1.0 Networking Fundamentals Flashcards
Your company’s networking team wants to deploy 10-Gigabit Ethernet (10GbE or 10 Gbps Ethernet) over fiber optic
cables for its core or backbone network segments. Which of the following types of transceivers are they most likely
to plug directly into their switches, routers, and server network adapters?
A) QSFP
B) GBIC
C) CFP
D) SFP+
E) SFP
They are most likely to plug an SFP+ transceiver into their switches, routers, and server network adapters. As data
rates increase to 10 Gbps and beyond, networks make increasing use of fiber optic cables to convey the signals
necessary to encode and transport the huge volumes of information involved. Likewise, fiber optic cable is a must
for long-haul communications and for distances over 1 km for cable runs.
What is a Fiber Optic Transceiver?
A fiber optic transceiver acts to convert digital data into pulses of light for transmission, and to convert those pulses
of light into digital data upon reception. A variety of fiber optic transceiver types can support 10GbE, but only one of
them is currently widely deployed and used for that purpose in equipment from vendors that include Cisco, Aruba
(HPE), Juniper, Dell and so forth. This is the plus version of the small form-factor pluggable (SFP+) fiber optic
transceiver.
What is SFP?
Small form-factor pluggable (SFP) is a compact, hot-pluggable transceiver module used in both telecommunications
and data communications (networking) applications. The SFP works like an upgraded version of the GBIC
transceiver, but is more compact. It works with SONET, GbE, Fibre Channel, and other communications standards.
It does not, however, work with 10GbE
What is QSPF+
QSFP stands for quad (4-channel) small form-factor pluggable. Like SFP, it is a compact, hot-pluggable transceiver
used primarily for data communications. A variant of this standard, QSFP+, has evolved as a standard for 10 Gbps
data rates per the SFF-8436 standard, but the plain-vanilla QSFP standard is not used for such applications.
What is GBIC?
GBIC stands for Gigabit interface converter. Like SFP, which is viewed as a kind of successor to GBIC, GBIC is hotpluggable, and is primarily used with GbE and Fibre Channel, though it also supports Fast Ethernet (100 Mbps),
and variety of other signaling technologies. GBIC does not support 10 GbE.
What is CFP?
C form-factor pluggable (CFP) is derived from the Latin number for 100 (Centum, which shares a common root with century). In fact, CFP was primarily developed for 100 GbE applications. It can support 40 and 100 Gbps. applications, including both Ethernet varieties. It is overkill for a 10 Gbps connection, more expensive to use, and would require a converter to plug into a 10 GbE port. For all of those reasons, CFP is incorrect.
You are the network administrator for your company. As part of your job, you must understand how data is transmitted through the different OSI layers. Move the OSI layers from the left column to the right column, and place them in the correct order, starting with Layer 1 at the top.
APPLICATION
TRANSPORT
SESSION
PRESENTATION
DATA LINK
PHYSICAL
NETWORK
Layer 1 − Physical
Layer 2 − Data Link
Layer 3 − Network
Layer 4 − Transport
Layer 5 − Session
Layer 6 − Presentation
Layer 7 − Application
What does the Layer 1 - Physical layer consist of?
Technologies, Standards, Examples: Copper, Fiber Optics, IEEE 1394, BASE Standards. (connection media)
Electrical and mechanical characteristics
Ensures the physical communication between the devices and converts an electrical pulse to binary. It defines the specific standard to which the physical components must comply to. The most commonly used protocols include the following, IEEE.802.11, IEEE.802.3 and several others.
What does the Layer 2 - Data Link layer consist of?
Technologies, Standards, Examples: Logical Link Control (LLC) / Media Access Control (MAC) - Etherenet, ATM, MPLS, PPP, STP
Flow control acknowledgements, error detections – Also determines access to the media.
The Data link layer provides communication between directly connected devices. It also provides error handling for the OSI model’s physical layer. It consists of two sub-layers, Media Access Control (MAC) and the Logical Link Control (LLC) layers. Most switches operate on the Data link layer or Layer 2 for communication, but there are exceptions where switches can also work on Layer 3 and are referred to as a Layer 3 switch where routing capabilities are required.
What does Layer 3 - Network Consist of?
Technologies, Standards, Examples: IP, ICMP, NAT, OSPF
Routing, Logical addressing
Routers function on the Network layer. This layer is responsible for forwarding packets to specific routes on the network. This layer analyses the packets received and determines if it has reached its destination and then passes it to the Transport layer. If it is not the final destination, it will pass it to the Data link layer until it reaches its final destination. The Network layer is also responsible for updating routing tables.
What does layer 4 - Transport Consist of?
Technologies and Standards, Examples:
The Transport layer’s function is to deliver data across network connections. The most commonly used protocols are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Different protocols will have different functionalities when transporting data across the network. For example, error checking is done using the TCP protocol.
What Does layer 5 - Session Consist of?
Technologies and Standards, Examples: NetBIOS, RPC, SMB, Sockets
Establishes, maintains and terminates session communications
The OSI model’s Session layer manages the flow and sequence of different network connections. This ensures the possibility for dynamic concurrent connections.
What does Layer 6 - Presentation consist of?
Technologies and Standards, Examples: SSL, SSH, Compression, encryption and decryption and encoding.
The simplest part of the OSI model is the Presentation layer, as it handles the processing and converting of the data, for example, encryption and decryption, to facilitate the support for the Application layer.
What does Layer 7 - Application consist of?
Technologies and Standards, Examples: DHCP, DNS, FTP, SMPTP, HTTP, POP3
The final layer in the OSI model, the Application layer, provides network services to the application. These services include protocols that integrate into the application; for example, the HTTP protocol is used to deliver data to a web browser to display a user’s web page.
While designing your network architecture, you decide to configure multiple VLANs to a router within your network.
You are aware that having multiple VLANs on a single router will not be feasible to manage. What should you do to
help mitigate this problem?
A) Implement the Stateless Address Auto Configuration (SLAAC) technique.
B) Implement a dual-stack setup.
C) Implement sub-interfaces on your routers.
D) Implement Spanning Tree Protocol (STP
You should implement sub-interfaces on your routers to mitigate the management issue with multiple VLANs on a
single router. Sub-interfaces are used to help manage multiple VLANs within a router and facilitate
intercommunication with each other. A sub-interface can be configured virtually on a router or switch so that each
device connected to a VLAN appears under the same IP address, causing the IP address to act as a default
gateway. Routers can be configured to have multiple sub-interfaces, enabling greater network scalability and
flexibility without increased costs.
