enables hosts in a LAN to connect to networks and hosts outside the LAN.
Gateway
GRE
Generic Routing Encapsulation
GBIC
Gigabit interface converter.
Buffer Overflow
Happens when a program tries to put more data into a buffer than it was configured to hold.
Bandwidth
Having to do with the data capacity of the network link. A Fast-Ethernet 100Mbps link has greater data capacity that a 10Mbps Ethernet link.
Hex
Hexadecimal, base 16
The FHSS transmitting and receiving units must know the _________ to communicate.
Hopping sequence, pseudorandom sequence
A. Switch or hub B. Patch panel
Horizontal cabling consists of which of the following basic blocks? (Select two) A. Switch or hub B. Patch panel C. Backbone cabling D. Routers
A secure VPN connection between two endpoints is known as a(n) _________ tunnel. A. Secure B. Layer2 C. IP D. VPN
IP
Non-Internet Routable IP Addresses
IP addresses not routed on the Internet.
Private Addresses
IP addresses set aside for use in private intranets.
Network layer 3
IP and IPX are examples of protocols that operate in the ___________ layer of the OSI model.
IPSec
IP security is used to encrypt data between various networking devices.
IPv6
IP version 6
Building entrance Equipment room Telecommunications closet Backbone cabling Horizontal cabling Work area
Identify the six subsystems of a structured cabling system.
Association
Indicates that the destination address is for a networking device connected to one of the ports on the bridge.
Dense Wavelength Division Multiplex (DWDM)
Incorporates the propagation of several wavelengths in the 1550-mm range for a single fiber.
True
It is important to be very careful working with fiber ends. These ends are extremely difficult to see and can become "lost" and/or easily embedded in your finger. True/False?
Stateful Firewall
Keeps track of the data packet flow.
Routing Table
Keeps track of the routes to use for forwarding data to its destination.
Diffie-Hellman
Key generation algorithm.
Tunable Laser
Laser in which the fundamental wavelength can be shifted a few nanometers, ideal for traffic routing in DWDM systems.
Vertical Cavity Surface Emitting Lasers (VCSELs)
Lasers with the simplicity of LEDs and the performance of lasers.
L2F
Layer 2 Forwarding
L2TP
Layer 2 Tunneling Protocol
Presentation Layer
Layer of the OSI reference model that accepts and structures the messages for the application.
Data Link Layer
Layer of the OSI reference model that handles error recovery, flow control (synchronization), and sequencing.
Transport Layer
Layer of the OSI reference model that is concerned with message integrity between source and destination.
Session Layer
Layer of the OSI reference model that provides the control functions necessary to establish, manage, and terminate the connection.
Physical Layer
Layer of the OSI reference model that provides the electrical and mechanical connection to the network. Describes the media that interconnects networking devices.
Infrared Light
Light extending from 680 nm up to the wavelengths of the microwaves.
Optical Spectrum
Light frequencies from the infrared on up.
Absorption
Light interaction with the atomic structure of the fiber material; also involves the conversion of optical power to heat.
LED
Light-emitting diode.
The ________ describes the IP address location of the network and the address location of the host in the network.
Logical address
LCL
Longitudinal Conversion Loss
Microbending
Loss caused by very small mechanical deflections and stress on the fiber.
Macrobending
Loss due to light breaking up and escaping into the cladding.
Dynamic Assignment
MAC addresses are assigned to a port when a host is connected.
Media Access Control
MAC stands for
Malware
Malicious programs.
Service Set Identifier (SSID)
Name that is used to identify your wireless network and is used by your access point or wireless router to establish an association.
FastEthernet Port (FA0/0, FA0/1, FA0/2,...)
Naming of the FastEthernet ports on the router.
Serial Port (S0/0, S0/1, S0/2,...)
Naming of the serial ports on the router.
Balanced Mode
Neither wire in the wire pairs connects to ground.
Cladding
Material surrounding the core, which must have a lower index of refraction to keep the light in the core.
Maximum lengths for multimode fiber is ______ km and the maximum length of single-mode fiber is ______ km.
Maximum lengths for multimode fiber is 2 km and maximum length of single-mode fiber is 80 km.
Mbps
Megabits per second
MD5
Message Digest 5
Multicast
Messages are sent to a specific group of hosts on the network.
MM
Multimode.
Nominal Velocity of Propagation (NVP)
NVP is some percentage of the velocity of light and is dependent on the type of cable being tested. The typical delay value for CAT5/5e UTP cable is about 5.7 Marc per meter. The EIA/TIA specification allows for 548 Marc for the maximum 100-meter run for CAT5e, CAT6, CAT6a, CAT7, and CAT7a.
