Networking Flashcards
When a key network administrator leaves a company, which of the following does the company depend on to continue to use the network?
Network documentation
Which of the following is the most common central device used today to connect computers to a network?
Switch
Which of the following is the most common adapter or connector used to connect a computer to a wired network?
Rj-45
Which of the following is used by a switch for increased performance ?
Full duplex
Which of the following is used to isolate a group of computer within an organization?
VLAN
Which of the following is used to create VLANs?
Switch
Which zone is used to publish external websites for an organization?
DMZ
Which topology is the most redundant and the most expensive?
Mesh
Which of the following standards describe CSMA/CD ?
802.3
Which mechanism is used by wireless networks to access the network ?
CSMA/CA
Which model promises the most processing power?
Distributive computing
Which model uses a central database for authentication?
Client/server
A river directory runs which of the following types of servers ?
Network controller
In which model does a each host have its own security database?
Peer to peer
Which type of communication is sent to a single designated host?
Unicast
Which of the following is used to uniquely identify a host on a tcp/ip network ?
IP address
What is the central device used in wireless LANs?
Wireless access points
A _________ is a single computer device that connects to a TCP/IP network.
Host
Which mode is used to describe how data communication occurs between hosts?
OSI reference model
Which layer in the OSI model do MAC addresses and switches use?
Data link
Which layer in the OSI model covers routing between networks ?
Network
Which layer in the OSI model covers http, ftp, and RDC?
Application
Which layer of the OSI model is used to create a connection so that a host can transfer files?
Session
Which layer of the OSI mode includes VLANs?
Data link
Which protocol is used as the transport protocol for a video application?
UDP
Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?
Well-known ports
Which layer in the OSI model is responsible for logging on and off?
Session
Which layer in the OSI mode is used to encrypt data
Presentation
Which layer in the OSI model includes the cable and network adapters ?
Physical
How many layers does the tcp/ip model have ?
4
Which layer in the OSI model is included in the TCP/IP model?
Transport
Which ports are defined above 49,151?
Dynamic ports
A layer 3 switch is similar to a ______
Router
TCP/IP and IPX/SPX are known as _________ stacks.
Protocol
Describe the advantage of using UDP over TCP
UDP has less overhead, which allows for faster performance
Which of the following the most common cable used today?
UTP
If you are making a crossover cable and one end is 568A, which of the following should be the other end?
568B
If you want to connect a computer directly to another computer without using a switch, you should use which of the following?
Crossover cable
You need to connect a twisted pair cable to the back of a patch pane. Which of the following tools should be used?
Punch down tool
Which of the following is the minimum category of twisted pair cable necessary to support 100 mbps ?
Category 5
When you pick up your wireless phone, your computer drops network connectivity. Which of the following could be the cause of the problem?
(RFI)
Radio frequency interference
You are setting up a network within a warehouse using category 6 UTP. However, parts of the network are down because of the heavy machinery used. Which cable type should be used?
Fiber
Which of the following terms is defined as electrical signAls jumping to another set of wires?
Crosstalk
Which type of cable should be used as part of a fire code for a building?
Plenum rated
Which of the following is not a fiber connector ?
RJ-45
Which of the following is a characteristic of single mode fiber?
Single mode fiber supports longer distances than multi mode fiber
Which of the following is the maximum speed supported by 802.11b?
11 mbps
Which of the following is the maximum speed supported by 802.11g?
54 mbps
Which of the following is not a characteristic of 802.11n?
RFI protection
Which of the following is the most secure encryption used in wireless networks?
WPA2
Which of the following used to identify a wireless network ?
SSID
An ____ is used to test a cable.
Continuity tester
________ occurs when a signal degraded as it runs through a wire
Attenuation
For organizations, using ________ authentication for wireless networks is recommended
802.1x
Which of the following is the default subnet mask for a class B network?
255.255.0.0
You manage a host with the address of 180.24.45.120. To which of the following classes will this be address be assigned ?
Class B
For IPv4, which class is used for multi casting?
Class D
Which of the following is the maximum number of hosts you can use for each subnet that belongs to a Class c address?
254
Which type of address is 202.23.2.255?
Broadcast address
Which type of address is used to send a single set of packets to multiple hosts?
Multi cast address
Which of the following is not a private address?
200.23.34.120
Which type of address is 169.254.32.23?
APIPA
You manage a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of 169.32.54.2. Which of the following statements best describes the issue?
The host cannot find a DHCP server
Which of the following defines the nearest router for a host?
Default gateway
Which server is used to translate host names to IP addresses?
DNS
Which of the following used to remap private addresses to public addresses and back?
NAT
Which of the following terms is used to describe a smaller network that is part of a larger network?
Subnet
In a subnet mask of 255.255.240.0, which of the following is the CIDR notation?
/20
How many Bits is an IPv6 address?
128
Which type of address is 2001:4212:0000:34DB:0000:0000:0000:4231?
IPv6
A ____________ address is assigned by DHCP server
Dynamic
The loop back address is__________.
127.0.0.1
Which command displays the IP address, subnet mask, and default gateway of the system you are currently on?
Ipconfig
Which protocol is used by the ping command to test network connectivity?
ICMP
Which command is used to clear the dns cache on a local system ?
Ipconfig/flushdns
Which command is used to test a systems IPv4 protocol stack ?
Ping 127.0.0.1
Which command is used to display active TCP or UDP connections ?
Netstat
Which command is used to display NETbios over tcp/IP statistics?
Netstat
Which command clears the NETBIOS name cache table?
