Sybex Network+ Flashcards

1
Q

What three elements must computers have in common to form a network?

A

Network media and topology, protocol, software client or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False:

There is no real difference between a logical network topology and a physical network topology.

A

False.
Logical topology describes traffic flow, and physical topology is how the computers are physically connected to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The most common topology in use today is the _____

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False:

Computers in a star topology use T connectors to attach the computer’s network card to the cable.

A

False.
Star topologies use a hub or a switch, and computers connected to them commonly use RJ-45 connectors (for twisted pair cabling).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False:

WEP is now considered to be a secure standard for wireless networking.

A

False.

WPA2 is the most secure standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A wireless access point (WAP) in an organization that was not installed by the administration team of that organization is referred to

A

rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False:

A mesh topology offers fault tolerance through redundant routes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A fully meshed topology with five components would have

A

20, 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is a term that refers to combining authentication, authorization, and accounting into the same system or sever.

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False:

Telnet is much more secure than SSH

A

False.

SSH is more secure than Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:

100BASE-TX Ethernet can send a signal 10 times as far as 10BASE-T Ethernet without the use of repeaters.

A

False.

It can send it 10 times as fast but not 10 times as far.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False:

Social engineering attacks rely on human nature more than on technical expertise.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of cable would you use to connect a CSU/DSU to another CSU/DSU?

A

T1 crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Original (legacy) Ethernet uses a carrier access method referred to as _____

A

CSMA/CD (carrier sense multiple access with collision detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The networking technology that defines standards for controlling data and that is defined by the IEEE 802.3 standard is ________

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False:

EIGRP is a link state routing protocol

A

False.

EIGRP is an advanced distance vector routing protocol that is also referred to as a hybrid routing protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or False:

Wireless networks operating at the 802.11b standard can operate at 11Mbps or 54Mbps.

A

False.

802.11b has a maximum operational speed of 11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or False:

Wireless networks using the 802.11b standard use a carrier access method of CSMA/CD.

A

False.

Wireless networks using the 802.11b/g/n standard use CSMA/CA, not CSMA/CD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False:

The 10G cable standard can transmit up to 10 million bits per second, but no higher.

A

False.

The 10G standard transmits at 10Gbps, or 10 billion bits per second!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False:

RJ-11 connectors are the most common type of connector used to connect routers, switches, and hubs

A

False.

RJ-45 connectors are the most common for routers, switches, and hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RJ-45 connectors can contain up to pairs of wires

A

four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The unique ID that an administrator can assign to a WAP is called the.

A

SSID (Service Set Identification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ST and SC are both type of connectors

A

fiber-optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RIP and RIPv2 are both routing protocols.

A

distance vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

True or False:

Shielded twisted-pair (STP) cable eliminates crosstalk and is the most common cable in use today.

A

False.

Shielded twisted-pair (STP) is used to reduce electromagnetic interference (EMI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

True or False:

The signal on a coaxial cable is divided between the inner core wire and the outer braided wire.

A

False.

All of the signal on a coaxial cable is in the core wire. The outer wire mesh is for grounding and shielding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_______-mode fiber is used for very high speed, very high distance network applications

A

Single

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

True or False:

Switching loops can be prevented by the effective use of VTP

A

False.

Switching loops can be prevented by the effective use of spanning tree protocol (STP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A switch controls and segments traffic on your network by learning the addresses of all of the components connected to it.

A

MAC (media access control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

True or False:

Switches can be used to create virtual local area networks (VLANs) that can further segment traffic on a network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An _________ is a system that can detect malicious traffic and close ports or reset connections.

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

True or False:

Routers are devices that forward traffic from one network to another network using tables

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A ________ is used to convert LAN signals to WAN signals, and vice versa.

A

CSU/DSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

True or False:

One of the jobs of a NIC is to translate digital data into analog data, and vice versa.

A

False.

NICs translate parallel data to serial data, not analog to digital.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

OSPF is an example of a _______ routing protocol

A

link state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What frequency do 802.11g wireless devices use to connect to a WAP?

