• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/136

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

136 Cards in this Set

  • Front
  • Back

LAN

Network of users that share computer resources in a limited area

Protocol

Set of rules established for users to exchange information

Topology

Architecture of a network

Token Ring Topology

A network topology configured in a logical ring that complements the token passing protocol

Token Passing

A technique where an electrical token circulates around a network - control of the token enables the user to gain access to the network

IEEE

Institute of Electrical and Electronics Engineers, one of the major standards-setting bodies for technological development

Deterministic

Access to the network is provided at fixed time intervals

Token Ring Hub

A hub that manages the passing of the token in a
Token Ring network

Bus Topology

The computers share the media (coaxial cable) for data transmission

ThinNet

A type of coaxial cable used to connect LANs configured with a bus topology

Star Topology

The most common networking topology in today's LANs where all networking devices connect to a central switch or hub

Hub

Broadcasts the data it receives to all the devices connected to its ports

Multiport Repeater

Another name for a hub

Broadcast

Transmission of data by a hub to all devices connected to its ports

Switch

Forwards a frame it receives directly out the port associated with its destination address

Ports

The physical input/output interfaces to the networking hardware

Mesh Topology

All networking devices are directly connected to each other

OSI

Open System Interconnect

OSI Model

The seven layers describing networking functions

Physical Layer

Provides the electrical and mechanical connection to the network

Data Link Layer

Handles error recovery, flow control (synchronization), and sequencing

Network Layer

Accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information



"Creates the package to be sent"

Transport Layer

Is concerned with message integrity between source and destination



"Insures integrity during shipment"

Session Layer

Provides the control functions necessary to establish, manage, and terminate the connections



"connection"

Presentation Layer

Accepts and structures the message for the application



"receives and prepares the package for the application"

Application layer

Interacts with application programs that incorporate a communication component such as your Internet browser and email



"uses the received information"

CSMA/CD

The Ethernet LAN media-access method, Carrier Sense Multiple Access with Collision Detection. Basically, for a computer to "talk" on the Ethernet network, it first "listens" to see whether there is any data traffic (carrier sense). This means that any computer connected to the LAN can be "listening" for data traffic, and any of the computers on the LAN can access the network (multiple access). There is a change that two or more computer will attempt to broadcast a message a the same time: therefore, Ethernet systems must have the capability to detect data collisions (collision detection)

Packet

Provides grouping of the information for transmission

Network Interface Card (NIC)

The electronic hardware used to interface the computer to the network

MAC Address

A unique 6-byte address assigned by the vendor of the network interface card

Organizationally Unique Identifier (OUI)

The first 3 bytes of the MAC address that identifies the manufacturer of the network hardware

Ethernet, physical, hardware, or adapter address

Other names for the MAC address

ipconfig/all

Enables the MAC address information to be displayed from the command prompt

IANA

The agency that assigns IP addresses to computer networks

IP Address

Unique 32-bit address that identifies on which network the computer is located as well as differentiates the computer from all other devices on the same network

Network Number

The portion of the IP address that defines which network the IP packet is originating from or being delivered to

Host Number

The portion of the IP address that defines teh location of the networking device connected to the network; also called the host address

Host Address

Same as the host number

ISP

Internet service provider

Private Addresses

IP addresses set aside for use in private intranets

Intranet

An internal network that provides file and resource sharing but is not accessed from the Internet

IP Internetwork

A network that uses IP addressing for identifying devices connected to the netowrk

TCP/IP

Transmission Control Protocol/Internet Protocol, the protocol suite used for internetworks such as the Internet

Wired Network

Uses cables and connectors to establish the network connection

Wireless Network

Uses radio signals to establish the network connection

Wi-Fi

the abbreviation for Wi-Fi Alliance, which is an organization that tests and certifies wireless equipment for compliance with the 802.11x standard. Wi-Fi stands for wireless fidelity.

State whether the following network descriptions are describing a MAN, WAN, or LAN:



a. A network of users that share computer resources in a limited area.


b. A network of users that share computer resources across a metropolitan area.


c. A network that connects local area networks across a large geographic area.



1-1

a. LAN



b. MAN



c. WAN

Expand the acronym NIC



1-1

Network Interface Card

Expand the acronym MAC



1-1

Media Access Control

Expand the acronym LAN



1-1

Local Area Network

Expand the acronym WAN



1-1

Wide Area Network

Define the term protocol.



1-2

A Protocol is a set of rules established for users to exchange information

Define the term topology.



1-2

Topology is the architecture of a network

Define the term deterministic.



1-2

Deterministic means that access to the network is provided at fixed time intervals

A disadvantage of the Token Ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding which of the following?



a. Router


b. Multiport Repeater


c. Token Passer


d. Token Ring Hub



1-2

D. Token Ring Hub

What is the difference between a hub and a switch?



