Shared Flashcard Set

Details

CCM Net+ 2nd Set
CompTIA Network+ Exam Prep
309
Computer Networking
Not Applicable
12/27/2015

Additional Computer Networking Flashcards

 


 

Cards

Term

Card # 1

 

Both an SSL VPN and VPN use 1 to 2 and 3 data.

Definition
Both an SSL VPN and VPN use tunneling to encapsulate and encrypt data.
Term

Card # 2

 

Gateways connect incompatible systems by 1, and then 2, and finally 3.

Definition
Gateways connect incompatible systems by taking an incoming packet, stripping off the lower-level encapsulation of the original protocol, and re-encapsulating the packet with a new protocol.
Term

Card # 3

 

What Standard describes power over ethernet

Definition
802.3af
Term

Card # 4

 

A Straight through cable is also known as a

Definition
patch cable
Term

Card # 5

 

MPLS is a 1 of 2 that uses 3 on any combination of 4 and 5 6

Definition
MPLS is a framework of networking functions that uses labels on any combination of layer 2 and layer 3 headers
Term

Card # 6

 

In MPLS the routers does what as opposed to doing what

Definition
In MPLS, the router reads the label and forwards the packet to its neighbor as opposed to performing a network address lookup in its routing table.
Term

Card # 7

 

MPLS can travel over 1, 2, or 3 which are each at layer ? of the osi models, the labels created by MPLS are read and rewritten at layer ?

Definition
MPLS can travel over PPP, ATM or Frame Relay which are each at layer 2 of the OSI model, the labels created by MPLS are read and rewritten at layer 3.
Term

Card # 8

 

The ? DNS record type maps an IP address to the host name for the purpose of reverse lookup.

Definition
The PTR DNS record type maps an IP address to the host name for the purpose of reverse lookup.
Term

Card # 9

 

The ? DNS record type maps multiple canonical names (aliases) to an A record.

Definition
The CNAME DNS record type maps multiple canonical names (aliases) to an A record.
Term

Card # 10

 

The ? DNS record maps a host name to its IP address using a 128-bit IPv6 address.

Definition
The AAAA DNS record maps a host name to its IP address using a 128-bit IPv6 address.
Term

Card # 11

 

The ? DNS record maps a domain name to an email server list.

Definition
The MX DNS record maps a domain name to an email server list.
Term

Card # 12

 

a computer system monitor tool used to collect and show operating system storage input and output statistics.

Definition
iostat
Term

Card # 13

 

five interior gateway protocols are

Definition
RIP, OSPF, EIGRP, IS-IS, IGRP
Term

Card # 14

 

? IS THE PROTOCOL WINDOWS SYSTEMS USE TO BROWSE OTHER SYSTEMS AND SHARED RESOURCES

Definition
SMB
Term

Card # 15

 

Ethernet based LANs using thick cable for inter-connection is referred as ?.While ethernet systems using thinner coaxial cable is referred as ?.

Definition
Ethernet based LANs using thick cable for inter-connection is referred as Thicknet.While ethernet systems using thinner coaxial cable is referred as Thinnet.
Term

Card # 16

 

The AUI (attachment unit interface) is the 1 between a 2 and an 3. I think it is only used for 4

Definition
The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable. I think it's only used with coax
Term

Card # 17

 

A multimeter, also known as a 1, is an 2 that takes 3 such as 4, 5 or 6..

Definition
A multimeter, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance.
Term

Card # 18

 

802.1x

Definition
A standard for securing networks by implementing EAP as the authentication protocol over either a wired or wireless Ethernet LAN, rather than the more traditional implementation of EAP over PPP.
Term

Card # 19

 

802.2 standard

Definition
An IEEE standard used to address the need for MAC-sub-layer addressing in bridges.
Term

Card # 20

 

802.3 standard

Definition
An IEEE standard used to standardize Ethernet and expand it to include a wide range of cable media.
Term

Card # 21

 

802.3af standard

Definition
An IEEE standard used to describe Power over Ethernet (PoE) technology.
Term

Card # 22

 

Also known as 1, network diagrams provide 2 and 3 for 4.

Definition
Also known as network maps, network diagrams provide location and routing information for network devices.
Term

Card # 23

 

Cut-through switching is an operating mode in which the switch does what?

Definition
Cut-through switching is an operating mode in which the switch forwards a data packet as soon as it receives it, without performing any error checking or packet processing.
Term

Card # 24

 

A multilayer switch operates at Layers ? and ? of the OSI model. 3 are sometimes considered to be another type of multilayer switch, but the term “multilayer switch” generally refers to switches that do what?

Definition
A multilayer switch operates at Layers 2 and 3 of the OSI model. Content switches are sometimes considered to be another type of multilayer switch, but the term “multilayer switch” generally refers to switches that perform only limited routing functions at Layers 2 and 3.
Term

Card # 25

 

what is the definition of a wirelss tester? What is another name for it?

Definition
A wireless tester, or a WiFi analyzer, is a Wi-Fi spectrum analyzer used to detect devices and points of interference, as well as analyze and troubleshoot network issues on a WLAN or other wireless networks. Like network analyzers, wireless testers give an overview of the health of a WLAN in one central location, enabling technicians to troubleshoot problems efficiently.
Term

Card # 26

 

Site to Site vpn definition and characteristics

Definition
a VPN connection model is implemented such that each node on the network is connected to a remote network that may be separated by public or other unsecured networks
Term

Card # 27

 

the route print command is used to do what?

Definition
Display the routing table entries
Term

Card # 28

 

the route add command is used to do what?

Definition
add static entries
Term

Card # 29

 

the route delete command is used to do what?

Definition
remove static entries
Term

Card # 30

 

the route change command is used to do what?

Definition
modify an existing route
Term

Card # 31

 

the route -p command is used to do what?

Definition
make the specified route persistent across reboots, when used in conjunction with the add command
Term

Card # 32

 

the route -f command is used to do what?

Definition
clear a routing table of all entries
Term

Card # 33

 

Frame Relay is a

Definition
Wide Area Network (WAN) protocol that allows transmission of data over a shared network medium and bandwidth using virtual circuits.
Term

Card # 34

 

Multiprotocol Label Switching (MPLS) is a

Definition
framework of networking functions that uses labels on any combination of Layer 2 and Layer 3 headers.
Term

Card # 35

 

Asynchronous Transfer Mode (ATM) is a

Definition
cell-switching network technology. Unlike frame relay, it can guarantee QoS for a particular virtual channel
Term

Card # 36

 

definition of attenuation

Definition
Attenuation is a general term that refers to any reduction in the strength of a signal. Attenuation occurs with any type of signal, whether digital or analog. Sometimes called loss, attenuation is a natural consequence of signal transmission over long distances.
Term

Card # 37

 

TACACS+ is considered more secure and more scalable than RADIUS because it

Definition
accepts login requests and authenticates the access credentials of the user.
Term

Card # 38

 

A persistent agent is a

Definition
piece of software that installs on the client device, and can respond continuously to queries from the NAC about the device’s health. It stays on the device until uninstalled.
Term

Card # 39

 

A non-persistent agent, also known as a ?, is one that

Definition
A non-persistent agent, also known as a dissolvable agent, is one that is installed on demand and then removed after it is used. The agent installs, responds to NAC queries to check the health of the device, authenticates the device, and then disappears when the session is over.
Term

Card # 40

 

what are the seven stages of the network+ troubleshooting model

Definition
1. Identify the problem.

2. Establish a theory of probable cause.

This stage includes:

3. Test the theory to determine the cause.

4. Establish a plan of action to resolve the problem, while identifying the potential effects of your plan.

5. Implement the solution, or escalate the issue.

6. Verify full system functionality and, if applicable, implement preventative measures.

7. Document your findings, actions, and the outcomes.
Term

Card # 41

 

what are the substeps of step #1 in the network+ troubleshooting model

Definition

1. Identify the problem.

 

This stage includes:

Gathering information

Duplicating the problem, if possible

Questioning users to gain experiential information Identifying the symptoms

Determining if anything has changed

Approaching multiple problems individually

Term

Card # 42

 

what are the two substeps in step #2 in the network+ troubleshoointg model

Definition

Questioning the obvious

 

Considering multiple approaches, such as examining the OSI model from top to bottom and bottom to top and dividing and conquering

Term

Card # 43

 

what are the two substeps in step #3 in the network+ troubleshoointg model

Definition

a. When the theory is confirmed, determine the next steps to resolve the problem.

 

b. If the theory is not confirmed, establish a new theory or escalate the issue

Term

Card # 44

 

A multimeter, also known as a 1, is an electronic measuring instrument that takes 3 such as 4, 5, & 6,

Definition
A multimeter, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance.
Term

Card # 45

 

A protocol analyzer, aka as a 1, can examine packets from protocols that operate in which four layers?

Definition
1 - network analyzer, Physical, Data Link, Network, and Transport layers of the OSI model.
Term

Card # 46

 

The split horizon method is where

Definition
a router does not include any routes to the router from which it discovered its own location in its broadcasts.
Term

Card # 47

 

568C defines the standards for 1. It recognizes 2 as a 3. It also defines the 4 for both 5 & 6. In addition, it specifies the7.

Definition
568C defines the standards for commercial building cabling. It recognizes CAT6a as a media type. It also defines the minimum bend radius for both shielded and unshielded twisted pair cables. In addition, it specifies the maximum untwist value for CAT6a cable termination.
Term

Card # 48

 

blank is fast ethernet.

Definition
100Base-TX is Fast Ethernet
Term

Card # 49

 

what is meant by contention based medium.

Definition
Contention-based medium means that bandwidth is impacted by the number of nodes within the group. If a lot of people are using the Internet at the same time, speed is usually affected
Term

Card # 50

 

A biconic connector is a

Definition
A biconic connector is a screw-on type connector with a tapered sleeve that is fixed against guided rings.
Term

Card # 51

 

A subminiature (SMA) connector is similar to a 1 connector and is typically used where ?

Definition
A subminiature (SMA) connector is similar to a Straight Tip (ST) connector and is typically used where water or other environmental factors necessitate a waterproof connection, unlike a bayonet-style connector.
Term

Card # 52

 

A VPN concentrator is a device that 1 to 2. VPN concentrators are usually 3 or 4. They offer 5, 6 & 7.

Definition
VPN concentrator is a device that

1 - incorporates advanced encryption and authentication methods to

2 - handle a large number of VPN tunnels.

VPN concentrators are usually

3 - specifically geared towards secure remote access or

4 - site-to-site VPNs.

They offer 5 - high performance, 6 - high availability, and 7 - very good scalability.
Term

Card # 53

 

Access VPNs are used to 1 to 2 through 3 such as 4 , 5, or 6.

Definition
Access VPNs are used to (1) provide tunneling services to (2) individual users through (3) common subscriber lines such as (4) cable, (5) dial-up, or (6) ISDN.
Term

Card # 54

 

Extranet VPNs connect ?????? that ?????? for ??????.

Definition
Extranet VPNs connect networks that belong to different companies for the purposes of sharing resources.
Term

Card # 55

 

TACACS is capable of providing process-wide encryption for ??????, not just ??????. TACACS uses ?????? instead of ?????? and supports ??????.

Definition
TACACS is capable of providing process-wide encryption for authentication, not just password encryption. TACACS uses TCP instead of UDP and supports multiple protocols.
Term

Card # 56

 

Network controller: definition

Definition
A Network Controller is a hardware component that helps connect a computer to a network. In other words it's a NIC.
Term

Card # 57

 

Terminal Access Controller Access Control System (TACACS) and TACACS Plus (TACACS+) are (1) that provide (2) and (3) for (4).

Definition
Terminal Access Controller Access Control System (TACACS) and TACACS Plus (TACACS+) are authentication protocols that provide centralized authentication and authorization services for remote users.
Term
Card # 58

What functionality does a Remote Access Service (RAS) server provide?

Traffic metering and Quality of Service (QoS) services

Stateful packet inspection services

Standardized and centralized authentication services

Client virtual private network (VPN) connection and traffic routing services
Definition

the correct answer is Client virtual private network (VPN) connection and traffic routing services.

 

A RAS server is a combination dial-up and VPN server that can accept multiple client connections. It can also terminate client VPN tunnels and route client traffic into the private network.

Term

Card # 59

 

TACACS+, which is (closed/open) standard, uses TCP port 1 and also supports 2.

 

TACACS+ is considered 3 & 4 than RADIUS because it 5 & 6.

 

TACACS+ is not compatible with TACACS because it uses an 7.

Definition

TACACS+, which is open standard, uses TCP port 49 and also supports multifactor authentication.

 

TACACS+ is considered more secure and more scalable than RADIUS because it accepts login requests and authenticates the access credentials of the user.

 

TACACS+ is not compatible with TACACS because it uses an advanced version of the TACACS algorithm.

Term

Card # 60

 

A RAS server is a combination (1) and (2) that can (3). It can also (4) and (5) into (6).

Definition
A RAS server is a combination (1) dial-up and (2) VPN server that can that can (3) accept multiple client connections. It can also (4) terminate client VPN tunnels and (5) route client traffic into (6) the private network.
Term

Card # 61

 

Cut-through switching definition

Definition
an operating mode in which the switch forwards a data packet as soon as it receives it, without performing any error checking or packet processing.
Term

Card # 62

 

Content switches are capable of (1) by (2), and understand (3) and (4).

Definition
Content switches are (1) capable of making intelligent decisions about data by (2) analyzing data packets in real time, and understand (3) the criticality and (4) type of the request.
Term

Card # 63

 

A multilayer switch operates at (1) of (2). Content switches are sometimes considered to be another type of (3), but the term (4) generally refers to switches that perform only (5) at (6).

Definition
A multilayer switch operates at (1) Layers 2 and 3 of (2) the OSI model. Content switches are sometimes considered to be another type of (3) multilayer switch, but the term (4) “multilayer switch” generally refers to switches that perform only (5) limited routing functions at (6) Layers 2 and 3.
Term

Card # 64

 

A managed switch is simply a switch that can be (1), and does not relate specifically to a switch that (2).

Definition
A managed switch is simply a switch that can be configured by the user, and does not relate specifically to a switch that operates at Layers 4 through 7.
Term

Card # 65

 

IPSec in 1 is often used with 2. IPSec uses 3 or 4 to provide 5.

Definition
IPSec in Tunnel mode is often used with Layer Two Tunneling Protocol (L2TP). IPSec uses DES or 3DES encryption to provide data confidentiality.
Term

Card # 66

 

What is the MPPE encryption method?

Definition
A method of encrypting data transferred across Point-to-Point Protocol (PPP)-based dial-up connections or Point-to-Point Tunneling Protocol (PPTP) virtual private network (VPN) connections.
Term

Card # 67

 

3 characteristics of the MPPE encryption method. It is often used with ??? It requires the use of ??? or ??? It uses ??? for ???

Definition
It is often used with Point-to-Point Tunneling Protocol (PPTP). It requires the use of Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) or MS-CHAPv2. It uses Extensible Authentication Protocol (EAP) remote authentication.
Term

Card # 68

 

In most VPNs, data encryption is accomplished by either ??? or ???.

Definition
MPPE or IPSEC
Term

Card # 69

 

Which type of router is designed to collect data from end-user locations and redistribute them to an enterprise location such as a company's headquarters? Dual-band routers Access routers Distribution routers Core routers

Definition
distribution routers
Term

Card # 70

 

Distribution routers (1) from (2) and (3). Their capabilities are (4) those of regular access routers.

Definition
Distribution routers (1) collect data from (2) multiple access routers and (3) redistribute them to an enterprise location. Their capabilities are (4) greater than those of regular access routers.
Term

Card # 71

 

Access routers are (1) that are (2).

Definition
Access routers are (1) common inexpensive routers that are (2) generally located at customer sites.
Term

Card # 72

 

Core routers are (1) that are located at (2). They connect multiple (3) located (4).

Definition
Core routers are (1) powerful routers that are located at (2) the center of network backbones. They connect multiple (3) distribution routers located (4) in different buildings.
Term
Card # 73

Which type of virtual private network (VPN) connection model is implemented such that each node on the network is connected to a remote network that may be separated by public or other unsecured networks?

Host-to-host

Client-to-site

Host-to-site

Site-to-site
Definition
Site-to-site
Term

Card # 74

 

In store-and-forward switching, the switch (1) and (2). This is the (3) type of switching mode, since the switch must (4).

