Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/190

Click to flip

190 Cards in this Set

  • Front
  • Back
A Router operates in which layer of the OSI model?
The Network Layer
What does the Network Time Protocol (NTP) do?
Synchronizes computer clock times in a network of computers
L2TP is able to support which of the following protocols?
AppleTalk
2. TCP/IP
3. IPX
What are disadvantages of DSL connections?
It is slower than cable technology, Only available near the telephone company's central offices, May not be available to some users with older phone lines
Which of the following devices operate at the Data Link layer of the OSI model?
NIC Bridge
Which Windows 2000/2003 service provides NAT, dial-up, routing, and other network functions?
RRAS
By default, which of the following ports does the Hypertext Transfer Protocol communicate on?
80
Which of the following protocols is used to create a VPN?
PPTP
Which frame type is used on a Token Ring LAN?
802.5
Which layer of the OSI model does data encryption take place in?
Presentation
You would like to provide redundancy for your DNS server. How do you accomplish this.
Set up a secondary
Which of the following are sublayers of the data-link layer of the OSI model
LLC MAC
Which of the following should be considered when determining which subnet mask to use on a network?
The class of the IP address,
Projected growth of the network, The number of hosts that will be on the network
The ARP utility will provide you with which of the following types of information?
Internet Address
2. Physical Address
3. Type
Your company wishes to set up a VPN between 2 branch offices and requires that the link supports non-IP protocols and authentication. Which protocols are required?
L2TP IPSEC
Which of the following technologies would most like be used to synchronize your PDA with your PC located in another room?
Bluetooth
Which of the following tools is sometimes referred to as the fox-and-hound?
Tone Locator
The 100BASE-FX link uses the MDI interface. What does MDI stand for?
medium dependent interface
Which of the following are valid reasons for implementing DHCP?
Prevents duplicate IP addresses on the network
2. Prevents typos or incorrect IP address, subnet mask or default gateway information from being entered
3. Saves time on large networks by getting rid of the need to configure every clients' IP information manually
4. Helps keep addresses available on networks where IP addresses are running short
Which of the following devices operate at the Data Link layer of the OSI model?
NIC
3. Bridge
What are the two parts of an IP address?
Network ID & Host ID
Class A
Supports Large networks and uses the first octet of the address to identify the network. First bit is always 0
Class B
Moderate networks, uses the first two octets to identify the network.
First two bits are always 10
Class C
Small networks, uses the first three octets to identify the network, first three bits are always 110
What are examples of "reserved" addresses
Network address & local broadcast & directed broadcast address
How are IPv6 internet addresses represented?
eight sets of four hexidecimal digits
What are the three types of broadcasts for IPv6
Unicast, Multicast & anycast
What is the data rate for a token ring network?
16Mbps
What kind of physical interface does a router have
AUI
A server redirector is handled by which level of the OSI model?
Session
Which port is used by DNS
53
What is the max lenght of a FDDI packet?
36000 bits
What is ICA used for?
allows an application to be run on a remote computer but appear as if it running locally
What best describes share level access?
Used to specify password protection for each user
which port is used by secure websites?
443
Which topolgy is easiest to expand?
STAR
802.2
LLC regulates how much data can be transmitted in a certain amount of time
802.3
csma/cd for ethernet, 10 mbps bus
& star
802.11b
Wireless 16mbps uses CSMA/CA
802.3u
100 mbps physical topology star logical topology bus
802.3z
1000mbps
802.5
4 & 16 Mbps, uses token passing method
FDDI
100Mbps, dual ring, fiber, token passing
What type of cable is often used for cable TV & cable modems
RG-59
CAT 5
100Mbps
Cat 6
155Mbps
Cat 7
1000 Mbps
router
used to create larger natworks by joining two network segments
bridge
used to divide larger networks into smaller sections
100BASETX
Cat 5 UTP, 100 meters, RJ-45, physical star
100BaseT4
cat 3, 4,5 UTP, 100 meters, RJ-45, physical star
100BaseFX
Multimode/single-mode fiber-optic cable, 412/multimode fiber-optic 10,000/single mode fiber-optic, SC, ST physical star
1000BASE LX
Multi-mode/single mode fiber 550/multimode 5000/ single mode
1000BaseSX
Multimode, 550 meters using 50 Micron multimode fiber
1000BaseCX
STP 25 meters, 9-pin shielded connector, 8 pin fiber channel type 2 connector
1000BaseT
UTP 75 meters, RJ-45
10GBaseSR
Baseband, 10000Mbps, fiber
10BBaseLR
Baseband, 10000Mbps, 10,000m, single mode
10GBaseER
Baseband, 10000 Mbps, single mode
In a crossover cable which wires are crossed?