What is dual stacking?
Dual stacking is when a device can run both IPv4 and IPv6 in parallel to each other. While this is a useful
networking technology
Implementing the Stateless Address Auto Configuration (SLAAC) technique. What does it do?
The SLAAC technique is an IPv6 technique that is done automatically. It enables each host on a network to auto-configure a unique IPv6 address without any device keeping track of the node to which it was assigned.
What is STP?
STP is a protocol that is designed to prevent network loops from occurring. (Spanning Tree Protocol)
You will have a very small wiring closet for your routers. While the company will use fiber-optic cabling, you would
like to use the smallest form connector to conserve space. The connector you plan to use should be roughly half the
size of the other connectors. Which fiber-optic connector should you use?
A) ST
B) LC
C) BNC
D) SC
A Lucent Connector (LC) fiber-optic connector is roughly half the size of other fiber-optic connectors. Its smaller form allows for more space in the wiring closet.
What is SC connector?
The SC connector is a square, plug-in connector used with fiber-optic cable. It is a popular choice in 100Base-FX
implementations. SC stands for square connector. The SC connector uses a push to snap on and a push to snap off
technology. It is larger than an LC connector.
What are the two types of SC connector?
There are two types of SC connectors: ultra physical contact (UPC) and angled physical contact (APC). APC
connectors feature an 8-degree angle, while UPC connectors have no angle. UPC adapters are blue, while APC
adapters are green
What is an ST connector?
The ST connector is a round, bayonet type of connector used with fiber-optic cable, which uses a twist on-twist off
technology. The ST stands for straight tip, which refers to the white tip at the end of the connector. It is larger than
an LC connector.
What is an BNC connector?
A BNC connector is used to connect a 10Base-2 (ThinNet) cable to a computer or network device. It is also used to
terminate DS3 connections in a telecommunications facility. It is not used by fiber-optic cable.
What is an MTRJ connector?
Another connector that is used with fiber-optic cabling is the Mechanical Transfer Registered Jack (MTRJ)
connector. It more closely resembles the RJ-45 connector used in UTP and STP cabling.
What is an RJ-45 connector?
RJ-45 connectors are used to connect unshielded twisted-pair (UTP) and shielded twisted-pair (STP) cable to hubs,
network interface cards (NICs), and various other twisted-pair networking devices. RJ-45 connectors are shaped
like RJ-11 connectors, only larger. They use an 8-pin connector that house eight (four pair) wires. Registered Jack
(RJ) connectors use a small tab to lock the connector in place
what is an RJ-11 connector?
An RJ-11 connector is typically used to connect two pairs of UTP wiring to a voice-grade telephone system. They
are smaller than RJ-45 connectors.
What is an RJ-48C connector?
An RJ-48C connector at first glance will look exactly like an RJ-45 connector. However, on close examination, a
technician will notice that the wires are in a different order. It is mostly commonly used for T1 data lines for longer
distances and when exposed to the environment. To protect the integrity of the signal, RJ48 wirings use STP
cabling.
You utilize different components, protocols, and technologies on your company’s network. You need to determine the layer of the OSI model on which these function. Match the components on the left with the layer from the OSI model on the right within which they operate.
Network Cable
FDDI
IPSec
TCP
RPC
MIME
DHCP
The components should be matched with the OSI layers in the following manner:
Physical layer − Network cable
Data Link layer − FDDI
Network layer − IPSec
Transport layer − TCP
Session layer − RPC
Presentation layer − MIME
Application layer - DHCP
Which three options are considered to be characteristics of a client-server network? (Choose 3)
Lengthy access time for a service
More stable and secure connections
Less expensive network hardware
Every node in the network can request and provide services
A decentralized network
Client-server networks are characterized by more secure and stable connections, less expensive networking hardware, and lengthy access times when utilizing a service.
The main two types of networks you will need to understand for the Network+ exam are?
peer-to-peer and clientserver networks. Peer-to-peer networks are decentralized networks in which node can request and provide services.
Client-server networks employ a single central server to which clients will request access so they can connect to the web and use applications, files, and other shared resources. In this network, a client will request a service from the central server, and the server will grant clients access if clients are authorized. These networks are more stable, cheaper, and secure; however, they do take significantly more time to access various services than in a peer-to-peer network.
Peer-to-peer networks have no centralized server. Rather, these networks allow devices to send and receive data directly with each other so that any node can act as a client or a server. These nodes are referred to as peers. Peerto-peer networks are known for being fast, reliable, and easy to set up, but are often seen as more unstable, less secure, and expensive. To access resources on a peer, the owner of the resource must grant that access and configure a username/password combination. For this reason, users may need to keep up with multiple
username/password combinations, one for each different peer.
Why are north-south traffic flows often seen as a targets for malicious attackers?
North-south traffic flows transmit data over the public internet.
North-south traffic flows are not targeted by attacks.
North-south communications are only used to send highly sensitive data.
North-south traffic cannot be secured, and therefore is an easily
exploited vulnerability in any network.
Traffic flows refer to data origin and destination within any network. North-south communications refers to traffic
flows that go in and out of a datacenter over the public internet. Due to this public-facing element, attackers will
target these flows with malicious incoming traffic requests to attempt to gain network access. However, these traffic
flows can be secured with firewalls and application gateways to monitor the traffic coming into and out of the
network.
What is East - West traffice flow?
The opposite of north-south traffic flow is east-west traffic. East-west traffic flow refers to the data that is sent within
or between data centers. These flows occur when network infrastructure devices are communicating with each other
through virtual networks, subnets, and so on. To secure east-west traffic, organizations should follow the policies of
zero trust, as well as only utilize necessary communications paths.
Your company has decided to implement IPSec for all remote connections. Which three statements are true of Internet Protocol Security (IPSec)? (Choose 3)
A) IPSec uses encapsulation security payload (ESP) and authenticationheader (AH) as security protocols for encapsulation.
B) IPSec can work in either in tunnel mode or transport mode.
C) The IPSec framework is used in a virtual private network (VPN) implementation to secure transmissions.
D) IPSec ensures availability of information as a part of the CIA triad.
