Term
|
Definition
| A ____ facilitates communication and resource sharing between other computers on the network. |
|
|
Term
|
Definition
| Which network model ensures that no computer on the network has more authority than another? |
|
|
Term
|
Definition
| Which network topology is the most common? |
|
|
Term
|
Definition
| ____ are the distinct units of data that are exchanged between nodes on a network. |
|
|
Term
|
Definition
| A ____ network connects clients and servers from multiple buildings. |
|
|
Term
|
Definition
| ____ services allow remote users to connect to the network. |
|
|
Term
|
Definition
| ____ provide a Web-based client for checking e-mail. |
|
|
Term
|
Definition
| Which type of service supports e-mail? |
|
|
Term
|
Definition
| Often, separate LANs are interconnected and rely on several ____ running many different applications and managing resources other than data. |
|
|
Term
|
Definition
| Which Data Link sublayer manages access to the physical medium? |
|
|
Term
|
Definition
| Which Data Link sublayer manages flow control? |
|
|
Term
|
Definition
| ____ is the process of reconstructing segmented data. |
|
|
Term
|
Definition
| In which OSI model layer does IP operate? |
|
|
Term
|
Definition
| In which OSI model layer do hubs operate? |
|
|
Term
|
Definition
| Which IEEE standard describes specifications for wireless transmissions? |
|
|
Term
|
Definition
| Standards define the ____ performance of a product or service. |
|
|
Term
|
Definition
| Transport layer protocols break large data units into ____. |
|
|
Term
|
Definition
| The ____ is a fixed number associated with a device’s NIC. |
|
|
Term
|
Definition
| Which IEEE standard describes Ethernet? |
|
|
Term
|
Definition
| Which term describes the hardware that makes up the enterprise-wide cabling system? |
|
|
Term
|
Definition
| ____ describes wiring that connects workstations to the closest telecommunications closet. |
|
|
Term
| EIA/TIA RS-232 (Recommended Standard 232) |
|
Definition
| ____ describes a popular serial data transmission method. |
|
|
Term
|
Definition
| The data transmission characteristic most frequently discussed and analyzed by networking professionals is ____. |
|
|
Term
| telecommunications closet |
|
Definition
| Which term identifies a room containing connectivity for groups of workstations in its area? |
|
|
Term
|
Definition
| The most significant factor in choosing a transmission method is its ____. |
|
|
Term
|
Definition
| Many network problems can be traced to poor cable ____ techniques. |
|
|
Term
|
Definition
| The more twists per foot in a pair of wires, the more resistant the pair will be to ____. |
|
|
Term
|
Definition
| In modulation, a simple wave called a ____ wave, is combined with another analog signal to produce a unique signal that gets transmitted from one node to another. |
|
|
Term
|
Definition
| Which connector is used in RS-232 transmissions? |
|
|
Term
| all devices on your network segment |
|
Definition
| Suppose you send data to the 11111111 11111111 11111111 11111111 IP address. To what device(s) are you transmitting? |
|
|
Term
| video transmission over the Web |
|
Definition
| Which of the following applications would be best suited to using UDP? |
|
|
Term
| a broadcast to all the nodes on its segment |
|
Definition
| What method of transmission does a workstation use to send an ARP request? |
|
|
Term
| the lease duration for client computers |
|
Definition
| You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and note-taking. Clients need access to the Internet, so you have configured your network’s DHCP server to issue them IP addresses automatically. What DHCP option should you modify to make sure you are not wasting addresses that were used by clients who’ve completed a class and no longer need them? |
|
|
Term
| Students and professors will be unable to Telnet to the server or FTP files to or from the server. |
|
Definition
| You manage a server that allows university students to use Telnet to make a connection, then use FTP to upload their homework. Professors also pick up students’ homework by telnetting to the computer and using FTP. You have decided to change the FTP port number on the server from its default number to 23, for better security. Assuming students and professors make no changes to their default workstation configurations, what will be the result of this change? |
|
|
Term
| All devices that are reachable |
|
Definition
Suppose you send data to an address that begins with the Format Prefix FF0E on a net- work running IPv6. To what device(s) are you transmitting? |
|
|
Term
| It is discarded by the connectivity device. |
|
Definition
| What happens to an IP datagram when its TTL reaches 1? |
|
|
Term
|
Definition
| What devices are the highest authorities in the domain name system hierarchy? |
|
|
Term
| to obtain the MAC address of a host, and then map that MAC address to the host’s IP address |
|
Definition
| What is the function of ARP? |
|
|
Term
| BOOTP relies on a static table to associate IP addresses with MAC addresses, whereas DHCP does not. |
|
Definition
| What is the main difference between BOOTP and DHCP? |
|
|
Term
|
Definition
| Collectively, MPLS labels are sometimes called a ____. |
|
|
Term
|
Definition
| A ____ is simply a linked series of devices. |
|
|
Term
|
Definition
| The most common 1-Gigabit Ethernet standard in use today is ____. |
|
|
Term
|
Definition
| Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin. |
|
|
Term
|
Definition
| In packet switching, when packets reach their destination node, the node ____ them based on their control information. |
|
|
Term
|
Definition
| The 10-gigabit fiber optic standard with the shortest segment length is ____. |
|
|
Term
|
Definition
