Network+ Guide to Networks (7th edition) Final Exam Study Guide

Ace your homework & exams now with Quizwiz!

In IPv6 addressing, each IP address is a unique ________ number.

*128 bit IP address written as 8 blocks of hexadecimal number, for e.g.: 2001:0DB8:0B80:0000:0000:00D3:9C5A:00CC* *page 52*

In IPv4 addressing, each IP address is a unique ________ number.

*32 bit IP address written as 4 decimal numbers called octets, for e.g.: 92.106.50.200* *page 52*

HTTP operates from port _______________

*80* *page 66*

RADIUS and TACACS belong to a category of protocols known as AAA ( ___________________ ).

*AAA (authentication, authorization, and accounting* *page 357*

Which OSI model layer initiates the flow of information?

*Application* *Application role explained: page 21* "The two end-system computers that INITIATES SENDING and RECEIVING data are called hosts" Data that is passed between applications or utility programs and the operating system is called a payload and includes control info. A. Physical B. Application C. Session D. Presentation *Physical role explained* page 23: The Physical layer, is the simplest layer of all and is responsible ONLY for sending bits via a wired or wireless transmission.

A ______ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

*Brute Force* *page 312*

Modern LANs use____ or higher wiring.

*CAT 5 or higher* : Required minimum standard for Fast Ethernet, a.k.a 100-Bass T Ethernet that runs at 100 Mbps *bottom page 225*

All Ethernet networks, independent of their speed or frame type, use an access method called ______________ .

*CSMA/CD* *page 186* and *page 293*

__________ is a fault-tolerance technique that links multiple servers together to act as a single server.

*Clustering* *?*

A __________ attack occurs when a system becomes unable to function because it has inundated with requests for services and can''t respond to any of them.

*Denial-of-Service (DOS)* *page 392*

______________ are combinations of networking hardware and software that connect two dissimilar kinds of networks.

*Gateways* *page 54 (Keep in mind that for VLANs, the gateway can be a software)* URL http://networkingconcepts.blogspot.com/ *Gateways do not fall neatly into the networking hardware category. In broad terms, they are combinations of networking hardware and software that connect two dissimilar kinds of networks.*

Which statement accurately describes the OSI model.

*It describes a theoretical representation of what happens between two nodes communicating on a network* *page 19-20* In this book, you'll learn to use the OSI model to help you understand networking protocols and troubleshoot network problems...By doing so, you'll better understand the logistics of which software program or device is INITIATING and/or RECEIVING the protocol or data and how other protocols are relating to [the ISO] A. It describes how software programs interact with humans. B. It describes a theoretical representation of what happens between two nodes communicating on a network. C. It describes how software programs interact with other software programs. D. It prescribes the type of hardware or software that should support each layer.

__________ is intended to eliminate single points of failure

*Redundancy* *page 467*

_____________ is a method of encrypting TCP/IP transmissions above the network layer.

*SSL or another one is the TLS* *page 351*

To eliminate the possibility of a broadcast storm, switches and bridges implement the ________.

*STP (Spanning Tree Protocol)* *page 527*

In the TCP/IP protocol suite, __________________ is the core protocol responsible for logical addressing

*TCP* sequencing information *page 108* ...In addition, because messages don't always arrive in the same order they were created, TCP attaches a *chronological sequence number* to each segment *so the destination host can, if necessary, reorder segments as they arrive*.

_______________ is more efficient than TCP for carrying messages that fit within one data packet.

*UDP* page 114

A _______ uses public network connects to establish private communications by encrypting the data transmitted between the two computers at each end of the connection.

*VPN* *page 337*

A ________________ can interpret physical addressing information.

*bridge* If these are the choices, then *bridge* is the better choice .repeater .NOT switch .hub .bridge URL address: http://geekswithblogs.net/MarkPearl/archive/2012/01/14/computer-networks-unisa---chap-6-ndash-network-hardware.aspx *bridge definition*: They differ from repeaters in that *they can interpret physical addressing information* page 186: *hub's definition*: A hub is an inefficient and outdated networking device that has been replaced by switches. A hub accepted signals from a transmitting node and repeated those signals to all other connected nodes in a broadcast fashion. page 224: *repeater definition* repeater is a device that REtransmits a digital signal in its original form. URL address: http://geekswithblogs.net/MarkPearl/archive/2012/01/14/computer-networks-unisa---chap-6-ndash-network-hardware.aspx Repeaters operate in the Physical layer of the OSI model thus have *no means to interpret data* the retransmit Internet URL address: https://starbounder.org/NOT_Switch *.NOT switch* definition: NOT Switch is a wiring sensor that can be crafted using the Wiring Station. It inverts the signal that comes into it.

A(n) _________ is the place where a telephone company terminates lines and switches call between different locations.

