Semester Exam Flashcards
To reduce fire hazards, most city ordinances require the use of __________ cable for network installations.
plenum
Which type of cable works best for long-distance transmissions?
Fiber-optic
Which topology provides fault tolerance?
Star
What is the most common use of coaxial cable in networking today?
Connecting a cable modem to an Internet Service Provider (ISP)
Which IEEE committee sets the standards for networking?
IEEE 802
How many layers does the OSI model contain?
7
Which connector is used for UTP cabling on a network?
RJ-45
Which of the following is a broadcast MAC address?
FF-FF-FF-FF-FF-FF
How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?
Two
Which TCP/IP model layer uses connection-oriented protocols?
Transport
What is the maximum speed at which 10BaseT Ethernet networks communicate?
10 Mbps
What kind of cabling does the 10BaseFL standard specify?
Fiber-optic
What basis do bridges use to determine whether to forward traffic?
MAC addresses
An Ethernet network using an Ethernet switch minimizes or avoids which events?
Collisions
What type of fiber-optic cabling and connectors does a 100BaseFX network use?
Multimode with ST or SC connectors
Including the preamble, how many basic pieces of information does an Ethernet frame contain?
Seven
The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.
switch
What information would be included in the data portion of an Ethernet frame on an IP network?
The IP addresses of the sending and receiving systems
What is the maximum cable length on a segment of a 1000BaseT network?
100 meters
How many pins does an RJ-45 connector have?
Eight
What is the most common connector used in a 1000BaseSX network?
LC
Which switch and network equipment modular connectors have replaced gigabit interface converters (GBICs) as the modular connector of choice?
Small form-factor pluggable (SFP)
Which standard specifies multimode cabling?
10BaseFL
What is an acceptable maximum collision rate on a properly running Ethernet network?
Ten percent
What command would you run from a Windows command line to test a computer’s network stack?
ping 127.0.0.1
Which characteristic applies to stranded core cabling?
Stranded core contains a bundle of tiny wire strands.
To what layer of the OSI model does the TCP/IP model’s Internet layer correspond?
Network
Which protocol is connection-oriented?
TCP
Which port is used to receive e-mail messages from e-mail servers (POP3)?
110
How many binary digits are in an IPv4 address?
32
How long is a subnet mask?
32 bits
If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?
Class B
Which unit is used to measure signal loss in networking?
Decibel (dB)
What is the maximum number of hosts you may have on a network if the first decimal value of the IP address is between 192 and 223 and the subnet mask is 255.255.255.0?
254
What type of connector is used by all UTP Ethernet NICs?
RJ-45
What is the default subnet mask for a Class C network?
255.255.255.0
Suppose your network subnet mask is 255.255.0.0. What is the maximum number of host IDs available for this network?
65,534
Which NIC light turns on when the card detects network traffic and intermittently flickers when operating properly?
Activity light
Which subnet mask is an example of classless subnetting?
255.255.240.0
Which tool automatically assigns an IP address whenever a computer connects to the network?
DHCP
What is the range of decimal values in each of the four groups of an IPv4 address?
0 to 255
What is the norm today for the number of pairs in UTP cabling?
Four
Which protocol uses TCP as its transport layer protocol?
HTTP
What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?
90 meters
Which condition specifically applies to UTP cabling?
Electromagnetic interference
What are you trying to discover when you test a cable for continuity?
A broken wire
Which task is performed by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers?
Classless Inter-Domain Routing (CIDR)
The decimal value 151 converts to what binary value?
10010111
Which of the following is a designated private IP address?
10.164.19.5
Which port do Web servers use?
80
Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?
Dynamic NAT
Which type of port has a number in the 1024 to 49151 range?
Registered port
Which term refers to ports in the 49152 to 65535 range?
Dynamic port
Which column in a routing table tells the router which of its ports to use?
Interface
Two computers first acknowledges the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process?
Connection-oriented
Which protocol is by far the most common type of session on a typical TCP/IP network?
TCP
On a TCP/IP network, a router determines where an incoming packet should go by looking at the packet’s __________.
destination IP addresses
At which layer of the OSI model do routers work?
Network
Which form of NAT typically handles the one-to-many connections?
Port Address Translation (PAT)
What name is given to the port numbers in the range of 0 to 1023?
Well-known port numbers
Your company has a single server on the private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?
Port forwarding
__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.
Static NAT
Which term refers to the passage of a packet through a router?
Hop
Which term refers to another name for a session?
Connection
Which routing metric refers to the ability of a connection to handle more data than others?
Bandwidth
Which term defines a number used by the operating system to track all the running programs?
Process ID (PID)
Google Chrome and Mozilla Firefox are examples of __________ applications.
Web client
Which protocol enables you to control a remote computer from a local computer over a network?
Telnet
Which protocol is used to send e-mail over TCP port 25 and is used by clients to send messages?
SMTP
What is the name of the proprietary cable designed by Cisco for connecting to their routers?
Yost
Which tool records the route between any two hosts on a network and can be used to troubleshoot routing problems?
traceroute
Which of the following was developed as a secure replacement for Telnet?
Secure Shell (SSH
Which organization has the authority to create new top-level domain names?
ICANN
Which layer of the OSI model is a common place for encryption using proprietary encryption devices?
Layer 2
Which term refers to a standardized type of digital signature that includes the digital signature of a third party?
Certificate
In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?
Host.domain.root
Which authentication method is the most common authentication method for dial-up connections?
MS-CHAPv2
Within the DNS hierarchy, which term refers to the DNS servers just below the DNS root?
Top-level domain servers
Which type of encryption is the most popular form of e-mail encryption?
Public-key cryptography
Which term describes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?
Hash
Which characters are not permitted in a DNS domain or host name?
Spaces
Which term defines what an authenticated person can do with data?
Authorization
What term best describes the way the DNS name space is organized?
Hierarchical
What UDP port do DNS servers primarily use?
53
Which type of algorithm is used when two different keys are used in encryption?
Asymmetric-key
Which zone files are the most important part of any DNS server?
Forward lookup zones
Which organization is the biggest player in the certificate authority market?
VeriSign
What enables a system to determine an FQDN by knowing the IP address?
Reverse lookup zones
Which authentication method is the most popular form of authentication used in wireless networks today?
EAP-PSK (Personal Shared Key)
EAP is not a protocol in the classic sense, but rather, it is a PPP __________ that EAP-compliant applications can use to accept one of many types of authentication.
wrapper
In comparing the DNS name space to a computer’s file system, a domain is like __________.
a folder
Which protocol is the tool programs use to query and change a database used by the network?
LDAP
How is the address 127.0.0.1 listed in the hosts file?
localhost
Which term refers to the result of running cleartext through a cipher algorithm using a key?
Ciphertext
Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?
Active Directory
Which block cipher is used by most TCP/IP applications?
Advanced Encryption Standard (AES)
What potential problem does a browser look for after it receives a certificate from a secure HTTP site?
Revoked certificate
Which term describes an SSH-enabled program?
Secure Copy Protocol (SCP)
Which of the following would confirm that you have a DNS problem?
Ping works with the IP address but not with the Web site name.
Which term refers to a cipher’s underlying mathematical formula?
Algorithm