A

2.4GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

True or False:

An F-connector is a type of copper connector that is commonly used with coaxial cable

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Any device that receives data, converts it, and then sends it to another location can be called a.

A

transceiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

True or False:

Firewalls can be programmed to filter data packets based on the information that is contained in the packets.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A type of light that we cannot see but that is often used for communication and control is ________ light.

A

Infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

________ is a short-range radio technology that is often used for wireless printers, mice, keyboards, and scanners.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

True or False:

A 900MHz wireless phone can interfere with wireless devices using 802.11g/n.

A

False. 802.11g/n use the 2.4GHz and 5GHz bands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A ________ is used to connect computers using wireless NICs to a wired network

A

WAP (wireless access point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

True or False:

The 802.11b wireless standard requires line of sight with the networked devices

A

False.

802.11 signals are radio signals that do not require line of sight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

In the MAC address 00-05-1B-00-4B-F6, which part of the address is the unique ID for the device?

A

00-4B-F6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

True or False:

The MAC address is also referred to as a physical address.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The ________ is considered the highest layer in the OSI model.

A

Application, Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

At the ________ layer of the OSI model, data is compressed (or decompressed) and encrypted or (decrypted).

A

Presentation, Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The ________ layer of the OSI model is responsible for establishing, synchronizing, maintaining, and then terminating the communication channels between computers.

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The Data Link layer is further subdivided into two other layers called ________

A

Logical Link Control, Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

True or False:
The Presentation layer defines the physical characteristics of the network, such as the type of cable that must be used as well as the voltage that will be used to transmit data through the network.

A

False. The Presentation layer does not define the physical characteristics; the Physical layer does. The Presentation layer provides for coding and decoding for interpretation of data as it is forwarded to and from the Application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

True or False:

Switches use IP address tables to forward data traffic

A

False.

Switches use MAC addresses tables, not IP address tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The two protocols at the Transport layer of the TCP/IP protocol suite ________

A

TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

True or False:

Routers operate at layer 3, the Network layer, of the OSI model.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A WAP operates at the ________ layer of the OSI model.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

________ is a secure remote access and remote control system developed by Cisco.

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

________ is a type a system that translates one set of addresses to another on a one-to-one basis.

A

NAT (network address translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

________ is a type of DSL that provides the same upload speed as its download speed.

A

SDSL (symmetric digital subscriber line)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

True or False:

OSPF and IS-IS are distance vector routing protocol.

A

False.

OSPF and IS-IS are both link-state routing protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

True or False:

Transport Layer Security (TLS) is gradually replacing SSL for secure Internet commerce.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

IP addresses can be automatically assigned to clients in a network using special servers ________ servers.

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Whereas IPv4 addresses are formatted in dotted decimal, IPv6 addresses are formatted in ________

A

hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

How many bits make up an IPv6 address?

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

The classful IP address 139.2.1.2 is a Class ________.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

The classful IP address 200.200.200.200 is a Class ________ address.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

True or False: The IP address 127.0.0.1 is generally considered an acceptable address to use for a network host.

A

False. 127.0.0.1 is the local loopback address used to test the TCP/IP stack for functionality. In fact, 127.x.x.x should not be used as the entire 127 network is reserved for diagnostics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The default subnet mask for a Class B network is ________

A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

True or False:

In subnetting, borrowing 3 bits from hosts to form networks allows the creation of 10 additional networks.

A

False. Borrowing three bits will create only 8 subnets (2^3), not 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

How many networks can be created by borrowing 4 bits from hosts?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

True or False:

The only addresses that will function at all on a private network are those in the recognized private IP address ranges.

A

False. Other addresses will function, but they are not recommended because the firewalls between your network will not have the proper configuration to block those addresses from being seen by other companies and therefore could cause conflicts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The address 192.168.2.1 with a subnet mask of 255.255.255.0 could be a host address in a private network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

True or False:
It’s usually considered proper and easier to assign static IP addresses to all clients on a network, rather than using automatic assignmen.

