Term
Port Mirroring Cisco: SPAN 3Com: RAP |
|
Definition
Physical port; Not on all ports; Cisco: Switched Port Analyse RAP: Roving Analysts Port |
|
|
Term
| What tool allows an administrator to determine the MAC address of another computer? |
|
Definition
|
|
Term
| RADIUS is the most likely authentication scheme used in _______ |
|
Definition
|
|
Term
| DHCP does not affect security on a _______ |
|
Definition
|
|
Term
| When debugging a routing problem, the time-to-live (TTL) value can be used to determine the number of router _______ |
|
Definition
|
|
Term
| An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which method would most likely be implemented on a wireless network? Disable _______ |
|
Definition
|
|
Term
| A VPN concentrator is the MOST _____ method to allow users to access a company's _______ network resources |
|
Definition
|
|
Term
| A network at a small business utilizes a star topology and is experiencing frequent _______ among data packets. Which device is most likely being used? A _______ |
|
Definition
|
|
Term
| A technician temporarily needs an additional network connection in their office to test a new workstation. What is the BEST solution to add a temporary network connection? Install a _______ switch |
|
Definition
|
|
Term
| Session affinity is a feature of ______ balancer |
|
Definition
|
|
Term
| A user in the accounting department reports that their office is able to connect to the network , but they are unable to connect to the internet. Which of the following documentation would be MOST useful to the administrator in diagnosing this issue? A physical network diagram and ______ schematic |
|
Definition
|
|
Term
| Bridge clip to connect both sides of the block = ______ block |
|
Definition
|
|
Term
| ________ is an interior routing protocol that is used to provide routing within autonomous systems |
|
Definition
|
|
Term
| On a network switch, the default native VLAN is ______ |
|
Definition
|
|
Term
| LAN technology defined as Fast Ethernet? |
|
Definition
|
|
Term
| What ping parameter would set the size of the outgoing packet? |
|
Definition
|
|
Term
| WAN technology that modulates 24 channels into a 1.5 Mbps signal? |
|
Definition
|
|
Term
| What configuration management documentation types would an administrator use to know how and when to properly install new network devices on the LAN? |
|
Definition
|
|
Term
| Traffic shaping is a form of _______ limiting |
|
Definition
|
|
Term
| A 66 block is typically used for voice transmissions and has a _______Mbps maximum transfer speed |
|
Definition
|
|
Term
| An administrator needs to update a router configuration for a router that does not support ______. What can be used to securely update the router configuration ? KTTPS |
|
Definition
|
|
Term
| A new company has been given one public IP address. The company employs 200 users requiring internet access from the headquarter. What can be implemented to provide Internet access for all the employees? |
|
Definition
|
|
Term
| A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the internet , but cannot access internal network resources. What is most likely the reason? _______ DNS |
|
Definition
|
|
Term
| What layers of the OSI model does the TCP model operate? |
|
Definition
|
|
Term
| A workstation is having connectivity issues when being added to the domain. What command would allow the administrator to see DNS and WINS servers that are currently configured for the workstation? |
|
Definition
|
|
Term
| What equipment is provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines? |
|
Definition
|
|
Term
| RIP is a ______ Distance Routing Protocol |
|
Definition
|
|
Term
| An administrator wants to test the network maximum transmission unit (MTU), what command allows different size packets to be sent? |
|
Definition
|
|
Term
| A _______ allows a company's single public IP to be shared and translated into local IPs for network devices |
|
Definition
|
|
Term
| Two VLANS are separated and now the VLANS cannot communicate with each other. What device does the technician need to enable both VLANS to communicate with each other? |
|
Definition
|
|
Term
| What class is the IP address if the IP's first bit is a zero? |
|
Definition
|
|
Term
| 10GBaseSR is typically used in a _______ environment |
|
Definition
|
|
Term
| A ______ would allow a technician using a packet sniffer to view all data on a network |
|
Definition
|
|
Term
