Ultimate Network+ Study Guide
Class A IP Addresses
1.0.0.0-127.0.0.0 0-127, Subnet Mask of 255.0.0.0, default CIDR of /8 1.x.x.x - 126.x.x.x 10.x.x.x Mask 255.0.0.0
What is the maximum speed and typical use of CAT 6 UTP cable?
10 Gbps 10 Gibabit Ethernet (10 GbE)
Category 3 Cable Type
10 Mbps
What is the maximum speed and typical use of CAT 3 UTP cable?
10 Mbps Ethernet over UTP at 10 Mbps (10BaseT)
Transfer rate of 10 Base T?
10 megabits per second (Mbps)
10gbase-LR and 10gbase-LW
10,000 mbps, 10,000m, smf
10gbase-ER and 10gbase-EW
10,000 mbps, 40,000m, smf
10gbase-t
10,000mbps, 100m, cat 6 or 7
10gbase-SR and 10gbase-SW
10,000mbps, 300m, mmf
Class A Range (Private IPv4 Address)
10.0.0.0 - 10.255.255.255
Cat5 bandwidth?
10/100 Base-T
Category 5 Cable Type
100 Mbps
What is the maximum speed and typical use of CAT 5 UTP cable?
100 Mbps Ethernet over UTP at 100 Mbps (100BaseTX)
Category 5e Cable Type
100 Mbps and Gigabit networks and is usually rated at 350 MHz, but actual speed varies depending on several different networking factors.
100base-Tx
100 mbps, 100m, cat 5
100base-fx
100 mbps, 2000m, MMF
With an Ethernet 10BasT network, the maximum cable lenght between a computer and the hub is
100 meters
With an Ethernet 10BaseT network, the maximum cable length between a computer and the hub is:
100 meters
Your network follows the 100BaseTx specifications for Fast Ethernet. What is the maximum cable segment
100 meters
Your network follows the 100BaseTx specifications for Fast Ethernet. What is the maximum cable segment length allowed?
100 meters
Max length for Cat5 cable?
100 meters (328 feet)
A host has the address 100.55.177.99/16 Which of the following is the broadcast address for the subnet?
100.55.255.255
A host has the address 100.55.177.99/16. What is the broadcast address for the subnet?
100.55.255.255
1000base-T
1000 mbps, 100m, cat 5
What is the binary format for the following decimal IP address? 131.9.202.111
100000011.00001001.11001010.01101111
What is the binary format for the following decimal IP address? 131.9.202.111
10000011.00001001.11001010.01101111
You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150-ohm shielded twisted pair (STP) wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber-optic cabling. Which Ethernet standard could you implement in this situation
1000BaseCX
You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150ohm shielded twisted pair wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation?
1000BaseCX
Which Gigabit Ethernet standard can support long network segments up to a maximum of 5 km when used with single mode fiber-optic cable?
1000BaseLX
Which Gigabit Ethernet standard can support long network segments up to maximum of 5 km when used with single mode fiber-optic cable?
1000BaseLX
YOu want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose: select 2 1000BaseLX 1000BaseSX single mode fiber multimode fiber 1000BaseCX
1000BaseLX single mode fiber
You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose?(2 answers)
1000BaseLX, 1000BaseSX
Which Gigabit Ethernet standard uses multimode fiber-optic cabling and supports network segments up to a maximum of 550 m long?
1000BaseSX
Which Gigabit Ethernet standard uses multimode fiber-optic cabling and supports network segments up to a maximum of 550 meters long?
1000BaseSX
You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Multimode fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guideline: select 2 1000BaseT 1000BaseCX 10BaseER 1000BaseSX 10BaseSR
1000BaseSX 10BaseSR
You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Multimode fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines?(2 answers)
1000BaseSX, 10GBaseSR
Which of the following use the CSMA/CD access method? select all that apply FDDI token ring 1000BaseT 10BaseT
1000BaseT 10BaseT
Which of the following use the CSMA/CD access method?(2 answers)
1000BaseT, 10BaseT
What is the maximum speed and typical use of CAT 5e UTP cable?
1000Mbps Ethernet over UTP at 1000Mbps (1000BaseTX)
1000base-SX
1000mbps, 500m, mmf
1000base-LX
1000mbps, 550m, mmf
Which of the following Ethernet standards uses fiber optic cabling? 1000BaseCX 100BaseT4 100BaseFX 100BaseTX 1000BaseLX
100BaseFX 1000BaseLX
Which of the following Ethernet standards uses fiber-optic cabling?(2 answers)
100BaseFX, 1000BaseLX
Cat 5 speed:
100Mbits
What is the maximum length of UTP cable?
100m
Ethernet subnetting limit:
1024 in a subnet
You would like to implement 10 Gbps Ethernet over a distance of 1 km or greater. Which of the following would be the minimum requirement for the implementation?(2 answers)
10GBaseLR standards, Single mode fiber
Which of the following standards is used by SONET?
10GBaseLW
which of the following standards is used by SONET? 1000BaseCX 1000BaseLX 10GBaseLW 10GBaseER
10GbaseLW
Cat 6 speed:
10Gbits
Cat 3 speed:
10Mbits or 16Mbits
802.11b
11 Mbps (Data Transfer Rate) and 2.4 GHz Frequency
On what Port is POP3?
110
What is the decimal format of the following binary address?
11001110.00111010.10101010.01000011
On what Port is SUN RPC?
111
Loopback address
127.x.x.x Sometimes called the localhost, a reserved IP address used fror internal testing: 127.0.0.1.
B class range
128 - 191 B: IP 192.168.1.100/23 GW 192.168.2.1
IPv6
128 Bit Address Hexadecimal 0-9,A-F
What is the maximum data rate of an ISDN BRI line?
128 Kbps
Advanced Encryption Standard (AES)
128-,192-, and 256-bit
Temporal Key Integrity Protocol (TKIP)
128-bit encryption level
Class B IP Addresses
128.0.0.0-191.255.0.0 128-191, Subnet Mask of 255.255.0.0, default CIDR of /16 128.x.x.x - 191.x.x.x 172.0-16.x.x Mask 255.255.0.0
Which of the following IP addresses have a default subnet mask of 255.255.0.0? pick all that apply 129.0.0.1 228.23.45.0.1 123.254.19.6 191.168.2.15 168.45.68.1
129.0.0.1 191.168.2.15 168.45.68.1
Which thre3 is not a valid IP address? 129.0.0.272 228.23.450.0.1 365.254.19.6 191.168.2.15 168.45.68.1
129.0.0.272 228.23.450.0.1 365.254.19.6
A host on the network has an IP address of 129.11.99.78 using the deafult subnet mask
129.11.99.78/16
A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation
129.11.99.78/16
Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on your network? 130.15.0.1 130.16.3.89 130.15.60.0
130.16.3.89
Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on your network?
130.16.61.3
In an IP addressing scheme using default subnet masks, which of the following IP addresses can you assign to a host? 132.70.254.15 127.0.0.1 199.45.207.0
132.70.254.15
On what Port is NetBios
135-139
Which of the following IP addresses is a valid IP address for a host on a public network? 172.18.188.67 10.0.12.15 142.15.6.1
142.15.6.1
On what Port is IMAP?
143
On what Port is SQL Server?
1433
What is the speed of an OC-3 connection?
155 mbps
What is the maximum speed and typical use of CAT 4 UTP cable?
16 Mbps Token Ring at 16 mbps
Which port number is used by SNMP?
161
On what Port is SNMP?
161 & 162
What is the first IP address that can be assigned to hosts on the 166.70.0.0?
166.70.0.1
Which of the following is the first IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?
166.70.0.1
What is the last IP address that can be assigned to hosts on the 166.70.0.0
166.70.254.255
Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?
166.70.255.254
What is the network address and subnet mask used by APIPA
169.254.0.0
What is the network address and subnet mask used by APIPA? (Select 2)
169.254.0.0, 255.255.0.0
What IP address ranges is reserved for Automatic Private IP Addressing
169.254.0.1--169.254.255.254
Which of the following IP address ranges is reserved for Automatic Private IP Addressing?
169.254.0.1-169.254.255.254
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 172.16.0.1-172.31.255.254 169.254.0.1-169.254.255.254 10.0.0.1-10.255.255.254
169.254.0.1-169.254.255.254
APIPA Address range
169.254.x.x
Class B Range (Private IPv4 Address)
172.16.0.0 - 172.31.255.255
Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your netowork?
179.113.0.118, 179.113.65.12, 179.113.89.0
Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your network? 180.113.0.67 179.113.89.0 179.113.0.117 179.113.65.12 179.112.95.64
179.113.89.0 179.113.0.117 179.113.65.12
Which of the following IP addresses have a default subnet mask of 255.255.0.0
191.168.2.15, 168.16.5.1, 129.0.0.1
C class range
192 -223
Class C IP Addresses
192.0.0.0-223.255.255.0 192-223, Subnet Mask of 255.255.255.0, default CIDR of /24 192.x.x.x - 223.x.x.x 192.168.x.x Mask 255.255.255.0
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addressess could you assign to the computer? 127.0.0.1 10.0.12.15 240.12.188.1 32.188.99.10 192.168.12.253 172.18.188.67
192.168.12.253 172.18.188.67 10.0.12.15
Class C Range (Private IPv4 Address)
192.169.0.0 - 192.168.255.255
Cat 5e speed:
1Gbits
Telecommunications closet
"Telco room," space that contains connectivity for groups of workstations in a defined area
1 gigabit per second
(1 Gbps) 1,000,000,000 bits per second
1 kilotbit per second
(1 Kbps) 1000 bits per second
1 megabit per second
(1 Mbps) 1,000,000 bits per second
1 terabit per second
(1 Tbps) 1,000,000,000,000 bits per second
ACK
(Acknowledgement) A response generated at the Transport layer of the OSI model that confirms to a sender that its frame was received. The ACK packet is the third of three in the three-step process of establishing a connection.
ANSI
(American National Standards Institute) An organization composed of more than 1000 representatives from industry and government who together determine standards for the electronics for the electronics industry in addition to other fields, such as chemical and nuclear engineering, health and safety, and construction. Prescribes type of NIC in order to receive wireless. sets standards electronically. international.
AWG
(American Wire Gauge) A standard rating that indicates the diameter of a wire, such as the conducting core of a coaxial cable
API
(Application Program Interface) A set of routines that make up part of a software application.
BNC
(Bayonet Neill-Concelman) A standard for coaxial cable connectors named after its coupling method and its inventors.
CRC
(Cyclic Redundancy Check) An algorithm (or mathematical routine) used to verify the accuracy of data contained in a data frame. Data Link Layer protocol that generates the frame check & verifies if package was sent undamaged
DNS
(Domain Name Service) 13 root servers UDP/TCP Port 53
EIA
(Electronic Industries Alliance) A trade organization composed of representatives from electronics manufacturing firms across the United States that sets standards for electronic equipment and lobbies for legislation favorable to the growth of the computer and electronics industries.
FDDI
(Fiber Distributed Data Interface) ___ allows each node to release a new token.
FTP
(File Transfer Protocol) TCP Port 20, 21
FCS
(Frame Check Sequence) Data Link Layer A sequence of bits placed in a frame that is used to check the primary data for errors. The field in a frame responsible for ensuring that data carried by the frame arrives intact. It uses and algorithm, such as CRC, to accomplish this verification. Makes sure data matches data from source
GUI
(Graphical User Interface) A user interface based on graphical displays. With a mouse, the user points to icons that represents files, folders, and disks. Documents are displayed in windows. The user selects commands from menus.
HTTP
(Hyper Text Transfer Protocol) TCP Port 80 An application layer protocol that formulates and interprets requests between Web clients and servers. Extremely fast protocol used for network file transfers in the WWW environment.
HTTPS
(HyperText Transfer Protocol Secure(SSL)) TCP Port 443 Extremely fast protocol used for network file transfers in the WWW environment, but it uses public and private key encryption.
IEEE
(Institute of Electrical and Electronics Engineers) Prescribes how communication is sent through atmosphere and in correct sequence. international. An international society composed of engineering professionals. Its goals are to promote development and education in the electrical engineering and computer science fields.
ISO
(International Organization for Standardization) A collection of standards organizations representing 157 countries with headquarters located in Geneva, Switzerland. Its goal is to establish international technological standards to facilitate the global exchange of information and barrier-free trade.
ITU
(International Telecommunication Union) A United Nations agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases.
IAB
(Internet Architecture Board) A technical advisory group of researchers and technical professionals responsible for Internet growth and management strategy, resolution of technical disputes, and standards oversight.
What is the maximum speed and typical use of CAT 1 UTP cable?
1Mbps Voice Only-regular analog phone lines
What is the throughput and frequency used for Bluetooth?
1Mbps throughput 2.45 Ghz frequency
Physical Layer
1st layer of the OSI model. PDU is Bits Protocols(Ethernet, FDDI, HDLC, and PPP) in the physical layer generate and detect signals so as to transmit and receive data over a network medium. These protocols also set the data transmission rate and monitor data error rates, but do not provide error correction. Cabling, air, connectors, hubs, fiber optic through NICs, WAP and repeaters
How many possible MAC address combination?
2 or 48 bit address
Which of the following is a vaild IP (version 4) address? (Select 2)
2.2.2.2, 172.16.1.26
IEEE 802.3 CD
2.5km max LAN (with repeaters) Frame must be long enough that sender still sending if collision noise arrives, since when finished sending, cannot guarantee that sender still listening In the worst case, it can take 2*propagation delay (slot size) to detect a collision 51.2μs slot size => 512b min frame size given 100ns transitions for sending 1 bit 46B pad ensures that frame = 512 bits even with 0 data and 2B addressing
On what Port is FTP?
20 & 21
Your network has been assigned the Class C network address of 200.78.151.0
200.78.151.12, 200.78.151.252, 200.78.151.111
You are planning a network for an education campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?
2000 meters
You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?
2000 meters
What is the last IP address that can be assigned to hosts on the 211.70.0.0?
211.70.0.254
Which of the following is the last IP address that can be assigned to hosts on the 211.70.0.0 network using the default subnet mask?
211.70.0.254
On what Port is SSH?
22
Which three are class C addresses? 222.0.0.272 192.23.45.0.1 165.254.19.6 223.168.2.15 168.45.68.1
222.0.0.272 192.23.45.0.1 223.168.2.15
Multicast address range:
224.0.0.0 to 239.255.255.255
Class D IP Addresses
224.0.0.0-254.0.0.0 224-239, used for Multicast Addressing
On what Port is Telnet?
23
OUI
24 bit character sequence assigned by IEEE that appears at beginning of a network interface's physical address and identifies NIC's manufacturer
Class E IP Addresses
240-255, used for Experimental Addressing
On what Port is the SMTP Server?
25
You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select Two)
25, 110
You have been told to assign the IP address 21.155.67.188 to a host on the network using the default subnet mask. WHich mask should you use?
255.0.0.0
You are configuring the IP address for a host and have been asked to use the address 192.160.99.110/16. What subnet mask value would you use?
255.255.0.0
What is the default mask for the IP address 203.111.3.3?
255.255.255.0
What is the default subnet mask for the IP address 203.111.3.37
255.255.255.0
Wi-Fi Protected Access (WPA2)
256-bit encryption level
Data Link Layer
2nd Layer Error checking PDU is Frames, Transmits packets from node to node based on addresses; has protocols of Ethernet, FDDI, HDLC, and PPP & SLIP Hardware used are NICs, MAC address, bridges, switches & WAP 2nd layer in the OSI model. The Data Link layer bridges the networking media with the Network layer. Its primary function is to divide the data it receives from the Network layer into frames that can then be transmitted by the Physical layer.
On what Port is RDP?
3389
On what Port is LDAP?
389
Network Layer
3rd layer of the OSI model. PDU is Packets, Protocols: IPX, ARP, DHCP, ICMP, OSPF translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver transfers data to LANS/WANS based on network address, turns address into physical Hardware used are Routers or Switches IP addressing scheme
What is the maximum speed and typical use of CAT 2 UTP cable?
4 Mbps Used by old Token Ring
Cat5
4 unshielded, twisted pairs--UTP
Your network follows the 100BaseFX specifications for Fast Ethernet, and uses half-duplex, multimode cable. What is the maximum cable segment length allowed
412 meters
Your network follows the 100BaseFX specifications for Fast Ethernet, and uses half-duplex, multimode cable. What is the maximum cable segment length allowed?
412 meters
On what Port is HTTPS/ SSL?
443
Physical address
48 or 64-bit network interface identifier that includes OUI and the extension identifier
Transport layer
4th layer of the OSI model. In the Transport layer PDU is Segments Gateway - TCP, SPX, IPSec Protocols ensure that data are transferred from point A to point B reliably and without errors. (TCP) vs (UDP), ensures accurate delivery of data through flow control, segmentation, reassembly, error connection, acknowledgment and sequencing
On what Port is Sys Log/ Event Manager?
514
On what Port is DNS?
53
802.11g
54 Mbps (Data Transfer Rate) and 2.4 GHz Frequency
802.11a
54 Mbps (Data Transfer Rate) and 5 GHz Frequency
What is the most common wiring standard for UTP connections?
568B
Pin #4
568B = Blue 568A = Blue BOGB = Orange
Pin #8
568B = Brown 568A = Brown BOGB = Brown
Pin #6
568B = Green 568A = Orange BOGB = Green
Pin #2
568B = Orange 568A = Green BOGB = Blue
Pin #5
568B = White/blue 568A = White/blue BOGB = White/green
Pin #7
568B = White/brown 568A = White/brown BOGB = White/brown
Pin #3
568B = White/green 568A = White/orange BOGB = White/orange
Pin #1
568B = White/orange 568A = White/green BOGB = White/blue
Session layer
5th layer in the OSI model. PDU is Data The session layer establishes, maintains, and terminates user connections between two nodes on the network. It can be considered the "traffic cop" for network communications.
802.11n
600 Mbps (Data Transfer Rate) and 5 GHz and/or 2.4 GHz Frequency
If the SONET (OC-1) base data rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?
622.08 Mb
Wired Equivalent Privacy (WEP)
64-bit encryption level
Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?
66 Block
On what Port is TFTP?
69
Presentation Layer
6th layer of the OSI model. PDU is Data Protocols(Encryption, Compression) in the Presentation layer translate between the application and the network. allows hosts and applications to use a common language Here, data are formatted in a schema that the network can understand, with the format varying according to the type of network used. The presentation layer also manages data encryption and decryption, such as the scrambling of system passwords.
How many slave devices can a Bluetooth master control at one time?
7
How many wires does a RJ45 connector have and how are they typically used with the TCP networking standards.
8 total wires as 4 Pairs. TCP typically only uses two pairs
On what Port is HTTP?
80
Haley configures a Web site using Windows 2000 default values. What are the HTTP port and SSL port settings?
80 for HTTP; 443 for SSL
You want to increase the security of your network by allowing only authenticated users to be able to access network devices through a switch? Which one of the following should you implement?
802.1x
1Gbps / 1000 Mbps
802.3ab Ethernet networks run at __________ Mbps.
100 Mbps
802.3u Ethernet networks run at __________ Mbps.
On what Port is the Proxy Server?
8080
IEEE 802.3 Inter-frame Gap
9.6μs interval between successive frames from host to allow other hosts to use medium
GUID (Globally Unique Identifier)
A 128-bit number generated and assigned to an object upon its creation in Active Directory. Network applications and services uses an object's GUID to communicate with it.
Compact disc files system (CDFS)
A 32-bit file system used on standard capacity CD-ROMs
Service Set Identifier (SSID)
A 32-bit identification string, sometimes called a network name, inserted into the header of each data packet processed by a wireless access point. It enables you to set a basic level of access security for your wireless network.
preamble
A 64-bit series of alternating 1s and 0s that end with 11; gives a receiving NIC time to realize a frame is coming, and to know exactly where the frame starts.
Enhanced Interior Gateway Routing Protocol (EIGRP)
A Cisco proprietary hybrid protocol that uses "hello" packets broadcasted every 60 seconds to form neighbor relationships, has metrics of bandwidth, delay, load, reliability and MTU, is classless (uses VLSM), can support different protocols with PDMs and implements DUAL as it's algorithm to choose best paths to networks
Server Manager
A GUI tool provided with Windows Server 2008 that enables network administrators to manage server roles, features, resources, and users from a single interface.
Internet Protocol Security (IPSec)
A IP packet encryption protocol. This is the only IP encryption protocol to work at Layer 3 of the OSI model and is most commonly seen on VPNs.
Teredo
A NAT-traversal IPv6 tunneling protocol built into Microsoft Windows. Teredo addresses start with 2001:0000:/32.
node
A NIC connected to an Ethernet network.
Internet Protocol version 6 (IPv6)
A Network layer Protocol in the TCP/IP suite in which its 128-bit addresses consist of eight sets of four hexadecimal numbers, each number being a value between 0000 and FFFF, using a colon to separate the numbers. No IP address may be all 0s or all FFFFs. An example is FEDC:BA98:7654:3210:0800:200C:00CF:1234.
Internet Protocol version 4 (IPv4)
A Network layer protocol in the TCP/IP suite in which its 32-bit addresses consist of four sets of numbers, each number being a value between 0 and 255, and using a period to separate the numbers. Often called dotted decimal format. No IPv4 address may be all 0s or all 255s. Examples include 192.168.0.1 and 64.176.19.164.
Fragmentation
A Network layer service that breaks down segments it receives fro the Transport layer into smaller packets.
Compact disc (CD-ROM)
A ROM medium that typically holds up to 1GB of information
LPR
A UNIX command that places files in the printer queue. The files are subsequently printed with 1pd, the print service.
ARP PING
A UNIX command used in place of PING to see if you can reach a remote computer. It uses Address Resolution Protocol (ARP) packets rather than the ICMP packets used by PING (that are blocked or ignored by many devices). Not available on Windows systems, ARP PING packets do not cross routers.
BSD (Berkeley Software Distribution)
A UNIX distribution that originated at the University of California at Berkeley. The BSD suffix differentiates these distributions from AT&T distributions. no longer being developed at Berkeley, the last public release of BSD UNIX was version 4.4
Inode (Information Node)
A UNIX or Linux file system information storage area that holds all details about a file. This information includes the size, the access rights, the date and time of creation, and a pointer to the actual contents of the file.
lpd (line printer daemon)
A UNIX service responsible for printing files placed in the printer queue by the 1pr command.
crossover cable
A UTP cable with RJ-45 connectors crimped so that one complies with EIA/TIA 568A and the other complies with 568B, resulting in reversed sending and receiving pairs so that both ends of the cable can receive data. This eliminates the need for a hub or switch between 2 computers or network devices.
H.323
A VoIP standard that handles the initiation, setup, and delivery of VoIP sessions.
Active Directory
A Windows 2000 database of computer, users, shared printers, shared folders, and other network resources, and resource grouping that is used to manage a network and enable users to quickly find a particular resource
Domain Controller
A Windows Server 2003 or Server 2008 computer that contains a replica of the Active Directory database.
NBTSTAT
A Windows command that shows all the local NetBIOS names, and is a command-line equivalent to My Network Places. You must run NBTSTAT with a switch.
Torrent
A ___________ is a program used to download files quickly from a P2P network.
Host
A ___________ is a single computer or device that connects to a TCP/IP network?
Layer 3 (Network Layer)
A ___________ switch is one that uses logical addressing to determine data paths.
Ring
A ___________ topology can be defined as connecting several computers in a circle without the use of a hub or a switch.
Star Topology
A ____________ topology can be defined by connecting several hubs to a switch.
Dynamic
A _____________ address is assigned by a DHCP server.
Independent Basic Service Set (IBSS)
A basic unit of organization in wireless networks formed by two or more wireless nodes communicating in ad hoc mode.
Advanced Encryption Standard (AES)
A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.
central office
A building that houses local exchanges, and a location where individual voice circuits come together.
Multi-mode (MM)
A cable with a larger fiber core, capable of carrying multiple rays of light. This type of cable is used for shorter distance runs, up to 600 meters.
Single-mode (SM)
A cable with an optical fiber that is meant to carry a single ray of light-one ray of light, one mode. This type of cable is normally used for longer distance runs, generally 10 km and up to 80 km.
Serial cable
A cable, such as a RS232 type, that permits serial data transmission
Pipe
A character that enables you to combine existing commands to form new commands. The _____ symbol is the vertical bar (|).
complete algorithm
A cipher and the methods used to implement that cipher.
access control list
A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
supplicant
A client computer in a RADIUS network.
UNIX
A client or server operating system originally developed by researchers at AT&T Bell Labs in 1969. _____ is a proprietary operating system, but similar operating systems, such as Linux, are freely distributable.
3-tier Architecture
A client/server environment that uses middleware to translate requests between the client and server.
Zero administration for Windows (ZAW)
A combination of management options and tools that enable an organization to reduce the total cost of ownership.
My Traceroute (MTR)
A command that is similar to TRACEROUTE except that it keeps running until shut down. Not available in Windows.
HOSTNAME
A command that simply returns the host name of the local computer.
NSLOOKUP
A command used to diagnose DNS problems, but considered obsolete. DIG is a more powerful alternative, but is not available on Windows
DIG
A command used to diagnose DNS problems, but it is not available on Windows.
Route
A command-line command that enables you to display and edit the local system's routing table. To intelligently direct data between networks based on addressing, patterns of usage, and availability of network segments.
NETSTAT
A command-line utility that displays information on the current state of all the running IP processes on your computer. Use NETSTAT when you want to know about your current sessions.
What is the Domain?
A common administrative and replication boundary. sc.edu is a domain. itec.sc.edu is a sub-domain.
Connectionless
A communications session over IP which does not require an acknowledgement from the receiving computer. A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.
Connection Oriented
A communications session over IP which requires an acknowledgement from the receiving computer. A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.
