Term
|
Definition
| A number that uniquely identifies each workstation and device on a network. Without unique addresses, computers on the network could not reliably communicate. |
|
|
Term
|
Definition
| The part of a network to which segments and significant shared devices (such as routers, switches, and servers) connect. a.k.a. a network of networks because of its role in interconnecting smaller parts of a LAN or WAN |
|
|
Term
|
Definition
| A computer on the network that requests resources or services from another computer on a network. In some cases, a client could also act as a server. |
|
|
Term
|
Definition
| the use of data networks to carry voice (or telephone), video, and other communications services in addition to data. |
|
|
Term
|
Definition
| A descrete unit of information sent from one node on a network to another |
|
|
Term
|
Definition
| a specialized server that enables clients to share applications and data across the network |
|
|
Term
|
Definition
| A computer that enables resource sharing by other computers on the same network. |
|
|
Term
|
Definition
| the process of distributing data transfer activity evenly across a network so that no single device is overwhelmed |
|
|
Term
|
Definition
| a server that manages the storage and transfer of e-mail messages |
|
|
Term
|
Definition
| the network services that manage the storage and transfer of e-mail between users on a network. |
|
|
Term
|
Definition
| a group of computers and other devices (such as printers) that are connected by and can exchange data via some type of transmission media, such as a cabe, a wire, or the atmosphere |
|
|
Term
|
Definition
| a computer or other device connected to a network, which has a unique address and is capable of sending or receiving data. |
|
|
Term
|
Definition
| a network in which every computer can communicate directly with every other computer. |
|
|
Term
|
Definition
| a standard method or format for communication between network devices |
|
|
Term
|
Definition
| a server that runs communications services that enable remote users to log on to a network. aka access server |
|
|
Term
|
Definition
| devices, data, and data storage space provided by a computer, whether stand-alone or shared |
|
|
Term
|
Definition
| the process of retrieving files from a backup. it is necessary to restore files if the original files are lost or deleted |
|
|
Term
|
Definition
| the property of a network that allows you to add nodes or increase its size easily |
|
|
Term
|
Definition
| a part of a network that manages share resources. |
|
|
Term
|
Definition
| the process of determining how much data transfer activity is taking place on a network or network segment and notifying administrators when a segment becomes overloaded |
|
|
Term
|
Definition
| the centralized management of multiple types of network-based commmunications, such as voice, video, fac, and messaging services |
|
|
Term
|
Definition
| a computer that runs a desktop operating system and connects to a network |
|
|
Term
CH 2- Which of the following standards organizations has established guidelines for installing network cables in commercial buildings?
Read more: http://wiki.answers.com/Q/Which_of_the_following_standards_organizations_has_established_guidelines_for_installing_network_cables_in_commercial_buildings? TIA/EIA ITU ANSI IEER |
|
Definition
|
|
Term
CH2- Which technology does the IEEE 802.3 specification describe? a. Network Security b. Ethernet LANs c. Logical Link Control d. Token Ring LANs |
|
Definition
|
|
Term
CH2- Which of the following IEEE specifications pertains to wireless networking? a. 802.1 b. 802.3 c. 802.7 d. 802.11 |
|
Definition
|
|
Term
CH2- Which layer of the OSI model is responsible for issuing acknowledgments? (ACKs)? a. Application Layer b. Data Link Layer c. Network Layer d. Transport Layer |
|
Definition
|
|
Term
CH2- Which OSI model layer is responsible for keeping open a communications path between your computer and the server when you dial in to a remote access server? a. Physical Layer b. Data Link layer c. Presentation Layer d. Session Layer |
|
Definition
|
|
Term
Ch2- Suppose your network is connected to another network via a router. Which OSI model layer provides the information necessary to direct data between the two networks? a. Network Layer b. Physical Layer c. Data Link Layer d. Session Layer |
|
Definition
|
|
Term
CH2- In which two layers of the OSI model do NICs belong? a. Presentation and Application layers b. Transport and Network layers c. Network and Data Link layers d. Physical and Data Link layers |
|
Definition
|
|
Term
CH2- Which standards organization developed the OSI model? a. ISO b. ITU c. ISOC d. OSI |
|
Definition
|
|
Term