E) The IPsec framework uses L2TP as the encryption protocol
Internet Protocol Security (IPSec) is an Internet Engineering Task Force (IETF) protocol and a security standard commonly implemented to create virtual private networks (VPNs). IPSec can operate in tunnel mode or transport mode. In transport mode, only the payload, that is, the message part of a packet is encrypted by encapsulating security payload (ESP). In IPSec tunnel mode, the entire packet including the packet header and the routing information is encrypted. IPSec tunnel mode provides a higher level of security. Either of the two modes can be used to secure gateway-to-gateway (site-to-site), host-to-gateway (host-to-site), or host-to-host communication. If used in gateway-to-host communication, the gateway must act as the host.
IPSec allows packets to be securely exchanged over the Internet Protocol (IP) at the OSI Network layer rather than
at the Application layer. While the IETF developed the standard, Cisco has contributed to its emergence. Cisco
routers have support for IPSec built into the product. IPSec uses ESP and authentication header (AH) as security
protocols. AH provides the authentication mechanism, and ESP provides encryption, confidentiality, and message
integrity. IPSec sets up a secure channel that uses a strong encryption and authentication method between two
network devices, such as routers, virtual private network (VPN) concentrators, and firewalls.
You are deploying fiber optic links and connections on a local area network. You need to ensure proper and efficient
data communications. Which of the following transceiver or fiber optics characteristics are essential? (Choose 3)
simplex cables
half duplex
full duplex
multimode
single-mode
duplex cables
The following transceiver or fiber optics characteristics are essential:
Multimode − Multimode cable makes use of thicker, graded light-conducting fibers that are cheaper to make and
terminate, and that use cheaper and less precise light emitting and receiving elements in their transceivers.
They are more limited in the distances such cables can span (but can still cover hundreds of meters) and are
well-suited for LAN applications.
Full duplex − Full-duplex communications means that both parties may transmit and receive simultaneously
over a communications link. Because LAN applications require simultaneous, two-way communications, full
duplex is needed.
Duplex cables − Duplex cables incorporate two fibers, so that one may be used to send data for receipt by
another party, while that other party may use the other fiber to send data for receipt by the first party. Thus, this
supports simultaneous, two-way communications and is well-suited for LAN applications.
What are the functions of single mode fiber optics?
Single-mode cable makes use of very thin, very pure light-conducting fibers that are more expensive to make and
much more expensive to terminate than multimode cables. For that added expense and complexity, they provide the
ability to run cables for 10 – 100 km per segment without difficulty. This makes them unlikely to be used for LAN
applications, where cost is a major factor.
what are half-duplex functions?
Half-duplex communications means that while one party is transmitting, the other party to a connection can only
receive until that transmission ends. Then the line may be idle, or either party can commence further transmission
(but only one at a time). LAN applications require simultaneous, two-way communications
Simplex cables functions?
Simplex cables are best used for one-way transmission of data from a sender to a receiver. Because this precludes
simultaneous transmission and reception by two parties, simplex cables do not work well for LAN applications.
You need to deploy a fiber distribution panel for datacenter, remote office, or local area networking use. Which of the
following features are NOT important for such uses? (Choose 2)
Cable storage
Cable termination
Cable splices
Support for SFP+
Bulkhead adapters and receptacles
Support for GBIC connectors
A fiber distrbibution panel does not need support for SFP+ and for GBIC connectors. These two options represent
connectors used at endpoints, such as routers, switches, and network interfaces, not connectors or functions
present in FDPs themselves.
GBIC connectors are used for end-point termination at a device interface of some kind. They are neither typically
used nor necessary on a fiber distribution panel.
A fiber distribution panel (FDP), also known as a fiber optic distribution panel, offers the following for data centers,
remote office, or local area networking use?
Cable termination − FDPs usually provide a common point for terminating fiber optic cables so that they may be
connected to fiber optic terminal equipment, such as switches, routers, and network interfaces of all kinds.
Bulkhead adapters and receptacles − In an FDP, distribution pigtails with their single connectors (the other end
will be spliced to another fiber optic cable coming either from off or on the current premises) are routed through
cable distribution trays or cable management trays and will be terminated in bulkhead adapters and attendant
receptacles.
Cable splices − FDPs provide facilities for mounting and protecting fiber optic cable splices, including clamps
and mounts to secure spliced cables. They may also include one or more splice trays, where spliced cross- or
pass-through fiber optic connections may be stored. Splice trays also usually house the splice chips used to
create necessary fiber optic cable splices on location.
Cable storage − FDPs usually include cable reels for storing pigtails and patch cables, and may include other
cable storage space and options as well. Often, splice tray(s) and extra cable storage is provided at the bottom
of an FDP chassis.
What are the benefits of establishing an on-premises data center?
Establishing an on-premises datacenter is ideal for single-office organizations. This solution provides great availability, as all the datacenter’s hardware is located within the office complex, which also makes management and security easier to implement. However, on-premises solutions can often lack redundancy, and network administrators should take steps to implement redundant devices and links throughout the network.
What are the benefits of a colocation data center?
Colocation refers to hosting an organization’s hardware within a datacenter owned by a third party. In this system,
the client still owns the server but the third party provides the power, bandwidth, and physical space. While the client
is still tasked with managing their devices and the software they use, the third party manages physical access to the
premises and security measures. This model provides a very high degree of freedom and flexibility as the clients
can choose exactly how the servers will be configured without having to oversee the location, power needs, or
bandwidth requirements.
As part of monitoring network traffic, you need to determine the payload that is produced by using IPSec in tunnel
mode with the AH protocol. Which of the following best describes this payload?
an unencapsulated packet that is encrypted
an unencapsulated packet that is digitally signed
an encapsulated packet that is encrypted
an encapsulated packet that is digitally signed
Internet Protocol Security (IPSec) in tunnel mode with the Authentication Header (AH) protocol produces an
encapsulated packet that is digitally signed. AH digitally signs a packet for authentication purposes. Tunnel mode
encapsulates a packet within another packet. Encapsulating Security Protocol (ESP) encrypts IPSec packets.
Transport mode sends IPSec packets between two computers without encapsulating packets. AH and ESP work in
transport mode and tunnel mode.
Which TCP port is the well-known port assigned to SSL?
119
443
80
20
Transmission Control Protocol (TCP) port 443 is the well-known port assigned to Secure Sockets Layer (SSL). SSL uses public key cryptography at the Session layer of the Open Systems Interconnection (OSI) model to secure transactions, such as financial transactions, on the Internet. The Session layer is responsible for establishing andmaintaining a connection between two computers on a network, which is referred to as a session.
