Sybex Network+ Flashcards
What three elements must computers have in common to form a network?
Network media and topology, protocol, software client or service
True or False:
There is no real difference between a logical network topology and a physical network topology.
False.
Logical topology describes traffic flow, and physical topology is how the computers are physically connected to each other.
The most common topology in use today is the _____
star
True or False:
Computers in a star topology use T connectors to attach the computer’s network card to the cable.
False.
Star topologies use a hub or a switch, and computers connected to them commonly use RJ-45 connectors (for twisted pair cabling).
True or False:
WEP is now considered to be a secure standard for wireless networking.
False.
WPA2 is the most secure standard.
A wireless access point (WAP) in an organization that was not installed by the administration team of that organization is referred to
rogue access point
True or False:
A mesh topology offers fault tolerance through redundant routes.
True
A fully meshed topology with five components would have
20, 10
_____ is a term that refers to combining authentication, authorization, and accounting into the same system or sever.
AAA
True or False:
Telnet is much more secure than SSH
False.
SSH is more secure than Telnet.
True or False:
100BASE-TX Ethernet can send a signal 10 times as far as 10BASE-T Ethernet without the use of repeaters.
False.
It can send it 10 times as fast but not 10 times as far.
True or False:
Social engineering attacks rely on human nature more than on technical expertise.
True
What type of cable would you use to connect a CSU/DSU to another CSU/DSU?
T1 crossover
Original (legacy) Ethernet uses a carrier access method referred to as _____
CSMA/CD (carrier sense multiple access with collision detection)
The networking technology that defines standards for controlling data and that is defined by the IEEE 802.3 standard is ________
Ethernet
True or False:
EIGRP is a link state routing protocol
False.
EIGRP is an advanced distance vector routing protocol that is also referred to as a hybrid routing protocol.
True or False:
Wireless networks operating at the 802.11b standard can operate at 11Mbps or 54Mbps.
False.
802.11b has a maximum operational speed of 11Mbps
True or False:
Wireless networks using the 802.11b standard use a carrier access method of CSMA/CD.
False.
Wireless networks using the 802.11b/g/n standard use CSMA/CA, not CSMA/CD.
True or False:
The 10G cable standard can transmit up to 10 million bits per second, but no higher.
False.
The 10G standard transmits at 10Gbps, or 10 billion bits per second!
True or False:
RJ-11 connectors are the most common type of connector used to connect routers, switches, and hubs
False.
RJ-45 connectors are the most common for routers, switches, and hubs
RJ-45 connectors can contain up to pairs of wires
four
The unique ID that an administrator can assign to a WAP is called the.
SSID (Service Set Identification)
ST and SC are both type of connectors
fiber-optic
RIP and RIPv2 are both routing protocols.
distance vector
True or False:
Shielded twisted-pair (STP) cable eliminates crosstalk and is the most common cable in use today.
False.
Shielded twisted-pair (STP) is used to reduce electromagnetic interference (EMI).
True or False:
The signal on a coaxial cable is divided between the inner core wire and the outer braided wire.
False.
All of the signal on a coaxial cable is in the core wire. The outer wire mesh is for grounding and shielding.
_______-mode fiber is used for very high speed, very high distance network applications
Single
True or False:
Switching loops can be prevented by the effective use of VTP
False.
Switching loops can be prevented by the effective use of spanning tree protocol (STP).
A switch controls and segments traffic on your network by learning the addresses of all of the components connected to it.
MAC (media access control)
True or False:
Switches can be used to create virtual local area networks (VLANs) that can further segment traffic on a network.
True
An _________ is a system that can detect malicious traffic and close ports or reset connections.
Intrusion Prevention System (IPS)
True or False:
Routers are devices that forward traffic from one network to another network using tables
True
A ________ is used to convert LAN signals to WAN signals, and vice versa.
CSU/DSU
True or False:
One of the jobs of a NIC is to translate digital data into analog data, and vice versa.
False.
NICs translate parallel data to serial data, not analog to digital.
OSPF is an example of a _______ routing protocol
link state
What frequency do 802.11g wireless devices use to connect to a WAP?
2.4GHz
True or False:
An F-connector is a type of copper connector that is commonly used with coaxial cable
True
Any device that receives data, converts it, and then sends it to another location can be called a.
transceiver
True or False:
Firewalls can be programmed to filter data packets based on the information that is contained in the packets.
True
A type of light that we cannot see but that is often used for communication and control is ________ light.
Infrared
________ is a short-range radio technology that is often used for wireless printers, mice, keyboards, and scanners.
Bluetooth
True or False:
A 900MHz wireless phone can interfere with wireless devices using 802.11g/n.