Ch2- Under what circumstances would the Transport layer use segmentation? a. When too many data frames are flooding into a receiving node's NIC b. When more than 10 percent of transmitted frames are damaged c. When the destination node cannot accept the size of the data blocks transmitted by the source node d. When the source node request that data blocks be segmented for faster processing |
|
Definition
|
|
Term
CH2- Which OSI model layer generates and detects voltage so as to transmit and receive signals carrying data? a. Physical Layer b. Data Link layer c. Network Layer d. Transport Layer |
|
Definition
|
|
Term
CH2- What type of address follows a hierarchical format? a. Physical address b. MAC addresses c. Network addresses d. Data Link layer addresses |
|
Definition
|
|
Term
If the TCP protocol did not receive an acknowledgment for data it transmitted, what would it do? a. Issue it own acknowledgement, indicating to the recipient that it did not receive the acknowledgment it expected b. Issue a warning frame to tell the recipient it would retransmit the data if it did not receive the acknowledgment within a certain time frame c. Retransmit the data to the recipient d. Reestablish the connection with the recipient |
|
Definition
|
|
Term
CH2- You have just installed a new NIC in your computer and see the following stamped onit: 000A5E1A8DA2. This unique identifier is an example of what kind of address? a. Virtual address b. MAC address c. Network address d. IP Address |
|
Definition
|
|
Term
CH2- Which part of a MAC address is unique to each manufacturer? a. The destination ID b. The block ID c. The physical node ID d. The segment ID |
|
Definition
|
|
Term
CH2- What is the purpose of the trailer field added to a frame in the Data Link layer? a. To mark the end of a frame b. To indicate the rate at which a node can receive the data c. To encode the sum of the error-checking algorithm d. To represent the frame's sequence number |
|
Definition
|
|
Term
CH2- What are the sublayers of the Data Link layer as defined in the IEEE 802 standards? a. Logical Link Control sublayer and Media Access Control sublayer b. Transport Control sublayer and Media Access Control sublayer c. Logical Link Control sublayer and Physical Addressing sublayer d. Transport Control sublayer and Data Link Control sublayer |
|
Definition
|
|
Term
CH2- Which layer of the OSI model encapsulates Network layer packets? a. Physical layer b. Session layer c. Data Link layer d. Transport layer |
|
Definition
|
|
Term
Ch2- Suppose that, at the receiving node, a frame's FCS doesn't match the FCS it was issue at the transmitting node. What happens as a result? a. The receiving node's Transport layer assess the error and corrects it b. The receiving node's Data Link layer requests a retransmission c. The transmitting node's Transport layer immediately issues a replacement frame d. The transmitting node's Data Link layer assesses the error and corrects is |
|
Definition
|
|
Term
Ch2- In which of the following situations would it be most desirable to us a connectionless Transport layer protocol? a. when retrieving a spreadsheet from a busy file server b. When connecting to a graphics intensive Web site c. When viewing a movie clip on the Web d. When sending an email message to a long list of recipients |
|
Definition
|
|
Term
CH2- Which of the following would be found in a Data Link layer header? a. The packet's fragmentation offset b. The packet's sequence number c. The source's logical address d. The source's physical address |
|
Definition
|
|
Term
| CH3- What is different about the method used to boost a digital signal's strength, compared with the method of boosting an analog signal's strength? |
|
Definition
| A digital signal requires a repeater, which retransmits the signal in its original form, and an analog signal requires an amplifier, which increases the strength of both the signal and the noise it has accumulated. |
|
|
Term
| CH3- Which of the following decimal numbers corresponds to the binary number 00000111? |
|
Definition
|
|
Term
| CH3- A wave with which of the following frequencies would have the shortest wavelength? |
|
Definition
|
|
Term
CH3- What is the origin of the word modem? |
|
Definition
|
|
Term
| CH3- With everything else being equal, which of the following transmission techniques is capableof the greatest throughput? |
|
Definition
|
|
Term
| CH3- In addition to some types of data networks, which of the following use half-duplex communication? |
|
Definition
|
|
Term
| CH3- In wavelength division multiplexing, two modulated signals are guarenteed to differ in what characteristics? |
|
Definition
|
|
Term
| CH3- Which of the following can increase latency on a network? |
|
Definition
| Adding 50 meters to the length of the network |
|
|
Term
| CH3- You are helping to install a cable broadband system in your friend's home. She wants to bring the signal from where the service provider's cable enters the house to a room onanother floor, which means you have to attach a new cable to the existing one. What type of cable should this be? |
