Networking Flashcards

1
Q

When a key network administrator leaves a company, which of the following does the company depend on to continue to use the network?

A

Network documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the most common central device used today to connect computers to a network?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the most common adapter or connector used to connect a computer to a wired network?

A

Rj-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is used by a switch for increased performance ?

A

Full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is used to isolate a group of computer within an organization?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is used to create VLANs?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which zone is used to publish external websites for an organization?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which topology is the most redundant and the most expensive?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following standards describe CSMA/CD ?

A

802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which mechanism is used by wireless networks to access the network ?

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which model promises the most processing power?

A

Distributive computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which model uses a central database for authentication?

A

Client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A river directory runs which of the following types of servers ?

A

Network controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In which model does a each host have its own security database?

A

Peer to peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of communication is sent to a single designated host?

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is used to uniquely identify a host on a tcp/ip network ?

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the central device used in wireless LANs?

A

Wireless access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _________ is a single computer device that connects to a TCP/IP network.

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which mode is used to describe how data communication occurs between hosts?

A

OSI reference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which layer in the OSI model do MAC addresses and switches use?

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which layer in the OSI model covers routing between networks ?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which layer in the OSI model covers http, ftp, and RDC?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which layer of the OSI model is used to create a connection so that a host can transfer files?

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which layer of the OSI mode includes VLANs?

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which protocol is used as the transport protocol for a video application?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?

A

Well-known ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which layer in the OSI model is responsible for logging on and off?

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which layer in the OSI mode is used to encrypt data

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which layer in the OSI model includes the cable and network adapters ?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How many layers does the tcp/ip model have ?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which layer in the OSI model is included in the TCP/IP model?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which ports are defined above 49,151?

A

Dynamic ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A layer 3 switch is similar to a ______

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

TCP/IP and IPX/SPX are known as _________ stacks.

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Describe the advantage of using UDP over TCP

A

UDP has less overhead, which allows for faster performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following the most common cable used today?

A

UTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

If you are making a crossover cable and one end is 568A, which of the following should be the other end?

A

568B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

If you want to connect a computer directly to another computer without using a switch, you should use which of the following?

A

Crossover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

You need to connect a twisted pair cable to the back of a patch pane. Which of the following tools should be used?

A

Punch down tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is the minimum category of twisted pair cable necessary to support 100 mbps ?

A

Category 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

When you pick up your wireless phone, your computer drops network connectivity. Which of the following could be the cause of the problem?

A

(RFI)

Radio frequency interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

You are setting up a network within a warehouse using category 6 UTP. However, parts of the network are down because of the heavy machinery used. Which cable type should be used?

A

Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following terms is defined as electrical signAls jumping to another set of wires?

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which type of cable should be used as part of a fire code for a building?

A

Plenum rated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following is not a fiber connector ?

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is a characteristic of single mode fiber?

A

Single mode fiber supports longer distances than multi mode fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following is the maximum speed supported by 802.11b?

A

11 mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following is the maximum speed supported by 802.11g?

A

54 mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following is not a characteristic of 802.11n?

A

RFI protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following is the most secure encryption used in wireless networks?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following used to identify a wireless network ?

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

An ____ is used to test a cable.

A

Continuity tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

________ occurs when a signal degraded as it runs through a wire

A

Attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

For organizations, using ________ authentication for wireless networks is recommended

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following is the default subnet mask for a class B network?

A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

You manage a host with the address of 180.24.45.120. To which of the following classes will this be address be assigned ?

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

For IPv4, which class is used for multi casting?

A

Class D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following is the maximum number of hosts you can use for each subnet that belongs to a Class c address?

A

254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which type of address is 202.23.2.255?

A

Broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which type of address is used to send a single set of packets to multiple hosts?

A

Multi cast address

61
Q

Which of the following is not a private address?

A

200.23.34.120

62
Q

Which type of address is 169.254.32.23?

A

APIPA

63
Q

You manage a computer that cannot connect to a server. When you look at the IP configuration, the host has an address of 169.32.54.2. Which of the following statements best describes the issue?

A

The host cannot find a DHCP server

64
Q

Which of the following defines the nearest router for a host?

