Final Exam Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

the amount or number of signals that a wire can carry

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

space between floors

A

plenum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the physical address assigned to a NIC?

A

MAC address

he physical address, also known as the MAC address, assigned to a NIC by its manufacturer is 48 bits long. Because of the way this address is divided up into two 24 bit parts, each manufacturer has only 16 million or so unique addresses they can use before the manufacturer has begun reusing physical addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethernet II

A

(Ethernet DIX) can be used directly by the IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

rollover cable

A

used to hook Ethernet connections together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

router

A

used to move packets around a larger network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The encapsulation unit on the Network layer of the OSI Model is _____

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NFT

A

(Network Fault Tolerance) bonding technique that provides network redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RJ-22

A

Older style phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Electromagnetic Interference, copper trying to overcome electromagnetic fields

A

EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recommended Standard 232, a standard used for serial data cables connecting equipment

A

RS-232

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

shielded twisted pair

A

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define: protocol

A

a set of rules to describe how a task works in a network environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Neighbor table

A

contains information about the routers that are directly connected to the current router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define: Data Link layer

A

concerned with moving data from one computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EGP

A

used to exchange routing information between autonomous systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RG-59

A

low-power video and audio transmission (DVDs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Public Class C IP range

A

192.0.0.0 - 223.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

serial

A

one bit is sent at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authoritative name servers

A

attached to domain servers and responsible for answering requests received about the domain space they are part of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NIC

A

(Network Interface Card) connects a computer to a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

baseband

A

a signal that has a very narrow frequency range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TLS

A

(Transport Layer Security) a protocol that ensures privacy between communicating applications and their users on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Registered ports

A

used consistently on all systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Novel Ethernet

A

(Ethernet_802.3) does not include a Layer 2 Data Link identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SSH

A

(Secure Shell) a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an insecure network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BPL

A

Broadband over PowerLine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

low-power video and audio transmission (DVDs)

A

RG-59

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is used to determine which upper-layer protocols, services, and processors each data segment is intended for?

A

port

Protocols on the Transport layer have port addresses, also known as ports. These ports are used to determine which upper-layer protocols, services, and processes each data segment is intended for. Port addresses ensure that the correct protocol, service, or process can get the data intended for it. The two main protocols on the Transport layer, UDP and TCP, both use ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

trunking

A

provides network access to many clients by sharing a set of lines or frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define: Session layer

A

manages dialog between networked devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Name servers

A

database of all the name domains on the Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SMTP

A

(Simple Mail Transport Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

latency

A

time interval between responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

supplies a signal to many connected pairs

A

feeder cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

multiple signals

A

broadband cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

IS-IS

A

(Intermediate System to Intermediate System) used to determine routing tables within an autonomous system using link state routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

UDP

A

(User Datagram Protocol) connection-less counterpart of TCP, does not guarantee reliable delivery and is primarily used to give other protocols access to datagram services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a multiport repeater?

A

hub

Hubs work as though they are the bus of a larger network. When a computer connected to one port of a hub want to connect to a computer connected to a different port on a hub, it has to broadcast the signal to all devices connected to that hub. In this way, a hub acts as a bus. As a signal comes into a hub, it is regenerated or repeated and sent to its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What helps protect data that is sent using a wireless network?

A

encryption

Encryption is where a device such as a computer or a WAP takes the data that it is sending out and first runs an algorithm on it so that it cannot be read without first having the key to read it. This capability increases the security of a network by making it more difficult for an outsider to read what is passing across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Application Layer Protocols

A

designed to carry out specific purposes or functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

In what type of technology is the whole message routed to its destination one hop at a time?

A

message switching

In message switching, whole messages are routed to their destination one hop at a time. Over time, the message switching idea evolved into what we call packet switching today. With message switching, the entire message is sent out at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is referred to as a group of hosts in the Data-Link layer that share a common set of communications requirements and can be isolated from other groups?

A

VLAN

In its most basic form, a VLAN (short for Virtual LAN) enables you to break up a much larger network into smaller networks within the Data-Link layer of the OSI model. In other words, a VLAN refers to a group of hosts that share a common set of communications requirements whether or not they are attached to the same device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

content-based access method

A

accessing a network in which different nodes compete to see which node can send out its packet first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Port addresses/ports

A

determine which upper-layer protocols, services, and processes each data segment is intended for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

channel

A

specific subrange of radio frequencies that has been set aside within 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

port bonding

A

associated with a specific protocol, service, application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

1MHz, North American telephone system

A

CAT 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

noise

A

transmission of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

connect a host or router to a switch or hub

A

straight-through cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

straight tip

A

ST connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

IGP

A

(Interior Gateway Protocol) used for exchanging routing information between gateways (commonly routers) within an autonomous system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The encapsulation unit on the Presentation layer of the OSI Model is _____

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Define: connection-oriented protocol

A

asks for verification that a data packet has reached its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Today, what type of cable is the most common for Ethernet?

A

UTP Today, virtually all Ethernet cabling is done with either UTP or fiber.

Because UTP is easier to configure, is less expensive, and has been widely available longer, UTP is much more common then fiber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

coaxial cable

A

center conductor made of copper surrounded by plastic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

192.130.277.277/8

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Define: MAC

A

Media Access Control sublayer, provides access control to the media just as its name implies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

collision domain

A

A physical region of a LAN in which data collisions can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Define: frame

A

The packet becomes this in the Data Link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

cable with connectors on both ends

A

patch cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

light emitting diodes

A

LEDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

routing table

A

contains the routes to the various destinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What port does HTTP use by default?

