Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
What is the basic purpose of a local area network (LAN)? |
To connect one or more computers together so they can share resources. |
|
Which of the following describes a VLAN? |
It virtually separates subnets using switches |
|
IP resides at which layer of the OSI model? |
Network |
|
Layer 2 of the OSI model is named |
Data Link layer |
|
Which TG rating of coal is used for cable modems? |
RG-6 |
|
Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 20MHz? |
Category 6 UTP |
|
If you are running half-duplex Internet, which of the following is true? |
Your digital signal cannot transmit and receive data at the same time. Hosts use the CSMA/CD protocol to prevent collisions. The physical connection consists of one wire pair. |
|
You need to connect a hub to a switch. You don't like this idea because you know that it will create congestion. What type of cable do you need to use to connect the hub to the switch? |
Crossover |
|
Your boss asks you why you just put in a requisition to buy a bunch of switches. He said he just bought you a bunch of hubs five years ago! Why did you buy the switches? |
Because each switch port is its own collision domain. |
|
Which device would connect network segments together, creating separate collision domains for each segment but only a single broadcast domain? |
Switch |
|
Most Application-layer protocols only use UDP or TCP at the Transport layer. Which of the following could use both? |
DNS |
|
HTTP, FTP, and Telnet work at which layer of the OSI model? |
Application |
|
IPv6 uses multiple types of addresses. Which of the following would describe an anycast address used by an IPv6 host? |
This address identifies multiple interfaces, and the anycast packet is only delivered to one address, This address can also be called one-to-one-of-many |
|
Which of the following IP addresses are not allowed on the Internet? |
10.1.1.1 192.168.0.1 |
|
What is the subnetwork address for a host with the IP address 200.10.5.168/28 |
200.10.5.160 |
|
If you wanted to verify the local IP stack on your computer, what would you do? |
ping 127.0.0.1 |
|
The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer of the OSI. What is the encapsulation named at the Data Link layer? |
Frames |
|
Where does a Data Link layer frame have to carry a Network layer packet if the packet is destined for a remote network? |
rOUTER |
|
Which of the following are not Distance Vector routing protocols? |
OSPF IS-IS |
|
Which of the following uses both Distance Vector and Link State properties? |
EIGRP |
|
You need to break up broadcast domains in a Layer 2 switched network. What strategy will you use? |
Create a VLAN |
|
Why do most switches run the Spanning Tree Protocol by default? |
It prevents switching loops |
|
Which of the following describes MIMO correctly? |
A data-transmission technique in which several frames are sent by several antennae over several paths and are then recombined by another set of antennae. |
|
Which two practices help secure your wireless access points from unauthorized access? |
Changing the default SSID value Configuring a new administrator password |
|
IPSec is defined at what layer of the OSI model? |
Network |
|
You want your users to log in and authenticate before they can get onto your network. Which of the following services would you use? |
RADIUS |
|
Someone calls you and asks for your bank-account number because the bank is having problem with your account. You give them this information and later fing out that you were scammed. What type of attack is this? |
Phishing |
|
Which three of the following are types of denial of service attacks? |
Ping of Death Stacheldraht SYN flood |
|
You want to stop a hacker in theri tracks. Which of the following devices are proactive in providing this service? |
Intrusion Prevention System (IPS) |
|
You connected your company to the internet, and security is a concern, What should you install? |
Firewall |
|
Which of the following are WAN protocols or technologies? |
ATM ISDN MPLS |
|
The rate at which the frame-relay switch agrees to transfer data is referred to as? |
CIR |
|
Which two arp utility switches perform the same function? |
-g -a |
|
You need to purge and reload the remote NetBIOS name table cache. Which nbtstat utility switch will you use? |
-R |
|
Which tool is used to attach ends to network cables? |
Crimper |
|
You are using a TDR. Which three of the following actions can you do with this device? |
Estimate cable lengths find splice and connector locations and their associated loss amounts Define cable-impedance characteristics |
|
Which of the following are considered cabling issues? |
Crosstalk Shorts Open impedance mismatch |
|
A workstation gives an error message to a user. The message states that a duplicate IP address has been detected on the network. After developing a hypothesis, what should the next step be according to the standard troubleshooting model? |
Implement an action plan |
|
Which network-performance-optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications? |
Traffic shaping |
|
You need to optimize network traffic by spreading it across multiple connections. Which strategy should be used? |
Load balancing |