A

Default gateway

65
Q

Which server is used to translate host names to IP addresses?

A

DNS

66
Q

Which of the following used to remap private addresses to public addresses and back?

A

NAT

67
Q

Which of the following terms is used to describe a smaller network that is part of a larger network?

A

Subnet

68
Q

In a subnet mask of 255.255.240.0, which of the following is the CIDR notation?

A

/20

69
Q

How many Bits is an IPv6 address?

A

128

70
Q

Which type of address is 2001:4212:0000:34DB:0000:0000:0000:4231?

A

IPv6

71
Q

A ____________ address is assigned by DHCP server

A

Dynamic

72
Q

The loop back address is__________.

A

127.0.0.1

73
Q

Which command displays the IP address, subnet mask, and default gateway of the system you are currently on?

A

Ipconfig

74
Q

Which protocol is used by the ping command to test network connectivity?

A

ICMP

75
Q

Which command is used to clear the dns cache on a local system ?

A

Ipconfig/flushdns

76
Q

Which command is used to test a systems IPv4 protocol stack ?

A

Ping 127.0.0.1

77
Q

Which command is used to display active TCP or UDP connections ?

A

Netstat

78
Q

Which command is used to display NETbios over tcp/IP statistics?

A

Netstat

79
Q

Which command clears the NETBIOS name cache table?

A

Nbtstat- R

80
Q

Which command tests network connectivity while showing you each hop all the way?

A

Tracert

81
Q

Which command tests network connectivity while showing you each hop along the way and the degree of packet loss?

A

Path ping

82
Q

Which command is used to connect to a FTP server to download file?

A

FTP

83
Q

Which command is used to connect to a remote computer so that you can execute commands ?

A

Telnet

84
Q

Which command is used to connect to a mail server so that you can test SMTP?

A

Telnet

85
Q

Which command is used to display and modify the network configuration of a local computer?

A

Netsh

86
Q

Which command is used to add static routes to a windows computer?

A

Route

87
Q

________ displays the routing table on a local system

A

Local print

88
Q

___________ displays the MAC address on a system.

A

Ipconfig/all

89
Q

________retrieved or updated your DHCP assigned configuration.

A

Ipconfig/renew

90
Q

_____________ registers the computers name and IP address with the nearest DNS server.

A

Ipconfig/registerdns

91
Q

_________ displays Ethernet statistics.

A

Netstat -e

92
Q

Which protocol automatically configured IP configuration for a client?

A

DHCP

93
Q

Which of the following ports are used by DHCP?

A

67

94
Q

After you install DHCP server and configure and activate a scope, which of the following is the last step in installing a DHCP server?

A

Authorize the server

95
Q

You manage a computer with an address of 169.254.32.23 and a subnet mask of 255.255.0.0, yet you cannot connect to your local file servers. Which of the following best describes the problem?

A

The computer can not communicate with DHCP server

96
Q

Beginning with windows server 2008 R2, terminal services was renamed to which of the following ?

A

Remote Desktop services

97
Q

Which port is used by Remote Desktop services ?

A

3389

98
Q

Which of the following is a network service in Windows servers, including windows server 2012, windows server 2012 R2 and windows server 2016?

A

Microsoft RRAS

routing and remote access service

99
Q

Which protocol ok is used with L2TP to encrypt data ?

A

IPSec

Internet protocol security

100
Q

Which component of IPSec generates encryption and authentication keys ?

A

SA

security association

101
Q

Which IPSec component provides connectionless integrity and data authentication but does not provide confidentiality?

A

AH

Authentication header

102
Q

Which IPSec component provides the highest level of security, including confidentiality?

A

ESP

Encapsulating security payload provides the same services as ah But also provides confidentiality when sending data.

103
Q

Which port used by DNS?

A

53

104
Q

Which service on a windows network is used to translate between NETbios names/computer names and IP addresses?

A

WINS

105
Q

Which feature within windows allows the server to act as a router ?

A

IP forwarding

106
Q

The ________ is used to connect to a terminal server.