A

80Hyper-Text Transfer Protocol (HTTP) uses TCP port 80 to display web pages via a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

local connector

A

LC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Ethernet bonding

A

combining the bandwidth from two ore more Ethernet links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

transmission of information

A

noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

main distribution frame

A

MDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

((N-X)) Signaling stands for:

A

signaling type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Define: tailer

A

contains error correction information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

EMI

A

Electromagnetic Interference, copper trying to overcome electromagnetic fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

. What represents the number of routers it takes to get from one destination to another?

A

hops

Within a routing table database are several information fields. The three most common of these fields are the network ID of the destination network, the cost of path the packet will need to take to get to the destination network, and the next hop. The cost refers to the network cost (not money cost) of getting to the destination network, which is based on available bandwidth, speed and other factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Public Sswitched Telephone Network

A

PSTN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Define: encapsulation

A

the process of taking data from a previous layer of the OSI Model and carrying it forward into the next layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Define: packet

A

The segment becomes this in the Networking layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What media type can carry multiple data signals at the same time?

A

broadband

Baseband means is that a cable can carry only one signal one way at one time. In the case of most modern Ethernet cables, this means that there is one line for sending signals and another line for receiving signals inside an Ethernet cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

passive hub

A

joins wires from several stations in a star configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

You are given the following address: 00-90-4B-AD-2A-AC What type of address is this?

A

MAC address

The physical address, also known as MAC address, assigned to a NIC by its manufacturer is 48 bits long. Because of the way this address is divided up into two 24-bit parts, each manufacturer has only 16 million or so unique addresses to use before the manufacturer has to start reusing physical addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

out-of-order packet delivery

A

Packets arrive in a different order than the one they were sent in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is the 7th Layer of the OSI Model?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

MT-RJ or MTRJ

A

mechanical transfer registered jack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What type of hub does not amplify or resend a signal?

A

passive hub

A passive hub is really nothing more than a cable splitter. If you have seen old cable TV connections where a coaxial cable is connected to a cable splitter and two or more cables come out, you have seen what is essentially a passive hub. These types of devices are not used very commonly in data networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Permanent host group

A

a host group with permanent IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Static routing

A

uses a manually-configured routing entry, rather than information from a dynamic routing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

When a DNS client needs to resolve a host name to an IP address, where will it first check?

A

its own DNS cache

When you open your web browser and put in a URL, the browser checks the local web cache to see if the IP address of the entered URL can be found. If it cannot be found, your computer sends a query to your ISP’s DNS server asking it for the URL’s IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

UTP

A

unshielded twisted pair, used in all types of twisted pair Ethernet networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

physical address

A

MAC address; physical binary address that every network device is given when it is created by its manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Define: Half-duplex

A

a device can only send or recieve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

classful IP address

A

a network addressing architecture used in the Internet from 1981 until 1993. The method divides the address space for Internet Protocol Version 4 (IPv4) into five address classes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What protocol is used to provide bi-directional interactive command-line access to either a remote or local host?

A

TELNET

TELNET, short for TErminaL NETwork, is used to provide bi-directional interactive command-line access to either a remote or local host. TELNET was first introduced in 1969 in RFC 15. In 1983, TELNET was extended in RFC 854. TELNET client software can be found for pretty much every computer platform out there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

sqare connector

A

SC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

broadband cable

A

multiple signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Define: port address

A

a unique address inside the computer associated with a specific protocol, service, or application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Define: bits

A

frames converted in the Physical layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

used to hook Ethernet connections together

A

rollover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which type of routing protocol are RIP and IGRP?

A

distance vector routing protocol

The simplest type of routing protocol is a distance vector routing protocol. Some examples of distance vector routing protocols are RIP, RIPv2, and IGRP. In a distance vector routing protocol, each router periodically sends an update of its routing table to all routers directly connected to it. In this way, periodically the entire network of routers gets updated. The time it takes for this update to take place is called convergence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

SC

A

subscriber connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

128.0.0.0 - 191.255.255.255

A

public class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

single-mode fiber, high-speed, long-distance fiber-optic cable

A

SMF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Media converter

A

connects two dissimilar media types such as twisted pair with fiber optic cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

bridge

A

connects two or more local area networks at layer 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

N refers to signal rate in Mbps

A

((N-X)) N stands for:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

MMF

A

multimode fiber, uses light to communicate a signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Define: OSI Model

A

framework and reference model to explain how different networking technologies work together and interact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

1.0.0.0 - 126.255.255.255

A

public class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Denial of Service attack

A

using pings across a large range of computers to bring down a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

channel bonding

A

uses two or more channels to move data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Define: data

A

Top three layers of the OSI Model: The Application, Presentation, and Session layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

The two most important portocols on the Transport layer of the TCP/IP Model are _____and _____

A

TCP & UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Define: Network layer

A

moves data in the form of packets from one end of the network to the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Ethernet DIX

A

(Ethernet II) can be used directly by the IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

10Base-2, thin coaxial cable

A

Thin Ethernet (Thinnet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

SMF

A

single-mode fiber, high-speed, long-distance fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

SIP

A

(Session Initiation Protocol) protocol for signaling and controlling multimedia communication sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

when two improperly shielded copper wires run too close together so that signals become mixed

A

crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

switch

A

connecting multiple wires, allowing them to communicate simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

public class B

A

128.0.0.0 - 191.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

crossover cable

A

TIA/EIA 568A is used on one end of a cable and TIA/EIA 568B is used on the other end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

straight-through cable

A

connect a host or router to a switch or hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

At what OSI layer do routers operate?