A

False.

It’s easier and more accurate to use DHCP to provide automatic assignment for clients on a TCP/IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

True or False:

All router interfaces should be assigned a static address rather than use an automatically assigned address.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A ________ server is used to resolve hostnames to IP addresses.

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

True or False:

The address 169.254.1.1 with a default Class B subnet mask is an APIPA.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

True or False:
A newly installed Windows 7 client is automatically configured to obtain an address from a DHCP server if one is available.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

IP is a connectionless protocol that works at the ________ layer of the OSI model.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

TCP is a connection-oriented protocol that works at the ________ layer of the OSI model.

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

True or False:

UDP is a connection-oriented protocol that works at the Transport layer.

A

False.

UDP does work at the Transport layer, but it is a connectionless protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

True or False:

FTP is the most secure protocol used to transfer files from one computer to another.

A

False.

FTP is not a secure protocol and there are file transfer protocols that are secure, such as SFTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

TFTP is a connectionless protocol that works at the ________ layer of the OSI model.

A

Application

82
Q

True or False:

SMTP is a protocol used to store email messages on a server.

A

False.

SMTP is a protocol that is used to send email.

83
Q

SMTP works at the ________ layer of the OSI model.

A

Application

84
Q

True or False:

HTTP is a secure protocol typically used for Internet commerce.

A

False.

HTTP is not a secure protocol and is typically not used for Internet commerce; HTTPS is used.

85
Q

________ is one of the protocols used to retrieve mail from SMTP servers.

A

POP3 or IMAPv4

86
Q

True or False:

With IMAPv4, you can read, store, and manage your email without downloading it.

A

True

87
Q

True or False:

Telnet is a secure remote desktop protocol

A

False.

Telnet is not inherently secure and is rarely used in security conscious environments. SSH is used instead.

88
Q

True or False:

SSH is a secure protocol used to manage computers remotely.

A

True

89
Q

ICMP is a protocol that works at the ________ layer of the OSI model

A

Network

90
Q

You can test general connectivity between computers using the ________ tool.

A

ping

91
Q

The ping tool creates special packets called ________ packets.

A

Echo request

92
Q

The IP address 127.0.0.1 is referred to as the ________ address.

A

loopback

93
Q

The ________ tool works like the ping tool, but it can be used to determine which router is not able to forward a packet.

A

tracert

94
Q

True or False:

RG-6 coaxial cable has less resistance than RG-58 due to its thinner core wire.

A

False.

RG-6 has less resistance than RG-58 due to its thicker core wire.

95
Q

True or False:

The IP address of a computer must be unique to the local network.

A

True

96
Q

True or False:

The hostname of a computer must only be unique within its own hierarchy of names.

A

True

97
Q

True or False:

The ipconfig /all command displays all of the NetBIOS names of a computer.

A

False.
The ipconfig /all command displays the IP address, subnet mask, default gateway, and addresses of DNS servers, DHCP servers, and so on; but it does not display NetBIOS information. The nbtstat command does.

98
Q

True or False:

The ipconfig command displays the IP addresses configured for DNS servers and WINS servers.

A

False.

You must type ipconfig /all to obtain the addresses of DNS and WINS servers

99
Q

The ________ command displays the NetBIOS name cache showing recently resolved NetBIOS names and IP addresses.

A

nbtstat

100
Q

True or False:

VPN remote connectivity is inherently much faster than dial-up remote connectivity.

A

False

101
Q

True or False:

ARP is a connectionless protocol that works at the Transport layer of the OSI model.

A

False.
Address Resolution Protocol (ARP) is a connectionless protocol that works between the Network and Data Link layers of the OSI model.

102
Q

ARP resolves IP addresses to ________ addresses.

A

MAC

103
Q

NTP is an Application layer protocol that synchronizes ________ between computers on a network.

