Networking (1) Flashcards

1
Q

Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?

Hub

Bridge

Repeater

A

Bridge

Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?

10 Mbps

100 Mbps

10 Gbps

A

100 Mbps

An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100 Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are installing a fibre-optic cable between two buildings. To install the cable, you must run it through a conduit between the buildings, and access to the conduit is not easy. Before you run the cable, you want to ensure it’s working properly. Which tool should you use?

Cable tester

Multimeter

Tone generator and probe

A

Cable tester

Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they’ve been run as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?

POP3

IMAP

SMB

A

IMAP

Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are using your laptop on the company network. In your web browser, you type in www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues. What is the most likely reason you can’t open Google?

DNS server problem

DHCP server problem

Missing subnet problem

A

DNS server problem

The Domain Name System (DNS) server is responsible for resolving hostnames, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician needs to run a network cable to a remote building, which is approximately 15 kilometers from his base station. He’s not sure if any cable will span that distance. What is the maximum distance of SMF cable?

300 meters

40 kilometers

100 kilometers

A

40 kilometers

Single-mode fiber (SMF) can provide data throughput rates of 10 Gbps at a distance of 40 kilometers. Compare that to multimode fiber, which can reliably transmit 10 Gbps for only about 550 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have been asked to install a run of RG-59 cable from one end of a building to the other. What is the maximum distance for this type of cable run?

100 meters (328 feet)

228 meters (750 feet)

304 meters (1000 feet)

A

228 meters (750 feet)

RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 has more insulation and can run for about 304 meters (1,000 feet). Transmission quality for RG-59 differs depending on the frequencies. RG-59 is good for baseband video, but at high frequencies the RG-59 does not do well over long distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which one of the following TCP/IP protocols was designed as a replacement for telnet?

SMB

SSH

SFTP

A

SSH

Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following network connectivity devices operates at Layer 2 of the OSI model? (Choose two)

Hub

Switch

Bridge

Router

A

Switch

Bridge

Switches and bridges work at Layer 2. Switches are multiport bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In IPv4, what is the function of the subnet mask?

It tells hosts where to route packets

It differentiates between the network ID and host ID

It determines which subnet the host is on

A

It differentiates between the network ID and host ID

Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following TCP/IP protocols is connection-oriented and attempts to guarantee packet delivery?

IP

TCP

UDP

A

TCP

Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which TCP/IP protocol allows a user to log into a remote computer and manage files as if they were logged in locally?

FTP

SFTP

Telnet

A

Telnet

Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, users can manage files on that remote machine just as if they were logged in locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are given a network configuration of 155.100.63.0/26 from your ISP. When you configure your network hosts, what subnet mask should you assign them?

  1. 255.255.0
  2. 255.255.192
  3. 255.255.240
A

255.255.255.192

A CIDR shorthand notation of /26 corresponds to the subnet mask 255.255.255.192

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Wi-Fi standard specifies a maximum of 54 Mbps transmission in the 2.4 GHz frequency range?

  1. 1.1b
  2. 1.1g
  3. 1.1n
A
  1. 1.1g

802. 11g specifies a maximum of 54 Mbps transmissions in the 2.4 GHz frequency range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which TCP/IP protocol is used to provide shared access to files and printers on the network?

FTP

SSH

SMB

A

SMB

Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP, only with a few more options, such as the ability to connect to printers and more management commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which port does the telnet protocol use?

22

23

25

A

23

Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, users can manage files on that remote machine just as if they were logged in locally. Telnet uses port 23

17
Q

You have just installed a wireless 802.1.1ac network for a client. The IT manager is concerned about competitors intercepting the wireless signal from outside the building. Which tool is designed to test how far your wireless signal travels?

Protocol analyzer

Packet sniffer

Wi-Fi analyzer

A

Wi-Fi analyzer

A wireless locator, or a Wi-Fi analyzer can be either a handheld hardware device or specialized software that is installed on a laptop and whose purpose is to detect and analyze Wi-Fi signals. It can detect where signals are strong or weak to determine whether there are potential security issues

18
Q

Some of your network users are concerned about submitting confidential information to an online website. What should you tell them?

It’s fine, because all internet traffic is encrypted

If the website address starts with TLS://, it should be ok to submit confidential information to a trusted site

If the website address starts with HTTPS://, it should be ok to submit confidential information to a trusted site

A

If the website address starts with HTTPS://, it should be ok to submit confidential information to a trusted site

Internet traffic is not encrypted by default. Websites that are secure and encrypt their transmissions will start with HTTPS:// rather than HTTP://. These sites can be trusted to encrypt the data, and their identity is verified

19
Q

Which TCP/IP internet Layer protocol is responsible for delivering error messages if communication between two computers fails?

ICMP

TCP

UDP

A

ICMP

The main Internet layer protocol is Internet Protocol (IP), and it’s the workhorse of TCP/IP. Another key protocol at this layer is Internet Control Message Protocol (ICMP), which is responsible for delivering error messages. If you’re familiar with the ping utility, you’ll know that it utilizes ICMP to send and receive packets

20
Q

Which type of IPv6 address identifies a single node on the network?

Anycast

Unicast

Localcast

A

Unicast

There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts