Sybex Network+ Flashcards
What three elements must computers have in common to form a network?
Network media and topology, protocol, software client or service
True or False:
There is no real difference between a logical network topology and a physical network topology.
False.
Logical topology describes traffic flow, and physical topology is how the computers are physically connected to each other.
The most common topology in use today is the _____
star
True or False:
Computers in a star topology use T connectors to attach the computer’s network card to the cable.
False.
Star topologies use a hub or a switch, and computers connected to them commonly use RJ-45 connectors (for twisted pair cabling).
True or False:
WEP is now considered to be a secure standard for wireless networking.
False.
WPA2 is the most secure standard.
A wireless access point (WAP) in an organization that was not installed by the administration team of that organization is referred to
rogue access point
True or False:
A mesh topology offers fault tolerance through redundant routes.
True
A fully meshed topology with five components would have
20, 10
_____ is a term that refers to combining authentication, authorization, and accounting into the same system or sever.
AAA
True or False:
Telnet is much more secure than SSH
False.
SSH is more secure than Telnet.
True or False:
100BASE-TX Ethernet can send a signal 10 times as far as 10BASE-T Ethernet without the use of repeaters.
False.
It can send it 10 times as fast but not 10 times as far.
True or False:
Social engineering attacks rely on human nature more than on technical expertise.
True
What type of cable would you use to connect a CSU/DSU to another CSU/DSU?
T1 crossover
Original (legacy) Ethernet uses a carrier access method referred to as _____
CSMA/CD (carrier sense multiple access with collision detection)
The networking technology that defines standards for controlling data and that is defined by the IEEE 802.3 standard is ________
Ethernet
True or False:
EIGRP is a link state routing protocol
False.
EIGRP is an advanced distance vector routing protocol that is also referred to as a hybrid routing protocol.
True or False:
Wireless networks operating at the 802.11b standard can operate at 11Mbps or 54Mbps.
False.
802.11b has a maximum operational speed of 11Mbps
True or False:
Wireless networks using the 802.11b standard use a carrier access method of CSMA/CD.
False.
Wireless networks using the 802.11b/g/n standard use CSMA/CA, not CSMA/CD.
True or False:
The 10G cable standard can transmit up to 10 million bits per second, but no higher.
False.
The 10G standard transmits at 10Gbps, or 10 billion bits per second!
True or False:
RJ-11 connectors are the most common type of connector used to connect routers, switches, and hubs
False.
RJ-45 connectors are the most common for routers, switches, and hubs
RJ-45 connectors can contain up to pairs of wires
four
The unique ID that an administrator can assign to a WAP is called the.
SSID (Service Set Identification)
ST and SC are both type of connectors
fiber-optic
RIP and RIPv2 are both routing protocols.
distance vector
True or False:
Shielded twisted-pair (STP) cable eliminates crosstalk and is the most common cable in use today.
False.
Shielded twisted-pair (STP) is used to reduce electromagnetic interference (EMI).
True or False:
The signal on a coaxial cable is divided between the inner core wire and the outer braided wire.
False.
All of the signal on a coaxial cable is in the core wire. The outer wire mesh is for grounding and shielding.
_______-mode fiber is used for very high speed, very high distance network applications
Single
True or False:
Switching loops can be prevented by the effective use of VTP
False.
Switching loops can be prevented by the effective use of spanning tree protocol (STP).
A switch controls and segments traffic on your network by learning the addresses of all of the components connected to it.
MAC (media access control)
True or False:
Switches can be used to create virtual local area networks (VLANs) that can further segment traffic on a network.
True
An _________ is a system that can detect malicious traffic and close ports or reset connections.
Intrusion Prevention System (IPS)
True or False:
Routers are devices that forward traffic from one network to another network using tables
True
A ________ is used to convert LAN signals to WAN signals, and vice versa.
CSU/DSU
True or False:
One of the jobs of a NIC is to translate digital data into analog data, and vice versa.
False.
NICs translate parallel data to serial data, not analog to digital.
OSPF is an example of a _______ routing protocol
link state
What frequency do 802.11g wireless devices use to connect to a WAP?
2.4GHz
True or False:
An F-connector is a type of copper connector that is commonly used with coaxial cable
True
Any device that receives data, converts it, and then sends it to another location can be called a.
transceiver
True or False:
Firewalls can be programmed to filter data packets based on the information that is contained in the packets.
True
A type of light that we cannot see but that is often used for communication and control is ________ light.
