• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/161

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

161 Cards in this Set

  • Front
  • Back

What is a set of agreed-upon instructions designed to allow computers to communicate to each other across a network connection?

Protocol

. What is a group of networking protocols designed to work together to accomplish a task requiring communications?


Protocol Suite

Which of the following is not a layer in the TCP/IP reference model?


a) Network Access


b) Transport


c) Intranet



d) Application

C.)Intranet

Which core protocol used on the Internet moves data packets from one location on a packet-switched network to another location based on a logical address?


IP

What mathematical function is performed on data to ensure that it has not been changed or corrupted?

checksum

Which protocol translates an IP address into a MAC address?

ARP

Which protocol is used to send messages about the network when a route goes bad?


ICMP

What command is used to test IP connectivity between two hosts?

Ping

What protocol does the ping command use?

ICMP

What command tests connectivity between two hosts while showing each hop between the two hosts?

tracert

. Which TCP/IP protocol do IP hosts use to join or leave multicast groups and routers use to find multicast group members?


ICMP

What mechanism is used to send one set of packets to multiple hosts at the same time?

Multicasting

. What is used to determine which upper-layer protocols, services, and processors each data segment is intended for?


Port

What type of port ranges from 0 to 1023?

Well-Known Ports

What type of port ranges from 1024 to 49151?

Registered Ports

What type of port ranges from 59152 to 65535?

dynamic ports

What port does HTTP use by default?


80

What protocol uses TCP port 25?


SMTP

What protocol does the Simple Network Management Protocol use?

161

Which core protocol used within a TCP/IP network gets messages from one end point to another?

TCP

Which connection-oriented protocol ensures that data gets its final destination?

TCP

Which connectionless transport protocol does not guarantee reliable delivery?


User Data Protocol (UDP)

. What protocol is used to assign IP addresses automatically to a host?

DHCP

What protocol was the predecessor for DHCP?


Bootstrap Protocol (BOOTP)

Which protocol is used to resolve host names to IP addresses?


Domain Name System (DNS)

The DNS clients that make requests to the DNS server are known as ____________.

agents

When a DNS client needs to resolve a host name to an IP address, where will it first check?

Its own DNS cache

What protocol is used to transport and display web pages using a browser?

Hyper-Text Transport Protocol(HTTP)

. __________ is a protocol used to secure Internet communications.

Secure Socket Layer(SSL)

Which of the following is a basic task that SSL is not designed for?


a) server authentication



b) client authentication



c) agent authentication




d) encryption of TCP sessions


a.)agent authentication

. What protocol is used to send and manipulate files over a TCP/IP network?

File Transfer Protocol(FTP)

What protocol is used to carry voice data over a packet switched networks?

Voice over internet protocol(VoIP)

. What protocol is used to stream voice or video over a TCP/IP network?

Real-Time Transport Protocol(RTP)

What protocol is used to provide bi-directional interactive command-line access to either a remote or local host?

TELNET

Which protocol is used to send emails?

SMTP

Which protocol is used to retrieve emails?

POP3

What routing type is manually defined?


Static Routing

What measurement is used to choose the best route to a specific location?

metrics

What represents the number of routers it takes to get from one destination to another?

hops

Which type of routing protocol are RIP and IGRP?


distance vector routing protocol

What does a computer use to connect to a network?

NIC

What is used to carry data on a network?

Medium

On which OSI layer does the network interface card work?

Physical

What is the physical address assigned to a NIC?

MAC address

. You are given the following address: 00-90-4B-AD-2A-AC
What type of address is this?


MAC address

What networking device is used to modulate an analog signal in such a way that it can encode digital information?

Modem

What device converts one type of media to another type?

Media Converter

What is used to repeat a signal it receives and rebroadcast it?

Repeater

What is a multiport repeater?

Hub

What type of hub does not amplify or resend a signal?

Passive Hub

. What type of hub repeats the signal from one computer to all other computers or similar devices connected to a hub?