Local Area Network (LAN)
Network of users that share computer resources in a limited area.
NLOS
Non-line-of-sight.
OSI
Open system interconnect.
Multilayer Switch (MLS)
Operates at layer 2 but functions at the higher layers.
Fiber Cross-connect
Optical patch panel used to interconnect fiber cables.
OFDM
Orthogonal frequency division multiplexing.
Ethernet, Physical, Hardware, or Adapter Address
Other names for the MAC address.
Echo Request
Part of the ICMP protocol that requests a reply from a computer.
PAP
Password Authentication Protocol
Site Survey
Performed to determine the best location(s) for placing the access point(s) to provide maximum RF coverage for the wireless clients.
Horizontal cabling
Permanent networking cabling with in a building belongs to the _________ subsystem.
Link
Point from one cable termination to another.
PPTP
Point to Point Tunneling Protocol
Zero-dispersion Wavelength
Point where the dispersion is actually zero.
PPP
Point-to-Point Protocol
Well-known Ports
Ports reserved by ICANN.
Refractive Index
Ratio of the speed of light in free space to its speed in a given material.
Backscatter
Refers to the reflection of the radio waves striking the RFID tag and reflecting back to the transmitter source.
PSACR
Power sum ACR uses all four wire pairs to obtain the measure of the attenuation-crosstalk ratio. This is a measurement of the difference between PSNEXT and attenuation (insertion loss). The difference is measured in dB, and higher PSACR dB values indicate better cable performance.
PSELFEXT
Power sum ELFEXT that uses all four wire pairs to obtain a combined ELFEXT performance measurement. This value is the difference between the test signal level and the cross-talk measured at the far end of the cable. A higher PSELFEXT value indicates better cable performance.
PSAACRF
Power-Sum Alien Attenuation Cross-talk Ratio Far-End
PSANEXT
Power-Sum Alien Near-End Crosstalk
_______ is the best way to keep from contributing to DDoS attacks.
Prevent intrusion
Auto-negotiation
Protocol used by interconnected electronic devices to negotiate a link speed.
Link Integrity Test
Protocol used to verify that a communication link between two Ethernet devices has been established.
Serial Ports
Provides a serial data communication link into and out of the router, using V.35 serial interface cables.
Console Input
Provides an RS-232 serial communications link into the router for initial router configuration. A special cable, called a console cable, is used to connect the console input to the serial port on a computer. The console cable uses RJ-45 plugs on each end and requires the use of an RJ-45 to DB9 adapter for connecting to the COM1 or COM2 port.
Packet
Provides grouping of the information for transmission.
RIRs
Regional Internet registries, IANA-designated governing organizations responsible for IP address allocation by geographical location.
RADIUS
Remote Authentication Dial-In Service.
Hybrid Echo Cancellation Circuit
Removes the transmitted signal from the receive signal.
Logical Fiber Map
Shows how the fiber is interconnected and data is distributed throughout a campus.
Physical Fiber Map
Shows the routing of the fiber but also shows detail about the terrain, underground conduit, and entries into buildings.
Crosstalk
Signal coupling in a cable.
Host Address
Same as host number.
SHA-1
Secure Hash Algorithm
Link Pulses
Sent by each of the connected devices via the twisted-pair cables when data is not being transmitted to indicate that the link is still up.
SSID
Service set identifier.
Protocol
Set of rules established for users to exchange information.
STP
Shielded twisted psir
Pulse Dispersion
Stretching of received pulse width because of multiple paths taken by the light.
SYN ACK
Synchronizing Acknowledgement packet
SYN
Synchronizing packet
SONET/SDH
Synchronous optical network; protocol standard for optical transmission in long-haul communication/synchronous digital hierarchy.
STS
Synchronous transport signals.
Transport layer 4
TCP functions at the __________ layer of the OSI model.
Layer 4 transport
TCP functions at which layer of the OSI model?
False
The "X" (cross connection) on the input to a switch represents a router only port. True/False
Multilevel Encoding
Technique used to reduce in the required bandwidth required to transport the data.
TIA
Telecommunications Industry Association
TCO
Telecommunications outlet.
ARP Cache
Temporary storage of MAC addresses recently contacted.
Basic Service Set (BSS)
Term used to describe an independent network.
Enterprise Network
Term used to describe the network used by a large company.