A

time

104
Q

A DNS record that is the same as an A record but is specifically used on IPv6 is an

A

AAAA record

105
Q

________ is the protocol that has become the standard for information directories such as Microsoft Active Directory.

A

Lightweight Directory Access Protocol (LDAP)

106
Q

________ is the protocol standard used for multicasting on intranets.

A

IGMP

107
Q

________ was developed along with WPA2 keys, used in wireless authentication.

A

Advanced Encryption Standard (AES)

108
Q

True or False:

TCP port 8080 is considered a well-known port.

A

False.

Well-known ports range from 0-1023; 8080 is a registered port.

109
Q

Registered ports range from 1024 to ________

A

49151

110
Q

Domain Name System (DNS) resolves ________ to IP addresses.

A

hostnames

111
Q

________ is a service that translates one set of addresses to another set of addresses.

A

network address translation (NAT)

112
Q

True or False:

EIGRP is considered to be a hybrid routing protocol.

A

True

113
Q

________ is a management protocol that you can use to gather information about the network and the components it contains.

A

simple network management protocol (SNMP)

114
Q

True or False:

OSPF is considered to be a hybrid routing protocol.

A

False.

OSPF is strictly a link-state routing protocol and is not considered to be a hybrid.

115
Q

________ is a technology whereby each packet of data can take a separate route to its destination.

A

Packet switching

116
Q

________ is a technology whereby a single channel is opened at the start of a session and that single channel is used throughout the communication.

A

Circuit switching

117
Q

A DNS record that indicates a mail server is an ________ record.

A

MX (mail exchange)

118
Q

A T-1 line is a dedicated line that can carry up to ________ on 24 separate channels.

A

1.544Mbps

119
Q

In the acronym ASDL, when referring to a digital subscriber line, the letter A stands for ______ .

A

asymmetric

120
Q

True or False:

Broadband cable currently offers data rates of 10Mbps or even higher.

A

True

121
Q

True or False:

SNMPv2 is actually more secure than SNMPv3.

A

False.

SNMPv3 was developed in part to be more secure than SNMPv2.

122
Q

A ________ is a secure connection that is transmitted through a nonsecure medium, usually the Internet.

A

VPN (virtual private network)

123
Q

________ is the protocol on which Microsoft Terminal Services operates.

A

RDP (remote desktop protocol

124
Q

________ is a flexible protocol that can be used to secure practically all TCP/IP related communication.

A

IPSec

125
Q

True or False:

All computer clients support the L2TP tunneling protocol.

A

False.

Only Windows 2000 Professional and newer support the L2TP tunneling protocol.

126
Q

________ is the local authentication protocol that is used by default for Microsoft Active Directory and Novell Directory Services.

A

Kerberos

127
Q

The ________ protocol is used for smart cards.

A

Extensible Authentication Protocol (EAP)

128
Q

True or False:

All Microsoft clients can use MS-CHAPv2.

A

False.

Only Windows 2000 Professional and later clients can use MS-CHAPv2

129
Q

________ is used as a carrier access method on 802.11a/b/g/n networks.

A

CSMA/CA

130
Q

True or False:

Fiber-optic cables are completely immune to EMI.

A

True

131
Q

True or False:

Some fiber-optic cables can carry a signal for over 10 kilometers.

A

True

132
Q

True or False:

Virtual servers are actually larger than physical servers.

A

False.

Virtual servers are made of software and are not in a physical form at all.

133
Q

True or False:
The colors of the wires in a network cable must be arranged in accordance with the network cable color standard in order for the cable to function correctly.

A

False.
You should follow the standards to avoid confusion and misconfiguration, but other combinations could work as long as you were consistent.

134
Q

A ________ can be used to verify connectivity in a cable without attaching the cable to a network.

A

media tester

135
Q

True or False:

A punch-down tool is often used to secure coaxial cables to a patch panel.

A

False.

A punch down tool is not used with coaxial cable, it’s used with twisted-pair cable.

136
Q

In the media-testing duo referred to as the fox and hound, the hound is actually a ________ and a ________.

A

tone generator, tone locator

137
Q

A ________ is a hardware device and/or software package that prevents packets from flowing through an interface from one network to another unless they meet a specified criterion.