1-2

Hub broadcasts and a switch sends data directly to the specified recipient.

What are the seven layer of the OSI model?



1-3

Application


Presentation


Session


Transport


Network


Data Link


Physical

Which OSI layer is considered the media access control layer?



1-3

Data Link Layer

Which OSI layer combines messages or segments into packets?



1-3

Network Layer

What layer does a router work at?



1-3

Networking Layer??

Which OSI layer is responsible for the mechanical connection to the network?



1-3

Physical Layer

The OSI layer responsible for data compression and encryption is which layer?



1-3

Presentation Layer

TCP functions at which layer of the OSI model?



1-3

Transport Layer

HTTP functions at which layer of the OSI model?



1-3

Application Layer

IP and IPX are example of protocols that operate in which layer of the OSI model?



1-3

Network Layer

The network interface card operates at which layer of the OSI model?



1-3

Physical Layer

Why are the layers of the OSI model important to the network administrator?



1-3

Knowledge of the layers can help to isolate the network problem. The network administrator uses the OSI model to troubleshoot network problems by verifying functionality of each layer.

Define the acronym CSMA/CD and the protocol that uses CSMA/CD.



1-4

Carrier Sense Multiple Access with Collision Detection is the networking protocol used in Ethernet networks.

What information is not included in an Ethernet frame?



a. Frame size


b. Source MAC address


c. Pad


d. Frame check sequence




1-4

A. Frame Size

What is the minimum size of the data payload in an Ethernet frame?



1-4

No Answer yet.

What is the minimum size and maximum size of an Ethernet frame?



1-4

No Answer yet.

Define the acronym OUI. Where is the OUI used?



1-4

Organizationally Unique Identifier.

What does the OUI represent?



1-4

No Answer yet.

In Windows Vista or Windows XP, how would you find the Ethernet (MAC) address?



1-4

No Answer yet.

INTERNET SEARCH: Find the device manufacturer for the following Ethernet devices:



1. 00-C0-4F-49-68-AB


2. 00-0A-27-B7-3E-F8


3. 00-04-76-B6-9D-06


4. 00-00-36-69-42-27



1-4

No Answer yet.

State the class of address (A, B or C) for the following IP addresses:



a. 46.39.42.05____


b. 220.244.38.168____


c. 198.1.0.4____


d. 126.87.12.34_____


e. 99.150.200.251_____


f. 128.64.32.16_____



1-4

No Answer yet.

Expand the acryonm TCP/IP.



1-4

Telecommunications Protocol/Internet Protocol

Cite the three advantages of a wired network.



1-5

No Answer yet.

Cite three advantages of a wireless network.



1-5

No Answer yet.

What does it mean for a wireless networking device to be WiFi compliant?



1-5

No Answer yet.

What are the most common types of equipment that are used to establish a broadband connection to the ISP?



1-5

No Answer yet.

Name six issues that should be considered when planning a home network.



1-5

No Answer yet.

Why is checking the lights of the networking device that connects to the ISP important?



1-5

No Answer yet.

What is the purpose of a range expander?



1-5

No Answer yet.

What is a hotspot?



1-5

No Answer yet.

List five steps that can be used to protect the home network.



1-5

No Answer yet.

You have the choice of selecting a networking device with WEP and another with WPA. Which offers better security, and why?



1-5

No Answer yet.

What are the potential problems of using the default factory passwords?



1-5

No Answer yet.

What is the purpose of the SSID, and what can the network administrator do to protect the network from hackers who might have learned the SSID?



1-5

No Answer yet.

What is the purpose of MAC filtering on a wireless network?



1-5

No Answer yet.

How does NAT help protect outsider access to computers in the home network?



1-5

No Answer yet.

What is Stateful Packet Inspection?



1-5

No Answer yet.

What is a VPN, and how does it protect the data transferred over a wireless network?



1-5

No Answer yet.

How is IP addressing typically handled in a home network?



1-5

No Answer yet.

What is port address translation (PAT)?



1-5

No Answer yet.

A router on a home network is assigned an IP address of 128.123.45.67. A computer in the home network is assigned a private IP address of 192.168.10.62. This computer is assigned the public IP address 128.123.45.67:1922. Which IP address is used for routing data packets on the Internet? Is overloading being used?



1-5

No Answer yet.

Which of the following is not a step in building an office LAN?



a. Obtaining proper government permits


b. Configuring the network settings


c. Connecting the devices together


d. Network documentation



1.-6

No Answer yet.

What does RJ-45 represent?



a. A 45-pin connector for CAT6


b. An IEEE standard for data speed


c. An 8-pin modular connector for twisted-pair Ethernet


d. Protocol used to verify a communications link



1-6

No Answer yet.

What is an uplink port?



1-6

No Answer yet.