1&3, 2&6
What distance vector and link state is associated with TCP/IP?
RIP, OSPF
What distance vector and link state is associated with IPX/SPX?
RIP NLSP
What command would you use to obtain a MAC address on a win 95/98/ME machine?
winipcfg
What command would you use to obtain a MAC address on a Linux/Unix box
ipconfig -a
What command would you use to obtain a MAC address on a novell system?
config
What command would you use to obtain a MAC address for a Cisco Router?
sh int <interface name>
Application
7
Presentation
6
Session
5
Transport
4
Network
3
Data-link
2
Physical
1
What does the physical layer define?
hardware, topology and voltage
What is the data link layer responsible for?
Getting the data to the physical layer so that it can be transmitted over the network. Error detection, hardware addressing.
What are the two sublayers of the data link layer?
MAC layer, LLC layer
What is the LLC layer of the data link layer responsible for?
error checking & flow control mechanisms
What is the primary responsibility for the network layer?
routing
What is the transport layer responsible for ?
error checking, service addressing, segmentation
What is the Session layer responsible for?
synchronization of data between applications on two devices
What does the presentation layer do?
convert the data intended for or received from the application layer into another format.
What does Appleshare do?
provides application layer services including file and print services.
What does appleTalk address Resolution Protocol do/
map AppleTalk addresses to ethernet and token ring physical addresses
What does AppleTalk Data Stream protocol do?
a session layer protocol used to establish connections between network devices
What does AppleTalk filing protocol?
manages file sharing
What does AppleTalk Session Protocol do?
works on the session layer and establishes/releases connections between networked devices
AppleTalk Transaction Protocol
establishes a connectionless session between networked systems
Datagram Delivery Protocol (AppleTalk)
Performs datagram delivery and routing functions
EtherTalk Link Access Protocol
a variation of the appletalk protocol that is compatible with the eithernet protocol
Name binding protocol (AppleTalk)
used to map computer names host names to network layer addresses
Printer Access Protocol
session layer protocol used to provide printing service
Routing Table Maintenance Protocol
maintains the routing tables
TokenTalk Link access Protocol
variation on appletalk that is compatible with token ring
Zone information protocol
used to divee network devices into logical groups called zones
Identify the network/node address for the following IP & subnet:
Subnet: 255.0.0.0
IP: 192.168.10.100
Network Address: 192
Node Address: 168.10.100
Identify the network/node address for the following IP & subnet:
Subnet: 255.255.0.0
IP: 192.168.10.100
Network address: 192.168
Node Address: 10.100
Identify the network/node address for the following IP & subnet:
Subnet: 255.255.255.0
IP: 192.168.10.100
Network address 192.168.10
Node address: 100
what is the IP range for a class A address?
1-126
What is the IP range for a class b network?
128 - 191
What is the IP range for a class C network
192-223
What is the IP Range for a class D network
224-239
what is the Ip Range for a class E network
240-255
what is the default subnet mask for a class a network
255.0.0.0
What is the default subnet mask for a class B network
255.255.0.0
What is the default subnet mask for a class C network?
255.255.255.0
What is the private address range for a class A network?
10.0.0.0-10.255.255.255
What is the private address range for a Class B network
172.16.0.0-172.31.255.255
What is the private address range for a Class C network
192.168.0.0-192.168.255.255
What is APIPA?
Automatic Private IP addressing, assigns an ip address if unable to obtain one and allows limited connectivity to local network.
Is IP connection oriented or connection-less?
connection less
Is TCP connection oriented or connection-less?
connection-oriented
What is the biggest difference between TFTP and FTP?
TFTP is connection-less and uses only UDP
What is SSH?
Secure Shell is a secure alternative to Telnet
What is ICMP?
works with IP to provide error checking and reporting functionality. has the ping utility
What is the function of ARP?
resolve IP addresses to MAC addresses or layer 2
What is NTP
NTP uses the TCP transport protocol and is the protocol that facilitates the ocmmunication of time information between systems
What is NNTP
Network news transport protocol used for accessing the downloading messages from internet-based newsgroups
What is SCP
Secure Copy Protocol that uses SSH to provide a safe way to copy files between systems
What is LDAP?
Lightweight Directory Access Protocol, provides a mechanism to access directory service systems
What is IGMP?
Internet group managment protocol used for communication between devices in a multi-cast group
What is the LPR?
