Term
| Specified Distance and medium of 1000Base-LX (2 types) |
|
Definition
|
|
Term
| Specified Distance and medium of 1000Base-T |
|
Definition
| Twisted-pair cabling (CAT-5, CAT-5e, CAT-6, or CAT-7) - 100M |
|
|
Term
| Specified Distance and medium of 1000Base-CX |
|
Definition
| Balanced copper cabling - 25M |
|
|
Term
| Specified Distance of 1000Base-SX |
|
Definition
| MMF - 220 to 550m (depending on fiber diameter & bandwidth |
|
|
Term
|
Definition
| Fast Ethernet - CAT 5 cable or above |
|
|
Term
|
Definition
| Fast Ethernet over optical wire; half-duplex - 400m; full-duplex over mmf - 2km; full-duplex over smf - 10km |
|
|
Term
| 100 pair cable is typical used to connect: |
|
Definition
|
|
Term
| Which tool would you use to test the break in a fiber connection on the network? |
|
Definition
| OTDR (optical time-domain reflectometer) |
|
|
Term
| What is the best tool to test the connection at a demarcation point on a 66 block when no dial tone is present? |
|
Definition
|
|
Term
| What is the maximum amount of wires that fit into an RJ-11 connector? |
|
Definition
|
|
Term
| What is best to configure on a workstation to block certain websites and ports? |
|
Definition
|
|
Term
| What are two characteristics of SMF? |
|
Definition
| Can be used for distances over 2km & uses laser light for transmission |
|
|
Term
| Which tool measures in Ohms? |
|
Definition
|
|
Term
|
Definition
| Exterior Gateway Protocol, replaced by BGP, EGP is a simple reachability protocol, and, unlike modern distance-vector and path-vector protocols, it is limited to tree-like topologies |
|
|
Term
| What is used to transfer data between subnets? |
|
Definition
|
|
Term
| What allows certain ports to be part of the same group while other ports within that switch are part of a different group? |
|
Definition
|
|
Term
| What can an application layer firewall filter that a network layer firewall cannot? |
|
Definition
|
|
Term
| What is a set of techniques that create a network without manual operator intervention or special configuration servers |
|
Definition
|
|
Term
| What masks an IP address of a device from outside the network? |
|
Definition
| NAT (Network Address Translation) |
|
|
Term
| What tools could you use to determine that a machine was using the correct DNS server? |
|
Definition
|
|
Term
| Does TFTP transmit on UDP or TCP ports? |
|
Definition
|
|
Term
| What is the maximum CAT 3 length acceptable for a horizontal cross connect? |
|
Definition
|
|
Term
| What layer of the OSI model does a hub operate on? |
|
Definition
|
|
Term
| What cable is used to connect multiple layer 2 switches? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| What configures a PC's IP address if static addressing isn't configured and the DHCP server is unavailable? |
|
Definition
|
|
Term
| What's an automated application capable of infecting computers without user interaction? |
|
Definition
|
|
Term
| What item changes the the encryption key on a user's session after a set period of time? |
|
Definition
| TKIP (Temporal Key Integrity Protocol) |
|
|
Term
| What is the range of multicast IP addresses? |
|
Definition
| 224.0.0.0 through 239.255.255.255 |
|
|
Term
| What protocol would be used to trunk multiple VLAN traffic across the same physical link? This protocol also allows for individual VLANs to communicate with one another with the use of a switch with layer-3 capabilities, or a router. |
|
Definition
|
|
Term
| What can be enabled to mitigate risk from Rogue Access Points? |
|
Definition
| Enabling MAC address filtering |
|
|
Term
| Which authentication method uses public and private keys to secure communication and ensure the senders identity? |
|
Definition
|
|
Term
| What type of cable is used to test the operation of a NIC? |
|
Definition
|
|
Term
| What are the two IEEE designators for Spanning Tree Protocol? |
|
Definition
|
|
Term
| What is the time required by protocols to update their forwarding tables after changes have occured? |
|
Definition
|
|
Term
| What cables would be used when connecting two devices for voice on a vertical connect? |
|
Definition
|
|
Term
| Toner Probe can be used to: |
|
Definition
| Locate positions in cross connections |
|
|
Term
| Which WAN technology uses DWDM (dense wavelength division multiplexing)? |
|
Definition
|
|
Term
|
Definition
| NTP (network time protocol) |
|
|
Term
| A network is ___________ when all routers in a network agree about the path from one point to another |
|
Definition
|
|
Term
| What can indicate the wrong hostname on a workstation? |
|
Definition
| When ping doesn't produce a reply yet the workstation is part of the domain and is able to get to the internet |
|
|
Term
| What is the likely cause of a computer being unable to reach network resources after it has been unplugged from a network for a week and in the mean time several computers were added to the network? |
|
Definition
| The DHCP pool limit has been reached |
|
|
Term
| What tool would be used to determine if the connection is punched down and there is noise coming across the cable? |
|
Definition
|
|
Term
| The function of a tone generator is to generate a tone to test: |
|
Definition
| Continuity (not signal strength, impedance, or feedback) |
|
|
Term
| What command would return the following output in a Windows environment? ****Request timed out ****Request timed out |
|
Definition
|
|
Term
| What is the difference between 10Base-T and 100Base-T? |
|
Definition
| Shorter timing between Ethernet frames |
|
|
Term
| What is the max hop count for RIPv2? |
|
Definition
|
|
Term
| What software types would best be used for identifying an attack? |
|
Definition
| IDS (intrusion detection system) |
|
|
Term
| Which punch-down block is best suited for high-speed data transmission? |
|
Definition
|
|
Term
| What cable has a solid Kevlar center to restrict it from making a 90 degree bend |
|
Definition
|
|
Term
| What type of cable reduces toxic gas released during a fire? |
|
Definition
|
|
Term
| What tool enables technicians to trace cables in multiple pair wiring? |
|
Definition
|
|
Term
| What should you use to connect three desktop computers to an existing network when there is only one network connection available? |
|
Definition
|
|
Term
| Which device uses IEEE 1394 standard? |
|
Definition
|
|
Term
| Which tool sends a signal down a cable and measures how long it takes to come back? |
|
Definition
|
|
Term
| If a new network has a 802.11n wireless card but won't connect to their existing 802.11a network, why won't the laptop connect? |
|
Definition
|
|
Term
| What device can be remotely looped for troubleshooting purposes? |
|
Definition
|
|
Term
| What is the first criterion used to select next hop from the routing table? |
|
Definition
| Most precise matching prefix |
|
|
Term
| What security mitigation technique is most effective against zero-day attacks? |
|
Definition
|
|
Term
| What routing protocol uses a state algorithm? |
|
Definition
| OSPF (open shortest-path first), a link-state protocol and perhaps most common interior gateway protocol |
|
|
Term
| What do you need to install to connect a fiber NIC to an Ethernet backbone? |
|
Definition
|
|
Term
| What IEEE standard has the max bandwidth of 54Mbps at 5GHz? |
|
Definition
|
|
Term
| What routing protocol uses AS-Path as one of the methods to build a routing table? |
|
Definition
|
|