Network
A communications system that enables computer users to share computer equipment, software, and data, voice, and video transmissions
Internet
A complex WAN that connects LANs and MANs around the globe
Client
A computer on a network that requests services or resources from another computer on the network
Scalable
A computer operating system that can be used on small to large computer with a single Intel-based processor and on larger computers, such as those with multiple processors
Node
A computer or other device connected to a network, which has a unique address and is capable of sending or receiving data
Gateway
A computer system or device that provides expansion capabilities for internetworking and providing translation between two systems. Provides services to all layers
Client
A computer that accesses resources on another computer via a network or by a direct connection
Peer
A computer that can function as a client and a server.
Workstation
A computer that has its own CPU and may be used as a standalone computer for work processing, spreadsheet creation, or other software applications. It also may be used to access another computer such as a mainframe computer or file server, and long as the necessary network hardware and software are installed
Workstation
A computer that runs a desktop OS and connects to a network
Client
A computer that uses resources from other computers on the network.
remote terminal
A connection on a faraway computer that enables you to control that computer as if you were sitting in front of it, logged in. Remote terminal programs all require a server and a client. The server is the computer to be controlled. The client is the computer from which you do the controlling.
Internet Control Message Protocol (ICMP)
A connectionless protocol used by programs such as PING, which never need to send more than a single packet.
RJ-45 connector
A connector introduced with the 10BaseT standard in which each of the 8 pins connects to a single wire inside the cable, allowing devices to put voltage on the individual wires within the cable.
Local connector
A connector used with single-mode or multimode fiber-optic cable
MT-RJ
A connector used with single-mode or multimode fiber-optic cable
MMC (Microsoft Management Console)
A customizable, graphical network management interface introduced with Windows Server 2003 and incorporated in Windows Server 2008's Server Manager.
HUB
A device at the center of a star topology network that acts like an electronic repeater in that it interprets the ones and zeros coming in from 1 port and repeats the same signal out to other connected ports. A multiport repeaters that receive a digital signal, regenerates it, and then broadcasts that signal to all connected ports. Works at Layer 1 and has all devices connected in the same collision and broadcast domain
DSL Access Multiplexer (DSLAM)
A device located in a telephone company's central office that connects multiple customers to the Internet.
wireless access point (WAP)
A device that Connects wireless network nodes to wireless or wired networks. Many WAPs are combination devices that act as high-speed hubs, switches, bridges, and routers, all rolled into one.
Amplifier
A device that boosts, or strengthens, an analog signal.
DSL modem
A device that connects a customer to a DSL line, with one interface that connects to a telephone wall jack and another interface that connects to a standard NIC in a computer or router. It is not a true "modem," but more like an ISDN terminal adapter; in spite of this, the term modem is used by nearly everyone including manufacturers.
Router
A device that connects network segments and directs data based on information contained in the data packet. The primary function of determining the next node to which a packet is sent by scanning the destination IP address and searching it's Routing Table for the path that the packet needs to take. Works at Layer 3 and breaks up broadcast domains and collision domains
modulator/demodulator (modem)
A device that converts outgoing digital bit streams into analog signals (modulation) and incoming analog signals back into digital signals (demodulation). Most commonly used to interconnect telephone lines to computers.
cable stripper
A device that enables you to make UTP cables by stripping the cover off cable before using a crimper to attach crimps (connectors) to the cable ends.
media convertor
A device that interconnects 2 different types of cabling in an Ethernet network.
repeater
A device that interprets the signals coming in from 1 port, and repeats the same signals out to the other connected ports.
tone probe
A device that is used with a tone generator to identify the ends of cables that are not properly labeled.
multiplexer
A device that merges information from multiple input channels to a single output channel.
punchdown tool
A device that places UTP wires into 66- and 110- blocks. It is useful in a diagnostic environment to repunch a connection to make sure all the contacts are properly set.
Multiplexer
A device that separates a medium into multiple channels and issues signals to each of those subchannels
Bridge
A device that takes the data frames it receives, and filters and forwards the frames between 2 or more networks based on the MAC address of the destination node. Originally introduced to connect networks with different media types that perform at the Hardware Layer (2), that have since been replaced by switches
certifier
A device that tests a cable to ensure that it can handle its rated capacity. Use a certifier for slowdowns, not disconnects.
multimeter
A device that tests voltage, resistance, and continuity on a line.
cable tester
A device that will reveal continuity problems caused by a broken cable.
wireless bridge
A device used to connect two wireless network segments together, or to join wireless and wired networks together in the same way that wired bridge devices do.
Network Node
A device with at least one unique network address. Usually analogous to hosts. Can be a redistributin point or end point.
Terminal
A device with little (if any) of its own processing or disk capacity that depends on a host to supply it with application and data-processing services
Packet
A discrete unit of information sent from one node to another
Mapped folder or drive
A disk volume or folder that is shared on the network by a file server or workstation, it gives designated network workstations access to the files and data in its shared volume or folder. The workstation, via software, determines a drive letter for the shared volume, which is the workstation's map to the data
Standard
A documented agreement containing technical specifications or other precise criteria that are used as guidelines to ensure that materials, products, processes, and services suite their intended purpose. In addition to, how a product or service should be performed, ensure interoperability
Child Domain
A domain established within another domain in a Windows Server 2003 or Server 2008 domain tree.
Which of the following describes a man-in-the -middle?
A false server intercepts communications from a client by impersonating the intended server.
What does plenum mean?
A fancy name for a gap between the real ceiling and the suspended tiles
Multiple in/multiple out (MIMO)
A feature in 802.11 WAPs that enables them to make multiple simultaneous connections.
What is MAC filtering?
A feature that enables the admin to limit the access of the wireless network based on the physical, hard-wired addresses of the wireless adapter
What is 10BaseFL?
A fiber-optic cabling standard for ethernet over fiber at 10 Mbps
What is 100BaseFX?
A fiber-optic cabling standard for ethernet over fiber at 100 Mbps
What is 1000BaseSX?
A fiber-optic cabling standard for ethernet over fiber using MMF at 1000 Mbps
What is 1000BaseLX?
A fiber-optic cabling standard for ethernet over fiber using SMF at 1000 Mbps
CIFS (Common Internet File System)
A file access protocol. CIFS runs over TCP/IP and is the standard file access protocol used by Windows operating systems.
Page File
A file on the hard drive that is used for virtual memory.
File Allocation Table (FAT) file system
A file system based on the use of a file allocation table, a flat table that records the clusters used to store the data contained in each Windows 95, Windows 98, and Windows 2000
NTFS (New Technology File System)
A file system developed by Microsoft and used with its Windows NT, 2000 Server, Server 2003, and 2008 operating systems.
File Globbing
A form of filename substitution, similar to the use of wildcards in Windows and DOS.
Baseband transmission
A form of transmission in which digital signals are sent through direct current pulses applied to a wire. Such as the conducting core of a coaxial cable. Send digital signal over entire bandwidth for one signal via half duplex communication.
Hypertext Markup Language (HTML)
A formatting language that is used to enable documents and graphic images to be read on the Web is a series of file servers with software such as Microsoft's Internet Information Services (IIS), which make GTML and other Web documents available for workstations to access
Linux
A freely distributable implementation of a UNIX-type of system. Finnish computer scientist Linus Torvalds originally developed it.
Transceive
A full duplex connection can _________ twice as much information per second as a half duplex connection.
Asymmetric DSL (ADSL)
A fully digital, dedicated connection to the telephone system that provides download speeds up to 9 Mbps, and upload speeds of up to 1 Mbps.
Internet
A global network of diverse Web and information servers offering voice, video, and text data to millions of users
Domain Tree
A group of hierarchically arranged domains that share a common namespace in the Windows Server 2003/2008 Active Directory.
802.3
A group of standards for networking devloped by the IEEE 802.3 subcommittee. Ethernet LAN standard, all media, interfaces, devices and data handling (using the CSMA/CD access method).
metropolitan area network
A group of two or more interconnected LANs operating under a single management. Ofthe encompasses a city-sized geographical area.
Domain
A group of users, servers, and other resources that share account and security policies through a Windows Server 2003 or Server 2008 NOS.
Digital Subscriber Line (DSL)
A high-speed Internet connection technology that uses a regular telephone line for connectivity. DSL comes in several varieties, including Asymmetric (ADSL) and Symmetric (SDSL), and many speeds. Typical home-user DSL connections are ADSL, with a download speed of up to 1.5 Mbps and an upload speed of up to 384 Kbps.
Root
A highly privileged user ID that has all rights to create, delete, modify, move, read, write, or execute files on a UNIX or Linux systems.
Intermediate distribution frame
A junction point between the MDF and concentration of fewer connections
dumb terminal
A keyboard and monitor that send keystrokes to a central processing computer (typically a mainframe or minicomputer) that returns screen displays to the monitor. The unit has no processing power of its own
Router
A layer 3 switch is similar to a ___________.
T3 line
A leased-line connection capable of carrying data at 44.736Mbps.
Per User
A licensing mode that allows a fixed quantity of clients to use one software package simultaneously.
routing table
A list of paths to various networks required by routers. You can build this either manually or automatically.
Virtual LAN (VLAN)
A logical group of users to share information despite physical locations that are configurable by switches to reduce broadcast traffic and improve performance
OU (Organizational Unit)
A logical receptacle for holding objects with similar characteristics or privileges in an NOS directory. Containers form the branches of the directory tree.
Printer Queue
A logical representation of a networked printer's functionality. To use a printer, clients must have access to the printer queue
Tree
A logical representation of multiple, hierarchical levels in a directory. It is called a _____ because the whole structure shares a common starting point (the root), and from that point extends branches (or containers), which may extend additional branches, and so on.
DN (Distinguished Name)
A long form of an object's name in Active Directory that explicitly indicates the object name, plus the names of its containers and domains. A distinguished name includes a DC (domain component), OU (organizational unit), and CN (common name). A client uses the distinguished name to access a particular object, such as a printer.
hash
A mathematical function used in cryptography that is run on a string of binary digits of any length that results in a value of some fixed length.
Group
A means of collectively managing users' permissions and restrictions applied to shared resources. Groups form the basis for resource and account management for every type of NOS. Many network administrators create groups according to department or, even more specifically, according to job function within a department.
amplitude
A measure of a signal's strength.
Amplitude
A measure of a signals strength
bandwidth
A measure of the difference between the highest and lowest frequencies that a medium can transmit.
Signal strength
A measurement of how well your wireless device is connecting to other devices.
unicast
A message sent from one computer to one other computer.
public-key cryptography
A method for exchanging digital keys securely.
anycast
A method of addressing groups of computers as though they were a single computer. Anycasting starts by giving a number of computers (or clusters of computers) the same IP address. Advanced routers then send incoming packets to the closest of the computers.
Point Coordination Function (PCF)
A method of collision avoidance, as defined by 802.11 standards, that has yet to be implemented.
Flow Control
A method of gauging the appropriate rate of data transmission based on how fast the recipient can accept data.
MAC address filtering
A method of limiting access to a wireless network based on the physical addresses of wireless NICs. Enables you to configure a list of PCs, identified by their MAC addresses, which are then permitted to access the specific wireless network.
Symmetric Multiprocessing
A method of multiprocessing that splits all operations equally among two or more processors.
encryption
A method of securing messages by scrambling and encoding each packet as it is sent across an unsecured medium, such as the Internet. Each encryption level provides multiple standards and options.
Trunking
A method used to connect two or more switches together and allows like VLANs to communicate
Setup Mode
A mode that brings up an interactive configuration dialog and is utilized when no startup-config is in NVRAM
Server-based network
A model in which access to the network, and resources, and the management of resources, is accomplished through on or more servers
AM
A modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal
AM (amplitude modulation)
A modulation technique in which the amplitude of the carrier signal is modified by the applications of a data signal.
Transmit beamforming
A multiple-antenna technology in 802.11n WAPs that helps get rid of dead spots.
Asymmetric Multiprocessing
A multiprocessing method that assigns each subtask to a specific processor.
key pair
A name for the two keys generated in asymmetric-key algorithm systems.
Client/Server Architecture
A network design in which client computers use a centrally administered server to share data, data storage space and devices
sniffer
A network diagnostic program that can cause a NIC to run in promiscuous mode in order to capture all the traggic on an Ethernet network.
LAN
A network of computers and other devices confined to a relatively small space
point-to-point
A network of two single devices communicating with each other.
Peer-to-peer network
A network on which any computer can communicate with other networked computers on an equal or peer like basis without going through an intermediary, such as a server or host
Asynchronous Transfer Mode (ATM)
A network technology that runs at speeds between 25 and 622 Mbps using fiber-optic cabling or CAT 5 or better UTP.
WAN
A network that spans a long distance and connects two or more LANs
Token Bus Network
A network that uses a bus topology and a token-passing system
Token Ring Network
A network that uses a ring topology and a token-passing system
point-to-multipoint
A network topology in which one device communicates with more than one other device on a network.
Automatic Private IP Addressing (APIPA)
A networking feature in operating systems that enables DHCP clients to self-configure an IP address and subnet mask automatically when a DHCP server isn't available.
Token Ring
A networking technology developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology, using tokens to allow nodes to transmit data.
Ethernet
A networking technology originally developed at Xerox based on a bus topology in the 1970's and improved by Digital Equipment Corporation, Intel, and Xerox. Ethernet, which is the most common form of network transmission technology, follows the IEEE 802.3 standard.
The Open Group
A nonprofit industry association that owns the UNIX trademark.
Address
A number that uniquely identifies each workstation and device on a network
network ID
A number used in IP networks to identify the network on which a device or machine exists.
ephemeral port number
A number with the range of 1024-5000 (classic version) and 49152-65535 (dynamic or private) that is arbitrarily assigned by a computer to an outgoing packet.
Frame
A package for data that includes not only raw data, but also senders and recipients addressing and control information
Frame
A package for data that includes not only the raw data, or "payload," but also the sender's and recipient's addressing and control information. Frames are generated at the Data Link layer of the OSI model and are issued to the network at the Physical layer. Data that has been broken up into smaller chunks by networking technologies for the purpose of transmitting it over a network. It also includes error-checking information.
virtual circuit
A packet- switching, connection-oriented mechanism in which a logical connection is established between two stations at the start of transmission. All packets follow the same route, need not carry a complete address, and arrive in sequence.
Delta channel (D channel)
A part of an ISDN line that transfers data at 16 Kbps. As part of the BRI, it carries setup and configuration information.
Transmission Control Protocol (TCP)
A part of the TCP/IP protocol suite, is a connection oriented protocol.
Branch
A part of the organizational structure of an operating system's directory that contains objects or other organizational units.
User
A person who uses a computer
GUI (Graphical User Interface)
A pictorial representation of computer functions and elements that, in the case of NOSs, enables administrators to more easily manage files, users, groups, security, printers, and other issues.
Channel Service Unit/Data Service Unit (CSU/DSU)
A piece of equipment that connects a T-carrier leased line from the telephone company to a customer's equipment (such as a router). It performs line encoding and conditioning functions, and it often has a loopback function for testing.
Phase
A point or stage in a wave's progress over time
Secure Hash Algorithm (SHA)
A popular cryptographic hash.
NFS (Network File System)
A popular remote file system created by Sun Microsystems, and available UNIX and Linux operating systems.
802.1X
A port authenication network access control mechanism.
uplink port
A port on a hub that allows you to connect 2 hubs together using a straight-thru cable.
Kernel Module
A portion of the kernel that you can load and unload to add or remove functionality on a running UNIX or Linux system.
channel
A portion of the wireless spectrum on which a particular wireless network operates. Setting wireless networks to different channels enables separation of the networks.
Intranet
A private network within an organization. It uses the same Web-based software as the Internet, but is highly restricted from public access. Intranets are currently used to enable managers to run high-level reports, to enable staff members to update human resources information, and to provide access to other forms of private data.
Frequency Division Multiplexing (FDM)
A process of keeping individual phone calls separate by adding a different frequency multiplier to each phone call, making it possible to separate phone calls by their unique frequency range.
Site survey
A process that enables you to determine any obstacles to creating the wireless network you want.
Authentication
A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers. Composed of public information (username) and private information (password).
CCNA
A professional certification that attests to one's skills in installation, configuring, maintaining and troubleshooting skills on medium sized networks that use Cisco systems' devices
Command Interpreter
A program (usually text-based) that accepts and executes system programs and applications on behalf of users. Often, it includes the ability to execute a series of instructions that are stored in a file.
Mac OS X Server
A proprietary NOS from Apple Computer that is based on a version of UNIX.
Solaris
A proprietary implementation of the UNIX operating system by Sun Microsystems.
AIX
A proprietary implementation of the UNIX system distributed by IBM.
Privileged mode
A protected memory space allocated for the Windows 2000 kernel that cannot be directly accessed by software applications
SMB (Server Message Block)
A protocol for communications and resource access between systems, such as clients and servers, SMB originated at IBM and then was adopted and further developed by Microsoft for use on its Windows operating systems. The current version of SMB is known as the CIFS (Common Internet File System) protocol.
Address Resolution Protocol (ARP)
A protocol in the TCP/IP suite used with the command-line utility of the same name to determine the MAC address that corresponds to a particular IP address.
Dynamic Host Configuration Protocol (DHCP)
A protocol that allows a DHCP server to automatically set TCP/IP settings for a DHCP client.
Internet Group Management Protocol
A protocol that allows routers to forward multicast IP packets to these type of groups.
File Access Protocol
A protocol that enables one system to access files on another system.
Network Time Protocol (NTP)
A protocol that gives the current time.
What is TKIP?
A protocol that is used to change the keys used for encryption for every packet that is sent.
Point-to-Point Protocol over Ethernet (PPPoE)
A protocol that was originally designed to encapsulate PPP frames into Ethernet frames. Used by DSL providers to force customers to log into their DSL connection instead of simply connecting automatically.
How does a proxy server differ from a packet filtering firewall?
A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.
certificate
A public encryption key signed with the digital signature from a trusted 3rd party called a certificate authority (CA). This key serves to validate the identity of its holder when that person or company sends data to other parties.
Account
A record of a user that contains all of her properties, including rights to resources, password, user name and so on.
Challenge Handshake Authenciation Protocol
A remote access authentication protocol. It has the serving system challenge the remote client, which must provide an encrypted password.
Universal disk format (UDF)
A removable disk formatting standard used for large capacity CD-ROMs and DVD-ROMs
Object
A representation of a thing or person associated with the network that belongs in the NOS directory. Objects include users, printers, groups, computers, data files, and applications.
Transport Layer Security (TLS)
A robust update to SSL that works with almost any TCP application.
Static Route
A route created when the specific route is manually inputed into the routing table
Dynamic Route
A route maintained by the router itself and is automatically updated by the router
Multi-Protocol Label Switching (MPLS)
A router feature that labels certain data to use a desired connection. It works with any type of packet switching (even Ethernet) to force certain types of data to use a certain path.
aggregation
A router hierarchy in which every router underneath a higher router always uses a subnet of the higher router's existing routes.
Process
A routine of sequential instructions that run until it has achieved its goal. For example, a spreadsheet program.
Mandatory Access Control (MAC)
A security model in which every resource is assigned a label that defines its security level. A user that lacks that security level does not get access.
Temporal Key Integrity Protocol (TKIP)
A security protocol that uses a 128-bit encryption key. Used with WPA as an extra layer of security, it was soon hacked, and a replacement had to be found. The replacement is WPA2.
Kerberos
A security system developed by the Massachusetts Institute of Technology to enable two parties on an open network to communicate without interception from an intruder, by creating a unique encryption key for each communication session
cipher
A series of complex and hard-to-reverse mathematics run on a string of ones and zeroes in order to make a new set of seemingly meaningless ones and zeroes.
OpenSSH
A series of secure programs developed by the Open BSD organization to fix SSH's limitation of only being able to handle one session per tunnel.
Pipeline
A series of two or more commands in which the output of prior commands is sent to the input of subsequent commands.
Mail Server
A server that manages storage/transfer of e-mail messages
fractional T1 access
A service provided by many telephone companies wherein customers can purchase a number of individual channels in a T1 line in order to save money.
Redirector
A service that ruins on a client workstation and determines whether the client's request should be handled by the client or the server.
protocol suite
A set of protocols that are commonly used together and operate at different levels of the OSI seven-layer model.
algorithm
A set of rules for solving a problem in a given number of steps.
File Transfer Protocol (FTP)
A set of rules that uses ports 20 and 21, and efficiently transmits large files.
Simple Network Management Protocol (SNMP)
A set of standards for communication with devices connected to a TCP/IP network. Examples of these devices include routers, hubs, and switches.
token
A short binary code that is passed around to computers on a ring topology, and in some cases a bus topology. A special control frame that indicates to the rest of the network that a particular node has the right to transmit data
analog
A signal that uses variable voltage to create continuous waves, resulting in an inexact transmission.
Which of the following correctly describes the T1 carrier system?(select two)
A single T1 channel can transfer data at 64 Kbps, T1 lines use pairs of copper wire
connection
A single communication between two computers. Also called a session.
Session
A single communication or connection for data exchange between two computers. The term session may be used in the context of Web, remote access or terminal and mainframe communications, for example.
packet sniffer
A software utility or dedicated hardware device that intercepts and logs network packets. Wireshark is a popular packet sniffer.
What is a loopback cable?
A special cable used for self-diagnostics and typically has wires connecting the trasmit pins to the recieve pins on the same system
Token
A special control frame that indicates to the rest of the network that a particular node has the right to transmit data
butt set
A special hand set used to tap into a 66- or 110-block to see if a particular line is working.
mailbox
A special holding area on a mail server for a user's e-mail. Each user's messages are stored separately.
frequency-hopping spread spectrum (FSSS)
A spread-spectrum broadcasting method defined in the 802.11 standard that sends data on one frequency at a time, constantly shifting (or hopping) frequencies.
orthogonal frequency-division multiplexing (OFDM)
A spread-spectrum broadcasting method that combines the multiple frequencies of DSSS with FHSS's hopping capability.
Distributed component object model (DCOM)
A standard built upon COM to enable object linking to take place over a network
Power over Ethernet (PoE)
A standard defining a method by which devices can receive power from the same Ethernet cables that transfer data. Both the device receiving the power and the device supply it must support PoE. One scenario is a PoE-enabled WAP receiving power from a PoE-enabled Ethernet switch.
568A
A standard for crimping of 4-pair UTP cable in which wires.
LDAP (Lightweight Directory Access Protocol)
A standard protocol for accessing network directories.
AWG
A standard rating that indicates the diameter of a wire, such as the conducting core of a coaxial cable
Layer 1 (Physical Layer)
A standard such as 100Base-T refers to which OSI layer?
Authorization
A step in the AAA philosophy during which a client's permissions are decided upon.
Hierarchical Storage Management (HSM)
A storage management system that enables administrators to establish storage policies, archiving techniques, and disk capacity planning through automated procedures and the coordinated use of different media, including tapes, CD-ROMs, hard drives, and Zip Drives
digital signature
A string of characters, created from a private encryption key, that verifies a sender's identity to those who receive encrypted data or messages.
Data Encryption Standard
A symmetric-key algorithm developed by the U.S. government in the 1970s and formerly in use in a variety of TCP/IP applications. DES used a 64-bit block and a 56-bit key. Over time, the 56-bit key made DES susceptible to brute-force attacks.
Key Distribution Center (KDC)
A system for granting authentication in Kerberos.
binary
A system founded on using 1s and 0s to encode information.
Network Access Server
A system that controls the modems in a RADIUS network.
Network Access Server (NAS)
A system that controls the modems in a RADIUS network. See also Remote Authentication Dial-In User Service (RADIUS).
RADIUS server
A system that enables remote users to connect to a network service. - Combines authentication and authorization using policies to grant access. - Uses UDP. - Encrypts only the password. - Often uses vendor-specific extensions. RADIUS solution from different vendors might not be compatible.
Modulation
A technique for formatting signals in which one property of a simple carrier wave is modified by the data signal during transmission
dedicated line
A telephone line that is an always open, or connected, circuit. Dedicated telephone lines usually do not have telephone numbers.
dial-up line
A telephone line with a telephone number; a user must dial to make a connection, as opposed to a dedicated line that is always connected.
Secure Shell (SSH)
A terminal emulation program that looks exactly like Telnet but encrypts the data. SSH has replaced Telnet on the Internet because it provides better security through data encryption.
33
A total of __ MSAUs can be connected together.
switching loop
A traffic loop, resulting in every computer on the broadcast domain being unable to access the network. Caused by the way in which multiple switches are connected, but normally avoided by switches using the spanning tree protocol.
What is Broadcast Transmission?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it, which can generate a great deal of network traffic.
What is Multicast Transmission?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
What is Unicast?
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Straight-through cable
A twisted pair patch cable in which the wire terminations in both connectors follow the same scheme
Bearer Channel (B Channel)
A type of ISDN service that carries data and voice information using standard DS0 channels at 64Kbps.
STP
A type of cable containing twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil
Symmetric multiprocessor (SMP)
A type of computer with two or more CPUs that share the processing load
MMF
A type of fiber-optic cable that contains a core with a diameter between 50 and 100 microns
Class
A type of object recognized by an NOS directory and defined in an NOS schema. Printers and users are examples of object classes.
Inherited
A type of permission, or right, that is passed down from one group (the parent) to a group within that group (the child)
110 block
A type of punch-down block designed to terminate Cat 5 or better twisted pair wires
Member Server
A type of server on a Windows Server 2003/2008 network that does not hold directory information and, therefore, cannot authenticate others.
Site License
A type of software license that, for a fixed price, allows any number of users in one location to legally access a program.
Explicit One-Way Trust
A type of trust relationship in which two domains that belong to different NOS directory trees are configured to trust each other.
unicast address
A unique IPv6 address that is exclusive to a system. Link-local addresses are unicast addresses.
Segment
A unit of data that results from subdividing a larger protocol data unit. The bus cable to which computers on an Ethernet network work.
Layer 6 (Presentation Layer)
A user has connected to a Web site. The information that is sent to that user's computer is encrypted in an encoded format. This change to the data occurs at the ___________ layer.
Attribute
A variable property associated with a network object. For example, a restriction on the time of day a user can log on is an attribute associated with that user object.
Fedora
A version of Linux packaged and distributed by Red Had.