Definition
In store-and-forward switching, the switch (1) and (2). This is the (3) type of switching mode, since the switch must (4).
Term

Card # 75

 

A ??? would be useful for managing credentials and authenticating users.

Definition
domain controller
Term

Card # 76

 

A domain controller would be useful for

Definition
managing credentials and authenticating users.
Term

Card # 77

 

An IDS monitors the (1) for (2) and (3). The goal is to (4).

Definition
An IDS monitors the (1) security infrastructure for (2) signs of attacks in progress and (3) automates the intrusion detection process. The goal is to (4) alert administrators to possible security threats.
Term

Card # 78

 

The Citrix ICA protocol is a (1) used by (2) and (3) as an add-on to (4).

Definition
The Citrix ICA protocol is a remote terminal protocol used by Citrix WinFrame and Citrix Presentation Server software as an add-on to Microsoft Terminal Services.
Term

Card # 79

 

Current X Window systems are based on the (1) and normally used on (2) to (3).

Definition
Current X Window systems are based on the X11 protocol and normally used on UNIX- and Linux-based systems to display local applications.
Term
Card # 80

What is the term used for a website that becomes unavailable due to a sudden increase in popularity resulting from, for example, a hot news story?

Accidental Distributed Denial of Service (DDoS)

Network Time Protocol (NTP) vandalism

Unintentional Denial of Service (DoS)

Advanced Persistent Denial of Service (DoS)
Definition
An unintentional DoS is one that is the result of a sudden, unexpected, non-malicious traffic spike that effectively mimics an intentional DoS attack. A Friendly DOS attack is a situation where a website ends up denied because of a sudden enormous spike in popularity. This can happen when an extremely popular website posts a prominent link to a second, less well-prepared site, for example, as part of a news story.
Term

Card # 81

 

An attack is the

Definition
the act of exploiting vulnerability on a system, a service, or a network.
Term

Card # 82

 

A threat is a

Definition
a potential cause of an incident that may result in harm to systems and the organization.
Term

Card # 83

 

What does the third stage of the CompTIA Network+ Troubleshooting model require you to do?

Definition
It requires you to test your theories.
Term

Card # 84

 

What does the third stage of the CompTIA Network+ Troubleshooting model state

Definition
The third stage states: Test the theory to determine the cause. By testing your theory, you confirm it, revise it, or escalate the issue.
Term

Card # 85

 

Why is SNMP an unsecure protocol?

Definition
SNMP is an unsecure protocol because its authentication is passed in cleartext.
Term

Card # 86

 

What are the fifth, sixth, and seventh stages of the CompTIA Network+ Troubleshooting model?

Definition
Implement, verify, document The fifth, sixth, and seventh stages, in order, are: implement, verify, document
Term

Card # 87

 

At which layer of the TCP/IP protocol stack does IP filtering operate?

Definition
Layer 2 IP filtering operates mainly at Layer 2 of the TCP/IP protocol stack and is generally performed by a screening router, although other network devices can also perform IP filtering.
Term

Card # 88

 

Which method hardens the security on the network to allow only clients with specific IP or Media Access Control (MAC) addresses to have access to the network?

Definition
Dynamic Host Configuration Protocol (DHCP) snooping DHCP snooping uses information from the DHCP server to track the physical location of hosts, ensure that hosts only use the IP addresses assigned to them, and ensure that only authorized DHCP servers are accessible.
Term

Card # 89

 

Enterprise mode Wi-Fi Protected Access II (WPA2) uses what authentication type and a unique encryption key for every client when they log on to the network?

Definition
802.1x
Term

Card # 90

 

802.1x definition

Definition
A standard for securing networks by implementing EAP as the authentication protocol over either a wired or wireless Ethernet LAN, rather than the more traditional implementation of EAP over PPP.
Term

Card # 91

 

802.2 definition

Definition
An IEEE standard used to address the need for MAC-sub-layer addressing in bridges.
Term

Card # 92

 

802.3 definition

Definition
An IEEE standard used to standardize Ethernet and expand it to include a wide range of cable media.
Term

Card # 93

 

802.3af definition

Definition
An IEEE standard used to describe Power over Ethernet (PoE) technology.
Term

Card # 94

 

Identify the second step in the basic forensic process.

Definition
The second step is to secure the area to preserve the scene of the incident.
Term

Card # 95

 

In a (1) connection model, each node on the network is connected to a remote network, which may be separated by public or other unsecured networks. (1) VPNs may be either open or closed.

Definition
In a site-to-site connection model, each node on the network is connected to a remote network, which may be separated by public or other unsecured networks. Site-to-site VPNs may be either open or closed.
Term

Card # 96

 

What is the definition of an ad hoc network.

Definition
An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect.
Term

Card # 97

 

how is the flow of messages coordinated in an ad hoc network

Definition
Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other
Term

Card # 98

 

the pathping command provides information about what two things?

Definition
latency and packet loss on a network and it very likely provides other useful services and information too
Term

Card # 99

 

What is the value of pathping for network troubleshooting?

Definition
It can isolate a router or subnet with latency issues. The pathping command’s value is in its capability of identifying routers or subnets with latency problems by displaying packet loss data.
Term

Card # 100

 

Which device would you use to determine whether a cable meets specific International organization for Standardization (ISO) or Telecommunications Industry Association (TIA) standards?

Definition
Certification Tester . You would use a certification tester to check the cable for adherence to ISO or TIA standards.
Term

Card # 101

 

How can you prevent banner grabbing to increase your overall security?

Definition
Configure services to drop banner requests.
Term

Card # 102

 

banner grabbing is one of the easiest ways to do what

Definition
fingerprint an OS or an application/service
Term

Card # 103

 

To troubleshoot Terminal Access Controller Access Control System (TACACS) sessions, which utility should you turn to for assistance?

Definition
tcpdump
Term

Card # 104

 

Identify a quick test for Domain Name System (DNS) connectivity.

Definition
Perform an nslookup using a system’s or a site’s name. Perform an nslookup using a site’s name or system’s name. If you get a positive response, then DNS is working. If you receive an error, but are successful using the IP address, you have a DNS server problem.
Term

Card # 105

 

If you think that you have interface errors on a router, which command would you use to check for errors that are currently occurring on the interface?

Definition
show interface
Term

Card # 106

 

The router command show interface will

Definition
show you what’s going on at the time you issue the command and allow you to check for errors that are currently occurring on the interface
Term

Card # 107

 

What protocol enables multiple routers on a LAN to work together sharing a single virtual IP address?

Definition
Virtual Router Redundancy Protocol (VRRP) A virtual router is a software-based routing framework that enables the host computer to act as a hardware router over a LAN. The VRRP advertises a virtual router as the default gateway, which is backed by a group of physical routers that provide redundancy in case one fails. This helps you increase the availability of your networks.
Term

Card # 108

 

the count-to-infinity problem.

Definition
The core of the count-to-infinity problem is that if A tells B that it has a path somewhere, there is no way for B to know if the path has B as a part of it. To see the problem clearly, imagine a subnet connected like A–B–C–D–E–F, and let the metric between the routers be "number of jumps". Now suppose that A is taken offline. In the vector-update-process B notices that the route to A, which was distance 1, is down – B does not receive the vector update from A. The problem is, B also gets an update from C, and C is still not aware of the fact that A is down – so it tells B that A is only two jumps from C (C to B to A), which is false. Since B doesn't know that the path from C to A is through itself (B), it updates its table with the new value "B to A = 2 + 1". Later on, B forwards the update to C and due to the fact that A is reachable through B (From C point of view), C decides to update its table to "C to A = 3 + 1". This slowly propagates through the network until it reaches infinity
Term
Card # 109

Identify another workaround method for the count-to-infinity problem.

Seed routing

Routing Information Protocol (RIP)

Poison reverse

Reverse split horizon
Definition
Poison reverse
Term

Card # 110

 

In poison reverse what happens

Definition
routers using poison reverse broadcast routes back to the router from which they calculated their location. Instead of giving a true hop count, to discourage use of the route, the router broadcasts a hop count of 16 as a warning not to use the value specified and as an intimation that the route was learned from router 1
Term

Card # 111

 

? is a widely deployed wireless router for home use because of its coverage and its compatibility with most devices.

Definition
802.11b/g is a widely deployed wireless router for home use because of its coverage and its compatibility with most devices.
Term

Card # 112

 

568C defines the standards for 1.