SSL can select from several public key cryptography technologies, including Digital Encryption Standard (DES),
triple-DES, and Rivest-Shamir-Adelman (RSA). Port 443 sessions often use transport-layer encryption. In public key
cryptography, a computer such as a server has a private key that is kept secret and a public key that is shared with
the public. When a Web client contacts a Web server for an SSL session, the Web server sends the Web client its
certificate, which contains the server’s public key. The Web browser can contact a certificate authority to determine
whether the certificate and the public key are authentic. After the Web client authenticates the server’s certificate,
the client encrypts a message and sends it back to the server. The server then authenticates the client by decrypting
the message. After the authentication process is complete, the client and the server negotiate an encryption
algorithm, such as RSA or DES, to be used during the session. After the encryption algorithm is negotiated,
messages on the session can be encrypted. SSL was deprecated for TLS.
Define the ports of:
20
80
119
TCP port 20 is assigned to File Transfer Protocol (FTP). FTP can be used to transfer files between FTP clients andFTP servers on a TCP/IP network such as the Internet.
TCP port 80 is assigned to Hypertext Transfer Protocol (HTTP). HTTP is used to transfer Web pages from Webservers to Web browsers on a TCP/IP network. Port 80 Web sessions often use application-level encryption.
TCP port 119 is assigned to the Network News Transfer Protocol (NNTP). NNTP is used to transfer network news
messages on TCP/IP networks Protocols can use either User Datagram (UDP) or TCP to communicate. UDP is connectionless, while TCP is connection-oriented.
Define the port number of these default ports:
FTP –
SSH, SFTP –
TELNET –
SMTP –
DNS –
DHCP –
TFTP –
HTTP –
POP3 –
NTP –
FTP – 20, 21
SSH, SFTP – 22
TELNET – 23
SMTP – 25
DNS – 53
DHCP – 67, 68
TFTP – 69
HTTP – 80
POP3 – 110
NTP – 123
Define the port number of these default ports:
NetBIOS –
IMAP –
SNMP –
LDAP –
HTTPS –
SMB –
Syslog –
SMTP TLS –
LDAPS –
IMAP over SSL –
POP3 over SSL –
NetBIOS – 137–139
IMAP – 143
SNMP – 161/162
LDAP – 389
HTTPS – 443
SMB – 445
Syslog – 514
SMTP TLS – 587
LDAPS – 636
IMAP over SSL – 993
POP3 over SSL –995
Define the port number of these default ports:
Structured Query Language (SQL) Server –
SQLnet –
H.323 –
MGCP –
MySQL –
RDP –
RTP –
SIP –
Structured Query Language (SQL) Server – 1433
SQLnet –1521
H.323 – 1720
MGCP – 2427/2727
MySQL –3306
RDP – 3389
RTP – 5004/5005
SIP – 5060/5061
You decide to implement a DHCP server on your network. What is the purpose of a DHCP scope?
A) It is an IP address that cannot be assigned.
B) It is an IP address that is set aside for a certain device.
C) It is the temporary assignment of an IP address.
D) It is the range of IP addresses that a DHCP server can temporarily assign.
The DHCP scope is the range of IP addresses that a DHCP server can temporarily assign to its clients. DHCPscopes are also referred to as pools.
What is the function of DHCP reservation?
A DHCP reservation is an IP address that is set aside for a certain device. The lease is granted to the device’s MAC
address. If the device’s MAC address changes, the DHCP reservation will no longer work.
What is the function of DHCP exclusion?
A DHCP exclusion is an IP address or group of addresses from within a scope that CANNOT be assigned. This is
often used for addresses within the scope that must be statically assigned to devices, such as routers and servers,
that need a static address to ensure that they can always be accessed using the same host name and IP address.
What is the application DHCP server do?
A DHCP server dynamically assigns the IP address, subnet mask, and default gateway to client computers. IP
addresses may be assigned statically rather than dynamically; however, assigning static IP addresses requires
greater administrative effort. When IP addresses are statically assigned, it is crucial to maintain a manual record of
which client was assigned which IP address. If the addressing scheme were to change, it might necessitate the
manual reconfiguration of each computer.
What is the difference of Dynamic and Static DHCP?
For the Network+ exam, you will also need to understand the difference between dynamic and static DHCP assignment. Dynamic assignment refers to IP address that can be changed at a moment’s notice. These dynamic address are assigned via a DHCP server to individual devices within a network, such as computers, smartphones, or similar devices. Static assignment is where a device is assigned a static IP address that does not change. These addresses are used generally by servers or other equipment within a network’s architecture. Static IP addresses are usually assigned to the device’s MAC address, which is the hard-coded address assigned by the manufacturer of
the network card.
A customer has asked you to deploy a solution based on port numbers that allows multiple computers to share a single IP address. Which addressing technology should you deploy?
APIPA
DHCP
NAT
PAT
Port Address Translation (PAT) provides port address translation. This is based on the port numbers. When using
PAT, you are able to share a single public IP address among multiple computers on the same network.
What is the NAT function?
Network Address Translation (NAT) is a standard that translates private IP addresses into public IP addresses. It allows multiple private address devices to share a single public address.
What does DHCP do?
Dynamic Host Configuration Protocol (DHCP) is a dynamic IP addressing scheme whereby DHCP servers assign IP
addresses based on the DHCP client requests.
What is the element of RFC 1918?
Another important element that you will need to understand for the Network+ exam is RFC 1918. RFC 1918 was used to create the standards for assigning IP address within a private network to various pieces of networking equipment. It facilitated the expansion of usable IP addresses under IPv4 to prevent the exhaustion of public addresses available.
Which open standard creates a redundancy group to share an IP address?
CARP
LACP
HSRP
NAT
Common Address Redundancy Protocol (CARP) is an open standard that creates a redundancy group to share an
IP address.
Definition of HSRP?
Hot Standby Router Protocol (HSRP) is a Cisco standard similar to CARP.
Definition of LACP?
Link Aggregation Control Protocol (LACP) is a standard that assigns multiple physical links to a logical interface.
Which of the following uses cells that are equally sized at 53 bytes each?
DMVPN
PPPoE
ATM
SIP trunk
Asynchronous Transfer Mode (ATM) is a network transmission model used in voice, video, and data communications that uses equally sized cells that are all 53 bytes long. The equal length of the data packets supports very high data rates. ATM is deployed in Optical Carrier (OC) backbone network segments.
What is a PPPoE?