*central office (CO)* *page 555*

When signals are free to travel in both directions over a medium simultaneously, the transmission is considered

*duplex* a.k.a. *full-duplex* *page 182*

What sets ATM apart from Ethernet is its __________ size.

*fixed* *page 575

The format in which Ethernet transmits data is called a _____.

*frame* *page 180*

In wireless communication, to exchange information, two antennas must be tuned to the same ___________________.

*frequency* *page 278*

__________ describes wiring that connects workstations to the closest telecommunications closet.

*horizontal wiring* *page 161*

A hardware component that can be changed without disrupting operations is known as ____________ .

*hot swappable* *page 247*

Many network problems can be traced to poor cable _______ techniques.

*installation* *page 164*

The portion of the PSTN that connects any residence or business to the nearest CO is known as the _________.

*local loop/last mile* *page 555*

____________ provide a Web-based client for checking e-mail.

*mail servers* *page 3* ____ provide a Web-based client for checking e-mail. a. Access servers b. Mail servers c. File servers d. Web servers

__________ WANS are the most fault-tolerant type of WAN because they provide multiple routes for data to follow between any two points.

*mesh* *page 287* and *page 552*

A ______________ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.

*network monitor* *page 443*

One of the most common transmission flaws affecting data signals is___________.

*noise* *page 251*

Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying _______ protocols.

*non-routable* *?*

NICs contain a(n)_____________, which transmits and receives data signals.

*page 12* network *port* *page 180 Transceiver*: The NIC contains a transceiver that transmits and receives data signals over the network media.

Which statement describes an advantage of networks?

*page 2* *Networks enable multiple users to share resources* A. Networks require decentralized management. B. Isolating network devices decreases costs. C. Isolating network devices allows implementation of the sneakernet file sharing method. D. Networks enable multiple users to share resources.

_________ is a technology used with fiber-optic cable, which enables one fiber-optic connection to carry multiple light signals simultaneously.

*page 218: WDM (Wave Division Multiplexing)* a. Statistical multiplexing b. WDM (wavelength division multiplexing) c. TDM (time division multiplexing) d. FDM (frequency division multiplexing)

A ________ facilitates communication and resource sharing between other computers on the network

*page 3 protocols* *page 11* Regardless...the [operating systems] on a *network are able to communicate with each other* via the *PROTOCOLS* they have in comm. The two primary protocols are TCP (Transmission Control Protocol) and IP (Internet Protocol) and the suite of all the protocols an OS uses for communication on a network is the TCP/IP suite of protocols. *If the choices below are the only choices, the best of these would need to be "SERVER"* A. workstation B. personal computer C. servlet D. server *page 351*: As its name implies, the handshake protocol allows the CLIENT and SERVER to introduce themselves to each other and establishes terms for how they will securely exchange date...(when you're reading #2 item on that textpage) The server may choose to issue to the browser [provides the resource, otherwise referred to as a service]

TCP is a(n) _____________ protocol.

*page 751 glossary definition*: a *core protocol of the TCP/IP suite* that makes a connection with the end host, checks whether data is received, and resends it if it is not. If the choices below are given, then the choice would be *connection-oriented*as explained by the def's. on pg. 21 TCP is a(n) ____ subprotocol. a. connection-oriented b. connectionless c. indiscriminating d. open-ended *page 21* *definition of connection-oriented protocol* [An example of a connection-oriented protocol is TCP] which makes a connection with the end host, checks whether the data is received, and resends it if it is not. *page 21* *definition of connectionless protocol* An example of a connectionless protocol is UDP] does not guarantee deliver by first connecting and checking whether data is received

________ Networks are the most popular type of network for medium- and large-scale organizations.

*page 9* *client/server* *If a "SMALL" organization would be considered 15 computers or smaller", then peer-to-peer becomes to cumbersome a topology for the network administrator, once the network is larger than a small organization* A. Client/server B. Stand-alone C. Peer-to-peer D. Stationary

Transport layer protocols break large data units into __________.

*segments* *page 22*

A network mgt. agent is a _________ that collects in about a device's operation and provides it to the network mgt. application.

*software routine* *page 438*

Most Ethernet networks are based on the ___________ topology

*star* *page 158-9* : If you were to tour hundresd of data centers....you would see similar equipment and cabling arrangements . That's because orgs. tend to follow ...TIA...Structured cabling is based on a hierarchical design and assumes a network is based on the star topology.

The most significant factor in choosing a transmission method is its ________.

*throughput* *page 219*

____________ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.

*virtual desktops* (*HVD*) *page 335*

__________ software searches a node for open ports.

Port scanner *page 388*


Related study sets

breeds of companion animals: dogs

View Set

Chapter 34 Drug Therapy for Fluid Volume Excess

View Set

AP Human Geography Religion unit

View Set

RN Targeted Medical Surgical Neurology & Musculoskeletal Online Practice 2019

View Set

BIO 264 : Module 3 Practice Quiz'

View Set