Nbtstat- R
Which command tests network connectivity while showing you each hop all the way?
Tracert
Which command tests network connectivity while showing you each hop along the way and the degree of packet loss?
Path ping
Which command is used to connect to a FTP server to download file?
FTP
Which command is used to connect to a remote computer so that you can execute commands ?
Telnet
Which command is used to connect to a mail server so that you can test SMTP?
Telnet
Which command is used to display and modify the network configuration of a local computer?
Netsh
Which command is used to add static routes to a windows computer?
Route
________ displays the routing table on a local system
Local print
___________ displays the MAC address on a system.
Ipconfig/all
________retrieved or updated your DHCP assigned configuration.
Ipconfig/renew
_____________ registers the computers name and IP address with the nearest DNS server.
Ipconfig/registerdns
_________ displays Ethernet statistics.
Netstat -e
Which protocol automatically configured IP configuration for a client?
DHCP
Which of the following ports are used by DHCP?
67
After you install DHCP server and configure and activate a scope, which of the following is the last step in installing a DHCP server?
Authorize the server
You manage a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. Which of the following best describes the problem?
The computer can not communicate with DHCP server
Beginning with windows server 2008 R2, terminal services was renamed to which of the following ?
Remote Desktop services
Which port is used by Remote Desktop services ?
3389
Which of the following is a network service in Windows servers, including windows server 2012, windows server 2012 R2 and windows server 2016?
Microsoft RRAS
routing and remote access service
Which protocol ok is used with L2TP to encrypt data ?
IPSec
Internet protocol security
Which component of IPSec generates encryption and authentication keys ?
SA
security association
Which IPSec component provides connectionless integrity and data authentication but does not provide confidentiality?
AH
Authentication header
Which IPSec component provides the highest level of security, including confidentiality?
ESP
Encapsulating security payload provides the same services as ah But also provides confidentiality when sending data.
Which port used by DNS?
53
Which service on a windows network is used to translate between NETbios names/computer names and IP addresses?
WINS
Which feature within windows allows the server to act as a router ?
IP forwarding
The ________ is used to connect to a terminal server.
Remote Desktop connection
_____________ provides name resolution between domain names and IP addresses.
DNS
________ allows a user to connect to a corporate network using the internet.
VPN
Which command reacquires IP configuration from a DHCP server?
Ipconfig/renew
List the four steps a client uses to get an IP address from a DHCP server
- Discovery
- Offering
- Request
- Acknowledge
Which routing protocol is the most popular distance- vector routing algorithm used to determine the best routes within a network?
RIP
routing information protocol
Which routing protocol is the most popular link state protocol used within a large organization?
OSPF
open shortest path first
Which technology breaks data into packets and sends it over a network, sometimes using different routes for each packet ?
Packet switching
X.25 and frame relay are examples of what type of WAN technology?
Packet switching
Which device acts as high speed modem for a LAN?
CSU/DSU
Which of the following is used by X.25 as its DTE device?
PAD
Which part the network is the point at which responsibility of the administrator ends and the telecommunications providers responsibility begins?
Demarc
Which of the following statements best describes a characteristic of X.25?
All of the above
X.25 is a synchronous, digital transmission.
X.25 features full error and flow control
X.25 is considered legacy technology, which has been replaced by Less complex and faster technologies
When a packet traverses a network, each other router is a ________
Hop
When multiple circuits are connected to a site, the entire circuit is known as a________.
Virtual circuit
Which of the following replaced x.25?
Frame relay
At which of the following speeds does a T3 line run?
44.7 mbps
In Europe, which circuit is similar to the T1 found in the United States ?
E1
How many B channels are supported by an ISDN PRI?
23
Which speed is used by FDDI?
100 mbps
Which topology is used by FDDI?
Ring
Which of the following is used to ensure that time sensitive packets are delivered promptly?
Quality of service
Which technology uses wired from the telephone company to provide broadband internet connection ?
DSL
______ is used to send packets from one network to another network.
Routing
A __________ is a route that must be manually defined on each router.
Static route
Which type of network can you set up so that your company can work securely with another organization that is separate from or lateral to your company ?
Extranet
Which technology can you use temporarily to connect networks from two different companies ?
VPN
Which VPN technology is the most common and the easiest to set up?
PPTP
Point to point tunneling protocol
Which port is used by L2TP
1723
Which type of firewall blocks packets based on files that are based on IP addresses or ports?
Packet filtering
Which technology used in firewalls keeps tracks of conversations so that it knows what to allow back into a network?
Stateful packet inspection
Which of the following acts as middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future?
Proxy server
Which type of device used to detect malicious network activities and reports only those issues to the administrator?
NIDS
Network intrusion detection system
Which type of device is designed to inspect traffic, detect malicious activities and take steps to mitigate the malicious activity?
NIPS
Network intrusion prevention system
Which DMZ configuration uses on firewall with three interfaces?
Three-Leg perimeter configuration
At which stage is the World Wide Web in?
2.0
Which protocol is used with L2TP to provide encryption?
IPSec
Which type of fire all works on the session layer that creates a connection and allows packets to flow between the two hosts without further checking?
Circuit level gateway
Which type of firewall used to block access to certain websites or instant messengers?
Internet content filter
When trying to protect your network, you should create your secure network based on __________
Layers
The ____________ is the largest WAN in the world.
Internet
An ________is the internal network for an organization.
Intranet
Which port is used by PPTP?
1723
Which device is used to protect one network from another by using filter packets ?
Firewall