Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
190 Cards in this Set
- Front
- Back
A Router operates in which layer of the OSI model?
|
The Network Layer
|
|
What does the Network Time Protocol (NTP) do?
|
Synchronizes computer clock times in a network of computers
|
|
L2TP is able to support which of the following protocols?
|
AppleTalk
2. TCP/IP 3. IPX |
|
What are disadvantages of DSL connections?
|
It is slower than cable technology, Only available near the telephone company's central offices, May not be available to some users with older phone lines
|
|
Which of the following devices operate at the Data Link layer of the OSI model?
|
NIC Bridge
|
|
Which Windows 2000/2003 service provides NAT, dial-up, routing, and other network functions?
|
RRAS
|
|
By default, which of the following ports does the Hypertext Transfer Protocol communicate on?
|
80
|
|
Which of the following protocols is used to create a VPN?
|
PPTP
|
|
Which frame type is used on a Token Ring LAN?
|
802.5
|
|
Which layer of the OSI model does data encryption take place in?
|
Presentation
|
|
You would like to provide redundancy for your DNS server. How do you accomplish this.
|
Set up a secondary
|
|
Which of the following are sublayers of the data-link layer of the OSI model
|
LLC MAC
|
|
Which of the following should be considered when determining which subnet mask to use on a network?
|
The class of the IP address,
Projected growth of the network, The number of hosts that will be on the network |
|
The ARP utility will provide you with which of the following types of information?
|
Internet Address
2. Physical Address 3. Type |
|
Your company wishes to set up a VPN between 2 branch offices and requires that the link supports non-IP protocols and authentication. Which protocols are required?
|
L2TP IPSEC
|
|
Which of the following technologies would most like be used to synchronize your PDA with your PC located in another room?
|
Bluetooth
|
|
Which of the following tools is sometimes referred to as the fox-and-hound?
|
Tone Locator
|
|
The 100BASE-FX link uses the MDI interface. What does MDI stand for?
|
medium dependent interface
|
|
Which of the following are valid reasons for implementing DHCP?
|
Prevents duplicate IP addresses on the network
2. Prevents typos or incorrect IP address, subnet mask or default gateway information from being entered 3. Saves time on large networks by getting rid of the need to configure every clients' IP information manually 4. Helps keep addresses available on networks where IP addresses are running short |
|
Which of the following devices operate at the Data Link layer of the OSI model?
|
NIC
3. Bridge |
|
What are the two parts of an IP address?
|
Network ID & Host ID
|
|
Class A
|
Supports Large networks and uses the first octet of the address to identify the network. First bit is always 0
|
|
Class B
|
Moderate networks, uses the first two octets to identify the network.
First two bits are always 10 |
|
Class C
|
Small networks, uses the first three octets to identify the network, first three bits are always 110
|
|
What are examples of "reserved" addresses
|
Network address & local broadcast & directed broadcast address
|
|
How are IPv6 internet addresses represented?
|
eight sets of four hexidecimal digits
|
|
What are the three types of broadcasts for IPv6
|
Unicast, Multicast & anycast
|
|
What is the data rate for a token ring network?
|
16Mbps
|
|
What kind of physical interface does a router have
|
AUI
|
|
A server redirector is handled by which level of the OSI model?
|
Session
|
|
Which port is used by DNS
|
53
|
|
What is the max lenght of a FDDI packet?
|
36000 bits
|
|
What is ICA used for?
|
allows an application to be run on a remote computer but appear as if it running locally
|
|
What best describes share level access?
|
Used to specify password protection for each user
|
|
which port is used by secure websites?
|
443
|
|
Which topolgy is easiest to expand?
