Networking Chapter 1-2
Which of these is considered a secure place to store a list of documented network passwords?
A password manager
What is the name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?
Active Directory
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?
Entrance Facility
In the client-server model, what is the primary protocol used for communication between a browser and web server?
HTTP
What is the fundamental distinction between a node and a host?
Host is a computer that hosts a resource on the network; Node is any computer that can be addressed on the network
Which email protocol allows an email client to read mail stored on the mail server?
IMAP4
At the Network layer, what type of address is used to identify the receiving host?
IP address
In a large organization, how do you typically request permission to perform a network change?
In a large organization, when requesting a network change you may want to first submit a change request document, then understand and follow the approval process, have the change project-managed, provide additional documentation, and close the change.
A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
Layer 1 (Physical Layer); Layer 2 (Data Link Layer)
A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you begin troubleshooting? Which OSI layer is responsible for not dropping the Skype connection?
Layer 5 (Session Layer); Layer 7 (Application Layer)
A user complains that he cannot access a particular website, although he is able to access other websites. At which layer of the OSI model should you begin troubleshooting this problem?
Layer 7 (Application Layer)
What is the first step of inventory management?
List all components on the network
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demarc.
At the Data Link Layer, which of the network address is used to identify the receiving node?
MAC adress
There is only one ____ per network, but there can be many ___ connecting internal portions of the network.
MDF, IDFs
Why is it important to minimize cable clutter in a rack?
Minimizing cable clutter can help prevent airflow blockages
What are some elements that are typically included in network diagrams?
Network diagrams may show physical layout, logical topology, IP address reserves, names of major network devices, and types of transmission data.
Which email protocol allows an email client to download email messages to the local computer?
POP3
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Patch Cable
Which type of address is used at the Transport layer to identify the receiving application?
Port
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Rack Ears
What is the unit of measurement that defines the space available in a rack? How tall are standard racks?
Rack Unit (RU); 19 inch
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Remote Desktop
Which of the following devices are you likely to find in the MDF? Choose all that apply.
Routers; Switches; KVM switch
Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
SSL and TLS
What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work?
Segment; Datagram; Layer 4: Transport Layer
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
In Question 8, suppose a new switch is connected to the first switch by way of a network cable, and three computers are connected to the new switch. Which network topology is now used?
Star-bus
What is the fundamental distinction between a Layer 2 switch and a router?
Switch belongs only to one network; Router belongs to more than one network
Why is it important to use a structured cabling standard when installing and managing cabling systems?
The structured cabling standard describes the best way to maximize performance and minimize upkeep.
How can you go about gathering the information needed to assemble a thorough operations manual?
Visits to data rooms, an examination of servers and desktops, a review of receipts for software and hardware purchases, and the use of a protocol analyzer or network management software package
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
VoIP Gateway
What is the fundamental distinction between a MAN and a WAN?
WANs expand over a larger geographical area than MANs; MANs cover a small geographical area. WANs cover a large geographical area
What type of diagram shows a graphical representation of a network's wired infrastructure?
Wiring schematic
You've decided to run a Nmap scan on your network. What app could you open to perform this task? Choose all that apply.
Zenmap; Command Prompt; PowerShell
List some good names for devices on your home network or on the network in your school's lab. Demonstrate the use of best practices when creating a naming scheme for devices on a computer network.
hec-02-ne-01-rtr2: HEC building, 2nd floor, northeast corner, rack number, type of device, number of the device
For what time period should you schedule a network change?
A network change should be completed during off-hours where everyone must be informed of and agree to this maintenance window in advance.
Why is it important to use plenumrated cabling in the area above the ceiling tile?
Because it is coated with a flame-resistant jacket that produces less smoke when on fire
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support without the upgrade?
Client-server
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
Peer-to-Peer