Block 6 Flashcards

1
Q

What kind of network is a small area, single building, small group of buildings or small number of computers?

A

Local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a large area network with a substantial number of computers?

A

Wide area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multiple LANs connected together is called what?

A

Wide area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ is a large public network and is the largest WAN

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a private network called?

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a private network that is accessible to select outside users?

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WANs may consist of ____, ____ and/or ____

A
  • Campus area network (CANs)
  • Metropolitan area network (MANs)
  • Global area network (GANs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CANs consist of what?

A
  • Campus area
  • School campus
  • University
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MANs consist of what?

A

A few city blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

GANs consist of what?

A

Connection points around the globe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do servers do?

A

Share resources, serve/manage network resources such as e-mail, files and printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do clients do?

A

Request access to shared resources/acces network resources such as host computers, printers and cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do network classifications depend on?

A

The role played by the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a large network that has one or more computers acting as servers and the rest as clients called?

A

Client/server network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a network where computers act as both clients and servers?

A

Peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ is a circuit card inside a network device which enables it to access a network

A

Network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a unique identifier for a device?

A

Media access control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Where is the MAC address utilized?

A

Either on the NIC or motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ is architecture of the network (cables, connectors, signaling)

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What defines everything about modern network HARDWARE?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are examples of network media?

A
  • Coaxial cables
  • Twisted pair
  • Fiber optics
  • Wireless components
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is referred to as, the language the machines on the network use?

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Operating systems, protocols, TCP/IP suites are examples of what?

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Programs used to accomplish tasks like file sharing or web browsing are called what?

A

Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Word processors, spreadsheets and slide presentations are examples of what?

A

Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is needed to connect LANs?

A
  • Physical or wireless connection
  • Routers
  • IP adressess
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Network components provide intelligent direction so data can flow WITHIN LANs via ____ and BETWEEN LANs via ____

A
  • Switches

- Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Physical topologies dictate what?

A

Precisely how devices/wires connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Logical topologies dictate what?

A

How SIGNALS travel from one device to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

____ topology is where all devices are connected by one cable

A

Bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the characteristics of bus topology?

A
  • Used in early networks
  • Break/improper termination causes REFLECTION
  • Single point of failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

____ topology is where every computer system is connected together in a complete loop (making it vulnerable to a single point of failure)

A

Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

____ topology is where all devices connected to a single device

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which topology when a break occurs it only affects a single machine (single point of failure)?

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

____ topology is where each node is connected with multiple links, providing multiple paths between any two nodes

A

Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

____ is created by Organization of Standardization (ISO)

A

Open system interconnect (OSI) reference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the standardized common language between hardware and software

A

Open systems interconnect (OSI) reference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is Layer 1 of the OSI model?

A

Physical layer (layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the function of the Physical layer (Layer 1)?

A

Determines how data is placed on the network MEDIA (cabling, connectors, hubs and NICs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Layer 2 of the OSI model?

A

Data link layer (layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Layer 3 of the OSI model?

A

Network layer (layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is Layer 4 of the OSI model?

A

Transport layer (layer 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is Layer 5 of the OSI model?

A

Session layer (layer 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is Layer 6 of the OSI model?

A

Presentation layer (layer 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is Layer 7 of the OSI model?

A

Application layer (layer 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the function of the data link layer (Layer 2)?

A

Gathers and completes the elements that make up the whole DATA FRAME and then passes it to the physical layer (MAC ADDRESSING)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the function of the network layer (Layer 3)?

A
  • Routing

- Logical addressing (IP addressing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the function of the transport layer (Layer 4)?

A

Breaks data into smaller, more manageable chunks for transmission (FRAGMENTATION)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the function of the session layer (Layer 5)?

A

Manages and terminates sessions between programs on devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the function of the presentation layer (Layer 6)?

A

Manages and translates between the session layer and the application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the function of the application layer (Layer 7)?

A

Represents network-related program code and functions computers need to INITIATE SERVICE REQUESTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

____ is a sub layer of of the data link layer (Layer 2) that is responsible for ERROR-CORRECTION and FLOW-CONTROL

A

Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which OSI layer is responsible for addressing networking devices by using the physical address (MAC address)?