|
STAR
|
|
802.2
|
LLC regulates how much data can be transmitted in a certain amount of time
|
|
802.3
|
csma/cd for ethernet, 10 mbps bus
& star |
|
802.11b
|
Wireless 16mbps uses CSMA/CA
|
|
802.3u
|
100 mbps physical topology star logical topology bus
|
|
802.3z
|
1000mbps
|
|
802.5
|
4 & 16 Mbps, uses token passing method
|
|
FDDI
|
100Mbps, dual ring, fiber, token passing
|
|
What type of cable is often used for cable TV & cable modems
|
RG-59
|
|
CAT 5
|
100Mbps
|
|
Cat 6
|
155Mbps
|
|
Cat 7
|
1000 Mbps
|
|
router
|
used to create larger natworks by joining two network segments
|
|
bridge
|
used to divide larger networks into smaller sections
|
|
100BASETX
|
Cat 5 UTP, 100 meters, RJ-45, physical star
|
|
100BaseT4
|
cat 3, 4,5 UTP, 100 meters, RJ-45, physical star
|
|
100BaseFX
|
Multimode/single-mode fiber-optic cable, 412/multimode fiber-optic 10,000/single mode fiber-optic, SC, ST physical star
|
|
1000BASE LX
|
Multi-mode/single mode fiber 550/multimode 5000/ single mode
|
|
1000BaseSX
|
Multimode, 550 meters using 50 Micron multimode fiber
|
|
1000BaseCX
|
STP 25 meters, 9-pin shielded connector, 8 pin fiber channel type 2 connector
|
|
1000BaseT
|
UTP 75 meters, RJ-45
|
|
10GBaseSR
|
Baseband, 10000Mbps, fiber
|
|
10BBaseLR
|
Baseband, 10000Mbps, 10,000m, single mode
|
|
10GBaseER
|
Baseband, 10000 Mbps, single mode
|
|
In a crossover cable which wires are crossed?
|
1&3, 2&6
|
|
What distance vector and link state is associated with TCP/IP?
|
RIP, OSPF
|
|
What distance vector and link state is associated with IPX/SPX?
|
RIP NLSP
|
|
What command would you use to obtain a MAC address on a win 95/98/ME machine?
|
winipcfg
|
|
What command would you use to obtain a MAC address on a Linux/Unix box
|
ipconfig -a
|
|
What command would you use to obtain a MAC address on a novell system?
|
config
|
|
What command would you use to obtain a MAC address for a Cisco Router?
|
sh int <interface name>
|
|
Application
|
7
|
|
Presentation
|
6
|
|
Session
|
5
|
|
Transport
|
4
|
|
Network
|
3
|
|
Data-link
|
2
|
|
Physical
|
1
|
|
What does the physical layer define?
|
hardware, topology and voltage
|
|
What is the data link layer responsible for?
|
Getting the data to the physical layer so that it can be transmitted over the network. Error detection, hardware addressing.
|
|
What are the two sublayers of the data link layer?
|
MAC layer, LLC layer
|
|
What is the LLC layer of the data link layer responsible for?
|
error checking & flow control mechanisms
|
|
What is the primary responsibility for the network layer?
|
routing
|
|
What is the transport layer responsible for ?
|
error checking, service addressing, segmentation
|
|
What is the Session layer responsible for?
|
synchronization of data between applications on two devices
|
|
What does the presentation layer do?
|
convert the data intended for or received from the application layer into another format.
|
|
What does Appleshare do?
|
provides application layer services including file and print services.
|
|
What does appleTalk address Resolution Protocol do/
|
map AppleTalk addresses to ethernet and token ring physical addresses
|
|
What does AppleTalk Data Stream protocol do?
|
a session layer protocol used to establish connections between network devices
|
|
What does AppleTalk filing protocol?
|
manages file sharing
|
|
What does AppleTalk Session Protocol do?
|
works on the session layer and establishes/releases connections between networked devices
|
|
AppleTalk Transaction Protocol
|
establishes a connectionless session between networked systems
|
|
Datagram Delivery Protocol (AppleTalk)
|
Performs datagram delivery and routing functions
|
|
EtherTalk Link Access Protocol
|
a variation of the appletalk protocol that is compatible with the eithernet protocol
|
|
Name binding protocol (AppleTalk)
|
used to map computer names host names to network layer addresses
|
|
Printer Access Protocol
|
session layer protocol used to provide printing service
|
|
Routing Table Maintenance Protocol
|
maintains the routing tables
|
|
TokenTalk Link access Protocol
|
variation on appletalk that is compatible with token ring
|
|
Zone information protocol
|
used to divee network devices into logical groups called zones
|
|
Identify the network/node address for the following IP & subnet:
Subnet: 255.0.0.0 IP: 192.168.10.100 |
Network Address: 192
Node Address: 168.10.100 |
|
Identify the network/node address for the following IP & subnet:
Subnet: 255.255.0.0 IP: 192.168.10.100 |
Network address: 192.168
Node Address: 10.100 |
|
Identify the network/node address for the following IP & subnet:
Subnet: 255.255.255.0 IP: 192.168.10.100 |
Network address 192.168.10
Node address: 100 |
|
what is the IP range for a class A address?
