Book-Cards-Pt3 - Sheet 1 (2) Flashcards
qtext
answer
Which routing protocol uses a composite metric of bandwidth and delay of the line to find the best path to a remote network?
EIGRP
Which command will display the current contents of the ARP cache on the local workstation?
arp -a
A network device that is used to connect multiple devices without segmenting a network is a ?
Hub
The Spanning Tree Protocol allows for redundancy of what networking device?
Bridge (switch)
Which can operate at both Layers 2 and Layer 3 of the OSI model?
Layer 3 switch
SMTP resides at what layer of the OSI model?
Application
A user discovers that their wireless 802.11g Internet connection is intermittently disrupted. What can typically cause this problem?
Cordless phones and/or microwave ovens
Which device helps to increase the number of collision domains?
Switch
Which logical physical topology does 802.3 utilize?
Bus
Which wireless standard has a maximum data rate of 11Mbps?
802.11b
What functionality does Kerberos provide?
Authentication of security principles and authorization of access to resources
What TCP/IP port numbers does FTP utilize?
20 and 21. 20 is FTP data or a client, and 21 is an FTP server.
At what layer of the OSI model does UDP reside?
Transport
Convert the following binary string to its dotted decimal address: 11000000.10101000.01100011.00011010
192.168.99.26
100BaseTX uses how many pairs of Category 5 unshielded twisted-pair (UTP) cables?
2 pairs
What device connects computers with wireless adapters to a network in infrastructure mode?
Access point
Converting analog signals to digital signals and digital signals to analog signals can be done using what device?
Modem. Dial-up modems are rarely used today, but cable modems are.
The maximum segment length for Ethernet is .
100 meters (328 feet)
What is the maximum speed of 802.11g?
54Mbps (megabits per second)
Which techniques would increase the bandwidth for network transmission by joining multiple connections into one logical connection?
Bonding
True/False: Firewalls are used to prevent packets from entering and leaving a network.
TRUE
Which device can never run full duplex?
Hub
A valid Media Access Control (MAC) address is how many bytes long?
6