A

Data link layer (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

____ (Layer ____) refers to protocols that programs use, not the programs themselves (OSI model)

A
  • Application layer

- Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The OSI model consists of how many layers?

A

Seven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The TCP/IP layers consists of how many layers?

A

Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Upon the development of the ____ suite, the TCP/IP model became more widely used than the ____

A
  • TCP/IP (4 Layers)

- OSI model (7 Layers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which model is also referred to as the Internet Model

A

TCP/IP model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A set of rules that govern the procedures used to exchange information between devices is called what?

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is similar to a language, that helps computers communicate with each other?

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the first layer of the TCP/IP model?

A

Link/network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is second layer of the TCP/IP model?

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is the third layer of the TCP/IP model?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is fourth layer of the TCP/IP model?

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which layer of the TCP/IP model acts as Layer 1 and 2 of the OSI model, acting as the physical layer and MAC addressing?

A

Link/network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which layer of the TCP/IP model acts as Layer 3 of the OSI model, handling logicial/IP addressing and routing?

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which layer of the TCP/IP model acts as Layer 4 and 5 of the OSI model?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Connection oriented (TCP) data delivery requires ____ between ____ and ____ before a message is sent (guaranteed data delivery)

A
  • Stable connection
  • Client
  • Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Connectionless (UDP) data delivery will send information ____ someone is on the other end to receive it (no guaranteed data delivery)

A

Without verifying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which layer of the TCP/IP model acts as the top 3 layers of the OSI model, using ports to give each application a unique number that identifies the protocol it uses?

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What are three common application layer protocols of the TCP/IP application layer?

A
  • Hypertext transfer protocol (HTTP)
  • File transfer protocol (FTP)
  • Simple mail transfer protocol (SMTP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

___ is the protocol that makes webpages work, and uses port 80

A

Hypertext transfer protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

____ is the protocol that transfers files between clients and servers, and uses ports 20 and 21

A

File transfer protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

____ is the main protocol used to send electronic mail on the internet, and uses port 25

A

Simple mail transfer protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which network media consists of a center conductor surrounded by an insulating material and a concentric outer conductor?

A

Coaxial Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Coaxial cable was the original cabling used in what?

A

Ethernet networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Coaxial cables use ____connector and ____ connector

A
  • BNC

- F-type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

____ is the most common network media used in modern IP networking

A

Twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Twisted pair is two insulated copper wires twisted together over their length (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What are the two types of twisted pair cabling?

A
  • Unshielded twisted pair (UTP)

- Shielded twisted pair (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

In shielded twisted pair (STP), ____ surrounds the pair of wires to prevent ____ and ____

A
  • Metal foil
  • Interference
  • “Crosstalk”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Twisted pair uses ____ connector

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Twisted pair uses what to provide guidance on how to make twisted pair cabling to a RJ-45 connector?

A

Wiring standards T568A and T568B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Twisted pair wiring standard T568A is mostly commonly used standard in America (T/F)

A

False (T568B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What are the four types of twisted pair cable configurations?

A
  • Straight-through cable
  • Cross-over cable
  • Rollover cable
  • Loopback cable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

On twisted pair cable config ____, the pins on the end of the cable match and is used for connecting to a computer to a switch.

A

Straight-through cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

On twisted pair cable config ____, the TX and RX pins are swapped on the opposite end of the cable and is used for connecting similar devices

A

Cross-over cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

On twisted pair cable config ____, the pins are exactly opposite on the ends of the cables and is used connect the administrator’s system to the console port of a Cisco router or switch

A

Rollover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

On twisted pair cable config ____, it connects the transmit pins to the receive pins on the same system and is used for troubleshooting a system

A

Loopback cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What are the different categories of twisted pair cabling?

A
  • CAT 1
  • CAT 3
  • CAT 5
  • CAT 5e
  • CAT 6/6a
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which twisted pair category is, 1 Mbps speed and is used for telephone voice, not for data communications?