Infrared
________ is a short-range radio technology that is often used for wireless printers, mice, keyboards, and scanners.
Bluetooth
True or False:
A 900MHz wireless phone can interfere with wireless devices using 802.11g/n.
False. 802.11g/n use the 2.4GHz and 5GHz bands.
A ________ is used to connect computers using wireless NICs to a wired network
WAP (wireless access point)
True or False:
The 802.11b wireless standard requires line of sight with the networked devices
False.
802.11 signals are radio signals that do not require line of sight.
In the MAC address 00-05-1B-00-4B-F6, which part of the address is the unique ID for the device?
00-4B-F6
True or False:
The MAC address is also referred to as a physical address.
True
The ________ is considered the highest layer in the OSI model.
Application, Layer 7
At the ________ layer of the OSI model, data is compressed (or decompressed) and encrypted or (decrypted).
Presentation, Layer 6
The ________ layer of the OSI model is responsible for establishing, synchronizing, maintaining, and then terminating the communication channels between computers.
Session
The Data Link layer is further subdivided into two other layers called ________
Logical Link Control, Media Access Control
True or False:
The Presentation layer defines the physical characteristics of the network, such as the type of cable that must be used as well as the voltage that will be used to transmit data through the network.
False. The Presentation layer does not define the physical characteristics; the Physical layer does. The Presentation layer provides for coding and decoding for interpretation of data as it is forwarded to and from the Application layer.
True or False:
Switches use IP address tables to forward data traffic
False.
Switches use MAC addresses tables, not IP address tables.
The two protocols at the Transport layer of the TCP/IP protocol suite ________
TCP, UDP
True or False:
Routers operate at layer 3, the Network layer, of the OSI model.
True
A WAP operates at the ________ layer of the OSI model.
Physical
________ is a secure remote access and remote control system developed by Cisco.
TACACS+
________ is a type a system that translates one set of addresses to another on a one-to-one basis.
NAT (network address translation)
________ is a type of DSL that provides the same upload speed as its download speed.
SDSL (symmetric digital subscriber line)
True or False:
OSPF and IS-IS are distance vector routing protocol.
False.
OSPF and IS-IS are both link-state routing protocols
True or False:
Transport Layer Security (TLS) is gradually replacing SSL for secure Internet commerce.
True
IP addresses can be automatically assigned to clients in a network using special servers ________ servers.
Dynamic Host Configuration Protocol (DHCP)
Whereas IPv4 addresses are formatted in dotted decimal, IPv6 addresses are formatted in ________
hexadecimal
How many bits make up an IPv6 address?
128
The classful IP address 139.2.1.2 is a Class ________.
B
The classful IP address 200.200.200.200 is a Class ________ address.
C
True or False: The IP address 127.0.0.1 is generally considered an acceptable address to use for a network host.
False. 127.0.0.1 is the local loopback address used to test the TCP/IP stack for functionality. In fact, 127.x.x.x should not be used as the entire 127 network is reserved for diagnostics.
The default subnet mask for a Class B network is ________
255.255.0.0
True or False:
In subnetting, borrowing 3 bits from hosts to form networks allows the creation of 10 additional networks.
False. Borrowing three bits will create only 8 subnets (2^3), not 10.
How many networks can be created by borrowing 4 bits from hosts?
16
True or False:
The only addresses that will function at all on a private network are those in the recognized private IP address ranges.
False. Other addresses will function, but they are not recommended because the firewalls between your network will not have the proper configuration to block those addresses from being seen by other companies and therefore could cause conflicts.
The address 192.168.2.1 with a subnet mask of 255.255.255.0 could be a host address in a private network
True
True or False:
It’s usually considered proper and easier to assign static IP addresses to all clients on a network, rather than using automatic assignmen.
False.
It’s easier and more accurate to use DHCP to provide automatic assignment for clients on a TCP/IP network.
True or False:
All router interfaces should be assigned a static address rather than use an automatically assigned address.
True
A ________ server is used to resolve hostnames to IP addresses.
DNS
True or False:
The address 169.254.1.1 with a default Class B subnet mask is an APIPA.
True
True or False:
A newly installed Windows 7 client is automatically configured to obtain an address from a DHCP server if one is available.
True
IP is a connectionless protocol that works at the ________ layer of the OSI model.
Network
TCP is a connection-oriented protocol that works at the ________ layer of the OSI model.
