networking foundations

Ace your homework & exams now with Quizwiz!

IPv6 bits

128 bits in length

Based on the data exchange represented by the arrows, determine the IP address of the DNS server.

192.0.2.10

In the topology shown, Client 2 is using Network Address Translation (NAT) to connect to the web server. Identify Client 2's Inside Global address.

192.0.2.102

IPv4 bits

32 bits in length

Consider the topology where Server 1, inside a corporate network, is learning time from an Internet-based NTP server. After learning time from the Internet, Server 1 can use NTP to provide time to devices in the corporate network. What will be the Stratum value of Server 1?

5

How many channels of separation should you have in a 2.4 GHz wireless network to avoid overlapping frequencies?

5

You are using a wireless network analyzer to determine what channels are currently in use on a network. The analyzer displays the output shown in the image. What wireless frequency band are you examining?

5 Ghz

ad hoc wireless LAN

An ad hoc wireless LAN allows two wireless clients to use either Bluetooth or Wi-Fi to communicate directly between themselves, without the need for a wireless infrastructure.

layer 2 ethernet switch

when it receives frames from attached devices, it records that a frame's source MAC address is available off of the port on which the frame was received. This process of recording MAC address to port mapping constructs the switch's MAC address table.

what network service translates names into corresponding IP addresses?

DNS

What is the sequence of messages exchanged when a network client obtains IP address information using DHCP?

Discover, Offer, Request, Acknowledgement (DORA)

IaaS

Infrastructure as a Service (IaaS) offers compute and storage resources in the cloud.

In a NAT configuration, what name is given to the private IP address inside a network?

Inside Local

Internet of Things (IoT) devices

Internet of Things (IoT) devices are considered to be non-standard computing devices that have network connectivity (typically wireless connectivity).

Internet of Things (IoT) technology

Internet of Things (IoT) technology interconnects items that were traditionally stand-alone devices. As an example, your doorbell might send a notification to your smartphone letting you know someone is at your door.

You are writing a Python application that will send instructions to an SDN controller, and you need to decide how to format those instructions. Which of the following data formatting types is commonly used to send instructions from an application to an SDN controller?

JSON

MAC address bits

MAC address contains 48 bits, the first 24 bits identify a vendor, and the remaining 24 bits are assigned by a vendor.

Your company has a group of developers that create software for a wide variety of platforms. However, you are concerned with the expense associated with purchasing each of those platforms for each developer to use. What cloud technology might be appropriate to alleviate your budgetary concerns?

PaaS

PaaS

Platform as a Service (PaaS) offers a variety of computing platforms to help developers write and test code for multiple operating systems and hardware platforms.

Consider the topology, and identify the device labeled with a question mark.

SDN controller

SaaS

Software as a Service (SaaS) offers applications that are typically accessible using a web browser.

Layer 4 of theOSI model

TCP and UDP reside at the Transport layer of the OSI model, also know as Layer 4

what port number is used by HTTP?

TCP port 80

Target wake time (TWT)

Wi-Fi 6 feature that allows a wireless access point to tell a client when it's allowed to transmit and receive, which improves the issue of having multiple clients contenting for the same bandwidth at the same time.

MAC address

a MAC address is a 48-bit address typically written as a series of 12 hexadecimal digits. The first 24 bits is known as the organizationally unique identifier (OUI), also known as the vendor code. each manufacturer of NICs is assigned one or more unique vendor codes.

network interface card (NIC) circuitry

a NIC can be external or internal to a network client, and it provides the circuitry required for that client to connect into a network, either via a wired or wireless connection.

subnet mask

a series of 32 bits and is used to identify the network and host portions of an IPv4

which network category refers to a network that interconnects nearby buildings? a. CAN b. MAN c. PAN d. WAN

a. CAN

Identify the network device in the picture. a. NIC b. CAM c. MAC d. UDP

a. NIC

PC A is obtaining IP address information from the Server through an exchange of Discover, Offer, Request, and Acknowledgement messages. If you were to examine on e of the packets in this exchange, what port number would be used by the packet? a. UDP port 67 b. UDP port 53 c. TCP port 443 d. UDP port 123

a. UDP port 67

a layer 2 ethernet switch constructs a MAC address table. what information is contained in this table? a. a mapping of MAC addresses to the ports off of which they were learned b. a mapping of IP addresses to the ports off of which they were learned c. IP route entries learned via routing protocols (e.g. OSPF) d. TCP and/or UDP port numbers associated with each frame.