| In the 10GBase-LR standard, the L stands for ____. |
|
|
Term
|
Definition
| 1000Base-SX has a maximum throughput of ____. |
|
|
Term
|
Definition
| A complex combination of pure topologies is known as a ____ topology. |
|
|
Term
|
Definition
| The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium. |
|
|
Term
|
Definition
| The primary difference between the two USB standards is ____. |
|
|
Term
|
Definition
| The primary difference between the two USB standards is ____. |
|
|
Term
|
Definition
| The primary difference between the two USB standards is ____. |
|
|
Term
|
Definition
| Switches can create ____ by grouping a number of ports into a broadcast domain. |
|
|
Term
|
Definition
| ____ are combinations of networking hardware and software that connect two dissimilar kinds of networks. |
|
|
Term
|
Definition
| ____ routing is a technique in which a network administrator programs a router to use specific paths between nodes. |
|
|
Term
|
Definition
| A ____ is a multiport connectivity device that directs data between nodes on a network. |
|
|
Term
|
Definition
| PCIe slots vary depending on the number of ____ they support. |
|
|
Term
|
Definition
| Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches. |
|
|
Term
|
Definition
| Nearly all NICs contain a(n) ____, the device that transmits and receives data signals. |
|
|
Term
|
Definition
| The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU. |
|
|
Term
|
Definition
| ____ is a type of microchip that requires very little energy to operate. |
|
|
Term
|
Definition
| What part of a SONET network allows it to be “self-healing”? |
|
|
Term
| any type of Internet connection |
|
Definition
| A VPN is designed to connect 15 film animators and programmers from around the state of California. At the core of the VPN is a router connected to a high-performance server used for storing the animation files. The server and router are housed in an ISP’s data center. The ISP provides two different T3 connections to the Internet backbone. What type of connection must each of the animators and programmers have to access the VPN? |
|
|
Term
|
Definition
| Which of the following elements of the PSTN is most likely capable of transmitting only analog signals? |
|
|
Term
| In a remote switching facility |
|
Definition
| Where on the PSTN would you most likely find a DSLAM? |
|
|
Term
|
Definition
| Which of the following WAN technologies operates at Layer 3 of the OSI model? |
|
|
Term
|
Definition
| What technique enables DSL to achieve high throughput over PSTN lines? |
|
|
Term
|
Definition
| On an ISDN connection, what device separates the voice signal from the data signals at the customer premises? |
|
|
Term
| the distance from the customer to the carrier’s switching facility |
|
Definition
| Which of the following may limit a DSL connection’s capacity? |
|
|
Term
| time division multiplexing |
|
Definition
| What technique does T1 technology use to transmit multiple signals over a single telephone line? |
|
|
Term
|
Definition
| In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range. |
|
|
Term
|
Definition
| ____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel. |
|
|
Term
|
Definition
| Dial return satellite Internet access is a(n) ____ technology. |
|
|
Term
|
Definition
| If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit. |
|
|
Term
|
Definition
| If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit. |
|
|
Term
|
Definition
| A unique characteristic of the 802.11 data frame is its ____ field. |
|
|
Term
|
Definition
| A directional antenna issues wireless signals along a(n) ____ direction. |
|
|
Term
|
Definition
| In ____, a wireless signal splits into secondary waves when it encounters an obstruction. |
|
|
Term
|
Definition
| ____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves. |
|
|
Term
|
Definition
| ____ is one of the most important functions an NOS provides. |
|
|
Term
|
Definition
| Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions. |
|
|
Term
|
Definition
| A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on. |
|
|
Term
|
Definition
| A piece of software called ____ translates requests and responses between a client and a server. |
|
|
Term
|
Definition
| A workgroup is a group of interconnected computers that share each other’s resources without relying on a central ____. |
|
|
Term
|
Definition
| Solaris employs the file system called ____ for its native file system type. |
|
|
Term
|
Definition
| A(n) ____ is a self-contained, well-defined task within a process. |
|
|
Term
|
Definition
| The printer queue is a ____ representation of the printer’s input and output. |
|
|
Term
|
Definition
| A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal. |
|
|
Term
|
Definition
| The directory containing information about objects in a domain resides on computers called ____ controllers. |
|
|
Term
|
Definition
| Convert the following subnet mask into its dotted-decimal equivalent: 11111111 11111111 11111000 00000000. |
|
|
Term
|
Definition
| A node on a network has an IP address of 140.133.28.72 and its subnet mask is 255.248.0.0. What type of subnetting has been used on this network? |
|
|
Term
|
Definition
| If you worked on an older network that could not interpret classless addressing, and your network ID was 145.27.0.0, what is the theoretical maximum number of different subnets you could create on this network? |
|
|
Term
|
Definition
| You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this? |
|
|
Term
|
Definition
| Your workstation's IP address is 10.35.88.12 and your supervisor's workstation's IP address is 10.35.91.4. When you send data from your workstation to your supervisor's workstation, what is the most likely IP address of the first default gateway that will accept and interpret your transmission? |
