• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/90

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

90 Cards in this Set

  • Front
  • Back
A network that has locations in different countries is considered a WAN.
True
[page 28]
In order to find out your MAC address, you should open a command prompt and type ipconfig /all.
True
[page 23]
What makes a computer a "server" is the fact that it has a server operating system installed on it.
True
[page 33]
Routers do not forward broadcast packets.
True
[page 90]
If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
True
[page 95]
The function of a repeater is to extend the range of an existing network
True
[page 62]
You cannot connect a hub to another hub unless it has an uplink port.
False
[page 66]
The XYZ company has two offices,one downtown, and a brand new office in the newer section of town. To connect the two offices, they will need a dedicated line, probably leased from the local phone company. What type of network will they be implementing to connect their two offices?
MAN
[page 28]
What is one of the disadvantages of a peer-to-peer network compared to a server-based network?
Limited security
[page 35]
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
additional costs
[page 37]
For any device to communicate with the compter, either through input or output, it must have what special software installed?
device driver
[page 13]
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
Encapsulation
[page 32]
Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?
MAC Address
[page 23]
What was the primary reason to create a network?
Share rources, communicate with e-mail, share information. (All the above)
[page 14]
You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement?
internetwork
[page 26]
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
NIC Driver
[page 17]
You're the network administrator for a company located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing?
WAN
[page 28]
You have just started a new business. You need to have three to four workstations available for your employees who simply need share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
peer-to-peer network
[page 34-36]
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determinewhere to send the frame, and forwards it out the correct port?
switch
[page 67]
Why would yo need to use a repeater?
You need to add a group of computers to your network, and the distance is too far for normal means of communication.
[page 63]
Which of the following is NOT a function of a hub?
transmits the signal to the correct port
[page 64]
Why is the use of a switch preferred over a hub?
Devices on a hub have to share the available bandwidth. Switches are intelligent; the read the frame and determine where to send it. Switches can operate in full-duplex mode. (All of the above)
[page 66-68]
What does a switch store in its switching table?
The source MAC address of a frame and the port it was received on.
[page 67]
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
ARP
[page 74]
What does it usually mean when the activity light on a switch is blinking?
It is commnicating with the network.
[page 76]
What component of the computer provides it with a MAC address?
NIC
[page 80]
A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?
Hub
[page 77]
When referring to network bandwidth, what is the basic unit of measurement?
bits per second
[page 64]
The SSID is configured on which of the following so that it can be distinguished from other available wireless networks?
access point
[page 84]
What command would you issue from the command prompt to test whether your computer has connectivity to the network?
ping IP address
[page 73]
There are two basic categories of physical cabling used in Ethernet networks. They are copper wire and fiber optic.
True
[page 164]
The length of cable between the wall jack and a patch panel is called vertical cabling.
False
[page 174]
Wireless and wired networkd are both susceptible to RFI.
True
[page 165]
Because fiber-optic cabling uses light pulses instead of electrical signals, it is immune to interference and highly resistant to eavesdropping.
True
[page 184]
Wireless networks are often used to extend the reach of a wired LAN.
True
[page 188]
A netowork's physical topology refers to the arrangement of the cabling and how the the devices connect to each other.
True
[page 110]
The physical bus topology is no longer used because it required extra cable to connect all the computers and required a central device.
False
[page 112]
A point-to-point topology is typically used for WAN connections.
True
[page 116]
A network's logical topology often depends on the central device's electronics.
True
[page 119]
A collision can occur on a switch is operating in full-duplex mode.
False
[page 127]
Which of the following is not one of the main differences between the types of networking cabling?
the ability to send and receive signals
[page 164]
When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?
attenuation
[page 165]
What is the maximum bandwidth for a network cabled using category 5e UTP cable?
1000 Mbps
[page 170]
The frequency at which a wireless network operates is measured in cycles per second and is expressed as what unit of measurement?
hertz
[page 190]
Terrestrial and satellite systems are two types of which wireless networking technology?
microwave
[page 195]
What is the way in which bit signals are represented on the network medium?
encoding
[page 164]
What is the term used that defines network cabling in the work area and between telecommunications closts and equipment rooms?
structured cabling
[page 173]
What type of wiring should be used for a high-speed connection between two buildings?
fiber-optic cabling
[page 184]
What is a disadvantage of using fiber-optic cabling?
difficult to install
[page 185]
What type of wireless technology is used for 802.11b/g/n networks?
spread-spectrum radio
[page 193]
Which of the following is NOT an advantage of a physical star?
provides redundacy and fault tolerance
[page 112]
Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
physical ring
[page 115]
What is the main advantage of a point-to-point topology?
data travels on a dedicated link
[page 116]
What is the most common topology and technology combination in use today?
switched/ Ethernet
[page 118]
What does the frame trailer consist of in an Ethernet frame?
cyclic redundancy check
[page 126]
What is the best way to eliminate the possibility of collisions in a network?
Only use switches. Use NICs that operate in full-duplex mode. (Both a and c)
[page 127]
When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?
100 meters
[page 122]
What is the IEEE standard governing wireless networking?
802.11
[page 137]
When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?
ad hoc
[page 138]
In wireless networks, what type of media access control is used?
CSMA/CA
[page 140-141]
IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
False
[page 208]
The Internetwork layer is the layer that handles network configuration and is considered the heart of the TCP/IP protocol suite.
True
[page 213]
The Transport layer uses port numbers to identify the source and destination Application-layer protocol of the data that it contains.
True
[page 223]
DNS is a protocol that automatically provides a computer with its IP address configuration.
False
[page 227-228]
An IP address is composed of 48 bits that are grouped together into 8-bit octets and are represented by a decimal number from 0 to 255
False
[page 232]
The Transport layer is the same in both the OSI model and the TCP/IP model.
True
[page 265]
The Physical layer has been divided into two sublayers, called the LLC sublayer and the MAC sublayer.
False
[page 278]
The Network layer communicates with the Data Link layer and the Session layer.
False
[page 265]
One of the problems that can occur in the Network layer is the incorrect configuration of a hosts IP address
True
[page 272]
The Transport layer deals with which unit of information?
Segment
[page 209]
Which of the following is not a function of the Network Access layer?
delivers packets efficiently
[page 213]
In what layer does the NIC operate?
Network Access
[page 210]
In which layer does a router operate?
Internetwork
[page 214]
Which protocol is responsible for determining the MAC address associated with each IP address and keeping a table of its results?
ARP
[page 216]
TCP establishes a connection with the destination device using which process?
Three-way handshake
[page 224]
An IP address consists of four octets separated by periods. Which part of this address denotes its class?
first octet
[page 232]
What is the binary number system based on?
powers of 2
[page 240]
What is the decimal equivalent to the binary number 11000001?
193
[page 239-242]
How many bits are in an IPv6 address?
128
[page 248]
Which layer is responsible for establishing a connection between the source and destination?
Session
[page 270]
Which layer of the OSI model is responsible for encryption and decryption?
Presentation
[page 269]
Put the layers of the OSI model in order from layer 7 to layer 1.
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
[page 265]
What is a PDU?
It is the name given to the unit of information used by each layer.
[page 268]
At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this process called?
encapsulation
[page 268]
What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?
sequence number
[page 271]
Which is the IEEE standard that sets the standards for wireless networking?
802.11
[page 277]
One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called?
access control
[page 272]
You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation’s IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem?
Network layer device
[page 272]
Which layer has been subdivided into the Logical Link Control sblayer and the Media Access Control sublayer?
Data link
[page 278]
Which layer is responsible for the encoding of signals?
1
[page 274]