Active Hub

What happens when two computers send data at the same time, causing both signals to become corrupted?


a collision

In what type of network segment do computers have the possibility of having their signals collide with each other?

collision domain

What connects two network segments together, yet only forwards packets based on MAC addresses from one segment to another segment only when needed?


bridge

On what OSI layer does a switch operate?


Data-Link

Which of the following device is multiport bridge?


a) bridge


b) hub


c) router


d) switch

d.)switch

What device has each port as its own collision domain?

switch

What type of switch is used for load balancing?


content switch

What is referred to as a group of hosts in the Data-Link layer that share a common set of communications requirements and can be isolated from other groups?


VLAN

What are VLANs created with?

switches

What is used to identify VLANs?

VLAN numbers

What describes multiple VLANs carried across a single cable or network link?


trunking

What is used to have packets going through a switch to be copied to a single port?

Port Mirroring

. What can you use to limit what hosts can be connected to a switch?

port authentication

When you use port authentication, what is used to limit access to the network?


MAC Addresses

. What protocol do multiple switches on the same network use to ensure that an infinite loop is not created?


STP

What is used to convert digital signals from one frame format to another, specifically to convert Frame Relay into Ethernet signals?

CSU/DSU

Which component used to convert Frame Relay signals to Ethernet is used to receive and transmit signals from some type of WAN connection, such as T-1 or Frame Relay connection?


CSU

At what OSI layer do routers operate?

Network

What is used to protect a network from unauthorized access?

firewall

When a firewall analyzes a packet, what does it use to determine whether the packet is allowed based on IP address?


access control list

What special zone is used to connect an internal network with the Internet that is designed to hide the internal network from the Internet?

DMZ

Where would you place a web server that will be accessed from the Internet?

DMZ

. Where would you place the SQL server that will be used by web servers over the Internet?

intranet

What type of server acts as an intermediary between a client and other servers?

SMB server

What type of server is used to temporarily store recent access to the Internet so that future requests to the same web sites can be accessed from the server instead of the actual web server?


caching proxy server

What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?

IDS

What is used to look at current conversations that go through a router so that it can figure out which packets to allow back through?


stateful protocol analysis`

What is used to manage and/or control network usage in order to optimize bandwidth?

bandwidth shaping

. What is the oldest and most widely used LAN technology in use today?

Ethernet

What is the most widely used Ethernet frame type used today?

Ethernet II

Which Ethernet frame type supports TCP/IP?

Ethernet II

What type of access method does Ethernet use today?


CSMA/CD

What type of access method is used in wireless networks?

CSMA/CA

. What happens when two computers broadcast at the same time on the network, causing both sets of data to be garbled?


collision

When a collision occurs, what do the two sending nodes do?

They wait a random period of time and try again.

What type of device will reduce the number of collisions?

Switch

What media type can carry multiple data signals at the same time?


broadband

What media type can carry only one data signal at a time?

baseband

Ethernet is considered ___________.


baseband

Today, what type of cable is the most common for Ethernet?


UTP

What is the first version of Ethernet based on?

10 Base-5

10Base-5 uses what type of cable?


coaxial

10Base-2 uses what type of cable?

coaxial

What was the first Ethernet standard used on UTP?


10Base-T

What was the first standard that supported 100 mbps for Ethernet?

100Base-TX

Which Ethernet standard was developed to work over fiber?

100Base-FX

What is the range of 100Base-FX running in half-duplex?

400 meters

What is the range for 100base-FX running in full-duplex on single-mode fiber?

2,000 meters

What is the range of 100Base-FX running in full-duplex on multi-mode fiber?

10,000 meters

What distance does 1000Base-LX support with single-mode fiber?

5,000 meters

What standard was 1000Base-X introduced as?


IEEE 802.3z

What is the copper version of Gigabit Ethernet?

1000Base-T

What IEEE standard is used for 10 Gigabit Ethernet?

802.3ae

What 10 Gigabit Ethernet standard supports either shielded or unshielded twisted-pair wiring?