| FTP transmits passwords in _______ text |
|
Definition
|
|
Term
| A wireless access point supports up to 20 clients. What describes this wireless network? |
|
Definition
|
|
Term
| Router routes traffic between different networks and a ______ does not |
|
Definition
|
|
Term
| An administrator is trying to isolate the location of a persistent conectivity problem caused by a faulty NIC. What diagram would assist the technician in finding the machine that is causing the problem? Physical and _______ network |
|
Definition
|
|
Term
| An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configurating the machine first. Which of the following would MOST likely be installed? A _______ server |
|
Definition
|
|
Term
| _______ is used on the backbone of a ISDN |
|
Definition
|
|
Term
| The purpose of ______ is to classify, mark, and prioritize traffic on WAN and LAN links |
|
Definition
|
|
Term
| When testing a CAT5 cable, the technician notices that pin A is open. However, the cable works fine. How is this possible? The cable was tested for ________ |
|
Definition
|
|
Term
| RIP and IGRP are unable to advertise ______ networks |
|
Definition
|
|
Term
| ______ (Network Admission Control) performs posture assessments for unknown devices that connect to the network |
|
Definition
|
|
Term
| Which of the following OSI model layers is HTTPS encryption performed? |
|
Definition
|
|
Term
| STP network cables require _______ |
|
Definition
|
|
Term
| Stateless inspection is ______ able to determine if a packet is related to an established connection |
|
Definition
|
|
Term
| A natural disaster has occurred and the admininstrator must return the network to a healthy status. What should the administrator do in this case? Follow the _______ action plan. |
|
Definition
|
|
Term
| Several users are sending emails to CompTIA.org but they are not being received. Which command could be used to verify that the company is able to connect to the mail service at CompTIA.org? |
|
Definition
|
|
Term
| _______would be used to lock all of the primary communication equipment of a building, including its demarcation point |
|
Definition
|
|
Term
| The T568B wiring standard states that CAT5 should be coded as follows White/Orange, Orange, White/Green, _____, White/Blue, Green, White/Brown, Brown |
|
Definition
|
|
Term
| What WAN protocol is a circuit switching technology? |
|
Definition
|
|
Term
| Link aggregation is also known as ______ distribution |
|
Definition
|
|
Term
| A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow this addition? ______ relay |
|
Definition
|
|
Term
| An intrusion detection software ______ a server to see which _______ might be in use |
|
Definition
|
|
Term
| ADSL was designed to provide the FASTEST data rates over ______ phone lines |
|
Definition
|
|
Term
| A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement? |
|
Definition
|
|
Term
| A stateless firewall requires a technician to write ______ packet filters. |
|
Definition
|
|
Term
| Out of T1, ADSL, SDSL, OC-3 .. ______ offers the HIGHEST data rate |
|
Definition
|
|
Term
| The only requirement for a computer to connect to another computer in a intranet is a unique IP address and an appropriate _______ |
|
Definition
|
|
Term
| DS0 operates at _______ Kbps |
|
Definition
|
|
Term
| BRI ISDN uses ______ B channels and _______ D channel |
|
Definition
|
|
Term
| Wireshark can sniff and ________ all network traffic |
|
Definition
|
|
Term
| DSL requires ________ filters |
|
Definition
|
|
Term
| You should use a cable tester when you have a dead connection and you suspect a _________ cable |
|
Definition
|
|
Term
| Early 802.11 wireless networks rat at a maximum of _______ Mbps |
|
Definition
|
|
Term
| WPA > WEP offers end to end data packet encryption, user authentication via ________, and encryption key integrity checking |
|
Definition
|
|
Term
| A wireless access point or bridge enables you to connect _______ PCs to a _______ network segment |
|
Definition
|
|
Term
| A token is a special _______ that must be attached to a _______ in order for the message to enter the network and travel on it |
|
Definition
|
|
Term
| 10G Networks =10 _______ bits per second |
|
Definition
|
|
Term
| A ________ is a device used to _______ packets from one network to another network |
|
Definition
|
|
Term
| On a NIC, which section of the MAC address must be unique to the OUI of the vendor that made the card? |
|
Definition
|
|
Term
