networking foundations
IPv6 bits
128 bits in length
Based on the data exchange represented by the arrows, determine the IP address of the DNS server.
192.0.2.10
In the topology shown, Client 2 is using Network Address Translation (NAT) to connect to the web server. Identify Client 2's Inside Global address.
192.0.2.102
IPv4 bits
32 bits in length
Consider the topology where Server 1, inside a corporate network, is learning time from an Internet-based NTP server. After learning time from the Internet, Server 1 can use NTP to provide time to devices in the corporate network. What will be the Stratum value of Server 1?
5
How many channels of separation should you have in a 2.4 GHz wireless network to avoid overlapping frequencies?
5
You are using a wireless network analyzer to determine what channels are currently in use on a network. The analyzer displays the output shown in the image. What wireless frequency band are you examining?
5 Ghz
ad hoc wireless LAN
An ad hoc wireless LAN allows two wireless clients to use either Bluetooth or Wi-Fi to communicate directly between themselves, without the need for a wireless infrastructure.
layer 2 ethernet switch
when it receives frames from attached devices, it records that a frame's source MAC address is available off of the port on which the frame was received. This process of recording MAC address to port mapping constructs the switch's MAC address table.
what network service translates names into corresponding IP addresses?
DNS
What is the sequence of messages exchanged when a network client obtains IP address information using DHCP?
Discover, Offer, Request, Acknowledgement (DORA)
IaaS
Infrastructure as a Service (IaaS) offers compute and storage resources in the cloud.
In a NAT configuration, what name is given to the private IP address inside a network?
Inside Local
Internet of Things (IoT) devices
Internet of Things (IoT) devices are considered to be non-standard computing devices that have network connectivity (typically wireless connectivity).
Internet of Things (IoT) technology
Internet of Things (IoT) technology interconnects items that were traditionally stand-alone devices. As an example, your doorbell might send a notification to your smartphone letting you know someone is at your door.
You are writing a Python application that will send instructions to an SDN controller, and you need to decide how to format those instructions. Which of the following data formatting types is commonly used to send instructions from an application to an SDN controller?
JSON
MAC address bits
MAC address contains 48 bits, the first 24 bits identify a vendor, and the remaining 24 bits are assigned by a vendor.
Your company has a group of developers that create software for a wide variety of platforms. However, you are concerned with the expense associated with purchasing each of those platforms for each developer to use. What cloud technology might be appropriate to alleviate your budgetary concerns?
PaaS
PaaS
Platform as a Service (PaaS) offers a variety of computing platforms to help developers write and test code for multiple operating systems and hardware platforms.
Consider the topology, and identify the device labeled with a question mark.
SDN controller
SaaS
Software as a Service (SaaS) offers applications that are typically accessible using a web browser.
Layer 4 of theOSI model
TCP and UDP reside at the Transport layer of the OSI model, also know as Layer 4
what port number is used by HTTP?
TCP port 80
Target wake time (TWT)
Wi-Fi 6 feature that allows a wireless access point to tell a client when it's allowed to transmit and receive, which improves the issue of having multiple clients contenting for the same bandwidth at the same time.
MAC address
a MAC address is a 48-bit address typically written as a series of 12 hexadecimal digits. The first 24 bits is known as the organizationally unique identifier (OUI), also known as the vendor code. each manufacturer of NICs is assigned one or more unique vendor codes.
network interface card (NIC) circuitry
a NIC can be external or internal to a network client, and it provides the circuitry required for that client to connect into a network, either via a wired or wireless connection.
subnet mask
a series of 32 bits and is used to identify the network and host portions of an IPv4
which network category refers to a network that interconnects nearby buildings? a. CAN b. MAN c. PAN d. WAN
a. CAN
Identify the network device in the picture. a. NIC b. CAM c. MAC d. UDP
a. NIC
PC A is obtaining IP address information from the Server through an exchange of Discover, Offer, Request, and Acknowledgement messages. If you were to examine on e of the packets in this exchange, what port number would be used by the packet? a. UDP port 67 b. UDP port 53 c. TCP port 443 d. UDP port 123
a. UDP port 67
a layer 2 ethernet switch constructs a MAC address table. what information is contained in this table? a. a mapping of MAC addresses to the ports off of which they were learned b. a mapping of IP addresses to the ports off of which they were learned c. IP route entries learned via routing protocols (e.g. OSPF) d. TCP and/or UDP port numbers associated with each frame.
