MTA Flashcards
default port used for SMTP
25
ping tool is used to
- self test a host’s own network interface
- determine whether a host is reachable
2 features of DHCP
- address reservation
- ip address exclusion
the command-line tool used to list a host’s active incoming connections is
NETSTAT
which network does the ip address
220.100.100.100 belong to
220.100.100.0/24
a service that resolves NetBios names to ip addresses is
Domain Name Service (DNS)
Windows Internet Name Service (WINS)
teredo tunneling is a protocol that
- allows ipv6 connectivity through ipv4
- dynamically allocates ipv6 addresses
default port used for telnet
23
when a client’s DHCP issued address expires, the client will
attempt to obtain a new address by broadcasting
a Media Access Control (MAC) address indentifies
a network interface card (NIC)
two companies want to share data by using the internet. which type of network provides the solution
Extranet
VPN are implemented to provide
a secure connection through public networks
if an 802.llg Internet connection has connectivity poblems, what may be the cause
electromagnetic interference (EMI)
a network that separates an organization’s private network from a public network is a
Perimeter
which type of network is most vulnerable to intrusion
wireless
attenuation in a wireless network signal is a result of
Distance from the access point
which type of network covers the broadest area
WAN
in LAN topologies, the primary media access methods are
- contention
- token passing
in a physical star topology, the central device is referred to as a
Hub
which technology can you use to extend an internal network across shared or public networks
VLAN
which two are published IEEE 802.11 wireless transmission standards
- 11g
802. 11n
what happens when an 802.11b node starts broadcasting within the range of an 802.11g point
a connection will be established
which technology provides the highest bit rate
DS3
a VPN is an
encrypted connection across the internet
a topology of a LAN is defined by the
physical an logical characteristics
theaximum throughput of an 802.11g network is
54 Mbit/s
a node within a LAN must have a network interface device and a
Host address
PPP Layer 2 WAN protocol?
yes
woch type of port is used to support VLAN traffic between two switches?
Trunk port
the protocol that maps IP adresses to a MAC address is
Address Resolution Protocol (ARP)
the host name of the fully qualified domain (FQDN) mail.exchange.corp.nwtraders.com is
to wich IP configuration does the CIDR notation
192.168.1.1/25 refer?
192.168.1.1 255.255.255.128
which command is used to verify that a server is connected to the network?
PING
which represents the Internet Protocol version 6 (IPv6) loopback adress?
::1
which is a multicast address?
224.0.0.1
which uses pointer records and A records?
DNS server
the ipconfig command will
display a client’s adress
one reason to incorporate VLANs in a network is to
reduce the number of nodes in a broadcast domain
FTP application layer protocol
yes
top level domain
e.g. com
at what layer in the OSI model are hardware adresses referenced?
Data Link
you need to devide a network into three subnets. which device would you choose?
Router
the type of connector used on a 100 BaseT Ethernet cable is?
RJ-45
In addition to switching, multilayer switches also
provide layer 3 routing functions
one reason to replace an unamanaged switch with a managed switch is to
support multiple VLANS
to directly connect the Ethernet NICs of two computers, you should use a
crossover cable
the function of a router is to
?
if a router cannot determine the next hop for a packet, the router will
forward the packet to the default route
a private network that allows members of an organisation to exchange data is an
Intranet
security is a concern on wireless networks due to
the radio broadcast access method
a characteristic of the mesh topology is that it
uses redundant paths
to protect a network when it is connected to the internet, you should use a
Firewall
one purpose of a perimeter network is to
make resources available to the internet
which service masks internal ip addresses from outside the network?
NAT
the query protocol used to locate resources on a network is
Lightweight Directory Access Protocol (LDAP)
tracert is used to
report the route taken by packets across an IP network
in wich OSI layer does routing occur?
Network
What type of record does DNS use to find a mail service?
Mail Exchanger (EX) DNS record
the default gateway address indentifies the
device that will connect the computer to a remote network
how many bits are there in an IPv6 address?
128
which is a public IP adress?
e.g. 68.24.78.221
what is the minimum cabling requirement for a 100BaseTX natwork?
? category 5 UTP cable
Internet Key Exchange (IKE) is responsible for which two funktions?
- establishing network speed parameters
- verifying the client’s patch level
which protocol is a transport layer protocol?