|
Definition
|
|
Term
| CH3- What part of a cable protects it against environmental damage? |
|
Definition
|
|
Term
| CH3- With everything else being equal, a network using which of the following UTP types willsuffer the most cross talk? |
|
Definition
|
|
Term
| CH3- What are two advantages of using twisted pair cabling over coaxial cabling on a network? |
|
Definition
| Twisted pair cable is less expensive, Twisted pair cable is more resistant to noise |
|
|
Term
| CH3- Which of the following problems could be solved by using a crossover cable? |
|
Definition
| You're missing a connectivity device, but need to exchange data between two laptops |
|
|
Term
| CH3- Which of the following network transmission media offers the highest potential throughputover the longest distances? |
|
Definition
|
|
Term
| CH3- In which of the following network links might you use SC connectors? |
|
Definition
| A fiber-optic connection between a server and router. |
|
|
Term
| CH3- What type of fiber-optic cable is used most frequently on LANs? |
|
Definition
|
|
Term
| CH3- What is the purpose of cladding in a fiber-optic cable? |
|
Definition
| it reflects the signal back to the core |
|
|
Term
| CH3- Which of the following is a potential drawback to using fiber-optic cable for LANs? |
|
Definition
|
|
Term
| CH3- In what part of a structured cabling system would you find users' desktop computers? |
|
Definition
|
|
Term
| CH3- You've just recieved a new Cisco router for your data center, and it came with a roll-over cable. What can you do with this cable? |
|
Definition
| Make a connection from the router's console port to your laptop's serial port and configurethe router from your laptop |
|
|
Term
| CH3- What is the maximum distance specified in the structured cabling standard for a horizontalwiring subsystem? |
|
Definition
|
|
Term
| CH3- Which of the following can occur as a result of improper cable termination? |
|
Definition
| Cross talk, Noise, Data errors |
|
|
Term
| CH3- If your MDF contains a 66 bock, the type of cable terminating at that punch-down block is probably what? |
|
Definition
| UTP designed for telephone signaling. |
|
|
Term
| CH3- Your campuswide WAN is experiancing slow Internet response times. When you call your Internet service provider to ask if they can troubleshoot the problem from their end, theywarn you that their responsiblities end at demarc. What do they mean? |
|
Definition
| They will not diagnose problems beyond your organization's entrance facilities. |
|
|
Term
CH3- What is the maximum amount you should intwist twisted pair wires before inserting them into connectors? |
|
Definition
|
|
Term
| CH4- What type of information must a protocol suite supply to be routable? |
|
Definition
|
|
Term
| CH4- What field in an IP datagram can be used to indicate that a packet should be routed before any other packets? |
|
Definition
| Differentiated services field |
|
|
Term
| CH4- What happens to an IP datagram when its TTL reaches 1? |
|
Definition
| It is discarded by the connectivity device |
|
|
Term
| CH4- For which of the following nodes would it make the most sense to assign a static, rather than dynamic, IP address? |
|
Definition
| the router that accepts all internet traffic for a company's LAN |
|
|
Term
| CH4- What is the function of ARP? |
|
Definition
| to obtain the MAC address of a host, and then map that MAC address to the host's IP address |
|
|
Term
| CH4- Which of the following applications would be best suited to using UDP? |
|
Definition
| Video transmission over the Web |
|
|
Term
| CH4- Suppose you have a workstation that uses the IP address 203.12.176.55 on a traditional IPv4 network. To what network class does the workstation belong? |
|
Definition
|
|
Term
| CH4- How many bytes are used for an IPv4 IP address? |
|
Definition
|
|
Term
| CH4- Suppose your computer's IP address is 155.61.9.188, and your network administrator has not subnetted the network to which you're connected. What is your computer's subnet mask? |
|
Definition
|
|
Term
| CH4- Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To what device(s) are you transmitting? |
|
Definition
| All devices on your network segment |
|
|
Term
| CH4- Suppose you send data to an address that begins with the Format Prefix FF0E on a network running IPv6. To what device(s) are you transmitting? |
|
Definition
| All devices that are reachable |
|
|
Term
| CH4- What is the main difference between BOOTP and DHCP? |
|
Definition
| BOOTP relies on a static table to associate IP addresses with MAC addresses, whereas DHCP does not. |
|
|
Term
| CH4- If you are connected to a network that uses DHCP, and you need to terminate your Windows Vista workstation's DHCP lease, which of the following commands would you use? |
|
Definition
|
|
Term
| CH4- At a minimum, what fields would you find in a hosts file? |
|
Definition
|
|
Term
| CH4- What devices are the highest authorities in the domain name system hierarchy? |
|
Definition
|
|
Term
| CH4- On a client/server network, what computer initiates the process of assigning an IP address through DHCP? |
|
Definition
|
|
Term
| CH4- You issue a transmission from your workstation to the following socket address on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using? |
|
Definition
|
|
Term
| CH4- You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and taking notes. Clients need access to the Internet, so you have configured your network's DHCP server to issue them IP addresses automatically. What DHCP option should you modify to make sure you are not wasting addresses that were used by clients who have completed a class and no longer need them? |
|
Definition
| the lease duration for client computers |
|
|
Term
| CH4- You manage a server that allows university students to use Telnet to make a connection, then use FTP to upload their homework. Professors also pick up students' homework by telnetting to the computer and using FTP. You have decided to change the FTP port number on the server from its default number to 23, for better security. Assuming students and professors make no changes to their default workstation configurations, what will be the result of this change? |
|
Definition
| Students and professors will be unable to Telnet to the server or FTP files to or from the server. |
|
|
Term
| CH4- What method of transmission does a workstation use to send an ARP request? |
|
Definition
| A broadcast to all the nodes on its segment |
|
|
Term
| CH4- If you want to determine only whether the TCP/IP protocols are installed and functioning properly on your workstation, you could: |
|
Definition
| Attempt to ping the loopback address. |
|
|
Term
| CH4- In class, you glance at your neighbor's computer and notice that she has typed the following IP address in her browser's URL text box: 127.0.0.1:80. What is she most likely attempting to do? |
|
Definition
| Open a Web page that's on her own computer. |
|
|
Term
| CH4- You have just set up a new wireless network in your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. Which of the following commands will allow you to find the information you need? |
|
Definition
|
|
Term
| CH4- Which of the following represents the loopback address in IPv6? |
|
Definition
|
|
Term
| CH4- Which of the following protocols assists in determining whether packets reached their destinations? |
|
Definition
|
|
Term
| CH 5 You are asked to upgrade a bus topology LAN at a friends house to a star topology LAN. Your friend wants to connect three computers and a printer and use the Ethernet access method. His computers do not contain wireless NIC's. At minimum, which of the following devices must you add to his current networking hardware? |
|
Definition
|
|
Term
| CH 5 Which of the following topologies is susceptible to signal bounce? |
|
Definition
|
|
Term
| CH 5 What type of topology is required for use with a 100Base-TX network? |
|
Definition
|
|
Term
| CH 5 Your school's network has outgrown its designated telco rooms, so you decide to house a few routers in an old janitors closet temperarily. However, since the closet has no power outlets, you will have to supply the routers power over the network. If you're lucky, your LAN already uses which of the following Ethernet standards that will allow you to do that? |
|
Definition
|
|
Term
| CH 5 What is the minimum cabling standard rewuired for 10GBase-T Ethernet? |
|
Definition
|
|
Term
| CH 5 Which of the following is a potential problem with daisy-chaining hubs on a 10Base-T network? |
|
Definition
| Exceeding the maximum network length |
|
|
Term
| CH 5 Why is packet switching more efficient than circuit switching? |
|
Definition
| In packet switching, packets can take the quickest route between nodes and arrive independently of when other packets in their data stream arrive |
|
|
Term
| CH 5 You are part of a team of engineers who work for an ISP that connects large data centers, telephone companies, and their customers throughout California and Oregon. Management has decided that the company can make large profits by promising the utmost Qo5 to certain high-profile customers. Which of the following switching methods will best guarantee the promised Qo5? |
|
Definition
|
|
Term
| CH 5 What happens in CSMA/CD when a node detects its data has suffered a collision? |
|
Definition
| It signals to the network that its data was damaged in a collision, waits a brief period of time before checking the network for activity, and ten retransmits the data. |
|
|
Term
| CH 5 Why are Ethernet_2 frames preferred over Ethernet_802.3 frames on contemporary LAN's? |
|
Definition
| They can support multiple higher-layer protocols, and Ethernet_802.3 frames cannot |
|
|
Term
| CH 5 What is the purpose of padding in an Ethernet frame? |
|
Definition
| Ensuring that the data portion of the frame totals at least 46 bytes |
|
|
Term
| CH 5 You are designing a 100Base_T network to connect groups of workstations in two different offices in your building. The offices are approximately 250 meters apart. If you only use repeating devices to connect the workstation groups, how many hubs will you need? |
|
Definition
|
|
Term
| CH 5 On a 10Base-T network, which of the following best describes how the wires of a UTP cable are used to transmit and receive information? |
|
Definition
| One wire pair handles data transmission, while another wire pair handles data reception |
|
|
Term
| CH 5 What techniwue is used to achieve 1-Gbps throughput over a Cat 5 cable? |
|
Definition
| Al four wire pairs are used for both transmission and reception |
|
|
Term
| CH 5 Which of the following Ethernet standards is specially encoded for transmission over WAN's using SONET technology? |
|
Definition
|
|
Term
| CH 5 Which two of the following might cause excessive data collisions on an Ethernet network? |
|
Definition
A server on the network contains a faulty NIC The overall network length exceeds IEEE 802.3 standards for that network type |
|
|
Term
| CH 5 In which of the following examples do the workstations necessarily share a collision domain? |
|
Definition
| Two computers connected to the same hub |
|
|
Term
| CH 5 What are the minimum and maximum sizes for an Ethernet frame? |
|
Definition
|
|
Term
| CH 5 Which of the following network technologies does not use circuit switching? |
|
Definition
|
|
Term
| CH 5 Which of the following is the type of 10Gigabit Ethernet that can carry signals the farthest, nearly 25 miles? |
|
Definition
|
|
Term
| CH 1 Which of the following distinguishes peer-to-peer networks from client/server networks? |
|
Definition
| In peer-to-peer networks, no single computer has more authority than another, by default. |
|
|
Term
| CH 1 Which of the following is an advantage of using a peer-to-peer network over using a client/server network? |
|
Definition
| A peer-to-peer network is easier to set up. |
|
|
Term
| CH 1 Which of the following is an advantage of using a client/server network over using a peer-to-peer network? |
|
Definition
| A client/server network allows for easier expansion. |
|
|
Term
| CH 1 The first services widely used by networks were: |
|
Definition
|
|
Term
| CH 1 Suppose you wanted to share documents among several computers in your household in a peer-to-peer fashion. You could do that by properly configuring which of the following types of software? |
|
Definition
| Desktop operating system software |
|
|
Term
| CH 1 What is the primary function of a file server on a network? |
|
Definition
| It manages access and use of shared applications and data. |
|
|
Term
| CH 1 On most LANs, a computer acting as a server differs from a computer acting as a client in which of the following ways? (Choose two answers.) |
|
Definition
The server would run a different operating system than the client
The server would possess greater processing power than the client. |
|
|
Term
| CH 1 In which of the following environments would a MAN be most appropriate? |
|
Definition
| A corporate headquarters connecting its five buildings across a small campus |
|
|
Term
| CH 1 Which of the following describes the combination of voice (such as telephone), video, and data signals sent over the same network? |
|
Definition
|
|
Term
| CH 1 What is the term used to describe a discrete unit of data that is sent from one node to another over the network? |
|
Definition
|
|
Term
| CH 1 How can a server tell the difference between many clients on a network? |
|
Definition
| Each is identified by a unique network address |
|
|
Term
| CH 1 What device connects a client computer to a network's medium, such as a wire? |
|
Definition
|
|
Term
| CH 1 Which of the following is one function of a network protocol? |
|
Definition
| To ensure that data arrives at its destination in the proper sequence |
|
|
Term
| CH 1 The physical layout of nodes on a network is known as the network's: |
|
Definition
|
|
Term
| CH 1 Which of the following is an example of a mail service? |
|
Definition
| Exchanging messages between mail servers on different networks |
|
|
Term
| CH 1 Which of the following network topologies is most common on today's networks? |
|
Definition
|
|
Term
| CH 1 Which of the following is an example of a network management service? |
|
Definition
| Alerting the network administrator when a critical connectivity device |
|
|
Term
| CH 1 Security is a concern when using remote access servers on a network because |
|