Fiber, Light Pipe, Glass
Terms used to describe a fiber-optic strand.
False
The 10GBASE-T system splits the data into 8 channels for transmission. (True/False)
Secure Address
The switch port will automatically disable itself if a device with a different MAC address connects to the port.
RJ-45
The 8-pin modular connector used with CAT6/5e/5 cable.
A. Measurement procedures C. Cabling hardware D. Transmissions
The EIA/TIA568-B.2 specifies which aspect of UTP cabling components? (Choose all that apply) A. Measurement procedures B. System requirements C. Cabling hardware D. Transmissions
Classful
The IP and subnet addresses are within the same network.
IPv4
The IP version currently being used on the Internet.
IANA
The Internet Assigned Numbers Authority is the agency that assigns IP addresses to computer networks.
ICANN
The Internet Corporation of Assigned Names and Numbers.
Static Addressing
The MAC address has been manually assigned to a switch port.
Layer 1 physical
The NIC operates at which layer of the OSI model?
Main cross-connect
The Telco and the ISP usually connect to __________ room in the campus network hierarchy.
Network layer 3
The ________ layer combines messages or segments into packets.
Mode Field Diameter
The actual guided optical power distribution, which is typically a micron or so larger than the core diameter; single-mode fiber specifications typically list the mode field diameter.
True
The address range for Class A IP addresses is 1.0.0.0 - 126.255.255.255. True/False
ACR
The attention-to-crosstalk ration measurement compares the signal level from a transmitter at the far end to the crosstalk measured at the near end.
True
The bend radius for UTP cable is four times the jacket diameter. (True/False)
Directed Broadcast
The broadcast is sent to a specific subnet.
Modal Dispersion
The broadening of a pulse due to different path lengths taken through the fiber by different modes.
Chromatic Dispersion
The broadening of a pulse due to different propagation velocities of the spectral components of the light pulse.
Polarization Mode Dispersion
The broadening of a pulse due to the different propagation velocities of the X and Y polarization components of the light pulse.
CSU/DSU
The channel service unit/data service unit.
Half-Duplex
The communication device can transmit or receive but not at the same time.
COM1, COM2...
The computer's serial communication ports.
Bus Topology
The computers share the media (coaxial cable) for data transmission.
Horizontal Cross-connect (HC)
The connection between the building distributors and the horizontal cabling to the work area or workstation outlet-another term used for the HC is the floor distributors (FD).
Cut-Through
The data packet is forwarded to the destination MAC address has been read.
100
The data rate for FastEthernet is ____ Mbps.
Presentation layer 6
This layer performs encryption and compression.
Network Interface Card (NIC)
The electronic hardware used to interface the computer to the network.
Power Sum NEXT (PSNEXT)
The enhanced twisted-pair cable must meet four-pair NEXT requirements, called PSNEXT testing. Basically, power sum testing measures the total crosstalk of all cable pairs. This test ensures that the cable can carry data traffic on all four pairs at the same time with minimal interference. A higher PSNEXT value is desirable because it indicates better cable performance.
Store-and-Forward
The entire frame of data is received before any decision is made regarding forwarding the data packet to its destination.
Organizationally Unique Identifier (OUI)
The first 3-bytes of the MAC address that identifies the manufacturer of the network hardware.
Class A, B, C, D, and E
The five classes of IPv4.
Star Topology
The most common networking topology in today's LANs where all networking devices connect to a central switch or hub.
True
The function of an attenuators is to reduce the receive signal level. True/False?
Supernets
The grouping of two or more class networks together; also called CIDR blocks.
CIDR Block
The grouping of two or more class networks together; also called supernetting.
Graded-index Fiber
The index of refraction is gradually varied with a parabolic profile.
Received Signal Level (RSL)
The input signal level to an optical receiver.
Last Mile
The last part of the connection from the telecommunications provider to the customer.
Aging Time
The length of time a MAC address remains assigned to a port.
Switch Latency
The length of time a data packet takes from the time it enters a switch until it exits.
Telecommunications Closet
The location of the cabling termination points that includes the mechanical terminations and the distribution framed.
Work Area
The location of the computers and printers, patch cables, jacks, computer adapter cables, and fiber jumpers.
Return Loss
The measurement provides a measure of the ratio of power transmitted into a cable to the amount of power returned or reflected.