| OSI layer primarily responsible for putting "bits" onto the wire or other network medium = _______ |
|
Definition
|
|
Term
| Transparent & Translational = _______ |
|
Definition
|
|
Term
| ________ is a connectionionless protocol that works at the Network layer of the OSI |
|
Definition
|
|
Term
| A smurf attack is generally directed at a "victim" user on a network. The attacker pings the network addresses and ________ the source address of the victim. |
|
Definition
|
|
Term
| Telnet is not considered secure because it requires a _______ and the _______ is not transmitted in a secure fashion |
|
Definition
|
|
Term
| nbtstat -c = NetBIOS name table for ______ computer |
|
Definition
|
|
Term
| nbtstat -a (computer name) = NetBIOS name table for specific ________ computer |
|
Definition
|
|
Term
| Challenge Handshake Authentication Protocol (CHAP) is a remote authentication protocol that transfers a _______ of a password instead of the password itself |
|
Definition
|
|
Term
| PoE most common in _______ |
|
Definition
|
|
Term
| An administrator should _______ the configuration ______ after running a command from the console on a perimeter router |
|
Definition
|
|
Term
| A ______ is an intelligent repeater that is aware of _______ of the nodes on either side of the data link |
|
Definition
|
|
Term
|
Definition
| Network Intrusion Prevention System |
|
|
Term
| ______ = EGP routing protocol |
|
Definition
|
|
Term
| _______ is used by RADIUS to encrypt messages |
|
Definition
|
|
Term
| Cisco invented which protocol? |
|
Definition
|
|
Term
| The _______ standard is almost universal for VLAN _______. |
|
Definition
|
|
Term
| Trunking is the process of transferring _______ data between _______ or more switches. |
|
Definition
|
|
Term
| Content switches = Layer 4-7 but usually Layer ______ |
|
Definition
|
|
Term
| Load Balancing = make a bunch of servers look like ______ server |
|
Definition
|
|
Term
| One hexadecimal represents 4 bits, so 4 hexadecimal characters make a ______ -bit group |
|
Definition
|
|
Term
| In IPv6 no subnet is ever longer than /_____ |
|
Definition
|
|
Term
| Network ID + Subnet aka = ________ |
|
Definition
|
|
Term
| A _______address is a true internet address, IPv6 needs it to access the internet |
|
Definition
|
|
Term
| A 48-bit prefix from ________ router + 16-bit subnet from gateway router + 64-bit unique number = 128-bit IPv6 address |
|
Definition
|
|
Term
| Most IPv6 installation should take advantage of IPv6's autoconfiguration and run ________ DHCPv6 servers. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| All IPv6 addresses use an _______ nomenclature |
|
Definition
|
|
Term
| _______ replaces broadcast in IPv6 |
|
Definition
|
|
Term
| ________ is the /16 prefix designated by IANA for all 6 to 4 addresses |
|
Definition
|
|
Term
| Toredo is built into ________ and ________ |
|
Definition
| Windows XP ; Windows Vista |
|
|
Term
| The /48 prefix consists of only the first ______ groups of the address |
|
Definition
|
|
Term
| ________ is not needed in IPv6 because the address space is so large that there is no need to ration routable addresses |
|
Definition
|
|
Term
| The _______ is a snapshot of a properly functioning network |
|
Definition
|
|
Term
| Formula for a mesh network is n(n-1). n is the number of ________ connected to the mesh |
|
Definition
|
|
Term
| RIP, RIPv2, EIGRP and _______ are all Distance Vector routing protocols |
|
Definition
| BGP (Border Gateway Protocol) |
|
|
Term
| OSPF and ________ are link-state routing protocols |
|
Definition
|
|
Term
| The ______ layer in the OSI is responsible for the logical addressing of packets on a network. |
|
Definition
|
|
Term
| A _________ cable is completely opposite of each end in regards to wire color |
|
Definition
|
|
Term
| Terminal Access Controller Access Control Systems+ (TACACS+) was developed by _______ for centralized control of remote access devices and servers. |
|
Definition
|
|
Term
| Two advantages of VLANS include increased security and simplified _______ |
|
Definition
|
|
Term
| You should use a ________ cable to connect two switches because they are _______ devices. |
|
Definition
|
|
Term
| In a three-pronged firewall design, the domain controller should be located in the ________ zone, which is configured to be the most secure |
|
Definition
|
|
Term
| The ping command is the most common tool to check for connectivity and _______ resolution on a network. |
|
Definition
|
|
Term