A

Network layer

Network Routers are networking devices used to move packets around a larger network. To do this, they have to be very intelligent and able to read data packets to know where they are intended to go and where they have come from. Because routers are meant to relay based on IP addresses, they work on the Network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

public class C

A

192.0.0.0 - 223.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Define: physical address

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

RAIN

A

(Redundant Array of Independent Nodes) protects data stored at the file-system level by providing redundancy across network nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Block

A

data broken into segments that contain headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

ST connector

A

straight tip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

steady state

A

all the routers in a network are updated/converged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

broadband

A

transports multiple signals and traffic types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

VLAN

A

(Virtual LAN) groups users by logical addresses into a virtual LAN through a switch or router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

tracert

A

the Windows implementation of a trace route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

(CIDR)

A

Classless inter-domain routing; a standard notation that indicates what portions of an IP address are used for network ID and host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

CAT 6

A

250MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

EUI-60

A

60-bit Extended Unique Identifier; a MAC address where the host extension is 36-bits long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Define: Application layer

A

contains all the services that are needed by the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

LC

A

local connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

feeder cable

A

supplies a signal to many connected pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

CAT 4

A

20 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

private class C

A

192.168.0.0 - 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

firewall

A

used to prevent unauthorized packets into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

((N-X)) N stands for:

A

N refers to signal rate in Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

multimode fiber, uses light to communicate a signal

A

MMF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Define: header

A

describes what each layer should do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

16MHz, 10Mbps

A

CAT 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

content switch

A

distribute user requests to servers based on Layer 7 payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

The primary function of the Physical Layer

A

Transfer the bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

TCP/IP Protocol Suite

A

used for Internet commuinications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Define: Routing

A

the ability of the various network devices to move data packets from their source to their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Ethernet is considered ___________.

A

baseband

Ethernet is what is called a baseband technology. Most modern Ethernet cables have one line for sending signals and another line for receiving signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

classful subnet mask for a Class B IP address

A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What routing type is manually defined?

A

static routing

The most basic way of building routing tables is to manually create one in a router. As new routes are needed on a network or old routes change, the routing tables must be manually changed or updated on the affected routers. This process is called static routing, which is time-consuming and prone to errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

10MHz, 4Mbps

A

CAT 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

20 MHz

A

CAT 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

TIA/EIA 568A and 568B

A

wiring standards agreed upon by over 60 ISP vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What measurement is used to choose the best route to a specific location?

A

metrics

The purpose of any routing protocol is to compile a table listing all routes known to it so that IP can use the table to find the best route to a specific location. The measurements used by a routing protocol to determine the best routes available to it are called metrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

plenum

A

space between floors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What mechanism is used to send one set of packets to multiple hosts at the same time?

A

multicasting IP

multicasting is basically an IP host’s capability to send a datagram or data packet to all IP hosts within a host group. A host group consists of all the IP computers currently connected to a particular IP multicast host that are set to receive the same transmission from that host. These host groups can be set to contain 0 or more hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

hop

A

one portion of the path between source and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

BGP

A

(Border Gateway Protocol) designed to exchange routing and reachability information between autonomous systems (AS) on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q
A
159
Q

What happens when two computers broadcast at the same time on the network, causing both sets of data to be garbled?

A

collision

When two different computers need to send data at the same time, they will listen to the network. If neither computer hears any activity on the network, they both will conclude that they are clear to send data at that time. As a result, both computers end up sending data packets simultaneously; however, because only one data packet can be on the network cable at one time, a collision occurs. The collision results in a slight power spike on the network as well as destruction of the data in the two packets.

160
Q

public IP address

A

can be used on the Internet; must be registered with the Network Information Center

161
Q

EIGRP

A

(Enhanced Interior Gateway Routing Protocol) used on a computer network to help automate routing decisions and configuration

162
Q

Which connectionless transport protocol does not guarantee reliable delivery?

A

UDP

User Datagram Protocol (UDP) is the connectionless counterpart of TCP. It does not guarantee reliable delivery and is used primarily to give other protocols, such as IP, access to datagram services like port numbers. Due to the limited functionality provided by UDP, the header is correspondingly much smaller and less complex.

163
Q

What command is used to test IP connectivity between two hosts?

A

ping

Ping is a network administration utility that is used to test connectivity to specific nodes on a network and to measure the round-trip time it takes for a packet to get to a specific destination and back.

164
Q

RJ-11

A

Used to connect a phone to a phone jack

165
Q

Thin Ethernet (Thinnet)

A

10Base-2, thin coaxial cable

166
Q

intermediate distribution frame

A

IDF

167
Q

demarc

A

demarcation point, last point of responsibility from the ISP

168
Q

patch cable

A

cable with connectors on both ends

169
Q

DNS

A

(Domain Name System) the protocol that converts URLs to IP addresses

170
Q

broadband and home video coaxial cable connector

A

F-connector

171
Q

multilayer switch

A

switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.

