Networking for AV Flashcards

1
Q

____ are the devices that send and receive data. This can be a computer, a mobile device, a video server, a projector, a control panel, or some other electronic system capable of sharing data.

A

Nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ are the means by which data travels from one node to another. They can be any signal-transmission medium: radio frequency, copper cabling, light, and so on.

A

Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____ can consist of anything that is interconnected in a netlike manner or that is linked together to pass information.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ____ sends data in a continuous stream. No other devices can use the channel while the connection is active.

A

circuit-switched network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ allow several nodes to send information on the same channel at the same time.

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If a piece of computer hardware does nothing but provide services, that computer is called a ____.

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The term ____ can also refer to a program that runs on a computer alongside other programs.

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a client-server network architecture, a ____ provides services to dependent ____.

A

server / nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A computer whose only task is to perform a particular service is known as a ____ server. This type of server offers only one service.

A

thin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A(n) ____ is an interface that allows you to connect a device to a network.

A

network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) ____ address is the actual hardware address, or number, of your NIC device. Every device has this globally unique address that identifies its connection on the network.

A

media access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A(n) ____ provides a physical connection between multiple devices. As each device is connected, this device collects and stores its MAC address.

A

network switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ switches have no configuration options; you just plug in a device, and it connects.

A

Unmanaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ switches allow the network technician to adjust port speeds, set up virtual local area networks (VLANs), configure quality of service, monitor traffic, and so on.

A

Managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A(n) ____ forwards data between devices that are not directly physically connected. They mark the border between a local area network (LAN) and a wide area network (WAN).

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is a router that connects a private network to outside networks. All data that travels to the Internet must pass through this device.

A

gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

For local area network connections, the three most common physical transmission methods are as follows:

A
  • Over copper, as voltage
  • Over glass, as visible light
  • Over air, as radio frequencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ is a glass medium used for transmitting modulated light from point A to point B.

A

Optical fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

There are two modes, or paths of light, behind optical fiber, known as ____ and ____.

A

single-mode and multimode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network data can typically travel farther over ____ optical fiber cabling.

A

single-mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Optical fiber cable connectors.

The ____ can be found on transmitter-receiver equipment and is similar to the Bayonet Neill-Concelman (BNC) connector, meaning that all you have to do is “stab and twist” to lock it into place, which keeps the optical fiber and ferrule from rotating during connection. This connector can be used on both single-mode and multimode fiber.

A. ST connector
B. LC connector
C. SC connector
D. LT connector

A

A. ST connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Optical fiber cable connectors.

The ____ is much smaller in diameter than the ST and is used for basic wiring applications. It has low loss qualities and is known as a “push, pull” connector.

A. ST connector
B. LC connector
C. SC connector
D. LT connector

A

B. LC connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Optical fiber cable connectors.

The ____ is larger in diameter than the LC. It is a “stab and click” connector, which means that when the connector is pushed in or pulled out, there is an audible click because of the attachment lock. This connector is useful for tight spaces.

A. ST connector
B. LC connector
C. SC connector
D. LT connector

A

C. SC connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The wireless connection known as Wi-Fi is defined by the _____ standard and has been revised several times to keep up with the growing demands for wireless communication.

A

Institute of Electrical and Electronics Engineers (IEEE) 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The speed of a Wi-Fi connection depends on the ____ signal strength and the revision of 802.11 with which you connect.

A

radio frequency (RF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The ____ model provides a mental map for the transfer of data across a network.

A

Open Systems Interconnection (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

OSI stands for _____.

A

Open Systems Interconnection (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The OSI Model Layers 1–3, known as the ____, define hardware-oriented functions such as routing, switching, and cable specifications. These are the areas that most concern AV professionals because they’re the ones that affect us directly.

A

media layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The OSI Model Layers 4–7, known as the ____, define the software that implements network services. Each layer contains a broad set of protocols and standards that regulate a certain portion of the data transfer process.

A

host layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The OSI model is broken down into seven layers:

_____ (named Physical layer) is the physical layer. The devices need to be plugged in to work. The physical layer can be copper, optical fiber, and, yes, even RF (because it requires a signal that needs to be received). The physical layer sends and receives electrons, light, or electromagnetic flux.