Definition
commercial building cabling
Term

Card # 113

 

568c recognizes 1 as a 2

Definition
568c recognizes CAT6a as a media type
Term

Card # 114

 

568c defines the minimum 1 for both 2 and 3 4

Definition
568c also defines the minimum bend radius for both shielded and unshielded twisted pair cables.
Term

Card # 115

 

568c defines the maximum 1 for 2 3

Definition
In addition 568c, it specifies the maximum untwist value for CAT6a cable termination.
Term

Card # 116

 

What is the correct wiring scheme for the current T568B wiring standard?

Definition
White orange, orange, white green, blue, white blue, green, white brown, brown
Term

Card # 117

 

Which technology designations is considered to be Fast Ethernet?

Definition
100 base tx
Term

Card # 118

 

If you’re looking for an inexpensive Wi-Fi coverage solution at good data rate speeds, which Institute of Electrical and Electronics Engineers (IEEE) standard device should you seriously consider?

Definition
802.11n
Term

Card # 119

 

? features good coverage within 70 meters, compatibility with 5 GHz and 2.4 GHz devices, and transmission speeds of 150 Mbps or more.

Definition
802.11n features good coverage within 70 meters, compatibility with 5 GHz and 2.4 GHz devices, and transmission speeds of 150 Mbps or more.
Term

Card # 120

 

802.11n features good coverage within 1 meters, compatibility with 2 & 3 devices, and transmission speeds of 4 or more.

Definition
802.11n features good coverage within 70 meters, compatibility with 5 GHz and 2.4 GHz devices, and transmission speeds of 150 Mbps or more.
Term

Card # 121

 

You scan the network for a wireless access point until you locate one. Which Open Systems Interconnection (OSI) layer is a Wi-Fi part of?

Definition
Layer 1
Term

Card # 122

 

A coworker asks you for the port number for MySQL. You tell them it is 3306. Which Open Systems Interconnection (OSI) layer did you discuss with your coworker?

Definition
Layer 5 Layer 5 is the Session layer and Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports are both a part of this layer. This layer is also referred to as the port layer.
Term

Card # 123

 

Layer 5 is the 1 layer but is also reffered to as the 2 layer

Definition
Layer 5 is the Session layer. This layer is also referred to as the port layer.
Term

Card # 124

 

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports are both a part of the ? layer

Definition
Session
Term

Card # 125

 

NICs are a part of what layer

Definition
The data link layer, layer 2.
Term

Card # 126

 

What are the five characteristics of an analog signal?

Definition
amplitude, cycle, frequency, phase, and wavelength.
Term

Card # 127

 

Modulation is a form of what and what is the definition of that which modulation is a part?

Definition
Modulation is a form of multiplexing, which is a controlled media access method where a central device combines signals from multiple nodes and transmits the combined signal across a medium.
Term

Card # 128

 

what is the definition of multiplexing

Definition
a controlled media access method where a central device combines signals from multiple nodes and transmits the combined signal across a medium.
Term

Card # 129

 

what layer are firewalls a part of and what is the name of that layer

Definition
Layer 4 is the Transport layer and firewalls are part of this layer.
Term

Card # 130

 

Which Open Systems Interconnection (OSI) layer is email connected to?

Definition
email protocols operate at layer 7, the Application layer.
Term

Card # 131

 

A network Policy may also include specific information about 1 and 2, such as the use of 3, 4, 5, 6, 7, 8, & 9

Definition
A network Policy may also include specific information about 1 security and 2 network functions, such as the use of 3-removable drives and other detachable media, 4-instant messaging, 5-wireless devices, 6-the Internet, 7-backup storage, 8-network monitoring procedures, and 9-vendor agreements.
Term

Card # 132

 

What is the proper definition of change management

Definition
A systematic way of approving and executing change to ensure maximum security, stability, and availability of information technology services.
Term

Card # 133

 

Port forwarding (also referred to as port ?) enables a ?

Definition
permanent translation entry that maps a protocol port on a gateway to an IP address and protocol port on a private LAN.
Term

Card # 134

 

PAT is a subset of 1 that does what?

Definition
subset of dynamic NAT functionality that maps either one or more unregistered addresses to a single registered address using multiple ports.
Term

Card # 135

 

Which type of Domain Name System (DNS) record maps an IP address to the host name for the purpose of reverse lookup?

Definition
ptr
Term

Card # 136

 

The PTR DNS record type does what?

Definition
maps an IP address to the host name for the purpose of reverse lookup.
Term

Card # 137

 

The CNAME DNS record type does what?

Definition
maps multiple canonical names (aliases) to an A record.
Term

Card # 138

 

The AAAA DNS record type does what?

Definition
maps a host name to its IP address using a 128-bit IPv6 address.
Term

Card # 139

 

The MX DNS record type does what?

Definition
maps a domain name to an email server list.
Term

Card # 140

 

A port is a 1

Definition
A port is a number that represents a process running on a network. Both clients and servers use port numbers to identify themselves.
Term

Card # 141

 

A protocol is an 3

Definition
A protocol is an agreed-upon format of data transmission between two devices.
Term

Card # 142

 

A socket is a 2

Definition
A socket is a port that is in use.
Term

Card # 143

 

frame Relay is a Wide Area Network (WAN) protocol that allows

Definition
transmission of data over a shared network medium and bandwidth using virtual circuits.
Term

Card # 144

 

Multiprotocol Label Switching (MPLS) is a

Definition
framework of networking functions that uses labels on any combination of Layer 2 and Layer 3 headers.
Term

Card # 145

 

Asynchronous Transfer Mode (ATM) is a 1. Unlike frame relay, it can 2.

Definition
1 - cell-switching network technology. 2 - guarantee QoS for a particular virtual channel.
Term

Card # 146

 

What does the Optical Carrier x (OCx) standard specify?

Definition
The bandwidth for fiber optic transmissions.
Term

Card # 147

 

The OCx standard specifies the bandwidth for ?.

Definition
fiber optic transmissions.
Term

Card # 148

 

OCx specifications correspond to

Definition
the data rates of Synchronous Optical Network (SONET).
Term

Card # 149

 

A single OC channel corresponds to a data rate of

Definition
51.84 Mbps. As more channels are added, the throughput increases in proportion.
Term

Card # 150

 

In MPLS, what does the router do

Definition
In MPLS, the router reads the label (that exsists on any combination of layer 2 and/or 3 headers) and forwards the packet to its neighbor as opposed to performing a network address lookup in its routing table.
Term

Card # 151

 

MPLS can travel over 1, 2 or 3, which are each at what layer of the OSI model. However, the labels created by MPLS are read and rewritten at Layer ?.

Definition
MPLS can travel over PPP, Frame Relay, or ATM, which are each at Layer 2 of the OSI model. The labels created by MPLS are read and rewritten at Layer 3.
Term

Card # 152

 

Frame relay offers 3 advantages. What are they? It's 2 disadvantages prevent it from doing what?

Definition
Frame relay delivers increased performance with reduced network complexity and offers a pay-as-you-go structure. However, the bursty nature of traffic in a Frame Relay cloud, along with the use of variable-length frames, makes it difficult to provide QoS.
Term

Card # 153

 

Which type of fiber optic connector has a straight, ceramic center pin and bayonet lug lockdown, and is used to connect multimode fibers?

Definition
Straight Tip (ST) connector
Term

Card # 154

 

ST connectors have a 1 and 2. They are often used in 3

Definition
straight, ceramic center pin and bayonet lug lockdown. They are often used in network patch panels.
Term

Card # 155

 

? has a straight, ceramic center pin and bayonet lug lockdown. They are often used in network patch panels.

Definition
Straight Tip (ST) connector
Term

Card # 156

 

An SC uses 1 that 2, and is used with 3.

Definition
An SC uses box-shaped connectors that snap into a Receptacle, and is used with a singlemode fiber.
Term

Card # 157

 

? box-shaped connectors that snap into a Receptacle, and is used with a singlemode fiber.

Definition
An SC uses
Term

Card # 158

 

An LC uses an 1 and can be used to 2.

Definition
An LC uses an RJ-45–type latching and can be used to transition installations from twisted pair copper cabling to fiber.
Term

Card # 159

 

An 1 uses an RJ-45–type latching and can be used to transition installations from twisted pair copper cabling to fiber.

Definition
LC
Term

Card # 160

 

An FC uses a 1 for more 2 than 3 or 4 connectors.