|
|
Term
| 140.128.0.0 (or 10001100 10000000 00000000 0000000) |
|
Definition
| On a network with an IP address of 140.133.28.72 (or 10001100 10000101 00011100 01001000) and a subnet mask of 255.248.0.0 (or 11111111 11111000 00000000 00000000), what is the network ID? |
|
|
Term
|
Definition
| You have decided to use PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP in order for all five clients in your office to be able to access servers on the Internet? |
|
|
Term
|
Definition
| If you subdivide your Class B network into 254 subnets, what is the maximum number of hosts you can assign to any single subnet? |
|
|
Term
|
Definition
| What is the default subnet mask for a Class A network? |
|
|
Term
|
Definition
| If you know that your colleague's TCP/IP host name is JSMITH, and you need to find out his IP address, which of the following commands should you type at your shell prompt or command prompt? |
|
|
Term
|
Definition
| Many network engineers consider ____ to be superior to MGCP. |
|
|
Term
|
Definition
| A computer programmed to act like an IP telephone is known as a(n) ____. |
|
|
Term
|
Definition
| Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____. |
|
|
Term
|
Definition
| A(n) ____ is a computer that manages multiple media gateways. |
|
|
Term
|
Definition
| ____ describes the use of any network to carry voice signals using the TCP/IP protocol. |
|
|
Term
|
Definition
| In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals. |
|
|
Term
|
Definition
| Among all video-over-IP applications, ____ is perhaps the simplest. |
|
|
Term
| call signaling and control |
|
Definition
| SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers. |
|
|
Term
|
Definition
| ____ is the use of one network to simultaneously carry voice, video, and data communications. |
|
|
Term
|
Definition
| In ____ , a hacker forges name server records to falsify his host’s identity. |
|
|
Term
|
Definition
| ____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission. |
|
|
Term
|
Definition
| A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key. |
|
|
Term
|
Definition
| A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted. |
|
|
Term
|
Definition
| In a ____ attack, a person redirects or captures secure transmissions as they occur. |
|
|
Term
| authentication, authorization, and accounting |
|
Definition
| RADIUS and TACACS belong to a category of protocols known as AAA (____). |
|
|
Term
|
Definition
| A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections. |
|
|
Term
|
Definition
| A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions. |
|
|
Term
|
Definition
| ____ is a method of encrypting TCP/IP transmissions. |
|
|
Term
|
Definition
| ____ is the telltale factor for ascertaining where faults in a cable lie. |
|
|
Term
|
Definition
| The danger in using a ____ is that it could collect more information than you or the machine can reasonably process. |
|
|
Term
|
Definition
| ____ are often considered third-level support. |
|
|
Term
|
Definition
| ____ is one of the most important aspects to consider when looking at how a problem solution might affect users and network functionality. |
|
|
Term
|
Definition
| To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode. |
|
|
Term
|
Definition
| A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network. |
|
|
Term
|
Definition
| ____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire. |
|
|
Term
|
Definition
| A ____ is a document (preferably online) that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages. |
|
|
Term
|
Definition
| A ____ usually results from a bad NIC. |
|
|
Term
|
Definition
| ____ packets exceed the medium’s maximum packet size. |
|
|
Term
|
Definition
| In ____, parity error checking occurs when data is written across the disk array. |
|
|
Term
|
Definition
| A program that disguises itself as something useful but actually harms your system is called a ____. |
|
|
Term
|
Definition
| A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. |
|
|
Term
|
Definition
| ____ provides redundancy through a process called disk mirroring. |
|
|
Term
|
Definition
| An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived. |
|
|
Term
|
Definition
| ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior. |
|
|
Term
|
Definition
| ____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network. |
|
|
Term
|
Definition
| Mesh topologies and ____ topologies are good choices for highly available enterprise networks. |
|
|
Term
|
Definition
| A(n) ____ virus changes its characteristics every time it is transferred to a new system. |
|
|
Term
|
Definition
| A networked ____ is perhaps the simplest device to add. |
|
|
Term
|
Definition
| The process where one network management console collects data from multiple networked devices at regular intervals is known as ____. |
|
|
Term
|
Definition
| ____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software. |
|
|
Term
|
Definition
| ____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software. |
|
|
Term
|
Definition
| A ____ is a correction, improvement, or enhancement to a particular piece of a software application. |
|
|
Term
|
Definition
| A key component in managing networks is identifying and tracking its hardware and software through ____ management. |
|
|
Term
|
Definition
| Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it. |
|
|
Term
|
Definition
| ____ management refers to monitoring how well links and devices are keeping up with the demands placed on them. |
|
|
Term
|
Definition
| A(n) ____ is a graphical representation of a network’s devices and connections. |
|
|
Term
|
Definition
| The process of reverting to a previous version of software after attempting to upgrade it is known as ____. |
|
|