a. a mapping of MAC addresses to the ports off of which they were learned
Of the seven layers of the OSI model, which layer is concerned with physical addressing? a. data link b. physical c. application d. network
a. data link
what type of network cabling is shown in the image? a. fiber optic b. unshielded twisted pair c. coaxial d. shielded twisted pair
a. fiber optic
there are several variants of the TCP/IP model, which layers of OSI model are included in the TCP/IP model's network access layer? a. physical, data link b. session, network, application c. session, presentation, and application d. session, presentation, physical
a. physical, data link
the process if a wireless client attaching to an access point (AP) with the strongest signal as the client moves around a wireless coverage area is called what? a. romaing b. multi-homing c. browsing d. port scanning
a. roaming
identify the device in the topology shown labeled with a question mark. a. router b. NIC c. switch d. access point
a. router
what type of fiber-optic cabling is typically used for long distance applications? a. single-mode b. UTP c. multi-mode d. STP
a. single-mode
What type of wireless LAN allows two wireless client to communicate directly between themselves, without the need for a wireless access point?
ad hoc wireless LAN
a container
allows applications that need to run on a common operating system to run on a single instance of that operating system, as opposed to the VM approach of having a separate operating system installation for each virtual machine. Specifically, a container contains all of the files necessary (e.g. executable and library files) to run an application, without containing an operating system.
IPv6 address used to identify a host on this network
an IPv6 address is 128 bits in length. if the prefix length is 64 bits, that means the poriton of the address representing the network is 64 bits in length and the remaining bits are host bits. therefore, the number of hosts bits = 128 bits - 64 bits = 64 bits
You work for a major cellular provider, which currently provides widespread coverage supporting both 3G and 4G technologies. Now, your company has the initiative of moving towards support of 5G. What major infrastructure components will you need to add to your existing network?
antennas
Although a MAC address is typically written using hexadecimal notation, how many binary bits are contained in a MAC address? a. 128 b. 48 c. 24 d. 32
b. 48
what contains the circuitry required for a client to connect to a network? a. MAC b. NIC c. server d. router
b. NIC
you performed a packet capture of traffic on the network. the packet highlighted in the graphic came from a network interface card (NIC) manufactured by Samsung, and it has a MAC address of d0:03:df:89:52:fc . what portion of the MAC address identified the NIC manufacturer as Samsung? a. d0:03 b. d0:03:df c. 52:fc d. 89:52:fc
b. d0:03:df
The graphic shows a data center located at a company's headquarters sending real-time updates to a hot site, which is an off-site location containing duplicate server hardware. In this topology, when a change is made to a server in the HQ data center, that change is immediate sent to the hot site, such that the servers at the hot site are essentially a mirror image of the data center servers. This illustrates which of the following network benefits? a. monitoring b. redundancy c. resource sharing d. communications
b. redundancy if the HQ data center becomes unavailable, a redundant copy of the data can be accessed at the off-site data center
In an IPv4 address, what is used to identify the network and host portions of the address? a. octet b. subnet masks c. vlan d. quartet
b. subnet mask
Identify the device in the topology shown labeled with a question mark. a. access point b. switch c. NIC d. router
b. switch
TCP and UDP reside at what layer of the OSI model? a. data-link b. transport c. application d. network
b. transport
you want to know the IPv4 address of an Apple Mac computer you're using, so you issue the ipconfig command in MacOS. the output is shown below, from this output, what is the IPv4 address? a. 2600:1700:35f0:7640:1034:3f5b:9812:ddb3 b. fe80::c1:3f7d:fe98:4279 c. 172.16.109.74 d. d0:81:7a:d5:49:e3
c. 172.16.109.74
which acronym is used to describe a network that interconnects devices that were traditionally stand-alone devices, such as doorbells, thermostats, and appliances. a. VM b. SaaS c. IoT d. VPN
c. IoT
which of the following is NOT an example of an IoT device? a. dishwasher with wireless network connectivity b. smart thermostat c. desktop PC d. smart TV
c. desktop PC
which statement is NOT true about networks? a. networks allow resource sharing b. networks increase redundancy c. networks increase administrative burden due to the addition of network devices. d. networks allow better monitoring of connected devices.