a. a mapping of MAC addresses to the ports off of which they were learned

Of the seven layers of the OSI model, which layer is concerned with physical addressing? a. data link b. physical c. application d. network

a. data link

what type of network cabling is shown in the image? a. fiber optic b. unshielded twisted pair c. coaxial d. shielded twisted pair

a. fiber optic

there are several variants of the TCP/IP model, which layers of OSI model are included in the TCP/IP model's network access layer? a. physical, data link b. session, network, application c. session, presentation, and application d. session, presentation, physical

a. physical, data link

the process if a wireless client attaching to an access point (AP) with the strongest signal as the client moves around a wireless coverage area is called what? a. romaing b. multi-homing c. browsing d. port scanning

a. roaming

identify the device in the topology shown labeled with a question mark. a. router b. NIC c. switch d. access point

a. router

what type of fiber-optic cabling is typically used for long distance applications? a. single-mode b. UTP c. multi-mode d. STP

a. single-mode

What type of wireless LAN allows two wireless client to communicate directly between themselves, without the need for a wireless access point?

ad hoc wireless LAN

a container

allows applications that need to run on a common operating system to run on a single instance of that operating system, as opposed to the VM approach of having a separate operating system installation for each virtual machine. Specifically, a container contains all of the files necessary (e.g. executable and library files) to run an application, without containing an operating system.

IPv6 address used to identify a host on this network

an IPv6 address is 128 bits in length. if the prefix length is 64 bits, that means the poriton of the address representing the network is 64 bits in length and the remaining bits are host bits. therefore, the number of hosts bits = 128 bits - 64 bits = 64 bits

You work for a major cellular provider, which currently provides widespread coverage supporting both 3G and 4G technologies. Now, your company has the initiative of moving towards support of 5G. What major infrastructure components will you need to add to your existing network?

antennas

Although a MAC address is typically written using hexadecimal notation, how many binary bits are contained in a MAC address? a. 128 b. 48 c. 24 d. 32

b. 48

what contains the circuitry required for a client to connect to a network? a. MAC b. NIC c. server d. router

b. NIC

you performed a packet capture of traffic on the network. the packet highlighted in the graphic came from a network interface card (NIC) manufactured by Samsung, and it has a MAC address of d0:03:df:89:52:fc . what portion of the MAC address identified the NIC manufacturer as Samsung? a. d0:03 b. d0:03:df c. 52:fc d. 89:52:fc

b. d0:03:df

The graphic shows a data center located at a company's headquarters sending real-time updates to a hot site, which is an off-site location containing duplicate server hardware. In this topology, when a change is made to a server in the HQ data center, that change is immediate sent to the hot site, such that the servers at the hot site are essentially a mirror image of the data center servers. This illustrates which of the following network benefits? a. monitoring b. redundancy c. resource sharing d. communications

b. redundancy if the HQ data center becomes unavailable, a redundant copy of the data can be accessed at the off-site data center

In an IPv4 address, what is used to identify the network and host portions of the address? a. octet b. subnet masks c. vlan d. quartet

b. subnet mask

Identify the device in the topology shown labeled with a question mark. a. access point b. switch c. NIC d. router

b. switch

TCP and UDP reside at what layer of the OSI model? a. data-link b. transport c. application d. network

b. transport

you want to know the IPv4 address of an Apple Mac computer you're using, so you issue the ipconfig command in MacOS. the output is shown below, from this output, what is the IPv4 address? a. 2600:1700:35f0:7640:1034:3f5b:9812:ddb3 b. fe80::c1:3f7d:fe98:4279 c. 172.16.109.74 d. d0:81:7a:d5:49:e3

c. 172.16.109.74

which acronym is used to describe a network that interconnects devices that were traditionally stand-alone devices, such as doorbells, thermostats, and appliances. a. VM b. SaaS c. IoT d. VPN

c. IoT

which of the following is NOT an example of an IoT device? a. dishwasher with wireless network connectivity b. smart thermostat c. desktop PC d. smart TV

c. desktop PC

which statement is NOT true about networks? a. networks allow resource sharing b. networks increase redundancy c. networks increase administrative burden due to the addition of network devices. d. networks allow better monitoring of connected devices.