| The nbtstat -R command ________ NetBIOS name cache and then reloads it from the Lmhosts file |
|
Definition
|
|
Term
| The Internet Assigned Numbers Authority (IANA) is responsible for assigning IP addresses for systems on a ______ net |
|
Definition
|
|
Term
| 2 Hard Drives 2 Controllers = ______, ______,_____ |
|
Definition
| RAID 0, RAID 1, Disk Duplexing |
|
|
Term
| RAID 5 needs _______ hard drives and stripe parity information across all disks in the array. |
|
Definition
|
|
Term
| FTP, DHCP, HTTP, DNS are all apart of the _______ suite |
|
Definition
|
|
Term
| The MAC address is 6-byte address expressed in six pairs of hexadecimal values. Because its hexadecimal, only the letters ______and ______ can be used. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| The service for which a data packet is destined is determined by the _______. |
|
Definition
|
|
Term
| The ________ layer of the OSI is responsible for placing the ______ on the network medium |
|
Definition
|
|
Term
| NetBIOS uses a ___________ space |
|
Definition
|
|
Term
| Two reasons to use WINS server are to reduce overhead from ________ and to enable NetBIOS _________resolution across routers |
|
Definition
|
|
Term
| nbtstat _______ command to check current NetBIOS name resolution across routers. |
|
Definition
|
|
Term
| The ______ file is checked first when trying to resolve an ______ to IP Address. |
|
Definition
|
|
Term
| BRI ISDN uses two 64 Kbps data channels. Combined, BRI ISDN offers a ________ - kbps transfer |
|
Definition
|
|
Term
| Route and netstat command can be used to view _________ on Vista |
|
Definition
|
|
Term
| Fiber Optic media is resistant to ________. |
|
Definition
|
|
Term
| IEEE 802.11 g/b wireless systems communicate with each other using radio frequency. Neighboring channels are ________ Mhz apart. |
|
Definition
|
|
Term
| PRI ISDN uses 23 _____ channels to carry data and one D channel to carry signaling. |
|
Definition
|
|
Term
| 1000BaseSX = _________- mode fiber |
|
Definition
|
|
Term
| The bridging method used on Ethernet networks is called _______ because the other network devices are unaware of the existence of the bridge |
|
Definition
|
|
Term
| The 100BaseT standard defines an Ethernet network using twisted-pair cable, which would be configured in a physical star config. However, even in a star config, an Ethernet network still uses a _________ bus topology. |
|
Definition
|
|
Term
| RARP ( reverse ArP ) protocol maps ________ to Layer 3 addresses on a TCP/IP network |
|
Definition
|
|
Term
| Server clustering is a strategy using a grouping of servers to provide _______ tolerance and failover service solutions for a network. |
|
Definition
|
|
Term
100BaseT = 100 Mbps Full Duplex = ______ Mbps |
|
Definition
|
|
Term
| Most modern phone systems are ________ so regular analog modems that require analog lines will not work |
|
Definition
|
|
Term
| A hardware loopback plug connects the 2 and 6 wires and the _____ and _____ wires to simulate a live connection |
|
Definition
|
|
Term
| IPv6 loopback = ::1 or ________ |
|
Definition
|
|
Term
| RC$ is a ________ cipher. |
|
Definition
|
|
Term
| Nonrepudiation = ________ confident the sender is who the receiver thinks he is. |
|
Definition
|
|
Term
| A ______ function is by definition a one-way function. |
|
Definition
|
|
Term
| _______ infrastructure must have a root authority |
|
Definition
|
|
Term
| Mandatory Access Control must use a label to define _______. |
|
Definition
|
|
Term
| RADIUS uses UDP port _______ and 1813. |
|
Definition
|
|
Term
| Kerberos authentication standard is highly ________ and all tickets are _________. |
|
Definition
| Time Sensitive ; Time-stamped |
|
|
Term
| DS0 signal rate = ______ bits |
|
Definition
|
|
Term
| Which of the following DNS records is an IPv4 address record? |
|
Definition
|
|
Term
| Which of the following DNS records is an IPv6 address record? |
|
Definition
|
|
Term
| Which access control model assigns permissions based on job function? |
|
Definition
| Role-based access control (RBAC) |
|
|
Term
| WEP uses the _____ to provide encryption |
|
Definition
|
|
Term
| Which kind of security scanner will block security attacks on a host device? |
|
Definition
| Host-based Intrusion Prevention |
|
|
Term
| Asychronous Transfer Mode (ATM) encodes _____ into _______. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Which IEEE standard specifies security mechanisms for wireless networks? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Routing Table command = _________ |