Transport
True or False:
UDP is a connection-oriented protocol that works at the Transport layer.
False.
UDP does work at the Transport layer, but it is a connectionless protocol.
True or False:
FTP is the most secure protocol used to transfer files from one computer to another.
False.
FTP is not a secure protocol and there are file transfer protocols that are secure, such as SFTP.
TFTP is a connectionless protocol that works at the ________ layer of the OSI model.
Application
True or False:
SMTP is a protocol used to store email messages on a server.
False.
SMTP is a protocol that is used to send email.
SMTP works at the ________ layer of the OSI model.
Application
True or False:
HTTP is a secure protocol typically used for Internet commerce.
False.
HTTP is not a secure protocol and is typically not used for Internet commerce; HTTPS is used.
________ is one of the protocols used to retrieve mail from SMTP servers.
POP3 or IMAPv4
True or False:
With IMAPv4, you can read, store, and manage your email without downloading it.
True
True or False:
Telnet is a secure remote desktop protocol
False.
Telnet is not inherently secure and is rarely used in security conscious environments. SSH is used instead.
True or False:
SSH is a secure protocol used to manage computers remotely.
True
ICMP is a protocol that works at the ________ layer of the OSI model
Network
You can test general connectivity between computers using the ________ tool.
ping
The ping tool creates special packets called ________ packets.
Echo request
The IP address 127.0.0.1 is referred to as the ________ address.
loopback
The ________ tool works like the ping tool, but it can be used to determine which router is not able to forward a packet.
tracert
True or False:
RG-6 coaxial cable has less resistance than RG-58 due to its thinner core wire.
False.
RG-6 has less resistance than RG-58 due to its thicker core wire.
True or False:
The IP address of a computer must be unique to the local network.
True
True or False:
The hostname of a computer must only be unique within its own hierarchy of names.
True
True or False:
The ipconfig /all command displays all of the NetBIOS names of a computer.
False.
The ipconfig /all command displays the IP address, subnet mask, default gateway, and addresses of DNS servers, DHCP servers, and so on; but it does not display NetBIOS information. The nbtstat command does.
True or False:
The ipconfig command displays the IP addresses configured for DNS servers and WINS servers.
False.
You must type ipconfig /all to obtain the addresses of DNS and WINS servers
The ________ command displays the NetBIOS name cache showing recently resolved NetBIOS names and IP addresses.
nbtstat
True or False:
VPN remote connectivity is inherently much faster than dial-up remote connectivity.
False
True or False:
ARP is a connectionless protocol that works at the Transport layer of the OSI model.
False.
Address Resolution Protocol (ARP) is a connectionless protocol that works between the Network and Data Link layers of the OSI model.
ARP resolves IP addresses to ________ addresses.
MAC
NTP is an Application layer protocol that synchronizes ________ between computers on a network.
time
A DNS record that is the same as an A record but is specifically used on IPv6 is an
AAAA record
________ is the protocol that has become the standard for information directories such as Microsoft Active Directory.
Lightweight Directory Access Protocol (LDAP)
________ is the protocol standard used for multicasting on intranets.
IGMP
________ was developed along with WPA2 keys, used in wireless authentication.
Advanced Encryption Standard (AES)
True or False:
TCP port 8080 is considered a well-known port.
False.
Well-known ports range from 0-1023; 8080 is a registered port.
Registered ports range from 1024 to ________
49151
Domain Name System (DNS) resolves ________ to IP addresses.
hostnames
________ is a service that translates one set of addresses to another set of addresses.
network address translation (NAT)
True or False:
EIGRP is considered to be a hybrid routing protocol.
True
________ is a management protocol that you can use to gather information about the network and the components it contains.
simple network management protocol (SNMP)
True or False:
OSPF is considered to be a hybrid routing protocol.
False.
OSPF is strictly a link-state routing protocol and is not considered to be a hybrid.
________ is a technology whereby each packet of data can take a separate route to its destination.
Packet switching
________ is a technology whereby a single channel is opened at the start of a session and that single channel is used throughout the communication.
Circuit switching
A DNS record that indicates a mail server is an ________ record.
MX (mail exchange)
A T-1 line is a dedicated line that can carry up to ________ on 24 separate channels.
1.544Mbps
In the acronym ASDL, when referring to a digital subscriber line, the letter A stands for ______ .
asymmetric
True or False:
Broadband cable currently offers data rates of 10Mbps or even higher.
