Network + Exam Review Flashcards

Pass The First Time

1
Q

What are the three basic LAN topologies

A

Bus, Ring, and Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What common WAN topology often results in multiple connections to a single site (leading to a high degree of fault tolerance) and has one-to-many connections

A

MPLS (Multiprotocol Labe Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the term for a device that shares its resources with other network devices?

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What network model draws a clear distinction between devices that share their resources and devices that share their resources and devices that do not?

A

Client-Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which network topology or connection type can be implemented with only two endpoints?

A

Point-to-point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What device is generally implemented as a star topology?

A

Hub or switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MPLS stand for?

A

Multiprotocol Label Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does WAN stand for?

A

Wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Will a computer that shares no resources most likely be connected to the backbone or to a segment?

A

A segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which LAN topology is characterized by all devices being daisy-chained together with the devices at each end being connected to only one other device?

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?

A

The Application layer is responsible for finding the network resources broadcast from a server and adding flow control and error control (if the application developer chooses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which layer is responsible for converting frames from the Data Link layer into electrical signals?

A

The Physical Layer takes frames from the Data Link layer and encodes the 1s and 0s into a digital signal for transmission on the network medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At which layer is routing implemented, enabling connections and path selection between two end systems?

A

The Network layer provides routing through an internetwork and logical addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which layer defines how data is formatted, presented, encoded, and converted?

A

The Presentation layer makes sure that data is in a readable format for the Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which layer is responsible for creating, managing, and terminating sessions between applications?

A

The Session layer sets up, maintains, and terminates sessions between applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which layer manages the transmission of data across a physical link and is primarily concerned with physical addressing and the ordered delivery of frames?

A

Protocol data units (PDUs) at the Data Link layer are called frames. As soon as you see the word frame and/or term physical addressing in a question, you know the answer is always Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing, maintaining, and terminating virtual circuits as well as controlling the flow of information?

A

The Transport layer uses virtual circuits to create a reliable connection between two hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which layer provides logical addressing that routers use for path determination?

A

The Network layer provides logical addressing, IP and/or IPv6 addressing, and routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which layer specifies voltage, wire speed, and connector pin-outs and moves bits between devices?

A

The Physical layer is responsible for the electrical and mechanical connections between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which layer combines bits into bytes and bytes into frames and uses MAC addressing?

A

The Data Link layer is responsible for the framing of data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250 MHz?

A

Cat 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The point at which the operational control or ownership changes from your company to a service provider is referred to as what?

A

Demarcation point or demarc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which type of cable will you use to connect two switches to each other?

A

Crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which RG rating of coax is used for cable modems?

A

RG-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which UTP uses four twisted pairs (eight wires), is rated for 100 MHz, and is capable of handling the disturbance on each pair caused by transmitting on all four pairs at the same time?

A

Category 5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You want to connect a host to a switch port. What type of Ethernet cable will you use?

A

Straight-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In what instance would you use T1 crossover cable?

A

To connect two CSU/DSUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

T568A uses which pins to make a connection?

A

1,2,3, and 6

29
Q

A crossover uses which pins to make a connection?

A

1 to 3 and 2 to 6

30
Q

What are two advantages of fiber-optic cabling

A

It is completely immune to EMI and RFI and can transmit up to 40 kilometers (about 25 miles)

31
Q

Complete the following table to express 192.168.10.15 in binary format

A

11000000/10101000/00001010/00001111

32
Q

Complete the following table to express 172.16.20.55 in binary format

A

10101100/00010000/00010100/00110111

33
Q

Complete the following table to express 10.11.12.99 in binary format

A

00001010/00001011/00001100/01100011

34
Q

Complete the following table to express 11001100.00110011.10101010.01010101 in decimal IP address format

A

204/51/170/85

35
Q

Complete the following table to express 11000110.11010011.00111001.11010001 in decimal IP address format

A

198/211/57/209

36
Q

Complete the following table to express 10000100.11010010.10111000.10100110 in decimal Ip address format

A

132/210/184/166

37
Q

Complete the following table to express 110110000.00011011.00111101.01110110 in hexadecimal

