Term
| A MAC address is composed of which two parts? |
|
Definition
| the organizationally unique identifier and the unique device ID of the NIC. |
|
|
Term
| How does a receiving station on a network use the CRC to verify that it received accurate data? |
|
Definition
| It uses the same divisor as the sending station to find the same remainder. |
|
|
Term
| How many layers does the OSI model contain? |
|
Definition
|
|
Term
| NICs send and receive binary data as pulses of all of the following accept? |
|
Definition
|
|
Term
| Routers function at what layer of the OSI model? |
|
Definition
|
|
Term
| Select one of the functions below that a NIC does NOT perform? |
|
Definition
| it routes data data across the most efficient route on the network. |
|
|
Term
| What device do you need to split a large network into smaller ones? |
|
Definition
|
|
Term
| What is the Network layer unique identifier assigned to each device on a TCP/IP network? |
|
Definition
|
|
Term
| Which layer of the OSI model adds source and destination MAC addresses to frames? |
|
Definition
|
|
Term
| What layer of the OSI model is the only layer divided into two sublayers? |
|
Definition
|
|
Term
| What layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system? |
|
Definition
|
|
Term
| Which of the following is a broadcast MAC address? |
|
Definition
|
|
Term
| Which of the following is another name for a MAC address? |
|
Definition
|
|
Term
| Which of the following statements best describes an IP address? |
|
Definition
| It is a unique dotted decimal number assigned to every network node. |
|
|
Term
| Which statement best describes what happens to frames when the hub sends them to the NICs on the network? |
|
Definition
| The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame. |
|
|
Term
| At what layer of the OSI model does network cabling belong? |
|
Definition
|
|
Term
| Of the following which is the fastest category of UTP cabling? |
|
Definition
|
|
Term
| What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps? |
|
Definition
|
|
Term
| What is the most common use of coaxial cable in networking today? |
|
Definition
| connecting a cable modem to an Internet Service Provider (ISP) |
|
|
Term
| What kind of cable is described as a central conductor wire, surrounded by insulating materials, placed inside a braided metal shield? |
|
Definition
|
|
Term
| What type of fiber optic cable uses lasers to send signals? |
|
Definition
|
|
Term
| Which connector is used for UTP cabling on a network? |
|
Definition
|
|
Term
| What kind of cable does not provide any protection against EMI? |
|
Definition
|
|
Term
| What kind of cable works best for long distance transmission? |
|
Definition
|
|
Term
| Which kind of cabling would you select when you need to cover distances that span kilometers? |
|
Definition
|
|
Term
| Which network topology offers the greatest level of fault tolerance? |
|
Definition
|
|
Term
| Which of the following cables does not use copper wires? |
|
Definition
|
|
Term
| How many pairs of pins in an RJ-45 connector does a 10BaseT device actually use? |
|
Definition
|
|
Term
| How many pins does an RJ-45 connector have? |
|
Definition
|
|
Term
| Of the following statements, which is the best comparison of repeaters and bridges? |
|
Definition
| Repeaters retransmit all packets, while bridges examine the destination MAC address to determine which packets to forward onto the next segment. |
|
|
Term
| What basis do bridges use to determine whether to forward traffic? |
|
Definition
|
|
Term
| What does it mean if a NIC runs in promiscuous mode? |
|
Definition
|
|
Term
| What events, characteristic to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid? |
|
Definition
|
|
Term
| What is the maximum distance between a hub and a node on a 10BaseT network? |
|
Definition
|
|
Term
| What is the maximum speed at which 10BaseT Ethernet networks communicate? |
|
Definition
|
|
Term
| What is the meaning of the "10" in 10BaseT? |
|
Definition
|
|
Term
| What is the purpose of a crimper? |
|
Definition
| to connect a RJ-45 connector to the cable |
|
|
Term
| When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs? |
|
Definition
|
|
Term
| Which of the following is true of an Ethernet hub? |
|
Definition
| It reads a signal coming in from one port and repeats the signal out to the other ports. |
|
|
Term
| Which of the following statements best describe the preamble of an Ethernet frame? |
|
Definition
| It includes 64-bits of alternating ones and zeros that ends with 11 to notify the receiving NIC that a frame is starting. |
|
|
Term
| Which type of cabling does the 10BaseT standard specify? |
|
Definition
|
|
Term
| If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full duplex NICs? |
|
Definition
|
|
Term
| What general type of cabling is a tech most likely to use today when installing Ethernet cabling in areas with high electrical interference? |
|
Definition
|
|
Term
| What is the maximum cable length for a 1000BaseT network? |
|
Definition
|
|
Term
| When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function? |
|
Definition
| 10 Mbps sending and receiving |
|
|
Term
| At what layer of the OSI model does the IP protocol work? |
|
Definition
|
|
Term
| How long is a subnet mask? |
|
Definition
|
|
Term
| How many binary digits are in an IPv4 address? |
|
Definition
|
|
Term
| What command can you use to test the NIC's ability to send and receive packets? |
|
Definition
|
|
Term
| What is the de facto protocol suite of the Internet? |
|
Definition
|
|
Term
| What is the default subnet mask for a class C network? |
|
Definition
|
|
Term
| What is the MAC broadcast address? |
|
Definition
|
|
Term
| What is the range of decimal values in each of the four groups of an IPv4 address? |
|
Definition
|
|
Term
| Which of the following automatically gives out IP information to computers that request it? |
|
Definition
|
|
Term
| Which of the following is a valid IP address for an individual system expressed in dotted-decimal notation? |
|
Definition
|
|
Term
| Which of the following is another way of representing the subnet mask 255.255.255.0? |
|
Definition
|
|
Term
| Which of the following is not a designated private IP address? |
|
Definition
|
|
Term
| An administrator managing many routers should be using this type of tool in order to have an overall view of all the routers? |
