CN

Ace your homework & exams now with Quizwiz!

Provides IP address to MAC address resolution in a manner similar to that of ARP.

RARP

A classful routing protocol.

RIP version 1

Indicates that a TCP connection is to be terminated without further interaction.

RST

Contains enough information in its header to be routed through an internetwork.

Routed protocol

What is TCP port 25?

SMTP

A connectionless protocol that permits remote tracking & management of TCP/IP hosts.

SNMP

What is UDP port 161?

Simple Network Management Protocol (SNMP)

Indicates how much of the IP address represents the network or subnet.

Subnet mask

Also known as route aggregation.

Summarization

What is UDP port 69?

TFTP

What is TCP port 23?

Telnet

Well known ports are those from ___ thru ____.

1 thru 1,023

Registered ports are those from _____ thru _____.

1,024 thru 49,151

The TCP acknowledgement process is _____. a. Expectational b. Sequential c. Exceptional d. Sesquicentennial

A. Expectational

_____ is the most important layer 3 security protocol. a. IPSec b. ARP c. DNS d. NAT

A. IPSec

To determine how many digits are used for the network identifier, you must look at the _____, which is a required component for all IP hosts. a. subnet mask b. MAC mask c. network mask d. TCP/IP mask

A. Subnet mask

When the host portion of an IP address is all binary zeros, that address is the _____ identifier. a. subnetwork b. broadcast c. class d. multicast

A. Subnetwork

What is the purpose of the three-way handshake? A. To establish a reliable connection between points. B. To establish an unreliable connection between two points C. To establish a relationship at the Application layer between two points. D. To establish a relationship at the internetwork layer between two points.

A. To establish a reliable connection between points.

Which of the following is used by the TFTP protocol? a. UDP b. TCP c. ICMP d. Telnet

A. UDP

Manages IP addresses in the United States.

ARIN

A device that connect multiple nodes and/or networks, is connected to external power, & repeats & regenerates signals on a network.

Active hub

A wireless mode where client devices connect directly to each other without an access point.

Ad hoc mode

True or False: Routers are slower than other devices because they must analyze a data transmission from the Physical through the Network layer.

True

True or False: Routers can choose the best path across an internetwork using dynamic routing techniques.

True

An IEEE 802.3z Gigabit Ethernet implementation that uses balanced copper cabling to achieve 1000 Mbps.

1000BaseCX

An IEEE 802.3z Gigabit Ethernet implementation that uses single-mode fiber to achieve 1000 Mbps.

1000BaseLX

An IEEE 802.3z Gigabit Ethernet implementation that uses multimode fiber to achieve 1000 Mbps.

1000BaseSX

An IEEE 802.3z Gigabit Ethernet implementation that uses all four pairs of Category 5 or better UTP cable to achieve 1000 Mbps.

1000BaseT

A fast ethernet implementation over multimode fiber-optic cabling. The maximum segment length is 412 meters.

100BaseFX

A 100-Mbps fast ethernet implementation that uses four pairs of either Caterory 3, 4, or 5 UTP cable. The maximum segment length is 100 meters.

100BaseT4

A fast ethernet implementation that use two pairs of either Category 5 unshielded twisted-pair (STP). It also operates at the 100 Mbps with a maximum segment distance of 100 meters.

100BaseTX

Dynamic/Private ports are those from _____ thru _____.

49,152 thru 65,535

The IEEE standard that defines wireless networking in the unlicensed frequency bands 2.4 GHz and 5 GHz.

802.11

The IEEE standard that defines port switching designed to shut down a switch port to all frames unless they are authentication frames.

802.1x

True or False: Routers work only with routable network protocols; most but not all protocols are routable.

True

Which of the following is a Class A Broadcast? a. 11.255.255.255 b. 127.75.255.255 c. 193.255.255.255 d. 14.25.255.255

A. 11.255.255.255

Which of the following is a layer in the TCP/IP protocol? (Choose all that apply) a. Application b. Presentation c. Physical d. Data Link e. Internetwork

A. Application B. Presentation E. Internetwork

_____ provides the same basic functionality as RARP. a. DHCP b. HTTP c. SNMP d. IP

A. DHCP

Which of the following is a TCP/IP Application layer protocol? (Choose all that apply) a. DNS b. FTP c. UDP d. IP E. ICMP

A. DNS B. FTP

The _____ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network layer) connectivity. a. Find b. Path c. Trace d. Route

C. Trace

A wireless network with m ultiple access points connected to switches. The access point are typically configured with the same network name (SSID) to facilitate roaming.