c. networks increase administrative burden due to the addition of network devices
what type of twisted pair cabling should be installed in areas used for air return ducts in HVAC system (e.g. below a raised floor or above a drop ceiling)? a. multi-mode b. shielded c. plenum d. unshielded
c. plenum
what type of network cabling is shown in the image? a. coaxial b. fiber optic c. shielded twisted pair d. unshielded twisted pair
c. shielded twisted pair
campus area network (CAN)
can interconnect nearby buildings, each of which have a LAN within the building. A CAN is often found in university or business campuses.
a software defined network (SDN) controller
communicates with applications (typically written in the Python programming language) using a Northbound Interface (NBI), and it communicates with network devices (e.g. routers and switches) using a Southbound Interface (SBI).
There are three Microsoft Windows applications you wish to run on a Linux platform, while being isolated from one another. Although you could install three separate virtual machines (VMs) on the Linux platform (i.e. one VM for each application), you would be installing three separate instances of Microsoft Windows. What alternate approach to using VMs would be more efficient in terms of storage required on underlying Linux platform?
container
you're examining the output of the ipconfig command issued on an Apple Mac running MacOS ,which shows IP address information for the computer. you notice that this computer has na IPv6 address of 2600:1700:35f0:7640:1034:3f5b:9812:ddb3 and a prefix length of 64 bits. based on this information, how many its are used to identify a host on this network? a. 16 b. 32 c. 128 d. 64
d. 64
You are asked to design a small network for an office. The design requires communication between 3 PCs, a printer, and a server. You create the design shown in the figure, and you are ready to present the design to your client. When describing your design, how will you classify your proposed network? a. WAN b. MAN c. PAN d. LAN
d. LAN
Identify the device in the topology shown labeled with a question mark. a. NIC b. router c. switch d. access point
d. access point
what is the name of the protocol data unit (PDU) routed by routers? a. bit b. frame c. segment d. packet
d. packet
the TCP/IP model application layer combines which 3 OSI Model layers? a. Data-link, transport, application b. session, presentation, physical c. session, network, application d. session, presentation, application
d. session, presentation, application
What type of wireless antenna is most appropriate for interconnecting nearby buildings?
directional
DNS
domain name system, translates names into a corresponding IP address.
T or F: an IPv6 is 32 bits in length
false
wireless access point (AP)
has a single connection back to a wired network, and it connects to end-user devices wirelessly.
shielded twisted pair
has foil wrapped around each pair of wires that acts as shielding from electromagnetic interference.
You're doing a design review of a proposed wireless network. A simplified version of the proposed topology is shown. What type of wireless LAN is being proposed?
infrastructure
Local Area Network (LAN)
interconnects networked devices that are in close proximity with one another (e.g. within an office)
Virtual Private Network (VPN)
is able to protect data flowing across an untrusted network (e.g. the Internet) by encrypting that traffic. As a result, if a malicious user intercepted the encrypted traffic, they would not be able to interpret the data.
plenum cabling
is the type of twisted pair cabling used in air return areas of an HVAC system, because it will not release toxic fumes in the presence of heat.
the truth about networks and administrative burden
networks typically reduce the administrative burden of an IT staff due in part to having a single point of administration for network clients and network services.