What is the maximum speed and length for Category 6 cabling?



1-6

No Answer yet.

What do the link lights on a hub represent?



1-6

No Answer yet.

What does cross-connected mean?



1-6

No Answer yet.

Documentation: Draw a network diagram similar to Fig 1-33 consisting of three computers, a switch, and a printer. Use the MAC addresses given in Table 1-9 on page 55. Assign each network device an IP address from the private address space 192.168.5.x network. You are the network administrator and can choose the host address for each device.



1-6

No Answer yet.

Which command would you use to ping 10.3.9.42 indefinitely?



1-7

No Answer yet.

Which command would you use to ping 192.168.5.36 20 times with 1024 bytes of data?



1-7

No Answer yet.

Expand the acronym TTL.



1-7

No Answer yet.

In terms of computer security, a switch offers better security than a hub. Why is this?



a. A hub requires a special pin to activate the connection.


b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible.


c. A switch forward teh data it receives to every device connected to the switch. It is possible for network devices to pick up data intended for a different device. A hub eliminates this by only forwarding data packets to the correct device whenever possible.


d. The use of the switch guarantees that all devices connected to it will share link integrity pulses. This sharing of the pulses strengthens the security of the connection.



Certification Question (section 1)

No Answer yet.

What networking protocol does Ethernet use?



a. Ethernet uses a token ring passing scheme. The computer devices must posses the ring to be able to pass a token.


b. Ethernet uses Carrier Access - Multiple Sensing - Collision Detection


c. Ethernet uses Carrier Sense - Multiple Access - Collision Detection


d. Ethernet uses Collision Sense - Carrier Access - Multiple Pairing



Certification Question (section 1)

No Answer yet.

Network interface card has a MAC address of 00-00-86-15-7A. From this information, specify the OUI.



a. There is not sufficient information to specify the OUI.


b. The OUI is 86-15-7A


c. The OUI is 86-00-00


d. The OUI is 00-00-86



Certification Question (section 1)

No Answer yet.

An IP address for a computer is assigned by



a. The Internet Assigned Numbers Authority


b. The local network administrator


c. The user of the computer


d. Internet Address Numbers Authority



Certification Question (section 1)

No Answer yet.

The pad field in an Ethernet packet



a. Is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes.


b. Is used to bring the total number of bytes up to 64 if the data file is less than 64 bytes.


c. Is not required with CSMA/CD


d. Provides grouping of the information for transmission



Certification Question (section 1)

No Answer yet.

The IP Address 10.10.20.250 is an example of (select all that apply)



a. Class A address


b. Class B address


c. A private IP address


d. A routable IP address


e. A nonroutable Internet IP address



Certification Question (section 1)

No Answer yet.

An intranet (select all that apply)



a. Uses class E addressing


b. Used in high speed (gigabit) Ethernet


c. Is an internal network that provides file and resource sharing


d. Enables Fast Ethernet connections


e. Is not accessed from the Internet



Certification Question (section 1)

No Answer yet.

Wireless Router

Device used to interconnect wireless networking devices and to give access to wired devices and establish the broadband Internet connection to the ISP

Range Extender

Device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all

Hotspots

A limited geographic area that provides wireless access for the public

SSID

Service Set Identifier is the name that is used to identify your wireless network and is used by your access point or wireless router to establish an association

Firewall Protection

Used to prevent unauthorized access to your network

Stateful Packet Inspection (SPI)

Type of firewall that inspects incoming data packets to make sure they correspond to an outgoing request

Virtual Private Network (VPN)

Establishes a secure network connection and is a way to protect your LAN's data from being observed by outsiders

Network Address Translation (NAT)

Translates the private IP address to a public address for routing over the Internet

Overloading

Where NAT translates the home network's private IP addresses to a single public IP address

Port Address Translation (PAT)

A port number is tracked with the client computer's private address when translating to a public address

CAT6 (Category 6)

Twisted-pair cables capable of carrying up to 1000Mbps (1 gigabit) of data up to a length of 100 meters

RJ-45

The 8-pin modular connector used with CAT6/5e/5 cable

Mbps

Megabits per second

Numerics

A numerical representation

Ports

The interface for the networking devices

Crossover

Transmit and receive signal pairs are crossed to properly align the transmit signal on one device with the receive signal of the other device

Straight-through

Transmit and receive signal pairs are aligned end-to-end

Uplink Port

Allows the connection of a hub or switch to another hub or switch without having to use a crossover cable

Link Light

Indicates that the transmit and receive pairs are properly aligned

Link Integrity Test

Protocol used to verify that a communication link between two Ethernet devices has been established

Link Pulses

Sent by each of the connected devices via the twisted-pair cables when data is not being transmitted to indicate that the link is still up

Ping

Command used to test that a device on the network is reachable

ICMP

Internet Control Message Protocol