Definition
| Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world. |
|
|
Term
| CH 1 Distributing data transfer activity equally over several devices or components belongs to which category of network management services? |
|
Definition
|
|
Term
| CH 1 What organization sponsors the CCNA and CCIE certifications? |
|
Definition
|
|
Term
| CH 6 If you purchase a new desktop computer today, wht type of expansion board NIC is it most likely to contain? |
|
Definition
|
|
Term
| CH 6 If you purchase a new laptop today, what type of NIC is it most likely to have? |
|
Definition
|
|
Term
| CH 6 Which two of the following IRQs could you probably assign to a NIC without causing a conflict with preassigned devices? |
|
Definition
|
|
Term
| CH 6 A certain computer on your fast ethernet network seems to be acting sluggish. After ensuring the 10/100 Mbps NIC is not malfunctioning, you decide to find out whether it's configured to transfer data at 10 Mbps rather than 100 Mbps, as it should be. How could you find this information and change it, if necessary? |
|
Definition
| By modifying the NIC's EEPROM setting using its configuration utility |
|
|
Term
| CH 6 Suppose computers on your home office network are connected to a single hub (A), but now you need to expand the network. You purchase another hub (B). Assuming you use a straight-through (not a crossover) cable, what port on hub A will you use to connect it to hub B? |
|
Definition
|
|
Term
| CH 6 You and a friend decide to set up Fast Ethernet networks in your respective houses to connect a half-dozen computers. Bothe of you will connet your networks to high-speed Internet connections. As the connectivity device for end nodes, you purchase a router whereas your friend purchases a 12-port hub. Which of the following will your network do that your friend's network won't do? |
|
Definition
| Filter traffic based on IP address |
|
|
Term
| CH 6 You are a network technician working on a 100Base-T network. A coworker has been having logging on to the server and asks whether you can quickly tell her if her workstation's NIC is operating properly. You do not have the NIC's utility disk on hand, but you look at the back of her workstation and learn that although the nIC is properly installed and connected to the network, something's wrong with it. What might you have seen that causes you to come to this conclusion? |
|
Definition
|
|
Term
| CH 6 How do bridges keep track of whether they should forward or filter frames? |
|
Definition
| They maintain a filtering database that identifies which frames can be filtered and which should be forwarded, based on their destination MAC address. |
|
|
Term
| CH 6 Which of the following is an advantage of using switches rather than hubs? |
|
Definition
| Switches can assign dedicated channels to every node, making their transmissions more secure. |
|
|
Term
| CH 6 What potential problem does STP address? |
|
Definition
|
|
Term
| CH 6 In cut-through switching, which frame field does the switch never read? |
|
Definition
|
|
Term
| CH 6 You are asked to configure a backbone swithc that connects servers supplying oceanic and atmospheric data to mariners and pilots around the world. Your networks traffic load is very high at all times, day and night. What type of switching do you configure the switch to be? |
|
Definition
| Store-and-forward switching |
|
|
Term
| CH 6 Which of the following devices separates collision domains? |
|
Definition
| All of the above (Bridge, Switch, Router) |
|
|
Term
| CH 6 Suppose your company's network contains two separate VLANs. Computer A is on the Customer Service VLAN and Computer B is on the Warehouse VLAN. Besides a Layer 2 switch, what device is required for Computer A and Computer B to exchange data? |
|
Definition
|
|
Term
| CH 6 Which of the following devices can act as a gateway? |
|
Definition
| All of the above (Router, Desktop workstation, Laptop) |
|
|
Term
| CH 6 Why can't routers forward packets as quickly as bridges can? |
|
Definition
| Routers operate at Layer 3 of the OSI model and, therefore, take more time to interpret logical addressing information |
|
|
Term
| CH 6 In STP, what device acts as a guide to setting the best paths between switches? |
|
Definition
|
|
Term
| CH 6 What switching technique allows you to funnel traffic belongin to more than one VLAN through a single switch interface? |
|
Definition
|
|
Term
| CH 6 Which of the following identifies the VLAN to which each piece of data belongs? |
|
Definition
| A tag added to each frames's header |
|
|
Term
| CH 6 Which of the following routing protocols is used on the Internet's backbone? |
|
Definition
|
|
Term
| CH 6 Which of the following routing protocols allows routers to exchange information about best paths with their neighboring routers only? |
|
Definition
|
|
Term