Extended Service Set (ESS)

The console port connects directly to a PC through a(n) _____ rollover cable. a. RJ-45 to RJ-10 b. RJ-45 to RJ-45 c. RJ-9 to RJ-45 d. RJ-9 to RJ-10

B. RJ-45 to RJ-45

When sending packets to remote segments, router rely on information in _____. a. ARP tables b. Routing tables c. Switching tables d. ROM

B. Routing tables

Which of the following is a reliable communications protocol? a. UDP b. TCP c. IP d. ICMP

B. TCP

Works with 802.1x to carry the authentication information between the user, the access point, & the security server.

Extensible Authentication Protocol (EAP)

What is TCP port 20 7& 21?

FTP data transfer

An ARP reply is a _____. a. Multicast b. Unicast c. Broadcast d. Anycast

B. Unicast

What do computers do with the information in an ARP request when they are not the destination IP? A. Update their ARP caches with the destination information. B. Update the ARP caches with the source information. C. Update their routing tables with the ARP information. D. None of the above

B. Update the ARP caches with the source information.

An ARP request is a _____. a. Multicast b. Unicast c. Broadcast d. Anycast

C. Broadcast

_____ is based on assigning IP addresses on criteria other than octet boundaries. a. ARIN b. IANNA c. CIDR d. VLSR

C. CIDR

Network administrators typically access the router directly through the console port (also known as the _____) located on the back of the router. a. DB-9 b. VTY c. console d. AUX

C. Console

RARP has largely been replaced by? a. BOOTP b. ARP c. DHCP d. DNS

C. DHCP

The ____ transition method involves enabling IPv6 on all routers, switches, & end nodes but not disabling IPv4--so both version 4 & version 6 stacks run at the same time. a. scheduling b.tunneling c. dual stack d. natting

C. Dual stack

Ping and Trace both reply on what protocol? a. SMTP b. DNS c. ICMP d. TFTP

C. ICMP

The decimal number 192 expressed in binary is _____. a. 10000101 b. 11000000 c. 11010010 d. 11100100

B. 11000000

Although the base _____ numbering system seems foreign at first glance, largely due to the addition of letters, it really is an efficient way to express large numbers such as MAC & IPv6 addresses. a. 2 b. 16 c. IP2 d. IPNext

B. 16

What is True regarding IPv6? (Choose all the that apply). a. Addresses are expressed in binary b. Addresses are expressed in hexadecimal c. Its difficult to transition to IPv6 d. IPv6 addresses are 64 bits rather than 32 bits like IPv4 addresses e. Most Cisco systems support IPv6.

B. Addresses are expressed in hexadecimal E. Most Cisco systems support IPv6

Which of the following address classes allows you to borrow a maximum of 14 bits to create a subnet mask? a. Class A b. Class B c. Class C d. None of the above

B. Class B

Bridges operate at which layer of the OSI model? a. Network b. Data Link c. Session d. Transport

B. Data Link

Which layer of Cisco's Three-Layer Hierarchial model provides services such as traffic control & security the network? a. Access layer b. Distribution layer c. Core layer d. All layers can provide these functions, traffic control & security are not addressed by this model.

B. Distribution layer

A(n) _____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device. a. SYN flood b. ICMP flood c. Ping of Death d. smurf attack

B. ICMP flood

What are some reason to switch to IPv6? (Choose all that apply). a. The equipment costs less. b. IPv6 is inherently more secure. c. There is more address space available with IPv6 d. IPv6 will handle NAT configurations automatically e. Broadcasting will be replaced with multicasting.

B. IPv6 is inherently more secure. C. There is more address space available with IPv6. E. Broadcasting will be replaced with multicasting.