True
True or False:
SNMPv2 is actually more secure than SNMPv3.
False.
SNMPv3 was developed in part to be more secure than SNMPv2.
A ________ is a secure connection that is transmitted through a nonsecure medium, usually the Internet.
VPN (virtual private network)
________ is the protocol on which Microsoft Terminal Services operates.
RDP (remote desktop protocol
________ is a flexible protocol that can be used to secure practically all TCP/IP related communication.
IPSec
True or False:
All computer clients support the L2TP tunneling protocol.
False.
Only Windows 2000 Professional and newer support the L2TP tunneling protocol.
________ is the local authentication protocol that is used by default for Microsoft Active Directory and Novell Directory Services.
Kerberos
The ________ protocol is used for smart cards.
Extensible Authentication Protocol (EAP)
True or False:
All Microsoft clients can use MS-CHAPv2.
False.
Only Windows 2000 Professional and later clients can use MS-CHAPv2
________ is used as a carrier access method on 802.11a/b/g/n networks.
CSMA/CA
True or False:
Fiber-optic cables are completely immune to EMI.
True
True or False:
Some fiber-optic cables can carry a signal for over 10 kilometers.
True
True or False:
Virtual servers are actually larger than physical servers.
False.
Virtual servers are made of software and are not in a physical form at all.
True or False:
The colors of the wires in a network cable must be arranged in accordance with the network cable color standard in order for the cable to function correctly.
False.
You should follow the standards to avoid confusion and misconfiguration, but other combinations could work as long as you were consistent.
A ________ can be used to verify connectivity in a cable without attaching the cable to a network.
media tester
True or False:
A punch-down tool is often used to secure coaxial cables to a patch panel.
False.
A punch down tool is not used with coaxial cable, it’s used with twisted-pair cable.
In the media-testing duo referred to as the fox and hound, the hound is actually a ________ and a ________.
tone generator, tone locator
A ________ is a hardware device and/or software package that prevents packets from flowing through an interface from one network to another unless they meet a specified criterion.
firewall
A ________ service makes a connection to the Internet on behalf of a user.
proxy
True or False:
Some firewalls can work at layer 7 of the OSI model.
True
True or False:
To operate properly, a proxy service must be placed logically between the client and the Internet.
True
If port 80 is blocked on a firewall, then the ________ protocol will not function through the firewall.
HTTP
True or False:
HTTP and HTTPS both use the same port.
False. HTTP uses port 80, while HTTPS uses port 443.
________ are logical subnets that are formed using switches.
VLANs (virtual local area networks)
True or False:
VLANs can reduce the effect of broadcasts across an entire network.
True
True or False:
VLANs can provide security.
True
True or False:
Switch ports can be assigned to multiple VLANs, making VLANs very flexible.
False.
Each switchport is generally assigned to only one VLAN.
True or False:
With virtualization, one physical computer can host only one virtual computer.
False.
With virtualization, one physical computer can host many virtual computers simultaneously.
An ________ allows users to access shared company information with their browsers without accessing the Internet.
intranet
True or False:
The main purpose of antivirus software is to protect your computer by detecting and eradicating viruses before they have a chance to damage your computer.
True
________ can be defined as the ability to lose a network component without losing data and or functionality.
Fault tolerance
Fault-tolerant power usually comes in the form of a ________.
UPS (uninterruptible power supply)
True or False:
BGP is a distance vector routing protocol designed to work between autonomous systems.
True
True or False:
802.11g/n use CSMA/CD rather than CSMA/CA.
False.
802.11a/b/g/n use CSMA/CA
169.254.1.1 is an example of an ________ address.
APIPA (automatic private internet protocol address)
True or False:
OSPF is a distance vector routing protocol.
False.
OSPF is a link-state routing protocol.
True or False:
For security purposes, you should always change the default configuration when installing a wireless access point.
True
A packet that has one source address and one destination address is referred to as a
unicast
A packet that has one source address and a list or range of destination addresses is referred to as a ________.
multicast
________ is a modern protocol that combines the advantages of Frame Relay and ATM and speeds routing by using labels so that decision can be made much more quickly.
multiple protocol label switching (MPLS)
True or False:
EIGRP is a link state routing protocol with distance vector attributes.
False.
EIGRP is a distance vector routing protocol with link-state attributes.
True or False:
EIGRP is a distance vector routing protocol with link state attributes.