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
A

A. Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The OSI model is broken down into seven layers:

____ (named Data Link layer) is the interface to the physical layer; it uses frames of information to talk back and forth. The addressing scheme is MAC addresses. One MAC address talks to another MAC address. Switches use this layer to send and receive frames.

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
A

B. Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The OSI model is broken down into seven layers:

____ (named Network layer) is packet-based. Packets “ride” inside layer 2 frames. This layer adds IP addressing. Routers can send, receive, and route IP addresses.

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
A

C. Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The OSI model is broken down into seven layers:

____ (named Transport layer) works with ports. Ports are generally associated with firewalls. These ports are virtual ports and can be found at the end of an IP address such as 192.168.1.35:80. The :80 is the port number.

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
A

D. Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The OSI model is broken down into seven layers:

____ ( named Session layer) controls (starts, stops, monitors, and keeps track of ) layers 4 and 3. For example, Real Time Streaming Protocol (RTSP) keeps track of the User Datagram Protocol (UDP) layer 3 traffic. It keeps track of whether the data makes it to the far end. UDP can’t do that on its own; it needs a session protocol to do the work for it.

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
A

E. Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The OSI model is broken down into seven layers:

____ (named Presentation layer) opens up or transcodes between the session and the application. It is a kind of go-between. Data encryption and decryption are at this layer as well. An application can’t talk data directly; it needs an interpreter, and this is it.

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
A

F. Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The OSI model is broken down into seven layers:

____ (named Application layer) is the application layer or the layer with which the human interacts. Using the streaming example, it is Windows Media Player. The application has the controls to manipulate the output of audio and video. It takes all the layers for a player application to retrieve the stream and play it on your desktop.

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
A

G. Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Port __ is generally associated with web or Hypertext Transfer Protocol (HTTP) traffic.

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This simple mnemonic can help you remember the names of all the layers of the OSI model, from one to seven: ____ ____ ____ ____ ____ ____ ____.

A

Please Do Not Throw Sausage Pizza Away.

  • Physical
  • Data Link
  • Network
  • Transport
  • Session
  • Presentation
  • Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Network ____ helps to determine how far data must travel to reach its destination, or how many devices data has to pass through to reach its destination.

A

topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The ____ network topology is the “way it is wired” or how it is connected together. It maps the placement of each network device and the cable installation path.

A. application
B. physical
C. session
D. logical

A

B. physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The ____ network topology depicts electrical routing and control of data. It is how you manage the data routes or the flow of data within a network.

A. application
B. physical
C. session
D. logical

A

D. logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How many devices data has to pass through before it gets to its destination is known as network _____.

A

hops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Many real-time AV protocols have a limited number of allowable hops, usually fewer than ____.

A

ten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

As a best practice, no more than __ devices should be affected by any one single point of failure.

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

_____ networks use physical addresses to communicate.

A

Local area networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The LAN’s physical address is the ____, hard-coded into each node.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Local Area Network Topologies

In a ____, all nodes connect to a central point, such as a router, switch, or hub. They are hierarchical. Each node has access to the other nodes through the central point. If any one node fails, information still flows. The central device is a single point of failure; if it fails, communication stops.

A. star topology
B. extended star topology
C. mesh topology
D. partial mesh topology

A

A. star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Local Area Network Topologies

In a ____, if any device fails, access to the devices below is cut off, but the rest of the network continues to work. The central device remains a single point of failure; if it fails, communication stops.

A. star topology
B. extended star topology
C. mesh topology
D. partial mesh topology

A

B. extended star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Local Area Network Topologies

In a ____, each node connects to every other node. They provide fast communication and excellent redundancy, ensuring that the failure of no one device can bring down the whole network. Providing physical connections between every device is really expensive, though. They are rare.

A. star topology
B. extended star topology
C. mesh topology
D. partial mesh topology

A

C. mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Local Area Network Topologies

In a ____, each node connects to several other nodes, but not all. They provide good redundancy, ensuring that several devices must fail at the same time before communications cease.

A. star topology
B. extended star topology
C. mesh topology
D. partial mesh topology

A

D. partial mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

When IP data is sent across a LAN, it is encapsulated inside a(n) ____.