| CH 6 Why is a large, busy network more likely to use dynamic routing? |
|
Definition
| Because dynamic routing automatically selects the most efficient route between nodes, reducing the possibility for human error |
|
|
Term
| CH 6 A packet on a network using the RIP routing method has been passed from one connectivity device to another 15 times. What happens when it gets passed to one more device? |
|
Definition
|
|
Term
| CH 6 What is the main difference between a Layer 3 switch and a router? |
|
Definition
| A Layer 3 switch is optimized for fast data handling: a router is optimized for accurate data delivery. |
|
|
Term
| CH 6 At which layers of the OSI model are gateways capable of functioning? |
|
Definition
|
|
Term
| CH 10 Convert the following subnet mask ino its dotted-decimal equivalent: 11111111 11111111 11111000 00000000. |
|
Definition
|
|
Term
| CH 10 What is the default subnet mask for a Class A network? |
|
Definition
|
|
Term
| CH 10 A node on a network has an IP address of 140.133.28.72 and its subnet mask is 255.248.0.0. What type of subnetting has been used on this network? |
|
Definition
|
|
Term
| CH 10 On a network with an IP address of 140133.28.72 (or 10001100 10000101 00011100 01001000) and a subnet mask of 255.248.0.0 (or 11111111 11111000 00000000 00000000), what is the network ID? |
|
Definition
| 140.248.0.0 (11111111 11111000 00000000 00000000) |
|
|
Term
| CH 10 As a networking consultant, you've been asked to help expand a client's TCP/IP network. The network administrator tells you that the network ID is subnetted as 185.27.54.0/26. On this network, how many bits of each IP address are devoted to host information? |
|
Definition
|
|
Term
| CH 10 If you worked on an older network that could not interpret classless addressing , and your network ID was 145.27.0.0, what is the theoretical maximum number of different subnets you could create on this network? |
|
Definition
|
|
Term
| CH 10 You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this? |
|
Definition
|
|
Term
| CH 10 If you subdivide your Class B network into 254 subnets, what is the maximum number of hosts you can assign to any single subnet? |
|
Definition
|
|
Term
| CH 10 Your company has leased a Class C network whose network ID is 205.61.128.0. You want to create 16 subnets within this network. One of the subnets will have an extended network prefix of 205.61.128.64. What will be the broadcast address for this subnet? |
|
Definition
|
|
Term
| CH 10 Your workstation's IP address is 10.35.88.12, and your supervisor's workstation's IP address is 10.35.91.4. When you send data from your workstation to your supervisor's workstation, what is the most likely IP address of hte firest default gateway tha will accept and intercept your transmission |
|
Definition
|
|
Term
| CH 10 You have decided to use PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP in order for all five clients in your office to be able to access servers on the Internet? |
|
Definition
|
|
Term
| CH 10 You have offered to help a friend ste up he e-mail client software. She knows the email address that her ISP assigned her. Which of the following pieces of information will you need to configure her email software to successfully send messages? |
|
Definition
|
|
Term
| CH 10 Which two of the following are benefits of using IMAP4 relative to POP3? |
|
Definition
-It allows users to review and delete mail w/o downloading it from the mail server. -It enables multiple users to easily share a central mailbox |
|
|
Term
| CH 10 What Network layer protocol does the traceroute utility use to obtain its information about paths between a source and destination? |
|
Definition
|
|
Term
| CH 10 Which of the following commands allows you to view the routing table on you Linux workstation? |
|
Definition
|
|
Term
| CH 10 When you use the mtr command to assess the path from your office workstation to a server on your company's WAN that's located in Spain, what is the first hop the mtr commnad will display? |
|
Definition
| Your default gateway's IP adddress |
|
|
Term
| CH 10 If you know that your colleague's TCP/IP host name JSMITH, and you need to find out his IP address, which of the following commands should you type at your shell prompt or command prompt? |
|
Definition
|
|
Term
| CH 10 Suppose your office's only DNS server was down, and you wanted to view the DNS address record for your comapny's domain. Which of the following TCP/IP utilities would allow you to do this? |
|
Definition
|
|
Term
| CH 10 What utility might you use to find out whether your ISPs router is responsible for the poor network performance your organization experiences on a particular afternoon? |
|
Definition
|
|
Term
| CH 10 Which of the following commands reveals the default gateway addresses fro all the hosts to which a router is connected? |
|
Definition
|
|