UDP
IPv4 multicast addresses range from … to …
224.0.0.0 to 239.225.225.225
a university has network links between various lications. where would a T3 connection be appropriate?
server to network in the main campus server room
which two features of a Windows Server 2008 R2 server should you use install to use that server as a software router?
- Network Policy and Access Services
- Routing and Remote Access Services
Which are two characteristics of fiber optic cable?
- support splacing
- requires a polish for end connectors
which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?
802.11n
what is the bitrate for a North American T3 circuit?
44.736 Mbit/s
which feature of Category 5e STP cable reduces external interference?
shielding
what are three advantages of VLANs?
- they coparmentalize a network and isolate traffic
- they are efficient because a single switch can implement only a single VLAN
- they act as though they are on the same LAN regardless of physical location
forvwhich two reasons should you use IPsec between computers?
- data compression
- data integrity
every router today is FTP capable
yes
which wireless communication problem is caused by electromagnetic waves?
interference
what are two advantages of using star topology rather than ring topology in a computer lab workgroup?
- a central connection point allows for flexibility and scalability
- a cable problem within the group affects two nodes, at most
what are three characteristics of Ethernet network topology?
- it can be coaxial, twisted pair or fiber optic media
- it comprises the largest share of the networks in place today
- it can negotiate different transmission speeds
what is a similarity between layer 2 and layer 3 switches?
both forward packets onto the network
dynamic routing is fault tolerant
yes
what is an example of a layer 3 device that connects multiple computers and networks?
router
which meric does Routing Information Protocol use to determine the least costly route?
hop count
what are two differences between switches and hubs?
- switches send data to all of the computers that are connected to them for efficiency
- switches are capable of sending and receiving data at the same time
what is the DNS record type that specifies an alias name of another address record?
CNAME
each IPv4 address sonsists of a network ID and a Host ID
yes
the SOA RR value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it
yes
connectionless, message based protocol with best effort service
UDP
connection oriented protocol with guaranteed sevice
TCP
resolves IP addresses to MAC addresses
ARP
a network that only allows controlled access fot specific business or educational purposes
extranet
a network that allows access only to users within an organisation
intranet
a system of interconnected networks
internet
allows a remote user to connect to a private network from anywhere on the internet
SSL VPN
securely connects two portions of a private network or two private networks
site to site VPN
creates an unencrypted connection between two network devices
layer 2 tunneling protocol
802.11a
frequency range: 5.1-5.8 Ghz
data rate: 54Mbps
802.11b
frequency range: 2.4-2.485 Ghz
data rate: 11Mbps
802.11g
frequency range: 2.4-2.485 Ghz
data rate: 54Mbps
802.11n
frequency range: 2.4-2.485 Ghz or 5.1-5.8 Ghz
data rate: 65-600Mbps
star
- each computer is connected by a single cable
- there is a central connectivity device
ring
- each workstation acts as a repeater
- each node is connected to exactly two other nodes
mesh
- each computer is connected to every othe computer
- the number of connections equals the total number of computers minus one
multicast
assigned to one or more network interfaces located on various subnets on the network and used fot one-to-many communications
broadcast
assignes to all network interface located on a subnet on the network and used for one-to-everyone-on-a-subnet communications
unicast
assigned to a single network interface located on a specific subnet on the network and used for one-to-one communications
what is the most common adapter or connector used to connect a computer to a wired network
RJ-45
what do you use to create VLANs
switch
what standard describes CSMA/CD
802.3
what mechanism do wireless networks use to access the network?
CSMA/CD
what model promises the most processing power?
distributive computing
what type of server does Active Director run on?
network controller
what type of communication is sent to a single designated host?
unicast
a ___ ist a single computer or device that connects to a TCP/IP network
host
what is the central device used in wireless LANs?
wireless access point
which layer in the OSI model so MAC addresses and switches use?
data link
which layer in the OSI model covers routing between networks?
network
which layer in the OSI model is used to verify that data was delivered without error?
network
which layer in the OSI model is used to create aconnection so that a host can transfer files?
session
which layer in the OSI model includes VLANs?
data link
which protocol do you use as the transport protocol for a video application?
UDP
which layer in the OSI model is resoinsible for logging on and off?
session