172
Q

amount of actual data that is being carried

A

throughput

173
Q

port mirroring

A

Cross connecting two or more ports on a network switch so that traffic can be simultaneously sent to a network analyzer or monitor connected to another port.

174
Q

When you use port authentication, what is used to limit access to the network?

A

MAC addresses Port authentication provides security to the entire network because it limits access via a particular port to pre-authorized MAC addresses.

175
Q

The primary job of the Network layer is to

A

Perform routing functions and a means of transmitting data packages.

176
Q

Which Ethernet standard was developed to work over fiber?

A

100Base-FX

100Base-FX is the version of Fast Ethernet that is intended to be used over fiber-optic cable. Introduced at the same time as 100Base-TX, 100Base-FX was part of the same IEEE 802.3y standard.

177
Q

Which protocol is used to resolve host names to IP addresses?

A

DNS

Domain Name System (DNS) makes it possible for us to use the Internet the way we do. DNS is the protocol that converts all those URLs we can easily remember to IP addresses that the Internet can use.

178
Q

Trace route

A

a utility used to report back each hop along a route to a specific IP destination.

179
Q

center conductor made of copper surrounded by plastic

A

coaxial cable

180
Q

The two sublayers of the Data Link layer are _____, and _____

A

LLC & MAC

181
Q

classful subnet mask for a Class A IP address

A

255.0.0.0

182
Q

topology table

A

an aggregation of the routing tables of all routers connected to current router

183
Q

TCP

A

(Transmission Control Protocol) provide communication services between Application layer services, protocols, and processes and the IP.

184
Q

or Network Interface Device (NID), used between the ISP and internal network

A

smart jack

185
Q

Which protocol translates an IP address into a MAC address?

A

ARP

In network addressing—when a packet is passed along a network via routers—the MAC address is actually changed at each hop so that the data frame can move on to the next hop in its journey. The Address Resolution Protocol (ARP)is responsible for changing the MAC address. Part of ARP’s job is to determine what the MAC address is for the next hop and then adjust the frame accordingly so that the frame can be moved to the next hop.

186
Q

What was the first Ethernet standard used on UTP?

A

10Base-T

While 10Base-T was not the first XBase-Y standard developed, it was the first twisted-pair XBase-Y standard developed. In 1990 IEEE 802.3i formalized the 10Base-T standard. 10Base-T used CAT 3 UTP and could carry 10 mbps throughput for a distance of 100 meters. 10Base-T was a baseband technology. This standard became known as Twisted-Pair Ethernet.

187
Q

Resolvers

A

the clients that make requests of the Domain Name System

188
Q

data corruption

A

the data contained in the packet is corrupted

189
Q

CAT 1

A

1MHz, North American telephone system

190
Q

crosstalk

A

when two improperly shielded copper wires run too close together so that signals become mixed

191
Q

CSMA/CD

A

(Carrier Sense Multiple Access with Collision Detection) used most notably in local area networking using early Ethernet technology.

192
Q

FTP

A

(File Transport Protocol) a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet

193
Q

100 MHz, transmits on two pairs

A

CAT 5

194
Q

SFF connector

A

small form factor connector

195
Q

BNC connector

A

attach stations to the network

196
Q

What type of port ranges from 0 to 1023?

A

well-known ports

The first group is called the well-known ports. Port numbers in this group range from 0–1023. Well-known ports can be assigned only by the Internet Assigned Numbers Authority (IANA). The ports in this range, according to IANA, can be used only by the system or root processes and by programs executed by privileged users.

197
Q

TELNET

A

(Terminal Network) an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection

198
Q

plenum-rated cable

A

used for buildings that catch fire

199
Q

What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?

A

IDS

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are related technologies. An IDS usually sits inside a network and monitors the network’s activities. When something suspicious is noted, the IDS then notifies network administrators so that they can take steps to stop the suspect activity. Because an IDS only monitors activity, it is considered passive.

200
Q

active hub

A

regenerates signals on the output side to keep the signal strong

201
Q

Ethernet SNAP

A

allows larger number of protocols, a better Ethernet_802.2

202
Q

The Application layer of the TCP/IP Model corresponds to the blank layer(s) of the OSI model

A

Session and Presentation

203
Q

The process of moving data from one layer of the OSI model to the next layer is called

A

encapsulation

204
Q

baseband cable

A

can only carry 1 signal at a time

205
Q

RFI

A

Radio Frequency Interference

206
Q

routed protocols

A

the process of selecting best paths in a network

207
Q

Define: simplex

A

one-way communications

208
Q

RTP

A

(Real-Time Transport Protocol) a packet format for delivering audio and video over IP networks

209
Q

What is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection?

A

protocol

In computer networking, a protocol is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection. Many protocols are used in networking because many different tasks need to be done to allow computers to communicate with each other.

210
Q

MAC address filtering

A

only a pre-programmed MAC address is allowed access to a specific WAP

211
Q

MLT

A

(Multilink trunking) binds ports together to allow fault tolerance or greater throughput

212
Q

wiring standards agreed upon by over 60 ISP vendors

A

TIA/EIA 568A and 568B

213
Q

Used to connect a phone to a phone jack

A

RJ-11

214
Q

172.16.0.0 - 172.16.255.255

A

private class B

215
Q

Modem

A

(Modulator/Demodulator) a device that modulates signals to encode and demodulates to decode.