MD5
A very popular hashing function.
dynamic addressing
A way for a computer to receive IP information automatically from a server program. See Dynamic Host Configuration Protocol (DHCP).
Classless inter-domain routing (CIDR)
A way of allocating IP addresses and routing Internet Protocol packets.
Thread
A well-defined, self-contained subset of a process. Using _____ within a process enables a program to efficiently perform related, multiple, simultaneous activities. _____ are also used to enable processes to use multiple processors on SMP systems.
Extended Service Set (ESS)
A wireless network with more than one access point.
ad-hoc mode
A wireless networking mode where each node is in direct contact with every other node in a decentralized free-for-all. Ad hoc mode is similar to the mesh topology, the simplest way to network wireless computers, but it offers no fine control over shared resources.
Wi-Fi protected Access (WPA)
A wireless security protocol that addresses the weaknesses and acts as a sort of upgrade to WEP. WPA offers security enhancements such as dynamic encryption key generation (keys are issued on a per-user and per-session basis), an encryption key integrity-checking feature, user authentication through the industry-standard Extensible Authentication Protocol (EAP), and other advanced features that WEP lacks.
Wired Equivalency Privacy (WEP)
A wireless security protocol that uses a 64-bit encryption algorithm to scramble data packets. The least secure of the common wireless encryption protocols.
802.11i
A wireless standard that added security features.
What is the main difference between a worm and a virus?
A worm can replicate itself and does not need a host for distribution.
Which of the following is a valid MAC address *AB.07.CF.62.16.BD *145.65.245.10 *FABC.875E.9BG6
AB.07.CF.62.16.BD 12 hexadecimal ranging form 0-9 and A-F only
Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?
ACL
Error Detection
Adding enough extra bits to detect an error, but not enough to correct the error. Retransmission required to recover lost packet. This is called ARQ (automatic repeat request).
Error Correction
Adding even more extra bits to correct errors. Examples are hamming codes and FEC (forward error correction, used in video streams and the like).
What is ARP? What are some of its attributes?
Address Resolution Protocol. Has no error control.
Multicast Address
Address assigned to a group of interfaces on multiple nodes. Packets are delivered to all interfaces.
Anycast Address
Address assigned to a group of interfaces on multiple nodes. Packets are delivered to the "first" or "closest" interface only.
Unicast
Address assigned to one interface of one host. ::/10 means that addresses starting with FE80, FE90, FEA0, and FEB0 are part of the range.
Which two of the following statements about the dynamic host configuration protocol are true? -ADHCP server assigns addresses to requesting hosts -it is used only to deliver IP addresses to host -it cannot be configured to assign the same IP address to the same host each time it boots -It can deliver other configuration information in addition to IP addresses.
ADHCP server assigns addresses to requesting hosts It can deliver other configuration information in addition to IP addresses.
Which of the following are characteristics of MLPS?(Select Two)
Adds labels to data units, Supports variable-length data units
Checksum
Adds single parity bit, can be two dimensional string that determines if arriving data units match data units sent by source. A method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source.
IPsec is implemented through two separate protocols. What are these protocols called? (Select Two)
AH, ESP
Terminal
AKA Dumb Terminal or KVM. A device with little (if any) of its own processing or disk capacity that depends on a host to supply it with applications and data-processing services.
What is coaxial cable type RG-62 used for?
ARCNet
A host wants to send a message to another host with IP address 115.99.80.157. Ip doesn't know the hardwar address of the destination device. Whci protocol can be used to discover the MAC address?
ARP
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. What protocol can be used to discover the MAC address?
ARP
A host wants to sen a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?
ARP address resolution Protocol
Ethernet Encapsulation Method
ARPA
Which WAN technology uses 53 byte fixed length cells?
ATM
Cat
Abbreviation of the word category when describing a type of twisted pair cable
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)
Access method used mainly on wireless networks. Before hosts send out data, they send out a signal that checks to make sure that the network is free of other signals. If data is detected on the wire [or other medium], the hosts wait a random length of time before trying again. If the wire is free the data is sent out.
Electronic Industries Alliance (EIA)
Accredited by ANSI and helps develop and issue standards for telecommunications and electronics.
IANA
(Internet Assigned Numbers Authority) A nonprofit, United States government-funded group that was established at the University of Southern California and charged with managing IP address allocation and the domain name system. The oversight for many of IANA's functions was given to ICANN in 1998; however, IANA continues to perform Internet addressing and domain name system administration.
ICANN
(Internet Corporation for Assigned Names and Numbers)The nonprofit corporation currently designated by the United States government to maintain and assign IP addresses.
IETF
(Internet Engineering Task Force) An organization that sets standards for how systems communicate over the Internet (for example, how protocols operate and interact).
IMAP4
(Internet Message Access Protocol) TCP Port 143
IP Address
(Internet Protocol address) The network layer address assigned to nodes to uniquely identify them on a TCP/IP network. IP addresses consist of 32 bits divided into four octets, or bytes. Hierarchical, where it is going exactly
IP
(Internet Protocol) Internet Layer, Connectionless A core protocol in the TCP/IP suite that operates in the Network layer of the OSI model and provides information about how and where data should be delivered. IP is the subprotocol that enables TCP/IP to internetwork.
ISP
(Internet Service Provider)A business that provides organizations and individuals with Internet access and often, other services, such as email and web hosting
ISOC
(Internet Society) Keeps it accessible and concerns on growth. A professional organization with members from 90 chapters around the world that helps to establish technical standards for the internet.
LDAP
(Lightweight Directory Access Protocol) TCP Port 389
LEAP
(Lightweight Extensible Authentication Protocol) A proprietary EAP authentication used almost exclusively by Cisco wireless products. LEAP is a combination of MS-CHAP authentication between a wireless client and a RADIUS server. See also MS-CHAP and Remote Authentication Dial-In User Service (RADIUS
MTU
(Maximum Transmission Unit) The largest data unit a network (for example, Ethernet or token ring) will accept for transmission.
MAC Sublayer
(Media Access Control Sublayer) The lower sublayer of the Data Link layer. The MAC appends the physical address of the destination computer onto the frame. Framing, addressing and channel access Large frames = less overhead but greater chance of collision and expensive to retransmit
NNTP
(Network News Transfer Protocol) TCP Port 119
NTP
(Network Time Protocol) UDP Port 123
OSI Model
(Open System Interconnection) Model A model for understanding and developing computer-to-computer communication developed in the 1980's by ISO. It divides networking functions among seven layers; Physical, Data Link, Network, Transport, Session, Presentation, and Application.
POP3
(Post Office Protocol version 3) TCP Port 110 Refers to the way e-mail software retrieves e-mail from the e-mail server.
PDU
(Protocol Data Unit) A unit of data at any layer of the OSI Model.
RTP
(Real-time Transport Protocol) Protocol that defines the type of packets used on the Internet to move voice or data from a server to clients. The vast majority of VoIP solutions available today use RTP.
RIR
(Regional Internet Registry) A not-for-profit angency that manages the distribution of IP addresses to private and public entities. ARIN is the RIR for North, Central, and South America
RAS
(Remote Access Server) Refers to both the hardware component (servers built to handle the unique stresses of a large number of clients calling in) and the software component (programs that work with the operating system to allow remote access to the network) of a remote access solution.
RADIUS
(Remote Authentication Dial-In User Service) An AAA standard created to support ISPs with hundreds, if not thousands, of modems in hundreds of computers to connect to a single central database. RADIUS consists of three devices: the RADIUS server that has access to a database of user names and passwords, a number of network access servers (NASs) that control the modems, and a group of systems that dial into the network.
RDP
(Remote Desktop Protocol) TCP Port 3389
SSH
(Secure Shell) TCP Port 22
SMB
(Server Message Block) TCP Port 445
Netstat -an
(Shows TCP and UDP connections numerically.
SMTP
(Simple Mail Transfer Protocol) TCP Port 25
SNMP
(Simple Network Management Protocol) UDP Port 161, 162, 10161, 10162
SYN
(Synchronization) The packet one node sends the request a connection with another node on the network. The SYN packet is the first of three in the three-step process of establishing a connection.
SYN-ACK
(Synchronization-acknowledgment) The packet a node sends to acknowledge to another node that it has received a SYN request for connection. The SYN-ACK packet is the second of three in the three-step process of establishing a connection.
TIA
(Telecommunications Industry Association) Accredited by ANSI and helps develop and issue standards for telecommunications and electronics. A subgroup of the EIA that focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment. Probably the best known standards to come from the TIA/EIA alliance are its guidelines for how network cable should be installed in commercial buildings , known as the "TIA/EIA 568-B Series."
TFTP
(Trivial File Transfer Protocol) UDP Port 69 A connectionless oriented protocol used to transfer files.
bit
(binary digit) A bit equals a single pulse in the digital encoding system. It may have only one of two values: 0 or 1.
Network Address
(virtual address) A unique identifying number for a network node that follows a hierarchical addressing scheme and can be assigned through operating system software. Network addresses are added to data packets and interpreted by protocols at the Network layer of the OSI model.
Which of the following best describes how a switch functions? *It connects multiple segments of different architectures. It translates frames, and broadcasts them to all of its ports. *It connects multiple cable segments and broadcasts frames to all of its ports. *It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.
*It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.
Which of the following are characteristics of an MT-RJ fiber optic connector *They can be used with multimode fiber optic cables *They use metal guide pins to ensure accurate alignement. *They must never be used with single-mode fiber optic cables *They use nickel-plated housing *They use a keyed bayonet *They are used with multifiber fiber optic ribbon cables
*They can be used with multimode fiber optic cables *They use metal guide pins to ensure accurate alignment.
What are the different encapsulation options offered by Link Control Protocol (LCP)?
- Authentication - Compression - Error Detection - Multilink - PPP Callback
Layer 2:
- Data Link layer - Two layers : LLC ( Logical Link Control layer) & MAC ( Media Access Control Layer) - Frames - LLC Provides the OS link to the device drivers - MAC Translates generic network request into device specific terms - Frames
What options are you able to select on a packet filtering firewall?
- Destination addr of packet - Port No. - Source addr of a packet
Interior Gateway Protocol
- Distance vector Algorithms -- Routing by rumors -- Periodical updates to the connected router -- Classful protocol -- takes longer to converge - Link State Algorithms -- all the area in a converged network sees the same pictures -- sends link state advertisements to the area -- SPF - Shortest Path First -- Topology based
IPSec are implemented in two protocol. They are?
- IP Authentication Header (AH) - Encapsulating Security Payload (ESP)
Which WAN connection types use digital communications over POTS?
- ISDN - DSL
Coaxial network cable characteristics:
- It has a conductor made from copper in the center of the cable. - It uses two concentric metallic conductors. - The ends of the cable must be terminated.
Characteristics of ISDN?
- It is a dial-up service that uses existing copper wires for the local loop. - It provides enough bandwidth to transmit data at much higher speeds than standards modems and analog lines. - It lets you transmit voice, video and data over the dame lines.
How do MODEMS work?
- It modulates digital data from the PC into analog data and transmits it on a telephone network - It demodulates analog data from a telephone network into digital PC data.
What does a switch do when an unknown destination frame is received?
- It will send the frame out all ports except the port on which the frame was received.
What are the three phases of PPP session establishment?
- Link-Establishment Phase: Link-Control Protocol (LCP) packets are sent by each PPP device to configure and test the link - Authentication Phase: If required, either CHAP or PAP authenticates the link - Network Layer: Each Network layer routed protocol establishes a service with Network Control Protocol (NCP).
MPLS is a WAN data classification and data carrying mechanism.
- MPLS is a packet switching technology that supports variable-length frames - adds a label to packets between the existing Network and Data Link Later formats. - Information in the labels is used to switch the packet through the MPLS network to the destination. - etc
Which fiber optic cables include both cables in a single connector?
- MT-RJ - LC
Layer 3:
- Network Layer - Routing - Assignment IP address - Packet/ Datagram - Routers & Gateways
Circuit-level gateway/firewall features are:
- Operates at Session Layer (L5) - Keeps a table of known connections and sessions. - Verifies proper sequence of packets. - Ensures TCP 3 Way Handshake process only occurs when appropriate. - Does not filters packet, rather allows/denies sessions.
When do you use a straight through cable?
- PC to Hub/Switch - PC to Routers/ GW - WAP to Hub/Switch
When do you use a crossover cable?
- PC to PC - PC to Uplink port - Router to router - Hub to Uplink
What are the two methods of authentication that can be used with PPP links?
- Password Authentication Protocol (PAP) - Challenge Handshake Authentication Protocol (CHAP)
Layer 1:
- Physical Layer - Cables, Hubs and Repeaters etc - Cat 5, Twisted Pair protocol - Bits
What type of fiber optic cables connects using a twisting motion?
- ST - The T in ST is associated with "T"wist.
What fiber connectors requires polishing as part of the assembly process?
- ST and SC
Layer 5:
- Session Layer - creates the session between clients. establishes session - uses a session ID to keep the data stream separate
Characteristics of an LC fiber optic connector?
- They use a housing and latch system similar to an RJ-45 UTP connector. - They are half the size of standard connectors
Layer 4:
- Transport layer - Concerns with the transportation method - responsible for segmentation - flow control, host to host error corrections, flow control - assignments of port numbers - Segments
Characteristics of ATM?
- Uses fixed-length cells of 53-bytes - Adds labels to data units
Organizational unit
-A container within a domain for managing similar objects.
Global Catalog Server
-A domain controller that also contains a subset of active directory domain services objects from other domains in the forest.
What is a tree?
-A group of domains. -itec.sc.edu, retai.sc.edu, sports.sc.edu are all in the same tree.
Extending the schema
-Adding attributes to the schema, such as adding height, weight, eye color, etc. to a user object.
Layer 7:
-Application layer - protocol association HTTP, Telnet, FTP etc -Integrating of network functionality into the host OS -Enabling communication between network client and services
Transitive Trusts
-Automatically created when a sub-domain is created. -First step for users in one domain to access resources in another domain.
Choosing between groups and OUs
-Choose OU when there is a need to delegate administrative functions.
Shortcut Trusts
-Created to expedite the flow of trusts from one sub-domain to another.
Two ways to help prevent duplication IP address on a network.
-DHCP Server - APIPA
Attributes
-Define an object -For example, a user has a first name, last name, department, phone number, address, etc...
Schema
-Determines the way all users, computer, and other object data are stored in AD DS. -Defines relationships and attributes of objects throughout AD DS
Domain Controller
-Enables user to authenticate to the domain for access to domain resources.
EIGRP
-IGP -Default metrics are bandwidth and delay -Enhanced Interior Gateway Routing Protocol Cisco Distance vector Routing Protocol -CISCO proprietary -Supports VLSM/CIDR
RIPv1
-IGP -Metric Hop max = 15 -Uses Bellman-Ford DV Algorithms -Hold Down time 180 seconds -Classfull routing
IS-IS
-IGP -Metric: Link Cost -Intermediate System to Intermediate System -An IGP, Link-State Protocol
RIPv2
-IGP -Supports CIDR -Hop max = 15 -Implements plain text authentication has added at first then MD5 was added later
What is coaxial cable used for in current times?
-In high interference environments, where un-shielded cabling cannot function well - When connecting home LAN's to an Internet connection provided by the local cable company
What is a forest?
-Multiple domain trees in one instance of active directory domain services.
Server core installation
-No GUI version of the operating system -Saves RAM -Less Maintenance and better security
Operation Master Roles
-One per DOMAIN only.
Multimaster Replication Operation Master Roles
-One per FOREST only
OSPF
-Open Shortest Path First -IGP -Metric: Uses path cost = metrics -Link State Protocol -Supports VLSM/CIDR and faster convergence -DIJKSTRAR
What is Authentication? What phase is it?
-Phase 1 -Access mechanism that verifies a user, process, or computer.
What is Authorization? What phase is it?
-Phase 2 -Decides based on the directory what access rights or rules the authenticated entity is under.
Layer 6:
-Presentation layer - handles syntax, encryption and compression - specifies data format
Originating writes
-Replication of objects between domain controllers is accomplished through the use of a property known as Originating Writes.
which Internet services provides equal upload and download speed?
-SDSL provides equal download and upload speeds
5 Technologies of Directory Services
-TCP-IP - Lightweight Directory Access Protocol (LDAP) support -Domain name systems (DNS) support. -Security support -Ease of administration
Windows Rights Management Services
-The framework for secured information sharing of data by encrypting content and setting a policy on the content.
Characteristics of an MT-RJ fiber optic connector?
-They can be used with multimode fiber optic cables. - They use metal guide pins to ensure accurate alignments.
How to create a DMZ?
-To create a DMZ use two network based firewalls. One connected to the public and one on the private network.
TIA/EIA 568B Wiring specifics
-Used for Cat 5e,6 -Color Coding: 1 White Orange 2 Orange 3 White Green 4 Blue 5 White Blue 6 Green 7 White Brown 8 Brown
Objects
-Users, printers, and computer are some examples of objects.
Domain VS. OU usage
-When an administrator has the choice of creating multiple domains versus multiple organizational units, it is easier to create multiple OUs in one domain.
A class range
0 - 126 A: IP 192.168.3.100/23 GW 192.168.2.1
What is the proper format of a MAC address?
00-00-00-00-00-00(- can also be replaced with .)
What are the common fiber-optic cabling standards?
1) 10BaseFL 2) 100BaseFX 3) 1000BaseSX 4) 1000BaseLX 5) FDDI
Name three methods to carry radio frequency.
1) Direct Sequence Spread Spectrum (DSSS) 2) Frequency Hopping Spread Spectrum (FHSS) 3) Orthogonal Frequency-Division Multiplexing (OFDM)
link state
1) In wireless networking, an indication of whether you are connected. 2) In routing protocols, a type of dynamic routing protocol that announces only changes to routing tables, as opposed to entire routing tables. Compare to distance vector routing protocols.
What are the most common types of coaxial cables?
1) RG-58 2) RG-8 or RG-11 3) RG-62
CRC algorithm
1) multiply i(x) by x^n-k (shifts bits left) 2) divide by g(x) (solves for r(x)) 3) add r(x) (those 0's on right gained from shift become check bits) Errors undetected if no remainder exists.
1Kbps
1,000 bits per second
1Mbps
1,000,000 bits per second
1Gbps
1,000,000,000 bits per second
1Tbps
1,000,000,000,000 bits per second
Describe briefly the Spanning Tree Protocol?
Algorithm that detects cabling loops and then disables an affected port to remove loops.
CRC
Algorithm used to verify accuracy of data in a contained frame
Which of the following is a characteristic of static routing when compared to dynamic routing?
All routers must be manually updated on the router.
Variable-length subnet masking (VLSM)
Allows a network to be divided into different-sized subnets to make one IP network that would have previously been considered a class (such as Class A) look like Class B or Class C.
How does CSMA/CA work?
1. The system asks for permission to transmit 2. A designated authority (such as a hub, router, or access point), grants access when the comms medium is free. 3. The system transmit data and waits for an ACK 4. If no ACK is received, the data is retransmitted.
How does CSMA/CD work?
1. The system listens for traffic, if the line is clear it begins transmitting. 2. During the transmission, the system listens for collisions. 3. If no collisions are detected, the comm succeeds. IF collisions are detected, an interrupt jam signal is broadcast to stop all transmissions. Each system waits a random amount of time before starting over at step 1.
HTTP
Almost all of your users connect to Web sites with Internet Explorer. they usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name?
crimper
Also called a crimping took, a tool used to secure an RJ-45 connector (a "crimp") onto the end of a UTP cable.
Digital video disc (DVD)
Also called digital versatile disk, a ROM medium can hold from 4.7 to 17 GB of information
What is a rollover cable?
Also called the console cable It's used to connect the admin's system to the console port of a CIsco router or switch
10BaseT
An Ethernet LAN designed to run on UTP cabling. Runs at 10Mbps and uses baseband signaling. Max. length between NIC and hub is 100 meters.
Truncated
An IPv6 address can be abbreviated or __________ by removing unnecessary and /or leading 0s.
Global Unicast Address
An IPv6 address that every system needs in order to get on the Internet.
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
An IPv6 tunneling protocol that adds the IPv4 address to an IPv6 prefix.
Extended Service Set Identifier (ESSID)
An SSID applied to an Extended Service Set as a network naming convention.
protocol
An agreement that governs the procedures used to exchange information between cooperating entities; usually includes how much information is to be sent, how often it is sent, how to recover from transmission errors, and who is to receive the information.
Internet Message Access Protocol version 4 (IMAP4)
An alternative to the more popular POP3, it retrieves e-mail from an e-mail server like POP3, but it uses port 143.
Directional antenna
An antenna that can be made to focus in one direction so that it can receive a signal from a specific source. Dish antennas are directional.
Partition
An area of a computer's hard drive that is logically defined and acts as a separate disk drive.
loopback test
An attempt to contact one's own machine for troubleshooting purposes. In TCP/IP-based networking, this test can be performed by communicating with an IPv4 address that begins with an octet of 127. Usually, this means pinging the address 127.0.0.1.
RDN (Relative Distinguished Name)
An attribute of an object that identifies the object separately from its related container(s) and domain. For most objects, the relative distinguished name is the same as its common name (CN) in the distinguished name convention.
Protected Extensible Authentication Protocol (PEAP)
An authentication protocol that uses a password function based on MS-CHAPv2 with the addition of an encrypted TLS tunnel similar to EAP-TLS.
Kerberos
An authentication standard designed to allow different operating systems and applications to authenticate each other.
10BaseFL
An early fiber-optic implementation of Ethernet that runs at 10 Mbps using baseband signaling. Max. segment length is 2km, using multimode cabling, and either SC or ST connectors.
bridged connection
An early type of DSL connection that made the DSL line function the same as if you snapped an Ethernet cable into your NIC.
CCIE
An elite certification that recognizes expert level installation, management and troubleshooting skills on networks that use a range of Cisco devices
tunnel
An encrypted link between two programs on two separate computers.
block cipher
An encryption algorithm in which data is encrypted in "chunks" of a certain length at a time. Popular in wired networks.
asymmetric-key algorithm
An encryption method in which the key used to encrypt a message and the key used to decrypt it are different, or asymmetrical.
stream cipher
An encryption method that encrypts a single bit at a time. Popular when data comes in long streams (such as with older wireless networks or cell phones).
Bit Error Rate Test (BERT)
An end-to-end test that verifies a T-carrier connection.
Kernel
An essential set of programs and computer code that allows a computer operating system to control processor, disk, memory, and other functions central to its basic operation
Frame Relay
An extremely efficient data transmission technique used to send digital information such as voice, data, LAN, and WAN traffic quickly and cost-efficiently to many destinations from one port. Packet-switch technology that works at the Data-Link and Physical Layers that does not use error-checking overhead and has the BECN and FECN congestion control features
bridge loop
An interconnection of bridging devices (switches) are installed in such a fashion that they create a loop, causing packets to loop continuously.
Leaf Object
An object in an operating system's directory, such as a printer or user that does not contain other objects.
Samba
An open source software package that provides complete Windows-style file and printer sharing capabilities.
File System
An operating system's method of organizing, managing, and accessing its files through logical structures and software routines.
broadcast storm
An undesired event on the network caused by the simultaneous transmission of any number of broadcasts across the network segment. Such an occurrence can overwhelm network bandwidth, resulting in time-outs A non-stop flurry of broadcast frames on the network that can keep computers on the broadcast domain from connecting to the rest of the network.
What is crosstalk?
An unwanted interaction, or interference, between two electrical signals
Wi-Fi protected Access 2 (WPA)
An update to the WPA protocol that uses the Advanced Encryption Standard algorithm, making it much harder to crack.
802.11n
An updated 802.11 standard that increases transfer speeds and adds support for multiple in / multiple out (MIMO) by using multiple antennae. and a maximum distance of 1200ft. 802.11n can operate on either the 2.4- & 5-GHz frequency and has a maximum throughput of 600 Mbps. - 11 or 23 Channels
ADC
Analog-to-Digital conversion.
You are concerned about protecting your network from network based attacks from the Internet. Specifically, you are concerned about "zero day" attacks (attacks that have not yet been identified or that do not have prescribed protections).
Anomaly based IDS
network interface unit (NIU)
Another name for a demarc. See demarc in the Glossary.
peer-to-peer mode
Another name for ad hoc mode.
snip
Another term for cable stripper. See cable stripper.
Shell
Another term for the UNIX command interpreter.
What is the most common form of host based IDS that employs signature or pattern matching detection methods?
Anti-virus software
Which of the following measures are you most likely to implement in order to protect against a worm or a Trojan horse?
Anti-virus software
Which of the following statements about the use of anti-virus software is correct?
Anti-virus software should be configured to download updated virus definition files as soon as they become available.
Which three of the following are NOT a valid IP address?
Any IP address with numbers less than 0 or greater than 255 is not valid
Host Computer
Any device that is on a network.
symmetric-key algorithm
Any encryption method that uses the same key for both encryption and decryption.
Proprietary UNIX
Any implementation of UNIX for which the source code is either unavailable or available only by purchasing a licensed copy from Novell (costing as much as millions of dollars). Redistribution of proprietary UNIX versions require paying royalties to Novell.
MAC
Appends physical address of the destination computer onto the frame
HTTP
Application layer protocol that formulates and interprets requests between web clients and servers
Ethernet Frame Format
As for IEEE 802.3 except no SFD field and length is type DA and SA were only 2 bytes long in older implementations
Digital
As opposed to analog signals, digital signals are composed of pulses that can only make a value of 1 or 0
Workgroup
As used in Microsoft networks, a number of users who share drive and printer resources in an independent peer-to-peer relationship
Encapsulated
As you delve into a packet of data with your protocol analyzer, you notice that the frame size is bigger than the packet size. This is because the packet is ___________ inside the frame.
Sequencing
Assigning a placeholder to each piece of a data block to allow the receiving node's Transport layer to reassemble the data in the correct order
Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two)
Authentication for agents and managers, Encryption of SNMP messages
Extensible Authentication Protocol (EAP)
Authentication wrapper that EAP-compliant applications can use to accept one of many types of authentication. While EAP is a general-purpose authentication wrapper, its only substantial use is in wireless networks.