A

CAT 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which twisted pair category is, 10 Mbps speed and is used for voice and data over Ethernet at 10 Mbps or 10BaseT?

A

CAT 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which twisted pair category is, 100 Mbps speed and is used for voice and data over Ethernet at 100 Mbps or 100BaseT?

A

CAT 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which twisted pair category is, 1 Gbps speed and is used for voice and data Ethernet at 1000 Mbps or 1000BaseT?

A

CAT 5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which twisted pair category is, 10 Gbps?

A

CAT 6/6a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What are the characteristics of optical fiber?

A
  • Expensive to purchase and install
  • Good for long distance
  • Good for high speeds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What are the two types of optical fibers?

A
  • Single-mode

- Multi-mode (more commonly used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What are the two types of optical fiber connectors?

A
  • Straight tip (ST)

- Subscriber connector (SC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which optical fiber connector uses a twist locking system and operate much like a BNC copper connector?

A

Straight tip (ST) (AKA stick-and-twist)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which optical fiber connector has a square molded plastic body and push-pull locking features?

A

Subscriber connector (SC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

75.110.227.18 is an example of what?

A

Dotted decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

01001011.01101110.11100011.00010010 is an example of what?

A

IP address (in binary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

____ consists of 4 octets, each made up of 8 bits and totals 32 bits

A

IPv4 IP address (in binary)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Each octet in an IP address ranges from 0 to 255 (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

IPV4 Class ____ = 1-126

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

IPV4 Class ____ = 128-191

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

IPV4 Class ____ = 192-223

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

IPV4 Class ____ = 224-239

A

Class D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

IPV4 Class ____ = 240-254

A

Class E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Classful addressing system has IP addresses without ____

A

Subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

In IPv4 what is a value used to help devices distinguish the host’s netwrok?

A

Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

In IPv4 what is used to differentiate networks from one another?

A

Network ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

A network ID can be assigned to a specific computer or device

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

The ____ is the portion of the IP address used to get specific host information for that part of the network

A

Host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

In IPv4 what is used for dividing a network into subnetworks?

A

Subnet ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

____ addressing system has IP addresses with subnets

A

Classless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

CIDR

A

Classless Inter-Domain Routing (CIDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

____ is the address in your subnet that allows communication with all the nodes in your ____

A
  • Broadcast Address

- Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What is the purpose of IPv6?

A

To replace the 32 bit (IPv4) addressing as the internet infrastructure is upgraded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

IPv6 addresses the major issue with IPv4, which is what?

A

Shortage of IP addresses

121
Q

____ consists of 8 groups (hexquads), each made up of 16 bits and totals 128 bits

A

IPv6 IP address

122
Q

What are the characteristics of a hub?

A
  • Layer 1 device
  • Repeats the frame down every network cable connected
  • Half duplex
123
Q

What are the characteristics of a bridge?

A
  • Layer 2 device
  • Software or hardware based
  • Creates a connection between two separate computer networks or to divide one network into two
  • Uses MAC addresses
124
Q

Which network device filters and forwards traffic between two or more segments of a network based on MAC addresses?

A

A bridge

125
Q

____ is when a bridge stops traffic from crossing one network segment to the next

A

Filtering

126
Q

____ is when a bridge passes traffic originating in one network segment to the other

A

Forwarding

127
Q

What are the characteristics of a switch?

A
  • Physically connects devices together on a LAN
  • Layer 2 device (uses MAC addresses)
  • Full duplex
128
Q

What are the characteristics of a router?

A
  • Connects networks together
  • Layer 3 device
  • Logical addressing (IP addresses)
129
Q

IEEE

A

Institute of Electrical and Electronic Engineers

130
Q

Which standard handles the architecture, security, management, and internetworking of local area networks LANs, MANs, and WANs standardized by IEEE 802.1?

A

IEEE 802.1

131
Q

What are key tasks of IEEE 802.1?

A
  • Develop standards that regulate network management
  • LAN/MAN management
  • MAC bridging
  • Data encryption
  • Manage network traffic
132
Q

Which standard defines Logical Link Control?