c. networks increase administrative burden due to the addition of network devices

what type of twisted pair cabling should be installed in areas used for air return ducts in HVAC system (e.g. below a raised floor or above a drop ceiling)? a. multi-mode b. shielded c. plenum d. unshielded

c. plenum

what type of network cabling is shown in the image? a. coaxial b. fiber optic c. shielded twisted pair d. unshielded twisted pair

c. shielded twisted pair

campus area network (CAN)

can interconnect nearby buildings, each of which have a LAN within the building. A CAN is often found in university or business campuses.

a software defined network (SDN) controller

communicates with applications (typically written in the Python programming language) using a Northbound Interface (NBI), and it communicates with network devices (e.g. routers and switches) using a Southbound Interface (SBI).

There are three Microsoft Windows applications you wish to run on a Linux platform, while being isolated from one another. Although you could install three separate virtual machines (VMs) on the Linux platform (i.e. one VM for each application), you would be installing three separate instances of Microsoft Windows. What alternate approach to using VMs would be more efficient in terms of storage required on underlying Linux platform?

container

you're examining the output of the ipconfig command issued on an Apple Mac running MacOS ,which shows IP address information for the computer. you notice that this computer has na IPv6 address of 2600:1700:35f0:7640:1034:3f5b:9812:ddb3 and a prefix length of 64 bits. based on this information, how many its are used to identify a host on this network? a. 16 b. 32 c. 128 d. 64

d. 64

You are asked to design a small network for an office. The design requires communication between 3 PCs, a printer, and a server. You create the design shown in the figure, and you are ready to present the design to your client. When describing your design, how will you classify your proposed network? a. WAN b. MAN c. PAN d. LAN

d. LAN

Identify the device in the topology shown labeled with a question mark. a. NIC b. router c. switch d. access point

d. access point

what is the name of the protocol data unit (PDU) routed by routers? a. bit b. frame c. segment d. packet

d. packet

the TCP/IP model application layer combines which 3 OSI Model layers? a. Data-link, transport, application b. session, presentation, physical c. session, network, application d. session, presentation, application

d. session, presentation, application

What type of wireless antenna is most appropriate for interconnecting nearby buildings?

directional

DNS

domain name system, translates names into a corresponding IP address.

T or F: an IPv6 is 32 bits in length

false

wireless access point (AP)

has a single connection back to a wired network, and it connects to end-user devices wirelessly.

shielded twisted pair

has foil wrapped around each pair of wires that acts as shielding from electromagnetic interference.

You're doing a design review of a proposed wireless network. A simplified version of the proposed topology is shown. What type of wireless LAN is being proposed?

infrastructure

Local Area Network (LAN)

interconnects networked devices that are in close proximity with one another (e.g. within an office)

Virtual Private Network (VPN)

is able to protect data flowing across an untrusted network (e.g. the Internet) by encrypting that traffic. As a result, if a malicious user intercepted the encrypted traffic, they would not be able to interpret the data.

plenum cabling

is the type of twisted pair cabling used in air return areas of an HVAC system, because it will not release toxic fumes in the presence of heat.

the truth about networks and administrative burden

networks typically reduce the administrative burden of an IT staff due in part to having a single point of administration for network clients and network services.