|
Definition
|
|
Term
| Ping -t = _______ = continuos ping |
|
Definition
|
|
Term
| Ping -l = setting size of ______ packet |
|
Definition
|
|
Term
| Rogue Wireless Access Point = ______ |
|
Definition
|
|
Term
| Coaxial, twinaxial, twisted pair, fiberoptic cabling can be used in ________ networks |
|
Definition
|
|
Term
| Rack mounted unit height = ________ |
|
Definition
|
|
Term
| IP address and _______ must be different or else the system cannot access remote networks. |
|
Definition
|
|
Term
| After you have fixed a problem, you should ______ it to fully ensure that the network is operating completely |
|
Definition
|
|
Term
| Both ______ and _______ backup methods clear the archive bit. |
|
Definition
|
|
Term
| To ping local loopback address typing 127.0.0.1 or ______ works the same |
|
Definition
|
|
Term
| _______ IPv6 is equivalent to IPv4 APIPA 169.254.0.0 |
|
Definition
|
|
Term
| _______ address type sends data to _____ systems on a subnet or network instead of a single host. |
|
Definition
|
|
Term
| _______ is a distance-vector routing protocol. |
|
Definition
|
|
Term
| Overloaded Network Address Translation = _______ |
|
Definition
|
|
Term
| OSPF bases routes on speed and sends only route changes to _______ traffic. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Tracert is useful for _________ information about the routers between you and the destination address. |
|
Definition
|
|
Term
| Yost cable = _______ > RJ-45 |
|
Definition
|
|
Term
| RDP is used in ________ networking, where only screen, keyboard and mouse input is sent across the line |
|
Definition
|
|
Term
| PPP is a protocol that can be used for ______ connections over ________ links. |
|
Definition
|
|
Term
| IPSec is not an ________ protocol. |
|
Definition
|
|
Term
| By installing a ________ server, you can move the workload associated with authentication to a dedicated server |
|
Definition
|
|
Term
| Kerberos = Security Tokens = ______ |
|
Definition
|
|
Term
| Kerberos allows secure authentication over an _______ network such as the internet |
|
Definition
|
|
Term
| What feature can be enable in a switch to facilitate protocol analysis? |
|
Definition
|
|
Term
| Which protocol is used to manage bridged topologies? |
|
Definition
|
|
Term
| You can use a ________ tool when working with an IDC. |
|
Definition
|
|
Term
| Cables that go through _______ and _______ should be STP. |
|
Definition
|
|
Term
| Whats the name of a device that connects multiple customer DSLs to a high-speed internet backbone line? |
|
Definition
|
|
Term
| Smurf attack is an example of a DDoS attack aka _________ |
|
Definition
| Distributed Denial of Service |
|
|
Term
| Fake login screen aka _______ |
|
Definition
|
|
Term
| IGMP Internet Group Management Protocol is used for establishing multicast group memberships and is used in _______ networks. |
|
Definition
|
|
Term
| MAC Address = 48 bits = aka ________ |
|
Definition
|
|
Term
| Modes that force a switch to act like a hub? |
|
Definition
| Learning and fault tolerant |
|
|
Term
|
Definition
|
|
Term
| UDP port 67 = ______& ______ |
|
Definition
|
|
Term
| Static VLAN = ______ based on ______ |
|
Definition
|
|
Term
| Dynamic VLAN = _______ based on ________ |
|
Definition
|
|
Term
| Modems = Analog > ________ |
|
Definition
|
|
Term
| Any device that filters and forwards traffic based on MAC addresses is by definition a _______. |
|
Definition
|
|
Term
| An AP has a limited distance that it can send data transmissions. When a client system moves out of range, it can't access the ________. |
|
Definition
|
|
Term
| 802.11x is an IEEE standard specifying ________ network access control |
|
Definition
|
|
Term
| MIMO is used by the 802.11n standard and takes advantage of Multiplexing to increase range and speed of wireless networking. Multiplexing is a technique that combines the transmition of multiple data streams over a _______ or medium. |
|
Definition
|
|
Term
| The system or node requesting access and ________ to network resource best describes the role of the supplicant in a 802.1x security framework |
|
Definition
|
|
Term
| 10BaseT and 100BaseT use ______ wire pairs |
|
Definition
|
|
Term
| IEEE 802.3ab = 1000BaseT = _______ |
|
Definition
|
|
Term
| 1000BaseSX uses the ______ connector exclusively |
|
Definition
|
|
Term
| 1000BaseLX = 5km = _______ meters |