A

IEEE 802.2

133
Q

____ is a sub layer of the ____ layer

A
  • Logical link control

- Data link (Layer 2)

134
Q

Which standard handles traffic management (flow and error control) over the physical media?

A

IEEE 802.2

135
Q

In 1973 Xerox introduced what would be come ____

A

IEEE 802.3

136
Q

In 1982 IEEE made ____ the 802.3 standard

A

Ethernet

137
Q

Which standard defines Ethernet cables and communication standards?

A

IEEE 802.3

138
Q

CSMA/CD

A

Carrier sense multiple access/collision detection

139
Q

What determines which computer will use the shared media and checks before placing data on the media to avoid collision?

A

CSMA/CD

140
Q

If CSMA/CD detects a collision, both devices ____, ____ and ____ the transmission at a ____ time interval

A
  • Stop
  • Wait
  • Resend
  • Randomized
141
Q

What is an ongoing activity of a data station to detect whether another station is transmitting?

A

Carrier sense

142
Q

What is it called when two devices use the same media at the same time and the data collides and is corrupted?

A

A collision

143
Q

Where collisions might occur on a network is called?

A

Collision domain

144
Q

____ is traffic that is designed for all hosts on a network

A

A broadcast

145
Q

A limited/local broadcast DOES NOT pass a ____

A

Router

146
Q

ISP

A

Internet service provider

147
Q

____ connects the network to the internet service provider (ISP) and to other LANs

A

Router

148
Q

What is a hardware-based device used to interconnect network components?

A

A switch

149
Q

A switch takes the data from the ____ and sends it to the correct node via the ____

A
  • Router

- MAC address

150
Q

What is a node?

A

A device on a network

151
Q

What are the characteristics of a switch?

A
  • Physically connects devices
  • Manages flow of data across the network
  • Maximizes security and efficiency
  • Is “intelligent”
152
Q

Switches have the ability to learn, are adaptable to media speed, and have low latency (T/F)

A

True

153
Q

Ports are ____ by default

A

Open

154
Q

What is used by administrators to configure the switch at the physical location and uses rollover cables?

A

Console port

155
Q

What are some of the main switching protocols used?

A
  • Synchronous optical network (SONET)
  • Asynchronous transfer mode (ATM)
  • Multiprotocol label switching (MPLS)
  • Spanning-tree protocol (STP)
156
Q

____ is the standard for synchronous data transmission on optical fiber (in the US and Canada)

A

Synchronous optical network (SONET)

157
Q

Europeans call SONET ____

A
  • Synchronous digital hierarchy (SDH)
158
Q

SONET standardized ____ for transferring digital data over ____

A
  • Multiplexing protocols

- Fiber optic cables

159
Q

SONET also provides ____, ____ and ____ communication

A
  • Voice
  • Data
  • Video
160
Q

SONET is capable of transferring data at more than ____

A

1 Gbps

161
Q

What is a high-speed multiplexing and switching method with integrated voice, video and data on one connection, using short and fixed-length packets called “cells” to transfer information?

A

Asynchronous transfer mode (ATM)

162
Q

____ are short and fixed-length packets that transfer information

A

Cells

163
Q

ATM was developed and designed to unify ____ and ____

A
  • Telecommunication networks

- Computer networks

164
Q

Asynchronous transfer mode (ATM) operates at the ____ three layer(s) of the ____

A
  • Lowest

- OSI reference model

165
Q

Multiprotocol label switching (MPLS) operates at a layer that is between layers ____ and ____ of the OSI model and is referred to as ____ protocol

A
  • Two
  • Three
  • Layer 2.5
166
Q

What was designed to provide a unified data-carrying service for both circuit-based clients and packet-switching clients which provide a datagram service model?

A

Multiprotocol label switching (MPLS)

167
Q

Switches utilize ____ to find loops from redundant links and stops them by turning certain ports off until they are needed

A

Spanning tree protocol (STP)

168
Q

Spanning tree protocol (STP) ensures a ____ by detecting network issues such as ____, ____ and ____

A
  • Loop-free network
  • Broadcast storms
  • Multiple frame copies
  • Logical loops
169
Q

____ is a redundant connection within a network, that is used for troubleshooting but can sometimes cause problems

A

A loop

170
Q

What occurs when a network system becomes overwhelmed by multicast or broadcast traffic?