Definition
An FC uses a heavy duty ferrule in the center for more mechanical stability than SMA or ST connectors.
Term

Card # 161

 

? uses a heavy duty ferrule in the center for more mechanical stability than SMA or ST connectors.

Definition
An FC
Term
Card # 162

Which statement is the most accurate description of a Mechanical Transfer Registered Jack (MT-RJ) fiber optic connector?

It features a tubular structure made of ceramic or metal that supports the fiber.

It is typically used where environmental factors necessitate a waterproof connection.

It is a compact snap-to-lock connector used with multimode fiber.

It is a screw-on type connector with a tapered sleeve that is fixed against guided rings.
Definition
It is a compact snap-to-lock connector used with multimode fiber.
Term

Card # 163

 

MT-RJ, also known as 1, is a 2 used with 3. It is similar in size to an 4 connector.

Definition
MT-RJ, also known as Fiber Jack, is a compact snap-to-lock connector used with multimode fiber. It is similar in size to an RJ-45 connector.
Term

Card # 164

 

? also known as Fiber Jack, is a compact snap-to-lock connector used with multimode fiber. It is similar in size to an RJ-45 connector.

Definition
MT-RJ, also known as Fiber Jack, is a compact snap-to-lock connector used with multimode fiber. It is similar in size to an RJ-45 connector.
Term

Card # 165

 

A biconic connector is a 1 connector with a 2 that is 3.

Definition
A biconic connector is a screw-on type connector with a tapered sleeve that is fixed against guided rings.
Term

Card # 166

 

A ? is a screw-on type connector with a tapered sleeve that is fixed against guided rings.

Definition
A biconic connector is a screw-on type connector with a tapered sleeve that is fixed against guided rings.
Term

Card # 167

 

A subminiature (SMA) connector is similar to a 1 and is typically used where 2 necessitate a 3, unlike a 4.

Definition
A subminiature (SMA) connector is similar to a Straight Tip (ST) connector and is typically used where water or other environmental factors necessitate a waterproof connection, unlike a bayonet-style connector.
Term

Card # 168

 

A ? is similar to a Straight Tip (ST) connector and is typically used where water or other environmental factors necessitate a waterproof connection, unlike a bayonet-style connector.

Definition
A subminiature (SMA) connector is similar to a Straight Tip (ST) connector and is typically used where water or other environmental factors necessitate a waterproof connection, unlike a bayonet-style connector.
Term

Card # 169

 

A Ferrule Connector (FC) is a 1 made of 2 or 3 that supports 4.

Definition
A Ferrule Connector (FC) is a tubular structure made of ceramic or metal that supports the fiber.
Term

Card # 170

 

A ? is a tubular structure made of ceramic or metal that supports the fiber.

Definition
A Ferrule Connector (FC) is a tubular structure made of ceramic or metal that supports the fiber.
Term

Card # 171

 

A distribution frame is a device that 1 and 2 with 3.

Definition
A distribution frame is a device that terminates cables and enables connections with other devices.
Term

Card # 172

 

A ? is a device that terminates cables and enables connections with other devices.

Definition
A distribution frame is a device that terminates cables and enables connections with other devices.
Term

Card # 173

 

A punch down tool is used to do what

Definition
connect cable wires directly to a patch panel or punch down block.
Term

Card # 174

 

A circuit tester is an electrical instrument that allows you to

Definition
determine whether or not current is passing through the circuit.
Term

Card # 175

 

A butt set, also known as a 1, is a special type of 2 used by 3 when 4.

Definition
A butt set, also known as a lineman's test set, is a special type of telephone handset used by telecom technicians when installing and testing local lines.
Term

Card # 176

 

In a collision domain,

Definition
nodes contend for access to the same physical medium.
Term

Card # 177

 

A broadcast domain is a

Definition
network segment on which broadcasts occur.
Term

Card # 178

 

A subnet is a 1 of a 2, created by an 3 to improve 4 or provide 5.

Definition
logical subset of a larger network, created by an administrator to improve network performance or to provide security.
Term
Card # 179

Which protocols would allow you to implement distance-vector routing?

Open Shortest Path First (OSPF)

Routing Information Protocol version 2 (RIPv2)

Border Gateway Protocol (BGP)

Intermediate System to Intermediate System (IS-IS)
Definition
Routing Information Protocol version 2 (RIPv2)

RIPv2 and IGRP are both distance-vector routing protocols that calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops.

OSPF and IS-IS are both link state routing protocols that attempt to build and maintain a more complex route database with more information about the network.

BGP is considered a hybrid routing protocol that uses both distance-vector and link state routing methods.
Term

Card # 180

 

1 and 2 are both distance-vector routing protocols that calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops.

Definition
RIPv2 and IGRP are both distance-vector routing protocols that calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops.
Term

Card # 181

 

BGP is considered a 1 that uses both 2 and 3

Definition
BGP is considered a hybrid routing protocol that uses both distance-vector and link state routing methods.
Term

Card # 182

 

RIPv2 and IGRP are both 1 that 2 and 3

Definition
RIPv2 and IGRP are both distance-vector routing protocols that calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops.
Term

Card # 183

 

OSPF and IS-IS are both 1 that attempt to 2 with more 3 about the 4

Definition
OSPF and IS-IS are both link state routing protocols that attempt to build and maintain a more complex route database with more information about the network.
Term

Card # 184

 

1 & 2 are both link state routing protocols that attempt to build and maintain a more complex route database with more information about the network.

Definition
OSPF and IS-IS are both link state routing protocols that attempt to build and maintain a more complex route database with more information about the network.
Term

Card # 185

 

In the host-to-site VPN connection model also, there are (1)—(2) and (3). In the case of an (2), the path between the (4) and the (5) is (6). In the case of a (3), the path between the (4) & (5) is (7).

Definition
In the host-to-site VPN connection model also, there are two types of networks—open and closed. In the case of an open VPN, the path between the end node and the IPSec gateway is not secured. In the case of a closed VPN, the path between the end node and the IPSec gateway is secured.
Term

Card # 186

 

In the ? model also, there are two types of networks—open and closed. In the case of an open VPN, the path between the end node and the IPSec gateway is not secured. In the case of a closed VPN, the path between the end node and the IPSec gateway is secured.

Definition
host to site vpn connection model
Term

Card # 187

 

In the host-to-host VPN connection model, rather than (1), a (2) makes a (3) to another (2). This can be used either internally or on the Internet. Where this is most common is when one (4) needs a (3) to another (4). Typically the tunneling protocol for host-to-host VPNs is (6).

Definition
Host-to-host: In the host-to-host VPN connection model, rather than connecting to another network, a single computer makes a secure connection to another single computer. This can be used either internally or on the Internet. Where this is most common is when one server needs a secure connection to another server. Typically the tunneling protocol for host-to-host VPNs is IPSEC.
Term

Card # 188

 

In the ? connection model, rather than connecting to another network, a single computer makes a secure connection to another single computer. This can be used either internally or on the Internet. Where this is most common is when one server needs a secure connection to another server. Typically the tunneling protocol for ? VPNs is IPSEC.

Definition
Host-to-host: In the host-to-host VPN connection model, rather than connecting to another network, a single computer makes a secure connection to another single computer. This can be used either internally or on the Internet. Where this is most common is when one server needs a secure connection to another server. Typically the tunneling protocol for host-to-host VPNs is IPSEC.
Term

Card # 189

 

??? is a remote-access authentication method that sends client IDs and passwords as cleartext. It is typically used when a remote client connects to a non-Windows PPP server that does not support password encryption.

Definition
PAP
Term

Card # 190

 

PAP is a remote-access authentication method that ?. It is typically used when ?.

Definition
PAP is a remote-access authentication method that sends client IDs and passwords as cleartext. It is typically used when a remote client connects to a non-Windows PPP server that does not support password encryption.
Term

Card # 191

 

PAP is a (1) that sends (2) as (3). It is typically used when a (4) connects to a (5) that (6).

Definition
PAP is a (1) remote-access authentication method that sends (2) client IDs and passwords as (3) cleartext. It is typically used when a (4) remote client connects to a (5) non-Windows PPP server that (6) does not support password encryption.
Term

Card # 192

 

The ??? addresses this problem of PAP sending client IDs and passwords via cleartext by using a combination of (1) and a (2) in which the (3) is (4).