10GBroad-T

What do you call data that is sent to all computers on a network or network segment?

broadcast

Which type of device reads the MAC address of the destination and sends it to the port where the destination host is?

switch

Which of the following is considered a legacy device?


a) hub



b) switch



c) router




d) gateway


a.)hub

How many collision domains does an eight-port hub have?

1

What is another term for link bonding?

link aggregation

How many meters can Category 5 cable reliably carry 100 mbps of data.


100

What technology is usually used with wireless technology that will limit who can connect to a wireless network?

MAC address filtering

To connect to a wireless network, you would start with what?

SSID of the router

What helps protect data that is sent using a wireless network?

encryption

How many channels does 802.11g support?

14

. Which wireless mode does not use a central WAP?

ad-hoc

Which wireless mode uses a central WAP?

infrastructure mode

Which wireless encryption is considered the weakest?


WEP

Which wireless encryption is considered the strongest?


WPA2 enterprise

Which wireless encryption uses digital certificates for encryption?


WPA2 enterprise

Which wireless encryption uses a common password for encryption?


WPA personal

. What communications term describes the establishment of a dedicated communications channel for the duration of a given transmission?


circuit switching

. What traditional technology has been used for phone calls, but is not done with automatic phone switches?


circuit switching

What technology takes a voice communication, breaks the data into small packets, and sends the packets from one network segment to another?

packet switching

What technology has data broken into smaller packets so that each packet can go through

packet switching

In what type of technology is the whole message routed to its destination one hop at a time?


message switching

What technology does email use to send messages?

message switching

What communication link is established between two points in a larger network, such as the Internet?


virtual circuit switching

What type of technology does a VPN use?

virtual circuit switching

Which type of cables uses electrical pulses to transmit network communications?


copper

Which type of cabling is the preferred media for WANs?

fiber

. What type of cabling is light to carry data?

fiber

. What type of wireless communications is seen in WAN environments?

microwave

What can you use to overcome the limitations of microwave towers and the curve of the earth?


satellites

What is the ideal position for satellites that allow depending network connectivity?


geosynchronous orbit

What type of orbit covers the northern part of the earth?

Molniya orbit

What is the most common form of radio frequency WAN media?


cellular

What topology uses transceiver tower to broadcast in a circular range?


cellular

. Why do today’s cell towers use three directional antennas?


to increase range

What technology does a common dial-up service use that’s based on the standard telephone service?

POTS

Which is the least expensive Internet access method?


a) cable


b) DSL


c) POTS


d) ATM

c)POTS

What modem compression standard allows connections of 50 kbps, but has an effective speed of 300 kbps for text files?

V.44

What refers to the entire worldwide telephone network?

PSTN

What is the point at which the network provider’s responsibility ends when connecting a site to its network?


demarc

When looking at PSTN, what part of the network goes from the switching facility to a house?


last mile

What is the first popular standard meant to replace POTS that can carry voice, video, and other services in a digital format over the PSTN?


ISDN

What is the throughput of a B channel on a BRI-ISDN?


64kbps

What is the total bandwidth for a BRI-ISDN?

144kbps

. What is a telephone exchange or switch called?

PBX

What protocol does ISDN-BRI use to establish and break circuit-switched connections?

Q.931

What technology allows you to connect over the Internet using PSTN while talking on the phone?

DSL

. In the United States, how many data channels are available for ISDN-PRI?

23

Approximately how much data can an ISDN PRI carry?

1.5 mbps

How many data channels does an E1 carry?

30

. What early packet-switched network technology originally designed for analog technology?


X.25

What technology uses Packet Assembly/Disassembly (PAD) facilities?


X.25

What is the speed of a T-3 line?


44.7 mbps

What WAN technology is based on cells 58 bytes in size?

ATM

Which of the following is based on fiber-optic cables?


a) SONET


b) Frame Relay


c) ATM


d) DSL

a.)SONET

What is the speed of an OC-3?


155.5 mbps

Which of the following is used create a secure connection to a corporate network from home using the Internet as the network medium?


a) VPN


b) ATM


c) Frame Relay


d) ISDN-BRI

a)VPN