|
Definition
|
|
Term
| 1000BaseT use _____ pairs of wire |
|
Definition
|
|
Term
| There is no standard connector for 10-GBE _____ |
|
Definition
|
|
Term
| 10GBaseT on CAT6 = ________ |
|
Definition
|
|
Term
| 10GBaseT on CAT6a = _________ |
|
Definition
|
|
Term
| The archive bit is _______ after a full backup and incremental backup |
|
Definition
|
|
Term
| Incremental backups save all files and directories that have changed since the last full or incremental backup. To restore, you need the latest full backup and all incremental _______. |
|
Definition
|
|
Term
| RAID 5 uses distributed parity. The parity info is spread across all disks and requires the equivalent space of a single hard disk. This example has 5 15Gb disks, giving a total of 75GB of storage. 15GB is required for the parity info, leaving 60 Gb for saving actual _______. |
|
Definition
|
|
Term
| A cold site often requires the delivery of computer equipment and other _________. |
|
Definition
|
|
Term
| Raid 0 = Highest level of performance but _____ fault tolerance |
|
Definition
|
|
Term
| Dig & Nslookup can perform manual lookups of DNS lookups on a _______ system |
|
Definition
|
|
Term
| arp -s IP Address Mac Address command would add a static entry to ArP ________ |
|
Definition
|
|
Term
| Bonding or link aggregation, is the process of using multiple NIC connection, thus increasing ________ |
|
Definition
|
|
Term
| A tone generator and tone probe work together to enable you to pick a single cable out of a stack of _______ |
|
Definition
|
|
Term
| Rack-mounted equipment uses a height measurement known simply as a ______. |
|
Definition
|
|
Term
| A subnet is all ones followed by ________. |
|
Definition
|
|
Term
| What is the max # of hosts in a /19 subnet? |
|
Definition
|
|
Term
| Which MAC address begins a frame? |
|
Definition
|
|
Term
| A frame ends with a special bit called Cyclic Redundency Check (CRC) What does CRC do? It verifies that the ___________ are _________ |
|
Definition
|
|
Term
| OSI seventh - layer controls the assembly and disassembly of data |
|
Definition
|
|
Term
| Which layer of the OSI keeps track of a system's connections to send the right response to the right computer? |
|
Definition
|
|
Term
| VLANS can be created by using protocol assignments, by defining the parts on a device as belonging to a ________or by using __________. |
|
Definition
|
|
Term
| On a star network, new devices can be added to a network by attaching the new device to the hub with its own _______. This process does not _______ users who are currently on the network |
|
Definition
|
|
Term
| Three things are needed for VPN: A ________, A VPN _________, and a VPN _________. |
|
Definition
|
|
Term
| A wired Mesh offers the greatest degree of redundancy but has highest implementation ________. |
|
Definition
|
|
Term
| To create the complete ring the ring-ing (RI) port on each MSAU is connected to the ring-out (R)) port on another MSAU. The last MSAU in the ring is then connected to the ________ ring. |
|
Definition
|
|
Term
| 1000BaseCX = CAT5 UTP cable STP ______ m Max |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| EMI is a type of interference that is often seen when cables run to close to ______________devices. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| A wireless AP at the data link layer = Layer _____ |
|
Definition
|
|
Term
| The transport layer is responsible for establishing a connection between ___________ devices. |
|
Definition
|
|
Term
| Class B addy fall into the ________ to ________ range. |
|
Definition
|
|
Term
| When a Windows XP Pro system that is configured to obtain an IP address via DHCP fails to obtain an address, it uses _________ to assign itself an address from 169.254.x.x range |
|
Definition
|
|
Term
Private address defined in RFC 1918: 10.x.x.x, 172.16.xx to 172.31.x.x, ____________ |
|
Definition
|
|
Term
| When virtual-circuit switching is used, a logical connection is established between the source and the ___________ device |
|
Definition
|
|
Term
| The D channel on a ISDN carries the signaling info, whereas the ____ channel carries the data. |
|
Definition
|
|
Term
| All Ethernet frames begin with a ________. |
|
Definition
|
|
Term
| 10BaseT hub can connect no more then _______ nodes |
|
Definition
|
|
Term
| The spanning tree protocol is unique to __________. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| RADIUS UDP port = _______ |
|
Definition
|
|