Midterm 2 Flashcards

1
Q

Associated with CSMA/CD

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assigns IP addresses to computers

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Always floods received “messages” out all ports

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The exit point where all packets leaving a compuer are sent

A

default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

128 bits in length

A

IPng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP Tunnelling

A

Encapsulating IPv6 datagrams within IPv4 datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

10101100 in decimal

A

172

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

01000011in decimal

A

67

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

133 in decimal

A

10000101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In computer networks, a type of message sent to a group of (not all) nodes at the same time is called

A

multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol is used to access a file shared on a Windows network directory [acronym only]

A

SMB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical access in Networking

A
  • Server rooms should be well cooled and have redundant source of power.
  • Where possible remove keyboards, mice, and screens/monitors from server rooms. Instead use remote access or KVM switches.
  • Disable ports on devices, e.g., USB ports or CD/DVD drives
  • Similar processes should be applied for active devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ping uses Answer ____ Echo packets to request a response from another computer to verify whether it’s available for communication

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the subnet mask of a class B address with prefix /15.

A

255.254.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network administrator subnets a 192.168.10.0 private address using a /27 prefix. What are 3 valid address blocks within the newly formed subnetworks?

A

192.168.10.1 - 192.168.10.31,

192.168.10.97 - 192.168.10.127,

192.168.10.33 - 192.168.10.63

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a type of address that is automatically assigned when no DHCP server can be contacted

A

APIPA

17
Q

resolves an IP address to a MAC address

A

ARP

18
Q

resolves names to IP addresses

A

DNS

19
Q

dynamically assigns IP addresses

A

DNS

20
Q

the unit of information used by UDP in the Transport layer

A

datagram

21
Q

Transport layer protocol that is connection-oriented and reliable

A

TCP

22
Q

What type of packets are transmitted between a DHCP client and server when the client is initially leasing an IP address

A

Broadcast

23
Q

Two common tools for diagnosing network connectivity which run on the ICMP protocol are

A

PING
TRACERT

24
Q

Network security measures include

A

MAC Address Filtering,

Keeping ingress and egress logs,

Use of multi-factor authentication

25
Q

Which of these messages helps TCP determine if a packet has been duplicated or lost

A

ACK

26
Q

Where of these protocols are associated with emails

A

POP3,

SMTP,

IMAP4

27
Q

time taken to examine a packet’s header and determine the exit interface

A

→ processing delay

28
Q

the time required to “load” packets onto a communication medium/channel

A

→ transmission delay

29
Q

the time a packet spends in a router waiting to be processed

A

→ queueing delay

30
Q

time taken to transmit a packet across a communication channel or medium

A

→ propagation delay

31
Q

A document that spells out the regulations governing access and use of network resources within an institution is called

A

Network Security Policy