Network + Exam Review Flashcards

Pass The First Time

1
Q

What are the three basic LAN topologies

A

Bus, Ring, and Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What common WAN topology often results in multiple connections to a single site (leading to a high degree of fault tolerance) and has one-to-many connections

A

MPLS (Multiprotocol Labe Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the term for a device that shares its resources with other network devices?

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What network model draws a clear distinction between devices that share their resources and devices that share their resources and devices that do not?

A

Client-Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which network topology or connection type can be implemented with only two endpoints?

A

Point-to-point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What device is generally implemented as a star topology?

A

Hub or switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MPLS stand for?

A

Multiprotocol Label Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does WAN stand for?

A

Wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Will a computer that shares no resources most likely be connected to the backbone or to a segment?

A

A segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which LAN topology is characterized by all devices being daisy-chained together with the devices at each end being connected to only one other device?

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?

A

The Application layer is responsible for finding the network resources broadcast from a server and adding flow control and error control (if the application developer chooses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which layer is responsible for converting frames from the Data Link layer into electrical signals?

A

The Physical Layer takes frames from the Data Link layer and encodes the 1s and 0s into a digital signal for transmission on the network medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At which layer is routing implemented, enabling connections and path selection between two end systems?

A

The Network layer provides routing through an internetwork and logical addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which layer defines how data is formatted, presented, encoded, and converted?

A

The Presentation layer makes sure that data is in a readable format for the Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which layer is responsible for creating, managing, and terminating sessions between applications?

A

The Session layer sets up, maintains, and terminates sessions between applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which layer manages the transmission of data across a physical link and is primarily concerned with physical addressing and the ordered delivery of frames?

A

Protocol data units (PDUs) at the Data Link layer are called frames. As soon as you see the word frame and/or term physical addressing in a question, you know the answer is always Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing, maintaining, and terminating virtual circuits as well as controlling the flow of information?

A

The Transport layer uses virtual circuits to create a reliable connection between two hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which layer provides logical addressing that routers use for path determination?

A

The Network layer provides logical addressing, IP and/or IPv6 addressing, and routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which layer specifies voltage, wire speed, and connector pin-outs and moves bits between devices?

A

The Physical layer is responsible for the electrical and mechanical connections between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which layer combines bits into bytes and bytes into frames and uses MAC addressing?

A

The Data Link layer is responsible for the framing of data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250 MHz?

A

Cat 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The point at which the operational control or ownership changes from your company to a service provider is referred to as what?

A

Demarcation point or demarc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which type of cable will you use to connect two switches to each other?

A

Crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which RG rating of coax is used for cable modems?

A

RG-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which UTP uses four twisted pairs (eight wires), is rated for 100 MHz, and is capable of handling the disturbance on each pair caused by transmitting on all four pairs at the same time?
Category 5e
26
You want to connect a host to a switch port. What type of Ethernet cable will you use?
Straight-through
27
In what instance would you use T1 crossover cable?
To connect two CSU/DSUs
28
T568A uses which pins to make a connection?
1,2,3, and 6
29
A crossover uses which pins to make a connection?
1 to 3 and 2 to 6
30
What are two advantages of fiber-optic cabling
It is completely immune to EMI and RFI and can transmit up to 40 kilometers (about 25 miles)
31
Complete the following table to express 192.168.10.15 in binary format
11000000/10101000/00001010/00001111
32
Complete the following table to express 172.16.20.55 in binary format
10101100/00010000/00010100/00110111
33
Complete the following table to express 10.11.12.99 in binary format
00001010/00001011/00001100/01100011
34
Complete the following table to express 11001100.00110011.10101010.01010101 in decimal IP address format
204/51/170/85
35
Complete the following table to express 11000110.11010011.00111001.11010001 in decimal IP address format
198/211/57/209
36
Complete the following table to express 10000100.11010010.10111000.10100110 in decimal Ip address format
132/210/184/166
37
Complete the following table to express 110110000.00011011.00111101.01110110 in hexadecimal
D8/1B/3D/76
38
Complete the following table to express 11001010.11110101.10000011.11101011 in hexadecimal
CA/F5/83/EB
39
Complete the following table to express 10000100.11010010.01000011.10110011 in hexadecimal
84/D2/43/B3
40
This device sends and receives information about the Network layer
Router
41
This layer creates a virtual circuit before transmitting between two end stations
Transport
42
A layer 3 switch or multilayer swithces
Router
43
This device uses hardware addresses to filter a network
Bridge or Switch
44
Ethernet is defined at these layers
Data Link and Physical
45
This layer supports flow control and sequencing
Transport
46
A malware attack encrypts the data on a critical network server. A dialog box displays on the server display screen with instructions about how to pay for a recovery code to decrypt the server data. Which type of attack does this scenario describe?
Ransomware
47
Part of a company's network is shown in the exhibit. Client computers are configured to receive IP addresses automatically from the DHCP server. All client computers currently have valid IP addresses. Computers on the 192.168.1.0 subnet are unable to resolve host names in other subnets but can access resources by IP address. Computers on other subnets are not experiencing this problem. What is the most likely cause?
Port 53 is blocked on the 192.168.1.1 interface
48
A company deploys a server on its perimeter network. The server will be used for transferring files. Specific requirements include: Users authenticate with a user ID and password All communication between the server and client is encrypted Open ports on the perimeter firewall are kept to a minimum No certificate is required at the server or client What should the company select as a solution?
SFTP
49
A user reports their VoIP calls seem choppy. A network administrator is concerned congestion may be causing variation in packet delays. What should the administrator monitor to confirm this concern?
Jitter
50
Which of the following is a limitation of vSwitch technology?
Network traffic cannot flow between vSwitches on the same host
51
An organization wants to maximize performance for its wireless network. Which technology should the organization deploy?
802.11ax
52
A network technician must ensure that nodes can send traps when performance thresholds are breached. Which solution BEST meets this requirement?
Deploy an SNMP management system and configure agents on nodes
53
A network technician troubleshoots connectivity to a server. The technician needs to determine if a connection from a client is active as well as the port being used for the connection. Which tool should the technician use?
netstat
54
A company needs a device to help centralize authentication, mitigate radio interference, provide load balancing, and improve bandwidth usage
Wireless controller
55
A company needs to evenly distribute traffic between web servers deployed in its perimeter network
Load balancer
56
A company needs to add a layer of protection between internal network hosts and external websites
Proxy server
57
Which two are benefits of mesh-connected distribution routers?
Load balancing, Multipathing
58
Which is considered solely a distance vector protocol?
RIP
59
Most of a company's network administrators are Windows operating system specialists. The company is cross training administrators to help perform periodic management and administrative tasks on Linux servers. This includes a mix of command-line and graphic utilities. Some of the administrators being trained are in remote offices. All trainers are in the company's main office. The administrators being trained log on and work locally from a Linux server. The trainer will connect to Linux server from a client computer. Both computers need to display the same screen and allow commands and utilities to be used from either computer. Which remote connection technology should the trainers use?
VNC (Virtual Network Computing)
60
This device can measure the distance to a remote network
Router
61
Logical addressing is used at this layer
Network
62
Hardware addresses are defined at this layer
Data Link (MAC Sublayer)
63
This device creates one big collision domain and one large broadcast domain
Hub
64
This device creates many smaller collision domains, but the network is still one large broadcast domain
Switch or Bridge
65
This device can never run full-duplex
Hub
66
This device breaks up collision domains and broadcast domains
Router
67
What would an ARP destination MAC address appear as?
This would be a layer 2 broadcast, or FF:FF:FF:FF:FF
68