|
1-126
|
|
What is the IP range for a class b network?
|
128 - 191
|
|
What is the IP range for a class C network
|
192-223
|
|
What is the IP Range for a class D network
|
224-239
|
|
what is the Ip Range for a class E network
|
240-255
|
|
what is the default subnet mask for a class a network
|
255.0.0.0
|
|
What is the default subnet mask for a class B network
|
255.255.0.0
|
|
What is the default subnet mask for a class C network?
|
255.255.255.0
|
|
What is the private address range for a class A network?
|
10.0.0.0-10.255.255.255
|
|
What is the private address range for a Class B network
|
172.16.0.0-172.31.255.255
|
|
What is the private address range for a Class C network
|
192.168.0.0-192.168.255.255
|
|
What is APIPA?
|
Automatic Private IP addressing, assigns an ip address if unable to obtain one and allows limited connectivity to local network.
|
|
Is IP connection oriented or connection-less?
|
connection less
|
|
Is TCP connection oriented or connection-less?
|
connection-oriented
|
|
What is the biggest difference between TFTP and FTP?
|
TFTP is connection-less and uses only UDP
|
|
What is SSH?
|
Secure Shell is a secure alternative to Telnet
|
|
What is ICMP?
|
works with IP to provide error checking and reporting functionality. has the ping utility
|
|
What is the function of ARP?
|
resolve IP addresses to MAC addresses or layer 2
|
|
What is NTP
|
NTP uses the TCP transport protocol and is the protocol that facilitates the ocmmunication of time information between systems
|
|
What is NNTP
|
Network news transport protocol used for accessing the downloading messages from internet-based newsgroups
|
|
What is SCP
|
Secure Copy Protocol that uses SSH to provide a safe way to copy files between systems
|
|
What is LDAP?
|
Lightweight Directory Access Protocol, provides a mechanism to access directory service systems
|
|
What is IGMP?
|
Internet group managment protocol used for communication between devices in a multi-cast group
|
|
What is the LPR?
|
Line Printer Remote provides a mechanism to send printing tasks to a print server
|
|
Port 20
|
FTP
|
|
Port 21
|
FTP
|
|
Port 22
|
SSH
|
|
Port 23
|
Telnet
|
|
Port 25
|
SMTP
|
|
Port 23
|
DNS
|
|
Port 69
|
TFTP
|
|
Port 80
|
HTTP
|
|
Port 110
|
POP3
|
|
Port 119
|
NNTP
|
|
Port 123
|
NTP
|
|
Port 143
|
IMAP4
|
|
Port 443
|
HTTPS
|
|
What are messages sent by SNMP agents to an SNMP management system
|
trap messages
|
|
What are the three requirments of Zeroconf
|
a capability to self-assign IP address, a capability to independently resolve hostnames, mechanism for independently locating services on a network
|
|
What is SMB
|
the default file access and sharing protocol for windows based systems
|
|
At what speed can t1 transmit?
|
T1
|
|
At what speed can t2 transmit?
|
6.312
|
|
Why is SLIP so dangerous?
|
Because it sends everything in clear text.
|
|
What port does PPTP use on the server?
|
1723
|
|
What does L2TP do?
|
it is an independent protcol tht supports secure tunneling & supports common public key infrastructure
|
|
What is CHAP?
|
CHAP is an authentication system that uses MD5 encryption shceme to secure authentication responses.
|
|
What is MS-CHAP?
|
developed to authenticate remote Windows based workstations, requires authentication of both server & client.
|
|
What is PAP?
|
the least secure of the authentication methods because it uses unecrypted passwords
|
|
What is EAP?
|
an extension made to standard PPP.
|
|
What is SPAP?
|
an ecrypting authentication protocol used by Shiva remote acces servers
|
|
What OS is associated with HFS?
|
Apple OS X
|
|
What is the native authentication protcol for micorsoft active directory?