Definition
The CHAP addresses this problem by using a combination of Message Digest 5 (MD5) hashing and a challenge-response mechanism in which the password is encrypted
Term

Card # 193

 

MS-CHAP is a Microsoft extension of CHAP that is specifically designed for

Definition
authenticating remote Windows workstations.
Term

Card # 194

 

Both (1) and (2) are tunneling protocols that increase traffic security through data encryption.

Definition
PPTP AND L2TP
Term

Card # 195

 

The HyperText Transfer Protocol (HTTP) is a network protocol that works on the (1) layer (Layer ?) of the OSI model and the (2) layer of the TCP/IP model to provide web services. HTTP uses port 80 for communicating with web clients and servers and runs on the (3) protocol.

Definition
The HyperText Transfer Protocol (HTTP) is a network protocol that works on the Application layer (Layer 7) of the OSI model and the Application layer of the TCP/IP model to provide web services. HTTP uses port 80 for communicating with web clients and servers and runs on TCP.
Term

Card # 196

 

Which of the following is not a type of certifier? A Local Area Network (LAN) tester A network cable certifier A qualification tester A line tester

Definition
A line tester A line tester is not a certifier. A line tester only tests for end-to-end connectivity, but not transmission quality.
Term

Card # 197

 

When using a protocol analyzer, which OSI model layer can you NOT gather information from? Data Link, Transport, Physical, Application

Definition
Application. A protocol analyzer, or a network analyzer, is diagnostic software that can examine and display data packets that are being transmitted over a network. It can examine packets from protocols that operate in the Physical, Data Link, Network, and Transport layers of the OSI model.
Term

Card # 198

 

The pathping command’s value is in its capability to do what?

Definition
identify routers or subnets with latency problems by displaying packet loss data.
Term

Card # 199

 

The toner probe emits a tone when it 1. It’s used to 1 & 2 3, 4 & 5 on a network.

Definition
The toner probe emits a tone when it detects a signal in a pair of wires. It’s used to trace and locate voice, audio, and video signals on a network.
Term

Card # 200

 

A Looking Glass site is a 1

 

A looking glass site accesses a 2 and 3 allowing a view of the 4.

 

Looking Glasses sites are used for 5

Definition
A Looking Glass site is a web server that allows external users to get a look at routing and network behavior as it originates from the remote network.

A looking glass site accesses a remote router and performs commands allowing a view of the IP and BGP route tables.

Looking Glasses sites are used for verifying routing between providers, and for verifying that routes are propagating correctly across the Internet.
Term
Card # 201

A split pair is among the most difficult to diagnose of wiring errors. What should you look for when testing a cable?

Over-reported bandwidth readings

Loopback

Impedance

Excessive cross-talk
Definition

Excessive cross-talk.

 

Having the tester look for excessive crosstalk usually detects a split pair. You have to use a certifier device to detect a split pair because a simple line tester isn’t sufficient for the job.

Term

Card # 202

 

You have to use a 1 to detect a split pair because a simple 2 isn’t sufficient for the job.

Definition
You have to use a certifier device to detect a split pair because a simple line tester isn’t sufficient for the job.
Term
Card # 203

What is the primary function of a Gigabit interface converters (GBICs) or an small form factor pluggable (SFP)?

To comply with the new 802.x standard.

To act as a primary network interface for new cabling schemas.

To increase the wavelengths used for device connection to avoid interference.

To convert electrical signals into optical signals and vice versa.
Definition

To convert electrical signals into optical signals and vice versa.

 

The primary function of a GBIC or an SFP is to convert electrical signals into optical signals and vice versa.

Term
Card # 204

What is the identifying symptom of attenuation?

Complete loss of signal

Slow responses from the network

High latency

Intermittent connectivity issues
Definition
Slow responses from the network
Term

Card # 205

 

Attenuation occurs when there is a 1, which results in 2

Definition
Attenuation occurs when there is a degradation of signal strength, which results in slow responses from the network.
Term

Card # 206

 

? occurs when there is a degradation of signal strength, which results in slow responses from the network.

Definition
Attenuation occurs when there is a degradation of signal strength, which results in slow responses from the network.
Term
Card # 207

If you need to upgrade your network to gigabit speeds but do not want to replace a lot of different components, which hardware solution could you use?

Gigabit interface converters (GBICs)

ThinNet transceivers

ThickNet transceivers

Attachment Unit Interfaces (AUIs)
Definition
Gigabit interface converters (GBICs) The GBIC is used as an interface for high-speed networking and to upgrade the network, without needing to replace all components in the motherboards.
Term

Card # 208

 

A wavelength mismatch can occur when

Definition
The provisioned value for wavelength does not match the supported wavelength.
Term

Card # 209

 

Which one of the following is considered to be a competing Voice over IP (VoIP) protocol with the H.323 suite?


Media Gateway Control Protocol (MGCP)


H.248


Real-Time Transport Protocol (RTP)


Session Initiation Protocol (SIP)

Definition
Media Gateway Control Protocol (MGCP) MGCP was developed by Cisco as an alternative to H.323.
Term

Card # 210

 

? was developed by Cisco as an alternative to H.323.

Definition
Media Gateway Control Protocol (MGCP) MGCP was developed by Cisco as an alternative to H.323.
Term

Card # 211

 

Media Gateway Control Protocol (MGCP) was developed by 1 as an alternative to 2.

Definition
Media Gateway Control Protocol (MGCP) MGCP was developed by Cisco as an alternative to H.323.
Term

Card # 212

 

Which protocol is analogous to Post Office Protocol (POP)

Definition
Internet Message Access Protocol (IMAP) IMAP is analogous to POP in that they are both used to transfer email from an email server.
Term

Card # 213

 

IMAP is analogous to 1 in that they are both used to 2.

Definition
IMAP is analogous to POP in that they are both used to transfer email from an email server.
Term

Card # 214

 

What is the major advantage of Internet Message Access Protocol (IMAP) over Post Office Protocol (POP)?

Definition
IMAP can be left on a server, making it easier to access them from multiple computers or devices. IMAP has the advantage of being able to retain messages on the email server, making it easier to use multiple devices that keep email in sync with each other.
Term

Card # 215

 

If you want Windows systems to browse freely across different network segments, you have to allow which protocol through your internal firewall?

Definition
Server Message Block (SMB) . SMB is the protocol Windows systems use to browse other systems and shared resources.
Term

Card # 216

 

? is the protocol Windows systems use to browse other systems and shared resources.

Definition
Server Message Block (SMB). SMB is the protocol Windows systems use to browse other systems and shared resources.
Term

Card # 217

 

SMB is the protocol Windows systems use to ?

Definition
SMB is the protocol Windows systems use to browse other systems and shared resources.
Term

Card # 218

 

Windows systems use which protocol to locate and connect to other Windows servers and services on a network?

Definition
Network Basic Input/Output System (NetBIOS)
Term

Card # 219

 

In a TCP/IP network, NetBIOS clients, such as Windows systems, use NetBIOS over TCP/IP to 1, and then 2 TO 3 such as 4 AND 5

Definition
In a TCP/IP network, NetBIOS clients, such as Windows systems, use NetBIOS over TCP/IP to connect to servers, and then issue SMB commands to complete tasks such as accessing shared files and printers.
Term

Card # 220

 

Which of the following is a characteristic of the IP Security (IPSec) encryption method, as opposed to Microsoft Point-to-Point Encryption (MPPE)?


It is often used with Point-to-Point Tunneling Protocol (PPTP).


It requires the use of Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) or MS-CHAPv2.


It uses Data Encryption Standard (DES) or Triple DES (3DES) encryption.


It uses Extensible Authentication Protocol (EAP) remote authentication.

Definition

It uses Data Encryption Standard (DES) or Triple DES (3DES) encryption.

 

IPSec in Tunnel mode is often used with Layer Two Tunneling Protocol (L2TP).

 

IPSec uses DES or 3DES encryption to provide data confidentiality.

 

The remaining features listed are characteristics of the MPPE encryption method.

Term

Card # 221

 

What are 3 features of MPPE

Definition
It is often used with Point-to-Point Tunneling Protocol (PPTP). It requires the use of Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) or MS-CHAPv2. It uses Extensible Authentication Protocol (EAP) remote authentication.
Term

Card # 222

 

IPSec in 1 is often used with 2. IPSec uses 3 or 4 encryption to provide data confidentiality.