True
The network address is another name for a layer 4 address. True/False
C. Use the ping command to verify network connectivity D. Verify the link lights
The network administrator needs to verify a network connection. Which of the following steps should be taken? (Select two) A. Ping the MAC address B. Perform an ARP request C. Use the ping command to verify network connectivity D. Verify the link lights
Physical layer 1
The network interface card operates at the ___________ layer of the OSI model.
Classful Addressing
The network portion of a particular network address.
IPng
The next generation IP.
Pseudorandom
The number sequence appears random but actually repeats.
Hopping Sequence
The order of frequency changes.
Unicast
The packet has a fixed destination.
Router Interface
The physical connection where the router connects to the network.
Ports
The physical input/output interfaces to the networking hardware.
True
The ping -t: IP address command pings the host at the specified IP address until it is stopped. True/False
Building Entrance
The point where the external cabling and the wireless services interconnect with the internal building cabling.
Error Threshold
The point where the number of errors in the data packets has reached a threshold and the switch changed from the cut-through to the store-and-forward mode.
Host Number
The portion of the IP address that defines the location of the networking device connected to the network; also called the host address.
Network Number
The portion of the IP address that defines which network the IP packet is originating from or being delivered to.
IEEE 802.3an-2006 10-GBASE-T
The standard for 10Gbps
Backbone
The primary path for data traffic to and from destinations and sources in the campus network.
OSI Model
The seven layers describing network functions.
Advertise
The sharing of route information.
Color Map
The specification of which wire color connects to which pin on the connector.
XENPAK, XPAK, X2, XFP, SFP+
The ten gigabit interface adapter.
Roaming
The term used to describe a user's ability to maintain network connectivity as he moved through the workplace.
Flooding
The term used to describe what happens when a switch doesn't have the destination MAC address stored in CAM.
Delay
The time it takes for a data packet to travel from source to destination.
Long Haul
The transmission of data over hundreds or thousands of miles.
Extended Service Set (ESS)
The use of multiple access points to extend user mobility.
Straight-through Cable
The wire pairs in the cable connect to the same PIN numbers on each end.
AUI Port
This is a 10Mpbs Ethernet port. AUI stands for "attachment unit interface."
Propagation Delay
This is a measure of the amount of time it takes for a signal to propagate from one end of the cable to the other. The delay of the signal is affected by the nominal velocity of propagation (NVP) of the cable.
Delay Skew
This is a measure of the difference in arrival time between the fastest and the slowest signal in a UTP wire pair.
Equal Level FEXT (ELFEXT)
This measurement differs from NEXT in that the measurement is for the far end of the cable. Additionally, the ELFEXT measurement does not depend on the length of the cable. This is because ELFEXT is obtained by subtracting the attenuation value from the far-end crosstalk (FEXT!!) loss.
When configuring remote installations for wireless networks, the receive site needs to be able to see the multipoint distribution antenna site. True/False
True
A healthy network starts from within, and the most basic component in the network is an individual computer. True/False
True
Access points provide 802.11 MAC layer functions. True/False
True
Dispersion compensating fiber was developed to increase the transmission capacity of older cabling. True/False?
True
Fast link pulses carry information between each end of a data link. True/False
True
Network Address Translation (NAT)
Translates the private IP address to a public address for routing over the Internet.
TCP
Transmission Control Protocol
TCP/IP
Transmission Control Protocol/Internet Protocol, the protocol suite used for internetworks such as the Internet.
Broadcast
Transmission of data by a network device to all devices connected to its port.
Straight-through
Transmit and receive signal pairs are aligned end-to-end.
Crossover
Transmit and receive signal pairs are crossed to properly align the transmit signal on one device with the receive signal on the other device.
Crossover Cable
Transmit and receiver wire pairs are crossed.
TCL
Transverse Conversion Loss
TCTL
Transverse Conversion Transfer Loss
A bridge looks for an association between a MAC address and a port. True/False
True
Layer 3 switches use hardware to handle switching functions. True/False
True
Power On/Off
Turns on/off electrical power to the router.
CAT6 (category 6)
Twisted-pair cables capable of carrying up to 1000Mbps (1 gigabit) of data up to a length of 100 meters.
Mechanical Splices
Two fibers joined together with an air gap, thereby requiring an index-matching gel to provide a good splice.
Stateful Packet Inspection (SPI)
Type of firewall that inspects incoming data packets to make sure they correspond to an outgoing request.
SC, ST, FC, LC, MT-RJ
Typical fiber connectors on the market.
Pairing
When a Bluetooth device is set up to connect to another Bluetooth device.
Multicasting
When one host sends data to many destination hosts.
Hand-off
When the user's computer establishes an association with another access point.