Line Printer Remote provides a mechanism to send printing tasks to a print server
Port 20
FTP
Port 21
FTP
Port 22
SSH
Port 23
Telnet
Port 25
SMTP
Port 23
DNS
Port 69
TFTP
Port 80
HTTP
Port 110
POP3
Port 119
NNTP
Port 123
NTP
Port 143
IMAP4
Port 443
HTTPS
What are messages sent by SNMP agents to an SNMP management system
trap messages
What are the three requirments of Zeroconf
a capability to self-assign IP address, a capability to independently resolve hostnames, mechanism for independently locating services on a network
What is SMB
the default file access and sharing protocol for windows based systems
At what speed can t1 transmit?
T1
At what speed can t2 transmit?
6.312
Why is SLIP so dangerous?
Because it sends everything in clear text.
What port does PPTP use on the server?
1723
What does L2TP do?
it is an independent protcol tht supports secure tunneling & supports common public key infrastructure
What is CHAP?
CHAP is an authentication system that uses MD5 encryption shceme to secure authentication responses.
What is MS-CHAP?
developed to authenticate remote Windows based workstations, requires authentication of both server & client.
What is PAP?
the least secure of the authentication methods because it uses unecrypted passwords
What is EAP?
an extension made to standard PPP.
What is SPAP?
an ecrypting authentication protocol used by Shiva remote acces servers
What OS is associated with HFS?
Apple OS X
What is the native authentication protcol for micorsoft active directory?
Kerberos
What is CSNW
Client services for NetWare, designed to enable Windows client systems to access file and print services on a Netware server
What is GSNW?
Gateway Services for NetWare used on win 2000 systems toallow client systems to access resources on Netware clients
Which switch on the ping command will ping a device until stopped?
-t
which ping switch will resolve hostnames
-a
What is the function of ARP utility
to resolve IP addresses to Layer 2 or Mac Addresses.
What are the benefits of Network Address Translation (NAT)?
Conserves global IP Addresses, Provides a more secure connection to the internet, Allows multiple computers on the same LAN to connect to another network (internet) simultaneously
An ISDN adapter is able to connect to a workstation using which of the following interfaces?
A Serial Port
An Expansion Slot
A Parallel Port
The 100base-TX standard defines how many types of repeaters?
2
Auto-Negotiation on Ethernet takes place using FLP signals. What does FLP stand for?
Fast Link Pulse
Which of the following are features of the TCP protocol?
Assures reliable delivery, Is connection oriented. Uses sockets and ports to exchange data between applications
Frame Relay is able to provide a maximum transmission rate of which of the following?
45 Mbps
The FDDI interface operates under which of the 802.x standards?
802.8
T3 is the equivalent of how many T1 carrier lines?
28
IPX/SPX is an implementation of which layers of the OSI model?
Transport Network
You need to create a reverse lookup zone on your DNS server for your network of 199.230.50.0. What would be the appropriate zone name?
50.230.199.in-addr arpa
The 100BASE-TX media system is based on which published physical specifications?
ANSI TP-PMD
At which levels of the OSI model does a wireless access point operate?
Physical
2. Data link
What does UDP and TCP have in common
they both rely on port addresses
On a TCP/IP network what specifies to an application where a data packet will be sent?
Port
ATMs usually run at which speed?
155Mbps 266Mbps
Which servers support TCP/IP natively?
NetWare 5.1, Solaris Unix, Windows NT 4.0
You have a network with both Novell Netware and windows server what would you implement to allow users to access resources on both.
Novell Client for Windows
What port would you use to attach a NAS server?
Port 23
The FDDI interface operates under which of the 802.x standards?
802.8
Which of the following technologies provides 672 64Kbps voice or data channels?
T3
What is the maximum speed of a 802.11g network connection?
54Mbps
An ISDN adapter is able to connect to a workstation using which of the following interfaces?
A Serial Port
2. An Expansion Slot
3. A Parallel Port
Which of the following is a connection oriented protocol?
TCP
The UNIX security method is based on which of the following?
Object
You wish to associate more than one host name with a particular IP address in your DNS database. Which type of record should you add for the second host name?
CNAME
At which levels of the OSI model does a wireless access point operate?
Physical
2. Data link
Which protocol is responsible for obtaining hardware addresses during broadcasts?
ARP
The 100BASE-FX media system is designed to allow segments of up to how many kilometers meters in length?
2
Why is there a limit to the number of MAUs that can be connected together in a standard Token-ring network?
Too many devices connected through MAUs requires more time to get control of the token that communications becomes unacceptable
How many devices can communicate simultaneously within a Token-ring LAN?
One
What are the two methods switching hubs use to transport data between devices?
Cut-through Store-and-forward
What protocol does not use UDP or TCP?
ARP
What two protocols could be used to create a VLAN on a Cisco router?
ISL, 802.1q
What protocol is used to control security to ports?
802.1x
What port does IMAP4 use?
143
You want to connect a remote building at GB speeds that is two hundred meteres away. What type of cable would you use?
1000BaseSX