The address range of APIPA:
Automatic Private IP address 169.254.0.0 - 169.254.255.254/ 16
Software Distribution
Automatically transferring a data file or installing a software application from the server to a client on the network
LSA 5
Autonomous System External LSA, produced by ASBRs to advertise destinations outside to the OSPF AS
IEEE 802.5 Token Ring
Avoids collisions Access to medium signalled by passing token around Token frame inserted by Active Ring Monitor Any station takes token and sends data frame Destination copies passing data Sender removes frame on return
What is the primary countermeasure to social engineering?
Awareness
What routing protocol is used by routers on the internet for learning and sharing routes?
BGP
IEEE 802.11 - WLAN
Basic Service Set: Access point, known as a cell that stations can access Extended Service Set: Interconnected cells via a distribution system, appears as a single logical LAN to higher levels
What does BNC stand for?
Bayonet Neil-Concelman
What type of connection do Thin Ethernet and ARCNet use?
Bayonet Neil-Concelman Connector (BNC)
Why shouldn't you use copper (coax or UTP) connections to link two buildings?
Because differences in neutral-to-earth voltage of two buildings can cause major data corruption
Bit stuffing
Begin and end with 01111110 (7E). If 5 consecutive 1's encountered, stuff with a 0 it.
Advantages of VLANs
Better security, uses bandwidth more efficiently, isolates points of failure and increased flexibility
DL Protocol 4 - 1-bit Sliding Window
Bidirectional, window size = 1 for both sender and receiver. Need ACK timer.
Bit/byte/block levels
Bit level - receiver knows start and end of bit Byte level - receiver knows start and end of character Block level - receiver knows start and end of frame
Polynomial codes
Bit strings are treated as representations of polynomials with only binary coefficients (0's and 1's). The k bits are regarded as the coefficient list, for example for 01011000, i(x) = x^6+x^4+x^3.
What is BGMP?
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Token Passing Summary
Bounded access delay but no instant on demand access Can give priority access Good for real-time control systems Complex in practice since all stations must cooperate and token loss must be handled IEEE 802.4 / 802/5 Token Bus / Ring and FDDI uses this
Braiding
Braided metal shielding used to insulate some types of coaxial cable
Data Link layer
Bridges networking media with Network layer
802.7
Broadband Network
Classful Network Architecture
Broken down into five sections, three of which are commonly used by hosts on networks-Classes A, B, & C and is the IPv4 classification system.
What is a BDF?
Building Distribution Frame Used in instances such as a College campus where the ouside line is connected to a MDF (campus) panel which then connects to the BDF panel (building) which connects to the IDF panel (floor)
Which of the following physical topologies are used with Ethernet networks? select two Bus Mesh Ring Star
Bus Star
Which of the following physical topologies are used with Ethernet networks?(2 answers)
Bus, Star
How does Bluetooth work?
By creating a small wireless network called Wireless Personal Area Network
Payload
By default, this is 64 KB maximum, just like IPV4 packets. But this can be increased much further if jumbograms are used.
0x2142
Bypass
PPP Byte Stuffing
Byte stuffs and XORs original byte with 0x20.
Which of the following are requirements of the 1000BaseT Ethernet standards?(3 answers)
CAT 5e cabling, RJ-45 connectors, The cable length must be less than or equal to 100m
What wiring uses the 100/120 block standard?
CAT5 UTP
Which of the following authentication protocols uses a three-way handshake to authenticate users to the network? (Choose two)
CHAP, MS-CHAP
The media access control method of all Ethernet networks is
CSMA/CD
What must install between your network and a T1 line for your network to use the T1 line?
CSU/DSU
Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?
CSU/DSU
What is a CSU/DSU?
CSU/DSU is a device that converts the signal received from the WAN provided. The CSU terminates the digital signal and provides error correction and line monitoring. The DSU converts the digital data into synchronous serial data for connection to a router.
Which of the following services are available regardless of whether the telephone company network is available?
Cable modem
Which of the following functions are performed by proxies? (select two)
Cache web pages, Block employees from accessing certain websites.
CSMA
Carrier Sense Multiple Access When ready to send, listen If channel busy, wait until idle When channel idle, send Listen to channel while sending in order to detect collisions If collision, abort signal with noise burst and wait random time before listening again
Network Backbone
Carries the majority of the network data. Normally doesn't connect endpoints.
What is the minimum cable specification that supports 1000 Mbps Ethernet?
Cat 5
what is the minimum cable specification that supports 1000mbps Ethernet?
Cat 5
Core
Central component of cable designed to carry a signal
MAC in Wireless LANS
Centralised: good for time-sensitive / high priority data but suffers limits of centralisation Distributed: Good for ad-hoc peers with bursty traffic Both: No guarantee that all nodes can hear each other, which makes CD difficult
Network Directory
Centralized database of everything on your network.
Unified Communications
Centralized management for multiple types of network based communications
What is CHAP?
Challenge Handshake Authentication Protocol
When deploying B/G wireless access point, which channels eliminates interference?
Channels 1, 6, 11
American National Standards Institute (ANSI)
Character development on keyboards.
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
Circuit-level
Which type of network establishes a dedicated connection between two hosts who need to communicate on the network, not allowing any other host to use the medium until the communication is complete?
Circuit-switched
Interior Gateway Routing Protocol (IGRP)
Cisco proprietary, distant vector protocol that is classful (no VLSM), has a max hop count of 255, Update Timer of 90 seconds, Invalid Timer of 270 seconds, Holddown Timer of 280 seconds, Flush Timer of 630 seconds, and Administrative Distance 100, uses ASNs for activation
Consider the following IP addresses .
Class A, B, B, C
Which three of the following are Class B addresses?
Class B addresses range of 128-191
Which three of the following IP addresses are Class C addresses?
Class C addresses range of 192-223
B
Class__ nodes in FCCI network are only connected to the primary fiber ring.
A
Class__ nodes in FDDI network are connected to both fiber rings.
Purpose of QoS?
Classify, mark, and prioritize traffic om WAN and LAN links
Which of the following terms are often synonymous with or made possible with CIDR. select 2 OPSF CLASSLESS CLASSSFUL NAT VLSM
Classless VLSM
CIDR address
Classless Inter Domain Routing
BNC connector
Coaxial cable type that uses a twist-and-lock (or bayonet) style of coupling
RG-58
Coaxial cable with 50ohm impedance and a 10 AWG core
RG-59
Coaxial cable with 75ohm impedance and 20-22 AWG core
RG-6
Coaxial cable with impedance of 75 ohms and contains 18 AWG core
Asset Management
Collecting and storing data on the number and types of software and hardware assets in an organizations network
Which of the following is not a reason to use subnets on a network?
Combine different media type on to the same subnet
enable
Command that allows a user to enter privileged level command mode, default level of 15
show version
Command that displays the OS version along with system information
show terminal
Command that displays the settings for the terminal
show users
Command that displays users connected to the router
show history
Command that displays what a user has previously done on the terminal, with a default setting of 10 entries
show flash
Command that lists a current status of the flash memory
show hosts
Command used to display a listening of hosts on the network
show sessions
Command used to display open sessions for your router
show clock
Command used to give the system time and date
Specific Configuration Mode
Commands entered in this mode affect specific interfaces or processes, Router(config-if)#
Global Configuration Mode
Commands entered in this mode affect the entire system, Router(config)#
Non-broadcasts Point-to-multipoint transmission
Communications arrangement in which a single transmitter issues a signal to multiple, defined recipients
Point-to-multipoint
Communications arrangement in which one transmitter issues signals to multiple recievers
A+
CompTIA certification for PC operation, repair, and management
Networking Standards
Comprised of connector types, cable length, and number of computers.
Server
Computer on the network that manages shared resources
Host
Computer that enables resource sharing by other computers on the same network
Web Server
Computer that manages website services
Stand-Alone Computer
Computer that uses applications and data only from its local disks and is not connected to a network
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.
Configure the remote access servers as RADIUS servers.
You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within the connectors?
Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5
You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within the connectors?
Connect pin 1 to pin8, pin 2 to pin 7, pin 3 to pin 6, pin 4 to pin 5
Which of the following tasks are associated with the session layer?
Connection establishment
Session
Connection for data exchange between two parties
F-type connector
Connector used to terminate coaxial cable used for transmitting television or broadband capability
RJ-45
Connector used with STP and UTP cabling
Methods to Access the IOS
Console and Auxiliary ports (Out-of-Band) and Telnet (In-Band)
Point Coordination Function
Contention free service
class license
Contiguous chunk of IP addresses passed out by the Internet Assigned Numbers Authority (IANA).
Which of the following applications typically use 802.1x authentication? (Select Two)
Controlling access through a switch, Controlling access though a wireless access point
You have a network configured to use OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?
Convergence
CDDI
Copper Distributed Data Interface
Backing Up
Copying critical data files to secure storage data
IP
Core protocol in the TCP/IP suite that operates in the Network layer of the OSI model and provides information about how and where data should be delivered
DHCP lease
Created by the DHCP server to allow a system requesting DHCP IP information to use that information for a certain amount of time.
NEXT
Cross talk, or the impingement of the signal carried by one wire onto another wire
You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?
Crossover
You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?
Crossover
You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?
Crossover
you have two switches that you need to connect using their uplink ports. The switches don not support auto-MDI, what type of cable do you use
Crossover
Soft Skills
Customer relations, oral and written communications, dependability, teamwork, leadership abilities
You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned.
DHCP
You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between host. You run protocol analyzer and discover that two hosts have the same IP address assigned. What protocol can you implement on your network to help prevent problems such as this?
DHCP Dynamic Host Configuration Protocol
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values What device should you used
DHCP server
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values.
DHCP server
HDLC Byte Stuffing
DLE STX to begin, DLE ETX to end. If DLE found in data, stuff with another DLE.
What is on Port 53?
DNS
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. WHich protocol should you implement?
DNS
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. What protocol should you implement?
DNS
You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com Which device would you use?
DNS server
You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. What device would you use?
DNS server
Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?
DSL
A switch is associated with which OSI model layer?
Data Link
Your company purchases a new bridge, which filters packets based on the MAC address of the destination computer. On which layer of the OSI model is the device functioning?
Data Link
Your company purchases a new bridge, which filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning?
Data Link
a Switch is associated with which OSI model layer
Data link
DL Protocol 1 - Utopia
Data sent, data received, no errors, everything flows smoothly and no flow control needed. Unidirectional.
cleartext
Data that is in an easily read or viewed industry-wide standard format.
plaintext
Data that is in an easily read or viewed industry-wide standard format.
Traffic
Data transmission and processing activity taking place on a computer network at any given time
Point-to-point
Data transmission with one transmitter and one receiver
Multi-Frame Transmissions
Data unit broken into multiple frames Once medium acquired using DIFS, subsequent frames of MPDUs use SIFS sent upon receipt of ACK
255.0.0.0
Default Class A Subnet Mask
255.255.0.0
Default Class B Subnet Mask
255.255.255.0
Default Class C Subnet Mask
Optical loss
Degradation of a light signal in a fiber-optic cable
Latency
Delay between transmission of signal and it's receipt
802.12
Demand priority networking
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?
Denial of Service
Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?
Denial of Service attack
stateless
Describes a DHCPv6 server that only passes out optional information.
stateful
Describes a DHCPv6 server that works very similarly to an IPv4 DHCP server, passing out IPv6 addresses, subnet masks, and default gateways as well as optional items like DNS server addresses.
Traffic Monitoring
Determining how much data transfer is taking place on a computer network or network segment and notifying admins when a segment becomes overloaded
International Organization for Standards (ISO)
Developed OSI model.
Institute of Electrical and Electronics Engineers (IEEE)
Developed networking standarads (i.e. 802.11).
Router
Device that connects network segments and directs data based on information contained in the data packed
Media converter
Device that enables networks or segments using different media to interconnect and exchange signals
NIC
Device that enables workstation to connect to network and communicate with computers
Modem
Device that modulates analog signals into digital signals at the transmitting end for transmission over telephone lines
Demultiplexer (demux)
Device that separates multiplexed signals once they are received and regenerates them in original form
Amplifier
Device that strengthens or boosts an analog signal
Transceiver
Device that transmits and receives signals
Network components
Device, Media, Network Adapter, Network Operating System, and Protocol.
Which of the following best describes the concept of a virtual LAN?
Devices on the same network logically grouped as if they were grouped on separate networks.
Resources
Devices, data, and data storage space provided by a computer (stand-alone or shared)
DAC
Digital-to-Analog conversion.
How does the DSSS method work?
Direct Sequence Spread Spectrum A modulation technique that transfers data using the full bandwidth of a frequency.
What method does the 802.11b wireless network use to carry radio frequency traffic?
Direct Sequence Spread Spectrum (DSSS)
Channel
Direct communication path between two or more nodes; much like a lane is a distinct transportation path on a freeway
Token rings
Directs links between nodes and a ring topology using tokens to transmit data
Which of the following functions can a port scanner provide?
Discover unadvertised servers, Determining which ports are open on a firewall
RIP, Ripv2, BGP
Distance Vector Dynamic Routing Protocol
Wavelength
Distance between corresponding points on a wave's cycle
Two Types of Dynamic Routing Protocols
Distance-vector and Link-state
Distributability
Dividing complex application program tasks among two or more computers
Standard
Documented agreement containing technical specifications or other precise criteria that are used as guidelines to ensure that materials, products, processes, and services suit their intended purpose
Using the Netstat command you notice that a remote system has made a connection to your Windows server 2003 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing ?
Downloading a file
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
Drop the packet.
Which of the following are examples of social engineering? (Select Two)
Dumpster diving, Shoulder surfing
What is DHCP? What is its key attribute?
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?
EAP
You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?
EAP
Which of the following routing protocols is classified as a balance hybrid routing protocol? EIGRP RIP IS-IS OSPF
EIGRP
Alien cross talk
EMI interference induced on one cable by signals traveling over a nearby cable
alien cross talk
EMI interference induced on one cable by signals traveling over a nearby cable.
How can an organization help prevent social engineering attacks?(Select Two)
Educate employees on the risks and countermeasures, Publish and enforce clearly written security policies.
Network Standard Creation
Either De Facto (because they're widely used) or De Jure (by law, created by a governing body first).
High-level Data-link Control (HDLC)
Encapsulation method for data on serial links that will not encapsulate multiple network protocols on the same link, it's proprietary
Point-to-Point Protocol (PPP)
Encapsulation method utilized to connect WAN links when equipment is purchased from different vendors, it's non-proprietary A protocol that enables a computer to connect to the Internet through a dial-in connection and to enjoy most of the benefits of a direct connect. PPP is considered superior to SLIP because of its error detection and data compression features, which SLIP lacks, and the capability to use dynamic IP addresses.
Checksum
Error-checking that determines if the contents of an arriving data unit match the contents of the data unit sent out by source
Session layer
Establishes and maintains communication between two nodes on the network
Synchronous Digital Hierarchy (SDH)
European fiber carrier standard equivalent to SONET.
CCITT
European standards body that established the V standards for modems.
Security Auditing
Evaluating security measures currently in place on a network and notifying the network admin if a security breach occurs
P2P Network
Every computer can communicate directly with every other computer. By default, no one computer has more authority than another
Contention Domain
Every computer competes with each other to send out the data. To solve this problem you create more contention domains, thereby segmenting the network.
Exterior Gateway Protocols (EGP)
Exchanges packets between Autonomous Systems
Dual IP Stack
Exists when there are two Internet Protocol software implementations in an operating system, one for IPv4 and another for IPv6.
What is EAP? What is it used for?
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
What is EGP?
Exterior Gateway Protocol
Border Gateway Protocol (BGP)
Exterior Gateway Protocol that is commonly used to connect larger organizations to the Internet, has an Administrative Distance of 20 and uses all other IGPs inside of an autonomous system
pad
Extra data added to an Ethernet frame that is less than 64 bytes to bring the frame up to the 64-byte minimum.
You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use? BNC RJ-11 SC F-TYPE RJ-45 ST
F-TYPE
What type of connection are used for broadband using coaxial cable?
F-Type
You want to allow you users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability?
FTP
You want to transfer a file from a UNIX server to a Windows 2000 computer. Which of the following utilities could you use to do this?
FTP TFTP
Entrance facilities
Facilities necessary for a service provider to connect with another organizations LAN or WAN
CSMA w/ CD Properties (3)
Fairness - equal access to all stations, no priorities Probabilistic - unbounded access time, bad at heavy loads due to exponential back-off Doesn't waste channel sending broken frames
True or False. A reason to implement subnets is to combine different media type on to the same subnet.
False
What is FDDI?
Fiber Distributed Data Interface at 10 Mbps
Ethernet 100BaseFX networks use what type of cabling?
Fiber optic
802.8
Fiber-Optic
Ethernet 100BaseFX networks use what type of cabling?
Fiber-optic
FCS
Field in a frame responsible for ensuring that data carried by the frame remains intact
Which of the following are characteristics of a packet filtering firewall? (Select Two)
Filters IP address and port, Stateless
Which of the following are characteristics of a circuit-level gateway? (Select Two)
Filters based on sessions, Stateful
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
Firewall
You are the administrator of a company's network. You want to prevent unauthorized access to your intranet from the internet. Which of the following should you implement?
Firewall
You are the network administrator for a small organization. Recently, you contacted an ISP to connect your organization's network to the internet to provide users with internet access. Since doing so, it has come to your attention that an intruder has invaded your network on three separate occasions. What type of network hardware should you implement to prevent this from happening again?
Firewall
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect you organization's network to the Internet to provide users with Internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the Internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again?
Firewall
Which three of the following IP addresses belong to the Class A network 114.0.0.0? (Assume the network is indicated by the default portion of the IP address.)
First oclet is 114 (choose 3)
In an IP addressing scheme using default subnet masks, which of the following IP addresses can you assign to a host?
First oclet is 132
Distance-Vector Protocol
First routing protocols that have a distance metric of hop count and has each router send all of it's routing table only to it's neighbors
Class D
For IPv4, what class is used for multicasting?
802.1x
For organizations, using, authentication for wireless networks is recommended.
Cat 5
Form of UTP that contains four wire pairs and can carry up to 100Mbps
Cat 3
Form of UTP that contains four wire pairs and can carry up to 10Mbps
Baseband
Form of transmission in which digital signals are sent through direct pulses applied to a wire
Broadband
Form of transmission in which signals are modulated as a radio frequency analog pulses with different frequency changes
Multiplexing
Form of transmission that allows multiple signals to travel simultaneously over one medium
A router is connected to network192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168/4/0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet address to network 10.1.0.0/16.
Forward the packet to the next hop router specified by the route to network 0.0.0.0
How does the FHSS method work?
Frequency Hopping Spread Spectrum Transmits radio signals by switching frequencies at a high rate. The benifit is it is harder for someone to tap into the data as the frequency continues to change
What method does Bluetooth use to carry radio frequency traffic?
Frequency Hopping Spread Spectrum (FHSS)
IEEE 802.11 - Media Types (3)
Frequency-hopping spread spectrum: low bandwidth, 1-2Mbs but good interference resistance Direct-sequence spread spectrum (similar to CDMA): very good range and variable speed, upto 11Mbs (802.11b) Orthogonal FDM (similar to ADSL): up to 53Mbs but lower range (802.11a / 802.11g)
Synchronous transmission
Full frame sent, receiver needs to stay synched the whole time. Less overhead, receiver stays in sync with separate clock line or embedding clock information into data (biphase coding).
Generating function
G = g(x) = x^n-k+gsub(n-k-1)*x^n-k-1+gsub(n-k-2)*x^n-k-2+...+1
What type of module might a switch use to allow it to modify the media type supported by a switch port?
GBIC SFP
What type of module might a switch use to allow it to modify the media type supported by a switch port? select 2 GBIC MPLS OX-x SFP
GBIC gigabit interface converter SFG small form-factor pluggable
Framing(4)
Gaps: insert gaps - timing hard to guarantee Counting: Include length field to delimit data, often used with another framing method Serial Line Framing: at least 1 transition per byte, bit asynchronous, byte synchronous Flags: special signal at start & end of frame, byte stuffing in the form of an escape signal to identify data if it has the same signal as FLAG (or ESC)
Category 6 Cable Type
Gigabit networks. Has different versions that run at 250 MHz and 500 MHz.
Cladding
Glass or plastic shield around the core of a fiber-optic cable
Extra Modes for Cisco Devices
Global Configuration, Specific Configuration, Setup
Which of the following are advatages of using fiber optic cabling for a network, as opposed to other types of cabling? *Greater cable distances without a repeater *Lower installation cost *Immunity to electromagnetic interference *Faster installation
Greater cable distances without a repeater Immunity to electromagnetic interference
Network
Group of computers and other devices (printers) connected by, and can enhance data via some type of transmission media
Serial Encapsulation Methods
HDLC, PPP, Frame Relay and X.25
What is on Port 80?
HTTP
Which protocol is used on the world wide web to transmit web pages to web browsers?
HTTP
which protocol is used for securely browsing a Web site?
HTTPS
What is on Port 443?
HTTPS/ SSL
Shielded Twisted Pair (STP) Cables
Have an aluminum shield inside the plastic jacket that surrounds the pairs of wires.
IPv4-mapped addresses
Have the first 80 bits set to 0 (note the double colon), the next 16 set to 1 (shown as ffff), and the last 32 bits populated by the IPv4 address.
Internet Engineering Task Force (IETF)
Help develop and maintain Internet standards as well as its evolution.
Cat 5e
Higher grade version of Cat5 wi
Cat 6a
Higher-grade version of Cat 6 wiring that further reduces attenuation and cross-talk
What is a HCC cable?
Horizontal Cross-Connect cable Is the patch cable that connects to the patch panel
What should be change to enable the two host to communicate?
Host A IP to: 192.168.2.(anything) This insures that there is a path to communicate
DNS Host A records:
Host A records identity the IP address a known host name.
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?
Host based IDS
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?
Host based firewall
128
How many bits is an IPv6 address?
Three
How many layers are incorporated in the OSI model communications subnetwork?
Four
How many layers does the TCP/IP model have?
An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device?
Hub
An access point that conforms to the IEEE802.11b standard acts most closely to what other networking device? Router Patch bay terminal Hub Gateway
Hub
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? select 2 Hub router repeater gateway bridge switch
Hub repeater
Redistribution Point
Hub, router, or switch.
Which organization is responsible for allocating public IP addresses?
IANA
260
IBM STP cable supports ___ nodes.
72
IBM UTP cable supports ___ nodes.
Which of the following protocols allows hosts to exchange messges to indicate problems with packet delivery?
ICMP
PING
ICMP (no port) A command that uses Internet Control Message Protocol (ICMP) packets to query by IP or by name, and which works across routers. Usually it is the first tool used to check if a system is reachable.
What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?
IDS
Which of the following devices can monitor a network and detect potential security attacks?
IDS
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?
IDS
Ethernet
IEEE 802.3 standard
Thinnet
IEEE physical layer standard 10mbps throughput over coaxial cable 10base-2
Thicknet
IEEE physical layer standard for throughput over a coaxial copper cable
EUI-64
IEEE standard defining 64-bit physical address
802.3
IEEE standard for Ethernet networking devices and data handling (using CSMA LCD access method)
802.2
IEEE standard for error & flow control in data frames
802.5
IEEE standard for token ring networking devices and data handling
802.11
IEEE standard for wireless networking
You have a private network connected to the Internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use? Distance vector IGP Static BGP Link state Dynamic
IGP
You have a private network connected to the internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use?
IGP
You are asked to recommend an e-mail retrieval protocol for a company's sales team. The sales team needs to access e-mail from various locations and possible different computers. The sales team does not want to worry about transferring e-mail messages or files back and forth between these computer. Which em-mail protocol was designed for this purpose?
IMAP
What is on Port 143?
IMAP (Mail Client)
Which of the following protocol stores e-mail on the mail server and gives users a choice to download mail or keep it on the server?
IMAP4
You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets.
IP address
Network
IP resides on the ___________ layer of the OSI model.
Which of the following devices is capable of detecting and responding to security threats?
IPS
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use?
IPS
Which of following network layer protocols provides authentication and encryption services for IP based network traffic?
IPSec
Which of the following is the best countermeasure against man-in-the-middle attacks?
IPSec
IPv6 tunneling
IPv6 packets can be encapsulated inside IPv4 datagrams.
What is the maximum data rate of an ISDN BRI line?
ISDN BRI carries two B channels and one D channel. Each B channel can maintain a throughput of 64 Kbps, for a total of 128 Kbps. The D channel is used for line management, and does not contribute to data throughput.
Which WAN connection types use digital communications over POTS?(Select two)
ISDN, DSL
Two Types of Trunking
ISL and IEEE 802.1Q
Automatic Private IP Addressing (APIPA)
If a windows client cannot get an IP address from a DHCP server and has not been configured statically, the __________ will auto-assign a number on this network.
CA
If channel is idle, wait IFS else wait until idle then wait IFS If still idle, transmit frame or random back-off before transmission if channel was initially busy, else, wait until idle again
568B
If you are making a crossover cable and one end is 568A, what should the other end be?
4, 16
If you put a ___ Mbps in a ___ Mbps Token net, you will have problems.
Crossover Cable
If you want to connect a computer directly to another computer without using a switch, you use a _____________.
You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?
Implement version 3 SNMP
tunnel broker
In IPv6, a service that creates the actual tunnel and (usually) offers a custom-made endpoint client for you to use, although more advanced users can often make a manual connection.
multicast address
In IPv6, a set of reserved addresses designed to go only to certain systems.
CN (Common Name)
In LDAP naming conventions, the name of an object.
DC (Domain Component)
In LDAP naming conventions, the name of any one of the domains to which an object belongs.
Workgroup
In Microsoft terminology, a group of interconnected computers that share each others' resources without relying on a central file server.
Role
In Microsoft terminology, the primary purpose of a Windows Server 2008 server.
Domain Model
In Microsoft terminology, the type of client/server network that relies on domains, rather than workgroups.
Unmasked
In Subnetting, if the binary digit is a 0, then it is __________.