Point-to-Point Protocol over Ethernet (PPPoE) encapsulates Point-to-Point Protocol (PPP) frames over Ethernet. It
is typically used in DSL to allow subscribers on Ethernet networks to connect over DSL modems.
What is DMVPN?
Dynamic Multiport Virtual Private Network (DMVPN) allows an organization to exchange data over a secure network of VPNs, without having to route the data through the organization’s primary VPN router. In essence, a DMVPN creates a mesh VPN topology.
SIP Trunking?
Session Initialization Protocol (SIP) trunking is used in Voice over IP telephony. The SIP trunk connects the incoming gateway with the customer’s Private Branch Exchange (PBX).
You administer a LAN. You want to encrypt TCP/IP communications on the LAN. The protocol that you use for encryption should be able to encrypt entire data packets, and the protocol should be able to operate in both tunnel mode and transport mode. Which protocol should you use to encrypt data on the network?
IPSec
Kerberos
IPX
L2TP
You should use Internet Protocol Security (IPSec) to encrypt the data packets on the network that you administer. IPSec can encrypt data packets transported on a TCP/IP network by using either tunnel mode or transport mode. In transport mode, IPSec encrypts only the part of an IP data packet used by the Transport layer. In tunnel mode, IPSec encrypts entire IP packets. IPSec uses several technologies to encrypt data, including the following: DiffieHellman key exchange, Data Encryption Standard (DES), bulk encryption, and digital certificates.
What are the simple functions of Kerberos?
Kerberos is an authentication protocol that is used to determine whether users should be allowed to gain access to a network or network resources. Windows operating systems support Kerberos and the NT LAN Manager (NTLM) authentication protocols; NTLM is also known as Windows NT Challenge/Response. Kerberos is used for authentication between Windows computers. The NTLM authentication protocol is used for authentication between a down-level computer, such as an older Windows that only includes NTLM.
Your company’s enterprise network includes multiple subnets, each of them using a different addressing class. You need to identify IP addresses by matching the first two octets of the IP address with its corresponding class and type. Which address class below is not matched to the first two octets of a correct IP address?
Class A private − 10.6.xx.xx
Class C private – 169.254.x.x.
Class A public − 77.24.x.x
Class B public − 143.91.xx.xx
A Class C private address has 192.168.x.x as the first two octets.
169.254.x.x represents the first two octets of an APIPA address
The others are correct
Other classes of IP addresses can be matched to their first two octest:
Class B Private − 172.20.x.x
Class C Public − 204.29.xx.xx
Class A addresses are in the 0.0.0.0 through 126.255.255.255 range.
Class B addresses are in the 128.0.0.0 through 191.255.255.255 range.
Class C addresses are in the 192.0.0.0 through 223.255.255.255 range.
What are the reserved ranges of:
Class A
Class B
Class C
Class A − 10.0.0.0 through 10.255.255.255
Class B − 172.16.0.0 through 172.31.255.255
Class C − 192.168.0.0 through 192.168.255.255
Automatic Private IP Addressing (APIPA) addresses are in the 169.254.0.0 through 169.254.255.255 range
You need to create an encrypted remote terminal connection with a UNIX computer. Which protocol should you
use?
FTP
SSH
Telnet
SCP
Secure Shell (SSH) is used to create an encrypted remote terminal connection with a UNIX computer. File Transfer
Protocol (FTP) is used to transfer files on a TCP/IP network. FTP transmits data in clear text. Secure Copy (SCP) enables users to transfer files over a secure connection. Telnet is a protocol that enables a user to establish terminal connections with UNIX computers. Telnet transmits data in clear text. To fully harden your network, you should use the following secure protocols:
SSH − secure alternative to Telnet.
SNMPv3 − secure alternative to SNMPv1 and v2.
TLS/SSL − used with different protocols, including FTP and HTTP, to secure transactions.
SFTP − secure alternative to FTP. It uses TLS/SSL.
HTTPS − secure alternative to HTTP, It uses TLS/SSL.
IPsec − used on virtual private networks (VPNs) to encrypt traffic.
What are the three anti-malware software options available?
Host-based − Host-based anti-malware software is installed at the local host, although its updates may be managed from a central location. Host-based anti-malware protects only the device on which it is installed.
Cloud/server-based − Cloud- or server-based anti-malware protects all components located on the cloud or server.
Network-based − Network-based anti-malware protects the entire network. In some case, a small client component will need to be installed on the network hosts to ensure that the network-based software can communicate with all hosts on the network.
Your company is considering converting to the use of IPv6 addresses. What are the three types of Internet Protocol
version 6 (IPv6) addresses? (Choose 3)
Anycast
Broadcast
Multicast
Dual-cast
Unicast
Unicast, multicast, and anycast are types of IPv6 addresses
Unicast address: This type of address is used to define a single destination interface. A packet sent to a unicast address is delivered to the specific interface.
Multicast address: This type of address is used to define a group of hosts. When a packet is sent to a multicast address, it is delivered to all the hosts identified by that address. Multicast addresses begin with the prefix FF00::/8. The second octet identifies the range over which the multicast address is propagated.
FF01:0:0:0:0:0:0:1: Indicates all-nodes address for interface-local scope.
FF02:0:0:0:0:0:0:2: Indicates all-routers address for link-local.
Anycast address: This type of address is used to identify a set of devices. These addresses are also assigned to more than one interface belonging to different nodes. A packet sent to an anycast address is delivered to just one of the interfaces, based on which one is closest. For example, if an anycast address is assigned to a set of routers, one in India and another in the U.S., the users in the U.S. will be routed to U.S. routers and the users in India will be routed to the router in India.
Which wireless communications mode enables wireless devices to communicate directly with each other?
infrastructure
transport
ad hoc
tunnel
Ad hoc is a wireless communications mode that enables wireless devices to communicate directly with each other. The wireless networking technology is sometimes referred to as Wi-Fi.
In infrastructure mode, wireless devices must communicate through wireless access points. Transport and tunnel modes are provided by Internet Protocol Security (IPSec) to securely transmit Internet Protocol (IP) packets.
You are analyzing communication over your network. You have captured all the packets sent to and from a server on your network. You need to filter the packet capture to only IMAP4 protocol communications. Which port does this
protocol use?
TCP port 25
UDP port 110
TCP port 110
UDP port 25
UDP port 143
TCP port 143
internet Message Access Protocol version 4 (IMAP4) is an Internet protocol for e-mail retrieval that uses TCP port
143. IMAP4 works at the Application layer of the OSI model.
What are the port numbers of POP3 and SMTP and their functions?