It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is reserved as the _____ address. a. multicast b. loopback c. broadcast d. unicast

B. Loopback

What is an ARP table? a. Destination & source MAC addresses. b. MAC & corresponding IP addresses. c. Destination & Source IP addresses. d. Routes to networks.

B. MAC & corresponding IP addresses.

A device that functions as a bridge for nonroutable protocols & a router for routable protocols. Which operate at both the Data Link & Network layers.

Brouter

A portion of memory where the device store incoming packets until they can be processed.

Buffer

The ____ layer of the TCP/IP model maps to both the Data Link & Physical layer s of the OSI reference model. a. Transport b. Internetwork c. Network Interface d. Application

C. Network Interface

Which of the following are not ICMP message types? a. Echo & destination unreachable b. Source quench & redirect c. Relay & reroute d. Parameter problem & information e. Timestamp & time exceeded

C. Relay & Reroute

_____ protocols allow the routers to be updated automatically. a. Internetwork b. MAP c. Routing d. smurf attack

C. Routing

_____ tell the computer or router which part of an IP address is the network portion & which part is the host portion. a. CIDR tables b. Summarization tables c. Subnet masks d. Router masks

C. Subnet masks

Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These tables are called _____.

C. ARP tables

Developed to slow the exhaustion of IP addresses.

CIDR

What is TCP port 80?

Hypertext Transfer Protocol (HTTP) Web services

A global, government-independent entity with overall responsibility for the Internet.

ICANN

The next generation of IP

IPv6

A wireless mode in which the access point is wired back into a switch so that the client has access to the LAN and WAN, not just the WLAN.

Infrastructure mode

What is TCP port 110?

Post Office Protocol version 3 (POP3)

What are the well known port numbers? a. 1024 - 49151 b. 49152 - 65535 c. 0 - 1021 d. 1 - 1023

D. 1 -1023

Assuming that the address 165.24.3.6 uses the correct default mask, what is the host identifier? a. 165.24 b. 24.3.6 c. 3 d. 3.6

D. 3.6

For a class B broadcast, which octets will be completely binary ones? a. 2nd b. 2nd & 3rd c. 1st & 2nd d. 3rd & 4th

D. 3rd & 4th

Distance-Vector algorithms & Link-state algorithms are used in _____. a. DHCP b. ARP c. Static Routing d. Dynamic Routing

D. Dynamic Routing

_____ is the process of assigning unique IP addresses to devices on the network. a. Virtual addressing b. Network addressing c. IP access d. IP addressing

D. IP addressing

The _____ layer in the TCP/IP model handles software, or logical, addressing. a. Network Interface b. Application c. Transport d. Internetwork

D. Internetwork

Routers operate at which layer of the OSI model? a. Data Link b. Presentation c. Session d. Network

D. Network

Which of the following is a TCP/IP Transport layer protocol? (Choose all that apply) a. ARP b. RARP c. IP d. UDP e. TCP

D. UDP E. TCP

What is UDP port 67 & 68?

DHCP

Provides TCP/IP host name to IP address resolution.

DNS serivce

What is TCP & UDP 53?

Domain Name System (DNS)

A 32-bit signal that is sent by the first station to detect a collision on an Ethernet network; ensure that all other stations are aware of the collision.

Jam signal

A delay on a network caused by variety of factors, including the addition of devices.

Latency

A distributed file system developed by Sun Microsystems that allows data to be shared across a network.

NFS

What is TCP port 119?

Network News Transfer Protocol (NNTP)

What is TCP & UDP port 123?

Network Time Protocol (NTP)

Four bits, which is half of a byte.

Nibble

A classless routing protocol.

OSPF

A network device that uses LEDs or diode lasers to amplify optical signals.

Optical repeater

A devices that connects network segments but does not perform signal regeneration.

Passive hub

Verifies connectivity between two points

Ping utility

Used by TCP to establish a reliable connection between two points.

Three-way handshake

True or False: Each interface on a router represents an IP address on a different network.

True


Related study sets

Chapter 14: Sales and Lease Contracts

View Set

Chapter 2 in IB textbook: Exercise Health

View Set