A

D8/1B/3D/76

38
Q

Complete the following table to express 11001010.11110101.10000011.11101011 in hexadecimal

A

CA/F5/83/EB

39
Q

Complete the following table to express 10000100.11010010.01000011.10110011 in hexadecimal

A

84/D2/43/B3

40
Q

This device sends and receives information about the Network layer

A

Router

41
Q

This layer creates a virtual circuit before transmitting between two end stations

A

Transport

42
Q

A layer 3 switch or multilayer swithces

A

Router

43
Q

This device uses hardware addresses to filter a network

A

Bridge or Switch

44
Q

Ethernet is defined at these layers

A

Data Link and Physical

45
Q

This layer supports flow control and sequencing

A

Transport

46
Q

A malware attack encrypts the data on a critical network server. A dialog box displays on the server display screen with instructions about how to pay for a recovery code to decrypt the server data. Which type of attack does this scenario describe?

A

Ransomware

47
Q

Part of a company’s network is shown in the exhibit. Client computers are configured to receive IP addresses automatically from the DHCP server. All client computers currently have valid IP addresses. Computers on the 192.168.1.0 subnet are unable to resolve host names in other subnets but can access resources by IP address. Computers on other subnets are not experiencing this problem. What is the most likely cause?

A

Port 53 is blocked on the 192.168.1.1 interface

48
Q

A company deploys a server on its perimeter network. The server will be used for transferring files. Specific requirements include:
Users authenticate with a user ID and password
All communication between the server and client is encrypted
Open ports on the perimeter firewall are kept to a minimum
No certificate is required at the server or client
What should the company select as a solution?

A

SFTP

49
Q

A user reports their VoIP calls seem choppy. A network administrator is concerned congestion may be causing variation in packet delays. What should the administrator monitor to confirm this concern?

A

Jitter

50
Q

Which of the following is a limitation of vSwitch technology?

A

Network traffic cannot flow between vSwitches on the same host

51
Q

An organization wants to maximize performance for its wireless network. Which technology should the organization deploy?

A

802.11ax

52
Q

A network technician must ensure that nodes can send traps when performance thresholds are breached. Which solution BEST meets this requirement?

A

Deploy an SNMP management system and configure agents on nodes

53
Q

A network technician troubleshoots connectivity to a server. The technician needs to determine if a connection from a client is active as well as the port being used for the connection. Which tool should the technician use?

A

netstat

54
Q

A company needs a device to help centralize authentication, mitigate radio interference, provide load balancing, and improve bandwidth usage

A

Wireless controller

55
Q

A company needs to evenly distribute traffic between web servers deployed in its perimeter network

A

Load balancer

56
Q

A company needs to add a layer of protection between internal network hosts and external websites

A

Proxy server

57
Q

Which two are benefits of mesh-connected distribution routers?

A

Load balancing, Multipathing

58
Q

Which is considered solely a distance vector protocol?

A

RIP

59
Q

Most of a company’s network administrators are Windows operating system specialists. The company is cross training administrators to help perform periodic management and administrative tasks on Linux servers. This includes a mix of command-line and graphic utilities. Some of the administrators being trained are in remote offices. All trainers are in the company’s main office.
The administrators being trained log on and work locally from a Linux server. The trainer will connect to Linux server from a client computer. Both computers need to display the same screen and allow commands and utilities to be used from either computer.
Which remote connection technology should the trainers use?

A

VNC (Virtual Network Computing)

60
Q

This device can measure the distance to a remote network

A

Router

61
Q

Logical addressing is used at this layer

A

Network

62
Q

Hardware addresses are defined at this layer

A

Data Link (MAC Sublayer)

63
Q

This device creates one big collision domain and one large broadcast domain

A

Hub

64
Q

This device creates many smaller collision domains, but the network is still one large broadcast domain

A

Switch or Bridge

65
Q

This device can never run full-duplex

A

Hub

66
Q

This device breaks up collision domains and broadcast domains

A

Router

67
Q

What would an ARP destination MAC address appear as?

A

This would be a layer 2 broadcast, or FF:FF:FF:FF:FF

68
Q
A