A

Ethernet frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The type, or speed, a device sends out depends on the capability of its _____.

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

As a general rule, you need a ____ technology to aggregate multiple ____ links.

A. slower / faster
B. faster / slower

A

B. faster / slower

54
Q

10 Mbps Ethernet is sometimes referred to as ____ Ethernet.

A

Classic

55
Q

100 Mbps Ethernet is sometimes referred to as ____ Ethernet.

A

Fast

56
Q

1 Gbps Ethernet is sometimes referred to as ____ Ethernet.

A

Gigabit

57
Q

All networked devices send out occasional administrative messages, called ____ messages, that go to every other device on the LAN.

A

broadcast

58
Q

A(n) ____ isolates devices on a LAN from other devices connected to the network, shutting out their broadcast traffic.

A

virtual local area network (VLAN)

59
Q

When the switch forwards data from a device in a VLAN, it adds the VLAN ____ to the Ethernet frame.

A

identifier

60
Q

Traffic in and out of a VLAN has to go through a ____.

A

router

61
Q

If you determine that a system should be segregated on a VLAN, for either its own good or that of the network, you’ll need to provide the network manager with the following information: ____, ____, ____.

A
  • What VLAN you want to create and why (for example, “I want to create an IPTV VLAN so that the network isn’t flooded with streaming video traffic”)
  • Which devices should be included in the VLAN

• Whether any routing between the VLAN and other network locations is required
or allowed

62
Q

A ____ network is a network that connects one or more LANs together.

A

wide area network (WAN)

63
Q

Many networked AV protocols can travel over WANs.

A True
B. False

A

B. False

64
Q

Why can’t networked AV protocols travel over WANs?

A

Speed. WANs are generally slower than LANs.

65
Q

Wide Area Network Topologies

In a ____ WAN, each LAN connects to a central location. For example, several branch offices may connect to a corporate headquarters.

A. hub-and-spoke
B. star
C. common carrier
D. mesh

A

A. hub-and-spoke

66
Q

Wide Area Network Topologies

In a ____ WAN, each LAN site runs a spoke to an ISP backbone.

A. hub-and-spoke
B. star
C. common carrier
D. mesh

A

C. common carrier

67
Q

Wide Area Network Topologies

In a ____ WAN, every LAN connects to every other LAN. This provides excellent redundancy.

A. hub-and-spoke
B. star
C. common carrier
D. mesh

A

D. mesh

68
Q

A ____ uses the Internet to create a tunnel between two or more LANs. They are also used to create virtual WANs and for remote monitoring, troubleshooting, and control.

A

Virtual Private Network (VPN)

69
Q

Layer 2 Tunneling Protocol has the following characteristics:

A
  • Client devices must have client software installed.
  • It can transport both IP and non-IP data.
  • It monitors data integrity, authenticates data origin, and protects against data “capture and replay.”
  • It can introduce significant latency.
  • It is not commonly used in newer systems.
70
Q

IPSec stands for ____.

A

Internet Protocol Security (IPSec)

71
Q

Internet Protocol Security (IPSec) has the following characteristics:

A
  • Client devices must have client software installed.
  • It is an IP-based protocol, and it provides security for any IP transport protocol (TCP, UDP, Internet Control Message Protocol [ICMP], and so on).
  • It can authenticate and encrypt, or just authenticate, based on need.

• It assigns remote devices an internal address upon connection, making them
effectively on the LAN.

  • Remote clients have access to the same devices and resources they would on-premise.
  • Client software may manage clients by requiring them to have antivirus software or a host-based firewall.
  • It is commonly used for site-to-site connections.
72
Q

SSL stands for ____.

A

Secure Sockets Layer (SSL)

73
Q

Secure Sockets Layer (SSL) has the following characteristics:

A
  • No client software is needed—the client accesses the VPN via a web browser.
  • It requires a dedicated SSL VPN server.
  • It’s an IP-based protocol (TCP only).
  • It does not require an internal address.
  • It acts as a proxy allowing only authorized users to access only approved resources; access can be configured on an individual user basis.
  • It’s common for mobile user–to-site connections.
74
Q

A(n) ____ is the logical address that allows devices to locate each other anywhere in the world, no matter where they are physically.