Masked
In Subnetting, if the binary digit is a 1, then it is __________.
Virtual DOS machine
In Windows 2000, a process that emulates an MS-DOS windows in which to run MS-DOS or 16-bit Windows programs in a designated are of memory
Root Domain
In Windows Server 2003 or Server 2008 networking, the single domain from which child domains branch out in a domain tree.
default gateway
In a TCP/IP network, the IP address of the router that interconnects the LAN to a wider network, usually the Internet. This router's IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.
broadcast domain
In a switched Ethernet network, all the nodes connected to a single switch, and therefore, able to hear one another's broadcasts.
beaconing
In a token ring network, the recovery process used when a hardware failure occurs on the ring
collision domain
In a traditional Ethernet network, a group of nodes that hears each other's traffic. The traffic in an unswitched Ethernet netwrok is subject to collisions. a physical network segment where data packets can collide with one another when being sent on a shared medium, in particular, when using the Ethernet networking protocol
What is the difference between a byte-oriented protocol and a bit-oriented protocol?
In byte-oriented protocols, control information is encoded using entire bytes. On the other hand, bit-oriented protocols use single bits to represent the control information.
Directory
In general, a listing that organizes resources and correlates them with their properties. In the context of NOSs, a method for organizing and managing objects.
IEEE 802.11
In order to ensure compatibility, the WAP and other wireless devices must all use the same __________.
Forest
In the context of Windows Server 2003/2008, a collection of domain trees that use different namespaces. A forest allows for trust relationships to be established between trees.
Per Seat
In the context of applications, a licensing mode that limits access to an application to specific users or workstations.
hardware tool
In the context of network troubleshooting, a device dedicated to the purpose of performing one or more tests on a network.
first
In token the ___ node on the wire becomes the active monitor.
Basic Service Set
In wireless networking, a single access point servicing a given area.
network name
In wireless networking, another name for service set identification (SSID).
MCITP
In-depth knowledge of Microsoft products
socket pairs
Information stored in RAM about a session, identifying both sides of a conversation between computers.
End Point
Information stored in RAM about a session, identifying one side of a conversation between computers. Workstation, file server, etc.
socket
Information stored in RAM about a session, identifying one side of a conversion between computers.
Explain infrared wireless networking.
Infrared devices communicate through the Infrared Data Association protocol. The devices have a maximum throughput of 4 Mbps and a maximum distance of 1 meter.
Which of the following strategies are used to prevent duplicate IP addresses being used on a network?
Install a DHCP server on the network Use automatic private IP addressing
You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted. You discover that user download a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation doe not occur. What should you do?
Install a network virus detection software solution.
Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. What is the best way to do this?
Install a proxy server.
In the OSI model, which of the following functions are performed at the application layer?
Integration of network functionality into the host operating system Enabling communication between network clients and services
Switch
Intelligence that allows it to use MAC addresses to create point-2-point connections between 2 conversing computers, effectively giving them the full bandwitch of the network. A device designed to increase performance of a network by moving frames as quickly as possible to their destinations based off of addresses found in the MAC Address Table. Works at Layer 2 and has all devices connected at the same collision domain, but not at the broadcast domains
Setup Requirements
Interfaces, Protocols, Network Addresses, Passwords
What is a IDF?
Intermediate Distribution Frames IDF panels may represent a floor or some specific area
What is IP?
Internet Protocol
What is IPSEC? Why is it significant?
Internet Protocol Security. This is the defacto standard for VPN security.
ICANN
Internet corporation to maintain and assign IP addresses
802.1
Internetworking
DL Protocol 2 - Stop and wait
Introduces ACKs to prevent receiver from being flooded with data, but still no errors. Unidirectional.
DL Protocol 5 - Go Back N
Introduces network_layer_ready event, generally looks for cumulative ACKs.
DL Protocol 3 - Positive Acknowledgement with Retransmissions
Introduces noisy channel (errors). Timers are required, sequence numbers are required, duplicate frames may be needed. Unidirectional.
Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?
It can deliver other configuration information in addition to IP addresses, A DHCP server assigns addresses to requesting hosts
Which of the following best describes how a switch functions?
It connects multiple cable segments (or devices) and forwards frames to the appropriate segment.
Which of the following statements accurately describes how a modem works?(2 answers)
It demodulates analog data from a telephone network into digital PC data. It modulates digital data from the PC into analog data and transmits it on a telephone network.
Which of the following statements accurately describes how a modem works? select 2 *It transmits digital signals over ordinary telephone copper wiring at a rate up to 128kbps *It demodulates analog data from telephone network into digital PC data *It modulates digital data from the PC into analog data and transmits it on a telephone network. *It demodulates analog PC data into digital data that can be transmitted through a telephone network.
It demodulates analog data from telephone network into digital PC data *It modulates digital data from the PC into analog data and transmits it on a telephone network.
Which of the following statements accurately describes how a modem works?
It demodulates anolog data from a telphone network into digital pc data. It modulates digital data from the pc inito analog data and transmits it on a telelphone network
Which of the following is NOT a primary characteristic of a worm?
It infects the MBR of a hard drive
Which of the following is true about the MAC address? select 2 *it is a 64-bit address *It is a 48 bit address *it is typically represented by octets of decimal numbers between 0-255 *it is typically represented by hexadecimal numbers
It is a 48 bit address It is typically represented by hexadecimal numbers
Which of the following is true about the mac address
It is typically represented by hexadecimal numbers it is a 48-bi address
Which of the following is true about the MAC address?(2 answers)
It is typically represented by hexadecimal numbers. It is a 48 bit address.
Which three of the following are characteristics of ISDN?
It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines, It is a dial-up service that uses existing copper wires for the local loop, It lets you transmit voice, video, and data over the same lines.
Under which of the following circumstances might you implement BGP on your company network and share routes with Internet router?
It the network is connected to the Internet using multiple ISPs
Which of the following authentication methods uses tickets to provide single sign on?
Kerberos
Which of the following protocols can your portable computer use to connect to your company's network via a tunnel through the Internet? (Select two)
L2TP
LC
LC
Which of the following connectors are used with fiber optic cables and include both cables in a single connector? select 2 SC ST LC MT-RJ BNC
LC MT-RJ Picture is MT-RJ
What is on Port 389?
LDAP - Active Directory (Windows), e-Directory (Novell), Open Directory (Apple)
Two Sub-layers
LLC: Logical Link Control MAC: Medium Access Control
MAN
Larger than a LAN, connecting clients and servers from multiple buildings within a geographic area
MTU
Largest data unit a network will accept for transmission
At which OSI model layer does a media converter operate?
Layer 1
Which OSI model layer does a media converter operate?
Layer 1
Network media and connectors and the electrical signals traveling over them are represented by standards at what level in the OSI model?
Layer 1 (Physical Level)
At which OSI model layer does a media converter operate?
Layer 1 (Physical layer)
What is L2TP? What is significant about this protocol?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
At which of the following OSI layers does a router operate?
Layer 3
At which of the following OSI layers does a router operate?
Layer 3 Network Layer
At which layer of the OSI model is HTTPS encryption performed?
Layer 6
Application Layer
Layer 7 of the OSI model. PDU is Data HTTP, Telnet, SMTP Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network. Communication between software apps and lower layer network services for interpretation
RTT
Length of time it takes for a packet to go from sender to receiver and back
Which of the following are functions of the MAC sublayer?
Letting devices on the network have access to the LAN Defining a unique hardware address for each device on the network
What is LEAP?
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
OSPF, IS-IS
Link State Dynamic Routing Protocol
Open Shortest Path First (OSPF)
Link-state routing protocol that uses the SPF algorithm, is classless (uses VLSM), has a metric of cost, an Administrative Distance of 110 and uses LSAs to maintain link-state databases and routing tables
LLC Sublayer
Logical Link Control Sublayer The upper sublayer in the Data Link layer. The LLC provides a common interface and supplies reliability and flow control services. Flow and error control for a single hop Detection: parity bit or Cyclic Redundancy Check (CRC) Correction: Forward Error Correction (FEC)
Subnet
Logical division of the network.
The Data link layer of the OSI model is comprised of two sublayer. What are they?
MAC LLC
Which of the following do switches and wireless access points use to control access through the device?
MAC filtering
Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?
MPLS
intelligent
MSAUs are ___ devices and can monitor the status of the nodes connected.
closing
MSAUs have the capavility of ___ a relay if they detect an error.
What is a MDF?
Main Distribution Frame Outside line enters the building and connects to the MDF panel which in turn connects to IDF panels
Name two tasks that routers perform.
Maintain information about paths through an internetwork. Route data based on logical network addresses
Capturing packets as they travel from one host to another with the with the intent of altering the contents of the packets is a form of which security concern?
Man-in-the-middle attack
Accounting/Administration Management
Management principle that consists of gathering usage statistics for the purposes of billing and accounting
Fault Management
Management principle that detect, isolate, and correct faults in the network, including diagnostic testing and maintaining error logs
Security Management
Management principle that is used to protect a network from unauthorized access and keep users from creating or deleting services
Configuration Management
Management principle that requires documenting and controlling changes to network equipment, hardware, and software
Performance Management
Management principle that uses procedures to evaluate and report the functionality of networked equipment
IANA
Manages IP address allocation and domain name system
RIR
Manages distribution of IP addresses to private and public entities
IEEE 802.3 Frame Format
Manchester encoding Preamble-7|SD-1|DA-4|SA-4|Length-2|Data+Pad-1500|FCS-4 Preamble is alt 0s and 1s to establish synchronisation Start Delimiter: 10101011 receiver can miss preamble and still sync - compatible with token ring (802.4, 802.5) Length = bytes in this frame (optional) Pad = 0 - 46 bytes if req'd as frame must be 64 bytes minimum to enable collision detection Frame Check Sequence = CRC on all fields except preamble, SD and FCS
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks?
Manually reconfigure the default route to point to the new next hop router.
Half Duplex
Means that the network adapter will send and receive data but not at the same time.
Transmission Media
Means through which data is transmitted and received
Hertz (Hz)
Measure of frequency equivalent to the number of amplitude cycles per second
Bandwidth
Measure of the difference between highest and lowest frequencies that a medium can transmit
Volt
Measurement used to describe the degree of pressure an electrical current exerts on a conductor
MAC Address
Media Access Control Address 00:60:80 (block id) 8c:00:54 (device id), encoded on NICs A 12-character string, usually 48 bits (6 bytes) binary hard-coded address that uniquely identifies each node on a network. The manufacturer hard codes the MAC address into the NIC. This address is composed of block ID and device ID. Written as 6 pairs of hex digits (e.g. 00:11:85:7A:BC:E4) bit 47: 0 = ordinary addr, 1 = gp addr bit 46: 0 = global addr (fixed in hardware), 1 = local addr (assigned by admin) bits 24-45: vendor code (IEEE assigned) bits 0-23: unique code set by vendor 2⁴⁶ -> 10¹³ possible global addresses
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX ports.
Media converter
You have a server that has a 100baseFX network interface card thath you need to connect to a switch. The switch only has 100BaseTX switch port. What device should you use? *Gateway *media converter *Hub *repeater
Media converter
You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
Mesh
You want ot implement a fault tolerant topology as you interconnect routers on you wide area network. Whcih of the following would meet your needs?
Mesh
You have a network that uses logical bus topology. How do messages travel through the network?
Messages are broadcast to all devices connected to the network.
electronic mail (e-mail)
Messages sent from one person to another via computer.
you have a network that uses a logical ring topology. How do messages travel through the network?
Messages travel from one device to the next until they reach the destination device.
Structured cabling
Method for uniform enterprise-wide, multi-vendor cabling systems specified by TIA/EIA 568
FM
Method of data modulation in which frequency of carriers signal is modified by the application of the data signal
Flow control
Method of gauging appropriate rate of data transmission based on how fast recipient can accept data
Statistical multiplexing
Method of multiplexing in which each node on a network is assigned a separate time slot for transmission, based on nodes priority and need
TDM
Method of multiplexing that assigns a time slot in the flow of communications to every node on the network and in that time slot carries data from that node
multicast
Method of sending a packet in which the sending computer sends it to a group of interested computers.
MAN
Metro Area Network
802.6
Metropolitan Area Network (MAN) standard
MS-CHAP
Microsoft's dominant variation of the CHAP protocol; it uses a slightly more advanced encryption protocol.
Link-Layer Topology Discovery
Microsoft's version of LLDP
What is unbounded media?
Microwave, wireless, and infrared network links.
infrastructure mode
Mode in which wireless networks use one or more wireless access points to connect the wireless network nodes centrally. This configuration is similar to the star topology of a wired network.
OSI
Model for understanding and developing computer-computer communication developed in the 1980's
To access the Internet through the PSTN, what kind of connectivity device must you use?
Modem
Which of the following functions are performed at the Physical layer of the OSI model?
Movement of data across network cables
100Base-FX
Multi-mode fiber (The Medium) - Half duplex: 400 meters; full duplex: 2 km Single-mode fiber (The Medium) - Full duplex: 10km
What are the two types of fiber media?
Multimode Fiber (MMF) Single-Mode Fiber (SMF)
What is MMF for and what is it used for?
Multimode Fiber cable Uses multiple rays of light (modes) simultaneously with each ray of light running at a different reflection angle Used to carry data short distances Used for infrared LED systems
DWDM
Multiplexing technique used over single or multimode fiber-optic cable in which each signal is assigned a wavelength for its carrier wave
WDM
Multiplexing technique which each signal on a fiber-optic is assigned different wavelength, which equates to its own subchannel
FDM
Multiplexing that assigns a unique frequency band to each communications subchannel
Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?
Mutual authentication
Explain the relationship of NAT and PAT
NAT translates one address to another. With only NAT, each private address needs a public address. PAT allows one address to serve multiple address.
LSA 7
NSSA External LSA, produced by ASBRs in a not-so stubby area
NTFS
NT files system The native Windows 2000 files system, which has a more detailed directory structure than FAT and supports security measures not found in FAT. It also supports large disks, long filenames, and file compression.
You have a large TCP/IP network and want to keep hosts; real time clock synchronized. What protocol should you use?
NTP
Basic Service Set Identifier (BSSID)
Naming scheme in wireless networks.
What are the two types of crosstalk?
Near-end crosstalk (NEXT) Far-end crosstalk (FEXT)
Solid Green Wire
Negative polarity. Receives data.
Solid Orange Wire
Negative polarity. Sends data.
What is on Ports 135-139?
NetBios
At what OSI layer does a router operate to forward network messages?
Network
What is NAT?
Network Address Translator
Which network component connects a device with the transmission media and allows it to send and receive messages?
Network Interface Card
NIC
Network Interface Card Operates in both Data link and Physical layers
Which of the following devices operate at the OSI model layer 2?(2 answers)
Network Interface Card, Switch
LSA 2
Network LSA, produced by every Designated Router
IPX
Network Layer, Connectionless, Novell Developed
802.10
Network Security standard
You manage a small network at work. Users use workstations connected to your network. No portable computers are allowed. As part of your security plan, you would like to implement scanning of emails for all users. You want to scan the emails and prevent any emails with malicious attachments from being received by users. Your solution should minimize administration, allowing you to centrally manage the scan settings. Which solution should you use?
Network based firewall
Your company has a connection to the Internet that allows users to access the Internet. You also have a web server and an email server that you want to make available to Internet users. You want to create a DMZ for these servers. Which type of device should you use to create the DMZ?
Network based firewall
Which network component connects a device with the transmission media and allows it to send and receive messages?
Network interface card
Which network component connects a device with the transmission media and allows it to sen and receive messages?
Network interface card (NIC)
IP address
Network layer address assigned to nodes to uniquely identify them on a TCP/IP network
Fragmentation
Network layer service that subdivides segments it receives from Transport layer into smaller packages
Unpopulated Segment
Network segment that does not contain end notes; workstations
Populated segment
Network segment that includes end nodes, such as workstations
Print Services
Network service that allows printers to be shared by multiple users on a network
Management Services
Network services centrally administer and simplify complicated management tasks on a network
Mail Services
Network that manages storage and transfer of e-mail between layers on a network
IEEE 802.11 - Station Types (3)
No Transition: Stationary or moves only within range of one BSS BSS Transition: Moves between BSSs in one ESS, addressing must recognise new location and deliver via appropriate BSS ESS Transition: Moves between BSSs in different ESSs, does not guarantee connection to upper layers
You are installing networking wiring for a new Ethernet network at you company's main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete you have a spool of Category 3 network cable in storage. Upon investigation it appears very similar to category 5 wiring. Should you substitute 3 cabling for Category 5 cabling to finish the project?
No, Category 5 cabling has more twists per inch tan category 3 cabling to reduce cross-talk and support higher data rates.
token
Nodes in 802.5 use the ___ passing access method to gain access to the wire.
Overhead
Non-data information that must accompany data for a signal to be properly routed and interpreted by the network
0x2102
Normal Boot Procedure
Frequency
Number of times that a signal's amplitude of change over a fixed period of time, expressed in cycles per second or hertz
Twist ratio
Number of twists per meter or foot in a twisted pair cable
The speed of OC 1?`
OC 1 speed: 51.85 Mbps. Other OC will be a multiple of OC 1.
Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?
OSPF
Which of the folowing routing protocols divides the network into areas with all networks required to have an area 0 EIGRP OSPF RIP IS-IS
OSPF
Which of the following routing protocols are classified as link state routing protocols. select 2 IS-IS EIGRP RIPv2 RIP OSPF
OSPF IS-IS
Stub Area
OSPF Area that allows LSA 3's and blocks LSA 5's
Not-So-Stubby Area
OSPF Area that allows external LSA 7's into the OSPF system
Totally Stubby Area
OSPF Area that blocks both LSA 3's and LSA 5's
Which of the following best describes OSPF? -OSPF is a classful distance vector routing protocol -OSPF is a classless lin-state routing protocol. OSPF is a classless distance vector routing protocol. OSPF is a classful link-state routing protocol.
OSPF is a classless link-state routing protocol.
What are the main differences between the OSPF and IS-IS routing protocols?
OSPF requires an area 0, while IS-IS does not
Link-State Protocols
OSPF, EIGRP (Hybrid)
You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?
Obtain a certificate from public PKI
routing loop
Occurs when interconnected routers loop traffic, causing the routers to respond slowly or not respond at all. Dynamic routing protocols sometimes cause routing loops when a router goes down, but static routes usually cause routing loops.
Infrastructure Mode
Occurs when wireless clients connect to and are authenticated by a wireless access point, which can be expanded by creating a wireless distribution system-a group of WAPs interconnected wirelessly.
ISL
Older encapsulation method that added 30 byes of overhead data to the frame
Resource
On a Windows 2000 Server network, a server, shared printer, or shared directory that can be accessed by a user.
ports
On a network hub, the connections that receive the wire links from nodes.
Which two of the following describe the channels and the data transfer rates used for ISDN BRI(Select Two)
One D channel operating at 16 Kbps, Two B channels operating at 64 Kbps each
baud
One analog cycle on a telephone line.
Connectivity Device(s)
One of several types of specialized devices that allows two or more networks or multiple parts of one network to connect and exchange data
Subchannel
One of the many distinct communication paths established when a channel is multiplexed or modulated
6in4
One of the most popular of all the IPv6 tunneling standards, and one of only two IPv6 tunneling protocols that can go through a NAT.
Tunnel Information and Control protocol (TIC)
One of the protocols that set up IPv6 tunnels and handle configuration as well as login.
Tunnel Setup Protocol (TSP)
One of the protocols that set up IPv6 tunnels and handle configuration as well as login.
Distributed Coordination Function (DCF)
One of the two 802.11 standards that define data collision avoidance, and the only one currently implemented. DCF specifies strict rules for sending data onto the network media.
What is OSPF?
Open Source Path First - this is a routing protocol
You are the administrator for a secure network that uses firewall filtering. Several network users have requested to access Internet Usenet groups but are unable. What needs to be done to allow users to access the newsgroups?
Open port 119 to allow NNTP service.
802.11g
Operates at 2.4 GHz, throughput of 54Mbps, and a maximum distance of ~300 feet and is backward compatible with 802.11b. - 11 Channels
Parity
Operates on a word by word basis and adds 12.5% overhead.
How does the 568B standard order the wires of a UTP connection?
Orange/White Orange Green/White Blue Blue/White Green Brown/White Brown
ANSI
Organization of more than 1000 representatives from industry and government who determine standards fro electronics industry in addition to other fields
How does the OFDM method work?
Orthogonal Frequency-Division Method Data is delivered by being spread across multiple parallel channels
Which method do the 802.11g and 802.11n wilreless networks use to carry radio frequency trafic?
Orthogonal Frequency-Division Multiplexing (OFDM)
Which of the following associates a port number with a host on a private network? VLSM PAT NAT CIDR
PAT
Which of the following is a mechanism for granting and validating certificates?
PKI
What is on Port 110?
POP3
Which of the following TCP/IP protocols do e-mail clients use to download messages from a remote mail server?
POP3
Steps to Bring up a Router
POST, Load IOS from Flash Memory to RAM and Load config from NVRAM (startup-config) into RAM (running-config)
Which of the following describes the lines used in local loop for dial-up telephone access?
POTS
You are configuring your computer to dial up to the Internet. What protocol should you use?
PPP
Which of the following protocols of services is commonly used on cable Internet connections for user authentication?
PPPoE
You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?
PPPoE
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network.
PPTP
Which of the following terms identifies the network of dial-up telephone and the long-distance lines?
PSTN
You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel?
PSTN
Which type of network divides data to be transmitted into small units and routes these units from the originating system to the destination system, allowing multiple, concurrent communications on the network medium?
Packet-switched
Ethernet Frame
Packets sent within the LAN.
A Smurf attack requires all but which of the following elements to be implemented?
Padded cell
Punch-down block
Panel of data receptors into which twisted pair wire is inserted, or punched down, to complete a circuit
Segment
Part of a network, usually composed of a group of nodes that share the same communications channel for their traffic
Vertical-cross connect
Part of a networks backbone that supplies connectivity between a building's floors
66 block
Part of an organization's cross-connect facilities, a type of punch-down block used for many years to terminate telephone circuits. It does not meet Cat 5 or better standards, and so it is infrequently used on data networks.
100 block
Part of an organization's cross-connection facilities, a type of punch-down block designed to terminate Cat 5 or better twisted pair wires.
What is PAP?
Password Authentication Protocol
enable secret
Password that overrides the default password that uses MD5 encryption
enable password
Password used on pre-10.3 system that uses Type 7 encryption
Remote User
Person working on a computer on a different network or geographical location from LANs server
Users on your network report that they have received an email stating that the company has just launched a new website for employees, and to access the Web site they need to go there and enter their user name and password information. No one in your company has sent this email. What type of attack is this?
Phishing
At which layer of the OSI model do hubs operate?
Physical
at which layer of the OSI model do hubs operate?
Physical
Primary Rate Interface (PRI)
Physical Interface that supports 23 B-data channels of 64 kbps and one 64 kbps channel for a total bit rate of 1.544 Mbps A type of ISDN that is a full T-1 line, carrying 23 B channels (totaling approximately 1.5 Mbps).
Basic Rate Interface (BRI)
Physical Interface that supports two 64 kbps B-data channels and one 16 kbps channel The basic ISDN configuration, which consists of two B channels (which can carry voice or data at a rate of 64 Kbps) and one D channel (which carries setup and configuration information, as well as data, at 16 Kbps).
Network Segment
Physical division of a network. Connected by a hub, switch, or router.
RS-232
Physical layer standard used for serial communications
Topology
Physical layout of computers on a network
What is bounded media?
Physical network cabling (copper and fiber).
What topology is used with 100BaseTX Fast Ethernet networks?(2 answers)
Physical star/logical bus, Physical star/logical star
Connectors
Pieces of hardware that connect the wire to the network device, be it file server, workstation, etc
Cable configuration for loopback plug using single RJ-45?
Pin 1 - Pin 3 Pin 2 - Pin 6
Rollover cable configuration for the cable with RJ-45?
Pin 1 - Pin 8 Pin 2 - Pin 7 Pin 3 - Pin 6 Pin 4 - Pin 5
Conduit
Pipeline used to contain and protect cabling
You are adding new wires in you building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area.
Plenum
What is Plenum?
Plenum cable is laid in plenum space in buildings. Facilitates circulation for heating/AC system
Which switch features are typically used with VoIP? (Select Two)
PoE, VLAN
What is PPP?
Point to Point Protocol
What is PPTP?
Point to Point Tunneling Protocol
What is PPP?
Point-to-Point Protocol (PPP) is a Data Link layer protocol that can be used over either asynchronous serial (dial-up) or synchronous serial (ISDN) media. It uses Link Control Protocol (LCP) to build and maintain data-link connections. Network Control Protocol (NCP) is used to allow multiple Network layer protocols (routed protocols) to be used on a point-to-point connection. The basic purpose of PPP is to transport layer 3 packets across a Data Link layer point-to-point link, and it's nonproprietary. The PPP protocol stack is specified at the Physical and Data Link layers only.
You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all other sites.
Point-to-multipoint
You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link What type of connection is being used?
Point-to-point
DNS Pointer (PTR) records
Pointer (PTR) records identify the hostname for known IP address
Demand Priority
Polling technique where nodes send out their signal state to a hub.
What is on Ports 161 and 162?
Port 161 is SNMP and Port 162 is the SNMP Manager
What is PAT?
Port Address Translator
21
Port ____________ is used by the File Transfer Protocol.
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
Port authentication
You want to make sure that a set of servers will only accept traffic for specific network services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?
Port scanner
Registered
Ports 1024-49,151 are ports used by vendors for proprietary applications. They are known as ________ ports.
Port Range 1024-49-151
Ports used by vendors for proprietary applications. These must be registered with the IANA (e.g., Microsoft registered 3389 for use with the Remote Desktop Protocol). Registered Ports
Green & White Stripe Wire
Positive polarity. Receives data.
Orange & White Stripe Wire
Positive polarity. Sends data.