216
Q

IDF

A

intermediate distribution frame

217
Q

MIMO

A

multiple-input/multiple-output

218
Q

convergence

A

the time it takes for routing tables to update

219
Q

hybrid routing protocols

A

uses distance-vector metrics-based method to determine the best route, while using link state to update the other routers

220
Q

hexadecimal

A

base 16 numbering system that replaces every fourth 1 and 0 with numerals 0-9 or the alphabetic letters A-F

221
Q

What command tests connectivity between two hosts while showing each hop between the two hosts?

A

tracert

The traceroute/tracert utility is used to report back each hop along a route to a specific IP destination.

222
Q

SONET

A

(Synchronous Optical Network) transfers multiple digital bit streams over fiber-optic

223
Q

Routing tables

A

small databases that routers use to determine which route to take

224
Q

What is used to repeat a signal it receives and rebroadcast it?

A

repeater

A repeater is a device that repeats a signal it receives in order to rebroadcast it, thus extending the range of a particular cable run. A repeater is always active and requires a power source of some sort. It has one cable coming in and one going out.

225
Q

public class A

A

1.0.0.0 - 126.255.255.255

226
Q

attenuation

A

degradation of a signal due to the distance the signal has to travel

227
Q

throughput

A

amount of actual data that is being carried

228
Q

What is the 4th Layer of the OSI Model?

A

Transport

229
Q

latched

A

sturdy plastic connection

230
Q

SYN

A

indicate that the segment contains synchronizing sequence numbers

231
Q

define: protocol suite

A

made up of a large number of protocols that allow computers to communicate

232
Q

Link state routing protocol

A

every node constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes

233
Q

F-connector

A

broadband and home video coaxial cable connector

234
Q

On which OSI layer does the network interface card work?

A

Physical

A NIC is required to work on both the Data-Link and Physical layers of the OSI model. The NIC acts as translator between the software in the upper layers of the OSI model and the physical components of the media.

235
Q

Define: Physical layer

A

all aspects of physically moving data from one computer to the next.

236
Q

hub

A

a node with a number of links that greatly exceeds the average.

237
Q

where all the wires come together

A

cross-connect

238
Q

broadcast

A

sends packets across all available computers on the network

239
Q

What mathematical function is performed on data to ensure that it has not been changed or corrupted?

A

checksum

Before data is sent, a mathematical calculation is done on the data and is sent with the data. When the data is received, the same mathematical calculation is done and the two checksum calculations are compared. If they are the same, the data packet has not been changed or corrupted.

240
Q

CAT 5e

A

100 MHz, transmits on all four wire pairs

241
Q

RJ-45

A

Ethernet data networks

242
Q

Which layer of the OSI Model is responsible for segmenting data and sequencing it for the rest of the OSI model

A

Transport

243
Q

IPv6

A

128-bit address, will never run out of IP addresses

244
Q

IGMP

A

(Internet Group Management Protocol) used by IP hosts to manage their multicast group’s dynamic membership and by connecting routers to find those group members

245
Q

smart jack

A

or Network Interface Device (NID), used between the ISP and internal network

246
Q

Private Class C IP range

A

192.168.0.0 - 192.168.X.X

247
Q

CAT 2

A

10MHz, 4Mbps

248
Q

Define: frame synchronization

A

a method of finding valid data in a transmission that consists of data frames

249
Q

Define: connectionless protocol

A

does not ask for verification that a data packet has reached its destination.

250
Q

ICMP

A

(Internet Control Message Protocol) checks to see if the data packets have successfully reached the destination

251
Q

What device converts one type of media to another type?

A

media converter

Media converters are used to convert one type of media to another type. Such devices are used to convert coaxial to twisted pair or fiber to copper. These types of devices are important for allowing two different types of technologies on the same network.

252
Q

ACK

A

acknowledgement field

253
Q

subscriber connector

A

SC

254
Q

What device has each port as its own collision domain?

A

switch

A basic switch can be referred to as a multiport bridge because like a bridge, it can separate a network out into multiple collision domains.

255
Q

used for buildings that catch fire

A

plenum-rated cable

256
Q

STP

A

shielded twisted pair

257
Q

The process of moving data from one layer of the OSI model to the next layer is called

A

encapsulation

258
Q

Where would you place a web server that will be accessed from the Internet?

A

DMZ

Because a web server that needs to be accessed needs to have some security but should be isolated from the internal network, you should place the web server on the DMZ.

259
Q

Define: Transport layer

A

moves data to segments then sent for data transmission

260
Q

What connects two network segments together, yet only forwards packets based on MAC addresses from one segment to another segment only when needed?

A

bridge

Bridges are intended to break up networks into smaller sections; as a result, they are more intelligent than your average hub. Because bridges work on the Data-Link layer of the OSI model, they can read and make sense of MAC addresses. Based on these MAC or Physical addresses, a bridge can determine whether a frame is allowed to pass through to the other side of the bridge.

261
Q

What technology takes a voice communication, breaks the data into small packets, and sends the packets from one network segment to another?

A

packet switching

Packet switching opens up connections only long enough for a small data packet to move from one network segment to another. Data—regardless of type, content, or structure—is broken into small blocks called packets and sent to its destination.

