Semester Exam Flashcards

1
Q

To reduce fire hazards, most city ordinances require the use of __________ cable for network installations.

A

plenum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of cable works best for long-distance transmissions?

A

Fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which topology provides fault tolerance?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common use of coaxial cable in networking today?

A

Connecting a cable modem to an Internet Service Provider (ISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which IEEE committee sets the standards for networking?

A

IEEE 802

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many layers does the OSI model contain?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which connector is used for UTP cabling on a network?

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a broadcast MAC address?

A

FF-FF-FF-FF-FF-FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?

A

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which TCP/IP model layer uses connection-oriented protocols?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the maximum speed at which 10BaseT Ethernet networks communicate?

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of cabling does the 10BaseFL standard specify?

A

Fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What basis do bridges use to determine whether to forward traffic?

A

MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An Ethernet network using an Ethernet switch minimizes or avoids which events?

A

Collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of fiber-optic cabling and connectors does a 100BaseFX network use?

A

Multimode with ST or SC connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Including the preamble, how many basic pieces of information does an Ethernet frame contain?

A

Seven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What information would be included in the data portion of an Ethernet frame on an IP network?

A

The IP addresses of the sending and receiving systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the maximum cable length on a segment of a 1000BaseT network?

A

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How many pins does an RJ-45 connector have?

A

Eight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the most common connector used in a 1000BaseSX network?

A

LC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which switch and network equipment modular connectors have replaced gigabit interface converters (GBICs) as the modular connector of choice?

A

Small form-factor pluggable (SFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which standard specifies multimode cabling?

A

10BaseFL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an acceptable maximum collision rate on a properly running Ethernet network?

A

Ten percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What command would you run from a Windows command line to test a computer’s network stack?

A

ping 127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which characteristic applies to stranded core cabling?

A

Stranded core contains a bundle of tiny wire strands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

To what layer of the OSI model does the TCP/IP model’s Internet layer correspond?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which protocol is connection-oriented?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which port is used to receive e-mail messages from e-mail servers (POP3)?

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How many binary digits are in an IPv4 address?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How long is a subnet mask?

A

32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which unit is used to measure signal loss in networking?

A

Decibel (dB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the maximum number of hosts you may have on a network if the first decimal value of the IP address is between 192 and 223 and the subnet mask is 255.255.255.0?

A

254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What type of connector is used by all UTP Ethernet NICs?

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the default subnet mask for a Class C network?

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Suppose your network subnet mask is 255.255.0.0. What is the maximum number of host IDs available for this network?

A

65,534

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which NIC light turns on when the card detects network traffic and intermittently flickers when operating properly?

A

Activity light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which subnet mask is an example of classless subnetting?

A

255.255.240.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which tool automatically assigns an IP address whenever a computer connects to the network?

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the range of decimal values in each of the four groups of an IPv4 address?

A

0 to 255

42
Q

What is the norm today for the number of pairs in UTP cabling?

A

Four

43
Q

Which protocol uses TCP as its transport layer protocol?

A

HTTP

44
Q

What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?

A

90 meters

45
Q

Which condition specifically applies to UTP cabling?

A

Electromagnetic interference

46
Q

What are you trying to discover when you test a cable for continuity?

A

A broken wire

47
Q

Which task is performed by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers?

A

Classless Inter-Domain Routing (CIDR)

48
Q

The decimal value 151 converts to what binary value?

A

10010111

49
Q

Which of the following is a designated private IP address?

A

10.164.19.5

50
Q

Which port do Web servers use?

A

80

51
Q

Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?

A

Dynamic NAT

52
Q

Which type of port has a number in the 1024 to 49151 range?

A

Registered port

53
Q

Which term refers to ports in the 49152 to 65535 range?

A

Dynamic port

54
Q

Which column in a routing table tells the router which of its ports to use?

A

Interface

55
Q

Two computers first acknowledges the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process?

A

Connection-oriented

56
Q

Which protocol is by far the most common type of session on a typical TCP/IP network?