Voltage
Pressure of an electrical current
Private Addresses
Private IP address: Under RFC1918 (A) 10.0.0.0 - 10.255.255.255 (B) 172.16.0.0 - 172.31.255.255 (C) 192.168.0.0 - 192.168.255.255
you have a small network at home that is connected to the Internet. On your home network you have a serve with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with The server. You are able to connect to other hosts on the internet. Why can't you access the server?
Private addresses are not accessible through the Internet.
setup
Privileged command that allows a basic level of configuration for the router
configure
Privileged command that allows for the configuration to be entered from the network, terminal, or router's memory
write
Privileged command that is used to save changes to the configuration
Privileged Exec Mode
Privileged mode; provides access to all other router commands; Level 2-15, ex. Router#
Slotted ALOHA
Probability of collisions reduced, as sending must synchronise with the start time of each slot Master station sends short signal at the start of each time frame to sync clocks 37% successful transmission
Address Management
Process of centrally administering a finite number of networking addresses for an entire LAN
Segmentation
Process of decreasing the size of data units when moving data from a network that can handle larger data units to a network that can handle smaller data units
License Tracking
Process of determining number of copies of a single application that are currently in use on a network and whether said number exceeds authorized number of licenses
Load Balancing
Process of distributing data transfer activity evenly so that no single device is overwhelmed
IEEE
Promote development and education in the electrical engineering and computer science fields
Scalable
Property of a network that allows you to increase size easily or add nodes
Internet Protocol version 4 (IPv4)
Protocol in which addresses consist of four sets of numbers, each number being a value between 0 and 255, using a period to separate the numbers. It is often called dotted decimal format. No address may be all 0s or all 255s. Examples of valid addresses include 192.168.0.1 and 64.176.19.164.
Application layer
Protocols allow software programs to negotiate formatting procedural, security, synchronization, and other requirements
Transport layer
Protocols ensure that data are transferred from point A to point B reliably and without errors
Physical layer
Protocols in the Presentation layer generate and detect signals so as to transmit and receive data over a network medium
Presentation layer
Protocols translate between the application and the network
Network layer
Protocols translate network addresses into their physical counterparts and decide how to route data
LLC
Provides a common interface and supplies reliability and flow services
ISP
Provides organizations and individuals with internet access and often other services
What is on Port 8080?
Proxy Server
Your computer has an IP address of 161.13.5.15. Your computer is on a
Public network
What is QoS?
Quality of Service
Which of the following is a platform independent authentication system that maintains a database of user accounts and passwords that centralizes the maintenance of those accounts?
RADIUS
Which of the following are differences between RADIUS and TACACS+?
RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.
Which type of devices is required to implement port authentication through the switch?
RADIUS server
You want to set up a service to allow multiple users to dial into the office server from modems on their home computers. What service should you implement?
RAS
You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save files on the server, and print files to a printer connected to a computer at home. Which protocol should you use?
RDP
What is on Port 3389?
RDP/ Terminal Services
YOu have a small home network connected to the internet using an RG_6 cable. You need to move the router connecting the network to the internet, but can't find any RG-cable. Which cable types could you use instead
RG-59
F-type connectors are typically used with cables using which of the following standards? select 2 CAT 5e RG-59 RG-58 RG-6 CAT 5 CAT 6e
RG-59 RG-6
F-type connectors are typically used with cables using which of the following standards?
RG-59, RG-6
Of the following cables, which offer the best protection against EMI? CAT 5e CAT 6e CAT 5 RG-6
RG-6
Which of the following cable classification are typically used for cable and satellite networking with coaxial? select 2 RG-6 RG-8 RG-58 RG-59
RG-6 RG-59
Which of the following protocols has a limit of 15 hops between any two networks
RIP
Which of the following protocols has a limit of 15 hops between any two networks?
RIP
What is the main difference between RIP and RIPv2?
RIP is a classful protocol, while RIPv2 is a classless protocol.
What is the main difference between RIP and RIP2?
RIP uses classful protocol, while RIP2 is classless protocol.
Which of the following of RIP is true? -RiP is suitable for large networks -RIP uses hop counts as the cost metric -RIP is a link state routing protocol. -RIP is the routing protocol used on the Internet
RIP uses hop count as the cost metric
Distance-Vector Protocol Types
RIP, RIP v2, IGRP, EIGRP (Hybrid)
Which of the following connectors is used with Ethernet 10BaseT networks?
RJ-45
Which of the following standards is typically used in a rollover cable?
RS-232
Which of the following standards is typically used in a rollover cable? RJ-11 RS-232 RG-6 RG-58
RS-232
DB-25
RS-232 standard 25-pin connector
DB-9
RS-232 standard 9-pin connector
Examples of VOIP Protocol:
RTP: Real Time Transport Protocol SIP: Session Initiation Protocol H 323
Bend radius
Radius of the maximum arc into which you can loop a cable before you will cause transmission errors
Collision Avoidance
Ready To Send - request the channel Clear To Send - response to RTS frame ACK - sent of receipt of frame Other stations hear all / part of the RTS-CTS-ACK exchange and can infer how long the channel will be busy Repeated failures to transmit -> exponential back-off
Asynchronous transmission
Receiver resyncs at the end of each character transferred
DL Protocol 6 - Selective Repeat
Receiver window > 1, NACKs.
What does RJ stand for?
Registered Jack
Unshielded Twisted Pair (UTP)
Regular twisted-pair cabling
ITU
Regulates international telecommunications and provides developing countries with technical expertise and equipment
Zipcord cable
Relatively short fiber-optic cable in which two strands are arranged side by side in conjoined jackets
Patch cable
Relatively short section (3-25ft) of cabling with connectors on both ends
Which three of the following functions are performed by the OSI Transport layer?
Reliable message delivery data segmentation and reassembly end to end flow control
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?
Remote access
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?(2 answers)
Repeater, Hub
Impedance
Resistance that contributes to controlling an electric signal
ACK
Response generated at Transport layer of the OSI model that confirms to a sender that its frame was received
Restoring
Retrieving files from a backup
What is RARP?
Reverse Address Resolution Protocol.
Which of the following topologies connects each device to a neighboring device?
Ring
RC4
Rivest Cipher 4 A popular streaming symmetric-key algorithm.
RSA
Rivest Shamir Adleman An improved public-key cryptography algorithm that enables secure digital signatures.
RBAC
Role-based access control The most popular authentication model used in file sharing, defines a user's access to a resource based on the roles the user plays in the network environment. This leads to the idea of groups, which, in most networks is nothing more than a name that has clearly defined accesses to different resources. User accounts are placed into various groups
You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complet the configuration tasks. Which type of cable would you most likely use?
Rollover
You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use?
Rollover.
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network office. What type of security risk is this?
Rouge access point
What network devices commonly uses OSPF?
Router
Which of the following hardware devices links multiple networks and directs traffic between networks?
Router
LSA 1
Router LSA, produced by ever router
Autonomous System Boundary Router (ASBR)
Router that injects external link-state advertisements into the OSPF database
Area Border Router (ABR)
Router that is connected to more than one area and maintains a link-state database for each area to which it belongs
Internal Router
Router that keeps only one link-state database and has all of it's interfaces in the same OSPF area
Designated Router
Router that sends LSA 2 advertisements to the rest of the network and is in charge of the area
Backup Designated Router (BDR)
Router that takes over the function of the DR if the DR fails
Backbone Router
Router with at least one interface attached to Area 0
You manage a network with two switches. The switches are connected together through their Gigabit uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in the VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate?
Routing
What is RIP?
Routing Internet Protocol
Static Routing
Routing method in which the Network Administrator manually enters routes in the routing table
Dynamic Routing
Routing method that builds routing tables from information received from other routers in the network
Default Routing
Routing method that is used to send packets with a remote destination network that is not located in the routing table of the next-hop router
Link-State Protocol
Routing protocols that send only the state of their own links to all routers, also known as Shortest Path First or Distributed-Database Protocols
Multithreading
Running several program processes or part (threads) at the same time
Which of the following connectors usually require polishing as part of the assembly process? select 2 IDC SC AUI BNC ST
SC ST
SC CONNECTOR
SC CONNECTOR
Which of the following Internet services provides equal upload and download bandwidth?
SDSL
What type of module might a switch use to allow it to modify the media type supported by a switch port?(2 answers)
SFP, GBIC
What protocol sends e-mail to a mail server?
SMTP
Your company has just acquired another company in the same city. You are given the task of integrating the two e-mail systems so that messages can be exchanged between e-mail servers. However, each network uses an e-mail package from a different vendor. Which TCP/IP protocol will enable messages to be exchanged between systems?
SMTP
What is on Port 25?
SMTP Server
Management Information Base (MIB)
SNMP's version of a server. See also Simple Network Management Protocol (SNMP)
What WAN technology allows interoperability of vendor hardware for fibre optic networking?
SONET
Which of the following is WAN technology that allows for interoperability of vendor hardware for fiber optic networking?
SONET
What is on Port 1433?
SQL Server
SFTP uses what security protocol?
SSH
Telenet is inherently insecure because its a communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
SSH
What is on Port 22?
SSH
Which of the following protocols can be used to securely manage a network device from a remote connection?
SSH
FTPS uses what security protocol?
SSL
Which protocol does HTTPS use to offer greater security in Web transactions?
SSL
You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations. Which of the following protocols would be most likely to be allowed through the widest number of firewalls?
SSL
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two)
SSL, TLS
Which of the following connectors is used with fiber optic cables and connects using a twisting motion? BNC LC F-TYPE SC ST
ST
What are the two most common types of fiber-optic connectors?
ST (twist and lock) SC (push-fit)
What is on Port 111?
SUN RPC
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
Satellite
Which of the following is the most susceptible to interference related to atmospheric conditions?
Satellite
SCP
Secure Copy Protocol One of the first SSH-enabled programs to appear after the introduction of SSH. SCP was one of the first protocols used to transfer data securely between two hosts and thus might have replaced FTP. SCP works well but lacks features such as a directory listing.
SFTP
Secure FTP Designed as a replacement for FTP after many of the inadequacies of SCP (such as the inability to see the files on the other computer) were discovered.
SSL
Secure Sockets Layer Port 443 A protocol developed by Netscape for transmitting private documents over the Internet. SSL works by using a public key to encrypt sensitive data. You send the encrypted data over an SSL connection, and decrypt it at the receiving end using a private key.
Two Types of Switches
Segment-Based and Port Based
Broadband transmission
Send analog signal over multiple frequencies via full duplex communication.
ALOHA
Send data as soon as it's ready to go If collision occurs, stations receive garbled data, so wait random time and try again Not v efficient - 18% theoretical max channel utilisation
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?
Send the frame out ports 2-8
An 8-port switch receives a frame on port number. The frame is addressed to an unknown device. What will the switch do?
Send the frame out ports 2-8
Sliding windows
Sender has a window of frames to send and expect ACKs for without receiving the previous ACK. Basically more than one frame can be up in the air at once, but you can't send too many frames ahead. Receiver also has window of accepted frames, although windows can be of different sizes.
direct-sequence spread spectrum (DSSS)
Sends data out on different frequencies at the same time.
Ticket-Granting Ticket (TGT)
Sent by an Authentication Server in a Kerberos setup if a client's hash matches its own, signaling that the client is authenticated, but not yet authorized.
Serial Transmissions
Sent sequentially bit by bit along the wire. 1 bit at a time.
Parallel Transmissions
Sent simultaneously across seperate channels. 1 byte at a time.
Which of the following connectors is typically used on one end of a rollover cable?
Serial
Remote Access Server
Server that runs communications services that enable remote users to log onto a network. Also known as access server
What is a SSID?
Service Set Identification (Network Name) A 32-bit identification string used in the header of each 802.11 data packet
Extension identifier
Set of characters assigned to each NIC by manufacturer traditional 48-bit physical addressing scheme
API
Set of routines that make UI a part of a software application
line console
Sets a console user-mode password
line vty
Sets a password used for telnet sessions
IETF
Sets standards for how systems communicate over the internet
line aux
Sets the user-mode password for the auxiliary port
What does STP stand for?
Shielded Twisted Pair
Priority Timing
Short IFS (SIFS): highest priority, immediate response actions (ACK, CTS), gets medium first PCF IFS (PIFS): medium priority polls from central controller DCF IFS (DIFS): lowest priority, ordinary and management data
Ferrule
Short tube within fiber-optic cable connector that encircles fiber strand and keeps it properly aligned
interframe space (IFS)
Short, predefined period of silence in CSMA/CA appended to the waiting time when a device detects activity on the line.
dotted decimal notation
Shorthand method for discussing and configuring binary IP addresses.
Netstat Command
Shows basic connections.
Netstat -a
Shows in depth TCP and UDP connections.
Synchronous Transport Signal (STS)
Signal method used by SONET. It consists of the STS payload and the STS overhead. A number appended to the end of STS designates signal speed.
Analog
Signal that uses a variable voltage to create continuous waves, resulting in an exact transmission
Undetectable Collisions
Signals from 2 hosts collide but neither host can hear the collision or a hidden receiver can hear one host but that host cannot hear the receiver
Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities list in a database?
Signature based
Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are several kilometers apart? Fiber Channel mode Single mode Multi mode dual mode
Single mode
What is SMF and what is it used for?
Single-Mode Fiber cable Uses one ray of light, known as a mode Used for long distances Used for laser-diode-based systems
Datagram (Packet)
Smallest amount of data that we can send. Has a header and footer attached to it. Header contains the source and target. Footer contains the Error Detection Code (EDC). Basic transfer unit associated with a packet-switched network in which the delivery arrival time and order are not guaranteed. Can be sent to a certain computer, a group of computers, or all computers connected to the media
Which of the following is a form of denial of service attack that uses spoofed ICMP PACKETS TO FLOOD A VICTIM WITH ECHO REQUESTs USING A BOUNCE/AMPLIFICATION network?
Smurf
Codec (Compression/Decompression)
Software or hardware that codes and decodes data to and from analog format.
Network operating system (NOS)
Software that enables computers on a network to communicate and to share resources and files
port scanner
Software that probes ports on another system, logging the state of scanned ports. You can use it to find an unintentionally open port so that it can be secured. Hackers like to use port scanners to find vulnerabilities in other systems
NOS
Software that runs on a server and enables the server to manage data, users, groups, security, applications and other network functions
Protocol Stack
Sometimes a protocol suite such as TCP/IP is referred to as a _____________.
STP
Spanning-Tree Protocol An IEEE 802.1 standard used by layer 2 devices to automatically monitor links between all bridges in a network in order to prevent broadcast loops A protocol used in Ethernet switches that allows a switch that detects a bridge loop to disable the loop by turning off any port causing the loop.
File Server
Specialized server that allows clients to share applications and data over the network
protocol analyzer
Specialized software or hardware used to view the Application, Session, Network, and Data Link layer information on every frame going through your network.
Optical carrier (OC)
Specification used to denote the optical data carrying capacity (in Mbps) of fiber-optic cables in networks conforming to the SONET standard. The OC standard is an escalating series of speeds, designed to meet the needs of medium-to-large corporations. SONET establishes OCs from 51.8 Mbps (OC-1) to 39.8 Gbps (OC-768).
RJ-11
Standard connector used with UTP cabling (Cat 3 or level 1) to connect analog telephones
BNC
Standard for coaxial cable connectors named after its coupling methods and its inventors
Protocol
Standard method of format for communications between network devices
V standards
Standards established by CCITT for modem manufacturers to follow (voluntarily) to ensure compatible speeds, compression, and error correction.
Portable operating system interface (POSIX)
Standards set by the Institute of Electrical and Electronics Engineering for portability of applications
Component object model (COM)
Standards that enable software object, such as a graphic, to be linked from one software component into another one. COM is the foundation that makes object linking and embedding (OLE) possible
you have a small network at home that is connected to the internet. On you home network you have a server with the IP address of 192.168.55.199/16. You have a single o]public address that is shared by all hosts on your private network. You want to configure the server as a Web server and allow internet hosts to contact the server to browse a personal web sit What should you use to allow access?
Static NAT
Three Switching Methodologies
Store and Forward, Cut-Through and Fragment-Free
You need to connect to a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?
Straight through
What are the two types of cables that you can make with UTP cable?
Straight-Through and Crossover
Which of the following applications is more likely to justify the investment in Category 6 cable?
Streaming video
Serial
Style of data transmission in which the pulses that represent bits follow one another along a single transmission line
TIA
Subgroup of EIA that focuses on standards for IT, wireless, satellites, fiber optics and telephone equipment
What best describes the purpose of using subnets?
Subnets divide an IP network address into multiple network addresses
Which of the following best describes the purpose of using subnets?
Subnets divide an IP network multiple newirk addresses
LSA 4
Summary LSA for ASBRs, produced by Area Border Routers that advertise Autonomous System Boundary Routers
LSA 3
Summary LSA, produced by Area Border Routers
Which of the following best describes how addressing is configured for the subnet?
Supernetting
You manage a subnet that uses the following subnet address: 1987.162.1.0/23. What best describes how addressing is configured for the subnet?
Supernetting
A VPN is used primarily for what purpose?
Support secured communications over an untrusted network.
Which of the following is a characteristic of SDSL?
Supports data traffic only (no voice)
Which device is used on a LAN and offers guaranteed bandwidth to each port? router switch Bridge
Switch
Which of the following connectivity hardware is used to create a LAN?
Switch
Which of the following devices is used on LAN and offers guaranteed bandwidth to each port? Bridge switch router
Switch
Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port?
Switch
Which of the following devices operate at OSI model layer 2. select 2 Firewall Hub Router Switch Repeater NIC
Switch Network interface card (NIC)
When configuring VLANs on a switch, what is used to identify VLANs on a switch, what is used to identify VLAN membership of a device?
Switch port
SVC
Switched Virtual Circuits Virtual Circuit used by Frame Relay that are established for the duration of data transmission and is taken down once the data transfer is complete
What are three devices that operate at the Data Link layer of the OSI model?
Switches, Network Interface Cards, Bridges
Fragment-Free
Switching methodology that forwards the frame after checking the first 64 bytes of the frame. Used to be the default switching method for Cisco
Cut-Through
Switching methodology that forwards the frame upon receipt of the destination address and does not wait to check if the frame is complete before forwarding. Used in high performance, high speed data centers
Store and Forward
Switching methodology that stores the complete Ethernet frame, checks the header and FCS to ensure the frame is complete, and then forwards the frame to the destination. The default switching method for Cisco switches
Segment-Based Switching
Switching that supports multiple MAC or IP addresses from a single port
Port-Based Switching
Switching that supports only one host per port
SONET characteristics?
Synchronous Optical Network American fiber carrier standard -Transport protocol used for other traffic types (such as ATM) - Dual counter-rotating fiber optic rings
What is on Port 514?
Sys Log (Unix) or Event Manager (Windows)
Binary
System founded on using 1's and 0's to encode information
Coax (RG62) connectors
T connector, end connector, coupler, terminator
You are implementing Internet connectivity for a new start-up company. Your client will provide on-line storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20 - 30 Mbps. Which type of service should you implement?
T3
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two)
TACACS+, RADIUS
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?
TCP
You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?
TCP
DNS Ports:
TCP 53: Connection orientation services UDP 53: Queries
PPTP (Point to Point Tunneling Protocol)
TCP Port 1723
Telnet
TCP Port 23 Protocol that enables users with the proper permissions to log on to a remote host computer to act as a Telnet client. The user can then perform tasks on a remote computer, called a Telnet server, as if he or she were sitting at the remote computer itself.
fragmentation
TCP/ data packets into right size
Static Allocation
TDM, FDM, CDMA CO Guaranteed bandwidth Bounded latency
Dynamic Allocation
TDM: allocate time based on demand (statistical multiplexing), CL
What is on Port 69?
TFTP (Trivial File Transfer Protocol)
subnetting
Taking a single class of IP addresses and chopping it into multiple smaller groups.
IAB
Technical advisory group of professionals responsible for Internet grown and management strategy etc
Split Horizon with Poison Reverse
Technique in which routes that are learned from a neighboring router are not sent back to that neighboring router
Fault tolerance
Techniques that employ hardware and software to province assurance against equipment failures, computer service interruptions, and data losses
TIA/EIA
Telecommunications Industry Association/Electronics Industries Alliance
What wiring uses the 66 block standard?
Telephone Systems
What is on Port 23?
Telnet
TACACS
Terminal Access Controller Access Control System Plus A proprietary protocol developed by Cisco to support AAA in a network with many routers and switches. It is similar to RADIUS in function, but uses TCP port 49 by default and separates authorization, authentication, and accounting into different parts. - Provides three protocols, one each for authentication, authorization, and accounting. - Uses TCP. - Encrypts the entire packets contents. - Supports more protocol suites than RADIUS.
Difference between T568A and T568B
The A version starts with white/green, green, white/orange, blue, white/blue, orange, white brown, brown. While B, starts with White/Orange.
Integrated Services Digital Network (ISDN)
The CCITT (Comité Consultatif Internationale Téléphonique et Télégraphique) standard that defines a digital method for telephone communications. Originally designed to replace the analog telephone systems, ISDN lines have telephone numbers and support up to 128 Kbps transfer rates. ISDN also allows data and voice to share a common phone line. Never very popular, ISDN is now relegated to specialized niches.
What is CHAP?
The Challenge Handshake Authentication Protocol (CHAP) is used at the intial statup of a link and at periodic checkups on the link to make sure the router is still communicating with the same host. After PPP finishes its initial link-establishment phase, the local router sends a challenge request to the remote device. The remote device sends a value calculated using a one-way hash function called MD6. The local router checks this hash value to make sure it matches. If they don't, the link is immediately terminated.
Two Main Files that Cisco Hardware Relies On
The Cisco Internetwork Operating System (IOS) and configuration (startup-config)
169.254.0.0
The Class B network number used for Automatic Private IP Addressing (APIPA).
E3
The European Counterpart of a T3 line that carries 16 E1 lines (512 channels), for a total bandwidth of 34.368 Mbps—making it a little bit slower than an American T3.
E1
The European counterpart of a T1 connection that carries 32 channels at 64 Kbps for a total of 2.048 Mbps—making it slightly faster than a T1.
LAN, CAN, MAN
The FDDI standard has potential to act as a backbone for ___s, ___s, and ___s.
X Window System
The GUI environment for UNIX and Linux systems.
You administer a Web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows: IP address: 192.168.23.8, HTTP Port: 1030, SSL Port: 443. Users complain that they can't connect to the web site when they type www.westsim.com. What is the most likely source of the problem?
The HTTP port should be changed to 80.
What is HDLC?
The High-Level Data-Link Control (HDLC) protocol is a populare ISO-standard, bit-oriented, Data Link layer protocol. It specifies an encapsulation method for data on synchronous serial data links using frame characters and checksums. HDLC is a point-to-point protocol used on leased lines. No authenication can be used with HDLC.
What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack? (Select two)
The IDS logs all pertinent data about the intrusion, An alert is generated and delivered via Email, the console, or an SNMP trap.
802.16
The IEEE standard for broadband wireless metropolitan area networking (also known as WiMax) with a range of up to 30 miles.
802.2
The IEEE standard for error and flow control in data frames. Logical Link Control
802.11
The IEEE subcommittee that defined the standards for wireless to wireless data communications.
Ethernet
The IT director asks you to connect a client computer to an 802.3ab network. This network uses the __________ standard.
netsh
The Net Shell Command
What is PAP?
The Password Authentication Protocol (PAP) is the less secure of the two methods. Passwords are sent in clear text, and PAP is only performed upon the initial link establishment. When the PPP link is first established, the remote node sends the username and password back to the originating router until authentication is acknowledged.
Physical Memory
The RAM chips installed on the computer's system board that provide dedicated memory to that computer.
Internet Engineering Task Force (IETF)
The TCP/IP model is maintained by the __________.
IPCONFIG
The Windows version of the IFCONFIG command.
active monitor
The ___ ___ is responsible for creating the token and passing to the next node and removing any duplicates. The mechanism used to manage a token ring. The network node with the highest MAC address on the ring becomes the active monitor and is responsible for management tasks such as preventing loops and ensuring that tokens are not lost
First
The ________ octet of the IP address defines which class the address is a member of.
Token Ring
The __________ network architecture is physically a star and logically a ring.
Multitasking
The ability of a processor to perform multiple activities in a brief period of time (often seeming simultaneous to the user.)
Clustering
The ability to share the computer load and resources by linking two or more discrete computer systems together to function as though they were one
Route Summarization
The ability to take a group of subnetworks and summarize them, on the router, as one network route
CSMA/CD
The access method Ethernet systems use in LAN technologies, in which the sending nodes first listen for traffic on the wire, send when no traffic is detected, continue to listen, and if a collision is detected the sending nodes each generate a random number to determine the amount of time to wait, and resend after that time has expired.
Subnetting
The act of dividing a network into smaller logical subnetworks.
Map
The action of associating a disk, directory, or device with a drive letter.
0.0.0.0/0
The address for a default route
link-local address
The address that a computer running IPv6 gives itself after first booting. The first 64-bits of a link-local address is always FE80::/64.
IP addressing
The addressing scheme of the IP protocol by which each machine on a TCP/IP network gets a unique address that identifies the machine. These addresses group together sets of computers into logical networks, and equipment that understands TCP/IP addressing can communicate with each other between LANs, in a WAN.
Throughput
The amount of data that a medium can transmit during a given period of time
Route Invalid Timer
The amount of time that must elapse for a router to determine if a route has become invalid
Transmission
The application of data signals to a medium or the progress data from one point to another
Plenum
The area above the ceiling tile or below the sub-floor in a building
PowerPC
The brand of computer central processing unit invented by Apple Computer, IBM, and Motorola, and used in IBM servers.
SPARC
The brand of computer central processing unit invented by and used in Sun Microsystems servers.
Which of the following are requirements of the 1000BaseT Ethernet standards? select all the apply *SC or ST connectors *The cable length must be less than or equal to 100m *RJ-45 connectors *The cable length must be less than or equal to 1000m *CAT 5e cabling Fiber optic cable
The cable length must be less than or equal to 100m *RJ-45 connectors CAT 5e cabling
Virtualization
The capability for operating multiple logical servers---or virtual servers---on a single machine.