Post Office Protocol version 3 (POP3) is an e-mail message retrieval protocol that uses TCP port 110. Simple MailTransfer Protocol (SMTP) is an e-mail message protocol that uses TCP port 25. POP3 and SMTP work at theApplication layer of the OSI model.
These protocols are connection-oriented protocols, and therefore require the use of TCP. UDP is a connectionless
protocol. The TCP header implements flags, while the UDP header does not. These flags are used to indicate information about the packet transfer, such as connection state or other similar info. The Internet Protocol (IP) is the communications protocol for relaying data across networks. Its routing function enables internet working and essentially establishes the Internet.
You have recently added a new Windows 8 computer to your IPv6 network. Because your network is small, you currently use static IP addressing. You record the IPv6 address of the new Windows 8 computer. What is the shortest possible notation of it IPv6 address as shown below?
2001:0DB8:0000:0001:0000:0000:0000:F00D
The shortest possible notation of the IPv6 address 2001:0DB8:0000:0001:0000:0000:0000:F00D is
2001:DB8:0:1::F00D. The address is shortened according to the following rules:
Remove leading zeros.
Remove the consecutive fields of zeros with double colon (::).
The double colon (::) can be used only once.
General Info about IPv6 address.
::10.2.4.1 is an example of an IPv4-compatible IPv6 address, where the first 12 bytes (96 bits) of the address
are set to 0.
:: is the IPv6 “unspecified address.” It is a unicast address not assigned to any interface, and is used by DHCPdependent host prior to allocating a real IPv6 address.
2001:0:42:3:ff::1 is a valid IP address, with the :: representing two segments (4 bytes) of compressed zeros
2001:42:4:0:0:1:34:0 is a valid IP address, with only the leading zeros of each segment truncated.
What does an IPv6 unicast address range is?
IPv6 globally routable unicast addresses start with the first 4 characters in the range of 2000 to 3999.
What does an IPv6 link local address consist of?
FE80
What does an IPv6 Multicast address start off with?
FF
Can IPv6 auto discover current network and select host ID?
IPv6 can use auto-configuration to discover the current network and select a host ID that is unique on that network. IPv6 can also use a special version of DHCP for IPv6. The protocol that is used to discover the network address and learn the Layer 2 address of neighbors on the same network is Neighbor Discovery Protocol (NDP).
What does an EUI-64 mean on IPv6?
IPv6 addresses use the Extended Unique Identifier (EUI-64) format. This format causes a router to automatically
populate the low-order 64 bits of an IPv6 address based on an interface’s MAC address.
Which WAN technology offers the highest potential bandwidth?
OC-3
Frame Relay
T3
E3
FDDI
OC stands for optical carrier. OCx levels are a set of transmission rates as specified by Synchronous Optical
Network (SONET) for implementations over fiber-optic cable. The base rate is OC-1, which has a maximum of 51.84 Mbps. OC-3 has a bandwidth potential of 155.52 Mbps. The following are transmission rates of other common WAN technologies:
BRI ISDN − up to 128 Kbps
PRI ISDN − up to 1.544 Mbps (over T1)
T1 − up to 1.544 Mbps
Frame Relay − up to 1.544 Mbps
E1 − up to 2.048 Mbp
T2 - up to 6.312 Mbps
E3 − up to 34.368 Mbps
T3 − up to 44.736 Mbps
OC-1 − up to 51.84 Mbps
FDDI − up to 100 Mbps
OC-3 − up to 155.52 Mbps
T4 - up to 274.176 Mbps
ATM − up to 622 Mbps
OC-12 − up to 622.08 Mbps
OC-24 − up to 1244.16 Mbps
OC-192 − up to 9953.28 Mbps
What are the WAN Technologies?
OCX − includes speeds up to 51.84 Mbps for OC-1, 155.52 Mbps for OC-3, and 622.08 Mbps for OC-12. This network uses fiber optic cabling. All OCX networks are packet-switched networks.
ATM − allows speeds up to 622 Mbps. This network uses UTP or STP. ATM is a packet-switched network.
Frame relay − allows speed up to 1.544 Mbps. This network uses UTP/STP, coaxial, or fiber-optic cabling. All frame relay networks are packet-switched networks.
You are working to convert a 10Base-T network to a 1000Base-T network. This conversion includes replacing all cabling, network devices, and network interface cards (NICs). Next year, a planned renovation will move various departments to different areas within the same building. That renovation should involve minimal network hardware changes.
When you start the conversion, you have a hard time determining where each wall plate terminates at the patch panels. You decide to follow better design procedures to make future upgrades or troubleshooting easier and also to ensure that next year’s move goes more smoothly. Your solutions should minimally impact the current network structure.
Which best practices should you implement during the conversion? (Choose 2)
Implement port labeling
Implement device naming conventions.
Create a logical network diagram.
Implement an SLA.
Create a physical network diagram.
Implement patch panel labeling
You should implement port labeling and patch panel labeling. This will ensure that you are able to locate individual cables at both ends of their connection. For example, the wall port where the computer is connected to the network might be labeled as Port24. Where the cable then plugs into the patch panel or other network device, you should also label that port with the same number. This will ensure that you can easily locate both ends of the connection.
Match the description on the left with the DNS resource record on the right?
A - Maps an IP address to a host name
AAAA - Maps a mail server name to a domain
CNAME - Maps a host name to an IPv6 address
MX - Maps a host name to an IPv4 address
PTR - Maps an additional host name to an existing host record
A − Maps a host name to an IPv4 address
AAAA − Maps a host name to an IPv6 address
CNAME − Maps an additional host name to an existing host record
MX − Maps a mail server name to a domain
PTR − Maps an IP address to a host name
Your network contains a DHCP server. While performing routine maintenance, you discover that the DHCP server has the following types of options configured: server options, scope options, reserved client options, and class options. Which of these types of options takes precedence?
server options
reserved client options
scope options
class options
The reserved client options take precedence over all the other options.
The order in which options are applied is as follows:
1. Server options
2. Scope options
3. Class options
4. Reserved client options
Scope options always override server options if there is a conflict. Class options always override scope and server options. To use class options, DHCP clients must be configured with a specific DHCP Class ID. Reserved client options always override client, scope, and server options.