Definition
IPSec in Tunnel mode is often used with Layer Two Tunneling Protocol (L2TP). IPSec uses DES or 3DES encryption to provide data confidentiality.
Term

Card # 223

 

VNC is a 1. A VNC viewer on a 2 can 3.

Definition
VNC is a platform-independent desktop sharing system. A VNC viewer on a Linux system can connect to a VNC server on a Microsoft system and vice-versa.
Term

Card # 224

 

RDP is used specifically for ?.

Definition
RDP is used specifically for Microsoft's Remote Desktop system.
Term

Card # 225

 

The Citrix ICA protocol is a 1 used by 2 and 3 software as an 4.

Definition
The Citrix ICA protocol is a remote terminal protocol used by Citrix WinFrame and Citrix Presentation Server software as an add-on to Microsoft Terminal Services.
Term

Card # 226

 

Current X Window systems are1 and 2 to 3

Definition
Current X Window systems are based on the X11 protocol and normally used on UNIX- and Linux-based systems to display local applications
Term

Card # 227

 

1 is a platform-independent desktop sharing system.

 

A 2 viewer on a Linux system can connect to a 3 on a Microsoft system and vice-versa.

Definition
VNC is a platform-independent desktop sharing system. A VNC viewer on a Linux system can connect to a VNC server on a Microsoft system and vice-versa.
Term

Card # 228

 

? is used specifically for Microsoft's Remote Desktop system.

Definition
RDP is used specifically for Microsoft's Remote Desktop system.
Term

Card # 229

 

? is a remote terminal protocol used by Citrix WinFrame and Citrix Presentation Server software as an add-on to Microsoft Terminal Services.

Definition
The Citrix ICA protocol is a remote terminal protocol used by Citrix WinFrame and Citrix Presentation Server software as an add-on to Microsoft Terminal Services.
Term

Card # 230

 

? are based on the X11 protocol and normally used on UNIX- and Linux-based systems to display local applications

Definition
Current X Window systems are based on the X11 protocol and normally used on UNIX- and Linux-based systems to display local applications
Term

Card # 231

 

Port forwarding (also referred to as 1) enables a 2 that 3 to a 4 and 5 on a 6

Definition
Port forwarding (also referred to as port mapping) enables a permanent translation entry that maps a protocol port on a gateway to an IP address and protocol port on a private LAN.
Term

Card # 232

 

NAT does 1 from 2

Definition
NAT conceals internal addressing schemes from external networks.
Term

Card # 233

 

PAT is a 1 that 2 to a 3 using 4

Definition
PAT is a subset of dynamic NAT functionality that maps either one or more unregistered addresses to a single registered address using multiple ports
Term

Card # 234

 

? enables a permanent translation entry that maps a protocol port on a gateway to an IP address and protocol port on a private LAN.

Definition
Port forwarding (also referred to as port mapping) enables a permanent translation entry that maps a protocol port on a gateway to an IP address and protocol port on a private LAN.
Term

Card # 235

 

? conceals internal addressing schemes from external networks.

Definition
NAT conceals internal addressing schemes from external networks.
Term

Card # 236

 

? is a subset of dynamic NAT functionality that maps either one or more unregistered addresses to a single registered address using multiple ports

Definition
PAT is a subset of dynamic NAT functionality that maps either one or more unregistered addresses to a single registered address using multiple ports
Term

Card # 237

 

Which device would you use to check the cable’s integrity before rebuilding it?

Definition
cable certifier
Term

Card # 238

 

A cable certifier will 1 your 2 for 3 and tell you if it is 4 or 5

Definition
A cable certifier will test your cable for functionality and tell you if it is a straight-through or a crossover.
Term

Card # 239

 

A multimeter, also known as a 1, is an 2 that 3 such as 4, 5 and 6

Definition
A multimeter, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance.
Term

Card # 240

 

A ? will test your cable for functionality and tell you if it is a straight-through or a crossover.

Definition
A cable certifier will test your cable for functionality and tell you if it is a straight-through or a crossover.
Term

Card # 241

 

A ?, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance.

Definition
A multimeter, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance.
Term

Card # 242

 

what is A replacement for Spanning Tree Protocol (STP) that simplifies the creation and configuration of networks

Definition
Shortest path bridging
Term

Card # 243

 

Shortest Path Bridging is a 1 for 2 that 3 and 4

Definition
Shortest Path Bridging is a replacement for Spanning Tree Protocol (STP) that simplifies the creation and configuration of networks
Term

Card # 244

 

? is a hybrid routing protocol used to establish routing between ISPs.

Definition
Border Gateway Protocol (BGP) is a hybrid routing protocol used to establish routing between ISPs.
Term

Card # 245

 

Border Gateway Protocol (BGP) is a 1 used to 2 between 3

Definition
Border Gateway Protocol (BGP) is a hybrid routing protocol used to establish routing between ISPs.
Term

Card # 246

 

Interior Gateway Routing Protocol (IGRP) is an improvement over 1 that is designed to be 2 within an 3.

Definition
Interior Gateway Routing Protocol (IGRP) is an improvement over RIP that is designed to be deployed on interior routers within an autonomous system.
Term

Card # 247

 

? is an improvement over RIP that is designed to be deployed on interior routers within an autonomous system.

Definition
Interior Gateway Routing Protocol (IGRP) is an improvement over RIP that is designed to be deployed on interior routers within an autonomous system.
Term

Card # 248

 

SPB combines an 1 with a 2 running between 3.

Definition
SPB combines an Ethernet data path with an IS-IS link state control protocol running between Shortest Path bridges.
Term

Card # 249

 

1 combines an Ethernet data path with an IS-IS link state control protocol running between 1.

Definition
SPB combines an Ethernet data path with an IS-IS link state control protocol running between Shortest Path bridges.
Term

Card # 250

 

Enhanced Interior Gateway Routing Protocol (EIGRP) is a 1 by 2 that supports 3 and 4 5 .

Definition
Enhanced Interior Gateway Routing Protocol (EIGRP) is a proprietary routing protocol by Cisco that supports classful and classless subnet masks.
Term

Card # 251

 

? is a proprietary routing protocol by Cisco that supports classful and classless subnet masks.

Definition
Enhanced Interior Gateway Routing Protocol (EIGRP) is a proprietary routing protocol by Cisco that supports classful and classless subnet masks.
Term

Card # 252

 

What command would you use in Windows Server 2012 R2 to clear a static routing table of all entries?

Definition
route-f. The route-f command would clear a static routing table of all entries.
Term

Card # 253

 

What process is used on packet-switched networks to automatically calculate route costs and routing table entries?

Definition
Distance-vector routing
Term

Card # 254

 

A friend of yours tells you about a new website that he wants you to see. Which Open Systems Interconnection (OSI) layer are they asking you to examine?

Definition
Layer 7 . Layer 7 is the Application layer and HTTP operates on this layer.
Term

Card # 255

 

Layer ? is the blank layer and HTTP operates on this layer.

Definition
Layer 7 is the Application layer and HTTP operates on this layer.
Term

Card # 256

 

? is the standard for synchronous data transport over a fiber optic cable. It is the U.S. version of the standard published by ANSI.

Definition
SONET is the standard for synchronous data transport over a fiber optic cable. It is the U.S. version of the standard published by ANSI.
Term

Card # 257

 

? is the European version of standard for synchronous data transport over a fiber optic cable

Definition
SDH is the European version of standard for synchronous data transport over a fiber optic cable
Term

Card # 258

 

? is a standard that describes Layer 1 and Layer 2 specifications for wireless local area networks (LANs).

Definition
802.11 is a standard that describes Layer 1 and Layer 2 specifications for wireless local area networks (LANs).
Term

Card # 259

 

? is a set of networking technologies and media access methods specified for LANs.

Definition
Ethernet is a set of networking technologies and media access methods specified for LANs.
Term

Card # 260

 

SONET is the 1. It is the U.S. version of the standard published by ANSI.

Definition
SONET is the standard for synchronous data transport over a fiber optic cable. It is the U.S. version of the standard published by ANSI.
Term

Card # 261

 

SDH is the European version of standard for 1 over a 2

Definition
SDH is the European version of standard for synchronous data transport over a fiber optic cable
Term

Card # 262

 

802.11 is a standard that describes 1 and 2 3 for 4

Definition
802.11 is a standard that describes Layer 1 and Layer 2 specifications for wireless local area networks (LANs).
Term

Card # 263

 

Ethernet is a set of 1 and 2 specified for 3.