CAT7/7a and CAT6a
UTP cable standards that support 10GB data rates for a length of 100 meters.
IP Address
Unique 32-bit address that identifies on which network the computer is located as well as differentiates the computer from all other devices on the same network.
U-NII
Unlicensed National Information Infrastructure.
Alien Crosstalk (AXT)
Unwanted signal coupling from one permanent link to another.
Inquiry Procedure
Used by Bluetooth to discover other Bluetooth devices or to allow itself to be discovered.
Passkey
Used in Bluetooth Security to limit outsider access to the pairing.
Firewall
Used in computer networks for protecting the network.
Media Converter
Used to adapt a layer 1 (physical layer) technology to another layer 1 technology.
Auxiliary Input
Used to connect a dial-in modem into the router. The auxiliary port provides an alternative way to remotely log in to the router if the network is down. This port also uses an RJ-45 connection.
Paging Procedure
Used to establish and synchronize a connection between two Bluetooth devices.
Unicast Address
Used to identify a single network interface address, and data packets are sent directly to the computer with the specified IPv6 address.
Translation Bridge
Used to interconnect two LANs that are operating two different networking protocols.
Address Resolution Protocol (ARP)
Used to map an IP address to its MAC address.
Firewall Protection
Used to prevent unauthorized access to your network.
Beacon
Used to verify the integrity of a wireless link.
UDP
User Datagram Protocol
Overloading
Where NAT translates the home network's private IP addresses to a single public IP address.
Wired Network
Uses cables and connectors to establish the network connection.
Dictionary Attack
Uses known passwords and many variations (upper and lowercase and combinations) to try to log in to your account.
Wireless Network
Uses radio signals to establish the network connection.
Main Cross-connect (MC)
Usually connects two or more buildings and is typically the central telecommunications connection point for a campus or building. It is also called the main distribution frame (MDF) or main equipment room. The MC connects to Telco, an ISP, and so on. Another term for the MC is the campus distributor (CD).
VPN
Virtual private network.
Commercial Cabling Standard Twisted-pair Media Optical Fiber Cabling Standard
What are the three parts of the EIA/TIA 568B standard?
A. Signal coupling from one link to another
What causes Alien Crosstalk? A. Signal coupling from one link to another B. Wide cable separation C. All to them D. Low data rates
A. Manufacturer standards B. Color order
What is the difference between T568A and T568B? (Choose all that apply) A. Manufacturer standards B. Color order C. Nothing D. Performance
Network layer 3
What layer decides the route data will travel?
Network layer 3
What layer is responsible for adding a header that includes routing information?
A. None of them
What signifies the uplink port on hubs? A. None of them B. W C. Y D. Z
B. Better security C. Noise immunity from EMI D. Noise immunity from RFI
Which of the following is an advantage of F/UTP? (Choose all that apply) A. Maximizes signal leakage B. Better security C. Noise immunity from EMI D. Noise immunity from RFI
E. All of the above
Which of the following is found in the telecommunications closet? A. Networking Equipment B. Patch cables C. Backbone cabling D. Patch panels E. All of the above
A. Vertical cabling C. Equipment closet
Which of the following is not a part of a structured cabling subsystem? A. Vertical cabling B. Horizontal cabling C. Equipment closet D. Building entrance
B. Scattering
Which of the following terms is caused by refractive index fluctuations and accounts for 96% of attenuation loss? A. Absorption B. Scattering C. Diffusion D. Dispersion
B. Macrobending
Which of the following terms refers to loss due to light breaking up and escaping into the cladding? A. Scattering B. Macrobending C. Absorption D. Microbending
A. Crimping tool C. Strippers
Which of the following tools are needed to make a UTP cable? (Choose all that apply) A. Crimping tool B. Screwdriver C. Strippers D. Pliers
A. CAT5e B. CAT6
Which type of twisted-pair cable can be used for Gigabit Ethernet networks? A. CAT5e B. CAT6 C. None of them D. CAT5
Wi-Fi
Wi-Fi Alliance[md] an organization that tests and certifies wireless equipment for compliance with the 802.11x standards.
WPA
Wi-Fi Protected Access.
T568A
Wire color guidelines specified under the EIA/TIA568B standard.
T568B
Wire color guidelines specified under the EIA/TIA568B standard.
WLAN
Wireless local area network.
The _________ command is used on a computer to view the contents of the ARP.
arp -a
Cisco routers use _______ command to block broadcasts to a subnet.
no ip directed-broadcast