Dynamic Host Configuration Protocol (DHCP)

obtaining IP address information from a server through an exchange of Discover, Offer, Request, and Acknowledgement messages is a function of Dynamic Host Configuration Protocol (DHCP). DHCP uses UDP port 67

You are installing the wireless router shown in the image. What type of antennas are used by this wireless router?

omnidirectional (specifically dipole antenna)

network interface card (NIC)

provides the circuitry required for a client to connect into a network. usually has an RJ-45 receptacle into which you could insert an ethernet cable.

a router interface's buffer is also known as

queue

You're working with the topology shown. Your router that connects to the Internet is a potential point of congestion in your network, because it's receiving data from the LAN at 1 Gbps but transmit data to the Internet at only 100 Mbps. You've categorized traffic into two classes: (1) VoIP traffic and (2) Best Effort traffic. You want to protect your voice over IP (VoIP) traffic such that you won't drop VoIP packets if there is a burst of best effort traffic. What QoS mechanism will you use on the router?

queueing

"inside" address

refers to a device that is inside the network

"global" address

refers to an IP address that is globally routable.

Inside local NAT address

refers to the private (i.e. Local) IP address assigned to a device on the inside of a network.

a type 2 hypervisor

runs on top of an underlying operating system. so you could use hypervisor software (e.g. such as VMware Fusion) to run on your Mac operating system, and then install Microsoft Windows on top of the Type 2 hypervisor.

In the topology shown, PC A is learning the first 64 bits of its address from router R1, and it's self-generating the last 64 bits of its address, using EUI-64. It learns other address information (e.g. the address of a DNS server) from a DHCP server. What type of DHCP is being used in this scenario?

stateless DHCPv6

What NTP parameter indicates the believability of a network time source?

stratum value

layers 5-7 of OSI model

the OSI model has 7 layers. layers 5-7 of that model are combined into a single application layer of the TCP/IP model. Layer 5 is the session layer. Layer 6 is the Presentation layer, and Layer 7 is the Application Layer

packet

the name given to data at Layer 3, which is where a router resides

single-mode fiber optic cabling

typically used for long distance applications, because it does not suffer from multi-mode delay distortion, which results in bits arriving out of order dur to multiple paths of propagation

queue or buffer

A router interface has memory set aside to store packets that cannot be sent at the moment. This memory is often referred to as a "buffer" or a "queue."

With previous Wi-Fi standards, the throughput for wireless clients dropped as the number of wireless clients associated with an access point increased. The issue was, only one wireless client could communicate with a single antenna at any moment. As a result, in a network with a high density of wireless clients, the clients would listen to transmissions in order to make sure no one else was transmitting to its antenna at that time. If there was an existing transmission occurring, the wireless client would have to wait a random amount of time and try again. In the topology, both Wireless Client 1 and Wireless Client 2 wish to transmit at the same time. However, these clients are using Wi-Fi 6. What Wi-Fi 6 feature will prevent the previous contention issue?

TWT

QoS queueing mechanism

The QoS queuing mechanism can take a router's interface queue and divide it into sub-queues. Then, traffic you've already classified and marked can be placed in appropriate queues based on those existing markings. By performing this queue separation, you're protecting one queue from a data burst in the other queue.

T or F: a switch typically has multiple ports into which network devices are connected

True

You are running macOS on your desktop computer. However, you need to run a couple of applications that only run on Microsoft Windows. Someone told you that a way to run both Mac and Microsoft Windows applications on your Mac computer is to run Microsoft Windows in a virtual machine (VM). However, when you look for virtual machine software, you discover you need to run a hypervisor on your computer. What hypervisor type is appropriate in your situation?

Type 2

For cost savings, your company has moved many of its applications and storage from your local data center to a cloud provider. However, you have a concern that employees are accessing the cloud provider over the Internet, which is considered to be an untrusted network. What technology can you use to secure data exchanged between your corporate office and your cloud provider?

VPN

Stratum Value

When one NTP devices learns time from another NTP device, the Stratum value of the time source is incremented by 1 on the device learning the time.


Related study sets

Unit 5 Genetics study guide concept 3

View Set

4 things all Cells have in common

View Set

EMT all flashcards which term need to be studied

View Set

Chapter 8: Dog Breed Identification & Management Review

View Set

All Saunders Nclex-Q that pertain to exam 2

View Set

Chapter 3 - Money Management Strategy: Financial Statements and Budgeting

View Set