A

TCP

57
Q

On a TCP/IP network, a router determines where an incoming packet should go by looking at the packet’s __________.

A

destination IP addresses

58
Q

At which layer of the OSI model do routers work?

A

Network

59
Q

Which form of NAT typically handles the one-to-many connections?

A

Port Address Translation (PAT)

60
Q

What name is given to the port numbers in the range of 0 to 1023?

A

Well-known port numbers

61
Q

Your company has a single server on the private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?

A

Port forwarding

62
Q

__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.

A

Static NAT

63
Q

Which term refers to the passage of a packet through a router?

A

Hop

64
Q

Which term refers to another name for a session?

A

Connection

65
Q

Which routing metric refers to the ability of a connection to handle more data than others?

A

Bandwidth

66
Q

Which term defines a number used by the operating system to track all the running programs?

A

Process ID (PID)

67
Q

Google Chrome and Mozilla Firefox are examples of __________ applications.

A

Web client

68
Q

Which protocol enables you to control a remote computer from a local computer over a network?

A

Telnet

69
Q

Which protocol is used to send e-mail over TCP port 25 and is used by clients to send messages?

A

SMTP

70
Q

What is the name of the proprietary cable designed by Cisco for connecting to their routers?

A

Yost

71
Q

Which tool records the route between any two hosts on a network and can be used to troubleshoot routing problems?

A

traceroute

72
Q

Which of the following was developed as a secure replacement for Telnet?

A

Secure Shell (SSH

73
Q

Which organization has the authority to create new top-level domain names?

A

ICANN

74
Q

Which layer of the OSI model is a common place for encryption using proprietary encryption devices?

A

Layer 2

75
Q

Which term refers to a standardized type of digital signature that includes the digital signature of a third party?

A

Certificate

76
Q

In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?

A

Host.domain.root

77
Q

Which authentication method is the most common authentication method for dial-up connections?

A

MS-CHAPv2

78
Q

Within the DNS hierarchy, which term refers to the DNS servers just below the DNS root?

A

Top-level domain servers

79
Q

Which type of encryption is the most popular form of e-mail encryption?

A

Public-key cryptography

80
Q

Which term describes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?

A

Hash

81
Q

Which characters are not permitted in a DNS domain or host name?

A

Spaces

82
Q

Which term defines what an authenticated person can do with data?

A

Authorization

83
Q

What term best describes the way the DNS name space is organized?

A

Hierarchical

84
Q

What UDP port do DNS servers primarily use?

A

53

85
Q

Which type of algorithm is used when two different keys are used in encryption?

A

Asymmetric-key

86
Q

Which zone files are the most important part of any DNS server?

A

Forward lookup zones

87
Q

Which organization is the biggest player in the certificate authority market?

A

VeriSign

88
Q

What enables a system to determine an FQDN by knowing the IP address?

A

Reverse lookup zones

89
Q

Which authentication method is the most popular form of authentication used in wireless networks today?

A

EAP-PSK (Personal Shared Key)

90
Q

EAP is not a protocol in the classic sense, but rather, it is a PPP __________ that EAP-compliant applications can use to accept one of many types of authentication.

A

wrapper

91
Q

In comparing the DNS name space to a computer’s file system, a domain is like __________.

A

a folder

92
Q

Which protocol is the tool programs use to query and change a database used by the network?

A

LDAP

93
Q

How is the address 127.0.0.1 listed in the hosts file?

A

localhost

94
Q

Which term refers to the result of running cleartext through a cipher algorithm using a key?

A

Ciphertext

95
Q

Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?

A

Active Directory

96
Q

Which block cipher is used by most TCP/IP applications?

A

Advanced Encryption Standard (AES)

97
Q

What potential problem does a browser look for after it receives a certificate from a secure HTTP site?

A

Revoked certificate

98
Q

Which term describes an SSH-enabled program?

A

Secure Copy Protocol (SCP)

99
Q

Which of the following would confirm that you have a DNS problem?

A

Ping works with the IP address but not with the Web site name.

100
Q

Which term refers to a cipher’s underlying mathematical formula?

A

Algorithm