Which of these networks encompasses several buildings that are usually located within a several block radius?
metropolitan area network (MAN)
controller area network (CAN)
storage area network (SAN)
personal area network (PAN)
campus area network (CAN)
A campus area network (CAN) is a type of network that encompasses a large campus that is usually located within a several block radius. This type of CAN connects several LANs into a single CAN. Then multiple CANs can be connected using a MAN or WAN.
What does a controller area network used for?
A controller area network (CAN) is used in industrial applications, originally in automotive systems. It replaces bulky wiring systems, reducing weight and cost. A CAN builds a network between controllers, allowing them to share information. A railway application, for example, might be a sensor that detects whether or not a door is closed, and locks the brakes until the sensor indicates the door is closed.
What does SAN functions do?
A storage area network (SAN) creates a network among a pool of storage devices. It may be thought of as a RAID array that uses network connections as opposed to data cables. The SAN pool appears as a single drive letter to the client. A key feature of SAN is multipathing. In a SAN, the physical path between a server and a storage device can fail, and if there is only one pathway available, this failure can cause a network crash. However, SAN multipathing avoids this issue by establishing multiple routes between the hardware so it can route data through multiple paths in the case of a failure.
What does PAN functions do?
A personal area network (PAN) is a network of devices that are in close proximity to a person, no more than a couple of meters away. Devices that can be part of PANs include wireless headphones, wearable technology, and printers
What does MAN functions do?
A metropolitan area network (MAN) connects several LANS together in an area roughly the size of a city. An example of a MAN might be a large hospital with several satellite offices in various neighborhoods around the city.
You need to configure IPSec to digitally sign and encapsulate each packet within another packet. Which of the following should you implement?
ESP protocol in tunnel mode
ESP protocol in transport mode
AH protocol in tunnel mode
AH protocol in transport mode
Internet Protocol Security (IPSec) can be used in tunnel mode with the Authentication Header (AH) protocol to digitally sign and encapsulate each packet sent from the network within another packet. A tunnel is a network communications construct that transports encapsulated packets. AH does not really protect the packet information. Therefore, a simple packet sniffer can still read the packet contents.
IPSec can be used in transport mode with AH to digitally sign and encrypt packets sent between two hosts. AH
provides an authentication security mechanism. Transport mode does not encapsulate packets within other packets.
Encapsulating Security Payload (ESP) can be used with IPSec to encrypt IPSec packets. ESP is not used to
digitally sign packet headers. ESP works in tunnel mode and transport mode. ESP protects the packet information
using encryption.
You are installing the wiring for a small office. You want to connect the fifty computers in the office to the switch. The Cat6 cables that you plan to use have RJ-45 connectors on both ends.
Which component should you use?
demarcation extension
110 block
66 block
patch panel
You should use a patch panel to connect the fifty computers in the office to the switch using Cat6 cables with RJ-45 connectors on both ends. Patch panels, also referred to as patch bays, help with cable management.
You should not use a 66 block or 110 block because these devices require that the cable be directly terminated into the device. If the cables are terminated with a jack, such as an RJ-45 connector, a patch panel should be used.
You should not use a demarcation extension. A demarcation extension, often called a demarc extension, is used to extend a leased line from its original demarcation point, often called a demarc. For example, suppose your network was located in a suite on the 48th floor of a building and that the Internet Service Provider (ISP) technician connected your leased T1 line demarcation to a central wiring closet located near the elevator shaft. If you needed
to connect your suite to that demarcation point, a demarcation extension should be used.
Another component is wiring distribution is a smart jack. A smart jack terminates a PRI/T1 at your location. The provider designates everything connected to the inside of the smart jack as the local loop. The local loop equipment typically is the customer’s responsibility.
You are explaining the TIA/EIA 568A and 568B wiring specifications to a new employee. Which wiring pins contain the same colors across both specifications? (Choose 4)
Pin 5
Pin 1
Pin 7
Pin 8
Pin 3
Pin 4
Pin 2
Pin 6
In both the (TIA) / (EIA) 568A and 568B specifications, Pins 4, 5, 7, and 8 contain the same colors. Pin 4 contains the Blue wire; Pin 5 contains the Blue/White wire; Pin 7 contains the Brown/White wire; and Pin 8 contains the Brown wire. All the other wires in the specifications are different.
The 568A specification is shown below:
Pin 1 − Green/White
Pin 2 − Green
Pin 3 − Orange/White
Pin 4 − Blue
Pin 5 − Blue/White
Pin 6 − Orange
Pin 7 − Brown/White
Pin 8 − Brown
The 568B specification is shown below:
Pin 1 − Orange/White
Pin 2 − Orange
Pin 3 − Green/White
Pin 4 − Blue
Pin 5 − Blue/White
Pin 6 − Green
Pin 7 − Brown/White
Pin 8 − Brown
Which of these devices or functions works at Layer 7?
NGFW
VoIP gateway
VoIP PBX
Content filter
A Next Generation Firewall (NGFW) works at Layer 7, the Application layer. It includes traditional firewall functionality with an Application layer firewall. It enforces security policies at the port, protocol, and application levels. A traditional firewall that allows HTTP traffic on port 80 may also permit an SQL injection attack embedded in
a properly formed HTTP request. An Application-layer firewall would perform a more intensive examination of the traffic instead of just allowing traffic on a given port. In this example, even though HTTP traffic on port 80 is allowed on a traditional firewall, the Application layer firewall would look for an SQL injection attack and block the data.
Which connection type allows for connections of up to 44.736 Mbps?
T3
E1
T1
E3
A T3 connection allows for connections of up to 44.736 Mbps. The T-Carrier system offers several different levels of connections. Each level has a different number of channels, which are separate paths through which signals flow. Having more channels increases the bandwidth. However, T1 and T3 are the two most commonly used T-lines.
For testing purposes, you should understand the standards for the following carrier lines:
T1 − 1.544 Mbps, 650 feet maximum cable length, UTP/STP/coaxial cable
T3 − 44.736 Mbps, 450 feet maximum cable length, coaxial cable
E1 − 2.048 Mbps, 650 feet maximum cable length, UTP/STP/coaxial cable
E3 − 34.368 Mbps, 450 feet maximum cable length, coaxial cable
All of these carrier lines are circuit-switched networks.
You have several computers in your network that are located behind a firewall. The computers are unable to obtain a dynamic IP address from the DHCP server. You suspect that the firewall is configured to block the DHCP traffic. Which port must be open on the firewall to allow the traffic?
