Network + Exam Review Flashcards
Pass The First Time
What are the three basic LAN topologies
Bus, Ring, and Star
What common WAN topology often results in multiple connections to a single site (leading to a high degree of fault tolerance) and has one-to-many connections
MPLS (Multiprotocol Labe Switching)
What is the term for a device that shares its resources with other network devices?
Server
What network model draws a clear distinction between devices that share their resources and devices that share their resources and devices that do not?
Client-Server
Which network topology or connection type can be implemented with only two endpoints?
Point-to-point
What device is generally implemented as a star topology?
Hub or switch
What does MPLS stand for?
Multiprotocol Label Switching
What does WAN stand for?
Wide area network
Will a computer that shares no resources most likely be connected to the backbone or to a segment?
A segment
Which LAN topology is characterized by all devices being daisy-chained together with the devices at each end being connected to only one other device?
Bus
Which layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?
The Application layer is responsible for finding the network resources broadcast from a server and adding flow control and error control (if the application developer chooses)
Which layer is responsible for converting frames from the Data Link layer into electrical signals?
The Physical Layer takes frames from the Data Link layer and encodes the 1s and 0s into a digital signal for transmission on the network medium
At which layer is routing implemented, enabling connections and path selection between two end systems?
The Network layer provides routing through an internetwork and logical addressing
Which layer defines how data is formatted, presented, encoded, and converted?
The Presentation layer makes sure that data is in a readable format for the Application layer
Which layer is responsible for creating, managing, and terminating sessions between applications?
The Session layer sets up, maintains, and terminates sessions between applications
Which layer manages the transmission of data across a physical link and is primarily concerned with physical addressing and the ordered delivery of frames?
Protocol data units (PDUs) at the Data Link layer are called frames. As soon as you see the word frame and/or term physical addressing in a question, you know the answer is always Data Link layer
Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing, maintaining, and terminating virtual circuits as well as controlling the flow of information?
The Transport layer uses virtual circuits to create a reliable connection between two hosts
Which layer provides logical addressing that routers use for path determination?
The Network layer provides logical addressing, IP and/or IPv6 addressing, and routing
Which layer specifies voltage, wire speed, and connector pin-outs and moves bits between devices?
The Physical layer is responsible for the electrical and mechanical connections between devices
Which layer combines bits into bytes and bytes into frames and uses MAC addressing?
The Data Link layer is responsible for the framing of data packets
Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250 MHz?
Cat 6
The point at which the operational control or ownership changes from your company to a service provider is referred to as what?
Demarcation point or demarc
Which type of cable will you use to connect two switches to each other?
Crossover
Which RG rating of coax is used for cable modems?
RG-6
Which UTP uses four twisted pairs (eight wires), is rated for 100 MHz, and is capable of handling the disturbance on each pair caused by transmitting on all four pairs at the same time?
Category 5e
You want to connect a host to a switch port. What type of Ethernet cable will you use?
Straight-through
In what instance would you use T1 crossover cable?
To connect two CSU/DSUs
T568A uses which pins to make a connection?
1,2,3, and 6
A crossover uses which pins to make a connection?
1 to 3 and 2 to 6
What are two advantages of fiber-optic cabling
It is completely immune to EMI and RFI and can transmit up to 40 kilometers (about 25 miles)
Complete the following table to express 192.168.10.15 in binary format
11000000/10101000/00001010/00001111
Complete the following table to express 172.16.20.55 in binary format
10101100/00010000/00010100/00110111
Complete the following table to express 10.11.12.99 in binary format
00001010/00001011/00001100/01100011
Complete the following table to express 11001100.00110011.10101010.01010101 in decimal IP address format
204/51/170/85
Complete the following table to express 11000110.11010011.00111001.11010001 in decimal IP address format
198/211/57/209
Complete the following table to express 10000100.11010010.10111000.10100110 in decimal Ip address format
132/210/184/166
Complete the following table to express 110110000.00011011.00111101.01110110 in hexadecimal
D8/1B/3D/76
Complete the following table to express 11001010.11110101.10000011.11101011 in hexadecimal
CA/F5/83/EB
Complete the following table to express 10000100.11010010.01000011.10110011 in hexadecimal
84/D2/43/B3
This device sends and receives information about the Network layer
Router
This layer creates a virtual circuit before transmitting between two end stations
Transport
A layer 3 switch or multilayer swithces
Router
This device uses hardware addresses to filter a network
Bridge or Switch
Ethernet is defined at these layers
Data Link and Physical
This layer supports flow control and sequencing
Transport
A malware attack encrypts the data on a critical network server. A dialog box displays on the server display screen with instructions about how to pay for a recovery code to decrypt the server data. Which type of attack does this scenario describe?
Ransomware
Part of a company’s network is shown in the exhibit. Client computers are configured to receive IP addresses automatically from the DHCP server. All client computers currently have valid IP addresses. Computers on the 192.168.1.0 subnet are unable to resolve host names in other subnets but can access resources by IP address. Computers on other subnets are not experiencing this problem. What is the most likely cause?
Port 53 is blocked on the 192.168.1.1 interface
A company deploys a server on its perimeter network. The server will be used for transferring files. Specific requirements include:
Users authenticate with a user ID and password
All communication between the server and client is encrypted
Open ports on the perimeter firewall are kept to a minimum
No certificate is required at the server or client
What should the company select as a solution?
SFTP
A user reports their VoIP calls seem choppy. A network administrator is concerned congestion may be causing variation in packet delays. What should the administrator monitor to confirm this concern?
Jitter
Which of the following is a limitation of vSwitch technology?
Network traffic cannot flow between vSwitches on the same host
An organization wants to maximize performance for its wireless network. Which technology should the organization deploy?
802.11ax
A network technician must ensure that nodes can send traps when performance thresholds are breached. Which solution BEST meets this requirement?
Deploy an SNMP management system and configure agents on nodes
A network technician troubleshoots connectivity to a server. The technician needs to determine if a connection from a client is active as well as the port being used for the connection. Which tool should the technician use?
netstat
A company needs a device to help centralize authentication, mitigate radio interference, provide load balancing, and improve bandwidth usage
Wireless controller
A company needs to evenly distribute traffic between web servers deployed in its perimeter network
Load balancer
A company needs to add a layer of protection between internal network hosts and external websites
Proxy server
Which two are benefits of mesh-connected distribution routers?
Load balancing, Multipathing
Which is considered solely a distance vector protocol?
RIP
Most of a company’s network administrators are Windows operating system specialists. The company is cross training administrators to help perform periodic management and administrative tasks on Linux servers. This includes a mix of command-line and graphic utilities. Some of the administrators being trained are in remote offices. All trainers are in the company’s main office.
The administrators being trained log on and work locally from a Linux server. The trainer will connect to Linux server from a client computer. Both computers need to display the same screen and allow commands and utilities to be used from either computer.
Which remote connection technology should the trainers use?
VNC (Virtual Network Computing)
This device can measure the distance to a remote network
Router
Logical addressing is used at this layer
Network
Hardware addresses are defined at this layer
Data Link (MAC Sublayer)
This device creates one big collision domain and one large broadcast domain
Hub
This device creates many smaller collision domains, but the network is still one large broadcast domain
Switch or Bridge
This device can never run full-duplex
Hub
This device breaks up collision domains and broadcast domains
Router
What would an ARP destination MAC address appear as?
This would be a layer 2 broadcast, or FF:FF:FF:FF:FF