True
________ uses 53 byte cells rather than variable-length packets
asynchronous transfer mode (ATM)
________ are layer 3 devices that can move packets from one subnet to another.
routers
True or False:
Some legacy applications still use NetBIOS names to identify computers.
True
True or False:
A hostname can be a maximum of 15 characters long.
False.
A NetBIOS name is limited to 15 characters, but a hostname can be much longer, up to 255 characters including the delimiting “dots.”
True or False:
Hostnames exist in a flat namespace.
False.
Hostnames exist in a hierarchical namespace.
Previously resolved IP-to-MAC addresses are stored in the ARP cache on a Microsoft client for about ________ minutes.
10
You can view the ARP cache on a computer by typing ________ on a command line.
arp -a
True or False:
nslookup is a tool that can be used to test and verify NetBIOS name resolution.
False
True or False:
The netstat command lists NetBIOS over TCP/IP statistics.
False
A ________ record provides reverse lookups in DNS.
PTR
________ is a dynamic database that resolves hostnames to IP addresses.
DNS (Domain Name System)
True or False:
IP addresses for clients must be unique within a client’s subnet.
True
________ increases throughput by allowing multiple paths for traffic on the same session.
load balancing
The ipconfig command with no switches displays the IP address, subnet mask, and ________ of the computer interfaces.
default gateway
True or False:
The name resolution server addresses for a client computer can be configured automatically using a DHCP server
True
True or False:
The manual settings configured for a proxy server will always override any automatic configuration settings.
False.
Automatic settings for a proxy will override manual settings.
True or False:
Dial-up connections are much more secure than VPN connections, which must go through the Internet servers
False.
VPN connections are typically much more secure than dialup connections.
True or False:
Fiber-optic cables are twisted to prevent EMI
False.
Fiber-optic cables are not twisted and cannot suffer from electromagnetic interference (EMI), since they use light instead of electricity
________ are specific logical addresses to which applications are assigned in a computer.
Ports
True or False:
A virtual switch can perform most of the same functions as a physical switch.
True
A technology that allows a switch or other device to use and distribute Ethernet current to power the devices is called .
Power over Ethernet (PoE)
True or False:
QoS is a way of prioritizing traffic by protocol.
True
True or False:
Single-mode fiber is generally used within buildings, whereas multimode is used for longer runs between buildings
False.
Multimode fiber is typically used within buildings, whereas singlemode fiber is used on longer runs between buildings
A protocol used with VLANs that reduces administrative effort and increases accuracy when multiple switches are used, by allowing one switch to propagate information to many others is referred to as _______
VLAN Trunking Protocol (VTP)
What is the largest recommended number of computers in a SOHO network?
10
An interference caused by wires that run parallel to each other and not twisted together is called ________.
crosstalk
An interference caused by wires running past speakers, fluorescent light ballasts, or electric motors is referred as ________.
electromagnetic interference (EMI
A device that is used specifically to create a tunnel for communication through an inherently unsecure medium is a ________.
VPN concentrator
If you are installing cables in between the ceiling tiles of a building, you may be required by a law to use a special type of cable called a ________ cable.
plenum
True or False:
You should either use a host firewall or antivirus software on a computer, but not both.
False.
It is very common to use antivirus software and a firewall on the same computer.
VLANs use special ports between switches called ________.
trunks
True or False:
A VLAN is a logical network design that does not have to conform to a physical network topology.
True
True or False:
Port authentication is the only form of security that most networks need
False.
Port authentication is only one form of security and it is not generally considered to be a high degree of security. Networks need many other forms of security to protect them from attack and corruption
True or False:
Clients that are configured with static IP addresses will fail immediately if the DHCP server fails
False.
Clients that are configured with static IP addresses will be unaffected by the failure of a DHCP server
True or False:
Clients that are configured automatically from a DHCP server will fail immediately if the DHCP server fails
False.
The failure of a DHCP server will keep clients from receiving new IP address assignments and leases, but those that have received their addresses already will keep them until the lease period expires
A device that poses as a server with sensitive data to distract or even trap an attacker is referred to as a ________.
honeypot
A device that can be installed into a network with preconfigurations of normal network traffic so that it can determine what is normal and block or even terminate sessions when something is not normal is a ________.
signature-based IPS
True or False:
Nessus is a vulnerability scanning software that can find misconfigurations and open ports that could allow an attacker to take control of your systems
True
A situation that allows current to flow on a different path than was originally intended in the circuit is a(n) _________.
open short or short circuit