Definition
Ethernet is a set of networking technologies and media access methods specified for LANs.
Term

Card # 264

 

What are Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP) all examples of?

Definition
Interior Gateway Protocols
Term

Card # 265

 

IGPs are protocols that are responsible for 1 between 2 within a 3.

Definition
IGPs are protocols that are responsible for exchanging routing information between gateways within an Autonomous System.
Term

Card # 266

 

Examples of Interior Gateway Protocols include 1, 2, 3, 4 & 5.

Definition
Examples of IGPs include RIP, OSPF, EIGRP, IS-IS, and IGRP.
Term

Card # 267

 

What process is used on packet-switched networks to automatically calculate route costs and routing table entries?

Definition
Distance-vector routing
Term

Card # 268

 

? is a simple routing protocol used in packet-switched networks that utilizes distance to decide the best packet forwarding path. Distance is typically represented by the hop count

Definition
Distance vector routing is a simple routing protocol used in packet-switched networks that utilizes distance to decide the best packet forwarding path. Distance is typically represented by the hop count
Term

Card # 269

 

Distance vector routing is a simple routing protocol used in 1 that utilizes 2 to decide the best packet forwarding path. Distance is typically represented by the 3.

Definition
Distance vector routing is a simple routing protocol used in packet-switched networks that utilizes distance to decide the best packet forwarding path. Distance is typically represented by the hop count
Term

Card # 270

 

To set up a simple, logfile-based device monitoring system on your network, what would you use?

Definition
Syslog
Term

Card # 271

 

? is a simple, easy to set up logfile-based monitoring system that collects data from many types of devices via the syslog agent that is already present on most operating systems and networked devices.

Definition
Syslog is a simple, easy to set up logfile-based monitoring system that collects data from many types of devices via the syslog agent that is already present on most operating systems and networked devices.
Term

Card # 272

 

What information should you include in your network diagrams?

Definition
Location and routing information for network devices. Also known as network maps, network diagrams provide location and routing information for network devices.
Term

Card # 273

 

Also known as 1, network diagrams provide 2 and 3 for 4

Definition
Also known as network maps, network diagrams provide location and routing information for network devices.
Term

Card # 274

 

What are two essential logical network diagram components.

Definition
Routing topology and node trust relationships
Term

Card # 275

 

Logical Network Diagrams contain at least 5 things. What are they?

Definition
Logical network diagrams contain routing topology and node trust relationships. Additionally, they contain node IP addresses, device FQDNs, and application types.
Term

Card # 276

 

what is the definition of port mirroring

Definition
Port mirroring is a method of copying and sending network packets transmitted as input from a port to another port of a monitoring computer/switch/device. It is a network monitoring technique implemented on network switches and similar devices.
Term

Card # 277

 

What is the IEEE standard designation for the Spanning Tree Protocol

Definition
802.1d
Term

Card # 278

 

802.1d is the IEEE standard designation for what

Definition
spanning tree protocol
Term

Card # 279

 

Managed switches allow administrators to create ??? within the network.

Definition
Managed switches allow administrators to create VLANs within the network.
Term

Card # 280

 

Port mirroring is useful as a 1 when you need to 2 going to a 3 with minimal impact on the network performance.

Definition
Port mirroring is useful as a diagnostic tool when you need to monitor all traffic going to a particular port or node with minimal impact on the network performance.
Term

Card # 281

 

The ? standard describes PoE.

Definition
The 802.3af standard describes PoE.
Term

Card # 282

 

The 802.3af standard describes ?

Definition
The 802.3af standard describes PoE.
Term

Card # 283

 

Power over Ethernet (PoE) technology enables networks to deliver 1 & 2 over 3, with up to 4 of 5 power supplied to each powered device and with 6 being assured due to power dissipation during delivery?

Definition
Power over Ethernet (PoE) technology enables networks to deliver electrical power and standard data over Ethernet cabling, with up to 15.4 W of DC power supplied to each powered device and with 12.95 W being assured due to power dissipation during delivery?
Term

Card # 284

 

How do network devices figure out which VLAN specific frames belong to?

Definition
The IEEE 802.1q trunk link protocol addresses this issue.
Term

Card # 285

 

The ? addresses this issue of how network devices figure out which VLAN specific frames belong to

Definition
The IEEE 802.1q trunk link protocol addresses this issue of how network devices figure out which VLAN specific frames belong to
Term

Card # 286

 

1 is a set of IEEE standards that govern wireless networking transmission methods. They are commonly used today in their 2, 3, 4, 5, & 6 versions to provide wireless connectivity in the home, office and some commercial establishments.

Definition
802.11 is a set of IEEE standards that govern wireless networking transmission methods. They are commonly used today in their 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac versions to provide wireless connectivity in the home, office and some commercial establishments.
Term

Card # 287

 

802.11 IEEE standards govern what?

Definition
wireless networking transmission methods
Term

Card # 288

 

802.1q inserts a 1 in the 2 identifying the 3 for that 4.

Definition
802.1q inserts a special tag in the Ethernet header identifying the VLAN for that frame. The switch at the other end of the trunk link will read that tag and forward the frame to the appropriate VLAN.
Term

Card # 289

 

Firewalls are part of the ? Layer

Definition
Transport
Term

Card # 290

 

What is the most common in-band remote-management hardware device?

Definition
Network switch
Term

Card # 291

 

Unlike out-of-band connection, in-band connection is available only when ?

Definition
Unlike out-of-band connection, in-band connection is available only when the server is initialized and functioning properly.
Term

Card # 292

 

In-band connection relies on 1 to 2.

Definition
In-band connection relies on operating-system network drivers to establish computer connections.
Term

Card # 293

 

The most common in-band remote-management hardware device is the 1. 2 and 3 are also classified as 1.

Definition
The most common in-band remote-management hardware device is the network adapter. YES, I know card # 305 said the most common in-band remote management hard device was the network switch. No I don't know which one is correct. If you see this quesiton on the test, I guess you will just have to flip a coin between those two answers
Term

Card # 294

 

1 & 2 are also classified as network adapters.

Definition
Analog modems and Integrated Services Digital Network (ISDN) adapters are also classified as network adapters.
Term

Card # 295

 

Network administrators typically use out of band management when ?

Definition
standard connectivity isn’t available.
Term

Card # 296

 

Network administrators typically use ? when standard connectivity isn’t available.

Definition
Network administrators typically use out of band management when standard connectivity isn’t available.
Term

Card # 297

 

Trunking is also known as 1, 2, 3, & 4 among other names.

Definition
Trunking is also known as link aggregation, port teaming, EtherChannel, and NIC bonding, among other names.
Term

Card # 298

 

Why is an Network Time Protocol (NTP) amplified Distributed Denial of Service (DDoS) attack the most effective against a target?

Definition
It generates a huge amount of traffic against a target
Term

Card # 299

 

IP filtering operates mainly at Layer ? of the TCP/IP protocol stack and is generally performed by a ?, although ? can also perform IP filtering.

Definition
IP filtering operates mainly at Layer 2 of the TCP/IP protocol stack and is generally performed by a screening router, although other network devices can also perform IP filtering.
Term
A collision domain occurs on a 1 where the transmission of a 2 is heard by 3.
Definition
This occurs on a logical bus, where the transmission of a single node is heard by all nodes. A collision can happen in this type of situation.
Term
[image]
Definition
MT-RJ
Term
[image]
Definition
BNC CONNECTOR
Term
[image]
Definition
LC connector
Term
[image]
Definition
SC connector
Term
[image]
Definition
ST Connector
Term
[image]
Definition
SMA connector
Term
[image]
Definition
BICONIC CONNECTOR
Term
Site to Site VPNs are most commone where one 1 needs a secure connection to another 1.

Typically the tunneling protocol for Site to site VPNs is 2.
Definition
Where this is most common is when one server needs a secure connection to another server.

Typically the tunneling protocol for ? VPNs is IPSEC.
Term
You have to use a 1 to detect a split pair because a 2 isn't sufficient for the job
Definition
You have to use a certifier device to detect a split pair because a simple line tester isn't sufficient for the job
Supporting users have an ad free experience!