A

firewall

138
Q

A ________ service makes a connection to the Internet on behalf of a user.

A

proxy

139
Q

True or False:

Some firewalls can work at layer 7 of the OSI model.

A

True

140
Q

True or False:

To operate properly, a proxy service must be placed logically between the client and the Internet.

A

True

141
Q

If port 80 is blocked on a firewall, then the ________ protocol will not function through the firewall.

A

HTTP

142
Q

True or False:

HTTP and HTTPS both use the same port.

A

False. HTTP uses port 80, while HTTPS uses port 443.

143
Q

________ are logical subnets that are formed using switches.

A

VLANs (virtual local area networks)

144
Q

True or False:

VLANs can reduce the effect of broadcasts across an entire network.

A

True

145
Q

True or False:

VLANs can provide security.

A

True

146
Q

True or False:

Switch ports can be assigned to multiple VLANs, making VLANs very flexible.

A

False.

Each switchport is generally assigned to only one VLAN.

147
Q

True or False:

With virtualization, one physical computer can host only one virtual computer.

A

False.

With virtualization, one physical computer can host many virtual computers simultaneously.

148
Q

An ________ allows users to access shared company information with their browsers without accessing the Internet.

A

intranet

149
Q

True or False:
The main purpose of antivirus software is to protect your computer by detecting and eradicating viruses before they have a chance to damage your computer.

A

True

150
Q

________ can be defined as the ability to lose a network component without losing data and or functionality.

A

Fault tolerance

151
Q

Fault-tolerant power usually comes in the form of a ________.

A

UPS (uninterruptible power supply)

152
Q

True or False:

BGP is a distance vector routing protocol designed to work between autonomous systems.

A

True

153
Q

True or False:

802.11g/n use CSMA/CD rather than CSMA/CA.

A

False.

802.11a/b/g/n use CSMA/CA

154
Q

169.254.1.1 is an example of an ________ address.

A

APIPA (automatic private internet protocol address)

155
Q

True or False:

OSPF is a distance vector routing protocol.

A

False.

OSPF is a link-state routing protocol.

156
Q

True or False:

For security purposes, you should always change the default configuration when installing a wireless access point.

A

True

157
Q

A packet that has one source address and one destination address is referred to as a

A

unicast

158
Q

A packet that has one source address and a list or range of destination addresses is referred to as a ________.

A

multicast

159
Q

________ is a modern protocol that combines the advantages of Frame Relay and ATM and speeds routing by using labels so that decision can be made much more quickly.

A

multiple protocol label switching (MPLS)

160
Q

True or False:

EIGRP is a link state routing protocol with distance vector attributes.

A

False.

EIGRP is a distance vector routing protocol with link-state attributes.

161
Q

True or False:

EIGRP is a distance vector routing protocol with link state attributes.

A

True

162
Q

________ uses 53 byte cells rather than variable-length packets

A

asynchronous transfer mode (ATM)

163
Q

________ are layer 3 devices that can move packets from one subnet to another.

A

routers

164
Q

True or False:

Some legacy applications still use NetBIOS names to identify computers.

A

True

165
Q

True or False:

A hostname can be a maximum of 15 characters long.

A

False.
A NetBIOS name is limited to 15 characters, but a hostname can be much longer, up to 255 characters including the delimiting “dots.”

166
Q

True or False:

Hostnames exist in a flat namespace.

A

False.

Hostnames exist in a hierarchical namespace.

167
Q

Previously resolved IP-to-MAC addresses are stored in the ARP cache on a Microsoft client for about ________ minutes.

A

10

168
Q

You can view the ARP cache on a computer by typing ________ on a command line.

A

arp -a

169
Q

True or False:

nslookup is a tool that can be used to test and verify NetBIOS name resolution.

A

False

170
Q

True or False:

The netstat command lists NetBIOS over TCP/IP statistics.

A

False

171
Q

A ________ record provides reverse lookups in DNS.