A

Broadcast storm

171
Q

During a broadcast storm, ____ continue to propagate ____ over and over on all redundant paths producing an endless amount of traffic

A
  • Switches

- Broadcasts

172
Q

During a broadcast storm the ____ can consume enough network resources to render a network unable to pass ____

A
  • Excessive data

- Normal traffic

173
Q

What occurs when there are multiple paths to a single destination and frames are sent down those path simultaneously?

A

Multiple frame copies

174
Q

Where can ports be assigned one of three roles within a spanning tree instance?

A

Root bridge

175
Q

Root bridge is a ____ device (switch) that is in control of managing ____

A
  • Layer 2

- Spanning tree protocol (STP)

176
Q

A designated port is one that is ____ and ____ traffic

A
  • Active

- Forwarding

177
Q

A root port provides a ____ to the root bridge from the non-root bridge to receive ____ and ____

A
  • Constant connection
  • Advertisements
  • Updates
178
Q

What happens after a switch has determined the best path to the root bridge and the root ports and designated ports are assigned?

A

All other ports are placed in the blocking state to prevent loops

179
Q

What readjusts for topology changes automatically?

A

Root bridge

180
Q

When there is a topology change switches use ____ and ____ states to re-compute and select the ____ to the root bridge

A
  • Listening
  • Learning
  • New path
181
Q

What occurs when bridges and switches have completed the transition to reassign port states to either the forwarding or blocking mode?

A

Convergence

182
Q

What happens during convergence?

A

Not traffic will be passed across the network

183
Q

____ state will not forward frames (switches), it only listens and processes bridge protocol data units (BPDUs)

A

Blocking state

184
Q

____ state listens to BPDUs and ensures no loops occur before passing data frames

A

Listening state

185
Q

BPDUs

A

Bridge protocol data units

186
Q

____ state learns the MAC address / builds the MAC address filter table (frames are not forwarded)

A

Learning state

187
Q

____ state is when the bridge port is able to send and receive data

A

Forwarding state

188
Q

____ is LAN technology that allows us to create multiple domains on a single switch versus having multiple switches containing one domain each

A

Virtual LAN (VLAN)

189
Q

VLAN is a grouping of ____ into a single ____

A
  • Network devices

- Broadcast domain

190
Q

What is the basic reason for splitting a network into VLANs?

A

To reduce congestion on a large LAN

191
Q

VLAN is like a ____, in that it partitions the network into logical segments, which provides better admin and management of ____

A
  • Router

- Multicast traffic

192
Q

What are the benefits of a VLAN?

A
  • Flexibility and scalability
  • Increased security
  • No geographical barrier
193
Q

A wireless local area network (WLAN) links two or more ____ using a wireless ____

A
  • Devices

- Distribution method

194
Q

Wireless mode ____ is the default mode in most routers or switches, where the router acts like a central connection point for all wireless clients to access

A

AP mode

195
Q

Wireless mode ____ acts as a Wi-Fi adapter for a device connected to one of the ethernet ports and is on a DIFFERENT subnet than the AP router

A

Client mode

196
Q

Wireless mode ____ acts as a Wi-Fi adapter for a device connected to one of the ethernet ports and is on the SAME subnet as the AP router

A

Client bridged mode

197
Q

Wireless mode ____ extends the range of your signal, can be attached to the router via wired or wireless connection and is on a DIFFERENT subnet as the AP router

A

Repeater mode

198
Q

Wireless mode ____ extends the range of your signal, can be attached to the router via wired or wireless connection and is on the SAME subnet as the AP router

A

Repeater bridged mode

199
Q

Wireless mode ____ is peer to peer wireless connection that allows clients to connect to each other as required without involving central access points

A

Ad-Hoc mode

200
Q

CSMA/CA

A

Carrier sense multiple access/collision avoidance

201
Q

What is dfferent about CSMA/CA and CSMA/CD?

