• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back

What is the basic purpose of a local area network (LAN)?

To connect one or more computers together so they can share resources.

Which of the following describes a VLAN?

It virtually separates subnets using switches

IP resides at which layer of the OSI model?

Network

Layer 2 of the OSI model is named

Data Link layer

Which TG rating of coal is used for cable modems?

RG-6

Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 20MHz?

Category 6 UTP

If you are running half-duplex Internet, which of the following is true?

Your digital signal cannot transmit and receive data at the same time.


Hosts use the CSMA/CD protocol to prevent collisions.


The physical connection consists of one wire pair.

You need to connect a hub to a switch. You don't like this idea because you know that it will create congestion. What type of cable do you need to use to connect the hub to the switch?

Crossover

Your boss asks you why you just put in a requisition to buy a bunch of switches. He said he just bought you a bunch of hubs five years ago! Why did you buy the switches?

Because each switch port is its own collision domain.

Which device would connect network segments together, creating separate collision domains for each segment but only a single broadcast domain?

Switch

Most Application-layer protocols only use UDP or TCP at the Transport layer. Which of the following could use both?

DNS

HTTP, FTP, and Telnet work at which layer of the OSI model?

Application

IPv6 uses multiple types of addresses. Which of the following would describe an anycast address used by an IPv6 host?

This address identifies multiple interfaces, and the anycast packet is only delivered to one address, This address can also be called one-to-one-of-many

Which of the following IP addresses are not allowed on the Internet?

10.1.1.1


192.168.0.1

What is the subnetwork address for a host with the IP address 200.10.5.168/28

200.10.5.160

If you wanted to verify the local IP stack on your computer, what would you do?

ping 127.0.0.1

The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer of the OSI. What is the encapsulation named at the Data Link layer?

Frames

Where does a Data Link layer frame have to carry a Network layer packet if the packet is destined for a remote network?

rOUTER

Which of the following are not Distance Vector routing protocols?

OSPF


IS-IS

Which of the following uses both Distance Vector and Link State properties?

EIGRP

You need to break up broadcast domains in a Layer 2 switched network. What strategy will you use?

Create a VLAN

Why do most switches run the Spanning Tree Protocol by default?

It prevents switching loops

Which of the following describes MIMO correctly?

A data-transmission technique in which several frames are sent by several antennae over several paths and are then recombined by another set of antennae.

Which two practices help secure your wireless access points from unauthorized access?

Changing the default SSID value


Configuring a new administrator password

IPSec is defined at what layer of the OSI model?

Network

You want your users to log in and authenticate before they can get onto your network. Which of the following services would you use?

RADIUS

Someone calls you and asks for your bank-account number because the bank is having problem with your account. You give them this information and later fing out that you were scammed. What type of attack is this?

Phishing

Which three of the following are types of denial of service attacks?

Ping of Death


Stacheldraht


SYN flood

You want to stop a hacker in theri tracks. Which of the following devices are proactive in providing this service?

Intrusion Prevention System (IPS)

You connected your company to the internet, and security is a concern, What should you install?

Firewall

Which of the following are WAN protocols or technologies?

ATM


ISDN


MPLS

The rate at which the frame-relay switch agrees to transfer data is referred to as?

CIR

Which two arp utility switches perform the same function?

-g


-a

You need to purge and reload the remote NetBIOS name table cache. Which nbtstat utility switch will you use?

-R

Which tool is used to attach ends to network cables?

Crimper

You are using a TDR. Which three of the following actions can you do with this device?

Estimate cable lengths


find splice and connector locations and their associated loss amounts


Define cable-impedance characteristics

Which of the following are considered cabling issues?

Crosstalk


Shorts


Open impedance mismatch

A workstation gives an error message to a user. The message states that a duplicate IP address has been detected on the network. After developing a hypothesis, what should the next step be according to the standard troubleshooting model?

Implement an action plan

Which network-performance-optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?

Traffic shaping

You need to optimize network traffic by spreading it across multiple connections. Which strategy should be used?

Load balancing