|
Kerberos
|
|
What is CSNW
|
Client services for NetWare, designed to enable Windows client systems to access file and print services on a Netware server
|
|
What is GSNW?
|
Gateway Services for NetWare used on win 2000 systems toallow client systems to access resources on Netware clients
|
|
Which switch on the ping command will ping a device until stopped?
|
-t
|
|
which ping switch will resolve hostnames
|
-a
|
|
What is the function of ARP utility
|
to resolve IP addresses to Layer 2 or Mac Addresses.
|
|
What are the benefits of Network Address Translation (NAT)?
|
Conserves global IP Addresses, Provides a more secure connection to the internet, Allows multiple computers on the same LAN to connect to another network (internet) simultaneously
|
|
An ISDN adapter is able to connect to a workstation using which of the following interfaces?
|
A Serial Port
An Expansion Slot A Parallel Port |
|
The 100base-TX standard defines how many types of repeaters?
|
2
|
|
Auto-Negotiation on Ethernet takes place using FLP signals. What does FLP stand for?
|
Fast Link Pulse
|
|
Which of the following are features of the TCP protocol?
|
Assures reliable delivery, Is connection oriented. Uses sockets and ports to exchange data between applications
|
|
Frame Relay is able to provide a maximum transmission rate of which of the following?
|
45 Mbps
|
|
The FDDI interface operates under which of the 802.x standards?
|
802.8
|
|
T3 is the equivalent of how many T1 carrier lines?
|
28
|
|
IPX/SPX is an implementation of which layers of the OSI model?
|
Transport Network
|
|
You need to create a reverse lookup zone on your DNS server for your network of 199.230.50.0. What would be the appropriate zone name?
|
50.230.199.in-addr arpa
|
|
The 100BASE-TX media system is based on which published physical specifications?
|
ANSI TP-PMD
|
|
At which levels of the OSI model does a wireless access point operate?
|
Physical
2. Data link |
|
What does UDP and TCP have in common
|
they both rely on port addresses
|
|
On a TCP/IP network what specifies to an application where a data packet will be sent?
|
Port
|
|
ATMs usually run at which speed?
|
155Mbps 266Mbps
|
|
Which servers support TCP/IP natively?
|
NetWare 5.1, Solaris Unix, Windows NT 4.0
|
|
You have a network with both Novell Netware and windows server what would you implement to allow users to access resources on both.
|
Novell Client for Windows
|
|
What port would you use to attach a NAS server?
|
Port 23
|
|
The FDDI interface operates under which of the 802.x standards?
|
802.8
|
|
Which of the following technologies provides 672 64Kbps voice or data channels?
|
T3
|
|
What is the maximum speed of a 802.11g network connection?
|
54Mbps
|
|
An ISDN adapter is able to connect to a workstation using which of the following interfaces?
|
A Serial Port
2. An Expansion Slot 3. A Parallel Port |
|
Which of the following is a connection oriented protocol?
|
TCP
|
|
The UNIX security method is based on which of the following?
|
Object
|
|
You wish to associate more than one host name with a particular IP address in your DNS database. Which type of record should you add for the second host name?
|
CNAME
|
|
At which levels of the OSI model does a wireless access point operate?
|
Physical
2. Data link |
|
Which protocol is responsible for obtaining hardware addresses during broadcasts?
|
ARP
|
|
The 100BASE-FX media system is designed to allow segments of up to how many kilometers meters in length?
|
2
|
|
Why is there a limit to the number of MAUs that can be connected together in a standard Token-ring network?
|
Too many devices connected through MAUs requires more time to get control of the token that communications becomes unacceptable
|
|
How many devices can communicate simultaneously within a Token-ring LAN?
|
One
|
|
What are the two methods switching hubs use to transport data between devices?
|
Cut-through Store-and-forward
|
|
What protocol does not use UDP or TCP?
|
ARP
|
|
What two protocols could be used to create a VLAN on a Cisco router?
|
ISL, 802.1q
|
|
What protocol is used to control security to ports?
|
802.1x
|
|
What port does IMAP4 use?
|
143
|
|
You want to connect a remote building at GB speeds that is two hundred meteres away. What type of cable would you use?
|
1000BaseSX
|