A

PTR

172
Q

________ is a dynamic database that resolves hostnames to IP addresses.

A

DNS (Domain Name System)

173
Q

True or False:

IP addresses for clients must be unique within a client’s subnet.

A

True

174
Q

________ increases throughput by allowing multiple paths for traffic on the same session.

A

load balancing

175
Q

The ipconfig command with no switches displays the IP address, subnet mask, and ________ of the computer interfaces.

A

default gateway

176
Q

True or False:

The name resolution server addresses for a client computer can be configured automatically using a DHCP server

A

True

177
Q

True or False:

The manual settings configured for a proxy server will always override any automatic configuration settings.

A

False.

Automatic settings for a proxy will override manual settings.

178
Q

True or False:

Dial-up connections are much more secure than VPN connections, which must go through the Internet servers

A

False.

VPN connections are typically much more secure than dialup connections.

179
Q

True or False:

Fiber-optic cables are twisted to prevent EMI

A

False.
Fiber-optic cables are not twisted and cannot suffer from electromagnetic interference (EMI), since they use light instead of electricity

180
Q

________ are specific logical addresses to which applications are assigned in a computer.

A

Ports

181
Q

True or False:

A virtual switch can perform most of the same functions as a physical switch.

A

True

182
Q

A technology that allows a switch or other device to use and distribute Ethernet current to power the devices is called .

A

Power over Ethernet (PoE)

183
Q

True or False:

QoS is a way of prioritizing traffic by protocol.

A

True

184
Q

True or False:

Single-mode fiber is generally used within buildings, whereas multimode is used for longer runs between buildings

A

False.

Multimode fiber is typically used within buildings, whereas singlemode fiber is used on longer runs between buildings

185
Q

A protocol used with VLANs that reduces administrative effort and increases accuracy when multiple switches are used, by allowing one switch to propagate information to many others is referred to as _______

A

VLAN Trunking Protocol (VTP)

186
Q

What is the largest recommended number of computers in a SOHO network?

A

10

187
Q

An interference caused by wires that run parallel to each other and not twisted together is called ________.

A

crosstalk

188
Q

An interference caused by wires running past speakers, fluorescent light ballasts, or electric motors is referred as ________.

A

electromagnetic interference (EMI

189
Q

A device that is used specifically to create a tunnel for communication through an inherently unsecure medium is a ________.

A

VPN concentrator

190
Q

If you are installing cables in between the ceiling tiles of a building, you may be required by a law to use a special type of cable called a ________ cable.

A

plenum

191
Q

True or False:

You should either use a host firewall or antivirus software on a computer, but not both.

A

False.

It is very common to use antivirus software and a firewall on the same computer.

192
Q

VLANs use special ports between switches called ________.

A

trunks

193
Q

True or False:

A VLAN is a logical network design that does not have to conform to a physical network topology.

A

True

194
Q

True or False:

Port authentication is the only form of security that most networks need

A

False.
Port authentication is only one form of security and it is not generally considered to be a high degree of security. Networks need many other forms of security to protect them from attack and corruption

195
Q

True or False:

Clients that are configured with static IP addresses will fail immediately if the DHCP server fails

A

False.

Clients that are configured with static IP addresses will be unaffected by the failure of a DHCP server

196
Q

True or False:

Clients that are configured automatically from a DHCP server will fail immediately if the DHCP server fails

A

False.
The failure of a DHCP server will keep clients from receiving new IP address assignments and leases, but those that have received their addresses already will keep them until the lease period expires

197
Q

A device that poses as a server with sensitive data to distract or even trap an attacker is referred to as a ________.

A

honeypot

198
Q

A device that can be installed into a network with preconfigurations of normal network traffic so that it can determine what is normal and block or even terminate sessions when something is not normal is a ________.

A

signature-based IPS

199
Q

True or False:
Nessus is a vulnerability scanning software that can find misconfigurations and open ports that could allow an attacker to take control of your systems

A

True

200
Q

A situation that allows current to flow on a different path than was originally intended in the circuit is a(n) _________.

A

open short or short circuit