Multitasking
The capability of a computer to run two or more programs at the same time
Remote Access
The capability to access a computer from outside a building in which it is housed. Remote access requires communications hardware, software, and actual physical links.
Which of the following is true about single mode fiber optic network cabling? *The central core is composed of braided plastic or glass fibers *It's less expensive than multimode fiber optic cabling *It doesn't support segment lengths as long as that supported by multimode fiber optic cabling. *The central core is smaller than the multimode fiber optic cabling. *It transmits multiple rays of light concurrently
The central core is smaller than that of multimode fiber optic cabling
IFCONFIG
The command used in operating systems other than Windows that gives you information about a computer's IP settings. The /all switch gives additional detailed information, including DNS server addresses and MAC addresses.
Namespace
The complete database of hierarchical names (including host and domain names) used to resolve IP addresses with their hosts.
Source Code
The computer instructions written in a programming language that is readable by humans. Source code must be translated into a form that is executable by the machine, typically called binary code (for the sequence all zeros and ones) or target code.
startup-config
The configuration file found in NVRAM
last mile
The connection between a central office and individual users in a telephone system.
running-config
The copy of the configuration file that is loaded in RAM from VRAM
Kernel
The core of a UNIX or Linux system. this part of the operating system is loaded and run when you turn on your computer. It mediates between user programs and the computer hardware.
Total cost of ownership (TCO)
The cost of installing and maintaining computers and equipment on a network, which includes hardware, software, maintenance, and support costs
V.92 Standard
The current modem standard, which has a download speed of 57,600 bps and an upload speed of 48 Kbps. V.92 modems have several interesting features, such as Quick Connect and Modem on Hold.
Schema
The description of object types, or classes, and their required and optional attributes that are stored in an NOS's directory.
A network is connected following the IEEE802.3 specifications. Which of the following best describes when a device can transmit messages? *The device listens to determine if the transmission media is free. *The device transmits whenever it is ready. *The device requests permission from a controlling device. *The device with the token can use the transmission media. *The device is notified of its turn to send messages.
The device listens to determine if the the transmission media is free.
A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages?
The device listens to determine if the transmission media is free.
DS0
The digital signal rate created by converting an analog sound into 8-bit chunks 8000 times a second, with a data stream of 64 Kbps. This is the simplest data stream (and the slowest rate) of the digital part of the phone system.
6to4
The dominant IPv6 tunneling protocol, because it is the only IPv6 tunnel that doesn't require a tunnel broker. It is usually used to directly connect two routers because it normally requires a public IPv4 address.
Attenuation
The extent to which a signal has weakened after traveling a given distance
Attenuation
The extent to which a signal has weakened after traveling a given distance.
token ring
The failure of one node in a ___ ___ network can disrupt the entire ring.
Default Gateway
The first IP address of the device that a client computer will look for when attempting to gain access outside the local network.
Physical Layer, Data Link Layer, Network Layer, and Transport Layer
The first four layers of the OSI Model are what?
Main distribution frame
The first point of interconnection between an organizations LAN or WAN and a service provider's facility
802.11b
The first popular wireless networking standard, it operates at 2.4 GHz, throughput of 11Mbps, and a maximum distance of 300 feet; 802.11g is backward compatible with it. - 11 Channels
Explain the purpose and properties of routing and switching
The first router in the path to the destination network
Block ID
The first set of six characters that make up the MAC address and that are unique to a particular manufacturer.
Data Link Layer, Network Layer, Transport Layer, and Application Layer.
The four layers in the TCP/IP Model are what?
Cable plant
The hardware that constitutes the enterprise-wide cabling system
Extended Unique Identifier, 64-bit (EUI-64)
The last 64-bits of the IPv6 address, which are determined based on a device's MAC address.
Very High Bitrate DSL (VDSL)
The latest form of DSL with download and upload speeds of up to 100 Mbps. VDSL was designed to run on copper phone lines, but many VDSL suppliers use fiber-optic cabling to increase effective distances.
Motherboard
The main circuit that controls a computer
Simple Mail Transport Protocol (SMTP)
The main protocol used to send electronic mail on the Internet. This protocol uses port 25.
Demilitarized Zone
The manager of IT asks you to connect a perimeter network to the firewall, which will be separate from the LAN This type of network is known as ______________.
Internet Control Message Protocol (ICMP)
The manager of IT asks you to ping his laptop to see whether your computer can find it on the network. In this scenario, the __________ protocol is being implemented.
Virtual Memory
The memory that is logically carved out of space on the hard drive and added to physical memory (RAM).
Active Directory
The method for organizing and managing objects associated with the network in the Windows Server 2003 and Server 2008 NOSs.
terminal adapter (TA)
The most common interface used to connect a computer to a ISDN line.
Public Switched Telephone Network (PSTN)
The most common phone connection, it's also called Plain Old Telephone Service (POTS). It takes your sounds, translated into an analog waveform by the microphone, and transmits them to another phone.
Plain Old Telephone Service (POTS)
The most common phone connection, it's also called the Public Switched Telephone Network (PSTN).
GNU
The name given to the public software project to implement a complete, free source code implementation of UNIX. it also refers to the collection of UNIX-inspired utilities and tools that are included with Linux distributions. ______ is an acronym within an acronym that stands for "____s Not UNIX."
Ext3
The name of the primary file system used in most Linux distributions.
baud rate
The number of bauds per second. In the early days of telephone data transmission, the baud rate was often analogous to bits per second. Due to advanced modulation of baud cycles as well as data compression, this is no longer true.
568A
The older standard BOGB cable.
Password Authentication Protocol (PAP)
The oldest and most basic form of authentication, and also the least safe because it sends all passwords in Cleartext.
Man Pages (Manual Pages)
The online documentation for any variety of the UNIX operating system. This documentation describes the use of the commands and the programming interface.
Hierarchical File System
The organization of files and directories (or folders) on a disk in which directories may contain files and other directories. When displayed graphically, this organization resembles a treelike structure.
Internet Assigned Numbers Authority (IANA)
The organization responsible for assigning public IP addresses. This organization no longer directly assigns IP addresses, having delegated this to the five Regional Internet Registries.
Sheath
The outer cover, or jacket, of a cable
ciphertext
The output when cleartext is run through a cipher algorithm using a key.
SYN-ACK
The packet a node sends to acknowledge to another node that it has received a SYN request for connection
SYN
The packet one node sends to request a connection with another node on the network
Backbone
The part of a network where segments and significant shared devices connect
ring, rotating
The physical topology used by FDDI is the __ topology with a counter-___ fiber ring for fault tolerance.
Demarcation point (demarc)
The point of division between a telecommunications service carrier's network and a building's internal network
STS payload
The portion of a Synchronous Transport Signal (STS) signal containing data.
STS overhead
The portion of a Synchronous Transport Signal (STS) signal containing the signaling and protocol information
UPN (User Principle Name) Suffix
The portion of a universal principle name (in Active Directory's naming conventions) that follows the @ sign.
host ID
The portion of an IP address that defines a specific machine in a subnet.
UPN (User Principle name)
The preferred Active Directory naming convention for objects when used in informal situations. This name looks like a familiar internet address, including the positioning of the domain name after the @ sign. _____s are typically used for email and related internet services.
circuit switching
The process for connecting two phones together on one circuit.
static addressing
The process of assigning IP addresses by manually typing them into client computers.
Segmentation
The process of breaking down large data units into multiple smaller units and then reassembles-reconstructs units, sometimes increases efficiency. Decreasing the size of data units when moving data from a network that can handle larger data units to a network that can handle only smaller data units.
Replication
The process of copying Active Directory data to multiple domain controllers. This ensures redundancy so that in case one of the domain controllers fails, clients can still log on to the network, be authenticated, and access resources.
time division multiplexing
The process of having frames that carry a bit of every channel in every frame sent on a regular interval in a T1 connection.
Sequencing
The process of identifying segments that belong to same group of divided data, where it begins, the order and how data should be interpreted. Assigning a placeholder to each piece of a data block to allow the receiving node's transport layer to reassemble the data in the correct order.
Mount
The process of making a disk partition available.
proxy ARP
The process of making remotely connected computers truly act as though they are on the same LAN as local computers. Proxy ARPs are done in a number of different ways, such as with a Virtual Private Network (VPN).
Network Address Translation (NAT)
The process of modifying an IP address while it is in transit across a router, computer, or similar device.
Paging
The process of moving blocks of information, called pages, between RAM and into a page file on disk.
Regeneration
The process of re-transmitting a digital signal
Reassembly
The process of reconstructing data units that have been segmented
Reassembly
The process of reconstructing data units that have been segmented.
Encapsulate
The process of wrapping one layer's PDU with protocol informations so that it can be interpreted by a lower layer. For example, Data Link layer protocols encapsulate Network layer packets in frames.
nonrepudiation
The process that guarantees that the data is as originally sent, and that it came from the source you think it should have come from.
System V
The proprietary version of UNIX that comes from Bell Labs.
bend radius
The radius of the maximum arc into which you can loop a cable before you will cause data transmission errors. Generally, a twisted pair cable's bend radius is equal to or greater than four times the diameter of the cable.
Non-Volatile RAM
The random access memory that does not lose its state when power is removed and contains the startup-config
Sharing, Communication, Organization, and Money
The real reasons that organizations need networks.
Trust Relationship
The relationship between two domains on a Windows Server 2003/2008 Network that allows a domain controller from one domain to authenticate users from the other domain.
Addressing
The scheme for assigning a unique identifying number to every device and workstation on the network
Device ID
The second set of six characters that make up a network device's MAC address. The device ID, which is added at the factory, is based on the devices model and manufacture date.
Two-Way Transitive Trust
The security relationship between domains in the same domain tree in which one domain grants every other domain in the tree access to its resources and, in turn, that domain can access other domains' resources. When a new domain is added to a tree, it immediately shares a two-way trust with the other domains in the tree.
DS1
The signaling method used by T1 lines, which uses a relatively simple frame consisting of 25 pieces: a framing bit and 24 channels. Each DS1 channel holds a single 8-bit DS0 data sample. The framing bit and data channels combine to make 193 bits per DS1 frame. These frames are transmitted 8000 times/sec, making a total throughput of 1.544 Mbps.
Middleware
The software that sits between the client and server in a 3-tier architecture. ______ may be used as a messaging service between clients and servers, as a universal query language for databases, or as means of coordinating processes between multiple servers that need to work together in servicing clients.
T1 line
The specific, shielded, two-pair cabling that connects the two ends of a T1 connection. A leased-line connection capable of carrying data at 1.54Mbps.
568B
The standard BOGB cable.
dipole antennae
The standard straight-wire antenna that provides most omni-directional function.
public-key infrastructure (PKI)
The system for creating and distributing digital certificates using sites like VeriSign, thawte, or GoDaddy.
Multiprocessing
The technique of splitting tasks among multiple processors to expedite the completion of any single instruction.
Node
The term ________ is synonymous with "host."
Open Source Software
The term used to describe software that is distributed with few restrictions and who source code is freely available.
Distribution
The term used to refer to the different implementations of a particular UNIX or Linux system. For example, different distributions of Linux include Fedora, SUSE, and Ubuntu.
Route Flush Timer
The time between a route becoming invalid and its removal from the routing table
Holddown Timer
The timer that specifies how long a route will not accept changes after a triggered update is sent
Bandwidth
The transmission capacity of a computer network or telecommunication system. Bandwidth tells you the maximum amount of data that your network can transmit.
Why can't a straight-through cable be used to connect two computers directly (NIC-to-NIC)?
The transmit pins on one system will be connected to the transmit pins on the second system, so neither system can receive data.
SMF
The type of fiber-optic cable with a narrow core that caries light pulses along a single data path
Preemptive Multitasking
The type of multitasking in which tasks are actually performed one at a time, in very brief succession. In______ ______, one program uses the processor for a certain period of time, then is suspended to allow another program to use the processor.
Data Over Cable Service Interface Specification (DOCSIS)
The unique protocol used by cable modem networks.
Sneakernet
The way of exchanging data between computers that are not connected to a network
In what way is HDLC proprietary?
There is a different HDLC for each manufacturer and they don't communicate together. So an alternative to CISCO's HDLC, if you're communicating between Cisco and Juniper (for example), would be PPP (which uses a form of HDLC)
Transmission Error causes
Thermal noise, impulse noise, attenuation, crosstalk, voice amplitude signal compression, quantization noise, jitter, receiver and transmitter out of sync.
802.3z
These Ethernet networks run at 1 Gbps / 1000 Mbps and have a cable standard of 1000Base-X that is Fiber optic cable.
802.3an
These Ethernet networks run at 10 Gbps and have a cable standard of 10 GBase-T that is Twisted pair cable.
802.3ae
These Ethernet networks run at 10 Gbps and have a cable standard of 10Gbase-SR, 10GBase-LR, 10GBase-ER and so on that is Fiber optic cable.
802.3j
These Ethernet networks run at 10 Mbps and have a cable standard of 10Base-F that is Fiber optic cable.
802.3i
These Ethernet networks run at 10 Mbps and have a cable standard of 10Base-T that is Twisted pair cable.
802.3a
These Ethernet networks run at 10 Mbps and have a cable standard of 10Base2 that is Thin coaxial cable.
802.3
These Ethernet networks run at 10Mbps and have a cable standard of 10Base5 that is Thick coaxial cable.
What is on Ports 20 and 21?
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Inbound Ports
These are used when another computer wants to connect to a service or application running on your computer.
Outbound Ports
These are used when your computer wants to connect to a service or application running on another computer.
What are coaxial cable types RG-59 and RG-6 used for?
They are used with home video devices such as TV's and VCR's
Which of the following are characteristics of an LC fiber optic connector? *They use a stainless steel housing. *They are threaded *they can be used with either fiber optic or copper cabling *They use a housing and latch system similar to an RJ-45 UTP connector *they are half the size of standard connectors
They use a housing and latch system similar to an RJ-45 UTP connector *they are half the size of standard connectors
What are coaxial cable types RG-8 or RG-11 used for?
Thick Ethernet
What is coaxial cable type RG-58 used for ?
Thin Ethernet
What type of connections use the Bayonet Neil-Concelman Connector?
Thin Ethernet ARCNet
IPv6 Subnet
This defines the individual subnet of the network that the address is located on.
Default Gateway
This device could be a router, server, or other similar device; it is the device that grants access to the Internet or other networks.
Optional Extension Header
This incorporates options for special treatment of the packet, such as routing and security.
Header
This is 40 bytes and contains the source and destination addresses plus other forwarding information.
Electromagnetic Interference (EMI)
This is a disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction and possibly radiation.
Radio Frequency Interference (RFI)
This is interference that can come from AM/FM transmissions and cell phone towers.
Data Emanation
This is the electromagnetic (EM) field that is generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data.
Global Routing Prefix
This is the first three groups of numbers, and it defines the "network" of the address.
Interface ID
This is the individual host IP portion. It can be assigned to one interface or more than one interface, depending on the type of IPv6 address.
Session Layer
This layer governs the establishment, termination, and synchronization of sessions within the OS over the network and between hosts-for example, when you log on and log off.
Session
This layer of the OSI Model uses the Protocol Logon/Logoff.
Physical
This layer of the OSI Model uses the Protocols 100Base-T & 1000Base-X and uses Hubs, patch panels, & RJ45 Jacks as devices.
Data Link
This layer of the OSI Model uses the Protocols 802.3 & 802.5 and its' devices are NICs, switches, bridges, & WAPs.
Presentation
This layer of the OSI Model uses the Protocols Compression & Encryption.
Application
This layer of the OSI Model uses the Protocols FTP, HTTP, POP3, & SMTP and its' device is the Gateway.
Network
This layer of the OSI Model uses the Protocols IP, ICMP, ARP, & RIP and uses Routers as its' device.
Transport
This layer of the OSI Model uses the Protocols TCP & UDP.
Multiple-Input Multiple Output (MIMO)
This means that wireless devices can have more antennas, up to four maximum.
Port Range 0-1023
This range defines commonly used protocols (e.g. FTP utilizes port 21 to accept client connections.) Well-known ports.
Three-way handshake
Three-step process in which Transport layer protocols establish a connection between nodes
When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?
Ticket
Which of the following are used when implementing Kerberos for authentication and authorization? (Select Two)
Time server, Ticket granting
Route Update Timer
Timer that specifies how often a router sends it's complete routing table updates to it's neighbors
IEEE 802.3 Retry Timing
To avoid repeated collisions, at nth retry, wait between 0 and n slot times (discrete exponential back-off) Give up on 16th collision -> too many stations on the same network Low delay for 2 frames colliding, reasonable for many
What does crimping mean?
To bend or squeeze the metal of a connector around a cable to secure it to the cable
ISO
To establish technological standards to facilitate global exchange
Route
To intelligently direct data between networks based on addressing, patterns of usage, and availability of network segments
Transmit
To issue signals to the network medium
Continuity Tester
To test a cable, what tool would you use?
cannot, translation
Token Ring and Ethernete are layer 2 standards and ___ be in the same network without a ___ device, such as a gateway or router.
802.4
Token bus
IEEE 802.5 Frame Format
Token: |SD-1|AC-1|ED-1| Data: |SD-1|AC-1|FC-1|DA|SA|Data|FCS|ED|FS| Start Delimiter: (JK0JK000) J = high-high transition, K = low-low transition Access Control: (PPPTMRRR) Priority, Token flag, Monitor to handle failure of source to remove frame, Reservation to request priority level Frame Control: (FFZZZZZZ) FF indicates whether frame is data or control. If data, Z interpreted by destination else all hosts act on control bits, z Ending Delimiter: (JK1JK1IE) I = 1: intermediate frame, I = 0: last frame, E = 0 from source, but set if error detected Frame Status: (ACxxACxx) A = address recognised, F = frame copied
EIA
Trade organization that sets standards for electronic equipment and lobbies for favorable legislation to growth of computers and electronics
What device sends signals from a computer onto a network?
Transceiver
Port Address Translations (PAT)
Translates both IP addresses and port numbers.
What is TCP?
Transmission Control Protocol
TCP
Transmission Control Protocol, Connecton Oriented Transport Layer Reliable for transmitting HTTP protocol's request from client to server vice versa. talking w connection. used for downloading. only for LANs
Broadcast
Transmission that involves one transmitter and multiple, undefined receivers
Multicasting
Transmitting data to multiple computers (or routers).
SPX
Transport Layer, Connection Oriented Novell Developed
Connection oriented
Transport layer protocol that requires establishment of a connection between communicating nodes before it will transfer data
Connectionless
Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data
Which of the following are characteristics of SONET? (Select Two)
Transport protocol used for other traffic types, dual counter-rotating fiber optic rings
Responsibilities of the Cisco IOS
Transporting network protocols and functions, provides security features to access control, provides scalability and ensures a high degree of network reliability
RIP Algorithms to Prevent Loops
Triggered Updates and Split Horizon with Poison Reverse
True or False: A private AS number is useful in internet multihoming with all ISPs in same BGP area.
True
True or False: A 66 Block ismostlikely to be used to connect wires for POTS.
True
True or False: ICMP protocol is a layer 3 protocol
True
True or False: PKI is used for mutual authentication and the private key is installed on the client.
True The public key is on the server and the private on the client
Routing Information Protocol (RIP)
True Distance-Vector routing protocol that uses hops as it's metric, has a max hop count of 15, is classful (no VLSM), Update Timer of 30 seconds, Invalid Timer and Holddown Timer of 180 seconds, Flush Timer of 240 seconds and Administrative Distance of 120, does not support authentication
RIP Version 2
True Distance-Vector routing protocol that uses hops as it's metric, has a max hop count of 15, is classless (supports VLSM), Update Timer of 30 seconds, Invalid Timer and Holddown Timer of 180 seconds, Flush Timer of 240 seconds and Administrative Distance of 120, supports authentication
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
Trunk ports
Link aggregation is also known as:
Trunking
You manage a private network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1, and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?
Trunking
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?
Trunking
IEEE 802.1Q
Trunking method that only adds 4 byes of overhead/data to the frame
Types of Virtual Interfaces
Tunnel, Loopback, Null
Cat 6
Twisted pair cable that contains four wire pairs each wrapped in foil insulation, fire resistant, 6x throughput and 250Mhz
Crossover cable
Twisted pair patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed
Cat 7
Twisted pair with multiple wire pairs, each separately shielded and then surrounded by another shielding within the jacket
What type of cabling is used with 100BaseTX
Type 1A STP or Category 5 UTP
What type of cabling is used with 100BaseTX Fast Ethernet networks?
Type 1A STP or Category 5 UTP
Symmetric DSL (SDLS)
Type of DSL connection that provides equal upload and download speed and, in theory, provides speeds up to 15 Mbps, although the vast majority of ISPs provide packages ranging from 192 Kbps to 9 Mbps.
Twisted pair
Type of cable similar to telephone wiring that consists of pairs of insulated copper wires
Coaxial cable
Type of cable that consists of a central, which might be solid or stranded and is often made of copper, surrounded by an insulator, braided metal shielding and outer cover
UTP
Type of cabling that consists of one or more insulated wire pairs encased in plastic sheath
Cross talk
Type of interference caused by signals travelling on nearby wire pairs infringing on a signal
EMI
Type of interference that may be caused by motors, power lines, copiers, fluorescent lights, or other sources of electrical activity
RFI
Type of interference that may be generated by broadcast signals from radio or TV antennas
Full duplex (duplex)
Type of transmission in which signals may travel in both directions over a medium simultaneously
Half-duplex
Type of transmission in which signals may travel in both directions over a medium, but only one direction at a time
Simplex
Type of transmission in which signals may travel in only one direction over a medium
SNMP v2/3 Ports:
UDP 161 Receives Traps UDP 162 Agents.
Which protocol and port number is used by BOOTP/DHCP?
UDP 67
Which protocol and port number is used by TFTP?
UDP 69
L2TP (Layer 2 Tunneling Protocol)
UDP Port 1701
TraceRoute
UDP Port 33434-33534(Unix) or ICMP(Windows) A command line utility used to trace all the routers between two points. Use it to diagnose problems reaching a remote system. Many routers block TRACERT(The Windows version of TRACEROUTE) packets, therefore, TRACEROUTE is a viable alternative.
DHCP (Dynamic Host Configuration Protocol)
UDP Port 67, 68
BOOTP/DHCP
UDP port 67
What kind of cabling uses the RJ45 connector
UTP Network Cabling (Unshielded Twisted Pair)
100-Pair wire
UTP supplied by a telecommunication carrier that contains 100 wire pairs
100 pair wire
UTP supplied by a telecommunications carrier that contains 100 wire pairs.
25-Pair wire
UTP supplied by a telecommunications carrier that contains 25 wire pairs
25 Pair wire
UTP supplied by a telecommunications carrier that contains 25 wire pairs.
Services (3)
Unacknowledged Connectionless Service: Independent frames with no logical connection, no recovery from loss but fast, common in LANs Acknowledged Connectionless Service: Each frame acknowledged, out of order delivery possible, good for unreliable channels such as wireless Unacknowledged Connection Oriented Service: order guaranteed as each frame numbered, reliable bit stream
Which of the following are characteristics of VDSL? (Select Two)
Unequal download and upload speeds, Supports both data and voice at the same time
Network address
Unique identifying number for a network node that follows a hierarchical addressing scheme
PDU
Unit of data at any layer of the OSI model
Segment
Unit of data that results from subdividing a larger PDU
UART
Universal Asynchronous Receiver/Transmitter A device that turns serial data into parallel data. The cornerstone of serial ports and modems.
What does UTP stand for?
Unshielded Twisted Pair
Spam
Unsolicited, unwanted e-mail
Noise
Unwanted signals or interference from sources on network cabling
Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (Select 2.)
Use Automatic Private IP Addressing, Install a DHCP server on the network
Hamming Codes
Use codewords of data bits and redundant check bits. Check bits reside in power of 2 positions (1, 2, 4, 8, etc). These will make the messages match legal codewords. Hamming distance is number of bit positions in which two patterns differ. It is the smallest distance between two legal codewords. To detect d single bit errors, need d+1 code distance. To correct d single bit errors, need 2d+1 code distance. Error correction too expensive.
You have a company network that is connected to the internet. You want all users to have internet access, but need to protect your private network and users. You also need to make private network and users. You also need to make a Web server publicly available to Internet users. Which solution should use?
Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ
Convergence
Use of data networks to bring voice, video and other communications services in addition to data
Propagation Delay
Use speed of 2*10⁸ m/s Delay = distance / speed (time from one node to another) Time = 1 / Baud (time to send each signal)
Administrative Distance
Used by Cisco routers using multiple routing protocols that prioritizes which routing protocol will be preferred
Distributive Computing
Used for both client-server and peer to peer networks and means that every device or workstation has its own processing power.
Class D Network
Used for multicasting.
Broadcast Address
Used to communicate with all hosts on the network.
UDP
User Datagram Protocol. An alternative to TCP; it is a connectionless-oriented protocol. Getting data there as fast as you can, used for watching stream videos, webcams
What is UDP? What are some of its attributes?
User Datagram Protocol. This protocol is connectionless and routable.
User Exec Mode
User mode, limited to basic monitoring and commands used to view statistics; Level 0-1, ex. Router>
Distributed Coordination Function
Uses CMSA/CA CD not practical Inter Frame Spaces give fair access with priorities Contention service
Which of the following are characteristics TACACS+?(Chose Two)
Uses TCP, Allows for a possible of three different servers, one each for authentication, authorization, and accounting
Which of the following are characteristics of ATM?(Select Two)
Uses fixed-length cells of 53-bytes
Voice over IP (VoIP)
Using an IP network to transfer voice calls.
How is a straight-through cable made for CAT5?
Using only 4 wires - 1,2,3, and 6 1 and 2 are transport pins while 3 and 6 are recieve pins
Interior Gateway Protocols (IGP)
Utilized by networks internal to the AS
LocalTalk
Utilizing CSMA/CD, this is Apple Computer's proprietary baseband protocol, operating at the Data Link and Physical layers of the OSI reference model.
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?
VLAN
Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?