262
Q

ad hoc wireless network

A

does not rely on a pre existing infrastructure

263
Q

PoE (Power over Ethernet)

A

safetly transfers power over Ethernet cabling

264
Q

RFC

A

(Request For Comment) all networking standards and protocols are defined by these various documents

265
Q

CSMA/CA

A

(Carrier Sense Multiple Access with Collision Avoidance) nodes attempt to avoid collisions by transmitting only when the channel is sensed to be “idle”.

266
Q

TIA/EIA 568A is used on one end of a cable and TIA/EIA 568B is used on the other end

A

crossover cable

267
Q

What type of access method does Ethernet use?

A

CSMA/CD

Carrier Sensing Media Access/Collision Detection (CSMA/CD) is the primary method that Ethernet uses to access wired LANs. Ethernet uses a different method to access wireless LANs.

268
Q

link aggregation

A

bonding method to increase link speed of multiple network cables and ports

269
Q

What is the 5th Layer of the OSI Model?

A

Session

270
Q

What communications term describes the establishment of a dedicated communications channel for the duration of a given transmission?

A

circuit switching

In its most basic definition, circuit switching is a type of communications that establishes a dedicated communications channel for the duration of a given transmission. Initially, circuit switching was done manually, where operators would perform physical connections to establish a circuit or connection. Later, this type of switching was done electronically.

271
Q

SSID

A

(Service Set Identifier) Network name for wireless

272
Q

192.0.0.0 - 223.255.255.255

A

public class C

273
Q

CAT 5

A

100 MHz, transmits on two pairs

274
Q

a rack that houses cable connections

A

patch panel

275
Q

private class A

A

10.0.0.0 - 10.255.255.255

276
Q

private IP address

A

cannot be used on the Internet; is not registered with the Network Information Center

277
Q

Ethernet_802.3

A

(Novell Ethernet) does not include a Layer 2 Data Link identifier

278
Q

hop

A

each time a computer or network device sends data frame to the next computer or network device

279
Q

NTP

A

(Network Time Protocol) a means of synchronizing clocks over a computer network

280
Q

To connect to a wireless network, you would start with what?

A

SSID

of the wireless router SSID (short for Set Service Identifier) acts as the network name for a particular WAP. If you are using multiple WAPs in the same network, they will all need to have the same SSID. In Linksys WAPs, the SSID can be up to 32 characters long.

281
Q

patch panel

A

a rack that houses cable connections

282
Q

CSU/DSU

A

(Channel Service Unit/Data Service Unit) used to convert a digital signal from one frame format to another

283
Q

250MHz

A

CAT 6

284
Q

The encapsulation unit on the Presentation layer of the OSI Model is _____

A

Data

285
Q

OSPF

A

(Open Shortest Path First) gathers link state information from available routers and constructs a topology map of the network

286
Q

Well known ports

A

only assigned by the IANA * can only be used by the system or root processes and by programs that are executed by privileged users

287
Q

Dynamic or private ports

A

can be used at any time and are assigned dynamically by the system

288
Q

cross-connect

A

where all the wires come together

289
Q

port authentication, port-based authentication

A

limits access to a specific port to just certain MAC addresses.

290
Q

Which wireless mode does not use a central WAP?

A

ad hoc

An ad hoc wireless network is formed when a wireless network is composed of only independent wireless computers in which each device participates in forwarding wireless packets. An ad hoc wireless network has no central WAP to monitor and control it. In effect, an ad hoc wireless network is the wireless network version of a peer-to-peer network.

291
Q

SC

A

sqare connector

292
Q

The primary job of the Presentation layer concerned with

A

data representation and code formatting.

293
Q

The encapsulation unit on the Data Link layer of the OSI Model is _____

A

Frame

294
Q

bonding

A

increases network throughput by using two ore more NICs

295
Q

unshielded twisted pair, used in all types of twisted pair Ethernet networks

A

UTP

296
Q

RIP

A

(Routing Information Protocol) implements a limit on the number of hops allowed in a path from source to destination

297
Q

subnetting

A

breaking an IP address range into smaller pieces to be used in more than one network.

298
Q

demarcation point, last point of responsibility from the ISP

A

demarc

299
Q

bandwidth

A

the amount or number of signals that a wire can carry

300
Q

((N-X)) X stands for:

A

identifier

301
Q

protocol suite

A

a group of networking protocols that are designed to work together to accomplish the separate little tasks needed to allow network communications

302
Q

MDF

A

main distribution frame

303
Q

signaling type

A

((N-X)) Signaling stands for:

304
Q

Which core protocol used on the Internet moves data packets from one location on a packet-switched network to another location based on a logical address?

A

IP

The TCP/IP model’s Internet layer is the first layer to have TCP/IP protocol suite–specific protocols. The Internet Protocol (IP) is the most important protocol on this layer and is one of the two protocols used to name the TCP/IP protocol suite.

305
Q

IPv4

A

32 bits long

306
Q

Define: de-encapsulation

A

bits become frames, frames become packets, packets become segments, segments become data.

307
Q

routing metrics

A

used by a router to make routing decisions through a routing table

308
Q

Older style phones

A

RJ-22

309
Q

port speed

A

how fast a specific port on the router is able to send/receive data

310
Q

Public Class B IP range

A

128.0.0.0 - 191.255.255.255

311
Q

SOHO

A

(Small Office Home Office)

312
Q

What is used to protect a network from unauthorized access?