A

IP address

75
Q

An IP address requires three distinct components.

A
  • Network identifier bits
  • Host identifier bits
  • Subnet mask
76
Q

IP address components

These bits identify the network. They help the IP packet find its destination LAN. They are always the first digits in an IP address.

A. Network identifier bits
B. Host identifier bits
C. Subnet mask

A

A. Network identifier bits

77
Q

IP address components

These bits identify a specific node. They help the
IP packet find its actual destination device. They are always the last bits or least significant bits in a network address.

A. Network identifier bits
B. Host identifier bits
C. Subnet mask

A

B. Host identifier bits

78
Q

IP address components

These bits tell you which bits in the IP address are the network bits and which bits are the host bits. They also reveal the size of the network. It is a separate address that must be included with the IP address.

A. Network identifier bits
B. Host identifier bits
C. Subnet mask

A

C. Subnet mask

79
Q

An IPv4 address consists of four, 8-bit groups, or ____.

A

bytes

80
Q

To interpret any IPv4 address, you need a separate 32-bit number called a ____.

A

subnet mask

81
Q

____ notation is just a slash, followed by a number. The number tells you how many of the address bits are network bits (any remaining bits are host bits).

A

Classless Inter-Domain Routing (CIDR)

82
Q

In a /18 network, how many bits are network bits and how many bits are host bits?

A

18 network bits

14 host bits

Written in binary

11111111 11111111 11000000 00000000

83
Q

10.0.0.0

A. Class A
B. Class B
C. Class C

A

A. Class A

84
Q

172.16.0.0 to 172.31.0.0

A. Class A
B. Class B
C. Class C

A

B. Class B

85
Q

192.168.0.0

A. Class A
B. Class B
C. Class C

A

C. Class C

86
Q

The major advantage of private network addresses is that they are reusable.

A. True
B. Flase

A

A. True

87
Q

Global, or public, IP addresses have to be unique.

A. True
B. False

A

A. True

88
Q

Private IP addresses can access the internet.

A. Ture
B. False

A

B. False

89
Q

____ is any method of altering IP address information in IP packet headers as the packet traverses a routing device. Its purpose is to resolve private IP addresses to public IP addresses, and vice versa, so that devices with private addresses can send data across the Internet.

A

Network Address Translation (NAT)

90
Q

A ____ address is a special address used for testing devices.

A

loopback

91
Q

The loopback address is also known as the ____.

A

localhost

92
Q

____ divides a network into smaller networks.

A

Subnetting

93
Q

For devices to communicate directly by Ethernet or belong to the same VLAN, they have to be in the same ____.

A

subnet

94
Q

A 192.168.1.x network has ___ possible unique address, but only ___ addresses that can be assigned.

A

256 / 254

95
Q

In a 192.168.1.x network, the first address (192.168.1.0), or slot, is the ____ address.

A

network

96
Q

In a 192.168.1.x network, the last address (182.168.1.255), or slot, is the ____ address.

A

broadcast

97
Q

There are two ways for a device to get an IP address, ____ or ____.

A

manual (static) or automatic (dynamic)

98
Q

You need at least three pieces of information to manually assign an IP address:

A
  • Device’s MAC address
  • IP Address
  • Subnet Mask
99
Q

_____ is an IP addressing scheme that allows network administrators to automate address assignment.

A

Dynamic Host Configuration Protocol (DHCP)

100
Q

DHCP stands for _____.

A

Dynamic Host Configuration Protocol

101
Q

On a DHCP network, after the ____ time has expired, the address may be assigned to another device.

A

lease

102
Q

The size of the DHCP address pool depends on three factors:

A
  • Size of the subnet the device is connecting to
  • Number of addresses already in use
  • Number of addresses reserved for another purpose
103
Q

____ is a method of establishing static addresses on a DHCP server.

A

Reserve Dynamic Host Configuration Protocol (DHCP)

104
Q

With Reserve DHCP, a network administrator takes the device’s ____ and associates it with an IP address from within the DHCP pool on the DHCP server.