Dynamic Host Configuration Protocol (DHCP)
obtaining IP address information from a server through an exchange of Discover, Offer, Request, and Acknowledgement messages is a function of Dynamic Host Configuration Protocol (DHCP). DHCP uses UDP port 67
You are installing the wireless router shown in the image. What type of antennas are used by this wireless router?
omnidirectional (specifically dipole antenna)
network interface card (NIC)
provides the circuitry required for a client to connect into a network. usually has an RJ-45 receptacle into which you could insert an ethernet cable.
a router interface's buffer is also known as
queue
You're working with the topology shown. Your router that connects to the Internet is a potential point of congestion in your network, because it's receiving data from the LAN at 1 Gbps but transmit data to the Internet at only 100 Mbps. You've categorized traffic into two classes: (1) VoIP traffic and (2) Best Effort traffic. You want to protect your voice over IP (VoIP) traffic such that you won't drop VoIP packets if there is a burst of best effort traffic. What QoS mechanism will you use on the router?
queueing
"inside" address
refers to a device that is inside the network
"global" address
refers to an IP address that is globally routable.
Inside local NAT address
refers to the private (i.e. Local) IP address assigned to a device on the inside of a network.
a type 2 hypervisor
runs on top of an underlying operating system. so you could use hypervisor software (e.g. such as VMware Fusion) to run on your Mac operating system, and then install Microsoft Windows on top of the Type 2 hypervisor.
In the topology shown, PC A is learning the first 64 bits of its address from router R1, and it's self-generating the last 64 bits of its address, using EUI-64. It learns other address information (e.g. the address of a DNS server) from a DHCP server. What type of DHCP is being used in this scenario?
stateless DHCPv6
What NTP parameter indicates the believability of a network time source?
stratum value
layers 5-7 of OSI model
the OSI model has 7 layers. layers 5-7 of that model are combined into a single application layer of the TCP/IP model. Layer 5 is the session layer. Layer 6 is the Presentation layer, and Layer 7 is the Application Layer
packet
the name given to data at Layer 3, which is where a router resides
single-mode fiber optic cabling
typically used for long distance applications, because it does not suffer from multi-mode delay distortion, which results in bits arriving out of order dur to multiple paths of propagation
queue or buffer
A router interface has memory set aside to store packets that cannot be sent at the moment. This memory is often referred to as a "buffer" or a "queue."
With previous Wi-Fi standards, the throughput for wireless clients dropped as the number of wireless clients associated with an access point increased. The issue was, only one wireless client could communicate with a single antenna at any moment. As a result, in a network with a high density of wireless clients, the clients would listen to transmissions in order to make sure no one else was transmitting to its antenna at that time. If there was an existing transmission occurring, the wireless client would have to wait a random amount of time and try again. In the topology, both Wireless Client 1 and Wireless Client 2 wish to transmit at the same time. However, these clients are using Wi-Fi 6. What Wi-Fi 6 feature will prevent the previous contention issue?
TWT
QoS queueing mechanism
The QoS queuing mechanism can take a router's interface queue and divide it into sub-queues. Then, traffic you've already classified and marked can be placed in appropriate queues based on those existing markings. By performing this queue separation, you're protecting one queue from a data burst in the other queue.
T or F: a switch typically has multiple ports into which network devices are connected
True
You are running macOS on your desktop computer. However, you need to run a couple of applications that only run on Microsoft Windows. Someone told you that a way to run both Mac and Microsoft Windows applications on your Mac computer is to run Microsoft Windows in a virtual machine (VM). However, when you look for virtual machine software, you discover you need to run a hypervisor on your computer. What hypervisor type is appropriate in your situation?
Type 2
For cost savings, your company has moved many of its applications and storage from your local data center to a cloud provider. However, you have a concern that employees are accessing the cloud provider over the Internet, which is considered to be an untrusted network. What technology can you use to secure data exchanged between your corporate office and your cloud provider?
VPN
Stratum Value
When one NTP devices learns time from another NTP device, the Stratum value of the time source is incremented by 1 on the device learning the time.