TCP port 67
TCP port 53
UDP port 53
UDP port 67
Dynamic Host Configuration Protocol (DHCP) transmits dynamic IP address assignment information over UDP port 67. DHCP is considered a connectionless protocol. IP addresses are assigned based on a series of messages between the client and the DHCP server. DHCP also uses port 68.
Which Port does DNS use and communicate over?
Domain Name System (DNS) is a host name resolution protocol that communicates over TCP and UDP port 53.
Which of the following can be manipulated to reduce network traffic?
increased lease time
NTP
MAC reservations
lower TTL
Lease time can be manipulated to reduce network traffic. Lease time is the amount of time a device maintains the IP address assigned by the DHCP server. The default lease time for Windows is 8 days, but lease times may be adjusted. As an example, if the network configuration seldom changes and you have a large number of IP
addresses, you might consider increasing the lease time. The justification for doing so is that every lease must be renewed, and those renewals increase network traffic. Increasing the duration of the lease reduces the amount of network traffic required for lease renewal.
Why would you use a MAC reservation?
MAC reservations allow you to permanently assign an IP address to the MAC address of a specific device. Web servers, mail servers, copiers, printers, wireless access points, and projectors are all examples of devices that can benefit from having a permanently assigned IP address. For each such device, a reservation (exclusion) would be made so that the IP address is removed from (reserved) the pool of available IP addresses. Once a reservation is made, that device always uses that same address. But configuring MA reservations will not affect network traffic as much as increasing the lease time.
What is the purpose of TTL?
Time To Live (TTL) specifies the length of time that a DNS name server must cache the name. By default, the TTL is 60 minutes, but it may be modified in the DNS Management Console. Longer TTLs are best for more permanent records, such as MX records, DKIM/SPF records, and TXT records. A lower TTL would mean additional network traffic.
What is the purpose of NTP?
Network Time Protocol (NTP) is used to synchronize the clocks of computers on the network. Synchronization of time is important in areas such as event logs, billing services, e-commerce, banking, and HIPAA Security Rules. Implementing NTP would actually increase network traffic.
What is the three major Elements of NTP?
For the Network+ exam, you will need to understand the various components associated with NTP. Within NTP, there are three major elements: stratum, clientsstratum, clients, and serversservers. NTP stratumsstratums refer to layers within the protocol that distribute accurate time across the networked devices. NTP clients are the devices that use the NTP server to periodically request timing information. The NTP server communicates with is what each of these clients communicate with and holds the centralized time to ensure that alleach networked devices remaindevice remains in sync with each other.
Some of the most common issues with NTP are not receiving NTP packets, not being able to process NTP packets, NTP packets causing the loss of synchronization, and the NTP clock period being manually set. NTP’s debugging commands can help identify the issues.
Which wireless topology only requires one access point to be physically connected to the wired network, while still offering maximum flexibility and redundancy?
Mesh
Infrastructure
Ad hoc
Bluetooth
A mesh topology in wireless networks only requires one access point to be physically connected to the wired network. In traditional wireless networks, each access point must be physically connected to the wired network. With a mesh topology, the other access points are interconnected wirelessly, allowing for flexibility and redundancy.
Your company periodically exchanges confidential information with a third party via a single server at each company. Management has recently become concerned that communications between the two servers have been intercepted and read. You have been asked to ensure that messages between the two authenticated computers are
encrypted to prevent attackers from reading the messages. Which protocol should you use?
DNS
UDP
TLS
TFTP
Transport Layer Security (TLS) encrypts the messages transmitted between two authenticated computers, preventing third parties from reading the messages. TLS is the protocol being used when Secure Sockets Layer (SSL) is implemented. TLS works at the Transport layer of the OSI model.
What are the functions of TFTP?
Trivial File Transfer Protocol (TFTP) is a connectionless version of the File Transfer Protocol (FTP). TFTP transfers files between a client and a server. TFTP servers can be configured to help facilitate file transfers to and from network devices. TFTP works at the Application layer of the OSI model.
What is the use of UDP?
User Datagram Protocol (UDP) is part of the TCP/IP protocol suite. UDP provides connectionless communication. UDP works at Transport layer of the OSI model. It uses datagrams for communication.
Your company wants to upgrade its twisted pair (TP) cable network to handle up to 10 GB data rates from switches to network nodes over lengths of up to 90 meters. Which TP category type must the company deploy to meet its requirements?
Cat5e
Cat6
Cat3
Cat6a
Cat4
The company must deploy Cat6a to meet its requirements. Cat6a, which stands for Category 6 Augmented twisted-pair cable, makes use of better conductors and shielding to support the nominal 100 meter (90 meter cable run) distances for data rates up to 10 Gbps.
What are the considerations when you are using a Cat6 cable?
Cat6 cables can support data rates of up to 10 Gbps, but only over nominal cable runs of up to 55 meters. Cat6 cannot accommodate the 10 Gbps data rate over distances of up to 90 physical /100 nominal meters.
As the category numbers for twisted pair cable categories increase, so does their bandwidth handling capabilities and maximum data rates (aka data transmission speeds). Thus, it is reasonble to guess that only the highest numbered categories – namely Cat6 and Cat7 – might be able to provide 10 GB data rates in a new deployment. In fact, Cat6, Cat6a, and Cat7 all can handle 10 GB data rates, but only Cat6a and Cat7 can deliver them over wire runs of up to 100 meters.
What are the considerations when you are using a Cat5e cable?
Cat5e stands for Category 5 Extended. Cat 5e reflects this modified version of Cat5 cable’s ability to accommodate date rate of up to 1 Gbps. By contrast, standard Cat5 supports data rates only up to 100 Mbps. Cat5e, while still very popular, cannot accommodate the 10 Gbps data rate.
What are the considerations when you are using a Cat3 cable?
Cat3 cables can deliver data rates up to 10 Mbps over nominal cables runs of up to 100 meters.
What are the considerations when you are using a Cat4 cable?
Cat4 cables consist of four pairs of twisted copper wire and is rated for 16 Mbps.
Is Cat7 backwards compatible with standard RJ-45?
Cat7 is not offered as an option here, because its ability to deliver 10 Gbps over the required cable run lengths is contingent upon using all conductors in the Cat7 GigaGate45 (GG45) connectors it uses. These connectors are not backwards compatible with standard RJ-45 connectors. However, the GG45 conductor works fine at 1 Gbps rates in standard RJ-45 connectors.