A

CSMA/CA avoids collisions rather than detects them

202
Q

Which standard sets specifications for implementing wireless local area networks (WLANs)?

A

IEEE 802.11

203
Q

Standard ____ implements WLANs at throughput of 11 Mbps and 2.4 GHz

A

IEEE 802.11b

204
Q

Standard ____ implements WLANs at throughput of 54 Mbps and 5 GHz

A

IEEE 802.11a

205
Q

Standard ____ implements WLANs at throughput of 54 Mbps and 2.4 GHz

A

IEEE 802.11g

206
Q

Standard ____ implements WLANs at throughput of 600 Mbps and 2.4/5 GHz

A

IEEE 802.11n

207
Q

Which standard is also referred to as White-Fi and Super Wi-Fi and allows WLAN operation in the TV white space spectrume?

A

IEEE 802.11af

208
Q

Which standard has an expected multi station WLAN throughput of at least 1 gigabit per second and a single link throughput of at least 500 megabits per second (500 Mbit/s)?

A

IEEE 802.11ac

209
Q

Bluetooth is a wireless networking protocol for ____, used mostly for devices such as ____, ____ and ____

A
  • Short-range
  • Wireless keyboard
  • Wireless mouse
  • Cell phones
210
Q

What is a device that produces a coherent beam of optical radiation by stimulating electronic, ionic or molecular transitions to higher energy levels so that they emit energy when they return to lower energy levels?

A

A laser

211
Q

Laser are used for ____ data transmission systems utilizing ____ transmission lines

A
  • High-speed

- Fiber optic

212
Q

What are the advantages of wireless?

A
  • Cheaper (no cables)

- Mobility

213
Q

What are the disadvantages of wireless?

A
  • Reliability
  • Security
  • Reduced management control
214
Q

What are the security concerns of wireless?

A
  • War driving

- Rouge access points

215
Q

____ is searching for Wi-Fi networks by a person in a moving vehicle, using a portable device

A

War driving

216
Q

What are some wireless security implemenetations?

A
  • Service set ID (SSID)
  • MAC address filtering
  • Data encryption
217
Q

Wireless equivalent privacy (WEP) is a security algorithm for the ____ standard, and provides ____ comparable to that of a traditional wired network

A
  • IEEE 802.11

- Data confidentiality

218
Q

What is an intermediate measure that is stronger then WEP but not as strong as WPA2?

A

Wi-Fi protected access (WPA)

219
Q

What is a stronger encryption algorithm than WEP and WPA?

A

WPA2

220
Q

WAN covers multiple distance areas, which may spread across the entire world (T/F)

A

True

221
Q

What is a key difference between WAN and LAN technologies?

A

Scalability

222
Q

WAN technologies generally function at the ____ of the OSI model

A

Lower three levels

223
Q

What is defined as a collection of networks under a common administration that share a common routing strategy?

A

Autonomous system

224
Q

Most autonomous systems (AS) DO NOT share a direct link with each other and must route data traffic through other AS that agree to carry the traffic (T/F)

A

True

225
Q

____ are routers that perform routing functions between machines and networks that are within or between autonomous systems

A

Gateways

226
Q

What are a responsible for routing WITHIN an AS?

A

Interior gateway

227
Q

What are a responsible for routing BETWEEN AS?

A

Exterior gateways

228
Q

Default gateway is an ____ on a ____ network device that serves as an access point to or from a network

A
  • IP address

- Layer 3

229
Q

What is the setting that is configured on the hosts to provide them with a path to leave the LAN to some remote network?

A

Default gateway

230
Q

What creates an encrypted tunnel from one computer or remote network to a private network through the internet?

A

Virtual private network (VPN)

231
Q

What is a unified communications platform that provides services such as session management, voice/VoIP, video, messaging and web conferencing?

A

Cisco Unified Call Manager

232
Q

Cisco Unified Call manager removes the need for ____ and is capable of storing data securely via ____

A
  • Multiplexing equipment

- Cloud

233
Q

What are the benefits of the Cisco Unified Call Manager?