False. 802.11g/n use the 2.4GHz and 5GHz bands.
A ________ is used to connect computers using wireless NICs to a wired network
WAP (wireless access point)
True or False:
The 802.11b wireless standard requires line of sight with the networked devices
False.
802.11 signals are radio signals that do not require line of sight.
In the MAC address 00-05-1B-00-4B-F6, which part of the address is the unique ID for the device?
00-4B-F6
True or False:
The MAC address is also referred to as a physical address.
True
The ________ is considered the highest layer in the OSI model.
Application, Layer 7
At the ________ layer of the OSI model, data is compressed (or decompressed) and encrypted or (decrypted).
Presentation, Layer 6
The ________ layer of the OSI model is responsible for establishing, synchronizing, maintaining, and then terminating the communication channels between computers.
Session
The Data Link layer is further subdivided into two other layers called ________
Logical Link Control, Media Access Control
True or False:
The Presentation layer defines the physical characteristics of the network, such as the type of cable that must be used as well as the voltage that will be used to transmit data through the network.
False. The Presentation layer does not define the physical characteristics; the Physical layer does. The Presentation layer provides for coding and decoding for interpretation of data as it is forwarded to and from the Application layer.
True or False:
Switches use IP address tables to forward data traffic
False.
Switches use MAC addresses tables, not IP address tables.
The two protocols at the Transport layer of the TCP/IP protocol suite ________
TCP, UDP
True or False:
Routers operate at layer 3, the Network layer, of the OSI model.
True
A WAP operates at the ________ layer of the OSI model.
Physical
________ is a secure remote access and remote control system developed by Cisco.
TACACS+
________ is a type a system that translates one set of addresses to another on a one-to-one basis.
NAT (network address translation)
________ is a type of DSL that provides the same upload speed as its download speed.
SDSL (symmetric digital subscriber line)
True or False:
OSPF and IS-IS are distance vector routing protocol.
False.
OSPF and IS-IS are both link-state routing protocols
True or False:
Transport Layer Security (TLS) is gradually replacing SSL for secure Internet commerce.
True
IP addresses can be automatically assigned to clients in a network using special servers ________ servers.
Dynamic Host Configuration Protocol (DHCP)
Whereas IPv4 addresses are formatted in dotted decimal, IPv6 addresses are formatted in ________
hexadecimal
How many bits make up an IPv6 address?
128
The classful IP address 139.2.1.2 is a Class ________.
B
The classful IP address 200.200.200.200 is a Class ________ address.
C
True or False: The IP address 127.0.0.1 is generally considered an acceptable address to use for a network host.
False. 127.0.0.1 is the local loopback address used to test the TCP/IP stack for functionality. In fact, 127.x.x.x should not be used as the entire 127 network is reserved for diagnostics.
The default subnet mask for a Class B network is ________
255.255.0.0
True or False:
In subnetting, borrowing 3 bits from hosts to form networks allows the creation of 10 additional networks.
False. Borrowing three bits will create only 8 subnets (2^3), not 10.
How many networks can be created by borrowing 4 bits from hosts?
16
True or False:
The only addresses that will function at all on a private network are those in the recognized private IP address ranges.
False. Other addresses will function, but they are not recommended because the firewalls between your network will not have the proper configuration to block those addresses from being seen by other companies and therefore could cause conflicts.
The address 192.168.2.1 with a subnet mask of 255.255.255.0 could be a host address in a private network
True
True or False:
It’s usually considered proper and easier to assign static IP addresses to all clients on a network, rather than using automatic assignmen.
False.
It’s easier and more accurate to use DHCP to provide automatic assignment for clients on a TCP/IP network.
True or False:
All router interfaces should be assigned a static address rather than use an automatically assigned address.
True
A ________ server is used to resolve hostnames to IP addresses.
DNS
True or False:
The address 169.254.1.1 with a default Class B subnet mask is an APIPA.
True
True or False:
A newly installed Windows 7 client is automatically configured to obtain an address from a DHCP server if one is available.
True
IP is a connectionless protocol that works at the ________ layer of the OSI model.
Network
TCP is a connection-oriented protocol that works at the ________ layer of the OSI model.
Transport
True or False:
UDP is a connection-oriented protocol that works at the Transport layer.
False.
UDP does work at the Transport layer, but it is a connectionless protocol.
True or False:
FTP is the most secure protocol used to transfer files from one computer to another.
False.
FTP is not a secure protocol and there are file transfer protocols that are secure, such as SFTP.