A

MAC address

105
Q

____ automatically assigns locally routable addresses from the reserved network 169.254.0.0/16 to devices that do not have or cannot obtain an IP address.

A

Automatic Private IP Addressing (APIPA)

106
Q

APIPA stands for _____.

A

Automatic Private IP Addressing (APIPA)

107
Q

Automatic Private IP Addressing (APIPA) is also referred to as a ____ address.

A

link-local

108
Q

Automatic Private IP Addressing (APIPA) operates on the ___ layer of the OSI model.

A

Network (layer 3)

109
Q

At the Data Link layer, devices are uniquely identified by their ____.

A

MAC addresses

110
Q

At the Network layer, devices are uniquely identified by their ____.

A

IP addresses

111
Q

A ____ is a hierarchical, distributed database that maps names to data such as IP addresses.

A

Domain Name System (DNS)

112
Q

The goal of the DNS is to translate, or ____, a name into a specific IP address.

A

resolve

113
Q

DNS is known as a ____ database. No one device has to keep track of all the names and IP addresses on the Internet. That information is distributed across all the DNS servers on the network.

A

distributed

114
Q

_____ links and synchronizes the DHCP and DNS servers. Whenever a device’s address changes, it automatically updates the DNS server with the new address.

A

Dynamic DNS (DDNS)

115
Q

In the lower layers of the OSI model, each layer carries the layer above it. Physical layer technologies (layer 1) carry Ethernet frames (layer 2), which carry IP packets (layer 3). This is called _____.

A

encapsulation

116
Q

Transport layer protocols are not encapsulated inside IP packets. Instead, Transport layer protocols fragment IP packets into smaller chunks that fall within the maximum transmission unit (MTU) of the network connection. This process is known as ____.

A

segmentation

117
Q

____ is a connection-oriented, reliable Transport layer protocol. It uses two-way communication to provide guaranteed delivery of information to a remote host. It is reliable because it tracks each packet and ensures that it arrives intact.

A

Transmission Control Protocol (TCP)

118
Q

____ is the most common transport protocol for sending data across the Internet.

A

Transmission Control Protocol (TCP)

119
Q

TCP stands for ____.

A

Transmission Control Protocol (TCP)

120
Q

____ is a connectionless, unacknowledged Transport layer protocol. It begins sending data without attempting to verify the origin device’s connection to the destination device and continues sending data packets without waiting for any acknowledgment of receipt. It is designed to transmit information when timing is more important than missing packets.

A

Universal Datagram Protocol (UDP)

121
Q

____ is used for streaming audio and video.

A. TCP
B. UDP

A

B. UDP

122
Q

____ transport is used when the guaranteed delivery and accuracy or quality of the data being sent are most important, such as when sending control signals.

A. TCP
B. UDP

A

A. TCP

123
Q

____ transport is used when speed and continuity are most important, such as during any real-time communications.

A. TCP
B. UDP

A

B. UDP

124
Q

UDP stands for _____.

A

Universal Datagram Protocol (UDP)

125
Q

A ____ indicates to the server what you want the data to do. Many are permanently assigned by the IANA to standardized, well-known services.

A

port number

126
Q

____ ports, 0 to 1023, are assigned to standards-track protocols. These are also known as well-known ports.

A. Static Ports
B. System Ports
C. Dynamic Ports
D. User Ports

A

B. System Ports

127
Q

____ ports, 1024 to 49151, are assigned by IANA upon request from an application developer.

A. Static Ports
B. System Ports
C. Dynamic Ports
D. User Ports

A

D. User Ports

128
Q

____ ports, 49152 to 65535, cannot be assigned or reserved. Applications can use any that are available on the local host.

A. Static Ports
B. System Ports
C. Dynamic Ports
D. User Ports

A

C. Dynamic Ports

129
Q

Audio Video Bridging/Time-Sensitive Networking, EtherSound, Cobranet, Dante, and HDBaseT are layer __ protocols.

A

layer 2

130
Q

AV streaming protocols require a minimum data throughput of ____.

A. 1 Gbps
B. 10 Gbps
C. 100 Mbps
D. 10 Mbps

A

C. 100 Mbps