A
  • Reliable
  • Lower cost of ownership
  • Interoperability and standards support
  • Scalability for up to 40,000 users, extendable to 80,000 users
234
Q

What is a transfer protocol that describes a method for establishing and terminating user online session, including multimedia content exchange?

A

Session initiation protocol (SIP)

235
Q

What are the most common applications of session initiation protocol (SIP)?

A
  • Voice and video calls
  • Instant messaging
  • Internet protocol (IP) networks
236
Q

____ was designed to setup a “session” between two points and to be a modular, flexible component of the internet architrcture?

A

Session initiation protocol (SIP)

237
Q

What defines the protocols used to provide audio-visual communication sessions on any pack network?

A

H.323

238
Q

____ addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multi-point conferences

A

H.323

239
Q

H.323 is most widely used for ____ followed by ____

A
  • VoIP

- Videoconferencing

240
Q

VoIP is a technique for routing ____ over ____

A
  • Telephone calls

- The internet

241
Q

What provides different priority to different applications, users, or data flows to guarantee a certain level of performance?

A

Quality of service (QoS)

242
Q

What are the principles of QoS?

A
  • Latency
  • Jitter
  • Dropped packets
  • Low throughput
  • Errors
  • Out-of-delivery
243
Q

What is latency?

A

The amount of time it takes for a packet to reach its destination (lag)

244
Q

____ is variation in delay that can seriously affect the quality of steaming audio and/or video

A

Jitter

245
Q

What is it called when packets do not make it to the distant end and disrupting communications because the intended message is not complete?

A

Dropped packets

246
Q

Low throughhput is when a ____ may be ____ for real-time multimedia services (streaming) due to too many devices using the same resources

A
  • Data stream

- Too low

247
Q

Packets that are corrupted due to bit errors caused by noise and interference is referred to as what?

A

Errors

248
Q

What is called when packets arrive out of order, scrambling the intended message when it arrives at the distant end?

A

Out-of-order delivery

249
Q

What are advantages of port number filtering?

A
  • Fast
  • Low resource-consuming
  • Supported by many network devices
  • Does not implement the application-layer payload (not compromising user privacy)
250
Q

What are disadvantages of port number filtering?

A
  • Only useful for the applications which use fixed port numbers
  • Easy to cheat by changing the port number in the system
251
Q

____ inspects the actual payload of the packet and detects the applications and services regardless of the port number

A

Deep packet inspection

252
Q

What are disadvantages of deep packet inspection?

A
  • Slow
  • Requires a lot of processing power
  • Signatures must be kept up to date
  • Encryption makes this method impossible
253
Q

____ is a field in an IP packet that enables different levels of service to be assigned to network traffic

A

Differentiated services code point (DSCP)

254
Q

DSCP field places data packets into a limited number of traffic classes instead of the requirements of the individual flow (T/F)

A

True

255
Q

In DSCP fields each traffic class can be managed differently, ensuring preferential treatment for higher-priority traffic on the network (T/F)

A

True

256
Q

____ is sensitive traffic the operator has an expectation to deliver on time

A

Sensitive traffic

257
Q

In DSCP Best Effort Traffic is all other kinds of ____ traffic

A

Non- detrimental

258
Q

The category of traffic that is generally limited to the delivery of spam and traffic created by worms, botnets and other malicious attacks is called what?

A

Undesired traffic

259
Q

Redundancy uses ____ of critical components/devices, increasing ____ of the system

A
  • Duplication

- Reliability

260
Q

What are the two major concerns for redundancy?

A
  • Network device redundancy

- Redundant power solutions

261
Q

What comes in various sizes and can sustain network operations for only a limited time in the event of an outage?

A

Uninterruptible power supplies (UPS)

262
Q

What is the name of a built in backup power supply?

A

Redundant power supply

263
Q

____ are designed to protect entire buildings for sustained periods of time to ensure mission critical devices remain functional

A

Facility generators

264
Q

What eliminates single points of failure in a network?

A

Network equipment redundancy

265
Q

What provides a solution for network managers who require higher bandwidth between servers, routers and switches?