A

firewall

The firewall that is mentioned here, is not the “firewall” that you load onto your computer to protect it from internet attacks. A firewall is a networking device whose purpose is to prevent unauthorized packets from getting into your network. It is also used as the first line of defense between a private network and the Internet.

313
Q

Ping

A

a network administration utility that is used to test connectivity to specific nodes on a network and to measure the round-trip time it takes for a packet to get to a specific destination and back

314
Q

What protocol is used to transport and display web pages using a browser?

A

HTTP

Hyper-Text Transport Protocol (HTTP) is used to transport Hyper-Text Markup Language (HTML) documents, otherwise known as web pages, over the Internet. HTTP can also be used to retrieve graphics, images, and other types of media and it can be used with email.

315
Q

What is the 3rd Layer of the OSI Model?

A

Network

316
Q

What type of access method is used in wireless networks?

A

CSMA/CA

Like CSMA/CD, Carrier Sensing Media Access/Collision Avoidance (CSMA/CA) is a method used by Ethernet to access a local area network. Where CSMA/CD is most commonly used for wired networks, CSMA/CA is most commonly used for wireless networks.

317
Q

dynamic routing

A

alter the path that the route takes through the system in response to a change in conditions

318
Q

What is the 6th Layer of the OSI Model?

A

Presentation

319
Q

What is used to convert digital signals from one frame format to another, specifically to convert Frame Relay into Ethernet signals?

A

CSU/DSU

A Channel Service Unit/Data Service Unit (CSU/DSU) converts a digital signal from one frame format to another. Most commonly, it is used to convert Frame Relay or T-1 signals into Ethernet signals.

320
Q

RS-232

A

Recommended Standard 232, a standard used for serial data cables connecting equipment

321
Q

Which protocol is used to retrieve emails?

A

POP3

Post Office Protocol (POP) is used to connect to an email server and retrieve any emails on that server before closing the connection. When POP3 retrieves emails, it can either leave copies on the server, or delete the emails from the server after it downloads them to the client system.

322
Q

RDP

A

(Remote Desktop Protocol) a remote access network protocol

323
Q

On what OSI layer does a switch operate?

A

Data-LinkSwitches, like bridges, work primarily on the Data-Link layer of the OSI model.

324
Q

MTU

A

(Maximum Transmission Unit)

325
Q

broadcast networking

A

transmitting a packet that will be received by every device on the network

326
Q

Which connection-oriented protocol ensures that data gets its final destination?

A

TCP

TCP focuses on the two end devices, whereas IP focuses on getting the network packet from one device to the next toward its ultimate destination.

327
Q

POP

A

(Post Office Protocol) local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.

328
Q

192.168.0.0 - 192.168.255.255

A

private class C

329
Q

(IP)

A

Internet Protocol; contains IPv4 and IPv6

330
Q

private class B

A

172.16.0.0 - 172.16.255.255

331
Q

small form factor connector

A

SFF connector

332
Q

Which layer of the OSI model contains all the services or protocols that are needed by application software or the operating system to communicate on the network?

A

Application

333
Q

hardware loopback

A

a way to redirect data flow

334
Q

T1 crossover cable

A

T1 applications for WAN networks

335
Q

Which protocol is used to send messages about the network when a route goes bad?

A

ICMP

The Internet Control Message Protocol (ICMP) is used mainly by a computer’s operating system to send messages about the network. When an error occurs in the IP packet, a service is unreachable or down, a host is not found, or a router is down, among other situations, an ICMP message is sent.

336
Q

one bit is sent at a time

A

serial

337
Q

Private Class B IP range

A

172.16.0.0 - 162.31.255.255

338
Q

When a collision occurs, what do the two sending nodes do?

A

They both wait a random amount of time and try again.

When computers on the network segment “hear” a collision on the network, they all immediately activate something called a hold-down timer. This timer is effectively a clock that activates in each NIC on the network and starts counting down from a randomly set point of time. While the clock on a particular NIC is counting down, it cannot send any packets. As each computer on the network segment finishes its random countdown, it can begin listening to the network again to find an open point where it can begin to send its data packet.

339
Q

repeater

A

receives a signal and retransmits it at a power, or onto the other side of an obstruction, so that the signal can cover longer distances.

340
Q

What networking device is used to modulate an analog signal in such a way that it can encode digital information?

A

modem

The word modem is short for modulator/demodulator. A modem is a networking device that is used to modulate an analog signal in such a way that it can encode digital information or to demodulate the encoded signal so that it can be decoded back into something a computer can read. Any device used to encode digital information onto analog communication links, regardless of throughput, can rightfully be called a modem.

341
Q

ACL

A

(Access Control List) Rules for a firewall

342
Q

10Base-5 uses what type of cable?

A

coaxial

Because 10Base-5 used thick coaxial cables to carry data, it was called Thick Ethernet.

343
Q

ARP

A

(Address Resolution Protocol) responsible for determining what the MAC address is for the next hop and then adjust the frame accordingly so that the frame can be moved to the next hop

344
Q

Define: TCP/IP Model

A

built around the TCP/IP protocol suite

345
Q

RG-6

A

Old military standard

346
Q

Lost data packets

A

Packets never reach their intended destination

347
Q

What protocol is used to send and manipulate files over a TCP/IP network?

A

FTP

The most commonly used current version of File Transfer Protocol (FTP) was first introduced in 1985 in RFC 959. However, FTP in its original form was introduced in 1971 using RFC 114.