A

Remote Desktop connection

107
Q

_____________ provides name resolution between domain names and IP addresses.

A

DNS

108
Q

________ allows a user to connect to a corporate network using the internet.

A

VPN

109
Q

Which command reacquires IP configuration from a DHCP server?

A

Ipconfig/renew

110
Q

List the four steps a client uses to get an IP address from a DHCP server

A
  1. Discovery
  2. Offering
  3. Request
  4. Acknowledge
111
Q

Which routing protocol is the most popular distance- vector routing algorithm used to determine the best routes within a network?

A

RIP

routing information protocol

112
Q

Which routing protocol is the most popular link state protocol used within a large organization?

A

OSPF

open shortest path first

113
Q

Which technology breaks data into packets and sends it over a network, sometimes using different routes for each packet ?

A

Packet switching

114
Q

X.25 and frame relay are examples of what type of WAN technology?

A

Packet switching

115
Q

Which device acts as high speed modem for a LAN?

A

CSU/DSU

116
Q

Which of the following is used by X.25 as its DTE device?

A

PAD

117
Q

Which part the network is the point at which responsibility of the administrator ends and the telecommunications providers responsibility begins?

A

Demarc

118
Q

Which of the following statements best describes a characteristic of X.25?

A

All of the above

X.25 is a synchronous, digital transmission.

X.25 features full error and flow control

X.25 is considered legacy technology, which has been replaced by Less complex and faster technologies

119
Q

When a packet traverses a network, each other router is a ________

A

Hop

120
Q

When multiple circuits are connected to a site, the entire circuit is known as a________.

A

Virtual circuit

121
Q

Which of the following replaced x.25?

A

Frame relay

122
Q

At which of the following speeds does a T3 line run?

A

44.7 mbps

123
Q

In Europe, which circuit is similar to the T1 found in the United States ?

A

E1

124
Q

How many B channels are supported by an ISDN PRI?

A

23

125
Q

Which speed is used by FDDI?

A

100 mbps

126
Q

Which topology is used by FDDI?

A

Ring

127
Q

Which of the following is used to ensure that time sensitive packets are delivered promptly?

A

Quality of service

128
Q

Which technology uses wired from the telephone company to provide broadband internet connection ?

A

DSL

129
Q

______ is used to send packets from one network to another network.

A

Routing

130
Q

A __________ is a route that must be manually defined on each router.

A

Static route

131
Q

Which type of network can you set up so that your company can work securely with another organization that is separate from or lateral to your company ?

A

Extranet

132
Q

Which technology can you use temporarily to connect networks from two different companies ?

A

VPN

133
Q

Which VPN technology is the most common and the easiest to set up?

A

PPTP

Point to point tunneling protocol

134
Q

Which port is used by L2TP

A

1723

135
Q

Which type of firewall blocks packets based on files that are based on IP addresses or ports?

A

Packet filtering

136
Q

Which technology used in firewalls keeps tracks of conversations so that it knows what to allow back into a network?

A

Stateful packet inspection

137
Q

Which of the following acts as middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future?

A

Proxy server

138
Q

Which type of device used to detect malicious network activities and reports only those issues to the administrator?

A

NIDS

Network intrusion detection system

139
Q

Which type of device is designed to inspect traffic, detect malicious activities and take steps to mitigate the malicious activity?

A

NIPS

Network intrusion prevention system

140
Q

Which DMZ configuration uses on firewall with three interfaces?

A

Three-Leg perimeter configuration

141
Q

At which stage is the World Wide Web in?

A

2.0

142
Q

Which protocol is used with L2TP to provide encryption?

A

IPSec

143
Q

Which type of fire all works on the session layer that creates a connection and allows packets to flow between the two hosts without further checking?

A

Circuit level gateway

144
Q

Which type of firewall used to block access to certain websites or instant messengers?

A

Internet content filter

145
Q

When trying to protect your network, you should create your secure network based on __________

A

Layers

146
Q

The ____________ is the largest WAN in the world.

A

Internet

147
Q

An ________is the internal network for an organization.

A

Intranet

148
Q

Which port is used by PPTP?

A

1723

149
Q

Which device is used to protect one network from another by using filter packets ?

A

Firewall