A

Link aggregation

266
Q

EtherChannel is a technology used to allow grouping of several ____ ethernet links to create one ____ ethernet link

A
  • Physical

- Logical

267
Q

EtherChannel is a port link aggregation technology used primarily on ____ switches

A

Cisco

268
Q

What does EtherChannel look at to decide which physical link to send data over?

A
  • Source MAC address
  • Destination MAC address
  • Source IP address
  • Destination IP address
  • Source port
  • Destination port
269
Q

What are the benefits of EtherChannel?

A
  • Increased bandwidth
  • Redundancy
  • If a link fails the traffic will go onto another link almost instantly
  • If that same link recovers it will join the EtherChannel again automatically
270
Q

What is a standard for exchanging network management information between network devices?

A

Simple network management protocol (SNMP)

271
Q

Network administrators us SNMP to monitor and map ____ and ____

A
  • Network availability performance

- Error rates

272
Q

What are the types of SNMP?

A
  • SNMP version 1
  • SNMP version 2
  • SNMP version 3
273
Q

Physical security consists of ____

A

Hardware safegaurds

274
Q

Logical security consists of ____

A

Software safegaurds

275
Q

What defines what users can do with the server’s shared resources?

A

Administrative access control

276
Q

What are the types of threats to a network?

A
  • Unauthorized admin access
  • Malware
  • Virus
  • Worm
  • Macro virus
  • Trojan horse
  • RootKit
  • Adware
  • Spyware
  • Social engineering
  • Phishing
  • Man-in-the-middle attacks
  • Denial of service (DOS)
  • Physical intrusion
  • Attacks on wireless networks
  • Rogue access points
  • Evil twins
277
Q

Any program or code designed to do something on a system or network that you don’t want to have happen, is called what?

A

Malware

278
Q

____ is a program that has two jobs: to replicate and to activate

A

Virus

279
Q

What functions similar to a virus though it replicates exclusively through networks?

A

A worm

280
Q

What is a macro?

A

A group of commands that you can run at once

281
Q

When a file is opened, the ____ runs automatically creating havoc on a system

A

Macro virus

282
Q

What is a piece of malware that looks or pretends to do one thing while, at the same time, doing something malicious?

A

Trojan horse

283
Q

A Trojan Horse that takes advantage of
very low-level operating system functions to hide
itself from all but the most aggressive of
antimalware tools, is called what?

A

RootKit

284
Q

What monitors the types of websites you frequent and uses that information to generate targeted advertisements?

A

Adware

285
Q

____ is a function of any program that sends information about your system or your actions over the internet

A

Spyware

286
Q

What is the process of using or manipulating people inside the network environment to gain access to that network from the outside?

A

Social engineering

287
Q

Phishing is when the attacker poses as some sort of trusted site, like an online version of your bank or credit card company to trick you into updating your financial information (T/F)

A

True

288
Q

When a person inserts themselves into a conversation between two others, covertly intercepting traffic thought to be only between those other people, it is called what?

A

Man-in-the-middle attack

289
Q

What is accomplished by flooding the network with so many requests that it becomes overwhelmed and stops functioning?

A

DOS attack

290
Q

What are two ways to guard against physical intrusion?

A
  • Protecting servers

- Protecting clients

291
Q

Dumpster diving is a form of ____

A

Physical intrusion

292
Q

What are two attacks on wireless networks?

A
  • Leeching

- Cracking wireless encryption

293
Q

____ is an unauthorized wireless access point installed on the network

A

Rogue access point

294
Q

____ is a rogue access point that looks like a legitimate access point

A

Evil twin

295
Q

What are the two main types of firewalls?

A
  • Software firewall

- Hardware firewall

296
Q

What are the firewall filtering methods?

A
  • MAC address filtering
  • Packet/IP address filtering
  • Port filtering
297
Q

____ filtering is the method that firewalls use to prevent the passage of any TCP or UDP segments or datagrams through any port other than the ones prescribed by the system administrator

A

Port filtering

298
Q

What is designed to analyze data, identify attacks, and respond to the intrusion (passive)?

A

Intrusion detection system (IDS)

299
Q

What is similar to IDS but has the capability to react?

A

Intrusion prevention system (IPS)