Book-Cards-Pt3 - Sheet 1 (2) Flashcards
qtext
answer
Which routing protocol uses a composite metric of bandwidth and delay of the line to find the best path to a remote network?
EIGRP
Which command will display the current contents of the ARP cache on the local workstation?
arp -a
A network device that is used to connect multiple devices without segmenting a network is a ?
Hub
The Spanning Tree Protocol allows for redundancy of what networking device?
Bridge (switch)
Which can operate at both Layers 2 and Layer 3 of the OSI model?
Layer 3 switch
SMTP resides at what layer of the OSI model?
Application
A user discovers that their wireless 802.11g Internet connection is intermittently disrupted. What can typically cause this problem?
Cordless phones and/or microwave ovens
Which device helps to increase the number of collision domains?
Switch
Which logical physical topology does 802.3 utilize?
Bus
Which wireless standard has a maximum data rate of 11Mbps?
802.11b
What functionality does Kerberos provide?
Authentication of security principles and authorization of access to resources
What TCP/IP port numbers does FTP utilize?
20 and 21. 20 is FTP data or a client, and 21 is an FTP server.
At what layer of the OSI model does UDP reside?
Transport
Convert the following binary string to its dotted decimal address: 11000000.10101000.01100011.00011010
192.168.99.26
100BaseTX uses how many pairs of Category 5 unshielded twisted-pair (UTP) cables?
2 pairs
What device connects computers with wireless adapters to a network in infrastructure mode?
Access point
Converting analog signals to digital signals and digital signals to analog signals can be done using what device?
Modem. Dial-up modems are rarely used today, but cable modems are.
The maximum segment length for Ethernet is .
100 meters (328 feet)
What is the maximum speed of 802.11g?
54Mbps (megabits per second)
Which techniques would increase the bandwidth for network transmission by joining multiple connections into one logical connection?
Bonding
True/False: Firewalls are used to prevent packets from entering and leaving a network.
TRUE
Which device can never run full duplex?
Hub
A valid Media Access Control (MAC) address is how many bytes long?
6
What well-known port does Trivial File Transfer Protocol (TFTP) use?
69
In which OSI layer does a bridge operate?
Data Link
An IT specialist is going to implement a packet filter on a network for Internet connections. What port must they allow through the firewall for users to connect to the Web?
80
What is the name of the point where local exchange carrier responsibility ends?
Demarc
What protocol translates the IP address to its physical network address?
ARP
Ethernet networking is known as a physical topology.
Star
What is the default port for HTTPS?
443
In the Media Access Control (MAC) address 00:B0:D0:6A:F2:B5, what does 00:B0:D0 identify?
The manufacturer of the device, known as the OUI
Which network segment is located outside the firewall?
DMZ
A network administrator needs to establish a remote connection to a client machine. Telnet is not secure because everything is sent in the clear. Which protocol and port number should be used instead?
Secure Shell (SSH), port 22
What fiber connector looks similar to an RJ-45 connector and connects two strands of fiber?
Mechanical transfer registered jack (MT-RJ)
What cable type is used to link together two buildings that are over 10 miles (16.09 kilometers) apart?
Single-mode fiber (SMF)
What is the maximum Cat 3 length acceptable for a horizontal cross-connect?
100 meters (328 feet)
An optical time-domain reflectometer (OTDR) can be used to assess what?
Fiber segments
What level of the Open Systems Interconnection (OSI) model does a proxy server operate in?
Application
What device is used to create a virtual local area network (VLAN)?
Switch
What protocol creates a secure connection between a web browser and a web server and is an alternative to using Telnet?
Secure Sockets Layer (SSL)
True/False: If an administrator wants to set up an email server to exchange emails with other servers over the Internet, Simple Mail Transfer Protocol (SMTP) would be utilized.
TRUE
Which remote access authentication protocol allows usernames and passwords to be transmitted as clear text?
Password Authentication Protocol (PAP), which has been replaced by CHAP.
At what layer of the Open Systems Interconnection (OSI) model does a router function?
Network
Simple Mail Transfer Protocol (SMTP) utilizes what well-known Transmission Control Protocol/Internet Protocol (TCP/IP) port number?
25
A technician pings 127.0.0.1 and gets the following result - Unable to contact IP driver, error code 2. - What should you do now?
Reinstall the TCP/IP protocol
True/False: 172.192.4.256 is a valid Internet Protocol (IP) address.
False
What Open Systems Interconnection (OSI) layer converts digital data into electronic signals to be put on a wire?
Physical
True/False: Internet Control Message Protocol (ICMP) is used for error reporting with Internet Protocol (IP).
TRUE
Which WAN technologies uses 30 64Kpbs channels?
E-1
What network hardware allows most traffic collisions?
Hub
Which system detects and reports attempts of unauthorized access to the network?
IDS
True/False: 32-bit is a valid Wired Equivalent Privacy (WEP) key.
FALSE
True/False: 1000Mbps is known as 1000 terabytes per second.
False. It means gigabyte per second.