348
Q

Duplicate arrivals

A

More than one copy of the data packet arrived at the destination computer

349
Q

EUI-64

A

64-bit Extended Unique Identifier; a MAC address where the host extension is 40-bits long; creates a unique interface identifier through IPv6

350
Q

degradation of a signal due to the distance the signal has to travel

A

attenuation

351
Q

_____ are used for node-to-node communications on a network. Logical address, Port address, Physical address, Socket

A

Physical Address

352
Q

Distance-Vector Routing Protocol

A

when each router periodically sends an update of its routing table to all the neighboring routers that are direcrtly connected to it

353
Q

multiple-input/multiple-output

A

MIMO

354
Q

can only carry 1 signal at a time

A

baseband cable

355
Q

Which wireless encryption is considered the weakest?

A

WEP

Available encryption schemes are WPA Enterprise and Personal, WPA2 Enterprise and Personal, RADIUS, and WEP. Of these options, WEP is the weakest.

356
Q

PSTN

A

Public Sswitched Telephone Network

357
Q

TCP/IP Protocol Suite

A

A group of protocols to carry out the functions needed to communicate across a network

358
Q

IMAP

A

(Internet Mail Access Protocol) used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection.

359
Q

LEDs

A

light emitting diodes

360
Q

IPv4

A

32-bit address

361
Q

SNMP

A

(Simple Network Management Protocol) manages devices on IP networks

362
Q

Ethernet data networks

A

RJ-45

363
Q

What protocol is used to assign IP addresses automatically to a host?

A

DHCP

DHCP was first introduced in RFC 1541 in 1993 and was intended as a replacement for the older and less wieldy BOOTP. DHCP assigns IP addresses and IP configurations automatically for the host.

364
Q

classful subnet mask for a Class C IP address

A

255.255.255.0

365
Q

EUI

A

Extended Unique Identifiers; the variations of MAC addresses

366
Q

CAT 3

A

16MHz, 10Mbps

367
Q

T1 applications for WAN networks

A

T1 crossover cable

368
Q

Define: segment

A

Data going to the Transport layer.

369
Q

Define: LLC

A

Logical Link Control sublayer, facilitate communications between the upper Network layer and the Physical layer.

370
Q

attach stations to the network

A

BNC connector

371
Q

100 MHz, transmits on two pairs

A

CAT 5

372
Q

(STP) Spanning Tree Protocol

A

used by switches when multiple switches are used in the same network

373
Q

identifier

A

((N-X)) X stands for:

374
Q

sturdy plastic connection

A

latched

375
Q

What is the 1st Layer of the OSI Model?

A

Physical

376
Q

Which layer of the OSI model is concerned with reliably getting data from one computer to another

A

Data Link

377
Q

What is the copper version of Gigabit Ethernet?

A

1000Base-T

1000Base-T is the copper version of Gigabit Ethernet and was standardized in 1999. The standard used for copper-based Gigabit Ethernet was IEEE 802.3ab, which was designed to use CAT 5, 5e, or 6.

378
Q

What type of server acts as an intermediary between a client and other servers?

A

proxy server

Proxy servers act as intermediaries between a client and other servers. They can fulfill many roles and can be used for many different jobs.

379
Q

time interval between responses

A

latency

380
Q

In what type of network segment do computers have the possibility of having their signals collide with each other?

A

collision domain

A network segment where computers have the possibility of having their signals collide with each other is called a collision domain. If too many computers are on a single collision domain, a network can reach a point where it has so many collisions, no computers can actually communicate with each other. Therefore, the goal of a hub-based network is to have as few computers as possible on a single collision domain.

381
Q

Transient host group

A

host group formed for a specific multicast and then disbanded after use

382
Q

checksum

A

when a network device receives a data packet from another network device, it runs an algorithm on the header of the IP packet and then compares the result of this algorithm with the result stored in the IP header

383
Q

Define: logical addresses

A

logically assigned depending on the Networking layer protocol being used

384
Q

Ethernet_802.2

A

identifier included to enable the frame header to work with the Data Link layer

385
Q

NID

A

network interface device(NID), or smart jack, used between the ISP and internal network

386
Q

10.0.0.0 - 10.255.255.255

A

private class A

387
Q

protocol stack

A

all the protocols from a protocol suit that are currently being used to carry out specific functions of network communications within the computer

388
Q

Which Ethernet frame type supports TCP/IP?

A

Ethernet II

The most widely used Ethernet frame type is Ethernet II or Ethernet DIX. It is so widely used because the Internet Protocol (IP) can use it directly.

389
Q

intelligent hub

A

functions for network management, bridging, routing and switching.

390
Q

binary

A

using 1s and 0s to represent hexadecimal

391
Q

What is the 2nd Layer of the OSI Model?

A

Data Link

392
Q

The most important protocol on the Internet layer of the TCP/IP model is _____

A

Internet Protocol

393
Q

What protocol do multiple switches on the same network use to ensure that an infinite loop is not created?

A

STP

Spanning Tree Protocol (STP) is used when multiple switches are implemented on the same network. As a Data-Link layer protocol, STP is used primarily to prevent endless loops from developing on switch-based LANs. The protocol gets its name from a mathematical algorithm called “spanning tree,” which takes a group of points and connects them all together without allowing any loops to form.