|
Definition
| Network Management System (NMS) |
|
|
Term
| At which layer of the OSI model do routers work? |
|
Definition
|
|
Term
| If your company has a signal server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while while allowing access to that server from the Internet? |
|
Definition
|
|
Term
| In a NAT router, what is the name for an arbitrary number generated by the sending computer? |
|
Definition
|
|
Term
| On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go? |
|
Definition
| Destination MAC addresses |
|
|
Term
| Some manufacturers, such as Cisco, use this term to refer to either overloaded NAT or port forwarding? |
|
Definition
| Port Address Translation (PAT) |
|
|
Term
| What is the term used for the passage of a packet through a router? |
|
Definition
|
|
Term
| When a NAT router uses this in conjunction with IP addresses, it solves the two problems of security and limited IP addresses? |
|
Definition
|
|
Term
| Which type of NAT is the most popular? |
|
Definition
|
|
Term
| With this type of NAT, many computers can share a pool of routable IP addresses that number fewer than the computers? |
|
Definition
|
|
Term
| A communication between computers that begins with an acknowledgement, followed by a message, and ending with a closing acknowledgement is which type of communication? |
|
Definition
|
|
Term
| At what layer of the OSI model does the set of protocols indicated by the TCP part of TCP/IP work? |
|
Definition
|
|
Term
| If you cannot receive email, which of the following protocols should you suspect is not working properly? |
|
Definition
|
|
Term
| Microsoft Internet Explorer and Mozilla Firefox are examples of this type of TCP/IP application? |
|
Definition
|
|
Term
| Which function is being used if a packet is sent to port 80? |
|
Definition
|
|
Term
| What is the name for the number used by the operating system to track all running programs? |
|
Definition
|
|
Term
| What protocol handles outgoing email? |
|
Definition
|
|
Term
| What protocol, replaced in recent years by a more secure protocol, was for many years the primary protocol used to allow a user to log in remotely and execute text-based commands on a remote host? |
|
Definition
|
|
Term
| Which protocol does the PING application use? |
|
Definition
|
|
Term
| What is the term used to explain what happens when packets are sent out on a network by two devices simultaneously, corrupting both packets? |
|
Definition
|
|
Term
| What method of extending a wireless network creates an Extended Service Set? |
|
Definition
|
|
Term
| What type of unit is formed by a single WAP servicing a given area? |
|
Definition
|
|
Term
| When configuring a WAP, set this to something unique and easily identified, and follow up by giving this same name on all wireless hosts that should connect to this network? |
|
Definition
|
|
Term
| When troubleshooting a potential wireless hardware problem, open this Windows utility to see if there is an error or conflict with the wireless adapter |
|
Definition
|
|
Term
| Which of the channels defined by the 802.11 standard may be used in the United States? |
|
Definition
|
|
Term
| Which of the following is a method for limiting access to your wireless network based on the physical address of wireless NICs? |
|
Definition
|
|
Term
| Which of the following is used to describe a portion of available spectrum? |
|
Definition
|
|
Term
| Which status term applies to whether your wireless device is connected? |
|
Definition
|
|
Term
| Which term applies to how well you wireless device is connecting to other devices? |
|
Definition
|
|
Term
| Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), a range of up to about 300 feet, operates in the 2.4 GHz and 5.0 GHz frequencies? |
|
Definition
|
|
Term
| Which Wi-Fi standard offers speeds of up to 54 Mbps, a range of up to about 300 feet, operates in the 2.4 GHz frequency, and is downward compatible with an earlier, popular Wi-Fi standard? |
|
Definition
|
|
Term
| Network components will fail, and you can sum up the best protection against such failures in one word. Select that word from the following |
|
Definition
|
|
Term
| This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual address of internal network hosts. |
|
Definition
|
|
Term
| This is a networks first line of defense against external threats. |
|
Definition
|
|
Term
| This term describes an unauthorized person who is intentionally to access resources on your network. |
|
Definition
|
|
Term
| This term describes any program that sends information about you or your computer over the internet without your consent. |
|
Definition
|
|
Term
| This term describes several methods for spreading data across multiple drives. |
|
Definition
|
|
Term
| This type of device accept something of the user, such as a fingerprint, retina scan, or voiceprint in place of password. |
|
Definition
|
|
Term
| This type of malware replicates through networks. |
|
Definition
|
|
Term
| What type of firewall technology allows or denies access to a network according to the MAC address of the computer seeking access? |
|
Definition
|
|
Term
| What type of attack uses zombie computers to bring a network down under a massive number of requests? |
|
Definition
|
|
Term
| What kind of device can you insert into a PC in lieu of entering a password? |
|
Definition
|
|
Term
| Which of the following statements is true about DNS root servers? |
|
Definition
| They have the complete definitive name resolution table. |
|
|
Term
| What type of server resolves NetBIOS names to IP addresses? |
|
Definition
|
|
Term
| Which of the following is not a top level domain name? |
|
Definition
|
|
Term
| Which of the following would confirm that you have a DNS problem? |
|
Definition
| PING works with the IP address, but not with the FDQN. |
|
|
Term
| In the syntax for a domain, what character or characters separates a domain name from its sub domains. |
|
Definition
|
|
Term
| Which of the following characters is not permitted in a DNS domain or host name? |
|
Definition
|
|
Term
| What is the term for servers just below the DNS root servers? |
|
Definition
|
|
Term
| Which of the following is not part of the fully qualified domain name (FQDN)? |
|
Definition
|
|
Term
| What is the correct sequence according to the DNS naming convention? |
|
Definition
|
|