VLAN
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?
VLANs
You have a group of salesman who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
VPN concentrator
VLSM
Varibale Link Subnet Mask
Network +
Verifies broad, vendor independent networking technology skills
What is a VCC cable?
Vertical Cross-Connect Cable Is the cable that connects the MDF to the IDF's
How are BDF's, MDF's, and IDF's often connected to each other?
Via fiber
Permanent Virtual Circuits (PVC)
Virtual Circuit used by Frame Relay that are created through mapping and remain in place
Loopback Interface
Virtual interface configured on the route utilized for maintenance/management functions
Null Interface
Virtual interface that provides an alternative method of filtering traffic
Tunnel Interface
Virtual interface utilized to cloak or hide data within another similar protocol
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it found?
Virus
What is 802.1q?
Vlan Tagging
Session Initiation Protocol (SIP)
VoIP protocol competing with H.323 for VoIP dominance.
802.9
Voice and Data Integration
Copper (Physical Media)
Voltage
What is the difference between WPA-Personal and WPA-Enterprise?
WPA-Personal uses a preshared key as the method for encrypting traffic while WPA-Enterprise implements a central authentication server for authentication and auditing features.
A router connected the network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168/4/0/24. The next hop router for the network 192.168.3.0 has changed. you need to make the change with the least amount of effort. What should you do?
Wait for convergence to take place.
Patch panel
Wall-mounted panel of data receptors into which cross-connect patch cables from punch down block are inserted
IPv4 Mapped Addresses
What IPv6 address incorporates IPv4?
Ping
What command do you use to test the TCP/IP stack on a computer?
Default Gateway
What defines the nearest router for a host?
Subnet
What do you call a smaller network that is part of a larger network?
Crosstalk
What do you call it when electrical signals jump to another set of wires?
Switch
What do you use to create VLANs?
VLAN
What do you use to isolate a group of computers within your organization?
11000111
What is 199 equal to in binary?
11111001
What is 249 equal to in binary?
01010110
What is 86 equal to in binary?
8P8C
What is an RJ45 port where the RJ45 plug at the end of the network cable connects, otherwise known as?
Arp -a
What is the Address Resolution Protocol Command?
Wireless Access Point
What is the central device used in wireless LANs?
255.255.0.0
What is the default subnet mask for a Class B network?
254
What is the maximum number of hosts you can use for each subnet that belongs to a class C address?
11 Mbps
What is the maximum speed supported by 802.11b?
54 Mbps
What is the maximum speed supported by 802.11g?
Category 5
What is the minimum category of twisted-pair cable you need to support 100 Mbps?
RJ45
What is the most common adapter or connector used to connect a computer to a wired network?
UTP
What is the most common cable used today?
Switch
What is the most common central device used today to connect computers to a network?
WPA2
What is the most secure encryption used in wireless networks?
Service Set Identifier (SSID)
What is used to identify a wireless network?
NAT
What is used to remap private addresses to public addresses and back?
IP address
What is used to uniquely identify a host on a TCP/IP network?
Presentation
What layer in the OSI model is used to encrypt data?
CSMA/CA
What mechanism do wireless networks use to access the network?
OSI Reference Model
What model is used to describe how data communication occurs between hosts?
Distributive Computing
What model promises the most processing power?
Dynamic Ports
What ports are defined above 49,152?
DNS
What server is used to translate host names to IP addresses?
802.3
What standard describes CSMA/CD?
APIPA
What type of address is 169.254.32.23?
Broadcast Address
What type of address is 202.23.2.255?
Multicast Address
What type of address is used to send a single set of packets to multiple hosts?
Plenum-Rated
What type of cable should be used as part of a fire code for a building?
Unicast
What type of communication is sent to a single designated host?
Network Controller
What type of server does Active Director run on?
Demilitarized Zone (DMZ)
What zone is used to publish external websites for an organization?
How do switches and bridges learn where devices are located on a network?
When a frame enters a port, the source MAC address is copied from the frame header.
Triggered Updates
When a routing table updates are sent before the update timer has expired
How does Far-end crosstalk occur?
When a signal causes interference on an adjacent signal heading the opposite direction.
How does Near-end crosstalk occur?
When a signal causes interference with a signal on an adjacent wire heading in the same direction.
tone generator
When cabling is improperly labeled, a tone generator and tone probe are used to locate the two ends of each cable. The tone generator is a device that sends a signal, called a tone, over a cable. It is paired with another device, called a tone probe, which you place on the ends of cables until it detects the tone, identifying the other end of the cable.
when would you typically use and Rj_11 connector?
When connecting a phone to a phone line.
voltage event recorder
When experiencing intermittent network problems use a voltage event recorder to measure power.
temperature monitor
When experiencing intermittent network problems, use a temperature monitor to ensure proper temperature.
beaconing
When nodes do not receive an expected frame from its upstream it will issue a ___ alarm.
LAN
When several computers are connected in a small geographic area, it is known as a __________.
promiscuous mode
When the NIC processes all the frames it sees on the cable, regardless of their MAC address.
Star Topology
When this topology is used, each computer is individually wired to a central connecting device with twisted-pair cabling.
Service Set Identifier (SSID)
When utilizing infrastructure mode, the base unit (normally a WAP) will be configured with a _____________. This then becomes the name of the wireless network, and it is broadcast over the airwaves.
Radio Frequency Interference (RFI)
When you pick up your wireless phone, your computer drops network connectivity. What could be the cause of the problem?
Device Manager
Where can you go in Windows 7 to access the Properties of a network adapter?
Physical
Which layer deals with the serial transfer of data?
Application
Which layer in the OSI model covers HTTP, FTP, and RDC?
Network
Which layer in the OSI model covers routing between networks?
Data Link
Which layer in the OSI model do MAC addresses and switches use?
Physical
Which layer in the OSI model includes the cable and network adapters?
Transport
Which layer in the OSI model is included in the TCP/IP model?
Network
Which layer in the OSI model is used to verify that data was delivered without error?
Data Link
Which layer of the OSI model includes VLANs?
Session
Which layer of the OSI model is used to create a connection so that a host can transfer files?
Peer-To-Peer
Which model does each host have their own security database?
Client/Server
Which model uses a central database for authentication?
Full Duplex
Which of the following does a switch use for increased performance?
Radio Frequency Interference (RFI) Protection
Which of the following is not a characteristic of 802.11n?
200.23.34.120
Which of the following is not a private address?
Well Known Ports
Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?
UDP
Which protocol do you use as the transport protocol for a video application?
Address Resolution Protocol (ARP)
Which protocol is used to translate IP addresses to MAC addresses?
Mesh
Which topology is the most redundant and the most expensive?
Wi-Fi
Wireless Fidelity Network The most widely adopted wireless networking type in use today. Technically, only wireless devices that conform to the extended versions of the 802.11 standard—802.11a, 802.11b, and 802.11g—are Wi-Fi certified.
Explain WPA.
Wireless network encryption that 128-bit encryption and TKIP Also features EAP
Explain WPA2.
Wireless network encryption that improves upon the security of WPA by using AES instead of TKIP. Supports 128-bit, 192-bit, and 256-bit
Explain WEP.
Wireless network encryption that uses 64-bit or 128-bit encryption key to scramble data packets
WWW
World wide web A vast network of servers throughout the world that provide access to voice, text, video, and data files
Encapsulate
Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer
APIPA
You are trouble shooting a computer that cannot obtain the proper IP address from a DHCP server. When you run an ipconfig/all, you see that the computer has obtained the address 169.254.67.110 automatically. What has auto assigned an IP address the the computer?
Piggybacking ACKs
You can put an ACK on a data frame to improve efficiency.
Faraday Cage
You could also use electromagnetic shielding on devices that might be emanating an electromagnetic field. This could be done on a small scale by shielding the single device, or on a larger scale by shielding an entire room, perhaps a server room. This would be an example of a ____________.
The hose cannot find a DHCP server
You have a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of 169.32.54.2. What is the problem?
Class B
You have a host with the address of 180.24.45.120. To what class would this address be assigned?
Network Documentation
You have a key network administrator leave a company. Therefore, what does the company depend on to continue to use the network?
Protocol Analyzer
You have been instructed to capture and analyze packets on a server. What tool will allow you to do this?
VLAN
You have been instructed to connect a computer to a group of hosts that have been segmented from the regular network. What kind of network is this?
Subnetting
You have installed a device that has two IP addresses. One address, 64.51.216.27, is displayed to the Internet. The other address, 192.168.50.254, communicates with the LAN. What type of technology have you implemented?
Ipconfig
You have just installed a network adapter and configured an IP address and subnet mask. What command can you use to verify that the IP address is configured and listed properly?
Wireless Bridge
You need to connect 802.11a, 802.11b, and 802.11n wireless networks together. What wireless tool will guarantee connectivity between these networks?
100 Mbps
You need to connect a computer at a rate of 100,000,000 bits per second. What speed network adapter should you install?
Full Duplex
You need to connect a computer's network adapter to a switch. You want the connection to be able to send and receive data simultaneously. What type of connection do you need?
Punch-Down Tool
You need to connect a twisted-pair cable to the back of a patch panel. What tool should you use?
Netstat -an
You need to find out the Internet connections a particular computer has made in the recent past. You also need to see numeric information so that you know the IP address and port numbers of the destination computers. You should type the ___________ in the command prompt.
Ipconfig/all
You need to find out the MAC address of your director's computer. He has given you permission to access his computer. You access the command prompt. What command should you type to see the computer's MAC address?
Arp -a
You need to find out the MAC addresses of all the computers that a particular user's computer has connected to in the recent past. What command should you use to accomplish this?
RJ45
You need to install a network adapter to a computer so that it can be connected to a network that uses twisted-pair cabling. What type of port does the network adapter need to use?
Network
You need to install a router on your company's network that will allow access to the Internet. What layer of the OSI does this device reside on?
Ping loopback
You need to ping your own computer to see if it is alive. Which of the following would qualify as command-line syntax to do so?
Layer 4 (Transport Layer)
You run a netstat -an command in the command prompt and notice many connections being made that say TCP in the left-most column. What layer of the OSI is TCP referring to?
Layer 2 (Data Link Layer)
You suspect a problem with your computer's network adapter and its ability to send the correct frames of data that correspond with the network architecture used by the rest of your computers. What layer should you attempt to use as a troubleshooting starting point?
In which of the following situations might you use an RJ-11 connector?
You want to connect your computer to the internet with a dial-up connection
Class A
Your boss wants you to set up three computers on a classful network with a default subnet mase of 255.0.0.0. What class does he want the computers to be set up on?
Class B
Your client requires that you nstall 284 computers on a single IP network. Which IP class would be your best option?
53
Your company hosts a DNS server that resolves domain names to IP addresses. This server must have port ___________ open to service those requests for name resolutions.
80 & 443
Your manager wants you to allow HTTP and HTTPS connections to the company web server. In order to do this , you need to open inbound ports __________ and ___________.
Private
__________ IP address are hidden from the Internet and any other networks.
Public
_____________ IP addresses are ones that are exposed to the internet; any other computers on the internet can potentially communicate with them.
fiber-optic cable
a cable that contains a glass or plastic center used to carry light
protocol suite
a combination of individual protocols each designed for specific purposes
standby monitor
a computer on a token ring network that can become an active monitor if the active monitor fails or logs off the network
Local Area Network
a group of computers confined to a small geographic area, usually one building.
Subnet Mask
a group of four numbers that define what IP network the computer is a member of.
Virtual Lan/VLAN
a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.
media access control (MAC) address
a hexadecimal number programmed into the Network card's chip. It is different on every card produced..
Multistation Access Unit
a hub-like device that physically connects computers in a star arrangement while maintaining a ring structure
wide area network (WAN)
a large number of computers spread over a wide geographical area and under the control of a centrally located administrator
hybrid topology
a mixture od star, bus, and ring topologies
Wireless LAN (WLAN)
a network composed of at least one WAP and at least one computer or handheld device that can connect to the WAP.
switching hub
a network device that determines wheter a signal should remain in the isolated section of the network or be passed through the device to other parts of the network
Ethernet Network
a network that communicates by broadcasting information to all computers on the network
star topology
a network topology in which a cable runs from each computer to a single central point
ring topology
a network topology in which a single cable runs continuously from computer to computer
bus topology
a network topology in which a single conductor connects all the computers on a network
mesh topology
a network topology in which each node connects directly to every other node on the network.
wireless topology
a network topology that uses no cabling sytem between the computers, but rather uses infrared light or radio transmission to communicate between network devices
client/server model
a networking model in which the network is made up of computers that are either clients or servers
Link-Layer Discovery Protocol
a protocol that identifies devices connected to the LAN and allows them to automatically exchange information
Link-Layer Multicast Name Resolution
a protocol that serves the same function of a DNS server when a DNS server cannot be reached. It resolves names of devices connected collectively on a local network
segment
a section of cable between two network devices
Ethernet
a set of rules that govern the transmission of data between network adapters and various central connecting devices.
access method
a set of rules used by LAN hardware to direct traffic on the network. it determines which host or device uses the LAN next
token
a short binary code generated by network software that is passed along from one computer to the next along a ring topology (and some bus technologies)
local area network (LAN)
a small network of computers contained in a relatively small area, such as an office building
Perimeter Network/Demilitarized Zone
a small network that is set up separately from a company's private LAN and the Internet.
AppleTalk
a suite of protocols developed to support Macintosh computers when configured as a network. Uses CSMA/CA as its access method
netsh
a tool that administrators can use to configure and monitor Windows computers from the command prompt.
Media Access Control (MAC) address
a unique identifier assigned to network adapters by the manufacturer. This address is six octets in length and is written in hexadecimal.
Administrator
a user account that has unlimited privileges to resources and objects managed by a server or domain. The administrator account is created during NOS installation.
Cisco Discovery Protocol
a variation of Link-Layer Discovery Protocol designed to support Cisco equipment such as routers, switches, and telephones
Which of the following i a valid MAC address?
ab.07.cf.62.16.bd
passive hub
acts as a connection point in a star topology. Signals transmitted from one computer are passed to all connected computers
Wireless Access Point (WAP)
acts as the central connecting device for the network.
Which of the following is a characteristic of static routing when compared to dynamic routing?
all routes must be manually updated on the router
Wireless Network Adapters
allow for connectivity between a desktop computer or laptop and the wireless access pint.
station address
an IPX/SPX-based address that consists only of a network number and node address
Client Server
an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7.
Link-Layer Discovery Protocol-Media Endpoint Discovery
an enhanced version of LLDP used for routers, switchs, VoIP devices, and Power Over Ethernet (PoE) devices
wireless
antennas, electromagnetic waves
node
any device connected to a client-server network
Network documentation
any information that helps describe, define, and otherwise explain how computers are connected in a physical and logical way.
Interference
anything that disrupts or modifies a signal that is traveling along a wire.
sequence number
attached to each packet of data transmitted ensuring that the data will be reassembled in the exact order it was transmitted
BOGB Colors
blue, orange, green and brown.
Which of the following topologies connects all devices to a trunk cable?
bus
Which of the following cable types often includes a solid plastic core?
cat 6
You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type? Classful public multicast broadcast classless
classless
Which of the following is valid Mac address
co.36.ff.15.01.8E
What is not a reason to use subnets on a network?
combine different media type on the same subnet
Which of the following tasks is associated with the session layer?
connection establishment
the UDP transport protocol provides which of the following features?
connectionless datagram services low overhead
Hub
connects each of the networked computers, known as hosts, to one another by way of copper-based cables.
network interface card (NIC)
connects the network communication media, usually twisted pair copper, to the individual network devices, such as workstations, file servers, and printers
coaxial cable
consists of a core conductor surrounded by an insulator
which two of the following are included as part of Data link layer specifications?
controlling how messages are propagated through the network Identifying physical network devices.
You have a network configured to use the OSPF routers have learned about all other routes in the network?
convergence
What is the basic purpose of the OSI physical layer?
coordinates rules for transmitting bits.
You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?
crossover
You want to connect the LAN port on a router to the uplin port on a switch. The switch does not support auto-MDI. Which type of cable should you use?
crosssover
Two layers that have both header and trailer
data link and physical
IP Address
defines the computer you are working on/the computer you are working on's logical address.
Unicast
describes the situation in which information is sent to one host only.
Layer 3 Switch
determines paths for data using logical addressing (IP addresses) instead of physical addressing (MAC addresses).
Network Adapter/Network Interface Card (NIC)
device that enables you to send and receive data to and from your computer.
hub
device used to provide a quick and easy method of connecting network equipment together by cables
Repeater
device used to regenerate a signal
Peer-to-peer Networking
each computer is treated as an equal and means each computer has an equal ability to serve data and to access data, just like any other computer on the network.
Mesh Topology
every computer connects to every other computer; no central connecting device is needed.
568A wiring configuration
green stripe green orange stripe blue blue stripe orange brown stripe brown
Twisted Pair Cables
has eight wires; they are copper conductors that transmit electric signals. These eight wires are grouped into four pairs: blue, orange, green, and brown.
Open Systems Interconnection (OSI)
helps network engineers, network administrators, and systems engineers define how data networking actually works from one computer to another, regardless of where the computer is or what software it runs.
ring polling
in a token ring network, the process conducted by the active monitor to identify if a computer has logged on or off the ring
ring purge
in a token ring network, the process of removing a defective token and replacing it with a new token
monitor contention
in a token ring network, the process of selecting an active monitor
Physical Layer
includes but is not limited to cables, jacks, patch panels, punch blocks, hubs, and MAUs.
client
individual PC or workstation that accesses a server's resources and shared files
MDI-X
instead of using crossover cables to connect computers to central connecting devices such as switches, these central connecting devices are equipped with _______ ports, which take care of the cross.
Address Resolution Protocol/ARP Table
layer 3 protocol that resolves or translates IP addresses to MAC addresses, allowing connectivity between the layer 3 IP system and the layer 2 Ethernet system.
fiber optic
light pulses
LAN
local area network
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?
manually reconfigure the default route to point to the new next hop router
Maximum Sequence number
maxseq = 2^n - 1
Full Duplex
means that the network card can send and receive data simultaneously.
You have a server that has a 100baseFx network interface card that youneed to connect to a switch. The switch only has 100BaseTX switch ports.
media converter
MDI-X
medium dependent interface crossover
MDI Port
medium dependent interface.
You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network.
mesh
peer-to-peer network
network administration model in which all PCs connected together are considered equal
twisted pair cable
network cabling made up of four pairs of conductors twisted around each other
active hub
network device that has power connected to it. It regenerates any signal that is received.
Data Transfer Rate
network speed or bit rate/the maximum bits per second that can be transmitted over a network.
peer to peer dis
not flexible, not necessarily secure, not practical for large instructions
IP conflict
occur when two computers are configured with the same IP address.
Ad-hoc/P2P Mode
occurs when all of the clients communicate directly with each other. There is no base or wireless access point.
Near End Crosstalk (NEXT)
occurs when there is measured interference between two pairs in a single cable, measured on the cable end nearest the transmitter.
Far End Crosstalk (FEXT)
occurs when there is similar interference, measured at the cable end farthest from the transmitter.
568B wiring configuration
orange stripe orange green stripe blue blue stripe green brown stripe brown
backoff interval
period of time two network stations wait before trying to retransmit data after data packets from the two stations collide.
What topology is used with 100BaseTX Fast Ethernet networks? select 2 physical ring/logical star physical star/logical bus physical star/logical ring physical star/logical star
physical star/logical bus physical star/logical star
Internet Control Message Protocol (ICMP)
ping utilizes this to send test packets to other computers; this is also a network layer protocol.
IEEE 802.1X
port based network access control (PNAC)
server
powerful computer used to manage network resources and provide services such as security and file sharing
Carrier Sense Multiple access with Collision Detection (CSMA/CD)
protocol used by ethernet networks to control and insure the delivery of data
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
protocol used by wireless networks to control and insure the delivery of data
Port Based Network Access Control (PNAC)
provides strong authentication to devices that need to connect to the WLAN; it can also be used for regular wired LANs.
reassembly
reconstructing segmented data units
NetBIOS name server
resolves NetBIOS computer names to IP v4 addresses
What topology does each device on the network act as a repeater, sending the signal to the next device?
ring
Which of the following hardware devices links multiple networks and directs traffic between networks?
router
In the OSI model, what is the primary function of the Network layer?
routes messages between the networks
802.1
routing, internet working standard, within network
Which of the following connectors is typically used on one end of a rollover cable? ST SC F-Type Serial BNC
serial
dedicated server
server with special functions, such as file servers, print servers, database servers, web page servers, and/or administrative servers
open system interconnect (OSI)
seven-layer reference model that describes how hardware and software should work together to form a network communication system
Wireless Bridge
similar to a wireless repeater, but the bridge can connect different 802.11 standards together; this is know as bridge mode.
peer to peer adv
simple configuration, less expensive
You would like to implement 10Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for the implementations? select 2 single mode fiber 10GBaseLR standards multimode fiber 10GBaseER standards 10GBaseSR standards
single mode fiber 10GBaseLR standards
Of the following cables, which offer the best protection against EMI? CAT 5 CAT-6 CAT-5e Single mode fiber optic
single mode fiber optic
802.11a
slow wireless standard A wireless networking standard that operates at 5.75GHz, throughput of 54Mbps, and a maximum distance of 150 feet. - 23 Channels
packet
small unit of data into which larger amounts of data are divided so they can pass efficiently through a network
In the OSI model, which of the following functions are performed at the Presentation layer?
specify data format (such as file formats) Encrypt and compress data
Universal Naming Convention
standard naming convention that uses the form \\servername\sharename
What topology connects each network device to a central hub?
star
you have a small network that uses a hub to connect multiple devices. What physical topology is used?
star
You need to connect a workstation to a switch using a regular port on the switch (not an up link port). The switch does not support auto-MDI. Which type of cable should you use? Loopback straight-through crossover rollover
straight-through
What device is used to create a physical star topology?
switch
Which three of the following devices operate at the Data Link layer of the OSI model? select 3 routers switches NIC bridges repeaters hubs
switches NIC Bridges
Content Addressable Memory or (CAM) Table
switches have memory that is set aside to store the MAC address to port translation table, known as the ___________.
Continuity Tester
tests all of the pins of a connection one by one.
DNS server address
the IP address of the device or server that resolves DNS addresses to IP addresses.
segmenting
the act of dividing a network into smaller sections to avaoid collisions
command syntax
the correct manner and arrangement in which a command must be typed to be recognized by the operating system
Broadcast
the data is sent to every host on the network.
Which of the following are characteristics of coaxial cable?
the ends of the cable must be terminated it has conductor made from copper in the center of the cable. It uses two concentric metallic conductors.
Communications Subnetwork
the guts of OSI model transmissions, consisting of layers 1 through 3. Regardless of what type of data transmission occurs in a computer network, the ____________ will be employed.
Straight Through Cable
the most common type of patch cable, and it is the type that you would use to connect a computer to a central connecting device like a switch. The wires on each end of the cable are oriented in the same way.
Layer 2 Switch
the most common type of switch used on a LAN.
Internet Protocol Version 4 (IPv4)
the most frequently used communications protocol.
topology
the physical arrangement of hardware and cabling in a network system
Network Topology
the physical connections of hosts in a computer network.
query
the process of locating and extracting data from a database system
Frame Aggregation
the sending of two or more frames of data in a single transmission.
Attenuation
the signal degrades to such a point that it cannot be interpreted by the destination host.
command prompt
the symbol given, such as C:\>, if the computer is waiting for typed input from the user
Serial Data Transfer
the transfer of one bit at a time or transfer in a single bit stream.
BNC - Bayonet Neil-Concelman
the type of connector used with coaxial cable
Segments/Messages
the unit of measurement used in the Transport Layer.
Frames
the unit of measurement used on the Data link layer.
Packets
the unit of measurements used on the Network Layer.
Plenum-rated
these cables have Teflon coating that makes them more impervious to fire.
Port Range 49,152-65,535
these ports can be used by applications, but they cannot be registered by vendors. Dynamic and private ports.
Transport Layer
this layer ensures error-free transmission between hosts through logical addressing. Therefore, it manages the transmission of messages through layers 1 through 3.
Data link layer (DLL)
this layer establishes, maintains, and decides how transfer is accomplished over the physical layer.
Network layer
this layer is dedicated to routing and switching information to different networks, LANs, or internetworks.
Application Layer
this layer is where message creation-and, therefore packet creation begins. DB access is on this level. End-user protocols such as FTP, SMTP, Telnet, and RAS work at this layer.
Presentation Layer
this layer translates the data format from sender to receiver in the various OSes that may be used.
Content Addressable Memory or (CAM) Table
this table can be compromised with a MAC Flood attack.
NetBios (Network Basic Input Output System)
this works on the Session Layer of the computer.
Fiber Optic Cable
transmits light (photons) instead of electricity, and this light is transmitted over glass or plastic.
Which OSI model layer is responsible for guaranteeing reliable message delivery
transport
network
two or more computers connected together for the purpose of sharing data and resources
Bits
unit of measurement used on the Physical Layer.
Server
used to centralize data and share it with other computers on the network.
Crossover Cable
used to connect like devices to each other, for example, a computer to another computer, or a switch to another switch.
Wireless Repeater
used to extend the coverage of a wireless network.
How is crossover cable made?
using only 4 wires - 1,2,3, and 6 Wires 1 and 2 (transmit) from one end of the cable are switched to the recieve wire placeholders (wires 3 and 6) at the other end of the cable.
How do switches and bridges learn where devices are located on a network?
when a frame enters a port, the source MAC address is copied from the frame header.
cross talk
when a signal crosses from one set of wires to another set that runs directly alongside of it
Crosstalk
when the signal that is transmitted on one copper wire or pair of wires creates an undesired effect on another wire or pair of wires.
WAN
wide area network
Server
windows 2000, lenix, OsX, Unix Solaris, IBM etc. "Role" that the computer plays. A single computer that provides extensive multiuser access to network resources
Fiber
you are setting up a network within a warehouse using Category 6 UTP. however, parts of the network are down because of the heavy machinery used. What cable type should you use?