IST 220 Exam #1
False
A DNS scope is a range of addresses to be assigned to clients when they request an IPv4 IP address
socket
A ______________ consists of both a host's IP address and a process's TCP or UDP port
False
A binary number is written in the base-10 number system, which only uses the numerals 1 and 0.
True
A fire suppression system can include an emergency alert system, portable fire extinguishers, an emergency power-off switch, and suppression agents
Packet
A name for a PDU or Protocol data unit when it is at Layer 3 of the OSI model is called a ____________.
True
A network begins at the demarc and ends at a workstation.
Peer-to-peer model
A network consists of 10 computers, all running Windows 7 Professional. One computer acts as a file server and serves up data to other computers on the network. Which networking model does the network use?
False
A software upgrade is a correction, improvement, or enhancements to software.
True
A software upgrade is a major change to a software package that enhances functionality and feature of the software.
False
A switch manages traffic between two or more different networks
Demarc
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. Where do you take them?
Master License Agreement (MLA)
Documents in detail the work that must be completed for a particular project.
Memorandum of Understanding
Documents the intentions of two or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts
No more than 1 inch of the cable should be exposed.
During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?
True
Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.
19 23
Equipment Racks come in standard frame sizes, meaning that the front is x inches across. What are the possible sizes?
True
FTP server listens on Port 21...
The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
How can you determine the manufacturer of a NIC card based on the MAC address?
False
ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.
32
IP v4 addresses have how many bits and are written as four decimal numbers called octets....
Rack Ears
If you are shopping for a rack switch, what components on the switch tells you it can be mounted to a rack?
True
In a Client-Server Network resources are managed by the NOS
Ring
In a ___________ topology nodes are connected only to its two neighboring nodes... This topology is seldom used in modern networks. A node can only put data on the network when it hold a token. The main factor of why it is rarely used today is due to its slow speed.
Client Server
In a network of 10 computers, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support that it could not support without the upgrade?
False
In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack.
No more than four times the diameter of the cable
In general, how much can a twisted-pair's cable be bent before data transmission may be impeded?
128.0.x.y to 191.255.x.y
In the classful addressing scheme, what range of network addresses is considered a Class B?
HTTP
In the client-server model, what is the primary protocol used for communication between a browser and a Web Server.
Request for Proposal (RFP)
Is a request to vendors to submit a proposal for a product or a service your company wants to purchase.
Service Level Agreement (SLA)
Legally binding contract or part of a contract that defines, in plain language and in measurable terms, that aspects of a service provided to a customer.
Mac Address-Data Link IP Address-Network
Mat the Mac address and IP address to the proper layer.
COM- Commerical NET- Networks ORG- NOn commerical organization Gov-Government
Match Domain suffix with the type of organization. (Pick the best Choice) COM NET ORG GOV
ifconfig-a
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?
WAN - Largest LAN-Smallest MAN-MIddle
Order the Networks from Smallest to Largest in Geographical Area
False
Peer-to-Peer Networks are very scalable, and are practical for large installations
False
Physical and Logical topologies are always the same.
Layer 1- Physical Layer 2- Data Link Layer 3- Network Layer 4- Transport Layer 5- Session Layer 6- Presentation Layer 7- Application
Please Match the Layer on left with its name on the right.
False
Port 80 indicates this an HTTPS session.
False
Rack Height is measured in rack bays (RB or B)
False
Removing a header and a trailer from a layer below is called encapsulation.
False
TFTP is a techniques designed to conserve the number of public IP addresses needed by a network.
UTP STP Fiber-optic cable
TIA/EIA recognizes three possible cabling types for horizontal cabling...
False
The 1024 - 65535 range of ports is also known as the "well-known" range.
False
The Session layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
True
The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.
False
The first part of an IPv4 address identifies the host, and the last part identifies the network.
False
The maximum allowable distance for horizontal cabling is 90m.
True
The process of designing, implementing, and maintaining an entire network is called the system life cycle.
TCP and UDP
The two main Transport Layer Protocols are: (Only Need the Abbreviation)
False
There is only one IDF per campus, but there can be many MDF connecting internal portions of the network.
True
Three switches daisy-chained together in a single line is said to use a bus topology
False
UDP (User Datagram Protocol) - makes a connection with the end host, checks whether data was received; called a connection-oriented protocol
True
UDP port 123 is utilized by the Network Time Protocol service.
Wide Area Network (WAN)
WAN is an abbreviation for:
Layer 7 - Application Layer
Web Browsers and Email software operates at what layer of the OSI Model?
True
Well-known ports range from 0 to 1023 and are assigned by IANA.
127.0.0.1
What IP addresses is a loopback IP address?
Email Shared Folders Printers
What can be shared on a network?
255
What decimal number corresponds to the binary number 11111111?
It identifies the e-mail server to be used for e-mail traffic for the domain.
What does the MX record do in a forward DNS zone?
BIND
What is by far the most popular DNS server software available?
The last 24 bits of the MAC address.
What part of a MAC address serves as the extension identifier, or device ID?
TIA/EIA 568
What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?
link local address
What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?
wiring schematic
What type of diagram show a graphical representation of a network's wired infrastructure.
NSLookup
What utility allows you to query the DNS database from any computer on the network?
Ping
What utility is ues to verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network...
an icon that resembles a brick wall
When creating network diagrams, what icon description typically represents a network firewall?
An icon that is rectangular, which contains four arrows pointing in opposite directions.
When creating network diagrams, what icon description typically represents a network switch?
True
When working with sensitive components, protect against ESD by using an ESD strap
True
When you are responsible for a computer or network, you need to fully understand the impact of any change before you allow that change.
Remote Desktop
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Telnet
Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?
POP3
Which email protocol allows an email client to download email messages to the local computer?
Routers Switches Kvm Switch
Which of the following devices are you likely to find in the MDF? Choose all that apply
Cable ties should be pulled tightly to keep cables from moving around in a bundle.
Which of the following is NOT a best practice when performing cable management?
172.16.0.0 through 172.31.255.255
Which of the following is NOT a range of IP addresses recommended for use in private networks?
Port
Which type of address is used at the Transport Layer to identify the receiving application?
The exposure of the cable can cause transmission interference between wires.
Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?
mycompany.com
With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?
The computer is configured to use DHCP, but was unable to lease an address.
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?
False
You can permanently assign a dynamic IP address to a device.
SSH (Secure Shell)
You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:22. Assuming your network uses standard port designations, what Application layer protocol handles your transmission?
patch cable
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Both IPv4 and IPv6 protocols will be used on the network.
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?
Rack
__________ diagram shows the devices stacked in a rack system and are typically drawn to scale
Patch Panel
__________ is a panel of data receptors which can be mounted to a wall or a rack and which provides a central termination point when many cables converge in a single location
ipconfig /all
n Windows what command can you utilize to display TCP/IP configuration information for each network adapter installed?
False
Any layer of the OSI model can directly communicate with any other layer of the OSI model.
Voltage, Wavelengths, Light
At Layer 1 where it is responsible for sending bits via a wired or wireless transmission it can transmitted as: (Pick 3)
MAC address
At the Data Link Layer, which type of network address is used to identify the receiving host?
False
At the Network Layer, and IP address is used to identify the receiving host.
True
At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.
False
Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.